Secure Access Method of Power Internet of Things Based on Zero Trust Architecture

被引:4
|
作者
Wang, Zhi-hua [1 ]
Jin, Ming-hui [1 ]
Jiang, Lin [2 ]
Feng, Chen-jia [1 ]
Cao, Jing-yi [2 ]
Yun, Zhang [1 ]
机构
[1] State Grid Shanghai Elect Power Co, Shanghai 200122, Peoples R China
[2] China Elect Power Res Inst, Beijing 100192, Peoples R China
关键词
Power Internet of Things; Zero Trust; Secure Access; Identity Authentication; Access Control; Distributed Power;
D O I
10.1007/978-3-031-36625-3_31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of the energy Internet, the terminals of the power Internet of Things are open and interactive, the grid protection boundary is ambiguous, and the traditional boundary based security system is difficult to ensure the secure access of the power Internet of things terminals. The program proposed a secure access method for the power system based on the zero-trust architecture. It takes the identity of the terminal as the center to carry out security authentication and dynamic access control. Based on the device fingerprint extraction and the Identification Public Key algorithm, the lightweight security authentication of the power terminal is realized. Through the trust calculation method based on terminal operating characteristics, continuous trust assessment and dynamic access control are carried out. The method is verified in the distributed power security access scenario. For common flood attacks, packet attacks and malicious code attacks, the security access method of the power Internet of Things based on the zero-trust architecture can effectively detect and block them in time, which can avoid attackers from conducting cyber attacks on the grid by controlling power IoT terminals (This work was supported by the State Grid Shanghai Technology Project, Research on Key Technologies for Network Security Access of Power Monitoring System Based on Zero Trust.).
引用
收藏
页码:386 / 399
页数:14
相关论文
共 50 条
  • [1] Internet of Things Terminal Access Security Based on Zero Trust
    Qiu, RiXuan
    Zhang, JunFeng
    Chen, Lu
    Li, Wei
    Lin, Nan
    2022 6TH INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, ISCSIC, 2022, : 7 - 11
  • [2] Towards A Secure Access Control Architecture for the Internet of Things
    Pal, Shantanu
    Hitchens, Michael
    Varadharajan, Vijay
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 219 - 222
  • [3] Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things
    Crowther, Kenneth G.
    IEEE SECURITY & PRIVACY, 2024, 22 (05) : 96 - 102
  • [4] Secure Layers Based Architecture for Internet of Things
    Singh, Dhananjay
    Tripathi, Gaurav
    Jara, Antonio
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 321 - 326
  • [5] A dynamic trust based clustering method for secure data gathering in Internet of Things
    Naghibi, Maryam
    Barati, Hamid
    Barati, Ali
    COMPUTING, 2025, 107 (04)
  • [6] Design and Implementation of the Zero Trust Model in the Power Internet of Things
    Wu, Kehe
    Cheng, Rui
    Xu, Huiyan
    Tong, Jie
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2023, 2023
  • [7] A continuous authentication scheme for zero-trust architecture in industrial internet of things
    Wan, Tao
    Shi, Buhai
    Wang, Huan
    Alexandria Engineering Journal, 2025, 122 : 555 - 563
  • [8] A Novel Secure Architecture for the Internet of Things
    Qian, Jiewei
    Xu, He
    Li, Peng
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 398 - 401
  • [9] A Secure Networking Architecture for the Internet of Things
    Wu Shao-xing
    Ma Yu-jun
    Xiang Yan-tie
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 135 - 140
  • [10] Blockchain-based Zero Trust Cybersecurity in the Internet of Things
    Li, Shancang
    Nepal, Surya
    Tryfonas, Theo
    Li, Hongwei
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2023, 23 (03)