sensors-logo

Journal Browser

Journal Browser

Zero Trust Security: Techniques, Architectures, Models, and Applications in 6G

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: 20 December 2024 | Viewed by 1735

Special Issue Editor


E-Mail Website
Guest Editor
School of Electronic and Information Engineering, Soochow University, Suzhou 215301, China
Interests: intelligent security and trust provision for internet of things (IoT) networks; IoT data analytics and applications
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The 6G network will be a fully connected world with integrated terrestrial wireless and satellite communications. By integrating satellite communications, 6G mobile communications will enable seamless global coverage. More importantly, with the development of the 6G network, we will be closer to the goal of realizing the Internet of Everything (IoE). However, the high density and wide coverage of 6G networks will face more security threats. Hence, 6G must adopt new network security methods to provide a safer environment for wireless applications.

Zero Trust Architecture (ZTA) is a new security concept proposed to eliminate implicit trust. ZTA assumes all users, devices, and applications are untrusted. As a result, ZTA performs dynamic verification and validation before each official authorized access to network resources. ZTA can be used in various applications in 6G networks, since it has real-time evaluation and authorization which can deny all access requests that are not confirmed. Meanwhile, the two main characteristics of blockchain technology, data immutability, and decentralization can be applied to solve the problem of dynamic trust management when it comes to ZTA.

This Special Issue focuses on all types of Zero Trust technologies, architectures, and their applications in 6G networks, adding a trust management framework centered on blockchain technology if necessary, or using more sophisticated trust management methods.

Prof. Dr. He Fang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • zero trust
  • 6G network
  • blockchain technology
  • trust management
  • wireless network security

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 7068 KiB  
Article
Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access
by Wen-Chung Tsai
Sensors 2024, 24(3), 853; https://doi.org/10.3390/s24030853 - 28 Jan 2024
Viewed by 737
Abstract
With the advent of 6G Narrowband IoT (NB-IoT) technology, IoT security faces inevitable challenges due to the application requirements of Massive Machine-Type Communications (mMTCs). In response, a 6G base station (gNB) and User Equipment (UE) necessitate increased capacities to handle a larger number [...] Read more.
With the advent of 6G Narrowband IoT (NB-IoT) technology, IoT security faces inevitable challenges due to the application requirements of Massive Machine-Type Communications (mMTCs). In response, a 6G base station (gNB) and User Equipment (UE) necessitate increased capacities to handle a larger number of connections while maintaining reasonable performance during operations. To address this developmental trend and overcome associated technological hurdles, this paper proposes a hardware-accelerated and software co-designed mechanism to support streaming data transmissions and secure zero-trust inter-endpoint communications. The proposed implementations aim to offload processing efforts from micro-processors and enhance global system operation performance by hardware and software co-design in endpoint communications. Experimental results demonstrate that the proposed secure mechanism based on the use of non-repeating keys and implemented in FPGA, can save 85.61%, 99.71%, and 95.68% of the micro-processor’s processing time in key block generations, non-repeating checks, and data block transfers, respectively. Full article
Show Figures

Figure 1

13 pages, 1745 KiB  
Article
A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network
by Yujia Yin and He Fang
Sensors 2023, 23(15), 6751; https://doi.org/10.3390/s23156751 - 28 Jul 2023
Viewed by 750
Abstract
Six-generation (6G) networks will contain a higher density of users, base stations, and communication equipment, which poses a significant challenge to secure communications and collaborations due to the complex network and environment as well as the number of resource-constraint devices used. Trust evaluation [...] Read more.
Six-generation (6G) networks will contain a higher density of users, base stations, and communication equipment, which poses a significant challenge to secure communications and collaborations due to the complex network and environment as well as the number of resource-constraint devices used. Trust evaluation is the basis for secure communications and collaborations, providing an access criterion for interconnecting different nodes. Without a trust evaluation mechanism, the risk of cyberattacks on 6G networks will be greatly increased, which will eventually lead to the failure of network collaboration. For the sake of performing a comprehensive evaluation of nodes, this paper proposes a novel multiple role fusion trust evaluation framework that integrates multiple role fusion trust calculation and blockchain-based trust management. In order to take advantage of fused trust values for trust prediction, a neural network fitting method is utilized in the paper. This work further optimizes the traditional trust management framework and utilizes the optimized model for node trust prediction to better increase the security of communication systems. The results show that multiple role fusion has better stability than a single role evaluation network and better performance in anomaly detection and evaluation accuracy. Full article
Show Figures

Figure 1

Back to TopTop