Poonam Chakravarty,
Jigar Pandya,
Rishita Sangani,
Disha Panchal,
- Assistant Professor, CSE/IT, Rai University, Ahmedabad, Gujarat, India
- Assistant Professor, Computer Science & Applications, Rai University, Ahmedabad, Gujarat, India
- B. Tech Student, CSE/IT Department, Rai University, Ahmedabad, Gujarat, India
- B. Tech Student, CSE/IT Department, Rai University, Ahmedabad, Gujarat, India
Abstract
This article titled “Zero Trust Implementation Challenges in Legacy Systems and Wireless Network Systems” delves into the evolving landscape of cybersecurity, emphasizing the inadequacy of traditional perimeter-based security models in the face of modern cyber threats. The Zero Trust Security framework is highlighted as an essential advancement in this scenario, emphasizing the core idea of “never trust, always verify.” This paradigm shift underscores the importance of continuous verification, least privilege access, and micro-segmentation of wired and wireless networks to mitigate risks associated with insider threats and compromised credentials. However, the implementation of Zero Trust principles is particularly challenging in sectors such as healthcare, government and manufacturing, where legacy systems and wireless network systems often lack essential security features like multi-factor authentication and real-time monitoring. These outdated infrastructures pose significant barriers to adopting a robust Zero Trust environment, necessitating a careful balance between enhancing securities and maintaining operational efficiency. The article further explores the multifaceted challenges organizations face when integrating Zero Trust principles within legacy and wireless network environments. Key hurdles include compatibility issues with existing technologies, operational disruptions during migration, limitations in data visibility and monitoring, compliance constraints, and cultural resistance to change. Every challenge is deeply tied to the distinct features of legacy systems, which were built without consideration for today’s security standards. To address these issues, the study proposes practical strategies such as micro-segmentation and software-defined perimeters, highlighting case studies that illustrate successful implementations across various sectors. Ultimately, the document aims to enrich the cybersecurity modernization dialogue by providing insights and solutions for organizations striving to enhance their security posture while navigating the complexities inherent in transitioning from legacy systems to a Zero Trust architecture.
Keywords: Zero Trust Security, legacy systems, wireless network security, cybersecurity challenges, micro-segmentation
[This article belongs to International Journal of Wireless Security and Networks (ijwsn)]
Poonam Chakravarty, Jigar Pandya, Rishita Sangani, Disha Panchal. Zero Trust Implementation Challenges in Legacy and Wireless Network Systems. International Journal of Wireless Security and Networks. 2025; 03(01):39-50.
Poonam Chakravarty, Jigar Pandya, Rishita Sangani, Disha Panchal. Zero Trust Implementation Challenges in Legacy and Wireless Network Systems. International Journal of Wireless Security and Networks. 2025; 03(01):39-50. Available from: https://journals.stmjournals.com/ijwsn/article=2025/view=0
References
- Rose S, Borchert O, Mitchell S, Chandramouli R. Zero Trust Architecture. NIST Special Publication 800-207. Washington, DC, USA: National Institute of Standards and Technology; 2020.
- Kindervag J, Balaouras S, Coit L. No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Cambridge, MA, USA: Forrester Research; 2010.
- Kissel R, Stine K, Scholl M, Rossman H, Fahlsing J, Gulick J. Security and Privacy Controls for Information Systems and Organizations. NIST Special Publication 800-53r5. Washington, DC, USA: National Institute of Standards and Technology. 2020. Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
- Nawaz H, Sethi MS, Nazir SS, Jamil U. Enhancing national cybersecurity and operational efficiency through legacy IT modernization and cloud migration: a US perspective. J Comput Biomed Inform. 2024; 7 (2): e865.
- Daah C, Qureshi A, Awan I, Konur S. Enhancing zero trust models in the financial industry through blockchain integration: a proposed framework. Electronics. 2024; 13 (5): 865.
- Ismail M, Abd El-Gawad AF. Revisiting zero-trust security for internet of things. Sustain Mach Intell J. 2023; 3: 6–11.
- Roy A, Dhar A, Tinny SS. Strengthening IoT cybersecurity with zero trust architecture: a comprehensive review. J Comput Sci Inform Technol. 2024; 1 (1): 25–50.
- Seaman J. Zero trust security strategies and guidelines. In: Montasari R, Carpenter V, Masys AJ, editors. Digital Transformation in Policing: The Promise, Perils and Solutions. Cham, Switzerland: Springer; 2023. pp. 149–168.
- Ghasemshirazi S, Shirvani G, Alipour MA. Zero Trust: applications, challenges, and opportunities. arXiv [Preprint]. September 7, 2023. Available at https://arxiv.org/abs/2309.03582
- Botwright R. Zero Trust Security: Building Cyber Resilience & Robust Security Postures. Morden, UK: Pastor Publishing; 2023.
- Baldassarre MT, Barletta VS, Caivano D, Scalera M. Integrating security and privacy in software development. Softw Qual J. 2020; 28 (3): 987–1018.
- Singh TK. India’s Cybersecurity Policy: Evolution and Trend Analyses. New York, NY, USA: Taylor & Francis; 2024.
- Nair CD, editor. Emerging Defence, Maritime and Aerospace Technologies by DRaS. New Delhi, India: Highlyy Publ LLP; 2023.
- Abie H, Schulz T, Savola R. Adaptive security and trust management for autonomous messaging systems. arXiv [Preprint]. March 4, 2022. Available at https://arxiv.org/abs/2203.03559
- Khajuria S, Sørensen L, Skouby KE, editors. Cybersecurity and Privacy – Bridging the Gap. Gistrup, Denmark: River Publishers; 2017.

International Journal of Wireless Security and Networks
| Volume | 03 |
| Issue | 01 |
| Received | 23/12/2024 |
| Accepted | 30/12/2024 |
| Published | 24/02/2025 |
| Publication Time | 63 Days |
async function fetchCitationCount(doi) {
let apiUrl = `https://api.crossref.org/works/${doi}`;
try {
let response = await fetch(apiUrl);
let data = await response.json();
let citationCount = data.message[“is-referenced-by-count”];
document.getElementById(“citation-count”).innerText = `Citations: ${citationCount}`;
} catch (error) {
console.error(“Error fetching citation count:”, error);
document.getElementById(“citation-count”).innerText = “Citations: Data unavailable”;
}
}
fetchCitationCount(“10.37591/IJWSN.v03i01.0”);