Skip to main content

Secure Access Method of Power Internet of Things Based on Zero Trust Architecture

  • Conference paper
  • First Online:
Advances in Swarm Intelligence (ICSI 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13969))

Included in the following conference series:

Abstract

With the development of the energy Internet, the terminals of the power Internet of Things are open and interactive, the grid protection boundary is ambiguous, and the traditional boundary based security system is difficult to ensure the secure access of the power Internet of things terminals. The program proposed a secure access method for the power system based on the zero-trust architecture. It takes the identity of the terminal as the center to carry out security authentication and dynamic access control. Based on the device fingerprint extraction and the Identification Public Key algorithm, the lightweight security authentication of the power terminal is realized. Through the trust calculation method based on terminal operating characteristics, continuous trust assessment and dynamic access control are carried out. The method is verified in the distributed power security access scenario. For common flood attacks, packet attacks and malicious code attacks, the security access method of the power Internet of Things based on the zero-trust architecture can effectively detect and block them in time, which can avoid attackers from conducting cyber attacks on the grid by controlling power IoT terminals (This work was supported by the State Grid Shanghai Technology Project, Research on Key Technologies for Network Security Access of Power Monitoring System Based on Zero Trust.).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bedi, G., Venayagamoorthy, G.K., Singh, R., et al.: Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet Things J. 5(2), 847–870 (2018)

    Article  Google Scholar 

  2. Xiaojian, Z., Liandong, C., Jie, F., et al.: Power IoT security protection architecture based on zero trust framework. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 166–170. IEEE (2021)

    Google Scholar 

  3. Zhang, H., Liu, B., Wu, H.: Smart grid cyber-physical attack and defense: a review. IEEE Access 9, 29641–29659 (2021)

    Article  Google Scholar 

  4. Tuballa, M.L., Abundo, M.L.: A review of the development of Smart Grid technologies. Renew. Sustain. Energy Rev. 59, 710–725 (2016)

    Article  Google Scholar 

  5. Sellitto, G.P., Aranha, H., Masi, M., Pavleska, T.: Enabling a zero trust architecture in smart grids through a digital twin. In: Dependable Computing - EDCC 2021 Workshops, EDCC 2021. Communications in Computer and Information Science, vol. 1462. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86507-8_7

  6. Mir, A., Rashid, I., Kumar, K.R.: An augmented smart grid based SCADA security management system (SSMS) based on zero-trust architecture. In: Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27–28 February 2020, Jamia Hamdard, New Delhi, India (2021)

    Google Scholar 

  7. Wu, Y.G., Yan, W.H., Wang, J.Z.: Real identity based access control technology under zero trust architecture. In: 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG), pp. 18–22. IEEE (2021)

    Google Scholar 

  8. Sellitto, G.P., Aranha, H., Masi, M., Pavleska, T.: Enabling a zero trust architecture in smart grids through a digital twin. In: Dependable Computing - EDCC 2021 Workshops. EDCC 2021. Communications in Computer and Information Science, vol. 1462, pp. 73–81. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86507-8_7

  9. Alipour, M.A., Ghasemshirazi, S., Shirvani, G.: Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid. arXiv preprint arXiv:2210.01739 (2022)

  10. He, Y., Huang, D., Chen, L., et al.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022, 1–13 (2022)

    Google Scholar 

  11. Sundmaeker, H., Guillemin, P., Friess, P., et al.: Vision and Challenges for Realising the Internet of Things. Cluster of European research projects on the internet of things, European Commission, vol. 3, no. 3, pp. 34–36 (2010)

    Google Scholar 

  12. Sultana, M., Hossain, A., Laila, F., et al.: Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med. Inform. Decis. Mak. 20(1), 1–10 (2020)

    Article  Google Scholar 

  13. Lux, Z.A., Thatmann, D., Zickau, S., et al.” Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials. In: 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 71–78. IEEE (2020)

    Google Scholar 

  14. Haqani, E.A., Baig, Z., Jiang, F.: A decentralised blockchain-based secure authentication scheme for IoT devices. In: Suma, V., Baig, Z., Kolandapalayam Shanmugam, S., Lorenz, P. (eds.) Inventive Systems and Control. Lecture Notes in Networks and Systems, vol. 436. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-1012-8_9

  15. Jia, X., Hu, N., Yin, S., et al.: A2 chain: a blockchain-based decentralized authentication scheme for 5G-enabled IoT. Mob. Inf. Syst. 2020, 1–19 (2020)

    Google Scholar 

  16. Mehta, M., Patel, K.: A review for IOT authentication–current research trends and open challenges. Mater. Today Proc. (2020)

    Google Scholar 

  17. Djenna, A., Harous, S., Saidouni, D.E.: Internet of things meet internet of threats: new concern cyber security issues of critical cyber infrastructure. Appl. Sci. 11(10), 4580 (2021)

    Article  Google Scholar 

  18. Pothumarti, R., Jain, K., Krishnan, P.: A lightweight authentication scheme for 5G mobile communications: a dynamic key approach. J. Ambient Intell. Humanized Comput., 1–19 (2021). https://doi.org/10.1007/s12652-020-02857-4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-hua Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Zh., Jin, Mh., Jiang, L., Feng, Cj., Cao, Jy., Yun, Z. (2023). Secure Access Method of Power Internet of Things Based on Zero Trust Architecture. In: Tan, Y., Shi, Y., Luo, W. (eds) Advances in Swarm Intelligence. ICSI 2023. Lecture Notes in Computer Science, vol 13969. Springer, Cham. https://doi.org/10.1007/978-3-031-36625-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-36625-3_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-36624-6

  • Online ISBN: 978-3-031-36625-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics