Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review

Authors

  • Avijit Roy Dept. Of CSE (Batch-Sum-14), North Western University, Khulna, Bangladesh
  • Anik Dhar CSE Dept. (Batch: 004), Port City International University
  • Sejuti Sarker Tinny Viqarunnisa Noon School and College, Bailey Road, Dhaka, Bangladesh https://orcid.org/0009-0003-0834-5302

DOI:

https://doi.org/10.61424/jcsit.v1i1.105

Keywords:

Internet of Things, Smart cities, Zero Trust Architecture, Cyber threats, Data privacy

Abstract

The exponential growth of the Internet of Things (IoT) has revolutionized various sectors by enhancing connectivity and automation. However, this rapid proliferation has also introduced significant cybersecurity challenges, exacerbated by the inherent vulnerabilities of IoT devices and networks. Traditional security mechanisms, which often rely on perimeter-based defenses, are proving inadequate in addressing the complex and dynamic threat landscape associated with IoT environments. This comprehensive review explores the application of Zero Trust Architecture (ZTA) as a robust cybersecurity paradigm to fortify IoT ecosystems. Zero Trust principles advocate for the elimination of implicit trust, continuous verification, and strict access controls. By systematically evaluating existing literature, case studies, and industry practices, this paper provides an in-depth analysis of the effectiveness of ZTA in mitigating IoT-specific threats. The review also identifies implementation challenges and offers strategic recommendations for integrating Zero Trust principles into IoT frameworks. Through this exploration, the study aims to contribute to the development of resilient IoT systems capable of withstanding sophisticated cyber threats while maintaining operational efficiency and security.

Downloads

Published

2024-09-03

How to Cite

Roy, A., Dhar, A., & Tinny, S. S. (2024). Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review. Journal of Computer Science and Information Technology, 1(1), 25–50. https://doi.org/10.61424/jcsit.v1i1.105