Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

被引:3
|
作者
Azad, Muhammad Ajmal [1 ]
Abdullah, Sidrah [2 ]
Arshad, Junaid [1 ]
Lallie, Harjinder [3 ]
Ahmed, Yussuf Hassan [1 ]
机构
[1] Birmingham City Univ, Birmingham, England
[2] NED Univ Engn & Technol, Karachi, Pakistan
[3] Univ Warwick, Coventry, England
关键词
Blockchain; Zero -trust architecture; Authentication and authorization; Policy -based authorization; INTRUSION DETECTION; AUTHENTICATION; NETWORK; SCHEME; INTERNET; POLICY; EDGE; PROTOCOL;
D O I
10.1016/j.iot.2024.101227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not considered as trusted until proven. The Zero-trust model emphasizes the importance of verifying and authenticating every user and device, and limiting access to resources based on the principle of least privilege. Under the principle of the zero-trust model, devices are granted access after they have been successfully presented with their authentication credentials and access rights based on different factors, such as user identity, device health, location, and behaviour. Access controls are then continuously evaluated and updated as user properties, locations and behaviour change. The zero-trust model can be applied in various domains (healthcare, manufacturing, financial services, government etc.) to provide a comprehensive approach to cybersecurity that helps organizations to reduce risk and protect critical assets. This paper aims to provide a comprehensive and in-depth analysis of the zero-trust model, its principles, and its applications, as well as to propose recommendations for organizations looking to adopt this approach. We explore the major components of the zero-trust framework and their integration across different practical domains. Finally, we provide insightful discussions on open research issues within the zero-trust model in terms of the security and privacy of users and devices. This paper should help researchers and practitioners understand the importance of a zero-trust framework and adopt the zero-trust model for effective security, privacy, and resilience of their networks.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework
    Basta, Nardine
    Ikram, Muhammad
    Kaafar, Mohamed Ali
    Walker, Andy
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [42] Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure
    Hyun-Woo Kim
    Eun-Ha Song
    International Journal of Information Technology, 2024, 16 (8) : 5091 - 5097
  • [43] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [44] Towards Zero-Trust Hardware Architectures in Safety and Security Critical System-on-Chips
    Restuccia, Francesco
    Kastner, Ryan
    2024 IEEE 3RD REAL-TIME AND INTELLIGENT EDGE COMPUTING WORKSHOP, RAGE 2024, 2024, : 33 - 36
  • [45] A Zero-Trust Model for Intrusion Detection in Drone Networks
    Ouiazzane, Said
    Addou, Malika
    Barramou, Fatimazahra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 525 - 537
  • [46] Zero-Trust Model of Cybersecurity: A Significant Challenge in the Future
    Al-Ayed, Fadi
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 852 - 854
  • [47] Performance Analysis of Zero-Trust multi-cloud
    Rodigari, Simone
    O'Shea, Donna
    McCarthy, Pat
    McCarry, Martin
    McSweeney, Sean
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 730 - 732
  • [48] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [49] IoT Security and Consumer Trust
    Badran, Hosein F.
    PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH (DGO2019): GOVERNANCE IN THE AGE OF ARTIFICIAL INTELLIGENCE, 2019, : 133 - 140
  • [50] A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
    Adam, Mumin
    Hammoudeh, Mohammad
    Alrawashdeh, Rana
    Alsulaimy, Basil
    IEEE ACCESS, 2024, 12 : 57128 - 57149