Power IoT security protection architecture based on zero trust framework
- Resource Type
- Conference
- Authors
- Xiaojian, Zhang; Liandong, Chen; Jie, Fan; Xiangqun, Wang; Qi, Wang
- Source
- 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP) Cryptography, Security and Privacy (CSP), 2021 IEEE 5th International Conference on. :166-170 Jan, 2021
- Subject
- Communication, Networking and Broadcast Technologies
Computing and Processing
Privacy
Conferences
Internet security
Authentication
Internet of Things
Cryptography
Business
POWER IO
ZERO TRUST
DYNAMIC ACCESS CONTROL
- Language
The construction of the power Internet of Things has led various terminals to access the corporate network on a large scale. The internal and external business interaction and data exchange are more extensive. The current security protection system is based on border isolation protection. This is difficult to meet the needs of the power Internet of Things connection and open shared services. This paper studies the application scheme of the “zero trust” typical business scenario of the power Internet of Things with “Continuous Identity Authentication and Dynamic Access Control” as the core, and designs the power internet security protection architecture based on zero trust.