EconPapers    
Economics at your fingertips  
 

Zero Trust Strategies for Cyber-Physical Systems in 6G Networks

Abdulrahman K. Alnaim () and Ahmed M. Alwakeel
Additional contact information
Abdulrahman K. Alnaim: Department of Management Information Systems, School of Business, King Faisal University, Hofuf 31982, Saudi Arabia
Ahmed M. Alwakeel: Faculty of Computers & Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia

Mathematics, 2025, vol. 13, issue 7, 1-29

Abstract: This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security models are inadequate against evolving cyber threats such as Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data breaches. Zero Trust security eliminates implicit trust by enforcing continuous authentication, strict access control, and real-time anomaly detection to mitigate potential threats dynamically. The proposed framework leverages blockchain technology to ensure tamper-proof data integrity and decentralized authentication, preventing unauthorized modifications to CPS data. Additionally, AI-driven anomaly detection identifies suspicious behavior in real time, optimizing security response mechanisms and reducing false positives. Experimental evaluations demonstrate a 40% reduction in MITM attack success rates, 5.8% improvement in authentication efficiency, and 63.5% lower latency compared to traditional security methods. The framework also achieves high scalability and energy efficiency, maintaining consistent throughput and response times across large-scale CPS deployments. These findings underscore the transformative potential of Zero Trust security in 6G-enabled CPS, particularly in mission-critical applications such as healthcare, smart infrastructure, and industrial automation. By integrating blockchain-based authentication, AI-powered threat detection, and adaptive access control, this research presents a scalable and resource-efficient solution for securing next-generation CPS architectures. Future work will explore quantum-safe cryptography and federated learning to further enhance security, ensuring long-term resilience in highly dynamic network environments.

Keywords: Zero Trust; Cyber-Physical System; 6G networks; cloud computing; edge computing; blockchain (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/13/7/1108/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/7/1108/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:7:p:1108-:d:1622282

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-04-05
Handle: RePEc:gam:jmathe:v:13:y:2025:i:7:p:1108-:d:1622282