Policy design in zero-trust distributed networks: challenges and solutions

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Traditional security architectures are becoming more vulnerable to distributed attacks due to significant dependence on trust. This will further escalate when implementing agentic AI within the systems, as more components must be secured over a similar distributed space. These scenarios can be observed in consumer technologies, such as the dense Internet of things (IoT). Here, zero-trust architecture (ZTA) can be seen as a potential solution, which relies on a key principle of not giving users explicit trust, instead always verifying their privileges whenever a request is made. However, the overall security in ZTA is managed through its policies, and unverified policies can lead to unauthorized access. Thus, this paper explores challenges and solutions for ZTA policy design in the context of distributed networks, which is referred to as zero-trust distributed networks(ZTDN). This is followed by a case-study on formal verification of policies using UPPAAL. Subsequently, the importance of accountability and responsibility in the system’s security is discussed
Original languageEnglish
Title of host publicationIndustrial Networks and Intelligent Systems: 12th EAI International Conference, INISCOM 2026: Proceedings
PublisherSpringer
Number of pages21
Publication statusAccepted - 01 Dec 2025
Event12th EAI International Conference on Industrial Networks and Intelligent Systems: INISCOM 2026 - Da Nang City, Viet Nam
Duration: 26 Feb 202627 Feb 2026
https://iniscom.eai-conferences.org/2026/

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublisherSpringer
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference12th EAI International Conference on Industrial Networks and Intelligent Systems
Country/TerritoryViet Nam
CityDa Nang City
Period26/02/202627/02/2026
Internet address

Fingerprint

Dive into the research topics of 'Policy design in zero-trust distributed networks: challenges and solutions'. Together they form a unique fingerprint.

Cite this