Pang Lv, Jin Qian, Qi Li, Yong Yan, Jiajia Han, Qinyuan Li
{"title":"Service reputation assessment for power grid zero-trust security","authors":"Pang Lv, Jin Qian, Qi Li, Yong Yan, Jiajia Han, Qinyuan Li","doi":"10.1117/12.2673507","DOIUrl":null,"url":null,"abstract":"With the development of information technology and intelligence in power grid enterprises, more and more power terminals such as smart meters and centralized collectors are being accessed remotely through various networks, especially wireless public networks, making the use of marketing terminals to launch network attacks increasing day by day. Usually, marketing terminals are deployed in uncontrolled user sites, and once deployed, they are used for long periods of time, exposing them to the serious threat of illegal counterfeit terminals and theft of legitimate terminals to attack the main power marketing system in the information intranet of the power grid enterprise. This paper proposes a zero-trust access control mechanism for power networks based on service reputation assessment, using real-time reputation values within a cycle and historical reputation values obtained from the previous test cycle to obtain a comprehensive reputation value of the service. Experimental results show that continuous trust assessment can be accurately performed based on its runtime reputation value, ensuring the continuous trustworthiness of the endpoint identity.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2673507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the development of information technology and intelligence in power grid enterprises, more and more power terminals such as smart meters and centralized collectors are being accessed remotely through various networks, especially wireless public networks, making the use of marketing terminals to launch network attacks increasing day by day. Usually, marketing terminals are deployed in uncontrolled user sites, and once deployed, they are used for long periods of time, exposing them to the serious threat of illegal counterfeit terminals and theft of legitimate terminals to attack the main power marketing system in the information intranet of the power grid enterprise. This paper proposes a zero-trust access control mechanism for power networks based on service reputation assessment, using real-time reputation values within a cycle and historical reputation values obtained from the previous test cycle to obtain a comprehensive reputation value of the service. Experimental results show that continuous trust assessment can be accurately performed based on its runtime reputation value, ensuring the continuous trustworthiness of the endpoint identity.