{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T03:55:23Z","timestamp":1773374123493,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,25]]},"DOI":"10.1145\/3789514.3792057","type":"proceedings-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T18:58:23Z","timestamp":1772477903000},"page":"97-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Seeking Trust in Resource-Constrained Edge Networks with Mobile Agents: Complications with ZTA"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6997-9718","authenticated-orcid":false,"given":"Justin","family":"Henry","sequence":"first","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9206-0643","authenticated-orcid":false,"given":"Derek","family":"Richins","sequence":"additional","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6557-8442","authenticated-orcid":false,"given":"Steven G.","family":"Weldon","sequence":"additional","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3039-5859","authenticated-orcid":false,"given":"Sumesh Kesavamoorthy","family":"Vijayalakshmi","sequence":"additional","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9638-8608","authenticated-orcid":false,"given":"Tim","family":"Price","sequence":"additional","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8254-9440","authenticated-orcid":false,"given":"Waylon","family":"Brunette","sequence":"additional","affiliation":[{"name":"Augusta University, Augusta, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,3,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522152"},{"key":"e_1_3_2_1_2_1","unstructured":"Federal Motor Carrier Safety Administration. 2021. EMERGENCY DECLARATION UNDER 49 CFR \u00a7 390.23. https:\/\/www.fmcsa.dot.gov\/sites\/fmcsa.dot.gov\/files\/2021-05\/ESC-SSC-WSC%20-%20Regional%20Emergency%20Declaration%202021-002%20-%2005-09-2021.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"2023 IEEE\/ACM 23rd Int. Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW).","author":"Jack","unstructured":"Jack Beerman et al. 2023. A Review of Colonial Pipeline Ransomware Attack. In 2023 IEEE\/ACM 23rd Int. Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1507-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"E J Birrane III et al. 2023. Securing Delay-Tolerant Networks with BPSec.","DOI":"10.1002\/9781119823513"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of 15th Conf. on Mobile Systems, Applications, & Services (MobiSys","author":"Waylon","year":"2017","unstructured":"Waylon Brunette et al. 2017. Open Data Kit 2.0: A Services-Based Application Framework for Disconnected Data Management. In Proc. of 15th Conf. on Mobile Systems, Applications, & Services (MobiSys 2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Christoph Buck et al. 2021. Never Trust Always Verify: A Multivocal Literature Review on Current Knowledge and Research Gaps of Zero-Trust. Computers & Security 110(2021).","DOI":"10.1016\/j.cose.2021.102436"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s24020590"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yang Cao et al. 2024. Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges. Machine Intelligence Research 21 2 (2024).","DOI":"10.1007\/s11633-023-1456-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.72"},{"key":"e_1_3_2_1_11_1","unstructured":"Cisco Systems. 2023. Security Outcomes for Zero Trust: Adoption Access and Automation Trends. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zero-trust-outcomes-report.html."},{"key":"e_1_3_2_1_12_1","volume-title":"Secure Manufacturing: The Challenges of IT\/OT Convergence. https:\/\/www.telstrainternational.com\/en\/news-research\/research\/secure-manufacturing-the-challenges-of-IT-OT-convergence.","author":"Etherington Adam","year":"2025","unstructured":"Adam Etherington and Jonathan Ong. 2025. Secure Manufacturing: The Challenges of IT\/OT Convergence. https:\/\/www.telstrainternational.com\/en\/news-research\/research\/secure-manufacturing-the-challenges-of-IT-OT-convergence."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"E. B. Fernandez and A. Brazhuk. 2024. A Critical Analysis of Zero Trust Architecture (ZTA). Computer Standards & Interfaces 89 (2024).","DOI":"10.1016\/j.csi.2024.103832"},{"key":"e_1_3_2_1_14_1","volume-title":"Chapman","author":"Garbis Jason","year":"2021","unstructured":"Jason Garbis and Jerry W. Chapman. 2021. Zero Trust in Practice. In Zero Trust Security: An Enterprise Guide. Apress, Berkeley, CA, 53\u201367."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc.of Hot Mobile","author":"Changshuo","year":"2023","unstructured":"Changshuo Hu et al. 2023. Lightweight and Non-Invasive User Authentication on Earables. In Proc.of Hot Mobile 2023."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Zakira Inayat et al. 2017. Cloud-Based Intrusion Detection and Response System: Open Research Issues and Solutions. Arabian Journal for Science & Engineering 42 (2017).","DOI":"10.1007\/s13369-016-2400-3"},{"key":"e_1_3_2_1_17_1","volume-title":"Measuring Digital Development: Facts and Figures","author":"Union International Telecommunications","year":"2025","unstructured":"International Telecommunications Union. 2025. Measuring Digital Development: Facts and Figures 2025. https:\/\/www.itu.int\/itu-d\/reports\/statistics\/facts-figures-2025\/\/. Accessed January 2026."},{"key":"e_1_3_2_1_18_1","unstructured":"John Kindervag et al. 2010. No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research 3 (2010)."},{"key":"e_1_3_2_1_19_1","volume-title":"Declares Emergency in 17 States Over Fuel Pipeline Cyber Attack. The Hacker News","author":"Lakshmanan Ravie","year":"2021","unstructured":"Ravie Lakshmanan. 2021. U.S. Declares Emergency in 17 States Over Fuel Pipeline Cyber Attack. The Hacker News (2021). https:\/\/thehackernews.com\/2021\/05\/us-declares-emergency-in-17-states-over.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. In International Conference on Risks and Security of Internet and Systems.","author":"Maxime","unstructured":"Maxime Lanvin et al. 2022. Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. In International Conference on Risks and Security of Internet and Systems."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2022.08.015"},{"key":"e_1_3_2_1_22_1","article-title":"Zero Trust Maturity Model And Cyber Resilience in Mobile Money Providers in Nairobi City County, Kenya","volume":"8","author":"Musyoka Samuel Muthoka","year":"2024","unstructured":"Samuel Muthoka Musyoka et al. 2024. Zero Trust Maturity Model And Cyber Resilience in Mobile Money Providers in Nairobi City County, Kenya. Int. J. of Soc. Sci. Mgmt. and Entrep. (IJSSME) 8, 3 (2024).","journal-title":"Int. J. of Soc. Sci. Mgmt. and Entrep. (IJSSME)"},{"key":"e_1_3_2_1_23_1","unstructured":"Okta Inc. 2023. The State of Zero Trust Security 2023. https:\/\/www.okta.com\/sites\/default\/files\/2023-09\/SOZT_Report.pdf."},{"key":"e_1_3_2_1_24_1","article-title":"A Zero-Trust Model for Intrusion Detection in Drone","volume":"14","author":"Said Ouiazzane","year":"2023","unstructured":"Said Ouiazzane et al. 2023. A Zero-Trust Model for Intrusion Detection in Drone Networks. Int. J. Adv. Comput. Sci. Appl 14, 11 (2023).","journal-title":"Networks. Int. J. Adv. Comput. Sci. Appl"},{"key":"e_1_3_2_1_25_1","volume-title":"Oregon Space Grant Consortium Student Symposium.","author":"Parker R. K.","year":"2020","unstructured":"R. K. Parker. 2020. Next Steps: Laying the Groundwork for Bundle Protocol v7. In Oregon Space Grant Consortium Student Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Scott Rose et al. 2020. Zero Trust Architecture. Technical Report. National Institute of Stds. and Tech. doi:10.6028\/NIST.SP.800-207","DOI":"10.6028\/NIST.SP.800-207"},{"key":"e_1_3_2_1_27_1","volume-title":"US fuel pipeline hackers \u2018didn't mean to create problems\u2019. BBC","author":"Russon Mary-Ann","year":"2021","unstructured":"Mary-Ann Russon. 2021. US fuel pipeline hackers \u2018didn't mean to create problems\u2019. BBC (2021). https:\/\/www.bbc.com\/news\/business-57050690"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_29_1","volume-title":"An Internet Architecture for the Challenged. In IAB ITAT Workshop.","author":"Arjuna","unstructured":"Arjuna Sathiaseelan et al. 2013. An Internet Architecture for the Challenged. In IAB ITAT Workshop."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin et al. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018).","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Naeem Firdous Syed et al. 2022. Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE access 10 (2022) 57143\u201357179.","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"e_1_3_2_1_32_1","volume-title":"Medical Devices: Reverse Engineering for Innovation and Advancement in Healthcare. In SoutheastCon","author":"Dillon Tauscher","year":"2024","unstructured":"Dillon Tauscher et al. 2024. Medical Devices: Reverse Engineering for Innovation and Advancement in Healthcare. In SoutheastCon 2024."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"S. Teerakanok et al. 2021. Migrating to Zero Trust Architecture: Reviews & Challenges. Security & Communication Networks 1 (2021).","DOI":"10.1155\/2021\/9947347"},{"issue":"93","key":"e_1_3_2_1_34_1","first-page":"26633","article-title":"Executive Order 14028: Improving the Nation's Cybersecurity","volume":"86","author":"House The White","year":"2021","unstructured":"The White House. 2021. Executive Order 14028: Improving the Nation's Cybersecurity. Federal Register, Vol. 86, No. 93, pp. 26633\u201326647.","journal-title":"Federal Register"},{"key":"e_1_3_2_1_35_1","volume-title":"of War","author":"Dep U.S.","year":"2022","unstructured":"U.S. Dep. of War. 2022. Zero Trust Strategy. https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/DoD-ZTStrategy.pdf."},{"key":"e_1_3_2_1_36_1","volume-title":"Networks: Concepts, Architectures, and Research Landscape","author":"M. Wen","year":"2022","unstructured":"M. Wen et al. 2022. Private 5G Networks: Concepts, Architectures, and Research Landscape. IEEE Jour. Signal Processing 16, 1 (2022)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(94)90017-5"},{"key":"e_1_3_2_1_38_1","volume-title":"Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms","author":"Yiyu Yang","year":"2024","unstructured":"Yiyu Yang et al. 2024. Sharing can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms. IEEE Transactions on Dependable and Secure Computing (2024)."}],"event":{"name":"HotMobile '26: The 27th International Workshop on Mobile Computing Systems and Applications","location":"Atlanta GA USA","acronym":"HotMobile '26","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 27th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3789514.3792057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T17:59:19Z","timestamp":1773338359000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3789514.3792057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":38,"alternative-id":["10.1145\/3789514.3792057","10.1145\/3789514"],"URL":"https:\/\/doi.org\/10.1145\/3789514.3792057","relation":{},"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"2026-03-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}