AI-Powered Zero Trust Security for Next Generation Networks in Cameroun and Kenya.
Kum Bertrand Kum, The ICT University-FICT-CT-UB;
Dr. Austin Oguejiofor Amaechi, The ICT University-FICT-CT-UB;
Prof Tonye Emmanuel, The ICT University-FICT-CT-UB & Polytechnique de Yde;
Prof Mbarika W. Victor, The ICT University-FICT-UB.
Email Address(es): kum.bertrand@ictuniversity.edu.cm, austin.amaechi@ictuniversity.edu.cm, tonye2018@hotmail.com, victor@mbarika.com.
Abstract
The deployment of Next Generation Networks (NGNs) across Africa is accelerating digital connectivity and economic growth. However, this transformation is accompanied by escalating cybersecurity risks that challenge the effectiveness of traditional perimeter-based security architectures. This paper presents an Artificial Intelligence (AI)-driven Zero Trust Security (ZTS) framework specifically designed for NGN environments within the African context. Rooted in the "never trust, always verify" principle, the proposed framework leverages machine learning and behavioral analytics to enable continuous authentication, dynamic access control, and real-time threat mitigation. The integration of AI enhances the system’s ability to detect anomalous activities, respond to zero-day attacks, and adapt security policies based on contextual awareness. Recognizing Africa’s unique challenges—including infrastructural constraints, diverse regulatory landscapes, and limited skilled cybersecurity personnel, the model emphasizes scalability, automation, and cost-efficiency. Simulations and case studies demonstrate the proposed solution’s effectiveness in mitigating insider threats, lateral movement, and advanced persistent threats (APTs) within NGN infrastructures. The findings suggest that AI-powered ZTS can serve as a foundational cybersecurity strategy for building resilient, intelligent, and secure digital ecosystems in Africa.
Index Terms: Artificial Intelligence (AI), Zero Trust Security (ZTS), Next Generation Networks (NGN), Cybersecurity, Network Access Control, Behavioral Analytics, Advanced Persistent Threats (APTs), African Telecommunications, Context-Aware Security, Dynamic Threat Detection, Identity and Access Management (IAM), Digital Infrastructure Security, Policy-Based Security.