IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v13y2025i8p1239-d1631305.html
   My bibliography  Save this article

Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks

Author

Listed:
  • Abdulrahman K. Alnaim

    (Department of Management Information Systems, School of Business, King Faisal University, Hofuf 31982, Saudi Arabia)

  • Ahmed M. Alwakeel

    (Faculty of Computers & Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia)

Abstract

The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecting the dynamic and heterogeneous environments of 6G-enabled systems. In this context, we propose ZTF-6G (Zero-Trust Framework for 6G Networks), a novel model that integrates Zero-Trust principles to secure distributed edge and fog computing environments. Robust security is ensured by ZTF-6G by adopting a “never trust, always verify” approach, which comprises adaptive authentication, continuous verification, and fine-grained access control against all entities within the network. Within this context, our proposed framework makes use of Zero-Trust-based multi-layering that extends to AI-driven anomaly detection and blockchain-based identity management for the authentication and real-time monitoring of network interactions. Simulation results indicate that ZTF-6G is able to reduce latency by 77.6% (up to 2.8 ms, compared to the standard models’ 12.5 ms), improve throughput by 70%, and improve resource utilization by 41.5% (90% of utilization). Additionally, the trust score accuracy increased from 95% to 98%, energy efficiency improved by 22.2% (from 88% to 110% efficiency), and threat detection accuracy increased to 98%. Finally, the framework perfectly mitigated the insider threats by 85% and enforced a dynamic policy within 1.8 ms. ZTF-6G maintained a low latency while providing more resilience to insider threats, unauthorized access, and data breaches, which is a requirement of 6G networks. This research aims to lay a foundation for deploying Zero-Trust as an integral part of the next-generation networks which will face the security challenges of the distributed systems driven by 6G networks.

Suggested Citation

  • Abdulrahman K. Alnaim & Ahmed M. Alwakeel, 2025. "Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks," Mathematics, MDPI, vol. 13(8), pages 1-34, April.
  • Handle: RePEc:gam:jmathe:v:13:y:2025:i:8:p:1239-:d:1631305
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/13/8/1239/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/13/8/1239/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:8:p:1239-:d:1631305. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.