DESIGN AND OPTIMIZATION OF ZERO TRUST SECURITY ARCHITECTURES FOR TELECOM CORE NETWORKS

Authors

  • Khaydaraliyeva Khilola Farhod qizi Tashkent University of Information Technologies named after Muhammad al Khwarazmiy Assistent Author
  • Ergashova Durdona Khusniddin kizi Tashkent University of Information Technologies named after Muhammad al Khwarazmiy 3rd year student of the Faculty of Mobile Communication Technology Author

Abstract

The core of modern telecommunication networks has evolved into a complex, distributed, and software-defined environment. This evolution introduces new security challenges that traditional perimeter-based models can no longer effectively address. Zero Trust Architecture (ZTA), which assumes no implicit trust within or outside the network perimeter, offers a promising approach for securing telecom infrastructures. This paper investigates the implementation of ZTA principles in the core of 5G and next-generation telecommunication networks. We propose an architecture that integrates identity-aware access control, continuous verification, micro-segmentation, and policy enforcement into network functions. A testbed was created to evaluate the performance and security benefits of ZTA under realistic telecom conditions. Results show that ZTA significantly improves threat detection and isolation while maintaining acceptable levels of performance.

References

1. National Institute of Standards and Technology (NIST). (2020). Special Publication 800-207: Zero Trust Architecture.

2. 3GPP TS 23.501: System Architecture for the 5G System.

3. ETSI GS NFV-MAN 001: Network Functions Virtualisation Management and Orchestration.

4. OPA: Open Policy Agent. https://www.openpolicyagent.org/

5. SPIFFE/SPIRE: Secure Production Identity Framework for Everyone. https://spiffe.io/

6. MITRE ATT&CK Framework: https://attack.mitre.org/

Downloads

Published

2026-03-30