Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

被引:19
作者
Alagappan, Annamalai [1 ]
Venkatachary, Sampath Kumar [2 ]
Andrews, Leo John Baptist [3 ]
机构
[1] Botho Univ, Fac Comp, Dept Network & Infrastruct Management, Gaborone, Botswana
[2] Grant Thornton, Plot 50370,Acumen Pk, Gaborone, Botswana
[3] Botho Univ, Fac Comp, Dept Software Engn, Gaborone, Botswana
关键词
Zero trust architecture; Zero trust networks; Virtual power plant; Distributed generators; Data protection; DISTRIBUTED ENERGY-RESOURCES; INTEGRATION; INTERNET; SYSTEM;
D O I
10.1016/j.egyr.2021.11.272
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Zero Trust Network Architecture implementation is gaining popularity in the ICT sector to defend and deter cyber threats or cyber crime. Considering the architecture's ability, it is unlikely that a single compromised endpoint in the zero-trust networks could spread laterally, infecting the whole network.This provides us with the ability to adopt the architecture in the energy sector. The popularity of the distributed generators helps us beself-reliant on the power and enables a consumer to supply the power to the grid. The pool of these small generators constitutes a virtual power plant. With this arrangement, its network is also exposed to security challenges. Protecting these physical systems, data protection, and information privacy becomes critical. Motivated by this convergence, this paper aims to present a comprehensive Zero trust security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.(c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:1309 / 1320
页数:12
相关论文
共 36 条
  • [1] On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse
    AlShehhi, Fatema
    Otoum, Safa
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 30 - 37
  • [2] Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
    Zhang, Xiaohong
    Song, Zilong
    Moshayedi, Ata Jahangir
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [3] Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review
    Alevizos, Lampis
    Ta, Vinh Thong
    Hashem Eiza, Max
    SECURITY AND PRIVACY, 2022, 5 (01):
  • [4] Developing a three stage coordinated approach to enhance efficiency and reliability of virtual power plants
    Amissah, Jeremiah
    Abdel-Rahim, Omar
    Mansour, Diaa-Eldin A.
    Bajaj, Mohit
    Zaitsev, Ievgen
    Abdelkader, Sobhy
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [5] A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
    Alquwayzani, Alanoud A.
    Albuali, Abdullah A.
    IEEE ACCESS, 2024, 12 : 176033 - 176056
  • [6] Security Mechanisms used in Systems based on Zero Trust Architecture: A Systematic Mapping
    Manzano, Carlos
    Marquez, Gaston
    Astudillo, Hernan
    2024 L LATIN AMERICAN COMPUTER CONFERENCE, CLEI 2024, 2024,
  • [7] ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security
    Alsulami, Faris
    Kulkarni, Akshay R.
    Hazari, Noor Ahmad
    Niamat, Mohammed Y.
    IEEE ACCESS, 2024, 12 : 119868 - 119883
  • [8] Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
    Xiaohong Zhang
    Zilong Song
    Ata Jahangir Moshayedi
    Journal of Cloud Computing, 11
  • [9] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [10] Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis
    Haque, Ekramul
    Hasan, Kamrul
    Ahmed, Imtiaz
    Alam, Md Sahabul
    Islam, Tariqul
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 463 - 467