Wireless Communications and Mobile Computing

Zero-trust Security for Industry 4.0


Publishing date
01 Feb 2023
Status
Published
Submission deadline
07 Oct 2022

Lead Editor
Guest Editors

1University of the West of England, Bristol, UK

2Old Dominion University, Norfolk, USA

3London South Bank University, London, UK


Zero-trust Security for Industry 4.0

Description

In Industrial 4.0 scenarios, such as the Industrial Internet of Things (IoT), smart manufacturing, edge/fog computing environments, etc., many devices and systems are connected to collect, process, and store data, which makes it very difficult to build an effective security strategy due to threats and cyberattacks which may be difficult to identify. The emerging zero-trust model shows great promise for providing Industrial 4.0 security solutions, which holds the “never trust, always verify” principle and can ensure that data and access across the system are strictly verified before granting access.

Zero-trust security can remove physical barriers to IoT security and build virtualized security areas, and is believed to be the best method to approach security in a perimeter-free business environment. Zero-trust offers many security benefits for complex networks and systems. Zero-trust can protect devices and data in the system, speed up anomaly and breach detection, reduce the response time and complexity of the security stack and solve the security skills shortage by introducing machine learning and artificial intelligence. Zero-trust security solutions can enable organizations to obtain security to protect their resources and data and realize substantial business benefits.

This Special Issue aims to collect innovative and high-quality research contributions and foster innovative zero-trust security approaches in complex networks and systems. We welcome original research and review articles.

Potential topics include but are not limited to the following:

  • Zero-trust architecture/framework in industrial environments
  • Zero-trust networks and modeling
  • Micro-segmentation in complex networks and systems
  • Application behavior and visibility
  • Zero-trust supply chains
  • Access privilege in zero-trust environments
  • Autonomic security for zero-trust networks and systems
  • Cyberattacks in zero-trust environments
  • Zero-trust identity management
  • Enterprise zero-trust architecture
  • Granular access control and security in zero-trust
  • Implementation of zero-trust security
  • Machine learning-enabled zero-trust security
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.