Research Article
Design and Implementation of the Zero Trust Model in the Power Internet of Things
Table 1
Definition of places and transitions.
| Places | Define | Transitions | Define |
| | Normal status | | Attack the terminal | | The software is under attack | | Authenticate | | The hardware is under attack | | Parse data | | The object(user) is under attack | | System warning | | The terminal is abnormal | | Update the policy | | The data are abnormal | | | | System administrator | | |
|
|