Dissecting zero trust: research landscape and its implementation in IoT

Dissecting zero trust: research landscape and its implementation in IoT

2024 | Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu
This paper reviews the current research on zero trust and its practical applications in the Internet of Things (IoT). It analyzes the vulnerabilities of IoT and explores the potential role of zero trust security in mitigating these risks. The paper also discusses the challenges associated with implementing zero trust security in IoT environments and suggests possible pathways for future research. The study aims to provide a strategic analysis of the zero trust model to guide future research. Zero trust is a security model that challenges the implicit trust assumption of traditional boundary security models by strengthening security measures and mitigating potential risks related to compromised IoT devices' access and disruption of network resources. It is based on the principle of "never trust, always verify," which means that no implicit trust is given to assets or user accounts just because of their physical or network location. A zero trust architecture will not grant access to resources unless the user/device, asset, or workload is confirmed through a robust authentication and authorization process. The paper uses bibliometric analysis to evaluate the current research on zero trust and to highlight its practical applications in the IoT sphere. It also conducts a comprehensive analysis of the practical applications of zero trust in IoT, including the security threats present in the IoT, analyzing the security challenges and potential attack vectors across different layers, such as the perception, network, and application layers. The paper also develops a mapping structure that encompasses threat locations, vulnerabilities, application scenarios, types of attack, zero trust solutions, and core technologies for each layer of IoT. The paper discusses the concept of zero trust security, its architecture, and core technologies. It also analyzes the research landscape of zero trust, including the growth of publications, performance of leading players and their collaborations, understanding of underlying knowledge structures, identification of hot and emerging topics in the field of zero trust, and thorough analysis of zero trust in IoT. The paper also discusses the application of zero trust in IoT, including the security challenges posed by IoT devices, network architecture, and resource, and the potential solutions to these challenges. The paper also discusses the application of zero trust in cloud computing, blockchain, big data, and edge computing. It highlights the importance of these technologies in enhancing the security of zero trust architectures. The paper concludes that zero trust is a crucial technology for network security and is gaining increasing recognition in governments, corporations, and academic institutions. The study aims to provide a comprehensive analysis of zero trust in IoT and to guide future research in this area.This paper reviews the current research on zero trust and its practical applications in the Internet of Things (IoT). It analyzes the vulnerabilities of IoT and explores the potential role of zero trust security in mitigating these risks. The paper also discusses the challenges associated with implementing zero trust security in IoT environments and suggests possible pathways for future research. The study aims to provide a strategic analysis of the zero trust model to guide future research. Zero trust is a security model that challenges the implicit trust assumption of traditional boundary security models by strengthening security measures and mitigating potential risks related to compromised IoT devices' access and disruption of network resources. It is based on the principle of "never trust, always verify," which means that no implicit trust is given to assets or user accounts just because of their physical or network location. A zero trust architecture will not grant access to resources unless the user/device, asset, or workload is confirmed through a robust authentication and authorization process. The paper uses bibliometric analysis to evaluate the current research on zero trust and to highlight its practical applications in the IoT sphere. It also conducts a comprehensive analysis of the practical applications of zero trust in IoT, including the security threats present in the IoT, analyzing the security challenges and potential attack vectors across different layers, such as the perception, network, and application layers. The paper also develops a mapping structure that encompasses threat locations, vulnerabilities, application scenarios, types of attack, zero trust solutions, and core technologies for each layer of IoT. The paper discusses the concept of zero trust security, its architecture, and core technologies. It also analyzes the research landscape of zero trust, including the growth of publications, performance of leading players and their collaborations, understanding of underlying knowledge structures, identification of hot and emerging topics in the field of zero trust, and thorough analysis of zero trust in IoT. The paper also discusses the application of zero trust in IoT, including the security challenges posed by IoT devices, network architecture, and resource, and the potential solutions to these challenges. The paper also discusses the application of zero trust in cloud computing, blockchain, big data, and edge computing. It highlights the importance of these technologies in enhancing the security of zero trust architectures. The paper concludes that zero trust is a crucial technology for network security and is gaining increasing recognition in governments, corporations, and academic institutions. The study aims to provide a comprehensive analysis of zero trust in IoT and to guide future research in this area.
Reach us at info@study.space