{"id":"https://openalex.org/W7124430137","doi":"https://doi.org/10.1109/tce.2026.3654782","title":"Standards-Compliant Zero Trust Framework-Based Software-Defined Perimeter (SDP) for Securing Residential IoT Networks","display_name":"Standards-Compliant Zero Trust Framework-Based Software-Defined Perimeter (SDP) for Securing Residential IoT Networks","publication_year":2026,"publication_date":"2026-01-15","ids":{"openalex":"https://openalex.org/W7124430137","doi":"https://doi.org/10.1109/tce.2026.3654782"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2026.3654782","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tce.2026.3654782","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tce.2026.3654782","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123184586","display_name":"N. N. Hari","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"N. N. Hari","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011073660","display_name":"Prabhakar Krishnan","orcid":"https://orcid.org/0000-0001-6702-112X"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabhakar Krishnan","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121250318","display_name":"Kurunandan Jain","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kurunandan Jain","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123236595","display_name":"Ajay Bhagvatiprasad Koppaka","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ajay Bhagvatiprasad Koppaka","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123169751","display_name":"Pasunuri Abhinav","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pasunuri Abhinav","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121350821","display_name":"Ala Saleh Alluhaidan","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ala Saleh Alluhaidan","raw_affiliation_strings":["Department of Information Systems, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055986664","display_name":"Maheandera Prabu Paulraj","orcid":"https://orcid.org/0000-0002-9996-1412"},"institutions":[{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"education","lineage":["https://openalex.org/I240666556"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"P. Prabu","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I240666556"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5123184586"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":48.4285,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98923908,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"72","issue":"1","first_page":"1312","last_page":"1327"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.2854999899864197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.2854999899864197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.14820000529289246,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.07620000094175339,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6776000261306763},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6190000176429749},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6176000237464905},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5223000049591064},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5216000080108643},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.44929999113082886},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44510000944137573},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4325000047683716},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42160001397132874},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.399399995803833}],"concepts":[{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6776000261306763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6708999872207642},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6190000176429749},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6176000237464905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.580299973487854},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5223000049591064},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5216000080108643},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.44929999113082886},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44510000944137573},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4325000047683716},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42160001397132874},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.399399995803833},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3937999904155731},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3709000051021576},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.32089999318122864},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.30559998750686646},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2728999853134155},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.26409998536109924},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2026.3654782","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tce.2026.3654782","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tce.2026.3654782","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tce.2026.3654782","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2485229854","https://openalex.org/W2612102454","https://openalex.org/W2913102965","https://openalex.org/W2976189582","https://openalex.org/W2980740595","https://openalex.org/W3169184470","https://openalex.org/W4385451740","https://openalex.org/W4401070651","https://openalex.org/W4401364715","https://openalex.org/W4403022900","https://openalex.org/W4407157884","https://openalex.org/W4408859595","https://openalex.org/W4409178942","https://openalex.org/W4409641217","https://openalex.org/W4409659349","https://openalex.org/W4414322075","https://openalex.org/W4414871475","https://openalex.org/W7083579428"],"related_works":[],"abstract_inverted_index":{"The":[0,119],"proliferation":[1],"of":[2,5,15,101,109],"consumer":[3],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"has":[9],"significantly":[10],"expanded":[11],"the":[12,75,82,135],"attack":[13],"surface":[14],"residential":[16,150],"networks,":[17],"exposing":[18],"them":[19],"to":[20,51,116,122,146],"misconfigurations,":[21],"excessive":[22],"permissions,":[23],"and":[24,70,80,97,113,125,134,143],"lateral":[25,111],"movement":[26],"threats.":[27],"This":[28],"paper":[29],"presents":[30],"a":[31,45,85,90,141],"novel":[32],"Zero":[33,147],"Trust":[34,148],"Architecture":[35],"(ZTA)":[36],"that":[37],"integrates":[38],"Manufacturer":[39],"Usage":[40],"Description":[41],"(MUD)":[42],"policies":[43],"with":[44,127],"Software-Defined":[46],"Perimeter":[47],"(SDP)":[48],"enforcement":[49,100],"framework":[50],"secure":[52],"consumer-grade":[53],"IoT":[54,76,151],"environments.":[55],"Our":[56],"approach":[57],"enables":[58],"automated,":[59],"context-aware":[60],"access":[61],"control":[62],"through":[63],"device-specific":[64],"policy":[65,117],"generation,":[66],"WireGuard-based":[67],"encrypted":[68],"tunnels,":[69],"dynamic":[71],"micro-segmentation":[72],"enforced":[73],"at":[74],"gateway.":[77],"We":[78],"implement":[79],"evaluate":[81],"system":[83],"on":[84],"Raspberry":[86],"Pi-based":[87],"testbed,":[88],"demonstrating":[89],"78%":[91],"reduction":[92],"in":[93,149],"manual":[94],"configuration":[95],"time":[96],"effective":[98],"real-time":[99],"least-privilege":[102],"policies.":[103],"Security":[104],"evaluations":[105],"confirm":[106],"full":[107],"prevention":[108],"unauthorized":[110],"traffic":[112],"rapid":[114],"reaction":[115],"violations.":[118],"architecture":[120],"adheres":[121],"secure-by-default":[123],"principles":[124],"aligns":[126],"emerging":[128],"standards":[129],"such":[130],"as":[131],"RFC":[132],"8520":[133],"EU":[136],"Cyber":[137],"Resilience":[138],"Act,":[139],"offering":[140],"scalable":[142],"standards-compliant":[144],"path":[145],"deployments.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2026-01-17T00:00:00"}
