Author:
Liu Chunwen,Tan Ru,Wu Yang,Feng Yun,Jin Ze,Zhang Fangjiao,Liu Yuling,Liu Qixu
Abstract
AbstractAs a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis. We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes. Nevertheless, the challenges associated with implementing zero trust security are acknowledged. We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges. Ultimately, this study aims to serve as a strategic analysis of the zero trust model, intending to empower scholars in the field to pursue deeper and more focused research in the future.
Funder
Institute of Information Engineering, Chinese Academy of Sciences
Publisher
Springer Science and Business Media LLC
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Emerging Authentication Technologies for Zero Trust on the Internet of Things;Symmetry;2024-08-05
2. Blockchain-Enhanced Neural Networks for Secure IoT and 5G in Smart Cities;2024 1st International Conference on Innovative Sustainable Technologies for Energy, Mechatronics, and Smart Systems (ISTEMS);2024-04-26