This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Multi-Vector Adversarial Testing of an AI-Orchestrated Zero Trust Methodology on Constrained Edge Hardware
by
Ian Matthew Campbell Coston
Ian Matthew Campbell Coston 1,2,*
,
Karl David Hezel
Karl David Hezel 2,
Eadan Plotnizky
Eadan Plotnizky 2
and
Mehrdad Nojoumian
Mehrdad Nojoumian 1
1
Department of Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL 33431, USA
2
Cybectr LLC, Ellicott City, MD 21043, USA
*
Author to whom correspondence should be addressed.
Appl. Sci. 2026, 16(10), 4809; https://doi.org/10.3390/app16104809 (registering DOI)
Submission received: 23 April 2026
/
Revised: 3 May 2026
/
Accepted: 8 May 2026
/
Published: 12 May 2026
Abstract
This paper is the empirical validation companion to our prior methodology paper introducing the Automated Zero Trust Risk Management with DevSecOps Integration (AZTRM-D) methodology, conducted through multi-vector adversarial testing on physical NVIDIA Jetson Orin Nano hardware. AZTRM-D unifies DevSecOps automation, the NIST Risk Management Framework, and Zero Trust architecture with AI orchestration via Cybectr Sentinel, featuring six AI subsystems with formal specifications. Testing spanned three progressive hardening stages across seven attack categories under a blind three-tester protocol with inter-rater agreement analysis. Factory-default devices were fully compromised in under five minutes. After full hardening, zero successful breaches were recorded across any tested vector. The CI/CD pipeline achieved a vulnerability detection rate of 96.8% (Wilson 95% CI: [0.891, 0.991]). Sentinel delivered 94.1% precision, 91.8% recall, and 4.2 min average detection time within 12−18% CPU overhead on edge hardware. A 14-capability comparative analysis against five established frameworks found seven capabilities unique to AZTRM-D. The 93.7% adversarial detection rate is reported against DiCE-generated counterfactual inputs and is bounded by the black-box threat model used in evaluation; gradient-based white-box attack evaluation is documented as a scoped Stage 4 future-work item. All three testers are affiliated with Cybectr LLC, the developer of AZTRM-D and Cybectr Sentinel; this conflict of interest is the most significant limitation of the present work, and independent third-party laboratory validation is the highest-priority Stage 4 deliverable.
Share and Cite
MDPI and ACS Style
Coston, I.M.C.; Hezel, K.D.; Plotnizky, E.; Nojoumian, M.
Multi-Vector Adversarial Testing of an AI-Orchestrated Zero Trust Methodology on Constrained Edge Hardware. Appl. Sci. 2026, 16, 4809.
https://doi.org/10.3390/app16104809
AMA Style
Coston IMC, Hezel KD, Plotnizky E, Nojoumian M.
Multi-Vector Adversarial Testing of an AI-Orchestrated Zero Trust Methodology on Constrained Edge Hardware. Applied Sciences. 2026; 16(10):4809.
https://doi.org/10.3390/app16104809
Chicago/Turabian Style
Coston, Ian Matthew Campbell, Karl David Hezel, Eadan Plotnizky, and Mehrdad Nojoumian.
2026. "Multi-Vector Adversarial Testing of an AI-Orchestrated Zero Trust Methodology on Constrained Edge Hardware" Applied Sciences 16, no. 10: 4809.
https://doi.org/10.3390/app16104809
APA Style
Coston, I. M. C., Hezel, K. D., Plotnizky, E., & Nojoumian, M.
(2026). Multi-Vector Adversarial Testing of an AI-Orchestrated Zero Trust Methodology on Constrained Edge Hardware. Applied Sciences, 16(10), 4809.
https://doi.org/10.3390/app16104809
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.