A survey on zero trust architecture: Challenges and future trends

Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …

Advanced persistent threats and their defense methods in industrial Internet of things: A survey

C Gan, J Lin, DW Huang, Q Zhu, L Tian - Mathematics, 2023 - mdpi.com
The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating
traditional industry with modern information technology to improve production efficiency and …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

[HTML][HTML] Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures

C Zanasi, S Russo, M Colajanni - Ad Hoc Networks, 2024 - Elsevier
The growing digitalization of industrial systems and the increasing adoption of cloud
technologies pose significant challenges to the secure management of modern industrial …

Cyber threats classifications and countermeasures in banking and financial sector

AA Darem, AA Alhashmi, TM Alkhaldi… - IEEe …, 2023 - ieeexplore.ieee.org
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …

A zero-trust architecture for remote access in industrial IoT infrastructures

F Federici, D Martintoni, V Senni - Electronics, 2023 - mdpi.com
This paper considers the domain of Industrial Internet of Things (IIoT) infrastructures and the
recurring need for collaboration across teams and stakeholders by means of remote access …

[PDF][PDF] Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security

H Sharma - ESP Journal of Engineering & Technology …, 2022 - researchgate.net
One of the innovations making organizations experiment with new ways of storing and
processing their information is cloud computing; it presents them with both the chance and …

Towards zero trust security in connected vehicles: A comprehensive survey

M Annabi, A Zeroual, N Messai - Computers & Security, 2024 - Elsevier
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting
continuous verification of users, devices, and applications, whatever their position or origin …

Zero Trust Implementation in the Emerging Technologies Era: Survey

AI Weinberg, K Cohen - arxiv preprint arxiv:2401.09575, 2024 - arxiv.org
This paper presents a comprehensive analysis of the shift from the traditional perimeter
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …

Dissecting zero trust: research landscape and its implementation in IoT

C Liu, R Tan, Y Wu, Y Feng, Z **, F Zhang, Y Liu, Q Liu - Cybersecurity, 2024 - Springer
As a progressive security strategy, the zero trust model has attracted notable attention and
importance within the realm of network security, especially in the context of the Internet of …