Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

被引:19
|
作者
Alagappan, Annamalai [1 ]
Venkatachary, Sampath Kumar [2 ]
Andrews, Leo John Baptist [3 ]
机构
[1] Botho Univ, Fac Comp, Dept Network & Infrastruct Management, Gaborone, Botswana
[2] Grant Thornton, Plot 50370,Acumen Pk, Gaborone, Botswana
[3] Botho Univ, Fac Comp, Dept Software Engn, Gaborone, Botswana
关键词
Zero trust architecture; Zero trust networks; Virtual power plant; Distributed generators; Data protection; DISTRIBUTED ENERGY-RESOURCES; INTEGRATION; INTERNET; SYSTEM;
D O I
10.1016/j.egyr.2021.11.272
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Zero Trust Network Architecture implementation is gaining popularity in the ICT sector to defend and deter cyber threats or cyber crime. Considering the architecture's ability, it is unlikely that a single compromised endpoint in the zero-trust networks could spread laterally, infecting the whole network.This provides us with the ability to adopt the architecture in the energy sector. The popularity of the distributed generators helps us beself-reliant on the power and enables a consumer to supply the power to the grid. The pool of these small generators constitutes a virtual power plant. With this arrangement, its network is also exposed to security challenges. Protecting these physical systems, data protection, and information privacy becomes critical. Motivated by this convergence, this paper aims to present a comprehensive Zero trust security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.(c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:1309 / 1320
页数:12
相关论文
共 50 条
  • [1] Zero Trust-Based Mobile Network Security Architecture
    Liu, Yiliang
    Su, Zhou
    Peng, Haixia
    Xiang, Yushan
    Wang, Wei
    Li, Ruidong
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 82 - 88
  • [2] Zero Trust Security in the Mist Architecture
    Uehara, Minoru
    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021, 2021, 278 : 185 - 194
  • [3] Power IoT security protection architecture based on zero trust framework
    Zhang Xiaojian
    Chen Liandong
    Jie, Fan
    Wang Xiangqun
    Wang Qi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 166 - 170
  • [4] Optimization Design of Zero Trust Network Architecture for New Power Systems
    Bin, Dongmei
    Ming, Shaofeng
    Yang, Chunyan
    Fu, Hua
    Ling, Ying
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 282 - 286
  • [5] Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
    Kholidy, Hisham A.
    Karam, Andrew
    Sidoran, James
    Rahman, Mohammad A.
    Mahmoud, Mohammed
    Badr, Mahmoud
    Mahmud, Maqsood
    Sayed, Ahmed F.
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [6] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [7] Security System Design and Verification for Zero Trust Architecture
    Lee, Sangdo
    Huh, Jun-Ho
    Woo, Hanchul
    ELECTRONICS, 2025, 14 (04):
  • [8] A Trust System Architecture for SCADA Network Security
    Coates, Gregory M.
    Hopkinson, Kenneth M.
    Graham, Scott R.
    Kurkowski, Stuart H.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 158 - 169
  • [9] On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse
    AlShehhi, Fatema
    Otoum, Safa
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 30 - 37
  • [10] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)