[1]Li J Q, Yu F R, Deng G, et al. Industrial Internet: A survey on the enabling technologies, applications, and challenges[J]. IEEE Communications Surveys & Tutorials, 2017, 19(3): 15041526[2]殷树刚, 李祉岐, 刘晓蕾, 等. 基于APT组织攻击行为的网络安全主动防御方法研究[J]. 信息安全研究, 2023, 9(5): 423432[3]Singh J, Gimekar A, Venkatesan S. An efficient lightweight authentication scheme for humancentered industrial Internet of things[J]. International Journal of Communication Systems, 2023, 36(12): e4189[4]Li X, Peng J, Niu J, et al. A robust and energy efficient authentication protocol for industrial Internet of things[J]. IEEE Internet of Things Journal, 2017, 5(3): 16061615[5]Das A K, Wazid M, Kumar N, et al. Biometricsbased privacypreserving user authentication scheme for cloudbased industrial Internet of things deployment[J]. IEEE Internet of Things Journal, 2018, 5(6): 49004913[6]Rais R, Morillo C, Gilman E, et al. Zero Trust Network: Building Secure Systems in Untrusted Network[M]. Sebastopol: O’Reilly Media, 2024[7]许盛伟, 田宇, 邓烨, 等. 基于角色和属性的零信任访问控制模型研究[J]. 信息安全研究, 2024, 10(3): 241247[8]林奕夫, 陈雪, 许媛媛, 等. 基于零信任安全模型的电力敏感数据访问控制方法[J]. 信息安全研究, 2024, 10(1): 8893[9]Wang Z, Jin M, Jiang L, et al. Secure access method of power Internet of things based on zero trust architecture[C] Proc of Int Conf on Swarm Intelligence. Berlin: Springer, 2023: 386399[10]Liu H, Ai M, Huang R, et al. Identity authentication for edge devices based on zerotrust architecture[J]. Concurrency and Computation: Practice and Experience, 2022, 34(23): e7198[11]吴青松, 张玉. 基于SDP2.0的工业互联网安全接入技术研究[J]. 工业信息安全, 2023 (1): 2834[12]Choi Y, Lee D, Kim J, et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2014, 14(6): 1008110106[13]Jiang Q, Ma J, Wei F, et al. An untraceable temporalcredentialbased twofactor authentication scheme using ECC for wireless sensor networks[J]. Journal of Network and Computer Applications, 2016, 76: 3748[14]Wang D, He D, Wang P, et al. Anonymous twofactor authentication in distributed systems: Certain goals are beyond attainment[J]. IEEE Trans on Dependable and Secure Computing, 2014, 12(4): 428442 |