Cross-Domain Access Control Model in Industrial IoT Environment
Abstract
:1. Introduction
- The authors of this research paper designed a master–slave chain based on a cross-domain access control model for Industrial IoT that has high scalability by extending the slave chains;
- A reputation-based master chain node-selecting mechanism is proposed, which selects safe and reliable nodes as the master chain nodes by evaluating their reputation values. Therefore, the security and reliability of the master chain are ensured;
- A grouping strategy retrieval method based on the combination of attributes and roles is proposed to improve the matching speed of attributes and strategies;
- The authors designed a detailed process for intra-domain access control and cross-domain access control based on a master–slave chain.
2. Related Work
2.1. Blockchain Technology
2.2. Access Control Methods
3. Distributed Access Control Model Based on a Master–Slave Chain
3.1. Distributed Security Architecture Based on Master–Slave Chain
- The device sends an intra-domain access request to the edge device;
- After the edge device receives the request, it first checks the identity and then calls the access control smart contract to complete the matching process of attributes and strategies, and finally returns the access token;
- The device completes the access control of resources through the access token.
- The device sends a cross-domain access control request to the edge device;
- After receiving the request, the edge device first performs an identity check on the device and then sends the cross-domain access control request to the master chain node;
- After receiving the request, the master chain node calls the cross-domain access smart contract to first check the node role information, then matches the attributes with the strategy, and finally, generates the access token;
- After the master chain node generates the access token, it sends it to the device through the edge node;
- The device completes the cross-domain access control process through the access token.
3.2. Dynamic Selection Strategy of Master Chain Nodes Based on Reputation Mechanism
3.2.1. Reputation Mechanism Process
3.2.2. Reputation Calculation Model
3.3. Cross-Domain Access Control Model
3.3.1. Access Control Based on Combination of Roles and Attribute
Algorithm 1: Intra-Domain Access Control |
Input: Access requests Resource strategy Database RSD Output: Access token |
1. |
2. |
3. |
4. |
5. |
6. |
7. |
8. |
Algorithm 2: Cross-Domain Access Control |
Input: Access requests Resource strategy Database RSD Output: Access token |
1. |
2. |
3. |
4. |
5. |
6. |
7. |
8. |
9. |
10. |
11. |
12. |
3.3.2. Grouping Strategy Retrieval Algorithm
3.4. Design of Access Control Processes
3.4.1. Initialization
3.4.2. Identity Registration
3.4.3. Intra-Domain Access Control
3.4.4. Cross-Domain Access
4. Security Analysis
4.1. Security and Privacy Concerns
4.2. No Falsification of Certificates
5. Experimental Verification and Analysis
5.1. Figures, Tables, and Schemes
5.2. Grouping Strategy Matching Algorithm
5.3. Throughput
5.4. Delay
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Sengupta, J.; Ruj, S.; Das Bit, S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Yan, S.-R.; Pirooznia, S.; Heidari, A.; Navimipour, N.J.; Unal, M. Implementation of a Product-Recommender System in an IoT-Based Smart Shopping Using Fuzzy Logic and Apriori Algorithm. IEEE Trans. Eng. Manag. 2022. [Google Scholar] [CrossRef]
- Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
- Li, C.; Yang, H.; Sun, Z.; Yao, Q.; Bao, B.; Zhang, J.; Vasilakos, A.V. Federated Hierarchical Trust-Based Interaction Scheme for Cross-Domain Industrial IoT. IEEE Internet Things J. 2023, 10, 447–457. [Google Scholar] [CrossRef]
- Ryalat, M.; ElMoaqet, H.; AlFaouri, M. Design of a Smart Factory Based on Cyber-Physical Systems and Internet of Things towards Industry 4.0. Appl. Sci. 2023, 13, 2156. [Google Scholar] [CrossRef]
- Lou, J.; Zhang, Q.; Qi, Z.; Lei, K. A Blockchain-based key Management Scheme for Named Data Networking. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 141–146. [Google Scholar] [CrossRef]
- Li, G.; Wu, J.; Li, J.; Wang, K.; Ye, T. Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 4702–4711. [Google Scholar] [CrossRef]
- Bader, J.; Michala, A.L. Searchable Encryption with Access Control in Industrial Internet of Things (IIoT). Wirel. Commun. Mob. Comput. 2021, 2021, 5555362. [Google Scholar] [CrossRef]
- Fernández-Alemán, J.L.; Señor, I.C.; Lozoya, P.Á.O.; Toval, A. Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inform. 2013, 46, 541–562. [Google Scholar] [CrossRef] [PubMed]
- Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
- Li, H.; Yu, K.; Liu, B.; Feng, C.; Qin, Z.; Srivastava, G. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things. IEEE J. Biomed. Health Inform. 2022, 26, 1949–1960. [Google Scholar] [CrossRef] [PubMed]
- Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A. Cross-domain secure data sharing using blockchain for industrial IoT. J. Parallel Distrib. Comput. 2021, 156, 176–184. [Google Scholar] [CrossRef]
- Wu, J.; Dong, M.; Ota, K.; Li, J.; Pei, B. A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things. In Proceedings of the 2014 IEEE 11th International Conference on Ubiquitous Intelligence and Computing and 2014 IEEE 11th International Conference on Autonomic and Trusted Computing and 2014 IEEE 14th International Conference on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, 9–12 December 2014; pp. 666–671. [Google Scholar] [CrossRef]
- Xuan, S.; Xiao, H.; Man, D.; Wang, W.; Yang, W. A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications. Wirel. Commun. Mob. Comput. 2021, 2021, 9942950. [Google Scholar] [CrossRef]
- Li, C.; Li, F.; Yin, L.; Luo, T.; Wang, B. A Blockchain-Based IoT Cross-Domain Delegation Access Control Method. Secur. Commun. Netw. 2021, 2021, 3091104. [Google Scholar] [CrossRef]
- Ren, Y.; Zhu, F.; Qi, J.; Wang, J.; Sangaiah, A.K. Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things. Appl. Sci. 2019, 9, 2058. [Google Scholar] [CrossRef]
- Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2019, 6, 1594–1605. [Google Scholar] [CrossRef]
- Feng, X.; Wu, J.; Li, J.; Wang, S. Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 5221–5227. [Google Scholar] [CrossRef]
- Shih, D.-H.; Wu, T.-W.; Shih, M.-H.; Chen, G.-W.; Yen, D.C. Hyperledger Fabric Access Control for Industrial Internet of Things. Appl. Sci. 2022, 12, 3125. [Google Scholar] [CrossRef]
- Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2021, 8, 6372–6384. [Google Scholar] [CrossRef]
- Miao, Z. Research on Electronic Evidence Storage and Sharing Based on Blockchain. Master’s Thesis, Qinghai Normal University, Xining, China, 2022. [Google Scholar] [CrossRef]
- Wu, Q.; Zhang, X.; Zhang, M.; Lou, Y.; Zheng, R.; Wei, W. Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism. Sci. World J. 2014, 2014, 617087. [Google Scholar] [CrossRef] [PubMed]
- Huang, M.M.; Yuan, L.Y.; Pan, X.; Zhang, J. A Secure and Trusted Authentication Model under Edge Computing and Block Multi-Chain. J. Front. Comput. Sci. Technol. 2023, 17, 733. [Google Scholar]
- Tian, X.; Yang, M. Access Control Mechanism Based on Smart Contract in Home Internet of Things. Comput. Eng. 2023, 1–13. [Google Scholar] [CrossRef]
Reference | Environment | Architecture | Cross-Domain | Access Control | Scalability |
---|---|---|---|---|---|
Wu et al. [13] | IoT | Centralized | No | Yes | No |
Xuan et al. [14] | IIoT | Centralized | No | Yes | No |
Li et al. [15] | IoT | Single-chain | Yes | Yes | No |
Ren et al. [16] | IIoT | Single-chain | Yes | Yes | No |
Zhang et al. [17] | IoT | Single-chain | No | Smart contract-based | No |
Feng et al. [18] | IIoT | Single-chain | No | Role-based | No |
Shi et al. [19] | IIoT | Single-chain | No | Attribute-based | No |
Zhang et al. [20] | Smart Cities | Single-chain | No | Attribute-based | No |
Miao et al. [21] | IoT | Master–slave chain | Yes | Attribute-based | Yes |
Notation | Description |
---|---|
Edge node | |
Device in domain | |
Master chain node | |
Domain | |
Public key of device or node | |
Private key of device or node | |
Number of historical honest consensus behaviors of | |
Total number of historical consensus behaviors of | |
Number of consensus times of malicious behavior of | |
Online hours of | |
Total time of joining the network | |
Reputation value of in the | |
Hash function | |
Identity management server | |
Slave chain of domain | |
IDSC | Intra-domain access control smart contract |
CDSC | Cross-domain access control smart contract |
IP | Configuration | OS |
---|---|---|
172.18.18.193 | Intel(R) Core (TM) i5-10500 | Windows 10 |
172.18.18.206 | Intel(R) Core (TM) i5-9400 | Windows 10 |
172.18.18.141 | AMD Ryzen 7 4800H | Windows 10 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Z.; Wu, X.; Wei, S. Cross-Domain Access Control Model in Industrial IoT Environment. Appl. Sci. 2023, 13, 5042. https://doi.org/10.3390/app13085042
Zhang Z, Wu X, Wei S. Cross-Domain Access Control Model in Industrial IoT Environment. Applied Sciences. 2023; 13(8):5042. https://doi.org/10.3390/app13085042
Chicago/Turabian StyleZhang, Zhen, Xu Wu, and Shuang Wei. 2023. "Cross-Domain Access Control Model in Industrial IoT Environment" Applied Sciences 13, no. 8: 5042. https://doi.org/10.3390/app13085042
APA StyleZhang, Z., Wu, X., & Wei, S. (2023). Cross-Domain Access Control Model in Industrial IoT Environment. Applied Sciences, 13(8), 5042. https://doi.org/10.3390/app13085042