Continuous Authentication Methods for Zero-Trust Cybersecurity Architecture

Published: 01 Jan 2023, Last Modified: 11 Apr 2025ICCSA (Workshops 6) 2023EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Zero-trust architecture (ZTA) is a new approach to distributed systems cybersecurity which both provides better data protection and reflects the structure of modern information systems more accurately. Unlike the traditional perimeter-style approach, ZTA views each part of the system as a potential threat, and continuously authenticates it to detect possible threats. This article presents a comparative analysis of the most common continuous authentication methods, and evaluates their viability for use in ZTA systems. Comparison criteria are introduced, most prominent authentication methods found in literature are listed, and their thorough evaluation is carried out. We conclude that, first, most continuous authentication approaches are not universal and can only be used with certain specific input methods; second, that face recognition, while a theoretically universal approach, has several issues of its own according to our criteria; third, that hybrid methods that combine several approaches are a potentially viable way of authentication in ZTA context; and fourth, that machine learning is essential to all of the present approaches.
Loading