Zero Trust Architectures (ZTAs) do not currently support Internet of Things (IoT) devices. We argue that the predictive nature of IoT device traffic and devices’ limited protocol sets allow for profiling of network traffic and the creation of unique fingerprints for IoT devices, satisfying the ZTAs’ identity management component, thus making it possible to enable ZTA for IoT devices.
To learn more about this work, check out the publication!

Morris, Vinton, and Kevin Kornegay. “Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control.” In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), 00307–14, 2025. https://doi.org/10.1109/CCWC62904.2025.10903861.







Leave a comment