Abstract
With the development of the energy Internet, the terminals of the power Internet of Things are open and interactive, the grid protection boundary is ambiguous, and the traditional boundary based security system is difficult to ensure the secure access of the power Internet of things terminals. The program proposed a secure access method for the power system based on the zero-trust architecture. It takes the identity of the terminal as the center to carry out security authentication and dynamic access control. Based on the device fingerprint extraction and the Identification Public Key algorithm, the lightweight security authentication of the power terminal is realized. Through the trust calculation method based on terminal operating characteristics, continuous trust assessment and dynamic access control are carried out. The method is verified in the distributed power security access scenario. For common flood attacks, packet attacks and malicious code attacks, the security access method of the power Internet of Things based on the zero-trust architecture can effectively detect and block them in time, which can avoid attackers from conducting cyber attacks on the grid by controlling power IoT terminals (This work was supported by the State Grid Shanghai Technology Project, Research on Key Technologies for Network Security Access of Power Monitoring System Based on Zero Trust.).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bedi, G., Venayagamoorthy, G.K., Singh, R., et al.: Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet Things J. 5(2), 847–870 (2018)
Xiaojian, Z., Liandong, C., Jie, F., et al.: Power IoT security protection architecture based on zero trust framework. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 166–170. IEEE (2021)
Zhang, H., Liu, B., Wu, H.: Smart grid cyber-physical attack and defense: a review. IEEE Access 9, 29641–29659 (2021)
Tuballa, M.L., Abundo, M.L.: A review of the development of Smart Grid technologies. Renew. Sustain. Energy Rev. 59, 710–725 (2016)
Sellitto, G.P., Aranha, H., Masi, M., Pavleska, T.: Enabling a zero trust architecture in smart grids through a digital twin. In: Dependable Computing - EDCC 2021 Workshops, EDCC 2021. Communications in Computer and Information Science, vol. 1462. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86507-8_7
Mir, A., Rashid, I., Kumar, K.R.: An augmented smart grid based SCADA security management system (SSMS) based on zero-trust architecture. In: Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27–28 February 2020, Jamia Hamdard, New Delhi, India (2021)
Wu, Y.G., Yan, W.H., Wang, J.Z.: Real identity based access control technology under zero trust architecture. In: 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG), pp. 18–22. IEEE (2021)
Sellitto, G.P., Aranha, H., Masi, M., Pavleska, T.: Enabling a zero trust architecture in smart grids through a digital twin. In: Dependable Computing - EDCC 2021 Workshops. EDCC 2021. Communications in Computer and Information Science, vol. 1462, pp. 73–81. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86507-8_7
Alipour, M.A., Ghasemshirazi, S., Shirvani, G.: Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid. arXiv preprint arXiv:2210.01739 (2022)
He, Y., Huang, D., Chen, L., et al.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022, 1–13 (2022)
Sundmaeker, H., Guillemin, P., Friess, P., et al.: Vision and Challenges for Realising the Internet of Things. Cluster of European research projects on the internet of things, European Commission, vol. 3, no. 3, pp. 34–36 (2010)
Sultana, M., Hossain, A., Laila, F., et al.: Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med. Inform. Decis. Mak. 20(1), 1–10 (2020)
Lux, Z.A., Thatmann, D., Zickau, S., et al.” Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials. In: 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 71–78. IEEE (2020)
Haqani, E.A., Baig, Z., Jiang, F.: A decentralised blockchain-based secure authentication scheme for IoT devices. In: Suma, V., Baig, Z., Kolandapalayam Shanmugam, S., Lorenz, P. (eds.) Inventive Systems and Control. Lecture Notes in Networks and Systems, vol. 436. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-1012-8_9
Jia, X., Hu, N., Yin, S., et al.: A2 chain: a blockchain-based decentralized authentication scheme for 5G-enabled IoT. Mob. Inf. Syst. 2020, 1–19 (2020)
Mehta, M., Patel, K.: A review for IOT authentication–current research trends and open challenges. Mater. Today Proc. (2020)
Djenna, A., Harous, S., Saidouni, D.E.: Internet of things meet internet of threats: new concern cyber security issues of critical cyber infrastructure. Appl. Sci. 11(10), 4580 (2021)
Pothumarti, R., Jain, K., Krishnan, P.: A lightweight authentication scheme for 5G mobile communications: a dynamic key approach. J. Ambient Intell. Humanized Comput., 1–19 (2021). https://doi.org/10.1007/s12652-020-02857-4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Zh., Jin, Mh., Jiang, L., Feng, Cj., Cao, Jy., Yun, Z. (2023). Secure Access Method of Power Internet of Things Based on Zero Trust Architecture. In: Tan, Y., Shi, Y., Luo, W. (eds) Advances in Swarm Intelligence. ICSI 2023. Lecture Notes in Computer Science, vol 13969. Springer, Cham. https://doi.org/10.1007/978-3-031-36625-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-031-36625-3_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36624-6
Online ISBN: 978-3-031-36625-3
eBook Packages: Computer ScienceComputer Science (R0)