Dissecting zero trust: research landscape and its implementation in IoT

Dissecting zero trust: research landscape and its implementation in IoT

2024 | Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu
This paper evaluates the current research landscape of zero trust security and its practical applications in the Internet of Things (IoT) through extensive bibliometric analysis. It highlights the vulnerabilities of IoT and explores how zero trust security can mitigate these risks. The study acknowledges the challenges associated with implementing zero trust security and suggests possible pathways for future research. Key contributions include a comprehensive understanding of the current state of zero trust research, a detailed analysis of practical applications in IoT, and a mapping structure encompassing threat locations, vulnerabilities, application scenarios, types of attacks, zero trust solutions, and core technologies. The paper also examines the growth trends of research, the performance of leading countries, and the knowledge structure of zero trust research. Additionally, it provides an in-depth analysis of zero trust in IoT, including security threats at different layers and corresponding zero trust solutions. The study aims to empower scholars in the field to pursue deeper and more focused research in the future.This paper evaluates the current research landscape of zero trust security and its practical applications in the Internet of Things (IoT) through extensive bibliometric analysis. It highlights the vulnerabilities of IoT and explores how zero trust security can mitigate these risks. The study acknowledges the challenges associated with implementing zero trust security and suggests possible pathways for future research. Key contributions include a comprehensive understanding of the current state of zero trust research, a detailed analysis of practical applications in IoT, and a mapping structure encompassing threat locations, vulnerabilities, application scenarios, types of attacks, zero trust solutions, and core technologies. The paper also examines the growth trends of research, the performance of leading countries, and the knowledge structure of zero trust research. Additionally, it provides an in-depth analysis of zero trust in IoT, including security threats at different layers and corresponding zero trust solutions. The study aims to empower scholars in the field to pursue deeper and more focused research in the future.
Reach us at info@study.space