{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:20:21Z","timestamp":1775082021133,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","award":["PNURSP2026R234"],"award-info":[{"award-number":["PNURSP2026R234"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2026.3654782","type":"journal-article","created":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T20:49:44Z","timestamp":1768510184000},"page":"1312-1327","source":"Crossref","is-referenced-by-count":1,"title":["Standards-Compliant Zero Trust Framework-Based Software-Defined Perimeter (SDP) for Securing Residential IoT Networks"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2715-1015","authenticated-orcid":false,"given":"N. N.","family":"Hari","sequence":"first","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6702-112X","authenticated-orcid":false,"given":"Prabhakar","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2038-1114","authenticated-orcid":false,"given":"Kurunandan","family":"Jain","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"}]},{"given":"Ajay","family":"Bhagvatiprasad Koppaka","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"}]},{"given":"Pasunuri","family":"Abhinav","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6829-9705","authenticated-orcid":false,"given":"Ala Saleh","family":"Alluhaidan","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4971-0340","authenticated-orcid":false,"given":"P.","family":"Prabu","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Threat Landscape for Consumer IoT","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084341"},{"key":"ref3","volume-title":"Iot Security Report","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/SpliTech58164.2023.10193747"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947157"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JPROC.2025.3555131","article-title":"Is trust misplaced? A zero-trust survey","volume":"113","author":"Poirrier","year":"2025","journal-title":"Proc. IEEE"},{"key":"ref7","first-page":"307","article-title":"Flow table modification using behavioral-based fingerprinting technique to facilitate zero trust identity management and access control","volume-title":"Proc. IEEE 15th Annu. Comput. Commun. Workshop Conf. (CCWC)","author":"Morris"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104341"},{"key":"ref9","volume-title":"Manufacturer Usage Description (MUD) for TLS and DTLS Profiles for Internet of Things (IoT) Devices","author":"Wing","year":"2025"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8520","volume-title":"Manufacturer Usage Description Specification","author":"Lear","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/iSES.2018.00066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3554638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2025.3613511"},{"key":"ref14","article-title":"Enhancing and testing smart home security through a mud-enabled environment","author":"Mirto","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-025-01923-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-025-02431-6"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.4018\/979-8-3693-2893-4.ch010","article-title":"NFV and secure cognitive sdn for educational backbone network deployment: Cognitive-enabled routing in SDN","volume-title":"Spectrum and Power Allocation in Cognitive Radio Systems","author":"Majid","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2025.3610857"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3563408"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3434671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3471921"},{"key":"ref22","first-page":"973","article-title":"Enhancing cloud IoT security with blockchain and SDN","volume-title":"Proc. Int. Conf. Commun., Comput. Sci. Eng. (IC3SE)","author":"Kumaran"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"key":"ref24","volume-title":"Software Defined Perimeter Specification V2.0","author":"Alliance","year":"2022"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23160","article-title":"WireGuard: Next generation kernel network tunnel","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Donenfeld"},{"issue":"6","key":"ref26","first-page":"6","article-title":"BeyondCorp: A new approach to enterprise security","volume":"39","author":"Ward","year":"2014","journal-title":";login: Usenix Mag."},{"key":"ref27","volume-title":"Openziti Documentation & Comparisons","year":"2025"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11355708.pdf?arnumber=11355708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:50:07Z","timestamp":1774554607000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11355708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2026.3654782","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}