Toward zero trust in 5G Industrial Internet collaboration systems

With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, whi...

Full description

Saved in:
Bibliographic Details
Main Authors: Han Zhang, Ziyan Zhang, Liquan Chen
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2025-04-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864824000415
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849323429680906240
author Han Zhang
Ziyan Zhang
Liquan Chen
author_facet Han Zhang
Ziyan Zhang
Liquan Chen
author_sort Han Zhang
collection DOAJ
description With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, which believes in “never trust and always verify”. Every time the asset in the industrial network is accessed, the subject is authenticated and its trustworthiness is assessed. In this way, the asset in industrial network can be well protected, whether the subject is in the internal network or the external network. However, in order to construct the zero trust model in the 5G Industrial Internet collaboration system, there are still many problems to be solved. In this paper, we first introduce the security issues in the 5G Industrial Internet collaboration system, and illustrate the zero trust architecture. Then, we analyze the gap between existing security techniques and the zero trust architecture. Finally, we discuss several potential security techniques that can be used to implement the zero trust model. The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture (ZTA) in the 5G Industrial Internet collaboration system.
format Article
id doaj-art-aba8580b68e746fb8d06a44a99473d66
institution Kabale University
issn 2352-8648
language English
publishDate 2025-04-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Digital Communications and Networks
spelling doaj-art-aba8580b68e746fb8d06a44a99473d662025-08-20T03:49:03ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482025-04-0111254755510.1016/j.dcan.2024.03.011Toward zero trust in 5G Industrial Internet collaboration systemsHan Zhang0Ziyan Zhang1Liquan Chen2School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China; ZTE Corporation, Nanjing 210012, China; State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen 518057, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing 210096, China; Purple Mountain Laboratories for Network and Communication Security, Nanjing 211118, China; Corresponding author at: School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China.With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, which believes in “never trust and always verify”. Every time the asset in the industrial network is accessed, the subject is authenticated and its trustworthiness is assessed. In this way, the asset in industrial network can be well protected, whether the subject is in the internal network or the external network. However, in order to construct the zero trust model in the 5G Industrial Internet collaboration system, there are still many problems to be solved. In this paper, we first introduce the security issues in the 5G Industrial Internet collaboration system, and illustrate the zero trust architecture. Then, we analyze the gap between existing security techniques and the zero trust architecture. Finally, we discuss several potential security techniques that can be used to implement the zero trust model. The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture (ZTA) in the 5G Industrial Internet collaboration system.http://www.sciencedirect.com/science/article/pii/S2352864824000415Zero trust5G Industrial Internet collaboration systemTrust assessmentAccess controlAuthentication
spellingShingle Han Zhang
Ziyan Zhang
Liquan Chen
Toward zero trust in 5G Industrial Internet collaboration systems
Digital Communications and Networks
Zero trust
5G Industrial Internet collaboration system
Trust assessment
Access control
Authentication
title Toward zero trust in 5G Industrial Internet collaboration systems
title_full Toward zero trust in 5G Industrial Internet collaboration systems
title_fullStr Toward zero trust in 5G Industrial Internet collaboration systems
title_full_unstemmed Toward zero trust in 5G Industrial Internet collaboration systems
title_short Toward zero trust in 5G Industrial Internet collaboration systems
title_sort toward zero trust in 5g industrial internet collaboration systems
topic Zero trust
5G Industrial Internet collaboration system
Trust assessment
Access control
Authentication
url http://www.sciencedirect.com/science/article/pii/S2352864824000415
work_keys_str_mv AT hanzhang towardzerotrustin5gindustrialinternetcollaborationsystems
AT ziyanzhang towardzerotrustin5gindustrialinternetcollaborationsystems
AT liquanchen towardzerotrustin5gindustrialinternetcollaborationsystems