Emerging Technologies with Symmetry for Zero Trust

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 May 2025 | Viewed by 2740

Special Issue Editor

Special Issue Information

Dear Colleagues,

Symmetry is an extraordinary characteristic which has been widely deployed in different research fields of computer engineering, such as symmetric architecture for telecommunications, symmetric network structures, and symmetric algorithms. Recently, an increasing number of organizations have embraced zero-trust technologies due to their ability to minimize risk in enforcing accurate, least privilege per-request access decisions in service applications under the circumstance of a compromised network. In a zero-trust architecture, each access request should be authenticated and evaluated whether the request is permitted no matter whether it originated from an external or internal network. In addition, unauthorized people from utilizing devices of authorized users can intrude other devices for lateral movement. Organizations need to evaluate the trustworthiness of access requests based on user behaviors and threat intelligence and adapt their associated access control policies. To date, the research community has stressed the importance of innovative technologies and integrated solutions for zero-trust. Therefore, this Special Issue solicits original and high-quality works, involving the concept of symmetry, on recent advances in innovative technologies, challenges, and solutions for zero-trust. Topics of interest include, but are not limited to:

  • Trust evaluation algorithm with symmetry for zero-trust;
  • Cyber threat intelligence with symmetry for zero-trust;
  • Edge device risk evaluation with symmetry for zero-trust;
  • Emerging innovative access control with symmetry for zero-trust;
  • Novel theories, architectures, applications, and paradigms with symmetry for zero-trust;
  • Security modeling with symmetry for zero-trust architecture;
  • Privacy enhanced technologies with symmetry for zero-trust;
  • Effectiveness evaluation and benchmark with symmetry for zero-trust;
  • Advances in the use of zero-trust underlying technologies (e.g., AI, blockchain, deterministic networks, cloud/edge computing, etc.) with symmetry;
  • Miscellaneous issues with symmetry for zero-trust.

Prof. Dr. Kuo-Hui Yeh
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • zero trust
  • symmetry
  • risk
  • access control
  • security
  • privacy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

19 pages, 1265 KiB  
Review
Emerging Authentication Technologies for Zero Trust on the Internet of Things
by Chanapha Bast and Kuo-Hui Yeh
Symmetry 2024, 16(8), 993; https://doi.org/10.3390/sym16080993 - 5 Aug 2024
Viewed by 2259
Abstract
The large and interconnected nature of the Internet of Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based security methods struggle to keep pace. The “never trust, always verify” principle of [...] Read more.
The large and interconnected nature of the Internet of Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based security methods struggle to keep pace. The “never trust, always verify” principle of zero trust security offers a viable solution. Zero trust security is a concept that has become increasingly popular, using key exchange techniques to ensure secure and authenticated communication within the network, especially in managing risks in critical infrastructure. Authentication is a process to identify an entity, a prerequisite for authorization, and essential for granting access control. It fundamentally relies on trust management and various methods to generate and manage cryptographic keys for authentication. The aim of this study is to enhance zero trust security in the context of the Internet of Things by investigating authentication methods and discussing several potential solutions for successful implementation. This study also presents the performance evaluation criteria for authentication in IoT and introduces advanced approaches for different scenarios, including lightweight cryptography, mutual authentication, and blockchain technology. Finally, we address challenges related to implementation and future directions for research. Full article
(This article belongs to the Special Issue Emerging Technologies with Symmetry for Zero Trust)
Show Figures

Figure 1

Back to TopTop