A survey on zero trust architecture: Challenges and future trends

Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …

A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks

N Nahar, K Andersson, O Schelén, S Saguna - IEEE Access, 2024 - ieeexplore.ieee.org
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and
capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks …

[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

A zero-trust architecture for remote access in industrial IoT infrastructures

F Federici, D Martintoni, V Senni - Electronics, 2023 - mdpi.com
This paper considers the domain of Industrial Internet of Things (IIoT) infrastructures and the
recurring need for collaboration across teams and stakeholders by means of remote access …

A maturity framework for zero‐trust security in multiaccess edge computing

B Ali, S Hijjawi, LH Campbell… - Security and …, 2022 - Wiley Online Library
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that
supports cloud computing capabilities and IT services at the network edge. The open …

A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0

NH GHOSON, V MEYRUEIS, K BENFRIHA… - Computers & …, 2024 - Elsevier
The inherent vulnerabilities of Operational Technology (OT) systems to cyberattacks have
historically been mitigated through the practice of air-gap**, effectively isolating them from …

Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework

C Daah, A Qureshi, I Awan, S Konur - Electronics, 2024 - mdpi.com
As financial institutions navigate an increasingly complex cyber threat landscape and
regulatory ecosystem, there is a pressing need for a robust and adaptive security …

Zero-trust for the system design lifecycle

DL Van Bossuyt, B Hale, R Arlitt… - Journal of …, 2023 - asmedigitalcollection.asme.org
In an age of worsening global threat landscape and accelerating uncertainty, the design and
manufacture of systems must increase resilience and robustness across both the system …

Investigation of nanogrids for improved navy installation energy resilience

A Kain, DL Van Bossuyt, A Pollman - Applied Sciences, 2021 - mdpi.com
Military bases perform important national security missions. In order to perform these
missions, specific electrical energy loads must have continuous, uninterrupted power even …

Insight into user acceptance and adoption of autonomous systems in mission critical environments

K Weger, L Matsuyama, R Zimmermann… - … Journal of Human …, 2023 - Taylor & Francis
With Industry 4.0 the immense progression of Artificial Intelligence (AI) technology has
introduced new challenges for engineers to effectively design human-automation interaction …