Open Access Open Access  Restricted Access Subscription Access

Emerging Authentication Technologies for Zero Trust in IoT Systems

Vinod Veeramachaneni

Abstract


This paper investigates the integration of advanced authentication technologies to establish Zero Trust security frameworks within Internet of Things (IoT) ecosystems. Due to IoT's distributed and resource-constrained nature, traditional security mechanisms prove insufficient, necessitating more robust, adaptive solutions. Our study addresses this gap by implementing a Zero Trust model through lightweight cryptographic techniques suited to IoT devices, mutual authentication protocols to ensure reciprocal identity verification between devices and networks, and blockchain technology for decentralized, tamper-proof identity management. Using a simulated IoT environment, we assessed key performance metrics, such as security enhancement, latency reduction, and energy efficiency. Results indicate that mutual authentication and blockchain, when combined, significantly improve overall security while minimizing latency and computational load, making the framework viable for real-time, resource-limited IoT applications. The findings support that these Zero Trust authentication technologies provide a scalable and resilient approach, effectively mitigating the security vulnerabilities inherent in IoT networks and promising wide-scale applicability in critical IoT-dependent sectors.


Full Text:

PDF

References


Sedjelmaci H, Ansari N. Zero trust architecture empowered attack detection framework to secure 6g edge computing. IEEE Network. 2023 Jan 30;38(1):196-202.

Sharma R, Chan CA, Leckie C. Probabilistic distributed intrusion detection for zero-trust multi-access edge computing. In NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium 2023 May 8 (pp. 1-9). IEEE.

Lei W, Pang Z, Wen H, Hou W, Zhang X. Edge-enabled zero trust architecture for ICPS with spatial and temporal granularity. In2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS) 2023 May 8 (pp. 1-6). IEEE.

Feng Z, Zhou P, Wang Q, Qi W. A dual-layer zero trust architecture for 5G industry MEC applications access control. In2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT) 2022 Aug 21 (pp. 100-105). IEEE.

Meng L, Huang D, An J, Zhou X, Lin F. A continuous authentication protocol without trust. authority for zero trust architecture. China Communications. 2022 Aug 17;19(8):198-213.

Mandal S, Khan DA, Jain S. Cloud-based zero trust access control policy: an approach to support work-from-home driven by COVID-19 pandemic. new generation computing. 2021 Nov;39(3):599-622.

Li S, Iqbal M, Saxena N. Future industry internet of things with zero-trust security. Information Systems Frontiers. 2022 Mar 10:1-4.

Alagappan A, Venkatachary SK, Andrews LJ. Augmenting Zero Trust Network Architecture to enhance security in virtual power plants. Energy Reports. 2022 Nov 1;8:1309-20.

Zhang L, Zou Y, Wang W, Jin Z, Su Y, Chen H. Resource allocation and trust computing for blockchain-enabled edge computing system. Computers & Security. 2021 Jun 1;105:102249.

da Silva GR, Macedo DF, dos Santos AL. Zero trust access control with context-aware and behavior-based continuous authentication for smart homes. In Simpósio Brasileiro de Segurança da In formação e de Sistemas Computacionais (SBSeg) 2021 Oct 4 (pp. 43-56). SBC.


Refbacks

  • There are currently no refbacks.