The Convergence of Zero Trust Architecture and Generative Artificial Intelligence: A Comprehensive Framework for Adaptive Security in the Era of Large Language Models

Authors

  • Kendal Theone Department of Cybersecurity and Information Assurance, University of Melbourne, Australia Author

Keywords:

Zero Trust Architecture, Generative AI, Large Language Models, Cybersecurity Automation

Abstract

The traditional perimeter-based security model, once the bedrock of corporate and industrial networking, has become increasingly obsolete in the face of sophisticated cyber threats and the decentralization of data. This research article explores the paradigm shift toward Zero Trust Architecture (ZTA) and its integration with modern Generative Artificial Intelligence (GenAI) and Large Language Models (LLMs). By synthesizing contemporary literature, the study examines how the foundational principle of "never trust, always verify" is being redefined through AI-driven continuous authentication, automated threat detection, and context-aware policy enforcement. The paper provides an in-depth analysis of the applications of ZTA in diverse sectors-including smart manufacturing, automated vehicles, and 6G networks-while addressing the emerging security hazards inherent in AI-human interactions and IoT ecosystems. Furthermore, the research investigates the role of LLMs in both strengthening defensive postures and introducing new attack vectors, such as prompt injection and data leakage. The findings suggest that while ZTA provides the necessary structural framework for modern security, the integration of AI is essential for managing the scale and speed of contemporary digital environments. The study concludes with a roadmap for future research, emphasizing the need for standardized AI-ZTA protocols and the mitigation of "trust gaps" in human-AI collaboration.

References

1. Ferrag, M. A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., & Tihanyi, N. (2024). Generative Ai and Large Language Models for Cyber Security: All Insights You Need. https://doi.org/10.2139/ssrn.4853709

2. Gartner (2024). Gartner survey reveals 63% of organizations worldwide have implemented a zero trust strategy. Accessed: 2024-12-06.

3. Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero trust: Applications, challenges, and opportunities. ArXiv.org. https://doi.org/10.48550/arXiv.2309.03582

4. Glikson, E., & Woolley, A. W. (2020). Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals, 14(2). https://doi.org/10.5465/annals.2018.0057

5. Hasanov, S., Virtanen, S., Hakkala, A., & Isoaho, J. (2024). Application of Large Language Models in Cybersecurity: A Systematic Literature Review. IEEE Access, 12, 176751-176778. https://doi.org/10.1109/ACCESS.2024.3505983

6. James, M., Newe, T., O’Shea, D., & O’Mahony, G. D. (2024). Authentication and authorization in zero trust iot: A survey. 2024 35th Irish Signals and Systems Conference (ISSC), 1–7.

7. Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25(12). https://doi.org/10.3390/e25121595

8. Kesarpu, S. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12

9. Khalil, M. (2021). Zero trust architectures for securing enterprise networks: A comparative analysis. Mzresearch.com. https://mzresearch.com/index.php/MZCJ/article/view/297

10. Mohammad, S. M., & Lakshmisri, S. (2018). Security automation in information technology. Papers.ssrn.com. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3652597

11. Murray, V., Lathrop, S., & Mikulski, D. (2024). Towards deployment of a zero-trust architecture (zta) for automated vehicles (av). SAE Technical Paper.

12. Nahar, N., Andersson, K., Schelen, O., & Saguna, S. (2024). A survey on zero trust architecture: Applications and challenges of 6g networks. IEEE Access, 12, 94753–94764.

13. Paul, B., & Rao, M. (2022). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221. https://doi.org/10.3390/app13010221

14. Sarker, I. H. (2024). Generative AI and Large Language Modeling in Cybersecurity. 79–99. https://doi.org/10.1007/978-3-031-54497-2_5

15. Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access, 10, 57143-57179. https://doi.org/10.1109/ACCESS.2022.3174679

16. Tiwari, S., Sarma, W., & Srivastava, A. (2022). Integrating artificial intelligence with Zero Trust Architecture: Enhancing adaptive security in modern cyber threat landscape. International Journal of Research and Analytical Reviews (IJRAR), 9(2), 712.

17. Ureña, R., Kou, G., Dong, Y., Chiclana, F., & Herrera-Viedma, E. (2019). A review on trust propagation and opinion dynamics in social networks and group decision making frameworks. Information Sciences, 478(1), 461–475. https://doi.org/10.1016/j.ins.2018.11.037

18. Wei, J., Wei, J., Tay, Y., Tran, D., Webson, A., Lu, Y., Chen, X., Liu, H., Huang, D., Zhou, D., & Ma, T. (2023). Larger language models do in-context learning differently. ArXiv:2303.03846. https://arxiv.org/abs/2303.03846

19. Zhang, B., Yang, S., Zheng, X., & Wang, X. (2024). Stca: Stacked token-based continuous authentication protocol for zero trust iot. 2024 IEEE Wireless Communications and Networking Conference (WCNC), 1–6.

20. Zhou, W., Jia, Y., Yao, Y., Zhu, L., Guan, L., Mao, Y., Liu, P., & Zhang, Y. (2019). Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. Www.usenix.org.

Downloads

Published

2025-09-30

How to Cite

The Convergence of Zero Trust Architecture and Generative Artificial Intelligence: A Comprehensive Framework for Adaptive Security in the Era of Large Language Models. (2025). SciQuest Research Database, 5(09), 143-152. https://sciencebring.org/index.php/sqrd/article/view/132

Similar Articles

1-10 of 106

You may also start an advanced similarity search for this article.