首页 > 最新文献

IEEE journal on selected areas in communications : a publication of the IEEE Communications Society最新文献

英文 中文
Building a Zero Trust Federation 建立零信任联盟
Alexandre Poirrier;Laurent Cailleux;Thomas Heide Clausen
Zero trust is a security paradigm whose fundamental philosophy is that every access to a resource must be explicitly verified, without assuming trust based on origin or identity. In a federated environment composed of multiple domains, ensuring zero trust guarantees for accessing shared resources is a challenge, as information on requesters is generated by their originating domain, yet requires explicit verification from the domain owning the resource. This paper proposes a method for federating zero trust architectures, ensuring the preservation of zero trust guarantees when accessing federated resources. The proposed approach relies on remote attestation, enabling continuous authentication and monitoring of requesters, without requiring intrusive software installations on every device within the federation. Moreover, this paper proposes a proof-of-concept architecture that combines several open-source products, to build an architecture with advanced zero trust maturity level. The feasibility of the proposed federation method is demonstrated through this proof-of-concept, providing detailed information on the federation procedure and its implementation.
零信任是一种安全范式,其基本理念是必须显式验证对资源的每次访问,而不假设基于来源或身份的信任。在由多个域组成的联邦环境中,确保访问共享资源的零信任保证是一项挑战,因为有关请求者的信息是由它们的原始域生成的,但需要从拥有资源的域进行显式验证。本文提出了一种联合零信任体系结构的方法,以确保在访问联合资源时保持零信任保证。所建议的方法依赖于远程认证,支持对请求者的持续身份验证和监视,而不需要在联邦内的每个设备上安装侵入性软件。此外,本文还提出了一种结合多个开源产品的概念验证体系结构,以构建具有高级零信任成熟度的体系结构。通过概念验证证明了所提出的联合方法的可行性,并提供了有关联合过程及其实现的详细信息。
{"title":"Building a Zero Trust Federation","authors":"Alexandre Poirrier;Laurent Cailleux;Thomas Heide Clausen","doi":"10.1109/JSAC.2025.3560014","DOIUrl":"10.1109/JSAC.2025.3560014","url":null,"abstract":"Zero trust is a security paradigm whose fundamental philosophy is that every access to a resource must be explicitly verified, without assuming trust based on origin or identity. In a federated environment composed of multiple domains, ensuring zero trust guarantees for accessing shared resources is a challenge, as information on requesters is generated by their originating domain, yet requires explicit verification from the domain owning the resource. This paper proposes a method for federating zero trust architectures, ensuring the preservation of zero trust guarantees when accessing federated resources. The proposed approach relies on remote attestation, enabling continuous authentication and monitoring of requesters, without requiring intrusive software installations on every device within the federation. Moreover, this paper proposes a proof-of-concept architecture that combines several open-source products, to build an architecture with advanced zero trust maturity level. The feasibility of the proposed federation method is demonstrated through this proof-of-concept, providing detailed information on the federation procedure and its implementation.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2113-2125"},"PeriodicalIF":0.0,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Decentralized Services and Networks: Assessing Roles and Impacts 区块链支持的去中心化服务和网络:评估作用和影响
Xintong Ling;Yuwei Le;Shiyi Chen;Jiaheng Wang;Xiaoyang Zhou
The rapid evolution of blockchain has established it as a critical enabler for decentralized zero-trust services and networks. Without relying on traditional trust mechanisms such as pre-established mutual trust or central authentication, blockchain facilitates trust-free services via smart contract. Smart contracts offer verifiable software trust for various blockchain-enabled services (BESs) while protecting participants’ interests. However, the impact of blockchain on BES remains underexplored and unclear. In this work, we consider a general BES framework suitable for diverse decentralized zero-trust services and assess the role of blockchain in BES. We first build an $M/G/1$ -type queuing model for BES and establish the stability conditions using matrix analytic methods. Based on the stability conditions, we identify the blockchain scalability and server capability as two critical bottlenecks of BES. We further use a tandem queuing model to describe the BES latency of the assembling and service phases. We analytically characterize the properties such as the convexity of service-phase latency with respect to traffic intensity, and highlight the BES pooling effects from traffic offloading and resource sharing. At last, we verify our conclusions through simulations and explore potential pathways for more efficient BES frameworks.
区块链的快速发展使其成为去中心化零信任服务和网络的关键推动者。区块链不依赖传统的信任机制,如预先建立的相互信任或中央认证,通过智能合约促进无信任服务。智能合约为各种支持区块链的服务(BESs)提供可验证的软件信任,同时保护参与者的利益。然而,b区块链对BES的影响仍未得到充分探索和明确。在这项工作中,我们考虑了一个适用于各种分散零信任服务的通用BES框架,并评估了区块链在BES中的作用。首先建立了BES的$M/G/1$型排队模型,并利用矩阵分析法建立了稳定性条件。基于稳定性条件,我们确定区块链可伸缩性和服务器能力是BES的两个关键瓶颈。我们进一步使用串联排队模型来描述装配和服务阶段的BES延迟。我们分析了服务阶段延迟相对于流量强度的凹凸性等特性,并强调了流量卸载和资源共享带来的BES池效应。最后,我们通过模拟验证了我们的结论,并探索了更高效的BES框架的潜在途径。
{"title":"Blockchain-Enabled Decentralized Services and Networks: Assessing Roles and Impacts","authors":"Xintong Ling;Yuwei Le;Shiyi Chen;Jiaheng Wang;Xiaoyang Zhou","doi":"10.1109/JSAC.2025.3560044","DOIUrl":"10.1109/JSAC.2025.3560044","url":null,"abstract":"The rapid evolution of blockchain has established it as a critical enabler for decentralized zero-trust services and networks. Without relying on traditional trust mechanisms such as pre-established mutual trust or central authentication, blockchain facilitates trust-free services via smart contract. Smart contracts offer verifiable software trust for various blockchain-enabled services (BESs) while protecting participants’ interests. However, the impact of blockchain on BES remains underexplored and unclear. In this work, we consider a general BES framework suitable for diverse decentralized zero-trust services and assess the role of blockchain in BES. We first build an <inline-formula> <tex-math>$M/G/1$ </tex-math></inline-formula>-type queuing model for BES and establish the stability conditions using matrix analytic methods. Based on the stability conditions, we identify the blockchain scalability and server capability as two critical bottlenecks of BES. We further use a tandem queuing model to describe the BES latency of the assembling and service phases. We analytically characterize the properties such as the convexity of service-phase latency with respect to traffic intensity, and highlight the BES pooling effects from traffic offloading and resource sharing. At last, we verify our conclusions through simulations and explore potential pathways for more efficient BES frameworks.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2141-2154"},"PeriodicalIF":0.0,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing K-User Interference Alignment for Discrete Constellations via Learning 通过学习加强离散星座的 K 用户干扰对齐
Rajesh Mishra;Syed Jafar;Sriram Vishwanath;Hyeji Kim
In this paper, we consider a K-user interference channel where interference among the users is neither too strong nor too weak, a scenario that is relatively underexplored in the literature. We propose a novel deep learning-based approach to design the encoder and decoder functions that aim to maximize the sumrate of the interference channel for discrete constellations. We first consider the MaxSINR algorithm, a state-of-the-art linear scheme for Gaussian inputs, as the baseline and then propose a modified version of the algorithm for discrete inputs. We then propose a neural network-based approach that learns a non-linear constellation mapping with the objective of maximizing the sumrate. We provide numerical results to show that the constellations learned by the neural network-based approach provide enhanced alignments, not just in beamforming directions but also in terms of the effective constellation at the receiver, thereby leading to improved sum-rate performance.
在本文中,我们考虑了一个k用户干扰通道,其中用户之间的干扰既不太强也不太弱,这是文献中相对较少探索的场景。我们提出了一种新颖的基于深度学习的方法来设计编码器和解码器功能,旨在最大化离散星座的干扰通道的覆盖率。我们首先考虑MaxSINR算法,一种最先进的高斯输入线性方案,作为基线,然后提出离散输入算法的修改版本。然后,我们提出了一种基于神经网络的方法,该方法以最大化sumrate为目标学习非线性星座映射。我们提供的数值结果表明,通过基于神经网络的方法学习的星座提供了增强的对准,不仅在波束形成方向上,而且在接收器的有效星座方面,从而导致改进的和速率性能。
{"title":"Enhancing K-User Interference Alignment for Discrete Constellations via Learning","authors":"Rajesh Mishra;Syed Jafar;Sriram Vishwanath;Hyeji Kim","doi":"10.1109/JSAC.2025.3559122","DOIUrl":"10.1109/JSAC.2025.3559122","url":null,"abstract":"In this paper, we consider a <italic>K</i>-user interference channel where interference among the users is neither too strong nor too weak, a scenario that is relatively underexplored in the literature. We propose a novel deep learning-based approach to design the encoder and decoder functions that aim to maximize the sumrate of the interference channel for discrete constellations. We first consider the MaxSINR algorithm, a state-of-the-art linear scheme for Gaussian inputs, as the baseline and then propose a modified version of the algorithm for discrete inputs. We then propose a neural network-based approach that learns a non-linear constellation mapping with the objective of maximizing the sumrate. We provide numerical results to show that the constellations learned by the neural network-based approach provide enhanced alignments, not just in beamforming directions but also in terms of the effective constellation at the receiver, thereby leading to improved sum-rate performance.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 7","pages":"2405-2416"},"PeriodicalIF":0.0,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero Trust: Deep Learning and NLP for HTTP Anomaly Detection in IDS 零信任:深度学习和 NLP 在 IDS 中用于 HTTP 异常检测
Manh Tien Anh Nguyen;Van Tong;Sondes Bannour Souihi;Sami Souihi
Web applications have become integral to daily life due to the migration of applications and data to cloud-based platforms, increasing their vulnerability to attacks. This paper addresses the need for robust intrusion detection systems by proposing a system grounded in Zero Trust architecture, which mandates continuous monitoring and multi-layered defenses. The Zero Trust principles ensure ongoing threat assessment and comprehensive protection against various attack vectors. Building on these foundational Zero Trust principles, our study introduces a system designed to not only distinguish normal HTTP requests from well-known attack patterns but also detect emerging types of anomalous attacks. Our system consists of two models that integrate Natural Language Processing approaches, Deep Learning techniques, and Transfer Learning strategies. The first model is employed to detect new anomalous HTTP requests that differ from normal requests. HTTP requests identified as anomalous are transmitted to the second model in charge of classifying specific categories of both well-known and novel attacks. Experiments show that our end-to-end system achieves the average F1-score of 89% on the combination of the CAPEC dataset and the zero-shot CSIC dataset. The proposed system proves also to be able to identify anomalous requests with a minimal latency of 4.8 milliseconds in production settings.
由于应用程序和数据迁移到基于云的平台,Web应用程序已成为日常生活中不可或缺的一部分,这增加了它们遭受攻击的脆弱性。本文提出了一种基于零信任架构的系统,该系统要求持续监控和多层防御,从而解决了对健壮的入侵检测系统的需求。零信任原则确保持续的威胁评估和针对各种攻击向量的全面保护。基于这些基本的零信任原则,我们的研究引入了一个系统,该系统不仅可以区分正常的HTTP请求和已知的攻击模式,还可以检测新出现的异常攻击类型。我们的系统由两个模型组成,它们集成了自然语言处理方法、深度学习技术和迁移学习策略。第一个模型用于检测不同于正常请求的新的异常HTTP请求。被识别为异常的HTTP请求被传输到第二个模型,该模型负责对已知和新攻击的特定类别进行分类。实验表明,我们的端到端系统在CAPEC数据集和零射击CSIC数据集的组合上达到了89%的平均f1分数。在生产设置中,所提出的系统还证明能够以4.8毫秒的最小延迟识别异常请求。
{"title":"Zero Trust: Deep Learning and NLP for HTTP Anomaly Detection in IDS","authors":"Manh Tien Anh Nguyen;Van Tong;Sondes Bannour Souihi;Sami Souihi","doi":"10.1109/JSAC.2025.3560040","DOIUrl":"10.1109/JSAC.2025.3560040","url":null,"abstract":"Web applications have become integral to daily life due to the migration of applications and data to cloud-based platforms, increasing their vulnerability to attacks. This paper addresses the need for robust intrusion detection systems by proposing a system grounded in Zero Trust architecture, which mandates continuous monitoring and multi-layered defenses. The Zero Trust principles ensure ongoing threat assessment and comprehensive protection against various attack vectors. Building on these foundational Zero Trust principles, our study introduces a system designed to not only distinguish normal HTTP requests from well-known attack patterns but also detect emerging types of anomalous attacks. Our system consists of two models that integrate Natural Language Processing approaches, Deep Learning techniques, and Transfer Learning strategies. The first model is employed to detect new anomalous HTTP requests that differ from normal requests. HTTP requests identified as anomalous are transmitted to the second model in charge of classifying specific categories of both well-known and novel attacks. Experiments show that our end-to-end system achieves the average F1-score of 89% on the combination of the CAPEC dataset and the zero-shot CSIC dataset. The proposed system proves also to be able to identify anomalous requests with a minimal latency of 4.8 milliseconds in production settings.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2215-2229"},"PeriodicalIF":0.0,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Decentralized Operationalization of Zero Trust Architecture for Next Generation Networks 下一代网络零信任架构的去中心化运行研究
Shiva Raj Pokhrel;Gang Li;Robin Doss;Surya Nepal
Next-generation networks demand security that evolves as fast as threats do. Our pioneering decentralized Zero Trust Architecture (dZTA), proposed in this paper, redefines protection for IoT and remote collaboration, merging Zero Trust’s ironclad access controls with blockchain’s transparency and federated learning’s privacy-first analytics. Unlike traditional models, dZTA enforces security at every layer: a distributed policy engine eliminates single points of failure, cross-network analytics optimize WiFi-8, satellite, and 6G performance under real-world stressors, and anti-leakage protocols safeguard IoT ecosystems. Rigorous real-world simulations confirm dZTA’s dual triumph—uncompromising security and seamless efficiency—proving its readiness to secure tomorrow’s hyperconnected world.
下一代网络对安全的要求与威胁的发展速度一样快。我们在论文中提出的开创性的去中心化零信任架构(dZTA)重新定义了物联网和远程协作的保护,将零信任的铁甲访问控制与b区块链的透明度和联邦学习的隐私优先分析相结合。与传统模型不同,dZTA在每一层都加强了安全性:分布式策略引擎消除了单点故障,跨网络分析优化了WiFi-8、卫星和6G在现实压力下的性能,防泄漏协议保护了物联网生态系统。严格的现实世界模拟证实了dZTA的双重胜利-不妥协的安全性和无缝的效率-证明了它准备好保护未来的超连接世界。
{"title":"Toward Decentralized Operationalization of Zero Trust Architecture for Next Generation Networks","authors":"Shiva Raj Pokhrel;Gang Li;Robin Doss;Surya Nepal","doi":"10.1109/JSAC.2025.3560039","DOIUrl":"10.1109/JSAC.2025.3560039","url":null,"abstract":"Next-generation networks demand security that evolves as fast as threats do. Our pioneering decentralized Zero Trust Architecture (dZTA), proposed in this paper, redefines protection for IoT and remote collaboration, merging Zero Trust’s ironclad access controls with blockchain’s transparency and federated learning’s privacy-first analytics. Unlike traditional models, dZTA enforces security at every layer: a distributed policy engine eliminates single points of failure, cross-network analytics optimize WiFi-8, satellite, and 6G performance under real-world stressors, and anti-leakage protocols safeguard IoT ecosystems. Rigorous real-world simulations confirm dZTA’s dual triumph—uncompromising security and seamless efficiency—proving its readiness to secure tomorrow’s hyperconnected world.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1998-2010"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero Trust Data-Driven Perspective on PKI Root Stores PKI根存储的零信任数据驱动视角
Mauro Farina;Damiano Ravalico;Martino Trevisan;Alberto Bartoli
Security and privacy on the Internet rely on the Public Key Infrastructure (PKI), which is based on unlimited trust in a set of predefined certification authorities included in the users’ root stores. However, the architecture of the PKI is no longer appropriate for the current threat landscape and security principles. Specifically, the implicit and permanent trust given to certification authorities collides with the rising zero trust approach, a cyber-security model that mandates that trust must never be granted implicitly or permanently to any entity. This work offers a zero trust perspective on the PKI and root store composition. Using navigation datasets collected from users’ browsers and passive monitors, we analyze their actual needs and identify the portion of root stores that are useful for their activity. We propose several zero trust policies to manage root stores that shrink the large perimeter of trust allowed by commercial root stores. Our experiments show that less than half of the root certificates included in the Mozilla root store are indeed used for navigation, while only 14 cover 99% of the traffic of our users. Moreover, implementing such policies requires little effort for a company, providing a practical way for managing root stores with up-to-date security principles.
Internet上的安全和隐私依赖于公钥基础设施(Public Key Infrastructure, PKI),它基于对用户根存储库中包含的一组预定义证书颁发机构的无限信任。然而,PKI的体系结构已不再适合当前的威胁形势和安全原则。具体来说,授予证书颁发机构的隐式和永久信任与正在兴起的零信任方法相冲突,零信任方法是一种网络安全模型,要求永远不得向任何实体隐式或永久授予信任。这项工作为PKI和根存储组合提供了零信任的视角。使用从用户浏览器和被动监视器收集的导航数据集,我们分析他们的实际需求,并确定对他们的活动有用的根存储部分。我们提出了几个零信任策略来管理根存储,这些策略缩小了商业根存储所允许的大信任范围。我们的实验表明,Mozilla根存储中包含的根证书中只有不到一半用于导航,而只有14个覆盖了我们用户99%的流量。此外,实现这样的策略对公司来说几乎不需要付出什么努力,这为使用最新的安全原则管理根存储提供了一种实用的方法。
{"title":"A Zero Trust Data-Driven Perspective on PKI Root Stores","authors":"Mauro Farina;Damiano Ravalico;Martino Trevisan;Alberto Bartoli","doi":"10.1109/JSAC.2025.3560006","DOIUrl":"10.1109/JSAC.2025.3560006","url":null,"abstract":"Security and privacy on the Internet rely on the Public Key Infrastructure (PKI), which is based on unlimited trust in a set of predefined certification authorities included in the users’ root stores. However, the architecture of the PKI is no longer appropriate for the current threat landscape and security principles. Specifically, the implicit and permanent trust given to certification authorities collides with the rising zero trust approach, a cyber-security model that mandates that trust must never be granted implicitly or permanently to any entity. This work offers a zero trust perspective on the PKI and root store composition. Using navigation datasets collected from users’ browsers and passive monitors, we analyze their actual needs and identify the portion of root stores that are useful for their activity. We propose several zero trust policies to manage root stores that shrink the large perimeter of trust allowed by commercial root stores. Our experiments show that less than half of the root certificates included in the Mozilla root store are indeed used for navigation, while only 14 cover 99% of the traffic of our users. Moreover, implementing such policies requires little effort for a company, providing a practical way for managing root stores with up-to-date security principles.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2200-2214"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Federated Feature Selection Through Synthetic Data and Zero Trust Integration 通过合成数据和零信任集成加强联合特征选择
Nisha Thorakkattu Madathil;Saed Alrabaee;Abdelkader Nasreddine Belkacem
Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accuracy and communication efficiency. To address these, we propose an algorithm that combines feature selection with synthetic data generation, specifically targeting medical datasets. Our method eliminates irrelevant local features, identifies globally relevant ones, and uses synthetic data to initialize model parameters, improving convergence. It also employs a zero-trust model, ensuring that data remain on local devices and only learned weights are shared with the central server, enhancing security. The algorithm improves accuracy and computational efficiency, achieving communication efficiency gains of 4 to 14 through backward elimination and threshold variation techniques. Tested on a federated diabetic dataset, the approach demonstrates significant improvements in the performance and trustworthiness of FL systems for medical applications.
联邦学习(FL)允许医疗保健组织使用不同的数据集训练模型,同时协作维护患者的机密性。虽然前途光明,但FL在优化模型精度和通信效率方面面临挑战。为了解决这些问题,我们提出了一种将特征选择与合成数据生成相结合的算法,特别是针对医疗数据集。该方法消除不相关的局部特征,识别全局相关特征,并使用合成数据初始化模型参数,提高了收敛性。它还采用了零信任模型,确保数据保留在本地设备上,只与中央服务器共享学习过的权重,从而增强了安全性。该算法通过反向消去和阈值变化技术提高了精度和计算效率,通信效率提高了4 ~ 14倍。在联邦糖尿病数据集上进行的测试表明,该方法在医疗应用的FL系统的性能和可信度方面有了显着改善。
{"title":"Enhancing Federated Feature Selection Through Synthetic Data and Zero Trust Integration","authors":"Nisha Thorakkattu Madathil;Saed Alrabaee;Abdelkader Nasreddine Belkacem","doi":"10.1109/JSAC.2025.3560037","DOIUrl":"10.1109/JSAC.2025.3560037","url":null,"abstract":"Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accuracy and communication efficiency. To address these, we propose an algorithm that combines feature selection with synthetic data generation, specifically targeting medical datasets. Our method eliminates irrelevant local features, identifies globally relevant ones, and uses synthetic data to initialize model parameters, improving convergence. It also employs a zero-trust model, ensuring that data remain on local devices and only learned weights are shared with the central server, enhancing security. The algorithm improves accuracy and computational efficiency, achieving communication efficiency gains of 4 to 14 through backward elimination and threshold variation techniques. Tested on a federated diabetic dataset, the approach demonstrates significant improvements in the performance and trustworthiness of FL systems for medical applications.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2126-2140"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Intrusion Detection Strategy Under Zero Trust Architecture 零信任架构下的进化入侵检测策略
Bin Cao;Xianrui Zhao;Zhihan Lyu
In today’s increasingly complex and dynamic cyber threat environment, Zero Trust Architecture (ZTA) has emerged as a promising solution to address the limitations of traditional intrusion detection methods. While Intrusion Detection Systems (IDS) are essential for safeguarding organizational information assets, traditional methods have the risk of exposing security policies by collecting and utilizing alarm data, potentially revealing attack paths to adversaries. To overcome this challenge, we propose a novel intrusion detection strategy based on ZTA, emphasizing the protection of alarm data privacy. Additionally, we introduce an adaptive sparse connective evolutionary neural architecture search (ASCE-NAS) framework, which enables the automatic evolution of intrusion detection model structures to enhance adaptability and performance in dynamic environments. Notably, ASCE-NAS can also be beneficial for integrated sensing and computing chips and systems, contributing to a more secure and efficient cybersecurity framework to effectively combat evolving threats and attack methods.
在当今日益复杂和动态的网络威胁环境中,零信任架构(ZTA)已成为解决传统入侵检测方法局限性的一种有前途的解决方案。虽然入侵检测系统(IDS)对于保护组织信息资产至关重要,但传统方法存在通过收集和利用报警数据暴露安全策略的风险,可能会向对手泄露攻击路径。为了克服这一挑战,我们提出了一种新的基于ZTA的入侵检测策略,强调对报警数据隐私的保护。此外,我们还引入了一种自适应稀疏连接进化神经结构搜索(ASCE-NAS)框架,使入侵检测模型结构能够自动进化,以提高在动态环境中的适应性和性能。值得注意的是,ASCE-NAS也有利于集成传感和计算芯片和系统,有助于建立更安全和高效的网络安全框架,以有效地应对不断变化的威胁和攻击方法。
{"title":"Evolutionary Intrusion Detection Strategy Under Zero Trust Architecture","authors":"Bin Cao;Xianrui Zhao;Zhihan Lyu","doi":"10.1109/JSAC.2025.3560001","DOIUrl":"10.1109/JSAC.2025.3560001","url":null,"abstract":"In today’s increasingly complex and dynamic cyber threat environment, Zero Trust Architecture (ZTA) has emerged as a promising solution to address the limitations of traditional intrusion detection methods. While Intrusion Detection Systems (IDS) are essential for safeguarding organizational information assets, traditional methods have the risk of exposing security policies by collecting and utilizing alarm data, potentially revealing attack paths to adversaries. To overcome this challenge, we propose a novel intrusion detection strategy based on ZTA, emphasizing the protection of alarm data privacy. Additionally, we introduce an adaptive sparse connective evolutionary neural architecture search (ASCE-NAS) framework, which enables the automatic evolution of intrusion detection model structures to enhance adaptability and performance in dynamic environments. Notably, ASCE-NAS can also be beneficial for integrated sensing and computing chips and systems, contributing to a more secure and efficient cybersecurity framework to effectively combat evolving threats and attack methods.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2100-2112"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks 零信任无线网络中与接收机无关的射频指纹识别
Kunling Li;Jiazhong Bao;Xin Xie;Jianan Hong;Cunqing Hua
Zero-trust has emerged as a promising security paradigm for next-generation networks (NGN). However, conventional cryptographic schemes struggle with continuous and dynamic authentication due to their coarse granularity and cumbersome processes. Radio frequency fingerprint identification (RFFI), as a prospective solution, enables physical-layer user-transparent identity authentication. Whereas, facing the dynamic topology and device mobility of NGN, such as Internet of Vehicles (IoV), Drone networks, etc., there exists a current deficiency in addressing the significant performance degradation across different receivers. In this paper, we propose a novel RFFI scheme for zero-trust continuous authentication in dynamic NGN environments, enabling unified high-performance cross-receiver identification. A two-stage unsupervised domain adaptation model is designed to extract receiver-independent transmitter-specific features. The receiver-side impact on RFFI, modeled as domain shift, is addressed through adversarial training for global alignment and local maximum mean discrepancy (LMMD)-based subdomain adaptation for eliminating subdomain confusion. Moreover, we further optimize RFFI through data augmentation to enhance robustness, multi-sample fusion inference to handle dynamic uncertainties, and an adaptive few-sample selection strategy for efficient fine-tuning. Extensive experiments on public datasets demonstrate the excellent performance of our proposed scheme in cross-receiver zero-trust wireless networks.
零信任已成为下一代网络(NGN)的一种有前途的安全范例。然而,传统的加密方案由于其粗粒度和繁琐的过程而难以进行连续和动态认证。射频指纹识别(RFFI)作为一种有前景的解决方案,可以实现物理层用户透明的身份认证。然而,面对下一代网络的动态拓扑和设备移动性,如车联网(IoV)、无人机网络等,目前在解决不同接收器之间的显著性能下降方面存在不足。在本文中,我们提出了一种新的RFFI方案,用于动态NGN环境下的零信任连续认证,实现统一的高性能跨接收方识别。设计了一种两阶段无监督域自适应模型,用于提取与接收机无关的发射机特定特征。接收方对RFFI的影响,建模为域移位,通过对抗性训练来解决全局对齐和基于局部最大平均差异(LMMD)的子域自适应,以消除子域混淆。此外,我们进一步优化RFFI通过数据增强来增强鲁棒性,多样本融合推理来处理动态不确定性,以及自适应的少样本选择策略来进行有效的微调。在公共数据集上的大量实验证明了我们提出的方案在跨接收者零信任无线网络中的优异性能。
{"title":"Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks","authors":"Kunling Li;Jiazhong Bao;Xin Xie;Jianan Hong;Cunqing Hua","doi":"10.1109/JSAC.2025.3560002","DOIUrl":"10.1109/JSAC.2025.3560002","url":null,"abstract":"Zero-trust has emerged as a promising security paradigm for next-generation networks (NGN). However, conventional cryptographic schemes struggle with continuous and dynamic authentication due to their coarse granularity and cumbersome processes. Radio frequency fingerprint identification (RFFI), as a prospective solution, enables physical-layer user-transparent identity authentication. Whereas, facing the dynamic topology and device mobility of NGN, such as Internet of Vehicles (IoV), Drone networks, etc., there exists a current deficiency in addressing the significant performance degradation across different receivers. In this paper, we propose a novel RFFI scheme for zero-trust continuous authentication in dynamic NGN environments, enabling unified high-performance cross-receiver identification. A two-stage unsupervised domain adaptation model is designed to extract receiver-independent transmitter-specific features. The receiver-side impact on RFFI, modeled as domain shift, is addressed through adversarial training for global alignment and local maximum mean discrepancy (LMMD)-based subdomain adaptation for eliminating subdomain confusion. Moreover, we further optimize RFFI through data augmentation to enhance robustness, multi-sample fusion inference to handle dynamic uncertainties, and an adaptive few-sample selection strategy for efficient fine-tuning. Extensive experiments on public datasets demonstrate the excellent performance of our proposed scheme in cross-receiver zero-trust wireless networks.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1981-1997"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Secure, Fair, and Scalable Data Sharing in Zero-Trust Edge-End Environment 零信任边缘环境下区块链支持的安全、公平和可扩展的数据共享
Xiaolong Xu;Ke Meng;Haolong Xiang;Guangming Cui;Xiaoyu Xia;Wanchun Dou
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as frequent data breaches, data misuse, and cyberattacks. However, due to the complexity and diversity of edge environments, ZTSM struggles to meet the security requirements of data sharing frameworks solely through enhanced authentication. Consequently, such frameworks with ZTSM still face challenges in ensuring data integrity, evaluating various node behaviors, and coping with the increasing complexity of node attributes. To address these issues, we propose a blockchain-enabled secure, fair and scalable data sharing framework in a zero-trust edge-end environment in this paper. Specifically, we first propose a Merkle forest-based data storage model for the classified storage of loosely coupled data, consequently enhancing the scalability of the model. Then, we design a node behavior-based reputation assessment mechanism to ensure fairness during data sharing. Moreover, a data sharing protocol supervised by smart contract is proposed, working with the aforementioned storage and assessment schemes, to ensure the security of data sharing. Finally, comprehensive security analysis validates the security, fairness and scalability of the proposed framework. Extensive experimental results show that, as transaction volume grows, the time cost of data traversal in the storage model becomes progressively more efficient. Additionally, when the size of the smart contract is increased tenfold, the maximum time cost of the data sharing protocol rises by only 4.98 times.
在边缘计算中,零信任安全模型(Zero-Trust Security Model, ZTSM)作为下一代网络的关键使能技术,在为解决数据共享问题(如频繁的数据泄露、数据滥用和网络攻击)提供认证方面发挥着至关重要的作用。然而,由于边缘环境的复杂性和多样性,仅通过增强的身份验证,ZTSM很难满足数据共享框架的安全需求。因此,这种带有ZTSM的框架在确保数据完整性、评估各种节点行为以及应对节点属性日益复杂等方面仍然面临挑战。为了解决这些问题,我们在本文中提出了一个零信任边缘环境中支持区块链的安全,公平和可扩展的数据共享框架。具体来说,我们首先提出了一种基于Merkle森林的数据存储模型,用于松散耦合数据的分类存储,从而增强了模型的可扩展性。然后,我们设计了一个基于节点行为的信誉评估机制,以确保数据共享过程中的公平性。提出了一种由智能合约监督的数据共享协议,配合上述存储和评估方案,确保数据共享的安全性。最后,综合安全性分析验证了所提框架的安全性、公平性和可扩展性。大量的实验结果表明,随着交易量的增长,存储模型中数据遍历的时间成本变得越来越高效。此外,当智能合约的规模增加10倍时,数据共享协议的最大时间成本仅增加4.98倍。
{"title":"Blockchain-Enabled Secure, Fair, and Scalable Data Sharing in Zero-Trust Edge-End Environment","authors":"Xiaolong Xu;Ke Meng;Haolong Xiang;Guangming Cui;Xiaoyu Xia;Wanchun Dou","doi":"10.1109/JSAC.2025.3560007","DOIUrl":"10.1109/JSAC.2025.3560007","url":null,"abstract":"In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as frequent data breaches, data misuse, and cyberattacks. However, due to the complexity and diversity of edge environments, ZTSM struggles to meet the security requirements of data sharing frameworks solely through enhanced authentication. Consequently, such frameworks with ZTSM still face challenges in ensuring data integrity, evaluating various node behaviors, and coping with the increasing complexity of node attributes. To address these issues, we propose a blockchain-enabled secure, fair and scalable data sharing framework in a zero-trust edge-end environment in this paper. Specifically, we first propose a Merkle forest-based data storage model for the classified storage of loosely coupled data, consequently enhancing the scalability of the model. Then, we design a node behavior-based reputation assessment mechanism to ensure fairness during data sharing. Moreover, a data sharing protocol supervised by smart contract is proposed, working with the aforementioned storage and assessment schemes, to ensure the security of data sharing. Finally, comprehensive security analysis validates the security, fairness and scalability of the proposed framework. Extensive experimental results show that, as transaction volume grows, the time cost of data traversal in the storage model becomes progressively more efficient. Additionally, when the size of the smart contract is increased tenfold, the maximum time cost of the data sharing protocol rises by only 4.98 times.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2056-2069"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in communications : a publication of the IEEE Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1