As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to e...As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis.We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes.Nevertheless,the challenges associated with implementing zero trust security are acknowledged.We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges.Ultimately,this study aims to serve as a strategic analysis of the zero trust model,intending to empower scholars in the field to pursue deeper and more focused research in the future.展开更多
基金supported by the Youth Innovation Promotion Association CAS,the Foundation Strengthening Program Technical Area Fund(No.2021-JCJQJJ-0908)the Climbing Program of the Institute of Information Engineering,Chinese Academy of Sciences(No.E3Z0071116)the Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network security and Protection Technology.
文摘As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis.We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes.Nevertheless,the challenges associated with implementing zero trust security are acknowledged.We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges.Ultimately,this study aims to serve as a strategic analysis of the zero trust model,intending to empower scholars in the field to pursue deeper and more focused research in the future.