Smart City Gnosys

Smart city article details

Title Zero-Trust Architecture For Smart City Healthcare Systems
ID_Doc 62170
Authors Alsofyani S.; Ishaque M.; Nofal M.
Year 2025
Published 2025 2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
DOI http://dx.doi.org/10.1109/ICAISC64594.2025.10959543
Abstract This paper introduces a tailored Zero-Trust Architecture (ZTA) for healthcare systems in smart cities, addressing the security challenges posed by interconnected infrastructures. The model enforces continuous access validation through micro-segmentation, identity and access management (IAM) with multi-factor authentication (MFA), and device trust verification, significantly reducing vulnerabilities. AI-powered real-time monitoring and anomaly detection enhance the system's ability to identify and mitigate advanced persistent threats (APTs) and insider risks. Secure communication protocols, end-to-end encryption, and audit logging ensure data protection, regulatory compliance, and forensic capabilities. The proposed ZTA provides a scalable, future-proof solution that strengthens patient data security and safeguards healthcare infrastructure against evolving cyber threats in smart cities. © 2025 IEEE.
Author Keywords Device Trust Verification; Identity and Access Management; Micro-Segmentation; Patient Data Protection; Smart City Healthcare Security; Zero-Trust Architecture


Similar Articles


Id Similarity Authors Title Published
7012 View0.909Ai-Based Zero Trust Architecture For Cognitive City Networks2025 2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025 (2025)
12674 View0.878Bicer C.; Murturi I.; Donta P.K.; Dustdar S.Blockchain-Based Zero Trust On The EdgeProceedings - 2023 International Conference on Computational Science and Computational Intelligence, CSCI 2023 (2023)
5861 View0.868Kaltenbock D.; Murturi I.; Dustdar S.A Zero Trust Single Sign-On Framework With Attribute-Based Access ControlProceedings - 2024 26th International Conference on Business Informatics, CBI 2024 (2024)
11781 View0.864Chew C.-J.; Wang P.-Y.; Lee J.-S.Behavioral Analysis Zero-Trust Architecture Relying On Adaptive Multifactor And Threat DeterminationKSII Transactions on Internet and Information Systems, 17, 9 (2023)