A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

被引:0
|
作者
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Lee, Sangwoo [2 ]
Kwon, Hyeokchan [2 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
6G mobile communication; Authentication; Security; Access control; Internet of Things; Blockchains; Protocols; 5G mobile communication; Drones; Base stations; Encryption; Zero Trust; attribute-based encryption; authentication; blockchain; key agreement; sixth generation (6G); zero-trust; MANAGEMENT; BLOCKCHAIN; PROTOCOL; SECURITY; INTERNET; DESIGN;
D O I
10.1109/ACCESS.2024.3484522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sixth generation (6G) is the next generation of wireless communication technology, is not limited to cellular networks but can be used to provide better services in all areas of wireless communication, including vehicles, drones, and smart homes. However, these advancements in 6G technology require further security considerations. In earlier networks, authentication schemes were designed to rely on a secure channel between the core network and access points. The 6G network is an open, distributed network that integrates multiple domains and entities and cannot guarantee secure channels in the network. The 6G network requires a new security authentication scheme that applies the zero-trust model. Therefore, this study proposes a zero-trust authentication scheme with access control for 6G-enabled Internet of Things environments. The scheme uses blockchain technology for mutual authentication in a distributed environment and lightweight attribute-based encryption to ensure dynamic access control and network efficiency. This study compares the proposed authentication method with existing methods and demonstrates that this scheme has better performance and security. To the best of our knowledge, this paper is the first to propose a specific authentication protocol with access control considering the zero-trust model in a 6G environment.
引用
收藏
页码:154066 / 154079
页数:14
相关论文
共 50 条
  • [41] Smart Contract-Based Access Control Scheme for Blockchain Assisted 6G-Enabled IoT-Based Big Data Driven Healthcare Cyber Physical Systems
    Saha, Sourav
    Kumar Das, Ashok
    Wazid, Mohammad
    Park, Youngho
    Garg, Sahil
    Alrashoud, Mubarak
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 6975 - 6986
  • [42] A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network
    Kumar, Neeraj
    Ali, Rifaqat
    AD HOC NETWORKS, 2024, 163
  • [43] Blockchain enabled zero trust based authentication scheme for railway communication networks
    Feng, Yuan
    Zhong, Zhangdui
    Sun, Xiaofang
    Wang, Lei
    Lu, Yunlong
    Zhu, Yongsheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [44] Blockchain enabled zero trust based authentication scheme for railway communication networks
    Yuan Feng
    Zhangdui Zhong
    Xiaofang Sun
    Lei Wang
    Yunlong Lu
    Yongsheng Zhu
    Journal of Cloud Computing, 12
  • [45] Resource-Hopping-Based Grant-Free Multiple Access for 6G-Enabled Massive IoT Networks
    Jang, Han Seung
    Jung, Bang Chul
    Quek, Tony Q. S.
    Sung, Dan Keun
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20) : 15349 - 15360
  • [46] ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
    Huang, Wenhua
    Xie, Xuemin
    Wang, Ziying
    Feng, JingYu
    Han, Gang
    Zhang, Wenbo
    AD HOC NETWORKS, 2023, 145
  • [47] Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
    Ferrag, Mohamed Amine
    Debbah, Merouane
    Al-Hawawreh, Muna
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 16 - 25
  • [48] Securing 6G-enabled IoT/IoV networks by machine learning and data fusion
    Bin Sun
    Renkang Geng
    Lu Zhang
    Shuai Li
    Tao Shen
    Liyao Ma
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [49] S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT
    Wang, Jin
    Chen, Jiahao
    Xiong, Neal
    Alfarraj, Osama
    Tolba, Amr
    Ren, Yongjun
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2023, 23 (03)
  • [50] Securing 6G-enabled IoT/IoV networks by machine learning and data fusion
    Sun, Bin
    Geng, Renkang
    Zhang, Lu
    Li, Shuai
    Shen, Tao
    Ma, Liyao
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)