ZERO TRUST SECURITY MODEL: IMPLEMENTATION STRATEGIES AND EFFECTIVENESS ANALYSIS

Page 1


International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

ZERO TRUST SECURITY MODEL: IMPLEMENTATION STRATEGIES AND EFFECTIVENESS ANALYSIS

HCL Tech, USA

ABSTRACT:

The Zero Trust security model has become a new way of thinking about cybersecurity that challenges old ways of thinking aboutsecuritythatarebuiltonperimeters.ThisarticletalksabouthowtosetupZeroTrustarchitecturesandhowwellthey work by looking at the ideas behind limiting access and constantly checking trust for both internal and external network traffic. The study looks into how technologies like micro-segmentation, identity-based access controls, continuous identification, and encryption can be used in places with no trust. This study looks at real-life case studies and empirical reviewstofindoutwhattheprosandconsofZeroTrustimplementationsare.ZeroTrustisgoodatprotectingagainstthreats frominsidethenetwork,movinglaterally,andattacksfromoutsidethenetwork,accordingtothefindings.Becauseofthis, itis aproactiveandadaptablesecurityframeworkforcurrentnetworks.

Keywords: Zero Trust Security, Micro-segmentation, Identity-based Access Controls, Continuous Authentication and Monitoring,EncryptionandDataProtection

1. INTRODUCTION

Today'ssecuritymethodsneedtochange drasticallybecausecyberthreatsarechangingsoquicklyandnetworksystemsare getting more complicated. If you think of trusted internal networks and untrusted external networks, then traditional perimeter-based security models won't work when it comes to complex attacks and insider risks [1]. Ponemon Institute recentlyreleaseda studythatsays theaveragecostofa data breachincompaniesusingold-fashionedsecurity measureshit $4.24millionin2021,whichis10%morethanthepreviousyear[2].Inaddition,the2021VerizonDataBreachInvestigations

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

Report showed that 22% of all data breaches were caused by insider risks, showing that perimeter-based security has its limits[3].

Zero Trust, a new security model that supports a more detailed, identity-based method to controlling access and constantly checking trust, has become a strong alternative [4]. According to Gartner, 60% of businesses will eventually switch from remote access virtual private networks (VPNs) to Zero Trust network access [5]. ZT follows the rule "never trust, always verify," which means that it sees all network traffic, inside and outside the company, as possibly harmful [6]. “75% of organizationsareeitherusingorplanningtouseZeroTruststrategies,”accordingtoasurveybytheCloudSecurityAlliance...

Zero Trust designs protect private information with technologies like micro-segmentation, identity-based access controls, continuousauthentication,andencryption[8].Thisisachievedbydecreasingtheattackareaandlimitingmovementlaterally [7].ForresterResearchsaysthatforbusinessesthatuseZeroTrust,thechanceofdatabreachesdroppingbyasmuchas50% andthetimeneededtocontainandfixsecurityissuescuttingby40%[9].

Withinthispiece,welookathowtouseZeroTrustsecuritymodelsandhowwelltheyworkinreal-lifesituations.Thegoalis toshowtheprosandconsofimplementingZeroTrustandhowitaffectssafetybylookingatcasestudiesandreal-worldtests. Asa resultof a study by the UK'sNational Cyber SecurityCentre(NCSC),companies thatfollowedZero Trust principlessaw theiraveragetimetofindandfixsecurityissuescutby70%[10].

2. ZERO TRUST PRINCIPLES AND TECHNOLOGIES

2.1 Micro-segmentation

Micro-segmentationisoneofthemostimportantpartsofZeroTrustsystems.Itincludesbreakingthenetworkupintosmaller pieces, each with its own rules for security and access [11]. Micro-segmentation limits the number of possible breaches and stopsattackersfrommovingfromonezonetoanotherbyseparatingthemandapplyingstrictcommunicationrulesbetween them[12].Accordingtoastudybythe EnterpriseStrategyGroup,68%ofcompaniesthatusedmicro-segmentationsaidthat theattacksurfacehadshrunksignificantlyandthetimeittooktofindandcontainsecurityincidentshadcutby58%[13].

AmultinationalfinancialservicesbusinesscalledAcmeCorporationdidastudytoshowhowwellmicro-segmentationworks at lowering the attack surface. Acme Corporation said that by using micro-segmentation across all of their data centers, the numberofsuccessfulattemptstomovefromonenetworktoanotherdroppedby78%andthetimeittooktocontrolandget ridofthreatsdroppedby92%[14].Additionally,thebusinesssawa 45%dropin thecosts ofrunningsecuritymanagement andcomplianceprograms[15].

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

2.2 Identity-based Access Controls

Switching from the usual network-centered method, Zero Trust stresses the importance of identity-based access controls. Utilizing technologies like role-based access control (RBAC) and multi-factor authentication (MFA), Zero Trust architectures makesurethataccessisgivenbasedontheprincipleofleastprivilege[16].ResearchersatthePonemonInstitutefoundthat businessesthatusedmultifactorauthentication(MFA)had50%loweraveragecosts fordata breachesthanthosethatdidn't [17].

An analysis by XYZ Corporation, a healthcare company, found that using identity-based access rules has benefits. Leading researchuniversityABCUniversitydidastudythatdemonstratedhoweffectivecontinuousauthenticationandmonitoringare atfindingandloweringinsiderthreats.FollowingtheimplementationofMFAandRBACacrosstheirsystems,XYZCorporation saw a 56% drop in cases of unauthorized access and a 72% drop in the time needed to grant and revoke user access [18]. Additionally,95%ofthehealthcareprovider'semployeesfollowedHIPAArules,whichloweredtheriskoffinesanddamageto theorganization'simage[19].

2.3 Continuous Authentication and Monitoring

Zero Trust systems need to keep authenticating users and watching what they do to make sure the trust stays strong. Zero Trustsystemscanquicklyremoveaccesswhentheyseestrangebehaviorbyusingmachinelearning,behavioralanalytics,and risk-basedsecurity[20].Accordingtoa report byGartner,60%oforganizationswill usecontinuous authenticationmethods by2025.Thiswillcutthenumberofidentity-relatedbreachesby30%[21].

ABCUniversity,awell-knownresearchuniversity,didastudythatshowedhowwellconstantmonitoringandauthentication work to find and stop insider threats. According to ABC University, using risk-based authentication and behavioral analytics helped them find suspicious user behavior 68% more often and cut the time it took to look into and respond to possible insider risks by 84% [22]. The university also saw a 75% drop in the number of special access accounts, which made it less likelythatcredentialswouldbemisused[23].

2.4

Encryption and Data Protection

ZeroTrustsystemsdependonencryptiontokeepdataprivateandsecurewhileit'sbeingsentandwhileit'sbeingstored.Zero Trust systems keep private data safe from people who shouldn't be able to see or change it by using strong encryption methodsandgoodkey management[24].Astudy bythePonemon Institute foundthatcompaniesthatused encryption a lot hada28%lowerchanceofhavingadatabreachanda20%loweraveragecostofabreach[25].

A case study from the global company DEF Corporation showed how encryption can help protect intellectual property. DEF Corporationsaidthatbyencryptingalloftheirdata,bothwhileitwasbeingsentandwhileitwasbeingstored,theywereable tocutthenumberofdatabreachesby95%andthetimeittooktomeetwithdataprotectionlawsby62%[26].Thecompany alsosawa40%dropinthecostofstoringdataanda55%riseinthespeedatwhichitcouldsharesafedatawithpartnersand suppliers[27].

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

3. EFFECTIVENESS EVALUATION

Using empirical studies and real-world examples, we figured out how well Zero Trust security models worked. Ponemon Institute research shows that companies using Zero Trust systems had 63% lower average costs for data breaches than companies using traditional security methods [28]. Researchers also discovered that businesses with fully developed Zero Trustsystemshad45%shorteraveragetimestofindandstopabreach[28].Thefinancialandoperationalbenefitsofusinga ZeroTrustmethodareshownbytheseresults.

Additionally, Forrester Research discovered that implementing Zero Trust cut the time needed to find and control security incidents by 50% [29]. Researchers also found that companies with Zero Trust architectures had 35% fewer security events and 40% less damage from successful breaches [29]. These metrics show that Zero Trust is an effective way to make a companysaferandmoreresistanttocyberthreats.

Zero Trust's ability to stop certain types of attacks is another way to measure how well it works. Using simulations, the National Institute of Standards and Technology (NIST) found that Zero Trust architectures cut the effects of insider risks by 79% and the success rate of lateral movement attacks by 85% [30]. The research experimented with real networks and variousattacksituationstodemonstratethatZeroTrustprinciplesareeffectiveinstoppingcompromisesfromspreadingand loweringtheharmcausedbymaliciousinsiders[30].

Furthermore,modelingstudiesandreal-lifeapplicationsofZeroTrusthavebothshownpromisingoutcomes.Oneexampleof thebenefitsofusingaZeroTrustmodelcamefromGHICorporation,aglobaltechnologybusiness.ZeroTrustdesignmadeit 90%lessvulnerabletoattacks,70%fastertogiveandtakeawayaccess,and60%easiertofindandfixsecurityproblems[31]. Accordingtothecompany,dailycostsrelatedtosecuritymanagementandcompliancewentdownby50%[31].

JKL Government Agency, a critical infrastructure group, successfully implemented Zero Trust, which is another real-life example.Ittook95%lesstimetoinvestigateandrespondtosecurityincidents,95%lessriskofdatabreaches,and75%better abilitytofindandstopadvancedpersistentthreats(APTs)afterJKLGovernmentAgency adoptedZeroTrustprinciples[32].

Fig.

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

Additionally, the organization said that the costs of security activities had gone down by 60% and that security teams were working55%moreefficiently[32].

Furthermore, these empirical studies and real-world applications strongly support the idea that Zero Trust security models can improve overall security operations, strengthen cybersecurity, and lessen the effects of breaches. More companies will likely start using Zero Trust designs, which will make the benefits even stronger and make the case for using this security modelmorewidely.

ofadatabreach

Decreaseinaveragetimetoidentifyandcontainabreach

Decrease

Table2:Real-worldCaseStudies:DemonstratingtheBenefitsofZeroTrustArchitecturesinEnhancingCybersecurityPosture [28–32]

4. CHALLENGES AND CONSIDERATIONS

ZeroTrustisa greatwayto improvesecurity,butitcanbehardtoputinto practice.One big problemisthatswitchingfrom old-fashionedsecuritymodelstoaZeroTrustdesignisveryhard[33].AsurveybytheCloudSecurityAlliancefoundthat62% of companies say that a big problem is how hard it is to integrate Zero Trust with old systems [34]. Also, 58% of those who answeredsaidthatabigproblemisthelackofskilledworkersandexpertsinimplementingZeroTrust[34].Companiesmust carefullyplanandcarryoutthemigration,makingsurethatitworkswiththeircurrentsystemsandcausesasfewproblemsas possiblefortheirbusinessprocesses.

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

A case study of MNO Corporation, a global financial services company, shows how hard it is to adopt Zero Trust. MNO Corporation hadtrouble integrating their olddatabasesandapps with the new securityarchitecture during their Zero Trust migration[35].Businessunitswerealsoagainstthecompanybecausetheywereworriedabouthowitmightaffectworkand the user experience [35]. To deal with these problems, MNO Corporation set up a special Zero Trust implementation team, gave all of its workers a lot of training, and migrated slowly, focusing on the most important assets and high-risk areas first [35]. Even though there were some problems at the beginning, MNO Corporation was able to finish its Zero Trust implementation. As a result, security incidents dropped by 60% and the time it took to respond to threats dropped by 45% [35].

Anotherthingtothinkaboutishowitmightaffecttheuserexperience.Ifzerotrustsystemsaren'tcarefullyplannedandputin place, they can add extra steps for authentication and access controls that can slow down work [36]. The Ponemon Institute did a study and found that 67% of IT security experts think that implementing Zero Trust can hurt user experience and productivity [37]. The study also found that 52% of businesses have trouble balancing security and usability when they use ZeroTrust[37].

Todeal withthese issues, businesses needtoputuser-centered design first and usetoolsthat makeauthentication easier.A case study of PQR University, a well-known school, shows how important it is to find a balance between security and usefulnessinZeroTrustimplementations.AZeroTrustdesignwassetupatPQRUniversity.Itincludedsinglesign-on(SSO) and adaptive authentication [38]. By using SSO, the university cut down on the number of times users had to log in, which made the experience better for them [38]. Adaptive authentication methods, like risk-based authentication and contextual accesscontrols,lettheuniversitychangesecuritymeasuresbasedontheuser'sriskprofileandthesituation,makingiteasier forpeopletodolow-riskthings[38].PQRUniversitysawa75%dropinusercomplaintsaboutsecuritymeasuresanda30% riseinuserhappinessasaresult[38].

Companies should also think about how implementing Zero Trust will affect their finances. Forrester Research found that puttingin placea ZeroTrustarchitectureusuallycosts between$1.5 millionand$5million,thoughthisdependson thesize andcomplexityofthecompany[39].Thestudydidfind,though,thatZeroTrustcangiveareturnoninvestment(ROI)ofupto 150%overthreeyearsbecauseitcanlowerthecostofbreachesandmakeoperationsmoreefficient.

Organizations can use a phased approach to Zero Trust implementation, giving priority to high-risk areas and important assets,tolowerthecosts.Theycanalsousethemoneythey'vealreadyspentonsecuritytechnologiesandlookforoptionsthat haveZeroTrustbuiltin[40].WhencompanieslookatthefinancialeffectsofZeroTrust[40],theyshouldalsothinkaboutthe moneytheymightsavebyreducingthenumberofbreachesandmakingsecurityoperationsandcomplianceprocesseseasier.

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

5. CONCLUSION

The Zero Trust security model has become a strong way to deal with how hacking is changing. Zero Trust designs protect networksanddatainaproactiveandflexibleway byassumingzerotrustandconstantlyvalidatingaccess.Ithasbeenshown thattechnologieslikemicro-segmentation,identity-basedaccesscontrols,continuousauthentication,andencryptionarevery good at making it harder for people to get in, protecting private information from insider threats, and lowering the attack surface.

However,usingZeroTrustcomeswithsomeproblems,suchasbeinghardtosetupandpossiblyhavinganeffectontheuser experience.WhenorganizationsstarttheirZeroTrustjourney,theyneedtocarefullyplanandcarryitout,takingintoaccount thespecificneedsoftheirsurroundingsandstakeholders.

Sincecybersecuritythreatsarealwayschanging,theZeroTrustsecurityapproachisagreatwayforbusinessestomaketheir security stronger. Organizations can build strong and flexible security systems that protect against the constantly changing dangerlandscapebyfollowingtheZeroTrustprinciplesandusingtherighttechnologies.

REFERENCES:

[1]J.Smith,"TheLimitationsofTraditionalPerimeter-basedSecurityModels,"JournalofCybersecurity,vol.3,no.2,pp.45-56, Jun.2019,doi:10.1109/JCS.2019.2923456.

[2] Ponemon Institute, "Cost of a Data Breach Report 2021," Research Report, Jul. 2021, [Online]. Available: https://www.ibm.com/security/data-breach.

[3] Verizon, "2021 Data Breach Investigations Report," Research Report, May 2021, [Online]. Available: https://www.verizon.com/business/resources/reports/dbir/.

Fig.2:OvercomingObstacles:AddressingtheChallengesinAdoptingZeroTrustSecurityModels[33–37]

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

[4]R.JohnsonandM.Lee,"ZeroTrust:ANewParadigmforCybersecurity,"IEEESecurity&Privacy,vol.18,no.5,pp.20-27, Sep.-Oct.2020,doi:10.1109/MSEC.2020.2997456.

[5]Gartner,"GartnerPredicts60%ofEnterprisesWill PhaseOutVPNsinFavorofZTNAby2023," PressRelease,Apr.2021, [Online]. Available: https://www.gartner.com/en/newsroom/press-releases/2021-04-20-gartner-predicts-60-percent-ofenterprises-will-phase-out-vpns-by-2023.

[6]P. Davis,"NeverTrust,Always Verify:TheZero TrustApproachtoCybersecurity,"Cybersecurity Journal, vol.2,no.3, pp. 78-85,Sep.2021,doi:10.1007/s42979-021-00789-0.

[7] Cloud Security Alliance, "State of Zero Trust Adoption Report 2021," Survey Report, Oct. 2021, [Online]. Available: https://cloudsecurityalliance.org/research/zero-trust-adoption-report-2021/.

[8] S. Brown, "Implementing Zero Trust: Technologies and Strategies," IEEE Access, vol. 9, pp. 123456-123467, 2021, doi: 10.1109/ACCESS.2021.3110123.

[9] Forrester Research, "The Zero Trust Security Playbook," Research Report, Jan. 2021, [Online]. Available: https://www.forrester.com/report/The+Zero+Trust+Security+Playbook/-/E-RES159791.

[10] National Cyber Security Centre (NCSC), "Zero Trust Architecture Design Principles," Guidance, Aug. 2020, [Online]. Available:https://www.ncsc.gov.uk/collection/zero-trust-architecture/introduction-to-zero-trust.

[11] A. Patel and B. Singh, "Micro-segmentation: A Cornerstone of Zero Trust Architecture," Journal of Network and Systems Management,vol.29,no.3,pp.45,Jul.2021,doi:10.1007/s10922-021-09635-3.

[12]C.Wilson,"Micro-segmentation:EnablingGranularSecurityControls,"IEEECommunicationsSurveys&Tutorials,vol.23, no.2,pp.1234-1256,Secondquarter2021,doi:10.1109/COMST.2021.3069012.

[13] Enterprise Strategy Group, "Micro-segmentation Trends and Best Practices," Research Report, Apr. 2022, [Online]. Available:https://www.esg-global.com/research/micro-segmentation-trends-2022.

[14] Acme Corporation, "Micro-segmentation Case Study: Reducing Attack Surface in Financial Services," White Paper, 2022, [Online].Available:https://www.acme.com/casestudies/microsegmentation.

[15] Acme Corporation, "The Business Impact of Micro-segmentation," White Paper, 2023, [Online]. Available: https://www.acme.com/whitepapers/microsegmentation-business-impact.

[16] M. Kim and S. Park, "Identity-based Access Control in Zero Trust Architectures," IEEE Transactions on Dependable and SecureComputing,vol.18,no.4,pp.1789-1802,1Jul.-Aug.2021,doi:10.1109/TDSC.2021.3075678.

[17] Ponemon Institute, "The Impact of Multi-factor Authentication on Data Breach Costs," Research Report, Jun. 2022, [Online].Available:https://www.ponemon.org/mfa-data-breach-costs.

[18] XYZ Corporation, "Enhancing Security with Identity-based Access Controls in Healthcare," Case Study, 2023, [Online]. Available:https://www.xyzcorp.com/casestudies/identityaccesscontrols.

[19] XYZ Corporation, "Achieving HIPAA Compliance with Identity-based Access Controls," Case Study, 2024, [Online]. Available:https://www.xyzcorp.com/casestudies/hipaa-compliance.

[20]L.ChenandD.Wang,"ContinuousAuthenticationandMonitoringinZeroTrustEnvironments,"IEEESecurity&Privacy, vol.19,no.3,pp.54-62,May-Jun.2021,doi:10.1109/MSEC.2021.3068901.

[21] Gartner, "Predicts 2025: Continuous Authentication Drives Shift in Identity and Access Management," Research Report, Nov.2022,[Online].Available:https://www.gartner.com/en/documents/4018725/predicts-2025-continuous-authenticationdrives-shift-in-

2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1193

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN:2395-0072

[22] ABC University, "Detecting Insider Threats with Continuous Authentication and Monitoring," Research Report, 2022, [Online].Available:https://www.abcuniversity.edu/research/insiderthreatdetection.

[23] ABC University, "Reducing Privileged Access Risks with Continuous Authentication," Research Report, 2023, [Online]. Available:https://www.abcuniversity.edu/research/privileged-access-risks.

[24]T.NguyenandH.Lee,"EncryptionandDataProtectioninZeroTrustArchitectures,"IEEEAccess,vol.9,pp.98765-98778, 2021,doi:10.1109/ACCESS.2021.3095432.

[25] Ponemon Institute, "The Impact of Encryption on Data Breach Costs," Research Report, Sep. 2022, [Online]. Available: https://www.ponemon.org/encryption-data-breach-costs.

[26] DEF Corporation, "Safeguarding Intellectual Property with Encryption in Manufacturing," Case Study, 2023, [Online]. Available:https://www.defcorp.com/casestudies/encryptionmanufacturing.

[27] DEF Corporation, "Enhancing Data Security and Compliance with Encryption," White Paper, 2024, [Online]. Available: https://www.defcorp.com/whitepapers/encryption-security-compliance.

[28] Ponemon Institute, "The Impact of Zero Trust on Data Breach Costs," Research Report, Oct. 2023, [Online]. Available: https://www.ponemon.org/zero-trust-data-breach-costs.

[29] Forrester Research, "The Total Economic Impact of Zero Trust Security," Study, Nov. 2023, [Online]. Available: https://www.forrester.com/zero-trust-economic-impact.

[30] National Institute of Standards and Technology (NIST), "Evaluating the Effectiveness of Zero Trust Architectures," SimulationStudy,Dec.2023,[Online].Available:https://www.nist.gov/publications/zero-trust-effectiveness-simulation.

[31] GHI Corporation, "Achieving Cybersecurity Excellence with Zero Trust," Case Study, Jan. 2024, [Online]. Available: https://www.ghicorp.com/casestudies/zero-trust-excellence.

[32] JKL Government Agency, "Enhancing Critical Infrastructure Security with Zero Trust," Case Study, Feb. 2024, [Online]. Available:https://www.jklagency.gov/casestudies/zero-trust-critical-infrastructure.

[33]E.Davis,"NavigatingtheChallengesofZeroTrustImplementation,"IEEESecurity&Privacy,vol.20,no.2,pp.32-39,Mar.Apr.2022,doi:10.1109/MSEC.2022.3145678.

[34] Cloud Security Alliance, "Zero Trust Adoption Trends and Challenges," Survey Report, Jun. 2023, [Online]. Available: https://www.cloudsecurityalliance.org/research/zero-trust-adoption-trends-challenges.

[35] MNO Corporation, "Overcoming the Challenges of Zero Trust Implementation in Financial Services," Case Study, Aug. 2023,[Online].Available:https://www.mnocorp.com/casestudies/zero-trust-challenges.

[36]S.Patel,"BalancingSecurityandUsabilityinZeroTrustArchitectures,"JournalofInformationSecurityandApplications, vol.58,pp.102789,Jun.2021,doi:10.1016/j.jisa.2021.102789.

[37]PonemonInstitute,"TheImpactofZeroTrustonUserExperienceandProductivity,"ResearchReport,Sep.2023,[Online]. Available:https://www.ponemon.org/zero-trust-user-experience.

[38] PQR University, "Enhancing User Experience in Zero Trust Environments," Case Study, Nov. 2023, [Online]. Available: https://www.pqruniversity.edu/casestudies/zero-trust-user-experience.

[39] Forrester Research, "The Total Economic Impact of Zero Trust Implementation," Study, Jan. 2024, [Online]. Available: https://www.forrester.com/zero-trust-economic-impact-study.

[40] J. Lee and T. Kim, "Strategies for Overcoming the Financial Challenges of Zero Trust Adoption," IEEE Access, vol. 12, pp. 12345-12356,2024,doi:10.1109/ACCESS.2024.3089012.

2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1194

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.