Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

被引:19
|
作者
Alagappan, Annamalai [1 ]
Venkatachary, Sampath Kumar [2 ]
Andrews, Leo John Baptist [3 ]
机构
[1] Botho Univ, Fac Comp, Dept Network & Infrastruct Management, Gaborone, Botswana
[2] Grant Thornton, Plot 50370,Acumen Pk, Gaborone, Botswana
[3] Botho Univ, Fac Comp, Dept Software Engn, Gaborone, Botswana
关键词
Zero trust architecture; Zero trust networks; Virtual power plant; Distributed generators; Data protection; DISTRIBUTED ENERGY-RESOURCES; INTEGRATION; INTERNET; SYSTEM;
D O I
10.1016/j.egyr.2021.11.272
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Zero Trust Network Architecture implementation is gaining popularity in the ICT sector to defend and deter cyber threats or cyber crime. Considering the architecture's ability, it is unlikely that a single compromised endpoint in the zero-trust networks could spread laterally, infecting the whole network.This provides us with the ability to adopt the architecture in the energy sector. The popularity of the distributed generators helps us beself-reliant on the power and enables a consumer to supply the power to the grid. The pool of these small generators constitutes a virtual power plant. With this arrangement, its network is also exposed to security challenges. Protecting these physical systems, data protection, and information privacy becomes critical. Motivated by this convergence, this paper aims to present a comprehensive Zero trust security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.(c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:1309 / 1320
页数:12
相关论文
共 50 条
  • [21] Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
    Venkatachary S.K.
    Alagappan A.
    Andrews L.J.B.
    Energy Informatics, 2021, 4 (01)
  • [22] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [23] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [24] An analysis of zero-trust architecture and its cost-effectiveness for organizational security
    Adahman, Zillah
    Malik, Asad Waqar
    Anwar, Zahid
    COMPUTERS & SECURITY, 2022, 122
  • [25] Enabling 6G Security: The Synergy of Zero Trust Architecture and Artificial Intelligence
    Sedjelmaci, Hichem
    Tourki, Kamel
    Ansari, Nirwan
    IEEE NETWORK, 2024, 38 (03): : 171 - 177
  • [26] Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
    Jin, Wenzhong
    Wu, Shanjun
    Feng, Yu
    Wang, Huijing
    Fu, Chunyu
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2025, 22 (02) : 263 - 277
  • [27] Securing the Metaverse: A Blockchain-Enabled Zero-Trust Architecture for Virtual Environments
    Din, Ikram Ud
    Khan, Kamran Habib
    Almogren, Ahmad
    Zareei, Mahdi
    Diaz, Jesus Arturo Perez
    IEEE ACCESS, 2024, 12 : 92337 - 92347
  • [28] Cyber Security of SCADA Network in Thermal Power Plants
    Lakhoua, Mohamed Najeh
    2018 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING (SMARTNETS), 2018,
  • [29] Secure Access Method of Power Internet of Things Based on Zero Trust Architecture
    Wang, Zhi-hua
    Jin, Ming-hui
    Jiang, Lin
    Feng, Chen-jia
    Cao, Jing-yi
    Yun, Zhang
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2023, PT II, 2023, 13969 : 386 - 399
  • [30] IP Based Security Architecture of Virtual Network in Cloud Computing System
    Yang, Jong-Sung
    Choi, Hyoung-Kee
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 709 - 715