2022
DOI: 10.1109/tnsm.2022.3157248
|View full text |Cite
|
Sign up to set email alerts
|

On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…The boundary consists of Snort and Suricata intrusion detection and prevention security gateways. Similar to the virtual software defined perimeter (vEPC) proposed by Bello et al [40], this study's zero trust software-based system acts as a security gateway for all distributed servers. Sparkone through Sparkfour are designed to operate securely in most cloud architectures in this model by integrating an SDN security stack on each physically distanced server.…”
Section: B Tests 2-3 Perimeter-less Security Resultsmentioning
confidence: 99%
“…The boundary consists of Snort and Suricata intrusion detection and prevention security gateways. Similar to the virtual software defined perimeter (vEPC) proposed by Bello et al [40], this study's zero trust software-based system acts as a security gateway for all distributed servers. Sparkone through Sparkfour are designed to operate securely in most cloud architectures in this model by integrating an SDN security stack on each physically distanced server.…”
Section: B Tests 2-3 Perimeter-less Security Resultsmentioning
confidence: 99%
“…Artificial Intelligence algorithms can deter malicious requests and thwart network performance degradation in real-time or almost real-time [73]. This would be essential in mission-critical sectors such as healthcare, air defense and autonomous vehicle networks [74].…”
Section: Potential Future Workmentioning
confidence: 99%
“…The model used a lightweight PRESENT algorithm with an 80‐bit key size and 64‐bit block size and processed 32 cycles per block. In Reference 22, an authentication‐based approach, a software‐defined virtual perimeter framework, has been proposed to provide secure communications within mobile core networks based on two machine learning classifiers (multilayer perceptron and support vector machine [SVM]). System components are virtualized and placed within a core network to provide a zero‐trust environment where only authenticated and authorized core network elements can access each other.…”
Section: Introductionmentioning
confidence: 99%