{"id":"https://openalex.org/W4392248476","doi":"https://doi.org/10.1109/icce59016.2024.10444321","title":"Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale","display_name":"Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392248476","doi":"https://doi.org/10.1109/icce59016.2024.10444321"},"language":"en","primary_location":{"id":"doi:10.1109/icce59016.2024.10444321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce59016.2024.10444321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087631437","display_name":"Brennan Huber","orcid":"https://orcid.org/0000-0003-1723-7162"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brennan Huber","raw_affiliation_strings":["Auburn University,Computer Science and Software Engineering Samuel Ginn College of Engineering","Computer Science and Software Engineering Samuel Ginn College of Engineering, Auburn University"],"affiliations":[{"raw_affiliation_string":"Auburn University,Computer Science and Software Engineering Samuel Ginn College of Engineering","institution_ids":["https://openalex.org/I82497590"]},{"raw_affiliation_string":"Computer Science and Software Engineering Samuel Ginn College of Engineering, Auburn University","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023415370","display_name":"Farah Kandah","orcid":"https://orcid.org/0000-0002-5729-8536"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farah Kandah","raw_affiliation_strings":["Auburn University,Computer Science and Software Engineering Samuel Ginn College of Engineering","Computer Science and Software Engineering Samuel Ginn College of Engineering, Auburn University"],"affiliations":[{"raw_affiliation_string":"Auburn University,Computer Science and Software Engineering Samuel Ginn College of Engineering","institution_ids":["https://openalex.org/I82497590"]},{"raw_affiliation_string":"Computer Science and Software Engineering Samuel Ginn College of Engineering, Auburn University","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087631437"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":4.4171,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94667407,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.7416632175445557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6523802876472473},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.519353985786438},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5152735710144043},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5151994824409485},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4949008822441101},{"id":"https://openalex.org/keywords/ground-zero","display_name":"Ground zero","score":0.4761072099208832},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4410780966281891},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39262449741363525},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2100439965724945},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07018399238586426}],"concepts":[{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.7416632175445557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6523802876472473},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.519353985786438},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5152735710144043},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5151994824409485},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4949008822441101},{"id":"https://openalex.org/C2780518707","wikidata":"https://www.wikidata.org/wiki/Q685332","display_name":"Ground zero","level":2,"score":0.4761072099208832},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4410780966281891},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39262449741363525},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2100439965724945},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07018399238586426},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce59016.2024.10444321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce59016.2024.10444321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1531637205","https://openalex.org/W2047300499","https://openalex.org/W2075763135","https://openalex.org/W2081244004","https://openalex.org/W2100215144","https://openalex.org/W2101631542","https://openalex.org/W2123622572","https://openalex.org/W2127826640","https://openalex.org/W2171775586","https://openalex.org/W2302640900","https://openalex.org/W2564679178","https://openalex.org/W2594143762","https://openalex.org/W2732477316","https://openalex.org/W2754764339","https://openalex.org/W2799867512","https://openalex.org/W2803109435","https://openalex.org/W2885984321","https://openalex.org/W2891585364","https://openalex.org/W2922274367","https://openalex.org/W2982625477","https://openalex.org/W3026777061","https://openalex.org/W3033473526","https://openalex.org/W3213007536","https://openalex.org/W4282945617","https://openalex.org/W4295185261","https://openalex.org/W4321438584","https://openalex.org/W6631691452"],"related_works":["https://openalex.org/W4300821880","https://openalex.org/W4402779703","https://openalex.org/W4313594480","https://openalex.org/W2952570804","https://openalex.org/W2285651113","https://openalex.org/W4256031153","https://openalex.org/W3279617","https://openalex.org/W4293365998","https://openalex.org/W2327903337","https://openalex.org/W2768862283"],"abstract_inverted_index":{"The":[0],"Zero":[1,45,115],"Trust":[2,46,116],"security":[3,70],"architecture":[4],"has":[5],"been":[6],"widely":[7],"recognized":[8],"for":[9,34,91],"its":[10,111],"efficacy":[11],"in":[12,84,118],"strengthening":[13],"cybersecurity":[14],"by":[15],"rejecting":[16],"the":[17,40,100,124],"concept":[18],"of":[19,43,105],"implicit":[20],"trust":[21,61,75,107],"and":[22,36,93,103],"adopting":[23],"strict":[24],"identity":[25],"verification":[26],"measures.":[27],"However,":[28],"as":[29],"organizations":[30],"face":[31],"escalating":[32],"demands":[33],"rapid":[35],"scalable":[37],"access":[38,127],"control,":[39],"performance":[41,67,120],"limitations":[42],"traditional":[44],"implementations":[47],"have":[48],"become":[49],"a":[50,59,73,81],"concern.":[51],"In":[52],"response":[53],"to":[54],"this":[55],"challenge,":[56],"we":[57],"introduce":[58],"novel":[60],"management-based":[62,108],"solution":[63,79],"that":[64],"significantly":[65],"improves":[66],"without":[68],"compromising":[69],"integrity.":[71],"Through":[72],"streamlined":[74],"provisioning":[76],"approach,":[77],"our":[78,106],"offers":[80],"20%":[82],"enhancement":[83],"processing":[85],"efficiency,":[86],"making":[87],"it":[88],"highly":[89],"suitable":[90],"dynamic":[92],"large-scale":[94],"environments.":[95],"This":[96],"research":[97],"paper":[98],"presents":[99],"design,":[101],"implementation,":[102],"evaluation":[104],"solution,":[109],"showcasing":[110],"superiority":[112],"over":[113],"conventional":[114],"architectures":[117],"addressing":[119],"concerns":[121],"while":[122],"delivering":[123],"same":[125],"robust":[126],"control":[128],"capabilities.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
