Articles
| Open Access | Advanced Paradigms in Zero Trust Architecture: A Multi-Domain Analysis of Java Microservices, Internet of Things, and Automotive Systems Integration
Mitchel Sterling , Department of Cybersecurity and Systems Engineering, Victoria University of Mancheste, United KingdomAbstract
The transition from perimeter-based security to Zero Trust Architecture (ZTA) represents a fundamental shift in the defensive posture of modern digital ecosystems. This research provides an exhaustive investigation into the integration of ZTA across heterogeneous environments, including Java microservices, the Internet of Things (IoT), defense networks, and automotive systems. By synthesizing contemporary advancements in blockchain technology, radio frequency fingerprinting, and artificial intelligence, the study evaluates how "never trust, always verify" principles can be operationalized to mitigate sophisticated cyber threats. Central to this analysis is the application of ZTA within microservices architectures, utilizing the Strangler Fig pattern for legacy modernization and ensuring granular security at the service-to-service level. Furthermore, the research explores the use of behavioral analysis and adaptive multifactor authentication to refine threat determination processes. The methodology employs a comprehensive systematic review and theoretical modeling to assess the efficacy of various ZTA implementations. Results indicate that while ZTA significantly reduces the attack surface, its success is contingent upon the seamless integration of DevSecOps, real-time identity verification, and the use of robust cryptographic hardware. The discussion addresses the complexities of implementing ZTA in resource-constrained IoT environments and the critical need for standardized protocols in automotive and defense sectors. This article concludes that ZTA is not merely a technical configuration but a holistic security philosophy essential for the resilience of next-generation infrastructure.
Keywords
Zero Trust Architecture, Java Microservices, IoT Security, Blockchain
References
Alshehri, A. and Tunc, C., 2023. Zero trust engine for iot environments. In 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), pp.1–3.
Alsulami, F., Kulkarni, A.R., Hazari, N.A. and Niamat, M.Y., 2024. Zebra: Zero trust architecture employing blockchain technology and ropuf for ami security. IEEE Access, 12, pp.119868–119883.
Apache Software Foundation, 2020. What is Kafka? Apache Kafka Documentation. https://kafka.apache.org/documentation/
Chew, C.-J., Wang, P.-Y. and Lee, J.-S., 2023. Behavioral analysis zero-trust architecture relying on adaptive multifactor and threat determination. KSII Transactions on Internet and Information Systems (TIIS), 17(9), pp.2529–2549.
Fowler, M., 2014. Microservices: A Definition of This New Architectural Term. martinfowler.com. https://martinfowler.com/articles/microservices.html
Fowler, M., 2015. Strangler Fig Application. martinfowler.com. https://martinfowler.com/articles/strangler-fig.html
Jing, W., Peng, L., Fu, H. and Hu, A., 2024. An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks. IEEE Internet of Things Journal, 11(13), pp.23683–23698.
Sagar Kesarpu. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12
Kim, Y., Sohn, S.-G., Jeon, H.S., Lee, S.-M., Lee, Y. and Kim, J., 2024. Exploring effective zero trust architecture for defense cybersecurity: A study. KSII Transactions on Internet and Information Systems (TIIS), 18(9), pp.2665–2691.
Lewis, J. and Fowler, M., 2014. Microservices. martinfowler.com.
Newman, S., 2015. Building Microservices. O'Reilly Media.
Shipman, M.E., Millwater, N., Owens, K. and Smith, S., 2024. A zero trust architecture for automotive networks. SAE Technical Paper.
Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z. and Doss, R., 2022. Zero trust architecture (zta): A comprehensive survey. IEEE access, 10, pp.57143-57179.
ThoughtWorks, 2019. The State of Legacy Modernization. ThoughtWorks Insights. https://www.thoughtworks.com/insights
Tiwari, S., Sarma, W. and Srivastava, A., 2022. Integrating Artificial Intelligence with Zero Trust Architecture: Enhancing Adaptive Security in Modern Cyber Threat Landscape.
Zero, S.T.N., Gadicha, A.B., Gadicha, V.B., Zuhair, M., Ingole, V.A. and Saraf, S.S., 2024. Zta-devsecops. Smart and Agile Cybersecurity for IoT and IIoT Environments.
Download and View Statistics
Copyright License
Copyright (c) 2026 Mitchel Sterling

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

