Inspiration
In today’s world, billions of IoT devices power critical systems, from hospitals and smart cities to manufacturing and defense. But these same connected devices are now prime targets for cyberattacks such as ransomware, spoofing, and data breaches. Recent incidents, including attacks on hospital networks and energy infrastructure, show how one weak device can compromise an entire operation.
We were motivated to develop a Zero Trust IoT security architecture that enforces modern cybersecurity principles. Our system helps organizations stop attacks before they spread by continuously verifying every device and behavior without ever assuming trust. Zero Trust is more than just a policy when operational and digital safety are intertwined.
What it does
This project monitors security events from simulated IoT devices running in VirtualBox, showing live logs of allowed requests, denied spoofing attempts, and suspicious activity. Users can trigger simulated attacks with a single button to test the system. The dashboard automatically updates metrics and color-coded logs in real time, providing a clear and interactive view of the security state. This project integrates real-time monitoring, attack simulation, and an intuitive UI to visualize IoT device activity for security analysis.
How we built it
We built the dashboard using Streamlit for the user interface, Python for data processing, and Pandas to handle the log files. IoT devices were simulated using VirtualBox VMs, sending their data to a local gateway, which stores logs in real time. Attack simulations were triggered via a Python script, updating the dashboard automatically. We implemented dynamic metrics and color-coded logs to make security events easy to monitor.
Challenges we ran into
- Endpoint restrictions affecting virtualization hardware access | Enterprise endpoint with some advanced security restrictions was unable to effectively create the virtualize nodes.
- After multiple failed attempts to manually mount the .vdx file contained Ubuntu, we switched the virtual infrastructure to VirtualBox.
- Ensuring persistence of the FastAPI service on VM-Gateway required interaction with systemd.
- Potential ISO or VM configuration issues causing mid-write crash.
- Sourcing and installed the Ubuntu 22.0.4 .iso file to an external drive caused I/O errors when attempting to create the virtual machines inside of VirtualBox.
- Troubleshooting of non-NAT adapter traffic between client and server.
- Host file modification. In other words, within the context of a private network for simulation, we needed to modify the host file in order to support DNS resolution in scope.
- Enterprise level restrictions required copies of permissions across directories.
- Working in the terminal for different python scripts to be created
Accomplishments that we're proud of
- This was our first hack-a-thon as a team, and we quickly worked together to assume roles which played to our individual strengths.
- Being able to work within the constraints of a less permissive enterprise device, while still being able to create a virtualized infrastructure.
- Troubleshooting the implementation of the virtualized infrastructure and being able to shift from Hyper-V to VirtualBox.
- Started a service on the VM-Gateway host and confirmed that port binding between 127.0.0.0:8000 is functional. (*Image: IT'S ALIVE! *); and ensuing that this service maintains persistence following power cycles using systemd modification.
What we learned
- We learned that modifying the transmission states of virtual machine adapters i.e. modifying from [NAT-to-Intranet], VirtualBox allows users to "pause" the machine, and make changes the network adapter on-the-fly, instead of requiring a full power cycle, and modification to the VMs settings. We also learned how powerful the concept of Zero Trust can be when applied to real-world systems, especially in environments where reliability and safety are non-negotiable. Building the simulation taught us that security isn’t just about keeping attackers out, but about constantly verifying trust between every connected device. We saw firsthand how even small lapses in identity management could expose an entire network, and how enforcing principles like least privilege and continuous verification can prevent that. On the technical side, we gained experience integrating authentication frameworks like Auth0, designing secure API gateways with FastAPI, and visualizing security events through real-time dashboards. More importantly, we understood that cybersecurity isn’t just a technical challenge, it’s a societal responsibility that protects people, data, and the systems they depend on every day.
What's next for Zero Trust IOT
- In the future, we plan to expand the dashboard to support real IoT devices in addition to the VirtualBox simulations. We want to integrate automated alerts using emails or text notifications when suspicious activity is detected. Adding advanced analytics for anomaly detection are also on the roadmap. Finally, we aim to make the system cloud-ready, so it can scale and monitor multiple gateways across different networks. In the future, Zero Trust IoT will evolve from a security framework into a core foundation for how connected systems operate. As billions of new devices come online, from hospital sensors to autonomous vehicles, the ability to verify each device’s identity, intent, and behavior in real time will be essential. The next step is combining Zero Trust with AI-driven analytics to detect anomalies faster and adapt policies automatically. We also expect growth in hardware-backed identities using secure elements and TPMs, ensuring devices can prove who they are at a hardware level. Additionally, edge computing will play a major role, pushing Zero Trust enforcement closer to where data is generated, rather than relying on central servers. Ultimately, Zero Trust IoT will help create ecosystems that are not only connected but self-defending, where every device continuously earns and maintains trust before it can interact with others.
Built With
- 0.0.0.0
- adapter
- apt
- bridging
- client-server-network
- connectivity
- curl
- dhcp
- endpoint
- etc/hosts
- firefox
- firewall
- gateway
- gemini
- host
- hostname
- hyper-v
- ifconfig
- indentation
- internal-network
- ip-addr
- iptables
- ipv4
- localhost
- logs
- nat
- nc
- netplan
- networkmanager
- node-1
- node-2
- openai
- permissions
- ping
- port
- pycharm
- python
- service
- snap
- static-ip
- subnet
- symlink
- systemd
- tarball
- testing
- ubuntu
- ufw
- update
- uvicorn
- virtual-box
- virtualbox
- yaml



Log in or sign up for Devpost to join the conversation.