Dissecting zero trust: research landscape and its implementation in IoT

3Citations
Citations of this article
58Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis. We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes. Nevertheless, the challenges associated with implementing zero trust security are acknowledged. We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges. Ultimately, this study aims to serve as a strategic analysis of the zero trust model, intending to empower scholars in the field to pursue deeper and more focused research in the future.

Cite

CITATION STYLE

APA

Liu, C., Tan, R., Wu, Y., Feng, Y., Jin, Z., Zhang, F., … Liu, Q. (2024, December 1). Dissecting zero trust: research landscape and its implementation in IoT. Cybersecurity. Springer Science and Business Media B.V. https://doi.org/10.1186/s42400-024-00212-0

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free