Jing Ma, Yonggang Xu, Zengming Liu, Huinan Wang, XueLu Cui
{"title":"能源互联网终端接入与监控研究","authors":"Jing Ma, Yonggang Xu, Zengming Liu, Huinan Wang, XueLu Cui","doi":"10.1109/ICEI52466.2021.00025","DOIUrl":null,"url":null,"abstract":"With the development of the Energy Internet, type and quantity of terminal access as well as range and depth of data interaction have increased significantly. A large number of uncontrolled terminal access and interaction requirements, have brought challenges to network security access and monitoring. The traditional border-based protection model is difficult to meet the security requirements of this complex access scenario. This paper analyzes the problems of terminal access under the background of the energy Internet. Drawing lessons from the zero-trust security model, the energy Internet terminal access and monitoring model is proposed. This model supports the flexible access of diversified terminal equipment, realizes terminal and lean protection, and strengthens the security management and control of the energy Internet in the terminal access link.","PeriodicalId":113203,"journal":{"name":"2021 IEEE International Conference on Energy Internet (ICEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research of Terminal Access and Monitoring of Energy Internet\",\"authors\":\"Jing Ma, Yonggang Xu, Zengming Liu, Huinan Wang, XueLu Cui\",\"doi\":\"10.1109/ICEI52466.2021.00025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of the Energy Internet, type and quantity of terminal access as well as range and depth of data interaction have increased significantly. A large number of uncontrolled terminal access and interaction requirements, have brought challenges to network security access and monitoring. The traditional border-based protection model is difficult to meet the security requirements of this complex access scenario. This paper analyzes the problems of terminal access under the background of the energy Internet. Drawing lessons from the zero-trust security model, the energy Internet terminal access and monitoring model is proposed. This model supports the flexible access of diversified terminal equipment, realizes terminal and lean protection, and strengthens the security management and control of the energy Internet in the terminal access link.\",\"PeriodicalId\":113203,\"journal\":{\"name\":\"2021 IEEE International Conference on Energy Internet (ICEI)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Energy Internet (ICEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEI52466.2021.00025\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Energy Internet (ICEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEI52466.2021.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research of Terminal Access and Monitoring of Energy Internet
With the development of the Energy Internet, type and quantity of terminal access as well as range and depth of data interaction have increased significantly. A large number of uncontrolled terminal access and interaction requirements, have brought challenges to network security access and monitoring. The traditional border-based protection model is difficult to meet the security requirements of this complex access scenario. This paper analyzes the problems of terminal access under the background of the energy Internet. Drawing lessons from the zero-trust security model, the energy Internet terminal access and monitoring model is proposed. This model supports the flexible access of diversified terminal equipment, realizes terminal and lean protection, and strengthens the security management and control of the energy Internet in the terminal access link.