Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

被引:19
|
作者
Alagappan, Annamalai [1 ]
Venkatachary, Sampath Kumar [2 ]
Andrews, Leo John Baptist [3 ]
机构
[1] Botho Univ, Fac Comp, Dept Network & Infrastruct Management, Gaborone, Botswana
[2] Grant Thornton, Plot 50370,Acumen Pk, Gaborone, Botswana
[3] Botho Univ, Fac Comp, Dept Software Engn, Gaborone, Botswana
关键词
Zero trust architecture; Zero trust networks; Virtual power plant; Distributed generators; Data protection; DISTRIBUTED ENERGY-RESOURCES; INTEGRATION; INTERNET; SYSTEM;
D O I
10.1016/j.egyr.2021.11.272
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Zero Trust Network Architecture implementation is gaining popularity in the ICT sector to defend and deter cyber threats or cyber crime. Considering the architecture's ability, it is unlikely that a single compromised endpoint in the zero-trust networks could spread laterally, infecting the whole network.This provides us with the ability to adopt the architecture in the energy sector. The popularity of the distributed generators helps us beself-reliant on the power and enables a consumer to supply the power to the grid. The pool of these small generators constitutes a virtual power plant. With this arrangement, its network is also exposed to security challenges. Protecting these physical systems, data protection, and information privacy becomes critical. Motivated by this convergence, this paper aims to present a comprehensive Zero trust security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.(c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:1309 / 1320
页数:12
相关论文
共 50 条
  • [41] Analysis of the network structure characteristics of virtual power plants based on a complex network
    Meng, Yue
    Zhang, Hongli
    Fan, Wenhui
    ELECTRIC POWER SYSTEMS RESEARCH, 2022, 204
  • [42] Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis
    Haque, Ekramul
    Hasan, Kamrul
    Ahmed, Imtiaz
    Alam, Md Sahabul
    Islam, Tariqul
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 463 - 467
  • [43] A sensor node architecture with zero standby power on wireless sensor network
    Yamawaki A.
    Yamanaka M.
    Serikawa S.
    Artificial Life and Robotics, 2015, 20 (3) : 210 - 216
  • [44] Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework
    Basta, Nardine
    Ikram, Muhammad
    Kaafar, Mohamed Ali
    Walker, Andy
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [45] Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
    Xiaohong Zhang
    Zilong Song
    Ata Jahangir Moshayedi
    Journal of Cloud Computing, 11
  • [46] Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
    Zhang, Xiaohong
    Song, Zilong
    Moshayedi, Ata Jahangir
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [47] Developing a three stage coordinated approach to enhance efficiency and reliability of virtual power plants
    Amissah, Jeremiah
    Abdel-Rahim, Omar
    Mansour, Diaa-Eldin A.
    Bajaj, Mohit
    Zaitsev, Ievgen
    Abdelkader, Sobhy
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [48] Retrofitted CCS technologies enhance economy, security, and equity in achieving carbon zero in power sector
    Zhou, Wenlong
    Fan, Wenrong
    Lan, Rujia
    Su, Wenlong
    Fan, Jing-Li
    APPLIED ENERGY, 2025, 378
  • [49] A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture
    Chen, Baozhan
    Qiao, Siyuan
    Zhao, Jie
    Liu, Dongqing
    Shi, Xiaobing
    Lyu, Minzhao
    Chen, Haotian
    Lu, Huimin
    Zhai, Yunkai
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10248 - 10263
  • [50] Research of security architecture for P2P network based on trust management system
    Zhang, DH
    Zhang, YQ
    Zhou, YY
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 184 - 189