Corresponding author: Oluwatosin Oladayo ARAMIDE Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0. Zero-trust identity principles in next-gen networks: AI-driven continuous verification for secure digital ecosystems Oluwatosin Oladayo ARAMIDE * Department Network and Storage Layer, Netapp Ireland Limited, Ireland. World Journal of Advanced Research and Reviews, 2024, 23(03), 3304-3316 Publication history: Received on 20 July 2024; revised on 23 September 2024; accepted on 28 September 2024 Article DOI: https://doi.org/10.30574/wjarr.2024.23.3.2656 Abstract With the rise in the decentralization of digital ecosystems, identity has come out as the new pillar of cybersecurity in the next generation networks. However, with the increasing complexity of the threats that include the hybrid, cloud- native, and edge computing, traditional models relying on perimeters cannot solve the problem as well as before. Zero Trust Architecture (ZTA) alters the security paradigm by applying the concept of never trust, always verify, so that everything must constantly be authenticated and dynamically authorized by everyone and everything. In this paper we will be examining how Zero Trust is changing the way identity management is done by eliminating static credentials and role-based access with real-time verification using behavior. At the heart of such transformation lies the inclusion of Artificial Intelligence (AI), which facilitates the constant evaluation of trust on the basis of any contextual data such as device posture, user behavior, geolocation and access patterns. We hypothesize a dynamic trust model that leverages machine-learning models to generate dynamically adaptive trust scores and make policy decisions in execution. The model supports the main issues in identity lifecycle, detection of threats, and risk aware access control. The paper also discusses security, scalability, and privacy of using AI to insert identity verification workflow. In this way, we will show how smart automation can reinforce access control in next-gen networks by applying Zero Trust principles that provide a robust, scalable, and context-aware defense to attackers based on identity in next-gen networks. Keywords: Zero Trust Architecture (ZTA); Identity Management; Next-Generation Networks; Artificial Intelligence; Dynamic Trust Assessment; Cybersecurity 1. Introduction With the changing environment of digital connectivity, the traditional barriers of enterprise networks are fast evaporating. This way, cloud computing, mobile-first ecosystems, hybrid workplaces, and Internet of Things (IoT) products have changed the user, device, application, and data relationship. With organizations also moving to a distributed architecture and using next generation network infrastructures like 5G, edge computing, and software- defined networks (SDN), the attack surface has grown exponentially. This development has made the old perimeter security paradigm which is based on implicit trust of the internal actors obsolete and extremely susceptible to more advanced threats in the cyber space. To solve these problems, Zero Trust Architecture (ZTA) has emerged as a revolutionary approach that does not trust any user, device, or service implicitly, either inside or outside the network perimeter. Based on the fundamental principle of "never trust, always verify", Zero Trust reshapes security as a continuous process of dynamic verification, strong access control, and contextual policy enforcement. Identity is at the center here and is the new security boundary. Unlike static credentials-based legacy Identity and Access Management (IAM) solutions, Zero Trust demands continuous identity validation and dynamic access decisions on the basis of current context and risk.