Zero Trust Architecture for IoT: Strategies to Prevent Unauthorized Access in Connected Networks

Authors

  • Sai Charan Madugula

Keywords:

Zero-Trust, IoT, Networks, Architecture

Abstract

IoT devices present critical security challenges due to the exponential fall of the number of devices. The existing traditional models have failed in a dynamically changing threat environment and Zero Trust Architecture (ZTA) has come into being. To achieve this, this paper presents a lightweight Zero Trust based and blockchain integrated model for IoT ecosystems that enhances authentication, trust evaluation, anomaly detection while at the same time minimizes resource overhead.

DOI: https://doi.org/10.17762/ijisae.v10i3s.7460

Downloads

Download data is not yet available.

References

Shaik, M., Srinivasan Venkataramanan, & Ashok Kumar Reddy Sadhu. (2020). Fortifying the Expanding Internet of Things Landscape: A Zero Trust Network Architecture Approach for Enhanced Security and Mitigating Resource Constraints. Journal of Science & Technology, 1(1), 170–192. Retrieved from https://thesciencebrigade.com/jst/article/view/220

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207

Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18-34. https://doi.org/10.1080/10919392.2020.1831870

Chen, Z., Yan, L., Lü, Z., Zhang, Y., Guo, Y., Liu, W., & Xuan, J. (2021). Research on Zero-trust Security Protection Technology of Power IoT based on Blockchain. Journal of Physics Conference Series, 1769(1), 012039. https://doi.org/10.1088/1742-6596/1769/1/012039

Kaul, D. (2019). Blockchain-Powered Cyber-Resilient Microservices: AI-Driven Intrusion Prevention with Zero-Trust Policy Enforcement. http://dx.doi.org/10.2139/ssrn.5096255

Eliyan, L. F., & Di Pietro, R. (2021). DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. https://doi.org/10.1016/j.future.2021.03.011

Băjinaru, I. C., & Căruţaşu, G. (2021). Cyber security-awareness & zero trust model in public domain. Journal of Information Systems & Operations Management, 15(2), 3-13. http://93.113.252.6/websites/jisom/Vol.15%20No.2%20-%202021/JISOM%2015.2_3-13.pdf

Bobbert, Y., & Scheerder, J. (2020). Zero trust validation: from practical approaches to theory. Sci. J. Res. Rev, 2(5), 830-848. https://api.semanticscholar.org/CorpusID:234723699

Farahani, B., Firouzi, F., & Luecking, M. (2021). The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. Journal of Network and Computer Applications, 177, 102936. https://doi.org/10.1016/j.jnca.2020.102936

Faisal, M., Ali, I., Khan, M. S., Kim, S. M., & Kim, J. (2020). Establishment of trust in internet of things by integrating trusted platform module: To counter cybersecurity challenges. Complexity, 2020(1), 6612919. https://doi.org/10.1155/2020/6612919

Downloads

Published

29.12.2022

How to Cite

Sai Charan Madugula. (2022). Zero Trust Architecture for IoT: Strategies to Prevent Unauthorized Access in Connected Networks. International Journal of Intelligent Systems and Applications in Engineering, 10(3s), 334 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7460

Issue

Section

Research Article