1 Department of Physics, University of Ilorin, Kwara State, P.M.B. 1515, Ilorin, Kwara State, Nigeria.
2 College of Engineering, Northeastern University, Boston, Massachusetts, USA.
3 Department of Business and Economics, University of Nairobi, Nairobi, Kenya.
World Journal of Advanced Research and Reviews, 2025, 26(01), 4264-4280
Article DOI: 10.30574/wjarr.2025.26.1.1258
Received on 04 March 2025; revised on 21 April 2025; accepted on 28 April 2025
The introduction of the fifth-generation wireless networks has fundamentally changed the picture of the Internet of Things deployments with the emergence of new connectivity opportunities and sophisticated security risks. Through this holistic research study, the investigators explore the application of zero-trust security models as strategic solutions to supply chain vulnerability in 5G edge-cloud infrastructure to support IoT ecosystems. The study combines modern literature covering network security paradigms, architectural models, and real-life deployment issues in various working environments. To determine the main security issues that are inherent to the environment of 5G-enabled IoT, this work examines thirty-five peer-reviewed sources and industry standards documentation, discovering weaknesses in device authentication, data privacy issues, and vulnerabilities created by software-defined networking and network function virtualization. The exploration shows that the conventional models of perimeter-based security cannot be efficiently applied to secure highly distributed heterogeneous 5G-IoT systems with dynamic resource allocation and multi-tenant systems. The principles of zero-trust that are based on the principle of continual checks and minimal access controls become critical ingredients of building strong security postures. The analysis shows that the combination of zero-trust architecture and edge computing paradigms can implement policies at network boundaries nearest to IoT endpoints and therefore reduce attack surfaces and eliminate the opportunity to move laterally. The results suggest that AI and machine learning technologies complement zero-trust applications with automated threat identification, threat behavior analytics, and refinement capabilities of policies. The research paper concludes that effective strategies of adopting zero-trust in 5G-IoT systems must address holistically both the technological solutions, organizational governance frameworks, and ongoing monitoring strategies to respond to the changing threat environments effectively.
Zero-Trust Architecture; Supply Chain Security; Edge Computing; 5G Networks; Internet of Things; Network Slicing; Artificial Intelligence; Software-Defined Networking; Network Function Virtualization
Preview Article PDF
Akinrinsola Akinseye, Raymond Tay and Brian Otieno Odhiambo. Zero-trust architectures mitigating supply chain risks in edge-cloud 5G infrastructures for IoT Deployments. World Journal of Advanced Research and Reviews, 2025, 26(01), 4264-4280. Article DOI: https://doi.org/10.30574/wjarr.2025.26.1.1258.