2023
DOI: 10.1007/978-3-031-36625-3_31
|View full text |Cite
|
Sign up to set email alerts
|

Secure Access Method of Power Internet of Things Based on Zero Trust Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…By combining zero trust network security architecture, a new method of energy internet security protection architecture can be constructed from four aspects: terminal access control, dynamic authorization management, unified identity management, and security as a service. Reference [17] believes that the security boundary of the power Internet of Things is fuzzy and the protection is difficult. Combined with a zero trust structure, security authentication and dynamic access control mechanisms are used to ensure secure terminal access and achieve abnormal behavior recognition.…”
Section: Zero Trust Architecturementioning
confidence: 99%
“…By combining zero trust network security architecture, a new method of energy internet security protection architecture can be constructed from four aspects: terminal access control, dynamic authorization management, unified identity management, and security as a service. Reference [17] believes that the security boundary of the power Internet of Things is fuzzy and the protection is difficult. Combined with a zero trust structure, security authentication and dynamic access control mechanisms are used to ensure secure terminal access and achieve abnormal behavior recognition.…”
Section: Zero Trust Architecturementioning
confidence: 99%