
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
The fundamental attributes of the 5G network, namely its high bandwidth and concurrency, reduced latency, and ability to handle high-mobility big data platforms, render it valuable in tackling forthcoming healthcare challenges and emerging health demands like as the COVID-19 pandemic. The enforcement of the security component within a 5G-based Intelligent Healthcare System (IHS), which encompasses critical information and facilities, is more imperative and significant. In the context of deploying a healthcare system in a distributed manner, the effectiveness of passive security measures, such as information encryption and isolation, employed on traditional health platforms is insufficient to address the requirements for information and facility interchange across “cloud-edge-terminals” in the era of 5G. This study proposes a security solution for an intelligent health platform based on the Zero-Trust Model (ZTM) in the context of 5G technology. This study presents fundamental principles like the real-time monitoring of network asset security, risk evaluation of individual access requests, and access permission and decision-making through the use of a dynamic trust algorithm. The 5G IHS encompasses four primary dimensions, namely “theme” which includes people, terminals, and applications, “item” which encompasses information, platforms, and facilities, “behavior,” and “environment”. With the highest accuracy (98.9), precision (95.9), recall (98), and F1-score (95.5) among the several approaches, the suggested ZTM method better the others consistently. These overall numerical results for accuracy, precision, recall, and F1-score across methodologies are shown. A lower but more variable performance was shown by other approaches, including RNN, KNN, Support Vector Machine (SVM), and Dynamic Equilibrium Optimized Gated Recurrent Unit (DEO-GRU) across all measures. The proposed security system has been subjected to thorough testing and implementation at an industrial level, showcasing its ability to fulfill the criteria for dynamic shield and end-to-end safety execution of information, users, and facilities present in an Intelligent Healthcare (IH) scheme based on 5G technology.
[1] Al-Turjman F., Ever E., and Zahmatkesh H., “Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview,” IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 28-65, 2019. DOI:10.1109/COMST.2018.2864779
[2] Batista E., Moncusi M., Lopez-Aguilar P., Martinez-Balleste A., and Solanas A., “Sensors for Context-Aware Smart Healthcare: A Security Perspective,” Sensors, vol. 21, no. 20, pp. 1-60, 202. https://doi.org/10.3390/s21206886
[3] Cavalcante R., Stanczak S., Schubert M., Eisenblaetter A., and Tuerke U., “Toward Energy- Efficient 5G Wireless Communications Technologies: Tools for Decoupling the Scaling of Networks from the Growth of Operating Power,” IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 24-34, 2014. DOI:10.1109/MSP.2014.2335093
[4] Chavez-Santiago R., SzydeĹ‚ko M., Kliks A., Foukalas F., Haddad Y., Nolan K., Masonta M., and Balasingham I., “5G: The Convergence of Wireless Communications,” Wireless Personal Communications, vol. 83, no. 3, pp. 1617-1642, 2015. https://pubmed.ncbi.nlm.nih.gov/27076701/
[5] Chen M., Ma Y., Song J., Lai C., and Hu B., “Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring,” Mobile Networks and Applications, vol. 21, pp. 825-845, 2016. https://doi.org/10.1007/s11036- 016-0745-1
[6] Chien H., Lin Y., Lai C., and Wang C., “End-to- End Slicing as a Service with Computing and Communication Resource Allocation for Multi- Tenant 5G Systems,” IEEE Wireless Communications, vol. 26, no. 5, pp. 104-112, 2019. DOI:10.1109/MWC.2019.1800466
[7] Ding A. and Janssen M., “Opportunities for Applications Using 5G Networks: Requirements, Challenges, and Outlook,” in Proceedings of the 7th International Conference on Telecommunications and Remote Sensing, Barcelona, pp. 27-34, 2018. https://doi.org/10.1145/3278161.3278166
[8] Flanigan J., “Zero Trust Network Model,” Tufts Medford University, pp. 1-7, 2018. https://www.cs.tufts.edu/comp/116/archive/fall20 18/jflanigan.pdf
[9] Kapse V., Joshi M., Karthikeyan M., and Choudhary D., “A 5G-Enabled Intelligent Healthcare Sector with Deep Learning Assistance,” Multidisciplinary Science Journal, vol. 6, pp. 1-10, 2024. DOI:10.31893/multiscience.2024ss0306
[10] Kerman A., Borchert O., Rose S., and Tan A., “Implementing a Zero Trust Architecture,” Draft, National Institute of Standards and Technology, pp. 1-20, 2020. https://www.nccoe.nist.gov/sites/default/files/leg acy-files/zt-arch-project-description-draft.pdf
[11] Khan R., Kumar P., Jayakody D., and Liyanage M., “A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions,” IEEE Communications Surveys and Tutorials, vol. 22, no. 1, pp. 196-248 2019. DOI:10.1109/COMST.2019.2933899
[12] Khanh Q., Hoai N., Manh L., Le A., and Jeon G., “Wireless Communication Technologies for IoT 276 The International Arab Journal of Information Technology, Vol. 22, No. 2, March 2025 in 5G: Vision, Applications, and Challenges,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, pp. 1-12, 2022. https://doi.org/10.1155/2022/3229294
[13] Le-Dang Q. and Le-Ngoc T., Handbook of Smart Cities: Software Services and Cyber Infrastructure, Springer, 2018. https://link.springer.com/chapter/10.1007/978-3- 319-97271-8_1
[14] Lo N. and Tsai H., “A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-10, 2009. DOI:10.1155/2009/125348
[15] Martimiano T., Martina J., Olembo M., and Carlos M., “Modelling User Devices in Security Ceremonies,” in Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust, Vienna, pp. 16-23, 2014. DOI:10.1109/STAST.2014.11
[16] Medin M. and Louie G., “The 5G Ecosystem: Risks and Opportunities for DoD,” Defense Innovation Board Washington DC United States, pp. 1-33, 2019. https://apps.dtic.mil/sti/citations/AD1074509
[17] Ng C. and Reaz M., “Evolution of a Capacitive Electromyography Contactless Biosensor: Design and Modelling Techniques,” Measurement, vol. 145, pp. 460-471, 2019. https://doi.org/10.1016/j.measurement.2019.05.031
[18] Nguyen D., Pathirana P., Ding M., and Seneviratne A., “Blockchain for 5G and beyond Networks: A State of the Art Survey,” Journal of Network and Computer Applications, vol. 166, pp. 102693, 2020. https://www.sciencedirect.com/science/article/ab s/pii/S1084804520301673
[19] Ordonez-Lucena J., Ameigeiras P., Lopez D., Ramos-Munoz J., Lorca J., and Folgueira J., “Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges,” IEEE Communications Magazine, vol. 55, no. 5, pp. 80- 87, 2017. DOI:10.1109/MCOM.2017.1600935
[20] Park J., Rathore S., Singh S., Salim M., Azzaoui A., Kim T., and Park J., “A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions,” Human-Centric Computing and Information Sciences, vol. 11, no. 3, pp. 1-22, 2021. https://hcisj.com/data/file/article/202101282/hcis.pdf
[21] Penttinen J., 5G Explained: Security and Deployment of Advanced Mobile Communications, John Wiley and Sons, 2019. https://ieeexplore.ieee.org/book/8788358
[22] Pussewalage H. and Oleshchuk V., “Privacy Preserving Mechanisms for Enforcing Security and Privacy Requirements in E-Health Solutions,” International Journal of Information Management, vol. 36, no. 6, pp. 1161-1173, 2016. https://doi.org/10.1016/j.ijinfomgt.2016.07.006
[23] Qian H., Li J., Zhang Y., and Han J., “Privacy- Preserving Personal Health Record Using Multi- Authority Attribute-Based Encryption with Revocation,” International Journal of Information Security, vol. 14, pp. 487-497, 2015. https://link.springer.com/article/10.1007/s10207- 014-0270-9
[24] Qureshi H., Manalastas M., Ijaz A., Imran A., Liu Y., and Al Kalaa M., “Communication Requirements in 5G-Enabled Healthcare Applications: Review and Considerations,” Healthcare, vol. 10, no. 2, pp. 293, 2022. https://pubmed.ncbi.nlm.nih.gov/35206907/
[25] Rost P., Mannweiler C., Michalopoulos D., Sartori C., Sciancalepore V., Sastry N., and Bakker H., “Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks,” IEEE Communications Magazine, vol. 55, no. 5, pp. 72- 79, 2017. DOI:10.1109/MCOM.2017.1600920
[26] Sahi M., Abbas H., Saleem K., Yang X., Derhab A., Orgun M., Iqbal W., Rashid I., and Yaseen A., “Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions,” IEEE Access, vol. 6, pp. 464-478, 2017. DOI:10.1109/ACCESS.2017.2767561
[27] Sattar D. and Matrawy A., “Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices,” in Proceedings of the IEEE Conference on Communications and Network Security, Washington (DC), pp. 82-90, 2019. DOI:10.1109/CNS.2019.8802852
[28] Schanzenbach M., Kilian T., Schutte J., and Banse C., “Zklaims: Privacy-Preserving Attribute-based Credentials Using Non-Interactive Zero- Knowledge Techniques,” arXiv Preprint, vol. arXiv:1907.09579, pp. 1-8, 2019. https://arxiv.org/abs/1907.09579
[29] Suciu G., Suciu V., Martian A., Craciunescu R., Vulpe A., Marcu I., Halunga S., and Fratu O., “Big Data, Internet of Things and Cloud Convergence- An Architecture for Secure e-Health Applications,” Journal of Medical Systems, vol. 39, pp. 1-8, 2015. https://link.springer.com/article/10.1007/s10916- 015-0327-y
[30] Teece D., “5G Mobile: Impact on the Health Care Sector,” Working Paper, pp. 1-17, 2017. https://www.qualcomm.com/content/dam/qcomm -martech/dm- assets/documents/brg_qualcomm_5g_impact_hea lthcare_paper_final_oct26.pdf
[31] Vergutz A., Prates N., Schwengber B., Santos A., and Nogueira M., “An Architecture for the Performance Management of Smart Healthcare Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare 277 Applications,” Sensors, vol. 20, no. 19, pp. 1-18, 2020. https://doi.org/10.3390/s20195566
[32] Vijayaraj N. and Arunagiri S., “Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction,” The International Arab Journal of Information Technology, vol. 20, no. 4, pp. 600- 608, 2023. DOI: 10.34028/IAJIT/20/4/6
[33] Wang Y., Hori Y., and Sakurai K., “On Securing Open Networks through Trust and Reputation- Architecture, Challenges and Solutions,” in Proceedings of the 1st Joint Workshop on Information Security, Seoul, pp. 1-17, 2006. https://scholar.google.co.jp/citations?user=KdVX 5OIAAAAJ&hl=en
[34] Xiaorong F., Shizhun J., and Songtao M., “Research on Industrial Big Data Information Security Risks,” in Proceedings of the IEEE 3rd International Conference on Big Data Analysis, Shanghai, pp. 19-23, 2018. DOI:10.1109/ICBDA.2018.8367644
[35] Yu B., Wright J., Nepal S., Zhu L., Liu J., and Ranjan R., “IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain,” IEEE Cloud Computing, vol. 5, no. 4, pp. 12-23, 2018. DOI:10.1109/MCC.2018.043221010
[36] Zheng J., Wang Y., Zhang J., Guo W., Yang X., Luo L., Jiao W., Hu X., Yu Z., Wang C., Zhu L., Yang Z., Zhang M., Xie F., Jia Y., Li B., Li Z., Dong Q., and Niu H., “5G Ultra-Remote Robot- Assisted Laparoscopic Surgery in China,” Surgical Endoscopy, vol. 34, no. 11, pp. 5172- 5180, 2020. https://pubmed.ncbi.nlm.nih.gov/32700149/