Analysis and Research on Secure Access Control Technology of Industrial Internet of Things Based on ZTM Model
DOI:
https://doi.org/10.13052/jcsm2245-1439.1341Keywords:
Industrial Internet of Things, zero-trust model, secure access control technology, comprehensive risk assessmentAbstract
The security threat of IIoT is becoming increasingly serious. In order to address this challenge, security access control technology based on the ZTM model has become a hot research topic. The aim of this study is to conduct in-depth analysis and research on the security access control technology applied by the ZTM model in industrial Internet of Things environments. By analyzing the current challenges of IIOT security and the limitations of traditional security models, this paper proposes a series of security access control technologies related to the ZTM model, aiming to quantify and evaluate the effectiveness of access control policies, zero trust of the system, and comprehensive risk assessment. By using empirical research methods, this study verified the feasibility of the proposed technology in actual industrial Internet of Things environments and demonstrated the significant effect of the ZTM model in reducing security risks and improving system credibility. The experimental results showed that the optimized security access control technology improved security performance by 28% and the missed detection rate was as low as 3.2%. This study provides useful insights for practical applications in the field of secure access control and provides a solid foundation for future research.
Downloads
References
Qiu, R., Zhang, J. F., Chen, L., Li, W., and Lin, N. (2022). Internet of things terminal access security based on zero trust. 2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC), 7–11.
Chen, Z., Yan, L., Zitong Lü, Zhang, Y., Guo, Y., and Liu, W., et al. (2021). Research on zero-trust security protection technology of power iot based on blockchain. Journal of Physics: Conference Series, 1769(1), 012039 (8pp).
Song, L., Ju, X., Zhu, Z., and Li, M. (2021). An access control model for the internet of things based on zero-knowledge token and blockchain. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1–20.
Yang, D. (2021). Research on traffic detection method of secure transmission industrial internet of things based on computer vision. Scientific programming (Pt.13), 2021.
Yanli, W. (2018). Research on smart home security access control technology based on internet of things and cloud computing. Video Engineering.
Zheng, F., and Zheng, B. (2021). Research on the optimization and application of intelligent data acquisition and alarm system based on internet of things. Journal of Physics: Conference Series, 1992(2), 022083–.
Zhang, J., Liu, Y., and Zhang, Z. (2019). Research on Cross-Chain Technology Architecture System Based on Blockchain. International Conference on Communications, Signal Processing, and Systems.
Mitani, S., Singh, T., Ghate, N., and Ueda, H. (2021). Attribute-based low-complexity network access control policy with optimal grouping algorithm. IEICE Communications Express, 10(11), 846–851.
Chandramouli, R. (2023). A zero trust architecture model for access control in cloud native applications in multi-cloud environments.
Kumar, N., Kasbekar, G. S., and Manjunath, D. (2022). Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the eigentrust algorithm.
Zhang, J., Zheng, J., Zhang, Z., Chen, T., Qiu, K., and Zhang, Q., et al. (2022). Hybrid isolation model for device application sandboxing deployment in zero trust architecture. International journal of intelligent systems.
Ahmed, I., Nahar, T., Urmi, S. S., and Taher, K. A. (2020). Protection of Sensitive Data in Zero Trust Model. ICCA 2020: International Conference on Computing Advancements.
Jiang, C., Xu, H., Huang, C., and Huang, Q. (2022). An adaptive information security system for 5g-enabled smart grid based on artificial neural network and case-based learning algorithms. Frontiers in computational neuroscience, 16, 872978.
Ferretti, L., Magnanini, F., Andreolini, M., and Colajanni, M. (2021). Survivable zero trust for cloud computing environments. Computers & Security, 110, 102419.
Collier, Z. A., and Sarkis, J. (2021). The zero trust supply chain: managing supply chain risk in the absence of trust. International Journal of Production Research(1), 1-16.
Pularikkal, G. B., Patil, S. R., Brinckman, B., and Nanjanagud, M. (2020). Machine learning-based application posture for zero trust networking.
Cheng, Y., Meng, H., Yuan, L., and Lei, Y. (2021). Research on edge computing technology of Internet of Things based on intelligent and environmental protection. 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE). IEEE.
Chen, G., Zhang, X., Wang, C., and Hao, S. (2021). Research on flexible control strategy of controllable large industrial loads based on multi-source data fusion of internet of things. IEEE Access.
Yue, J. (2020). Research on the development trend of industrial automation control technology based on big data analysis. Journal of Physics: Conference Series, 1648, 022116–.
Di, C., Li, M., and Zhao, Z. (2020). Research on Interconnection and Mutual Control Technology of Power Transmission and Transformation Equipment Based on Internet of Things. International Conference on Dependable Systems and Their Applications. IEEE.
Lin, B. (2021). Research on data release and location monitoring technology of sensor network based on internet of things. Journal of web engineering(3), 20.
Zhang, P., Tian, C., Shang, T., Liu, L., Li, L., and Wang, W., et al. (2021). Dynamic access control technology based on zero-trust light verification network model. International Conference on Communications, Information System and Computer Engineering. IEEE.
Shi, C., Fei, J., Zhang, X., Yao, Q., and Fan, J. (2020). Continuous trust evaluation of power equipment and users based on risk measurement. Scientific Programming.
Chen, L., Dai, Z., Chen, M., and Li, N. (2021). Research on the security protection framework of power mobile internet services based on zero trust.
Tao, Y., Lei, Z., and Ruxiang, P. (2018). Fine-Grained Big Data Security Method Based on Zero Trust Model. 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE.
Chen, B., Qiao, S., Zhao, J., Liu, D., Shi, X., and Lyu, M., et al. (2021). A security awareness and protection system for 5g smart healthcare based on zero-trust architecture. IEEE internet of things journal (8–13).
Xiaojian, Z., Liandong, C., Jie, F., Xiangqun, W., and Qi, W. (2021). Power IoT security protection architecture based on zero trust framework. 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP). IEEE.
Jian-Wei, L., Feng, G., Xiong-Lin, L., and Automation, D. O. (2019). Survey of deep reinforcement learning based on value function and policy gradient. Chinese Journal of Computers.
Wang, W., Chen, X., Gan, W., Yang, Y., Zhang, W., and Zhang, X., et al. (2022). Research on Network Security Situation Assessment Model Based on Double AHP. International Conference on Artificial Intelligence and Security. Springer, Cham.
Surantha, N., and Ivan, F. (2019). Secure Kubernetes Networking Design Based on Zero Trust Model: A Case Study of Financial Service Enterprise in Indonesia. International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, Cham.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.