DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks

Journal Article · · IEEE Transactions on Information Forensics and Security

Not Available

Sponsoring Organization:
USDOE
OSTI ID:
2203289
Journal Information:
IEEE Transactions on Information Forensics and Security, Journal Name: IEEE Transactions on Information Forensics and Security Vol. 19; ISSN 1556-6013
Publisher:
Institute of Electrical and Electronics EngineersCopyright Statement
Country of Publication:
United States
Language:
English

References (34)

A Game-Theoretic Approach to Respond to Attacker Lateral Movement book January 2016
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN journal November 2022
Trust management system design for the Internet of Things: A context-aware and multi-service approach journal November 2013
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems journal February 2020
CyberGuarder: A virtualization security assurance architecture for green cloud computing journal February 2012
Intrusion detection system: A comprehensive review journal January 2013
Prospects for Handling 5G Network Security: Challenges, Recommendations and Future Directions journal January 2021
A survey of intrusion detection and prevention systems journal October 2010
Kerberos: an authentication service for computer networks journal September 1994
On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats journal January 2018
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif journal January 2020
Estimating ToE Risk Level Using CVSS conference January 2009
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks conference October 2022
Security for 5G and Beyond journal January 2019
Zero-Trust Hierarchical Management in IoT conference July 2018
Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach conference May 2023
Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT journal March 2018
Attribute-Based Access Control journal February 2015
Latte: Large-Scale Lateral Movement Detection conference October 2018
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks conference November 2022
IT Risk and Resilience—Cybersecurity Response to COVID-19 journal May 2020
IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? journal September 2018
Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions journal January 2021
Fine-Grained Big Data Security Method Based on Zero Trust Model conference December 2018
Moving horizon Nash strategies for a military air operation journal July 2002
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning journal November 2014
A Formal Analysis of 5G Authentication conference October 2018
Insight Into Insiders and IT journal April 2019
Implementing a distributed firewall conference November 2000
Defining an Optimal Cut-Point Value in ROC Analysis: An Alternative Approach journal January 2017
A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT journal December 2020
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice book January 2021
The OAuth 2.0 Authorization Framework report October 2012
Multi-Factor Authentication: A Survey journal January 2018