Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

A survey on zero trust architecture: Challenges and future trends

Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …

Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions

SH Mekala, Z Baig, A Anwar, S Zeadally - Computer Communications, 2023 - Elsevier
IIoT is evolving as the future of system and process integration across Operations
Technology (OT) and Information Technology (IT). The dynamic nature of OT and IT across …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

A continuous authentication protocol without trust authority for zero trust architecture

L Meng, D Huang, J An, X Zhou, F Lin - China Communications, 2022 - ieeexplore.ieee.org
Zero-trust security is a novel concept to cope with intricate access, which can not be handled
by the conventional perimeter-based architecture anymore. The device-to-device continuous …

[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture

F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …

Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

Blockchain-enhanced zero knowledge proof-based privacy-preserving mutual authentication for iot networks

A Pathak, I Al-Anbagi, HJ Hamilton - IEEE Access, 2024 - ieeexplore.ieee.org
Authentication in low-latency Internet of Things (IoT) networks must satisfy three
requirements, namely, high security and privacy preservation, high scalability, and low …

PUFDCA: A Zero‐Trust‐Based IoT Device Continuous Authentication Protocol

S Alshomrani, S Li - Wireless Communications and Mobile …, 2022 - Wiley Online Library
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end‐
to‐end approach from the edge devices to cloud or hybrid service. The exponential growth …