{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:23:49Z","timestamp":1776205429784,"version":"3.50.1"},"reference-count":87,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T00:00:00Z","timestamp":1752796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology environment, Internet of Things environment and smart home devices. These compromises are not just about data breaches or data exfiltration, but also about unauthorised access to devices that are not configured correctly and vulnerabilities in software components, which usually lead to insecure authentication and authorisation. Incorrect configurations are usually in the form of devices being made available on the Internet (public domain), reusable credentials, access granted without verifying the requestor, and easily available credentials like default credentials. Organisations seeking to address the dual pressure of demonstrating steps in the right direction and addressing unauthorised access to resources can find a viable approach in the form of the zero trust concept. Zero trust principles are about moving security controls closer to the data, applications, assets and services and are based on the principle of \u201cnever trust, always verify\u201d. As it stands today, zero trust research has advanced far beyond the concept of \u201cnever trust, always verify\u201d. This paper provides the culmination of a literature review of research conducted in the space of smart home devices and IoT and the applicability of the zero trust five-step implementation process to secure them. We discuss the history of zero trust, the tenets of zero trust, the five-step implementation process for zero trust, and its adoption for smart home devices and Internet of Things, and we provide suggestions for future research.<\/jats:p>","DOI":"10.3390\/fi17070313","type":"journal-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T11:12:34Z","timestamp":1752837154000},"page":"313","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions"],"prefix":"10.3390","volume":"17","author":[{"given":"Shruti","family":"Kulkarni","sequence":"first","affiliation":[{"name":"Cybersecurity Research Lab, School of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8819-5831","authenticated-orcid":false,"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Lab, School of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"given":"Stilianos","family":"Vidalis","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Lab, School of Physics, Engineering and Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,18]]},"reference":[{"key":"ref_1","unstructured":"Juniper (2024, August 20). The Rise of Zero Trust|White Paper. Available online: https:\/\/www.juniper.net\/content\/dam\/www\/assets\/white-papers\/us\/en\/security\/the-rise-of-zero-trust.pdf."},{"key":"ref_2","unstructured":"CloudSecurityAlliance (2024, July 12). Defining the Zero Trust Protect Surface. Available online: https:\/\/cloudsecurityalliance.org\/artifacts\/defining-the-zero-trust-protect-surface."},{"key":"ref_3","unstructured":"Amazon and Google (2024, September 08). Amazon, Google Back Global Cybersecurity Standard for Smart Home Devices. Available online: https:\/\/www.pymnts.com\/cybersecurity\/2024\/amazon-google-back-global-cybersecurity-standard-for-smart-home-devices\/."},{"key":"ref_4","unstructured":"The White House (2023). Biden-Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers, The White House."},{"key":"ref_5","unstructured":"NIST (2024, August 14). SP 800-207, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf."},{"key":"ref_6","unstructured":"Kerman, A. (2024, September 20). Zero Trust Cybersecurity: \u2018Never Trust, Always Verify\u2019, Available online: https:\/\/www.nist.gov\/blogs\/taking-measure\/zero-trust-cybersecurity-never-trust-always-verify."},{"key":"ref_7","unstructured":"CISA (2024, September 12). Nstac Report to the President. NSTAC Report to the President on Communications Resiliency, Available online: https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management%20(10-17-22).pdf."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Gritzalis, D., Choo, K.R., and Patsakis, C. (2025). Preventing and Detecting Malware in Smart Environments. The Smart Home Case. Malware: Handbook of Prevention and Detection, Springer Nature.","DOI":"10.1007\/978-3-031-66245-4"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mylonas, A., Gritzalis, D., Tsoumas, B., and Apostolopoulos, T. (2013). A qualitative metrics vector for the awareness of smartphone security users. Trust, Privacy, and Security in Digital Business, Proceedings of the 10th International Conference, TrustBus 2013, Prague, Czech Republic, 28\u201329 August 2013, Springer. Proceedings 10.","DOI":"10.1007\/978-3-642-40343-9_15"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","article-title":"Delegate the smartphone user? Security awareness in smartphone platforms","volume":"34","author":"Mylonas","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103687","DOI":"10.1016\/j.cose.2023.103687","article-title":"Smart homes under siege: Assessing the robustness of physical security against wireless network attacks","volume":"139","author":"Allen","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s10796-021-10199-5","article-title":"Future industry internet of things with zero-trust security","volume":"26","author":"Li","year":"2024","journal-title":"Inf. Syst. Front."},{"key":"ref_13","unstructured":"Blog, J.K. (2024, October 20). Protect Surface and Attack Surface. Available online: https:\/\/www.illumio.com\/blog\/john-kindervag-zero-trust-government-agencies#:%20:text=Define%20your%20protect%20surface:%20You,element,%20service,%20or%20asset."},{"key":"ref_14","unstructured":"Assistants, H. (2024, October 21). List of Available Integrations with Home Assistant. Available online: https:\/\/www.home-assistant.io\/integrations\/."},{"key":"ref_15","unstructured":"CSA (2024, October 23). Map the Transaction Flows for Zero Trust. Available online: https:\/\/cloudsecurityalliance.org\/artifacts\/map-the-transaction-flows-for-zero-trust."},{"key":"ref_16","unstructured":"Marsh, S.P. (2024, August 15). Formalising Trust as a Computational Concept. Available online: https:\/\/www.cs.stir.ac.uk\/~kjt\/techreps\/pdf\/TR133.pdf."},{"key":"ref_17","unstructured":"Herzog, P., Barcel\u00f3, M., Chiesa, R., Ivaldi, M., Guasconi, F., Sensibile, F., Rudolph, H., Brown, A., Mitchell, R., and Feist, R. (2024, September 20). Open-Source Security Testing Methodology Manual. Available online: https:\/\/www.isecom.org\/OSSTMM.3.pdf."},{"key":"ref_18","unstructured":"Herzog, P. (2024, October 24). OSSTMM 3.0. Available online: https:\/\/dl.packetstormsecurity.net\/papers\/unix\/osstmm.pdf."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1177\/03063127231221107","article-title":"The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity","volume":"54","author":"Spencer","year":"2024","journal-title":"Soc. Stud. Sci."},{"key":"ref_20","unstructured":"Jericho (2024, October 20). Forum, \u201cJericho Forum\u2122 Commandments,\u201d. Available online: https:\/\/collaboration.opengroup.org\/jericho\/commandments_v1.2.pdf."},{"key":"ref_21","unstructured":"Assun\u00e7\u00e3o, P. (2019, January 16). A zero trust approach to network security. Proceedings of the Digital Privacy and Security Conference, Porto, Portugal."},{"key":"ref_22","first-page":"1","article-title":"No more chewy centers: Introducing the zero trust model of information security","volume":"3","author":"Kindervag","year":"2010","journal-title":"Forrester Res."},{"key":"ref_23","unstructured":"Kindervag, J. (2025, January 31). Build Security into Your Network\u2019s DNA: The Zero Trust Network Architecture. Available online: https:\/\/www.forrester.com\/report\/Build-Security-Into-Your-Networks-DNA-The-Zero-Trust-Network-Architecture\/RES57047."},{"key":"ref_24","unstructured":"U.S.D. of Defense (2025, January 20). Department of Defense (DoD) Zero Trust Reference Architecture, Available online: https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v2.0(U)_Sep22.pdf."},{"key":"ref_25","unstructured":"NSA (2025, February 06). Embracing a Zero Trust Security Model, Available online: https:\/\/media.defense.gov\/2021\/Feb\/25\/2002588479\/-1\/-1\/0\/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF."},{"key":"ref_26","unstructured":"CISA (2025, February 06). Zero Trust Maturity Model, Available online: https:\/\/www.cisa.gov\/sites\/default\/files\/2023-04\/zero_trust_maturity_model_v2_508.pdf."},{"key":"ref_27","unstructured":"Office Of MANAGEMENT and BUDGET (2025, February 06). Moving the U.S. Government Toward Zero Trust Cybersecurity Principles, Available online: https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf."},{"key":"ref_28","unstructured":"Google (2025, June 13). Zero Trust Five Step Implementation Process. Available online: https:\/\/services.google.com\/fh\/files\/misc\/zt_implem_guide_800_27.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"102436","DOI":"10.1016\/j.cose.2021.102436","article-title":"Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust","volume":"110","author":"Buck","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"6476274","DOI":"10.1155\/2022\/6476274","article-title":"A survey on zero trust architecture: Challenges and future trends","volume":"2022","author":"He","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"101227","DOI":"10.1016\/j.iot.2024.101227","article-title":"Verify and trust: A multidimensional survey of zero-trust security in the age of IoT","volume":"27","author":"Azad","year":"2024","journal-title":"Internet Things"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"103472","DOI":"10.1016\/j.cose.2023.103472","article-title":"Access control in Internet of Things: A survey","volume":"135","author":"Trabelsi","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K.U., and Hamid, Y. (2024). A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model. Sensors, 24.","DOI":"10.3390\/s24041328"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"100492","DOI":"10.1016\/j.iot.2021.100492","article-title":"Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives","volume":"18","author":"Alagheband","year":"2022","journal-title":"Internet Things"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"e318","DOI":"10.1002\/spy2.318","article-title":"A comprehensive study on cybersecurity challenges and opportunities in the IoT world","volume":"6","author":"Lone","year":"2023","journal-title":"Secur. Priv."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kang, H., Liu, G., Wang, Q., Meng, L., and Liu, J. (2023). Theory and Application of Zero Trust Security: A Brief Survey. Entropy, 25.","DOI":"10.3390\/e25121595"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MC.2020.3011081","article-title":"Beyond zero trust: Trust is a vulnerability","volume":"53","author":"Campbell","year":"2020","journal-title":"Computer"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2022.3178813","article-title":"Can You Trust Zero Trust?","volume":"55","author":"Michael","year":"2022","journal-title":"Computer"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"43","DOI":"10.52783\/jes.2356","article-title":"A Blockchain Empowered Smart Home Access Scheme Based on Zero-trust Architecture","volume":"20","author":"Liu","year":"2024","journal-title":"J. Electr. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero trust architecture (zta): A comprehensive survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Da Silva, G.R., and Santos, A.L.D. (2024). Adaptive Access Control for Smart Homes Supported by Zero Trust for User Actions. IEEE Trans. Netw. Serv. Manag.","DOI":"10.1109\/TNSM.2024.3492379"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Da Silva, G.R., Macedo, D.F., and Santos, A.L.D. (2021). Zero trust access control with context-aware and behavior-based continuous authentication for smart homes. Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg), Sociedade Brasileira de Computa\u00e7\u00e3o.","DOI":"10.5753\/sbseg.2021.17305"},{"key":"ref_43","first-page":"9641143","article-title":"The development of privacy protection standards for smart home","volume":"2022","author":"Liu","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Prasad, S.G., Badrinarayanan, M.K., and Sharmila, V.C. (2023, January 6\u20138). Internet of Things (IoT): Resilience as a key Parameter in Security Management. Proceedings of the 2023 4th IEEE Global Conference for Advancement in Technology (GCAT), Bengaluru, India.","DOI":"10.1109\/GCAT59970.2023.10353486"},{"key":"ref_45","first-page":"1","article-title":"An Anonymous and Supervisory Cross-Chain Privacy Protection Protocol for Zero-Trust IoT Application","volume":"20","author":"Yang","year":"2024","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TC.2022.3157996","article-title":"A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things","volume":"72","author":"Liu","year":"2022","journal-title":"IEEE Trans. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Dimitrakos, T., Dilshener, T., Kravtsov, A., La Marra, A., Martinelli, F., Rizos, A., Rosetti, A., and Saracino, A. (January, January 29). Trust aware continuous authorization for zero trust in consumer internet of things. Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China.","DOI":"10.1109\/TrustCom50675.2020.00247"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"7026779","DOI":"10.1155\/2022\/7026779","article-title":"SoK: Context and risk aware access control for zero trust systems","volume":"2022","author":"Xiao","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Colombo, P., Ferrari, E., and T\u00fcmer, E.D. (2021, January 13\u201315). Access Control Enforcement in IoT: State of the art and open challenges in the Zero Trust era. Proceedings of the 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA.","DOI":"10.1109\/TPSISA52974.2021.00018"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/s11633-023-1456-2","article-title":"Automation and orchestration of zero trust architecture: Potential solutions and challenges","volume":"21","author":"Cao","year":"2024","journal-title":"Mach. Intell. Res."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"102351","DOI":"10.1016\/j.cose.2021.102351","article-title":"LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)","volume":"108","author":"Shah","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"103161","DOI":"10.1016\/j.adhoc.2023.103161","article-title":"ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments","volume":"145","author":"Huang","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Federici, F., Martintoni, D., and Senni, V. (2023). A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures. Electronics, 12.","DOI":"10.3390\/electronics12030566"},{"key":"ref_54","unstructured":"Cloud. Security. Alliance (2025, March 18). Software Defined Perimeter. Available online: https:\/\/cloudsecurityalliance.org\/artifacts\/software-defined-perimeter-zero-trust-specification-v2."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MCOM.001.2300390","article-title":"Toward Zero-Trust IoT Networks via Per-Packet Authorization","volume":"62","author":"Zhang","year":"2024","journal-title":"IEEE Commun. Mag."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Ragothaman, K., Wang, Y., Rimal, B., and Lawrence, M. (2023). Access control for IoT: A survey of existing research, dynamic policies and future directions. Sensors, 23.","DOI":"10.3390\/s23041805"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Awan, S.M., Azad, M.A., Arshad, J., Waheed, U., and Sharif, T. (2023). A blockchain-inspired attribute-based zero-trust access control model for IoT. Information, 14.","DOI":"10.3390\/info14020129"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Samaniego, M., and Deters, R. (2018, January 2\u20137). Zero-trust hierarchical management in IoT. Proceedings of the 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, USA.","DOI":"10.1109\/ICIOT.2018.00019"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/10919392.2020.1831870","article-title":"Securing IoT devices using zero trust and blockchain","volume":"31","author":"Dhar","year":"2021","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"103414","DOI":"10.1016\/j.adhoc.2024.103414","article-title":"Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures","volume":"156","author":"Zanasi","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"De Almeida, A.O., and Salvador, L.R. (2024, January 19\u201321). Securing IoT Devices: ZTA Principles and Network Slicing. Proceedings of the 2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY), Pula, Croatia.","DOI":"10.1109\/SISY62279.2024.10737622"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Bast, C., and Yeh, K.-H. (2024). Emerging Authentication Technologies for Zero Trust on the Internet of Things. Symmetry, 16.","DOI":"10.20944\/preprints202407.0053.v1"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Vanickis, R., Jacob, P., Dehghanzadeh, S., and Lee, B. (2018, January 21\u201322). Access control policy enforcement for zero-trust-networking. Proceedings of the 2018 29th Irish Signals and Systems Conference (ISSC), Belfast, UK.","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Ameer, S., Gupta, M., Bhatt, S., and Sandhu, R. (2022, January 8\u201310). Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, New York, NY, USA.","DOI":"10.1145\/3532105.3535020"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1155\/2022\/6367579","article-title":"PUFDCA: A Zero-Trust-Based IoT Device Continuous Authentication Protocol","volume":"2022","author":"Alshomrani","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"198","DOI":"10.23919\/JCC.2022.08.015","article-title":"A continuous authentication protocol without trust authority for zero trust architecture","volume":"19","author":"Meng","year":"2022","journal-title":"China Commun."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"109068","DOI":"10.1016\/j.comnet.2022.109068","article-title":"A novel zero-trust network access control scheme based on the security profile of devices and users","volume":"212","author":"Camacho","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"DeCusatis, C., Liengtiraphan, P., Sager, A., and Pinelli, M. (2016, January 18\u201320). Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication. Proceedings of the 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA.","DOI":"10.1109\/SmartCloud.2016.22"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Sarkar, S., Choudhary, G., Shandilya, S.K., Hussain, A., and Kim, H. (2022). Security of zero trust networks in cloud computing: A comparative review. Sustainability, 14.","DOI":"10.3390\/su141811213"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Elmaghbub, A., and Hamdaoui, B. (2024). Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. arXiv.","DOI":"10.1109\/MWC.001.2300420"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"1","DOI":"10.61185\/SMIJ.2023.33106","article-title":"Revisiting Zero-Trust Security for Internet of Things","volume":"3","author":"Ismail","year":"2023","journal-title":"Sustain. Mach. Intell. J."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"45893","DOI":"10.1109\/ACCESS.2022.3169137","article-title":"The \u201cCyber Security via Determinism\u201d Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)","volume":"10","author":"Szymanski","year":"2022","journal-title":"IEEE Access"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1080\/00207543.2021.1884311","article-title":"The zero trust supply chain: Managing supply chain risk in the absence of trust","volume":"59","author":"Collier","year":"2021","journal-title":"Int. J. Prod. Res."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"3202","DOI":"10.1109\/TCAD.2021.3127864","article-title":"ACED-IT: Assuring Confidential Electronic Design Against Insider Threats in a Zero-Trust Environment","volume":"41","author":"Stern","year":"2021","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MSEC.2024.3432208","article-title":"Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things","volume":"22","author":"Crowther","year":"2024","journal-title":"IEEE Secur. Priv."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MC.2023.3329672","article-title":"Resilient Without Zero Trust","volume":"57","author":"Swearingen","year":"2024","journal-title":"Computer"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"4327","DOI":"10.1109\/TII.2023.3321106","article-title":"Physical Layer Enhanced Zero-Trust Security for Wireless Industrial Internet of Things","volume":"20","author":"Lei","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/OJCS.2024.3505056","article-title":"Emerging Technologies Driving Zero Trust Maturity Across Industries","volume":"6","author":"Joshi","year":"2024","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref_79","unstructured":"The White House (2024, September 21). Improving the Nation\u2019s Cybersecurity, Available online: https:\/\/www.gsa.gov\/technology\/government-it-initiatives\/cybersecurity\/executive-order-14028."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"94753","DOI":"10.1109\/ACCESS.2024.3425350","article-title":"A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks","volume":"12","author":"Nahar","year":"2024","journal-title":"IEEE Access"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"154066","DOI":"10.1109\/ACCESS.2024.3484522","article-title":"A Zero-Trust Authentication Scheme With Access Control for 6G-enabled IoT Environments","volume":"12","author":"Son","year":"2024","journal-title":"IEEE Access"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"HKholidy, A., Disen, K., Karam, A., Benkhelifa, E., Rahman, M.A., Rahman, A.-U., Almazyad, I., Sayed, A.F., and Jaziri, R. (2023, January 4\u20137). Secure the 5G and beyond networks with zero trust and access control systems for cloud native architectures. Proceedings of the 2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt.","DOI":"10.1109\/AICCSA59173.2023.10479308"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Nie, S., Ren, J., Wu, R., Han, P., Han, Z., and Wan, W. (2025). Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment. Sensors, 25.","DOI":"10.3390\/s25020550"},{"key":"ref_84","unstructured":"Alliance, Cyber Management (2025, April 21). Biggest Cyber Attacks, Ransomware Attacks, Data Breaches of March 2025. Available online: https:\/\/www.cm-alliance.com\/cybersecurity-blog\/biggest-cyber-attacks-ransomware-attacks-data-breaches-of-march-2025."},{"key":"ref_85","unstructured":"Kosinski, M., and Holdsworth, J. (2025, April 01). What is ransomware as a service (RaaS)?. Available online: https:\/\/www.ibm.com\/think\/topics\/ransomware-as-a-service."},{"key":"ref_86","unstructured":"Kindervag, J. (2025, April 22). Define a Protect Surface to Massively Reduce Your Attack Surface. Available online: https:\/\/www.paloaltonetworks.com\/blog\/2018\/09\/define-protect-surface-massively-reduce-attack-surface\/."},{"key":"ref_87","unstructured":"Gartner (2025, April 22). Gartner Says a Typical Family Home Could Contain More Than 500 Smart Devices by 2022. Available online: https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2014-09-08-gartner-says-a-typical-family-home-could-contain-more-than-500-smart-devices-by-2022."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/313\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:12:07Z","timestamp":1760033527000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,18]]},"references-count":87,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["fi17070313"],"URL":"https:\/\/doi.org\/10.3390\/fi17070313","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,18]]}}}