Zero trust architecture for 6G security

X Chen, W Feng, N Ge, Y Zhang - IEEE Network, 2023 - ieeexplore.ieee.org
The upcoming sixth generation (6G) network is expected to be more open and
heterogeneous, posing new challenges to conventional security architectures. Traditionally …

Cuckoo filter based IP packet filtering using M-tree

A Abdulhassan, R Shubbar, M Alhisnawi - Bulletin of Electrical Engineering …, 2023 - beei.org
Internet protocol (IP) packet filtering as a firewall (FW) technology is one of the most widely
researched networks functions over the past two decades. IP packet filtering is the process …

Securing 5G Positioning via Zero Trust Architecture

RY Adam, W Meng - … Conference on Artificial Intelligence Security and …, 2023 - Springer
Abstract 5G is the future, regardless of what mobile network technology succeeds it,
whatever comes will be built upon the 5G technology. The 5G positioning system in its part …

RepuFilter: Prevention of Untrusted Packet Spread Based on Trust Evaluation in Wireless Networks

H Bao, X Zhang, G Wang, M Zhang… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Wireless networks are vulnerable to many attacks due to its dynamic environments.
Unrestricted forwarding of packets from untrusted sources in wireless networks has caused …

Efficient threat context-aware packet filtering for network protection

S Moore, JR Rogers, V Mutolo, PP Geremia - US Patent 11,824,875, 2023 - Google Patents
A threat intelligence gateway (TIG) may protect TCP/IP networks from network (eg, Internet)
threats by enforcing certain policies on in-transit packets that are crossing network …

Efficient threat context-aware packet filtering for network protection

S Moore, JR Rogers, V Mutolo, PP Geremia - US Patent 11,552,970, 2023 - Google Patents
(57) ABSTRACT A threat intelligence gateway (TIG) may protect TCP/IP networks from
network (eg, Internet) threats by enforcing certain policies on in-transit packets that are …