Softwarized Resource Allocation of Tailored Services with Zero Security Trust in 6G Networks
Document Type
Article
Publication Title
IEEE Wireless Communications
Abstract
Comparing with previous five generation networks consisting of dedicated appliance, 6G network appliances are designed to be softwarized and isolated into software (resource and function) blocks and general-purpose hardware. Tailored services, having customized resources and function demands, can be executed by chained software blocks and co-exist in the underlying 6G general-purpose hardware. However, physical hardware is vulnerable to a wide range of security threats and attacks. When attacked, this can result in devastation and failure of tailored services. Furthermore, the quality of a tailored service will be greatly degraded. Recently, zero security trust emerges and is accepted as one contemporary security model that provides a new cybersecurity strategy to eliminate implicit trust. Thus, the soft-warized resource allocation of tailored services with zero security trust is investigated in this article. 6G networks and tailored service are firstly modeled and described. Then, the softwarized resource allocation method, abbreviated as Tail-ZeSec-6G, is detailed. When receiving one tailored service request, Tail-ZeSec-6G will check all underlying general-purpose appliance and eliminate implicit trust issues. After undergoing the security check and evaluation, Tail-ZeSec-6G will conduct a tailored resource allocation. Secure appliances with abundant softwarized resources will be selected to deploy the tailored service request, by adopting the resource allocation strategy in Tail-ZeSec-6G. When processing the tailored resource allocation, the Tail-ZeSec-6G method verifies the security of each appliance. Thus, Tail-ZeSec-6G method guarantees the deployment success and security performance. To validate the feasibility and merits of Tail-ZeSec-6G, evaluation is conducted. Finally, we conclude this article emphasizing three dominant directions.
First Page
58
Last Page
65
DOI
10.1109/MWC.001.2300383
Publication Date
4-1-2024
Recommended Citation
H. Cao et al., "Softwarized Resource Allocation of Tailored Services with Zero Security Trust in 6G Networks," IEEE Wireless Communications, vol. 31, no. 2, pp. 58 - 65, Apr 2024.
The definitive version is available at https://doi.org/10.1109/MWC.001.2300383