Research Article
Design and Implementation of the Zero Trust Model in the Power Internet of Things
Table 3
The set of places and transitions in the ZTM SPN model.
| Places | Define | Transitions | Define |
| | Normal status | | Attacks the terminal | | The software is under attack | | Software authenticates periodically | | The hardware is under attack | | Hardware authenticates periodically | | The malware is in interactive status | | The malware sends data | | The malicious hardware or the user is in an interactive state | | The malicious hardware sends data | | The software is abnormal | | Authenticates | | The hardware or the user is abnormal | | Access is blocked | | System administrator | | Updates the policy |
|
|