Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

C Buck, C Olenberger, A Schweizer, F Völter… - Computers & …, 2021 - Elsevier
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …

Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN

K Ramezanpour, J Jagannath - Computer Networks, 2022 - Elsevier
In this position paper, we discuss the critical need for integrating zero trust (ZT) principles
into next-generation communication networks (5G/6G). We highlight the challenges and …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

A review and comparative analysis of relevant approaches of zero trust network model

P Dhiman, N Saini, Y Gulzar, S Turaev, A Kaur… - Sensors, 2024 - mdpi.com
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the
shortcomings of standard network security solutions. This extensive survey study provides a …

Zero trust: Never trust, always verify

A Wylde - 2021 international conference on cyber situational …, 2021 - ieeexplore.ieee.org
This short paper argues that current conceptions in trust formation scholarship miss the
context of zero trust, a practice growing in importance in cyber security. The contribution of …

A novel zero-trust network access control scheme based on the security profile of devices and users

P García-Teodoro, J Camacho, G Maciá-Fernández… - Computer …, 2022 - Elsevier
Security constitutes a principal concern for communication networks and services at present.
This way, threats should be under control to minimize risks over time in real environments …

A survey on IoT trust model frameworks

D Ferraris, C Fernandez-Gago, R Roman… - The Journal of …, 2024 - Springer
Trust can be considered as a multidisciplinary concept, which is strongly related to the
context and it falls in different fields such as Philosophy, Psychology or Computer Science …

Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

A problem analysis of smart home automation: Toward secure and usable communication-based authorization

SW Tay, N Zhang, S AlJanah - IEEE Access, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) and Artificial Intelligence (AI) have led to the rising
popularity of Smart Home Automation (SHAuto). SHAuto uses a variety of interconnected …