Articles | Open Access |

Advanced Paradigms in Zero Trust Architecture: A Multi-Domain Analysis of Java Microservices, Internet of Things, and Automotive Systems Integration

Mitchel Sterling , Department of Cybersecurity and Systems Engineering, Victoria University of Mancheste, United Kingdom

Abstract

The transition from perimeter-based security to Zero Trust Architecture (ZTA) represents a fundamental shift in the defensive posture of modern digital ecosystems. This research provides an exhaustive investigation into the integration of ZTA across heterogeneous environments, including Java microservices, the Internet of Things (IoT), defense networks, and automotive systems. By synthesizing contemporary advancements in blockchain technology, radio frequency fingerprinting, and artificial intelligence, the study evaluates how "never trust, always verify" principles can be operationalized to mitigate sophisticated cyber threats. Central to this analysis is the application of ZTA within microservices architectures, utilizing the Strangler Fig pattern for legacy modernization and ensuring granular security at the service-to-service level. Furthermore, the research explores the use of behavioral analysis and adaptive multifactor authentication to refine threat determination processes. The methodology employs a comprehensive systematic review and theoretical modeling to assess the efficacy of various ZTA implementations. Results indicate that while ZTA significantly reduces the attack surface, its success is contingent upon the seamless integration of DevSecOps, real-time identity verification, and the use of robust cryptographic hardware. The discussion addresses the complexities of implementing ZTA in resource-constrained IoT environments and the critical need for standardized protocols in automotive and defense sectors. This article concludes that ZTA is not merely a technical configuration but a holistic security philosophy essential for the resilience of next-generation infrastructure.

Keywords

Zero Trust Architecture, Java Microservices, IoT Security, Blockchain

References

Alshehri, A. and Tunc, C., 2023. Zero trust engine for iot environments. In 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), pp.1–3.

Alsulami, F., Kulkarni, A.R., Hazari, N.A. and Niamat, M.Y., 2024. Zebra: Zero trust architecture employing blockchain technology and ropuf for ami security. IEEE Access, 12, pp.119868–119883.

Apache Software Foundation, 2020. What is Kafka? Apache Kafka Documentation. https://kafka.apache.org/documentation/

Chew, C.-J., Wang, P.-Y. and Lee, J.-S., 2023. Behavioral analysis zero-trust architecture relying on adaptive multifactor and threat determination. KSII Transactions on Internet and Information Systems (TIIS), 17(9), pp.2529–2549.

Fowler, M., 2014. Microservices: A Definition of This New Architectural Term. martinfowler.com. https://martinfowler.com/articles/microservices.html

Fowler, M., 2015. Strangler Fig Application. martinfowler.com. https://martinfowler.com/articles/strangler-fig.html

Jing, W., Peng, L., Fu, H. and Hu, A., 2024. An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks. IEEE Internet of Things Journal, 11(13), pp.23683–23698.

Sagar Kesarpu. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12

Kim, Y., Sohn, S.-G., Jeon, H.S., Lee, S.-M., Lee, Y. and Kim, J., 2024. Exploring effective zero trust architecture for defense cybersecurity: A study. KSII Transactions on Internet and Information Systems (TIIS), 18(9), pp.2665–2691.

Lewis, J. and Fowler, M., 2014. Microservices. martinfowler.com.

Newman, S., 2015. Building Microservices. O'Reilly Media.

Shipman, M.E., Millwater, N., Owens, K. and Smith, S., 2024. A zero trust architecture for automotive networks. SAE Technical Paper.

Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z. and Doss, R., 2022. Zero trust architecture (zta): A comprehensive survey. IEEE access, 10, pp.57143-57179.

ThoughtWorks, 2019. The State of Legacy Modernization. ThoughtWorks Insights. https://www.thoughtworks.com/insights

Tiwari, S., Sarma, W. and Srivastava, A., 2022. Integrating Artificial Intelligence with Zero Trust Architecture: Enhancing Adaptive Security in Modern Cyber Threat Landscape.

Zero, S.T.N., Gadicha, A.B., Gadicha, V.B., Zuhair, M., Ingole, V.A. and Saraf, S.S., 2024. Zta-devsecops. Smart and Agile Cybersecurity for IoT and IIoT Environments.

Download and View Statistics

Views: 0   |   Downloads: 0

Copyright License

Download Citations

How to Cite

Mitchel Sterling. (2026). Advanced Paradigms in Zero Trust Architecture: A Multi-Domain Analysis of Java Microservices, Internet of Things, and Automotive Systems Integration. The American Journal of Interdisciplinary Innovations and Research, 8(2), 124–128. Retrieved from https://www.theamericanjournals.com/index.php/tajiir/article/view/7623