The Convergence of Zero Trust Architecture and Generative Artificial Intelligence: A Comprehensive Framework for Adaptive Security in the Era of Large Language Models
Keywords:
Zero Trust Architecture, Generative AI, Large Language Models, Cybersecurity AutomationAbstract
The traditional perimeter-based security model, once the bedrock of corporate and industrial networking, has become increasingly obsolete in the face of sophisticated cyber threats and the decentralization of data. This research article explores the paradigm shift toward Zero Trust Architecture (ZTA) and its integration with modern Generative Artificial Intelligence (GenAI) and Large Language Models (LLMs). By synthesizing contemporary literature, the study examines how the foundational principle of "never trust, always verify" is being redefined through AI-driven continuous authentication, automated threat detection, and context-aware policy enforcement. The paper provides an in-depth analysis of the applications of ZTA in diverse sectors-including smart manufacturing, automated vehicles, and 6G networks-while addressing the emerging security hazards inherent in AI-human interactions and IoT ecosystems. Furthermore, the research investigates the role of LLMs in both strengthening defensive postures and introducing new attack vectors, such as prompt injection and data leakage. The findings suggest that while ZTA provides the necessary structural framework for modern security, the integration of AI is essential for managing the scale and speed of contemporary digital environments. The study concludes with a roadmap for future research, emphasizing the need for standardized AI-ZTA protocols and the mitigation of "trust gaps" in human-AI collaboration.
References
1. Ferrag, M. A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., & Tihanyi, N. (2024). Generative Ai and Large Language Models for Cyber Security: All Insights You Need. https://doi.org/10.2139/ssrn.4853709
2. Gartner (2024). Gartner survey reveals 63% of organizations worldwide have implemented a zero trust strategy. Accessed: 2024-12-06.
3. Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero trust: Applications, challenges, and opportunities. ArXiv.org. https://doi.org/10.48550/arXiv.2309.03582
4. Glikson, E., & Woolley, A. W. (2020). Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals, 14(2). https://doi.org/10.5465/annals.2018.0057
5. Hasanov, S., Virtanen, S., Hakkala, A., & Isoaho, J. (2024). Application of Large Language Models in Cybersecurity: A Systematic Literature Review. IEEE Access, 12, 176751-176778. https://doi.org/10.1109/ACCESS.2024.3505983
6. James, M., Newe, T., O’Shea, D., & O’Mahony, G. D. (2024). Authentication and authorization in zero trust iot: A survey. 2024 35th Irish Signals and Systems Conference (ISSC), 1–7.
7. Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25(12). https://doi.org/10.3390/e25121595
8. Kesarpu, S. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12
9. Khalil, M. (2021). Zero trust architectures for securing enterprise networks: A comparative analysis. Mzresearch.com. https://mzresearch.com/index.php/MZCJ/article/view/297
10. Mohammad, S. M., & Lakshmisri, S. (2018). Security automation in information technology. Papers.ssrn.com. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3652597
11. Murray, V., Lathrop, S., & Mikulski, D. (2024). Towards deployment of a zero-trust architecture (zta) for automated vehicles (av). SAE Technical Paper.
12. Nahar, N., Andersson, K., Schelen, O., & Saguna, S. (2024). A survey on zero trust architecture: Applications and challenges of 6g networks. IEEE Access, 12, 94753–94764.
13. Paul, B., & Rao, M. (2022). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221. https://doi.org/10.3390/app13010221
14. Sarker, I. H. (2024). Generative AI and Large Language Modeling in Cybersecurity. 79–99. https://doi.org/10.1007/978-3-031-54497-2_5
15. Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access, 10, 57143-57179. https://doi.org/10.1109/ACCESS.2022.3174679
16. Tiwari, S., Sarma, W., & Srivastava, A. (2022). Integrating artificial intelligence with Zero Trust Architecture: Enhancing adaptive security in modern cyber threat landscape. International Journal of Research and Analytical Reviews (IJRAR), 9(2), 712.
17. Ureña, R., Kou, G., Dong, Y., Chiclana, F., & Herrera-Viedma, E. (2019). A review on trust propagation and opinion dynamics in social networks and group decision making frameworks. Information Sciences, 478(1), 461–475. https://doi.org/10.1016/j.ins.2018.11.037
18. Wei, J., Wei, J., Tay, Y., Tran, D., Webson, A., Lu, Y., Chen, X., Liu, H., Huang, D., Zhou, D., & Ma, T. (2023). Larger language models do in-context learning differently. ArXiv:2303.03846. https://arxiv.org/abs/2303.03846
19. Zhang, B., Yang, S., Zheng, X., & Wang, X. (2024). Stca: Stacked token-based continuous authentication protocol for zero trust iot. 2024 IEEE Wireless Communications and Networking Conference (WCNC), 1–6.
20. Zhou, W., Jia, Y., Yao, Y., Zhu, L., Guan, L., Mao, Y., Liu, P., & Zhang, Y. (2019). Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. Www.usenix.org.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Kendal Theone (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.