Zero trust dynamic access control for power grid security
CSTR:
Author:
Affiliation:

1.State Grid Henan Electric Power Research Institute, Zhengzhou 450052, P. R. China;2.College of Computer Science and Software Engineering, Hohai University, Nanjing 210089, P. R. China;3.State Grid Corporation of China, Beijing 100031, P. R. China;4.State Grid Electric Power Research Institute Co., Ltd., Nanjing 211102, P. R. China;5.State Grid Smart Grid Research Institute Co., Ltd., Beijing 102209, P. R. China

Clc Number:

TP309

Fund Project:

Supported by Technology Project of State Grid Co.,Ltd.(5108-202224046A-1-1-ZN).

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the continuous development and application of information and communication technology in power information system, the protection boundary of power grid is gradually blurred, and external attacks and internal threats are increasingly serious. It is urgent to carry out effective access control to the information resources of power system to ensure its data security. Based on the general security protection framework of power grid secondary system and zero-trust security mechanism, this paper proposes a zero-trust dynamic access control model for power grid information security. By analyzing the attributes of the access subject and the characteristics of the behavior information of the power grid system, the model comprehensively considers the influence of threatening behavior, sliding window, punishment mechanism and other factors on the access control, and realizes the continuous evaluation and dynamic control of the access subject trust value. The results of simulation experiments show that increasing the recommended trust can reasonably take into account both subjective and objective trust evaluations, which makes the assessment of the trust value of the access subject of the power grid more accurate. In addition, in response to external threat behaviors, the trust evaluation engine will rapidly update the comprehensive trust value of the visitor, making it impossible for illegal subjects to gain access to the system, with better fine-grained control.

    Reference
    Related
    Cited by
Get Citation

陈岑,屈志昊,汪明,魏兴慎,钱珂翔.面向电网安全的零信任动态访问控制[J].重庆大学学报,2024,47(8):81~89

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 11,2023
  • Revised:
  • Adopted:
  • Online: September 02,2024
  • Published:
Article QR Code