Research Article

Design and Implementation of the Zero Trust Model in the Power Internet of Things

Table 3

The set of places and transitions in the ZTM SPN model.

PlacesDefineTransitionsDefine

Normal statusAttacks the terminal
The software is under attackSoftware authenticates periodically
The hardware is under attackHardware authenticates periodically
The malware is in interactive statusThe malware sends data
The malicious hardware or the user is in an interactive stateThe malicious hardware sends data
The software is abnormalAuthenticates
The hardware or the user is abnormalAccess is blocked
System administratorUpdates the policy