A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks

Eiza, Max Hashem, Akwirry, Brian, Raschella, Alessandro, Mackay, Michael and Kumar Maheshwari, Mukesh (2025) A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks. Future Internet .

[thumbnail of AAM]
Preview
PDF (AAM) - Accepted Version
Available under License Creative Commons Attribution.

1MB

Official URL: https://www.mdpi.com/journal/futureinternet

Abstract

The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-vendor Open RAN (O-RAN) architectures that will be utilised in 6G networks. This paper addresses the urgent need for a practical Zero Trust (ZT) deployment model tailored to O-RAN specification. To do so, we introduce a novel hybrid ZT deployment model that establishes the trusted foundation for AI/ML-driven security in O-RAN, integrating macro-level enclave segmentation with micro-level application sandboxing for xApps/rApps. In our model, the Policy Decision Point (PDP) centrally manages dynamic policies, while distributed Policy Enforcement Points (PEPs) reside in logical enclaves, agents, and gateways to enable per-session, least-privilege access control across all O-RAN interfaces. We demonstrate feasibility via a Proof of Concept (PoC) implemented with Kubernetes and Istio and based on the NIST Policy Machine (PM). The PoC illustrates how pods can represent enclaves and sidecar proxies can embody combined agent/gateway functions. Performance discussion indicates that enclave-based deployment adds 1–10 ms of additional per-connection latency while CPU/memory overhead from running a sidecar proxy per enclave is approximately 5–10 % extra utilisation, with each proxy consuming roughly 100–200 MB of RAM.


Repository Staff Only: item control page