Joint Design of Multi-Dimensional Multiple Access and Lightweight Continuous Authentication in Zero-Trust Environments

被引:2
|
作者
Fang, He [1 ]
Wang, Xianbin [2 ]
Al-Dhahir, Naofal [3 ]
Schober, Robert [4 ]
机构
[1] Soochow Univ, Sch Elect & Informat Engn, Suzhou 215301, Peoples R China
[2] Western Univ, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
[3] Univ Texas Dallas, Dept Elect & Comp Engn, Dallas, TX 75080 USA
[4] Friedrich Alexander Univ Erlangen Nuremberg, Inst Digital Commun, Erlangen, Germany
关键词
Zero-trust users; continuous identity authentication; ASR maximization; multi-dimensional resource allocation; WIRELESS NETWORKS;
D O I
10.1109/GLOBECOM54140.2023.10437443
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Continuous authentication is essential to realize the new zero-trust based security provisioning. Conventional authentication techniques often rely on security keys, credentials, or device fingerprints, which may suffer from either high network overhead or low reliability in highly dynamic environments. To concurrently overcome these challenges, we jointly design the multi-dimensional multiple access and lightweight continuous authentication (MDMA-LCA) to explore multiple domains of the users' access channels for both communication and security enhancement. The access time frame, subchannel, and power allocation of multiple users are formulated as a joint optimization problem to maximize the achievable sum rate (ASR) of the users while continuously authenticating their identities assisted by the non-orthogonal multiple access (NOMA). The proposed scheme achieves lightweight continuous authentication by prearranging the access time sequences of multiple users and by verifying them directly and simultaneously at the base station (BS). Then, the joint optimization problem is decomposed and transferred to a maximum flow problem in a designed graph, and a joint MDMA-LCA algorithm is developed. Simulation results demonstrate that, compared with several existing schemes, the proposed scheme achieves an ASR gain while guaranteeing the continuous authentication of the users.
引用
收藏
页码:3366 / 3371
页数:6
相关论文
共 44 条
  • [1] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [2] A continuous authentication scheme for zero-trust architecture in industrial internet of things
    Wan, Tao
    Shi, Buhai
    Wang, Huan
    Alexandria Engineering Journal, 2025, 122 : 555 - 563
  • [3] Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework
    Dong, Chengzu
    Jiang, Frank
    Chen, Shiping
    Liu, Xiao
    2022 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING & COMMUNICATIONS (IEEE EDGE 2022), 2022, : 123 - 132
  • [4] ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous Authentication for Satellite Networks
    Fu, Peiyu
    Wu, Jun
    Lin, Xi
    Shen, Ao
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2376 - 2381
  • [5] Lightweight Authentication in Edge Collaborations Utilizing Multi-dimensional Historical Information: Design and Implementation
    Zhu, Wenrun
    Fang, He
    Wang, Xianbin
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [6] LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
    Shah, Syed W.
    Syed, Naeem F.
    Shaghaghi, Arash
    Anwar, Adnan
    Baig, Zubair
    Doss, Robin
    COMPUTERS & SECURITY, 2021, 108
  • [7] Risk-Aware Lightweight Data Access Control for Cloud-Assisted IIoT: A Zero-Trust Approach
    Routray, Kasturi
    Bera, Padmalochan
    PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 40 - 42
  • [8] MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks
    Ge, Yunfei
    Zhu, Quanyan
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [9] Uplifting Healthcare Cyber Resilience with a Multi-access Edge Computing Zero-Trust Security Model
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 192 - 197
  • [10] Agent-based multi-dimensional trust model in grid environments
    Gao Jian
    Mang Wei
    ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 691 - 695