A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model

Poonam Dhiman, Neha Saini, Yonis Gulzar, Sherzod Turaev, Amandeep Kaur, Khair Ul Nisa, Yasir Hamid

Research output: Contribution to journalReview articlepeer-review

4 Citations (Scopus)

Abstract

The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The survey begins by examining the role of authentication and access control within Zero Trust Architectures, and subsequently investigates innovative authentication, as well as access control solutions across different scenarios. It more deeply explores traditional techniques for encryption, micro-segmentation, and security automation, emphasizing their importance in achieving a secure Zero Trust environment. Zero Trust Architecture is explained in brief, along with the Taxonomy of Zero Trust Network Features. This review article provides useful insights into the Zero Trust paradigm, its approaches, problems, and future research objectives for scholars, practitioners, and policymakers. This survey contributes to the growth and implementation of secure network architectures in critical infrastructures by developing a deeper knowledge of Zero Trust.

Original languageEnglish
Article number1328
JournalSensors
Volume24
Issue number4
DOIs
Publication statusPublished - Feb 2024

Keywords

  • authentication
  • blockchain
  • cloud computing
  • network security
  • zero trust (ZT)

ASJC Scopus subject areas

  • Analytical Chemistry
  • Information Systems
  • Atomic and Molecular Physics, and Optics
  • Biochemistry
  • Instrumentation
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model'. Together they form a unique fingerprint.

Cite this