- Title
- Dynamic trust boundary identification for the secure communications of the entities via 6G
- Creator
- Basri, Rabeya; Karmakar, Gour; Kamruzzaman, Joarder; Newaz, S. H. Shah; Nguyen, Linh; Usman, Muhammad
- Date
- 2023
- Type
- Text; Conference paper
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/199632
- Identifier
- vital:19233
- Identifier
-
https://doi.org/10.1007/978-981-99-7032-2_12
- Identifier
- ISBN:978-981-99-7032-2
- Abstract
- 6G is more likely prone to a range of known and unknown cyber-attacks because of its highly distributive nature. Current literature and research prove that a trust boundary can be used as a security door (e.g., gateway/firewall) to validate entities and applications attempting to access 6G networks. Trust boundaries allow these entities to connect or work with entities of other trust boundaries via 6G by dynamically monitoring their interactions, behaviors, and data transmissions. The importance of trust boundaries in security protection mechanisms demands a dynamic multi-trust boundary identification. There exists an automatic trust boundary identification for IoT data. However, it is a binary trust boundary classification and the dataset used in the approach is not suitable for dynamic trust boundary identification. Motivated by these facts, to provide automatic security protection for entities in 6G, in this paper, we propose a mechanism to identify dynamic and multiple trust boundaries based on trust values and geographical location coordinates of 6G communication entities. Our proposed mechanism uses unsupervised clustering and splitting and merging techniques. The experimental results show that entities can dynamically change their boundary location if their trust values and locations change over time. We also analyze the trust boundary identification accuracy in terms of our defined two performance metrics, i.e., trust consistency and the degree of gateway coverage. The proposed scheme allows us to distinguish between entities and control their access to the 6G network based on their trust levels to ensure secure and resilient communication.
- Publisher
- Springer Nature Singapore
- Relation
- 18th International Conference on Information Security Practice and Experience (ISPEC), 24-25 August 2023, Copenhagen, Denmark, International Conference on Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings Vol. 14341, p. 194-208
- Rights
- All metadata describing materials held in, or linked to, the repository is freely available under a CC0 licence
- Rights
- Copyright @ The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023
- Rights
- Open Access
- Full Text
- Reviewed
- Hits: 884
- Visitors: 763
- Downloads: 12
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE2 | Accepted version | 5 MB | Adobe Acrobat PDF | View Details Download |