
@Article{cmc.2025.059170,
AUTHOR = {Yongjun Ren, Zhiming Wang, Pradip Kumar Sharma, Fayez Alqahtani, Amr Tolba, Jin Wang},
TITLE = {Zero Trust Networks: Evolution and Application from Concept to Practice},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {82},
YEAR = {2025},
NUMBER = {2},
PAGES = {1593--1613},
URL = {http://www.techscience.com/cmc/v82n2/59492},
ISSN = {1546-2226},
ABSTRACT = {In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores the advantages and limitations of the Zero Trust model, and provides an in-depth review of its components and key technologies. Additionally, it analyzes the latest research achievements in the application of Zero Trust technology across various fields, including network security, 6G networks, the Internet of Things (IoT), and cloud computing, in the context of specific use cases. The paper also discusses the innovative contributions of the Zero Trust model in these fields, the challenges it faces, and proposes corresponding solutions and future research directions.},
DOI = {10.32604/cmc.2025.059170}
}



