Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

5G Edge computing and zero trust architecture: A secure synergy

Breadcrumb

  • Home
  • 5G Edge computing and zero trust architecture: A secure synergy

Saswata Dey *

Independent Researcher, USA.
 
Research Article
World Journal of Advanced Research and Reviews, 2020, 05(03), 180-192
Article DOI: 10.30574/wjarr.2020.5.3.0031
DOI url: https://doi.org/10.30574/wjarr.2020.5.3.0031
 
Received on 04 February 2020; revised on 24 March 2020; accepted on 27 March 2020
 
The combination of 5G edge computing and Zero Trust Architecture (ZTA) offers a revolutionary buildup on strengthening security. This paper discusses how these two technologies strengthen security architectures by combating risks associated with a perimeter-defense approach where the core security is based on preventing unauthorized access to networks and data resources that reside at the center of the network. 5G edge computing brings computation close to the data for real-time processing. ZTA facilitates strict access checks based on trust assurance and partitioning of a network through a zero-trust strategy. Together, they produce a safe collaboration that can prevent threats in a world that is becoming more integrated. The paper discusses how this integration can be done, assessing the efficacy of this strategy via cases and comparison and defining problems in achieving it. The final consequences demonstrate that risk entry points can be at least as long as ZTA is integrated into 5G edge computing and increased security measures are applied to accessing controls. The reliability and availability of systems are enhanced. The work offers solid guidelines on how this synergy could be accomplished, which can revolutionize modern conceptions of cyberspace security.
 
5G edge computing; Zero Trust Architecture; Cybersecurity; Micro-segmentation; Real-time data management; Access control; System resilience
 
https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2020-0031.pdf

Preview Article PDF

Saswata Dey. 5G Edge computing and zero trust architecture: A secure synergy. World Journal of Advanced Research and Reviews, 2020, 5(3), 180-192. Article DOI: https://doi.org/10.30574/wjarr.2020.5.3.0031

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution