Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

被引:3
|
作者
Azad, Muhammad Ajmal [1 ]
Abdullah, Sidrah [2 ]
Arshad, Junaid [1 ]
Lallie, Harjinder [3 ]
Ahmed, Yussuf Hassan [1 ]
机构
[1] Birmingham City Univ, Birmingham, England
[2] NED Univ Engn & Technol, Karachi, Pakistan
[3] Univ Warwick, Coventry, England
关键词
Blockchain; Zero -trust architecture; Authentication and authorization; Policy -based authorization; INTRUSION DETECTION; AUTHENTICATION; NETWORK; SCHEME; INTERNET; POLICY; EDGE; PROTOCOL;
D O I
10.1016/j.iot.2024.101227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not considered as trusted until proven. The Zero-trust model emphasizes the importance of verifying and authenticating every user and device, and limiting access to resources based on the principle of least privilege. Under the principle of the zero-trust model, devices are granted access after they have been successfully presented with their authentication credentials and access rights based on different factors, such as user identity, device health, location, and behaviour. Access controls are then continuously evaluated and updated as user properties, locations and behaviour change. The zero-trust model can be applied in various domains (healthcare, manufacturing, financial services, government etc.) to provide a comprehensive approach to cybersecurity that helps organizations to reduce risk and protect critical assets. This paper aims to provide a comprehensive and in-depth analysis of the zero-trust model, its principles, and its applications, as well as to propose recommendations for organizations looking to adopt this approach. We explore the major components of the zero-trust framework and their integration across different practical domains. Finally, we provide insightful discussions on open research issues within the zero-trust model in terms of the security and privacy of users and devices. This paper should help researchers and practitioners understand the importance of a zero-trust framework and adopt the zero-trust model for effective security, privacy, and resilience of their networks.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach
    Nkoro, Ebuka Chinaechetam
    Njoku, Judith Nkechinyere
    Nwakanma, Cosmas Ifeanyi
    Lee, Jae-Min
    Kim, Dong-Seong
    ELECTRONICS, 2024, 13 (02)
  • [22] SDP Based Zero-Trust Architectures
    Nair, Suku
    PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, : 1 - 1
  • [23] Toward Zero-Trust IoT Networks via Per-Packet Authorization
    Zhang, Han
    Wang, Qian
    Zhang, Xiaoli
    He, Yi
    Tang, Bo
    Li, Qi
    IEEE COMMUNICATIONS MAGAZINE, 2024, : 1 - 7
  • [24] Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework
    Dong, Chengzu
    Jiang, Frank
    Chen, Shiping
    Liu, Xiao
    2022 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING & COMMUNICATIONS (IEEE EDGE 2022), 2022, : 123 - 132
  • [25] xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning Environment
    Abdelhay, Zeyad
    Refaey, Ahmed
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1820 - 1825
  • [26] Zero-trust architecture is creating a passwordless society
    Iggbom J.
    Network Security, 2022, 2022 (07):
  • [27] Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things
    Lei, Wenxin
    Pang, Zhibo
    Wen, Hong
    Hou, Wenjing
    Li, Wen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 4327 - 4336
  • [28] Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach
    Shen, Quan
    Shen, Yanming
    COMPUTERS & SECURITY, 2024, 136
  • [29] An analysis of zero-trust architecture and its cost-effectiveness for organizational security
    Adahman, Zillah
    Malik, Asad Waqar
    Anwar, Zahid
    COMPUTERS & SECURITY, 2022, 122
  • [30] A zero-trust journey through the threat landscape
    Trott D.
    Network Security, 2024, 2024 (02)