Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
Round 1
Reviewer 1 Report
This paper proposed to apply the SPA single-package authorization and endogenous security architecture to the zero-trust authentication system, which can realize the reliability, dynamism and diversity of system defense.
The paper has the following issues:
1. The authors need to add the main findings of the study in the abstract.
2. The authors need to add the main implications in brief of the study in the abstract.
3. The related works is very poor. The authors need to add more recent studies in the cybersecurity. Please cite the following studies:
- Classification of cyber security threats on mobile devices and applications
- Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks
- A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology
- A new hybrid text encryption approach over mobile ad hoc network
- Cyber security threats in cloud: Literature review
- Cybersecurity in Smart City: A systematic mapping study
4. The authors must add comparison between the results of the proposed system and other systems in the literature.
The paper can be accepted after performing the above comments.
Author Response
Thank you very much for your suggestion, the relevant response in the document.
Author Response File: Author Response.pdf
Reviewer 2 Report
<div><br class="Apple-interchange-newline">The paper presents an interesting idea, which is very important nowadays. But as a big minus of it, I can mention absolute absence of cryptographic review of such question. In the same time, cryptography lies on the frontier line of such questions. Need to be made an overview of existing papers, for an example the works of Adi Shamir on zero knowledge proof algorithms, also in the paper when authors talks about authentication, what algorithms are taking into account? </div>
Author Response
Thank you very much for your suggestion, the relevant response in the document.
Author Response File: Author Response.pdf
Round 2
Reviewer 1 Report
All comments have been achieved. No further comments
Reviewer 2 Report
The papaer can be accepted for the publication.