Zero Trust Architecture for IoT: Strategies to Prevent Unauthorized Access in Connected Networks
Keywords:
Zero-Trust, IoT, Networks, ArchitectureAbstract
IoT devices present critical security challenges due to the exponential fall of the number of devices. The existing traditional models have failed in a dynamically changing threat environment and Zero Trust Architecture (ZTA) has come into being. To achieve this, this paper presents a lightweight Zero Trust based and blockchain integrated model for IoT ecosystems that enhances authentication, trust evaluation, anomaly detection while at the same time minimizes resource overhead.
Downloads
References
Shaik, M., Srinivasan Venkataramanan, & Ashok Kumar Reddy Sadhu. (2020). Fortifying the Expanding Internet of Things Landscape: A Zero Trust Network Architecture Approach for Enhanced Security and Mitigating Resource Constraints. Journal of Science & Technology, 1(1), 170–192. Retrieved from https://thesciencebrigade.com/jst/article/view/220
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207
Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18-34. https://doi.org/10.1080/10919392.2020.1831870
Chen, Z., Yan, L., Lü, Z., Zhang, Y., Guo, Y., Liu, W., & Xuan, J. (2021). Research on Zero-trust Security Protection Technology of Power IoT based on Blockchain. Journal of Physics Conference Series, 1769(1), 012039. https://doi.org/10.1088/1742-6596/1769/1/012039
Kaul, D. (2019). Blockchain-Powered Cyber-Resilient Microservices: AI-Driven Intrusion Prevention with Zero-Trust Policy Enforcement. http://dx.doi.org/10.2139/ssrn.5096255
Eliyan, L. F., & Di Pietro, R. (2021). DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. https://doi.org/10.1016/j.future.2021.03.011
Băjinaru, I. C., & Căruţaşu, G. (2021). Cyber security-awareness & zero trust model in public domain. Journal of Information Systems & Operations Management, 15(2), 3-13. http://93.113.252.6/websites/jisom/Vol.15%20No.2%20-%202021/JISOM%2015.2_3-13.pdf
Bobbert, Y., & Scheerder, J. (2020). Zero trust validation: from practical approaches to theory. Sci. J. Res. Rev, 2(5), 830-848. https://api.semanticscholar.org/CorpusID:234723699
Farahani, B., Firouzi, F., & Luecking, M. (2021). The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. Journal of Network and Computer Applications, 177, 102936. https://doi.org/10.1016/j.jnca.2020.102936
Faisal, M., Ali, I., Khan, M. S., Kim, S. M., & Kim, J. (2020). Establishment of trust in internet of things by integrating trusted platform module: To counter cybersecurity challenges. Complexity, 2020(1), 6612919. https://doi.org/10.1155/2020/6612919
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.