Toward zero trust in 5G Industrial Internet collaboration systems
With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, whi...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2025-04-01
|
| Series: | Digital Communications and Networks |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864824000415 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849323429680906240 |
|---|---|
| author | Han Zhang Ziyan Zhang Liquan Chen |
| author_facet | Han Zhang Ziyan Zhang Liquan Chen |
| author_sort | Han Zhang |
| collection | DOAJ |
| description | With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, which believes in “never trust and always verify”. Every time the asset in the industrial network is accessed, the subject is authenticated and its trustworthiness is assessed. In this way, the asset in industrial network can be well protected, whether the subject is in the internal network or the external network. However, in order to construct the zero trust model in the 5G Industrial Internet collaboration system, there are still many problems to be solved. In this paper, we first introduce the security issues in the 5G Industrial Internet collaboration system, and illustrate the zero trust architecture. Then, we analyze the gap between existing security techniques and the zero trust architecture. Finally, we discuss several potential security techniques that can be used to implement the zero trust model. The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture (ZTA) in the 5G Industrial Internet collaboration system. |
| format | Article |
| id | doaj-art-aba8580b68e746fb8d06a44a99473d66 |
| institution | Kabale University |
| issn | 2352-8648 |
| language | English |
| publishDate | 2025-04-01 |
| publisher | KeAi Communications Co., Ltd. |
| record_format | Article |
| series | Digital Communications and Networks |
| spelling | doaj-art-aba8580b68e746fb8d06a44a99473d662025-08-20T03:49:03ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482025-04-0111254755510.1016/j.dcan.2024.03.011Toward zero trust in 5G Industrial Internet collaboration systemsHan Zhang0Ziyan Zhang1Liquan Chen2School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China; ZTE Corporation, Nanjing 210012, China; State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen 518057, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Cyber Science and Engineering, Southeast University, Nanjing 210096, China; Purple Mountain Laboratories for Network and Communication Security, Nanjing 211118, China; Corresponding author at: School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China.With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well. To solve this problem, a new security model called Zero Trust(ZT) is desired, which believes in “never trust and always verify”. Every time the asset in the industrial network is accessed, the subject is authenticated and its trustworthiness is assessed. In this way, the asset in industrial network can be well protected, whether the subject is in the internal network or the external network. However, in order to construct the zero trust model in the 5G Industrial Internet collaboration system, there are still many problems to be solved. In this paper, we first introduce the security issues in the 5G Industrial Internet collaboration system, and illustrate the zero trust architecture. Then, we analyze the gap between existing security techniques and the zero trust architecture. Finally, we discuss several potential security techniques that can be used to implement the zero trust model. The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture (ZTA) in the 5G Industrial Internet collaboration system.http://www.sciencedirect.com/science/article/pii/S2352864824000415Zero trust5G Industrial Internet collaboration systemTrust assessmentAccess controlAuthentication |
| spellingShingle | Han Zhang Ziyan Zhang Liquan Chen Toward zero trust in 5G Industrial Internet collaboration systems Digital Communications and Networks Zero trust 5G Industrial Internet collaboration system Trust assessment Access control Authentication |
| title | Toward zero trust in 5G Industrial Internet collaboration systems |
| title_full | Toward zero trust in 5G Industrial Internet collaboration systems |
| title_fullStr | Toward zero trust in 5G Industrial Internet collaboration systems |
| title_full_unstemmed | Toward zero trust in 5G Industrial Internet collaboration systems |
| title_short | Toward zero trust in 5G Industrial Internet collaboration systems |
| title_sort | toward zero trust in 5g industrial internet collaboration systems |
| topic | Zero trust 5G Industrial Internet collaboration system Trust assessment Access control Authentication |
| url | http://www.sciencedirect.com/science/article/pii/S2352864824000415 |
| work_keys_str_mv | AT hanzhang towardzerotrustin5gindustrialinternetcollaborationsystems AT ziyanzhang towardzerotrustin5gindustrialinternetcollaborationsystems AT liquanchen towardzerotrustin5gindustrialinternetcollaborationsystems |