Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing
Document Type
Article
Publication Date
1-1-2024
Abstract
Recent advances in edge computing and its imminent adoption in Sixth Generation (6G) wireless networks have led to a propitious paradigm defined as 6G edge computing. However, due to the communication mode and network virtualization of the 6G architecture, 6G edge computing presents several security concerns, including attack monitoring and detection. In this article, we present a new and robust Zero Trust Architecture (ZTA) empowered intrusion detection framework to protect 6G edge computing from network attacks. The proposed detection framework executes detection techniques based on security rules and machine learning algorithms as well as detection strategies based on a standalone and collaborative process with the goal to harden the security and hence to detect accurately the attacks. Furthermore, we propose a dynamic ZTA based on a non-cooperative game to harden further the security of 6G edge computing networks, with consideration of detection accuracy in terms of false positives and false negatives, and network cost as a computational overhead.
Identifier
85148470724 (Scopus)
Publication Title
IEEE Network
External Full Text Location
https://doi.org/10.1109/MNET.131.2200513
e-ISSN
1558156X
ISSN
08908044
First Page
196
Last Page
202
Issue
1
Volume
38
Recommended Citation
Sedjelmaci, Hichem and Ansari, Nirwan, "Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing" (2024). Faculty Publications. 1176.
https://digitalcommons.njit.edu/fac_pubs/1176