Keywords:-
Article Content:-
Abstract
The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges, particularly in access control and error handling. This study developed a Usability Model for Zero Trust IoT Systems, integrating continuous security evaluation with user-centric feedback and adaptive mechanisms to maintain both security and usability. The system incorporated a robust error-handling mechanism, which detected, classified, and responded to errors in real time. Errors were categorized as Critical, User Mistake, or System Error, and appropriate actions Deny, Challenge, or Degrade were automatically generated. The model used features such as user trust level, device type, and previous errors to predict access decisions and ensure consistent policy enforcement. Training was conducted using a multi-layer neural network, with results evaluated through accuracy, loss, confusion matrices, and class distribution graphs. The model achieved a training accuracy of 95% and a validation accuracy of 92%, effectively minimizing misclassification errors. Feature importance analysis revealed that previous errors and user trust level contributed most significantly to decision-making. An interactive interface was developed using HTML, CSS, and python, allowing users to submit requests, receive immediate feedback, and monitor error logs dynamically. The results demonstrated that the system successfully balanced security enforcement and usability, with the error-handling mechanism ensuring reliable and adaptive access control in Zero Trust IoT environments.
References:-
References
Almorsy, M., Grundy, J., & Müller, I. (2016). Collaboration-based cloud computing security management framework for enterprises. IEEE Transactions on Cloud Computing, 4(2), 123–135. https://doi.org/10.1109/TCC.2015.2466512
Almorsy, M., Grundy, J., & Müller, I. (2016). Collaboration-based cloud computing security management framework for enterprises. IEEE Transactions on Cloud Computing, 4(2), 123–135. https://doi.org/10.1109/TCC.2015.2466512
Ameer, S., Khan, R., & Ahmed, T. (2023). ZTA-IoT: A Zero Trust Architecture for IoT Devices. International Journal of Intelligent Systems and Applications, 15(4), 45–58.
https://www.ijisae.org/index.php/IJISAE/article/view/7460
Fomichev, A., Reznichenko, A., & Riordan, D. (2019). Usable security for IoT devices: An empirical evaluation of zero-interaction authentication schemes. arXiv preprint arXiv:1901.07255. https://arxiv.org/abs/1901.07255
Fomichev, A., Reznichenko, A., & Riordan, D. (2019). Usable security for IoT devices: An empirical evaluation of zero-interaction authentication schemes. arXiv preprint arXiv:1901.07255. https://arxiv.org/abs/1901.07255
Kazie, J., Ahmed, S., & Li, X. (2025). Trust-Aware Authentication and Authorization for IoT: A Federated Machine Learning Approach. Journal of Network and Computer Applications, 200, 103465.
https://doi.org/10.1016/j.jnca.2025.103465
MDPI Sensors. (2024). Usability in Zero Trust IoT systems: Bridging security and human factors. Sensors, 24(4), 1328. https://www.mdpi.com/1424-8220/24/4/1328
Mdpi Sensors. (2024). Usability in Zero Trust IoT systems: Bridging security and human factors. Sensors, 24(4), 1328. https://www.mdpi.com/1424-8220/24/4/1328
Mushtaq, S., Rahman, T., & Zhou, Q. (2024). Zero Trust Adoption in IoT Environments: A Systematic Review. Cybersecurity SpringerOpen, 7(1), 112. https://cybersecurity.springeropen.com/articles/10.1186/s42400-024-00212-0
Nielsen, J. (1993). Usability engineering. Academic Press.
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207