AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (568.4 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Review | Open Access

Zero Trust Networks: Evolution and Application from Concept to Practice

Yongjun Ren1Zhiming Wang1Pradip Kumar Sharma2Fayez Alqahtani3Amr Tolba4Jin Wang5( )
School of Computer Science, School of Cyber Science and Engineering, Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, 210044, China
Department of Computing Science, University of Aberdeen, Aberdeen, AB243FX, UK
Software Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, 12372, Saudi Arabia
Computer Science Department, Community College, King Saud University, Riyadh, 11437, Saudi Arabia
Sanya Institute of Hunan University of Science and Technology, Sanya, 572024, China
Show Author Information

Abstract

In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores the advantages and limitations of the Zero Trust model, and provides an in-depth review of its components and key technologies. Additionally, it analyzes the latest research achievements in the application of Zero Trust technology across various fields, including network security, 6G networks, the Internet of Things (IoT), and cloud computing, in the context of specific use cases. The paper also discusses the innovative contributions of the Zero Trust model in these fields, the challenges it faces, and proposes corresponding solutions and future research directions.

References

【1】
【1】
 
 
Computers, Materials & Continua
Pages 1593-1613

{{item.num}}

Comments on this article

Go to comment

< Back to all reports

Review Status: {{reviewData.commendedNum}} Commended , {{reviewData.revisionRequiredNum}} Revision Required , {{reviewData.notCommendedNum}} Not Commended Under Peer Review

Review Comment

Close
Close
Cite this article:
Ren Y, Wang Z, Sharma PK, et al. Zero Trust Networks: Evolution and Application from Concept to Practice. Computers, Materials & Continua, 2025, 82(2): 1593-1613. https://doi.org/10.32604/cmc.2025.059170

13

Views

0

Downloads

6

Crossref

5

Web of Science

6

Scopus

Received: 29 September 2024
Accepted: 16 December 2024
Published: 28 February 2025
© The Author 2024.

This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.