skip to main content
10.1145/3654446.3654517acmotherconferencesArticle/Chapter ViewAbstractPublication PagesspcncConference Proceedingsconference-collections
research-article

Application of Zero Trust Security Architecture in Power Communication Network Security Management System

Published: 03 May 2024 Publication History

Abstract

As an important factor in network information security, the network trust system is the core cornerstone of safeguarding physical activities in cyberspace; As an emerging security model, zero trust architecture is based on trust evaluation and emphasizes dynamic trust, providing new ideas for the construction and application of network trust systems. By analyzing the typical structures of network trust systems and zero trust architecture models, this paper summarizes the application of zero trust architecture models in different network trust system environments, points out the shortcomings and key points that need to be paid attention to in the actual application deployment process, and provides strong support for the specific implementation of zero trust architecture in various fields of the party, government, military, and civilian in China.

References

[1]
Liu, C., Yang, J., Qiang, R., Yuan, L., Ju, W., & Xia, Y., 2021. New infrastructure-oriented power network security supervision innovative mechanism and system architecture. IOP Conference Series: Earth and Environmental Science, 85(7), 89-102.
[2]
Kumar, N., Kasbekar, G. S., & Manjunath, D. . 2022. Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the eigentrust algorithm, 87(7), 102-103.
[3]
Hasan, M. K., Habib, A. K. M. A., Shukur, Z., Ibrahim, F., Islam, S., & Razzaque, M. A. . 2023. Review on cyber-physical and cyber-security system in smart grid: standards, protocols, constraints, and recommendations. Journal of network and computer applications, 51(7), 45-49.
[4]
Tang, X., & Ding, C. . 2021. Information security terminal architecture of power transportation mobile internet of things based on big data analysis. Wireless Communications and Mobile Computing, 74(6), 59-62.
[5]
Jiang, C., Xu, H., Huang, C., & Huang, Q. . 2022. An adaptive information security system for 5g-enabled smart grid based on artificial neural network and case-based learning algorithms. Frontiers in computational neuroscience, 16(7), 872978.
[6]
Chen, B., Qiao, S., Zhao, J., Liu, D., Shi, X., & Lyu, M., 2021. A security awareness and protection system for 5g smart healthcare based on zero-trust architecture. IEEE internet of things journal,74(8-13),69-72.
[7]
Tyler, D., & Viana, T. . 2021. Trust no one? a framework for assisting healthcare organisations in transitioning to a zero-trust network architecture. Applied Sciences,54(4),63-69.
[8]
Chen, Z., Yan, L., Zitong Lü, Zhang, Y., Guo, Y., & Liu, W., 2021. Research on zero-trust security protection technology of power iot based on blockchain. Journal of Physics: Conference Series, 1769(1), 012039 (8pp).
[9]
Wang, P., Wang, S., Chi, L., Ren, X., Wu, W., & Cheng, W. . 2022. Research and application of the network security monitoring capability evaluation model of power control system based on ahp and fuzzy comprehensive evaluation. Journal of Physics: Conference Series, 2246(1), 012046.
[10]
Zhang, Y., Jian, Z., & Wang, H. . 2021. Design of power communication data network management system and implementation of data acquisition module. Journal of Electronic Research and Application: JERA,74(6), 5.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SPCNC '23: Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications
December 2023
435 pages
ISBN:9798400716430
DOI:10.1145/3654446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 May 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SPCNC 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 30
    Total Downloads
  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)7
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media