• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
A Review of Zero Trust Security Research in Industrial Internet of Things[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440840
Citation: A Review of Zero Trust Security Research in Industrial Internet of Things[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440840

A Review of Zero Trust Security Research in Industrial Internet of Things

More Information
  • Received Date: October 30, 2024
  • Available Online: April 02, 2025
  • With the growing security threats faced by the Industrial Internet of Things (IIoT), traditional perimeter-based security models can no longer address the increasingly complex demands. Zero trust, as an emerging security model, is based on the core principle of "never trust, always verify" and has gained significant attention. However, the research and application of zero trust in IIoT are still in their early stages, requiring more comprehensive and systematic exploration. This paper provides a systematic review of recent developments and applications of zero trust in the industrial sector, filling gaps in current research. Firstly, it introduces the basic concepts and principles of industrial zero trust, establishing a theoretical foundation for subsequent discussions. Then, it describes the migration and evaluation of industrial zero trust architecture, systematically summarizing key technologies, including identity authentication, software-defined perimeter, micro-segmentation, secure communication channels, and trust evaluation. These technologies collectively form the core support of industrial zero trust. Next, the critical role of access control in zero trust is discussed, emphasizing its value for fine-grained permission management. Following this, the application of zero trust in typical IIoT scenarios, such as industrial control systems, ubiquitous electric IoT, and vehicular IoT, is analyzed, demonstrating its adaptability and advantages. Finally, the existing challenges and future development directions of industrial zero trust are analyzed.
  • Related Articles

    [1]Guo Husheng, Zhang Yutong, Wang Wenjian. Elastic Gradient Ensemble for Concept Drift Adaptation[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440407
    [2]Guo Husheng, Zhang Yang, Wang Wenjian. Two-Stage Adaptive Ensemble Learning Method for Different Types of Concept Drift[J]. Journal of Computer Research and Development, 2024, 61(7): 1799-1811. DOI: 10.7544/issn1000-1239.202330452
    [3]Guo Husheng, Cong Lu, Gao Shuhua, Wang Wenjian. Adaptive Classification Method for Concept Drift Based on Online Ensemble[J]. Journal of Computer Research and Development, 2023, 60(7): 1592-1602. DOI: 10.7544/issn1000-1239.202220245
    [4]Cai Derun, Li Hongyan. A Metric Learning Based Unsupervised Domain Adaptation Method with Its Application on Mortality Prediction[J]. Journal of Computer Research and Development, 2022, 59(3): 674-682. DOI: 10.7544/issn1000-1239.20200693
    [5]Cai Huan, Lu Kezhong, Wu Qirong, Wu Dingming. Adaptive Classification Algorithm for Concept Drift Data Stream[J]. Journal of Computer Research and Development, 2022, 59(3): 633-646. DOI: 10.7544/issn1000-1239.20201017
    [6]Yu Xian, Li Zhenyu, Sun Sheng, Zhang Guangxing, Diao Zulong, Xie Gaogang. Adaptive Virtual Machine Consolidation Method Based on Deep Reinforcement Learning[J]. Journal of Computer Research and Development, 2021, 58(12): 2783-2797. DOI: 10.7544/issn1000-1239.2021.20200366
    [7]Bai Chenjia, Liu Peng, Zhao Wei, Tang Xianglong. Active Sampling for Deep Q-Learning Based on TD-error Adaptive Correction[J]. Journal of Computer Research and Development, 2019, 56(2): 262-280. DOI: 10.7544/issn1000-1239.2019.20170812
    [8]Zhang Yuanpeng, Deng Zhaohong, Chung Fu-lai, Hang Wenlong, Wang Shitong. Fast Self-Adaptive Clustering Algorithm Based on Exemplar Score Strategy[J]. Journal of Computer Research and Development, 2018, 55(1): 163-178. DOI: 10.7544/issn1000-1239.2018.20160937
    [9]Ma Anxiang, Zhang Bin, Gao Kening, Qi Peng, and Zhang Yin. Deep Web Data Extraction Based on Result Pattern[J]. Journal of Computer Research and Development, 2009, 46(2): 280-288.
    [10]Dandan, Li Zusong, Wang Jian, Zhang Longbing, Hu Weiwu, Liu Zhiyong. Adaptive Stack Cache with Fast Address Generation[J]. Journal of Computer Research and Development, 2007, 44(1): 169-176.

Catalog

    Article views (11) PDF downloads (4) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return