Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions

Shruti Kulkarni, Alexios Mylonas, Stilianos Vidalis, Dimitris Karampatzakis (Editor), Thomas Lagkas (Editor), Kalliopi Kravari (Editor)

Research output: Contribution to journalReview articlepeer-review

1 Citation (Scopus)

Abstract

There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology environment, Internet of Things environment and smart home devices. These compromises are not just about data breaches or data exfiltration, but also about unauthorised access to devices that are not configured correctly and vulnerabilities in software components, which usually lead to insecure authentication and authorisation. Incorrect configurations are usually in the form of devices being made available on the Internet (public domain), reusable credentials, access granted without verifying the requestor, and easily available credentials like default credentials. Organisations seeking to address the dual pressure of demonstrating steps in the right direction and addressing unauthorised access to resources can find a viable approach in the form of the zero trust concept. Zero trust principles are about moving security controls closer to the data, applications, assets and services and are based on the principle of “never trust, always verify”. As it stands today, zero trust research has advanced far beyond the concept of “never trust, always verify”. This paper provides the culmination of a literature review of research conducted in the space of smart home devices and IoT and the applicability of the zero trust five-step implementation process to secure them. We discuss the history of zero trust, the tenets of zero trust, the five-step implementation process for zero trust, and its adoption for smart home devices and Internet of Things, and we provide suggestions for future research.
Original languageEnglish
Article number313
Number of pages35
JournalFuture Internet
Volume17
Issue number7
Early online date18 Jul 2025
DOIs
Publication statusPublished - Jul 2025

Keywords

  • protect surface
  • smart home
  • transaction flows
  • zero trust
  • IoT
  • authorisation
  • zero trust policy
  • authentication
  • zero trust architecture
  • zero trust five-step implementation process

Fingerprint

Dive into the research topics of 'Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions'. Together they form a unique fingerprint.

Cite this