Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES

  • Hisham A. Kholidy
  • , Andrew Karam
  • , James Sidoran
  • , Mohammad A. Rahman
  • , Mohammed Mahmoud
  • , Mahmoud Badr
  • , Maqsood Mahmud
  • , Ahmed F. Sayed

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

31 Citations (Scopus)

Abstract

Developing trust in 5G network slicing is an important issue since as mobile networks evolve the number of internal components, network functions, and the use of virtualized elements increase. The current security practices that are based on a perimeter/defense-in-depth cybersecurity approach are proven to be ineffective to address the current and future cybersecurity challenges because they assume that everything on the inside of a network is trustworthy. One promising approach of growing significance in the telecom security sphere is the Zero-Trust (ZT) security model. This paper opens a new research direction for implementing a real-time ZT framework that enables trustworthy deployment and secure management of network slices in 5G open architecture.
Original languageEnglish
Title of host publicationMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)
PublisherIEEE
Pages557-582
Number of pages6
ISBN (Electronic)978-1-6654-8534-0
ISBN (Print)978-1-6654-8535-7
DOIs
Publication statusPublished online - 23 Dec 2023
EventMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) - Rockville, United States
Duration: 28 Nov 20222 Dec 2022

Publication series

NameProceedings of IEEE Military Communications Conference
ISSN (Print)2155-7578
ISSN (Electronic)2155-7586

Conference

ConferenceMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)
Country/TerritoryUnited States
CityRockville
Period28/11/222/12/22

Keywords

  • Zero trust
  • 5G Open Architecture
  • smart contract
  • trust quantification
  • end-to-end trust
  • distributed and data driven

Fingerprint

Dive into the research topics of 'Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES'. Together they form a unique fingerprint.

Cite this