Content area

Abstract

The evolving cybersecurity landscape has exposed critical weaknesses in traditional security models. Historically, enterprise networks relied on perimeter-based security to distinguish between trusted and untrusted domains. However, this approach has proven inadequate, as attackers who gain initial access can move laterally within the network with minimal resistance. The widespread adoption of mobile, cloud, and remote technologies has further eroded the effectiveness of perimeter-based defenses. Additionally, the proliferation of Internet of Things devices, which often lack built-in security and cannot support traditional authentication mechanisms, further exacerbates these security challenges. Internet of Things devices frequently possess limited computational resources, making them attractive targets for Cyber adversaries. In light of these challenges, John Kindervag introduced the Zero Trust model in 2010, advocating for strict access controls and continuous verification of all network entities. However, traditional Zero Trust solutions primarily focus on user authentication and access management, often overlooking Internet of Things devices, which operate with limited functionality and lack the capability for identity attestation. To address these limitations, we created a novel authentication methodology that profiles the network traffic of IoT devices to generate unique behavioral fingerprints for IoT devices.

This approach employs extensive packet capture, feature extraction, and machine learning techniques to develop distinctive profiles for each IoT device. These fingerprints, analogous to human fingerprints, create a unique behavioral signature for each device. The system generates fingerprints on demand, compares them against a database of known device fingerprints, and dynamically updates the flow tables within a software-defined networking switch. This approach ensures that only authenticated and authorized devices can communicate within the network. Due to their constrained functionality, IoT devices exhibit highly predictable behavior and operate within a limited protocol set, making them ideal candidates for this authentication mechanism. This method effectively aligns with the identity management and access control principles of the Zero Trust Architecture, enhancing security in increasingly complex network environments.

Details

1010268
Title
A Zero Trust Architecture Approach to Identity Management and Access Control for IoT
Number of pages
248
Publication year
2025
Degree date
2025
School code
0755
Source
DAI-B 86/11(E), Dissertation Abstracts International
ISBN
9798315751809
Committee member
Nyarko, Kofi; Odumosu, Toluwalogo; Rose, Scott
University/institution
Morgan State University
Department
Electrical and Computer Engineering
University location
United States -- Maryland
Degree
Ph.D.
Source type
Dissertation or Thesis
Language
English
Document type
Dissertation/Thesis
Dissertation/thesis number
31930833
ProQuest document ID
3212401402
Document URL
https://www.proquest.com/dissertations-theses/zero-trust-architecture-approach-identity/docview/3212401402/se-2?accountid=208611
Copyright
Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Database
ProQuest One Academic