Skip to main content

2024 | OriginalPaper | Buchkapitel

Zero-Trust Security Protection Architecture for Power Grid Based on FAHP Algorithm

verfasst von : Zhuo Lv, Cen Chen, Zheng Zhang, Li Di, Nuannuan Li

Erschienen in: Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In existing zero-trust grid security protection architectures, the intelligent trust platform incorporating static matching algorithms suffers from inefficiency and long adaptation cycles. To address this, the fuzzy analytic hierarchy process (FAHP) is introduced to improve and optimize the trust evaluation platform, ensuring the privacy of transmitted data and the security of the system through continuous evaluation and updating of trust values. During the data transmission process, the accessing entity is dynamically authorized based on the principle of least privilege. Finally, feasibility assessment is performed in the trusted access proxy to determine the reliability of the data. Simulation experiments validate the feasibility and effectiveness of the FAHP-based zero-trust grid security protection architecture.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xiao, Y.T., Luo, Z.Y., Li, H.R.: Brief discussion on the threat of network information security of power grid enterprises and the application of new technology of attack and defense. Sci. Technol. Innov. 143(23), 126–127 (2019) Xiao, Y.T., Luo, Z.Y., Li, H.R.: Brief discussion on the threat of network information security of power grid enterprises and the application of new technology of attack and defense. Sci. Technol. Innov. 143(23), 126–127 (2019)
2.
Zurück zum Zitat Li, Z., Bi, J., Liu, L.: Trust and risk-based access control model for zero-knowledge oriented mobile peer-to-peer environments, pp. 860–865. IEEE (2013) Li, Z., Bi, J., Liu, L.: Trust and risk-based access control model for zero-knowledge oriented mobile peer-to-peer environments, pp. 860–865. IEEE (2013)
3.
Zurück zum Zitat Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment, pp. 1–6. IEEE (2020) Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment, pp. 1–6. IEEE (2020)
4.
Zurück zum Zitat Dimitrakos, T., Dilshener, T., Kravtsov, A., et al.: Trust aware continuous authorization for zero trust in consumer Internet of Things, pp. 1801–1812. IEEE (2020) Dimitrakos, T., Dilshener, T., Kravtsov, A., et al.: Trust aware continuous authorization for zero trust in consumer Internet of Things, pp. 1801–1812. IEEE (2020)
5.
Zurück zum Zitat Fang, W., Guan, X.: Research on iOS remote security access technology based on zero trust, vol. 6, pp. 238–241. IEEE (2022) Fang, W., Guan, X.: Research on iOS remote security access technology based on zero trust, vol. 6, pp. 238–241. IEEE (2022)
6.
Zurück zum Zitat Lv, Z., Guo, Z.M., Chen, C., et al.: Dynamic network threat assessment method for smart grid embedded devices. J. Beijing Univ. Aeronaut. Astronaut. 48(02), 324–330 (2022) Lv, Z., Guo, Z.M., Chen, C., et al.: Dynamic network threat assessment method for smart grid embedded devices. J. Beijing Univ. Aeronaut. Astronaut. 48(02), 324–330 (2022)
7.
Zurück zum Zitat Xie, K., Wang, J.F., Jin, Y., et al.: Review of key technologies for power Internet of Things. Electr. Power Inf. Commun. Technol. 20(01), 1–12 (2022) Xie, K., Wang, J.F., Jin, Y., et al.: Review of key technologies for power Internet of Things. Electr. Power Inf. Commun. Technol. 20(01), 1–12 (2022)
8.
Zurück zum Zitat Yu, H., Guo, Q., Fang, L.G.: Research on zero-trust system technology. Commun. Technol. 53(08), 2027–2034 (2022) Yu, H., Guo, Q., Fang, L.G.: Research on zero-trust system technology. Commun. Technol. 53(08), 2027–2034 (2022)
9.
Zurück zum Zitat Zhang, Z.Z., Wang, P.: A survey of zero trust security architecture research. Confidential Sci. Technol. 131(08), 8–16 (2021) Zhang, Z.Z., Wang, P.: A survey of zero trust security architecture research. Confidential Sci. Technol. 131(08), 8–16 (2021)
10.
Zurück zum Zitat Fang, X., Cai, Y.Y., Liu, Z.F.: Zero trust technology based on user access mode to resources. Inf. Technol. Inform. 258(09), 111–113 (2021) Fang, X., Cai, Y.Y., Liu, Z.F.: Zero trust technology based on user access mode to resources. Inf. Technol. Inform. 258(09), 111–113 (2021)
11.
Zurück zum Zitat Wang, Q., Yuan, Q., Li, F.J., et al.: Review of zero trust network and its key technologies. J. Comput. Appl. 43(4), 1142 (2023)MathSciNet Wang, Q., Yuan, Q., Li, F.J., et al.: Review of zero trust network and its key technologies. J. Comput. Appl. 43(4), 1142 (2023)MathSciNet
12.
Zurück zum Zitat Huang, J., Yu, R.C., Mao, D.: Distributed database fine-grained access control based on zero trust in the power Internet of Things. Inf. Secur. Res. 7(06), 535–542 (2021) Huang, J., Yu, R.C., Mao, D.: Distributed database fine-grained access control based on zero trust in the power Internet of Things. Inf. Secur. Res. 7(06), 535–542 (2021)
13.
Zurück zum Zitat Jiang, L., Zhou, L., Miao, S.W., et al.: Secure access method of power Internet of Things based on zero trust architecture. Electr. Power Inf. Commun. Technol. 21(1), 40–46 (2023) Jiang, L., Zhou, L., Miao, S.W., et al.: Secure access method of power Internet of Things based on zero trust architecture. Electr. Power Inf. Commun. Technol. 21(1), 40–46 (2023)
14.
Zurück zum Zitat Liu, T., Ma, Y., Jiang, H.F., et al.: Research on power gird security protection architecture based on zero trust. Electr. Power Inf. Commun. Technol. 19(07), 25–32 (2021) Liu, T., Ma, Y., Jiang, H.F., et al.: Research on power gird security protection architecture based on zero trust. Electr. Power Inf. Commun. Technol. 19(07), 25–32 (2021)
15.
Zurück zum Zitat Li, D.H., Gu, C.H.: Design of “zero trust” defense framework for power grid information security. Electron. Technol. Softw. Eng. 217(23), 254–255 (2021) Li, D.H., Gu, C.H.: Design of “zero trust” defense framework for power grid information security. Electron. Technol. Softw. Eng. 217(23), 254–255 (2021)
16.
Zurück zum Zitat Liu, Z.M., Cui, X.L., Ma, J., et al.: Design of security framework for energy interconnection based on zero trust. Electr. Power Inf. Commun. Technol. 18(03), 15–20 (2020) Liu, Z.M., Cui, X.L., Ma, J., et al.: Design of security framework for energy interconnection based on zero trust. Electr. Power Inf. Commun. Technol. 18(03), 15–20 (2020)
17.
Zurück zum Zitat Peng, J.C., He, Y.Q., Zhou, H.B., et al.: Photovoltaic poverty alleviation power stations type selection based on fuzzy analytic hierarchy process. Distrib. Utilization 38(5), 70–75 (2021) Peng, J.C., He, Y.Q., Zhou, H.B., et al.: Photovoltaic poverty alleviation power stations type selection based on fuzzy analytic hierarchy process. Distrib. Utilization 38(5), 70–75 (2021)
18.
Zurück zum Zitat Zhang, L.T., Chen, D.W.: Research on dynamic access control model based on zero trust. J. Inf. Secur. Res. 8(10), 1008–1017 (2022) Zhang, L.T., Chen, D.W.: Research on dynamic access control model based on zero trust. J. Inf. Secur. Res. 8(10), 1008–1017 (2022)
Metadaten
Titel
Zero-Trust Security Protection Architecture for Power Grid Based on FAHP Algorithm
verfasst von
Zhuo Lv
Cen Chen
Zheng Zhang
Li Di
Nuannuan Li
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2757-5_6

Premium Partner