Jing Ma, Yonggang Xu, Zengming Liu, Huinan Wang, XueLu Cui
{"title":"Research of Terminal Access and Monitoring of Energy Internet","authors":"Jing Ma, Yonggang Xu, Zengming Liu, Huinan Wang, XueLu Cui","doi":"10.1109/ICEI52466.2021.00025","DOIUrl":null,"url":null,"abstract":"With the development of the Energy Internet, type and quantity of terminal access as well as range and depth of data interaction have increased significantly. A large number of uncontrolled terminal access and interaction requirements, have brought challenges to network security access and monitoring. The traditional border-based protection model is difficult to meet the security requirements of this complex access scenario. This paper analyzes the problems of terminal access under the background of the energy Internet. Drawing lessons from the zero-trust security model, the energy Internet terminal access and monitoring model is proposed. This model supports the flexible access of diversified terminal equipment, realizes terminal and lean protection, and strengthens the security management and control of the energy Internet in the terminal access link.","PeriodicalId":113203,"journal":{"name":"2021 IEEE International Conference on Energy Internet (ICEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Energy Internet (ICEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEI52466.2021.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the development of the Energy Internet, type and quantity of terminal access as well as range and depth of data interaction have increased significantly. A large number of uncontrolled terminal access and interaction requirements, have brought challenges to network security access and monitoring. The traditional border-based protection model is difficult to meet the security requirements of this complex access scenario. This paper analyzes the problems of terminal access under the background of the energy Internet. Drawing lessons from the zero-trust security model, the energy Internet terminal access and monitoring model is proposed. This model supports the flexible access of diversified terminal equipment, realizes terminal and lean protection, and strengthens the security management and control of the energy Internet in the terminal access link.