Skip to Content

115 Results Found

  • Article
  • Open Access
7 Citations
2,522 Views
19 Pages

20 November 2022

The high storage costs brought by the full-replication storage strategy adopted in most existing blockchain systems have become the main bottleneck to system scalability. To address the above, we propose an asynchronous committee-based blockchain sto...

  • Article
  • Open Access
37 Citations
8,872 Views
20 Pages

24 December 2022

Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adap...

  • Review
  • Open Access
90 Citations
26,479 Views
21 Pages

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

  • Sirshak Sarkar,
  • Gaurav Choudhary,
  • Shishir Kumar Shandilya,
  • Azath Hussain and
  • Hwankuk Kim

7 September 2022

Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability...

  • Article
  • Open Access
1 Citations
982 Views
32 Pages

2 December 2025

Attribute-Based Access Control (ABAC) has become the most suitable access control method for cloud environments due to its flexibility and fine-grained advantages. However, it suffers from issues such as insufficient dynamic adaptability and a lack o...

  • Article
  • Open Access
3 Citations
4,958 Views
26 Pages

14 January 2025

The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security...

  • Article
  • Open Access
1 Citations
518 Views
19 Pages

Improved Trust Evaluation Model Based on PBFT and Zero Trust Integrated Power Network Security Defense Method

  • Xiaoyun Liao,
  • Sen Yang,
  • Jun Xu,
  • Li Liu,
  • Wei Liang,
  • Shengjie Yu,
  • Yimu Ji and
  • Shangdong Liu

16 November 2025

In traditional power networks, security protection models primarily rely on perimeter-based defenses, utilizing firewalls, virtual private networks (VPNs), and identity authentication to block external threats. However, once a node within the power s...

  • Article
  • Open Access
14 Citations
4,264 Views
20 Pages

Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV

  • Jiuru Wang,
  • Zhiyuan Wang,
  • Jingcheng Song and
  • Hongyuan Cheng

29 November 2023

The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of...

  • Article
  • Open Access
1 Citations
1,423 Views
24 Pages

Copyright Protection and Trusted Transactions for 3D Models Based on Smart Contracts and Zero-Watermarking

  • Ruigang Nan,
  • Liming Zhang,
  • Jianing Xie,
  • Yan Jin,
  • Tao Tan,
  • Shuaikang Liu and
  • Haoran Wang

With the widespread application of 3D models derived from oblique photography, the need for copyright protection and trusted transactions has risen significantly. Traditional transactions often depend on third parties, making it difficult to balance...

  • Article
  • Open Access
853 Views
22 Pages

12 November 2025

The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorit...

  • Article
  • Open Access
2 Citations
2,371 Views
25 Pages

30 August 2025

As digital infrastructures become increasingly dynamic and complex, traditional static access control mechanisms are no longer sufficient to counter advanced and persistent cyber threats. In response, Zero Trust Architecture (ZTA) emphasizes continuo...

  • Article
  • Open Access
656 Views
17 Pages

Game-Theoretic Secure Socket Transmission with a Zero Trust Model

  • Evangelos D. Spyrou,
  • Vassilios Kappatos and
  • Chrysostomos Stylios

29 September 2025

A significant problem in cybersecurity is to accurately detect malicious network activities in real-time by analyzing patterns in socket-level packet transmissions. This challenge involves distinguishing between legitimate and adversarial behaviors w...

  • Article
  • Open Access
1,787 Views
29 Pages

A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks

  • Max Hashem Eiza,
  • Brian Akwirry,
  • Alessandro Raschella,
  • Michael Mackay and
  • Mukesh Kumar Maheshwari

18 August 2025

The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-ven...

  • Article
  • Open Access
60 Citations
9,658 Views
26 Pages

A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT

  • Samia Masood Awan,
  • Muhammad Ajmal Azad,
  • Junaid Arshad,
  • Urooj Waheed and
  • Tahir Sharif

16 February 2023

The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes...

  • Article
  • Open Access
1 Citations
2,946 Views
20 Pages

The Zero Trust (ZT) model is pivotal in enhancing the security of distributed systems by emphasizing rigorous identity verification, granular access control (AC), and continuous monitoring. To address the complexity and scalability challenges of mode...

  • Article
  • Open Access

Trust Assessment of Distributed Power Grid Terminals via Dual-Domain Graph Neural Networks

  • Cen Chen,
  • Jinghong Lan,
  • Yi Wang,
  • Zhuo Lv,
  • Junchen Li,
  • Ying Zhang,
  • Xinlei Ming and
  • Yubo Song

As distributed terminals are increasingly integrated into modern power systems with high penetration of renewable energy and decentralized resources, access control mechanisms must support continuous and highly detailed trust assessment. Existing app...

  • Article
  • Open Access
1 Citations
3,829 Views
27 Pages

Implementing Zero Trust: Expert Insights on Key Security Pillars and Prioritization in Digital Transformation

  • Francesca Santucci,
  • Gabriele Oliva,
  • Maria Teresa Gonnella,
  • Maria Elena Briga,
  • Mirko Leanza,
  • Marco Massenzi,
  • Luca Faramondi and
  • Roberto Setola

5 August 2025

As organizations continue to embrace digital transformation, the need for robust cybersecurity strategies has never been more critical. This paper explores the Zero Trust Architecture (ZTA) as a contemporary cybersecurity framework that addresses the...

  • Article
  • Open Access
8 Citations
4,710 Views
15 Pages

Cybersecurity Access Control: Framework Analysis in a Healthcare Institution

  • Erik William Tomlinson,
  • Wolday D. Abrha,
  • Seong Dae Kim and
  • Salvador A. Ortega

20 September 2024

Cyber threats are continually evolving and becoming increasingly complex, affecting various industries. Healthcare institutions are the second most targeted industry, preceded by manufacturing. The industry is on the lookout for a reliable cybersecur...

  • Review
  • Open Access
2 Citations
9,504 Views
19 Pages

From Black Box to Glass Box: A Practical Review of Explainable Artificial Intelligence (XAI)

  • Xiaoming Liu,
  • Danni Huang,
  • Jingyu Yao,
  • Jing Dong,
  • Litong Song,
  • Hui Wang,
  • Chao Yao and
  • Weishen Chu

3 November 2025

Explainable Artificial Intelligence (XAI) has become essential as machine learning systems are deployed in high-stakes domains such as security, finance, and healthcare. Traditional models often act as “black boxes”, limiting trust and ac...

  • Article
  • Open Access
4 Citations
3,523 Views
17 Pages

A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment

  • Komala Rangappa,
  • Arun Kumar Banavara Ramaswamy,
  • Mahadeshwara Prasad and
  • Shreyas Arun Kumar

In the era of cloud computing, guaranteeing the safety and effectiveness of data management is of utmost importance. This investigation presents a novel approach that amalgamates the sharding concept, encryption, zero-knowledge proofs (zkp), and bloc...

  • Article
  • Open Access
24 Citations
4,449 Views
16 Pages

Research on Medical Security System Based on Zero Trust

  • Zhiqiang Wang,
  • Xinyue Yu,
  • Peiyang Xue,
  • Yunhan Qu and
  • Lei Ju

6 April 2023

With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought...

  • Review
  • Open Access
38 Citations
13,481 Views
19 Pages

A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model

  • Poonam Dhiman,
  • Neha Saini,
  • Yonis Gulzar,
  • Sherzod Turaev,
  • Amandeep Kaur,
  • Khair Ul Nisa and
  • Yasir Hamid

19 February 2024

The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as...

  • Article
  • Open Access
47 Citations
19,571 Views
49 Pages

23 February 2024

As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security architecture. This paper introduces a comprehensive, Zero Trust model-based framew...

  • Article
  • Open Access
261 Views
24 Pages

25 February 2026

Large organizations face a critical systems integration challenge when executing multiple concurrent security modernization programs. This paper examines the U.S. Department of Defense’s simultaneous implementation of three transformational ini...

  • Article
  • Open Access
33 Citations
9,944 Views
18 Pages

16 August 2021

Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even...

  • Article
  • Open Access
32 Citations
5,471 Views
27 Pages

Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach

  • Ebuka Chinaechetam Nkoro,
  • Judith Nkechinyere Njoku,
  • Cosmas Ifeanyi Nwakanma,
  • Jae-Min Lee and
  • Dong-Seong Kim

Integrating Explainable Artificial Intelligence (XAI) into marine cyberdefense systems can address the lack of trustworthiness and low interpretability inherent in complex black-box Network Intrusion Detection Systems (NIDS) models. XAI has emerged a...

  • Article
  • Open Access
4 Citations
2,745 Views
34 Pages

9 April 2025

The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecti...

  • Article
  • Open Access
1 Citations
1,083 Views
17 Pages

In next-generation Low-Earth-Orbit (LEO) satellite networks, securing inter-satellite communication links (ISLs) through strong authentication is essential due to the network’s dynamic and distributed structure. Traditional authentication syste...

  • Proceeding Paper
  • Open Access
303 Views
10 Pages

5 February 2026

We developed an AI-assisted zero-trust control system at low capital expenditure to retrofit brownfield Ethernet environments without disruptive hardware upgrades or costly software-defined networking migration. Legacy network infrastructures in smal...

  • Article
  • Open Access
20 Citations
6,722 Views
27 Pages

18 January 2025

Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face sign...

  • Article
  • Open Access
7 Citations
2,319 Views
15 Pages

23 February 2023

With the introduction of the industrial internet, Internet of Things, and big data technology, the interconnection degree of the industrial control cloud network is getting higher and higher, the data interface needs to be gradually standardized, and...

  • Article
  • Open Access
380 Views
26 Pages

25 December 2025

In recent years, the number of interconnected computers and resources has increased drastically. To ensure the privacy of these resources, a secure access control mechanism must be implemented. Traditional access control models lack adequate emergenc...

  • Review
  • Open Access
1 Citations
8,006 Views
56 Pages

Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024)...

  • Article
  • Open Access
9 Citations
5,367 Views
60 Pages

The Open Radio Access Network (O-RAN) paradigm promises unprecedented flexibility and cost efficiency for 6G networks but introduces critical security risks due to its disaggregated, AI-driven architecture. This paper proposes a secure optimization f...

  • Article
  • Open Access
61 Citations
11,035 Views
13 Pages

Metaverse Security: Issues, Challenges and a Viable ZTA Model

  • Ankur Gupta,
  • Habib Ullah Khan,
  • Shah Nazir,
  • Muhammad Shafiq and
  • Mohammad Shabaz

The metaverse is touted as an exciting new technology amalgamation facilitating next-level immersive experiences for users. However, initial experiences indicate that a host of privacy, security and control issues will need to be effectively resolved...

  • Systematic Review
  • Open Access
32 Citations
9,215 Views
38 Pages

21 June 2022

During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place t...

  • Article
  • Open Access
25 Citations
7,358 Views
12 Pages

Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study

  • Kunj Joshi,
  • Chintan Bhatt,
  • Kaushal Shah,
  • Dwireph Parmar,
  • Juan M. Corchado,
  • Alessandro Bruno and
  • Pier Luigi Mazzeo

29 July 2023

Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the...

  • Proceeding Paper
  • Open Access
916 Views
17 Pages

The rapid expansion of digital payment channels has significantly widened the financial transaction attack surface, exposing ecosystems to sophisticated, polymorphic threat vectors. This study introduces an AI-powered cybersecurity mesh that unites G...

  • Article
  • Open Access
3 Citations
2,999 Views
38 Pages

A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework

  • Washington Enyinna Mbonu,
  • Carsten Maple,
  • Gregory Epiphaniou and
  • Christo Panchev

Federated learning is the on-device, collaborative training of a global model that can be utilized to support the privacy preservation of participants’ local data. In federated learning, there are challenges to model training regarding privacy...

  • Article
  • Open Access
450 Views
19 Pages

27 January 2026

Cloud storage continues to experience recurring provider-side breaches, raising concerns about the confidentiality and recoverability of user data. This study addresses this challenge by introducing an Artificial Intelligence (AI)-driven hybrid archi...

  • Article
  • Open Access
1 Citations
3,555 Views
25 Pages

Securing Workflows Using Microservices and Metagraphs

  • Loïc Miller,
  • Pascal Mérindol,
  • Antoine Gallais and
  • Cristel Pelsser

11 December 2021

Companies such as Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with other companies, and can be modeled as workflows where the owner of the data at risk interacts with contractors t...

  • Article
  • Open Access
2,308 Views
24 Pages

Maritime Industry Cybersecurity Threats in 2025: Advanced Persistent Threats (APTs), Hacktivism and Vulnerabilities

  • Minodora Badea,
  • Olga Bucovețchi,
  • Adrian V. Gheorghe,
  • Mihaela Hnatiuc and
  • Gabriel Raicu

18 December 2025

Background: The maritime industry, vital for global trade, faces escalating cyber threats in 2025. Critical port infrastructures are increasingly vulnerable due to rapid digitalization and the integration of IT and operational technology (OT) systems...

  • Review
  • Open Access
11 Citations
8,694 Views
34 Pages

Artificial Intelligence in Maritime Cybersecurity: A Systematic Review of AI-Driven Threat Detection and Risk Mitigation Strategies

  • Tymoteusz Miller,
  • Irmina Durlik,
  • Ewelina Kostecka,
  • Sylwia Sokołowska,
  • Polina Kozlovska and
  • Rafał Zwolak

The maritime industry is undergoing a digital transformation, integrating automation, artificial intelligence (AI), and the Internet of Things (IoT) to enhance operational efficiency and safety. However, this technological evolution has also increase...

  • Article
  • Open Access
2 Citations
3,380 Views
23 Pages

Quantum key distribution (QKD), a key application of quantum information technology and “one-time pad” (OTP) encryption, enables secure key exchange with information-theoretic security, meaning its security is grounded in the laws of phys...

  • Review
  • Open Access
2,776 Views
41 Pages

The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses

  • Leandro Antonio Pazmiño Ortiz,
  • Ivonne Fernanda Maldonado Soliz and
  • Vanessa Katherine Guevara Balarezo

11 August 2025

The industrialization of cybercrime, principally through Malware-as-a-Service (MaaS), has elevated HTTP cookie theft to a critical cybersecurity challenge, enabling attackers to bypass multi-factor authentication and perpetrate large-scale account ta...

  • Review
  • Open Access
138 Citations
61,338 Views
63 Pages

Connected and Automated Vehicles: Infrastructure, Applications, Security, Critical Challenges, and Future Aspects

  • Memoona Sadaf,
  • Zafar Iqbal,
  • Abdul Rehman Javed,
  • Irum Saba,
  • Moez Krichen,
  • Sajid Majeed and
  • Arooj Raza

Autonomous vehicles (AV) are game-changing innovations that promise a safer, more convenient, and environmentally friendly mode of transportation than traditional vehicles. Therefore, understanding AV technologies and their impact on society is criti...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,904 Views
22 Pages

29 November 2022

The complex industrial environment of the 21st century is equipped with the Internet of Things platform, with the objective of real-time operational visibility, improved device management and predictive maintenance. To unleash the focused importance...

  • Review
  • Open Access
1,699 Views
43 Pages

2 February 2026

The rapid digital transformation of healthcare has improved clinical efficiency, patient engagement, and data accessibility, but it has also introduced significant cyber security and data privacy challenges. Healthcare IT systems increasingly rely on...

  • Article
  • Open Access
2 Citations
4,289 Views
23 Pages

Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers

  • Syed Shahzad,
  • Keith Joiner,
  • Li Qiao,
  • Felicity Deane and
  • Jo Plested

15 October 2024

Space technology is integral to modern critical systems, including navigation, communication, weather, financial services, and defence. Despite its significance, space infrastructure faces unique cyber resilience challenges exacerbated by the size, i...

  • Review
  • Open Access
56 Citations
17,649 Views
26 Pages

Theory and Application of Zero Trust Security: A Brief Survey

  • Hongzhaoning Kang,
  • Gang Liu,
  • Quan Wang,
  • Lei Meng and
  • Jing Liu

28 November 2023

As cross-border access becomes more frequent, traditional perimeter-based network security models can no longer cope with evolving security requirements. Zero trust is a novel paradigm for cybersecurity based on the core concept of “never trust...

  • Review
  • Open Access
8 Citations
8,971 Views
38 Pages

SDN-Enabled IoT Security Frameworks—A Review of Existing Challenges

  • Sandipan Rakeshkumar Mishra,
  • Bharanidharan Shanmugam,
  • Kheng Cher Yeo and
  • Suresh Thennadil

This comprehensive systematic review examines the integration of software-defined networking (SDN) with IoT security frameworks, analyzing recent advancements in encryption, authentication, access control techniques, and intrusion detection systems....

of 3