Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Current Issue
    • Issue in Progress
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Fast Publication within 48 hours || Low Article Processing Charges || Peer Reviewed and Referred Journal || Free Certificate

Research and review articles are invited for publication in January 2026 (Volume 18, Issue 1)

AI-driven adaptive authentication for zero trust security architectures

Breadcrumb

  • Home
  • AI-driven adaptive authentication for zero trust security architectures

Hitarth Shah 1, * and Mahak Shah ²

1 Department of Computer Science, North Carolina State University.

2 Department of Computer Science, Columbia University.

Review Article

International Journal of Science and Research Archive, 2025, 14(03), 705-712

Article DOI: 10.30574/ijsra.2025.14.3.0645

DOI url: https://doi.org/10.30574/ijsra.2025.14.3.0645

Received on 28 January 2025; revised on 10 March 2025; accepted on 12 March 2025

Zero Trust Security Architectures (ZTSA) represent a paradigm shift in cybersecurity by eliminating implicit trust and enforcing continuous verification. In this paper, we introduce an AI-driven adaptive authentication framework that leverages real-time risk assessment through advanced mathematical modeling and machine learning techniques. Our framework integrates multiple data sources—including user behavior, device integrity, and external threat intelligence—to dynamically adjust authentication protocols. We provide a rigorous mathematical formulation, detailed experimental analysis, algorithm pseudocode, and discussions on ethical, regulatory, and deployment challenges. Extensive ablation studies and sensitivity analysis are included to compare our approach with baseline systems and to understand the impact of key parameters. Additionally, we include scientific plots such as an ROC curve and a calibration plot to further evaluate model performance.

Zero Trust; Adaptive Authentication; Artificial Intelligence; Cybersecurity; Machine Learning; Risk Assessment; ROC Curve; Calibration Plot

https://journalijsra.com/sites/default/files/fulltext_pdf/IJSRA-2025-0645.pdf

Preview Article PDF

Hitarth Shah and Mahak Shah. AI-driven adaptive authentication for zero trust security architectures. International Journal of Science and Research Archive, 2025, 14(03), 705-712. Article DOI: https://doi.org/10.30574/ijsra.2025.14.3.0645.

Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

For Authors: Fast Publication of Research and Review Papers


ISSN Approved Journal publication within 48 hrs in minimum fees USD 35, Impact Factor 8.2


 Submit Paper Online     Google Scholar Indexing Peer Review Process

Footer menu

  • Contact

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution