Research Article

Design and Implementation of the Zero Trust Model in the Power Internet of Things

Table 1

Definition of places and transitions.

PlacesDefineTransitionsDefine

Normal statusAttack the terminal
The software is under attackAuthenticate
The hardware is under attackParse data
The object(user) is under attackSystem warning
The terminal is abnormalUpdate the policy
The data are abnormal
System administrator