Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

被引:3
|
作者
Azad, Muhammad Ajmal [1 ]
Abdullah, Sidrah [2 ]
Arshad, Junaid [1 ]
Lallie, Harjinder [3 ]
Ahmed, Yussuf Hassan [1 ]
机构
[1] Birmingham City Univ, Birmingham, England
[2] NED Univ Engn & Technol, Karachi, Pakistan
[3] Univ Warwick, Coventry, England
关键词
Blockchain; Zero -trust architecture; Authentication and authorization; Policy -based authorization; INTRUSION DETECTION; AUTHENTICATION; NETWORK; SCHEME; INTERNET; POLICY; EDGE; PROTOCOL;
D O I
10.1016/j.iot.2024.101227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not considered as trusted until proven. The Zero-trust model emphasizes the importance of verifying and authenticating every user and device, and limiting access to resources based on the principle of least privilege. Under the principle of the zero-trust model, devices are granted access after they have been successfully presented with their authentication credentials and access rights based on different factors, such as user identity, device health, location, and behaviour. Access controls are then continuously evaluated and updated as user properties, locations and behaviour change. The zero-trust model can be applied in various domains (healthcare, manufacturing, financial services, government etc.) to provide a comprehensive approach to cybersecurity that helps organizations to reduce risk and protect critical assets. This paper aims to provide a comprehensive and in-depth analysis of the zero-trust model, its principles, and its applications, as well as to propose recommendations for organizations looking to adopt this approach. We explore the major components of the zero-trust framework and their integration across different practical domains. Finally, we provide insightful discussions on open research issues within the zero-trust model in terms of the security and privacy of users and devices. This paper should help researchers and practitioners understand the importance of a zero-trust framework and adopt the zero-trust model for effective security, privacy, and resilience of their networks.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [2] Zero-Trust Hierarchical Management in IoT
    Samaniego, Mayra
    Deters, Ralph
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 88 - 95
  • [3] Toward Zero-Trust Security for the Metaverse
    Cheng, Ruizhi
    Chen, Songqing
    Han, Bo
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (02) : 156 - 162
  • [4] Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
    Buck, Christoph
    Olenberger, Christian
    Schweizer, Andre
    Volter, Fabiane
    Eymann, Torsten
    COMPUTERS & SECURITY, 2021, 110
  • [5] Future Industry Internet of Things with Zero-trust Security
    Li, Shan
    Iqbal, Muddesar
    Saxena, Neetesh
    INFORMATION SYSTEMS FRONTIERS, 2024, 26 (05) : 1653 - 1666
  • [6] Multivocal literature review on zero-trust security implementation
    Itodo, Cornelius
    Ozer, Murat
    COMPUTERS & SECURITY, 2024, 141
  • [7] On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse
    AlShehhi, Fatema
    Otoum, Safa
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 30 - 37
  • [8] Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
    Buck, Christoph
    Olenberger, Christian
    Schweizer, André
    Völter, Fabiane
    Eymann, Torsten
    Computers and Security, 2021, 110
  • [9] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [10] Zero-Trust Artificial Intelligence?
    Laplante, Phil
    Voas, Jeffrey
    COMPUTER, 2022, 55 (02) : 10 - 12