2022
DOI: 10.1016/j.egyr.2021.11.272
|View full text |Cite
|
Sign up to set email alerts
|

Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…Zero trust represents a new generation of network security protection, which means we do not trust anyone, devices, and systems inside or outside the enterprise network [50]. In the face of internal and external threats, the data security hierarchical dynamic access control is realized through the zero trust model to verify the data compliance.…”
Section: Prospects For Future Researchmentioning
confidence: 99%
“…Zero trust represents a new generation of network security protection, which means we do not trust anyone, devices, and systems inside or outside the enterprise network [50]. In the face of internal and external threats, the data security hierarchical dynamic access control is realized through the zero trust model to verify the data compliance.…”
Section: Prospects For Future Researchmentioning
confidence: 99%
“…To close the trust gap [18] adopted the ZTA framework and proposed a trust model in cloud environments, their study offered a fine-grained model to enhancing trust in an organization"s information system reference components from the National Institute of standard and technology was adopted in the design, and performance analysis was carried out to test the efficacy of the model, it was evident that intrusion can be controlled with the distribution of trust-based node. Owing to the inefficiencies of current cyber security measures in virtual power plants [19] adopted the ZTA to enhance privacy and data protection in the energy sector, their model was built on the ZTA foundation and performance provided a feasible solution to data theft and breaches. The use cases of zero trust have continued to rise since the emergence of the pandemic and have changed the dynamics of work the place environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The trunk ensures the trust of the business and minimizes the untrusted security risks. Alagappan et al (2022) proposed a zero trust network architecture to enhance the security of virtual power plants. In order to prevent and contain network threats or network crimes, considering the ability of the architecture, a single damaged endpoint in a zero trust network is unlikely to spread horizontally, thus infecting the entire network.…”
Section: Introductionmentioning
confidence: 99%