Next Article in Journal
Exploiting the Rolling Shutter Read-Out Time for ENF-Based Camera Identification
Previous Article in Journal
Exploring Bi-Directional Context for Improved Chatbot Response Generation Using Deep Reinforcement Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cross-Domain Access Control Model in Industrial IoT Environment

School of Computer and Electronic Information, Guangxi University, Nanning 530005, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(8), 5042; https://doi.org/10.3390/app13085042
Submission received: 1 April 2023 / Revised: 12 April 2023 / Accepted: 14 April 2023 / Published: 17 April 2023

Abstract

:
The Industrial Internet of Things (IIoT) accelerates smart manufacturing and boosts production efficiency through heterogeneous industrial equipment, intelligent sensors, and actuators. The Industrial Internet of Things is transforming from a traditional factory model to a new manufacturing mode, which allows cross-domain data-sharing among multiple system departments to enable smart manufacturing. A complete industrial product comes from the combined efforts of many different departments. Therefore, secure and reliable cross-domain access control has become the key to ensuring the security of cross-domain communication and resource-sharing. Traditional centralized access control schemes are prone to single-point failure problems. Recently, many researchers have integrated blockchain technology into access control models. However, most blockchain-based approaches use a single-chain structure, which has weak data management capability and scalability, while ensuring system security, and low access control efficiency, making it difficult to meet the needs of multi-domain cooperation in IIoT scenarios. Therefore, this paper proposes a decentralized cross-domain access model based on a master–slave chain with high scalability. Moreover, the model ensures the security and reliability of the master chain through a reputation-based node selection mechanism. Access control efficiency is improved by a grouping strategy retrieval method in the access control process. The experimental benchmarks of the proposed scheme use various performance metrics to highlight its applicability in the IIoT environment. The results show an 82% improvement in the throughput for the master–slave chain structure over the single-chain structure. There is also an improvement in the throughput and latency compared to the results of other studies.

1. Introduction

The Industrial Internet of Things (IIoT) is an emerging Internet of Things (IoT) technology that provides a technical means for industrial production [1]. As IoT technology has evolved in recent years, its functional aspects, ranging from manufacturing and commerce to healthcare and retail, have become important and are gradually impacting our lives [2]. The same Industrial IoT is an important part of the IoT, and it enables real-time, reliable connections among various industrial devices, allowing them to work together, and thereby improving the efficiency and safety of industrial production [3].
In traditional industrial manufacturing, a group of IIoT devices works together under the control of a server to form an IIoT domain. All devices in the IIoT domain work together to complete the production process, thus reducing resource consumption, increasing productivity, and lowering management costs [4]. However, with manufacturing becoming more complex, it is difficult for separate domains to produce a complete product. A complete product requires multiple domains to work together to manufacture products [5]. In this context, the secure and reliable access control of devices located in different domains is becoming increasingly important.
However, IIoT domains do not necessarily trust each other because one domain is usually reluctant to allow other domains access to its resources. This can result in IIoT devices in different domains not being able to access each other conveniently and share resources securely [6,7]. The secure and reliable cross-domain access control for IIoT devices has become a hot research topic nowadays.
A range of access control techniques has emerged [8] that allows for legitimate access control among different IIoT devices to prevent unauthorized and illegal access. In a traditional access control system, all access control needs to rely on a third-party server. When the third-party server is attacked or goes down, the entire access control system goes down. Since blockchain has some listed advantages, such as decentralization, security, and reliability, many scholars have incorporated blockchain technology into access control systems. Role-based access control techniques were used in [9], in which the system set different roles and assigned appropriate permissions to the roles. However, role-based access control is difficult to achieve fine-grained access control. The attribute-based access control [10] approach provides a good solution for fine-grained access by binding control policies and node attributes together. Only devices whose attribute sets satisfy the policy can access resources. However, as the complexity of industrial manufacturing grows, the policies for accessing resources have become more complex. The time required to match device attributes to resource policies is taking longer and longer. This eventually leads to higher system latency.
In the process of cross-domain access control, cross-domain access is not possible due to the lack of trust among different domains. Therefore, a reliable cross-domain access platform has become especially important. Blockchain has a range of built-in features, such as tamper-proof, decentralized, and traceable data, which can build trust in an untrustworthy environment [11]. Blockchain is increasingly used in many IIoT scenarios to address the access control problem [12]. However, many current scholars have found that single-chain structure has problems such as weak data management capability and poor scalability. Therefore, it is difficult to meet the demand for multi-domain cooperation in the IIoT environment. In addition, the process of cross-domain access has a large number of query operations and multiple types of data processing. In this case, the shortage of the chain data structure itself results in the low efficiency of access. All these problems lead to reducing the efficiency of access.
To solve these problems, the authors of this paper designed a master–slave multi-chain structure and propose a trusted cross-domain access control model with high scalability. The main contributions of this paper are as follows:
  • The authors of this research paper designed a master–slave chain based on a cross-domain access control model for Industrial IoT that has high scalability by extending the slave chains;
  • A reputation-based master chain node-selecting mechanism is proposed, which selects safe and reliable nodes as the master chain nodes by evaluating their reputation values. Therefore, the security and reliability of the master chain are ensured;
  • A grouping strategy retrieval method based on the combination of attributes and roles is proposed to improve the matching speed of attributes and strategies;
  • The authors designed a detailed process for intra-domain access control and cross-domain access control based on a master–slave chain.
The rest of this article is organized as follows: Section 2 provides some work related to this article. The Section 3 introduces the system architecture and access control model. Section 4 will conduct a security analysis of the system in this article, and Section 5 validates the approach through experiments. Finally, Section 6 gives the conclusions and outlook of this article.

2. Related Work

This section describes the work on blockchain-based cross-domain access control. It is divided into blockchain technology and access control. A summary of the related work is presented in Table 1.

2.1. Blockchain Technology

Traditional cross-domain access models [13,14] usually use centralized systems. Authentication and access to all devices need to go through a centralized server. However, this centralized scheme causes a single point of failure and raises issues regarding the availability of the device.
Blockchain, a decentralized and distributed technology, offers a new solution for IoT sharing across domains. Individual local IIoT devices form relatively independent trust domains in a distributed environment, making it easy to meet local needs. However, it is difficult for a single trust domain to meet the needs of industrial products; instead, multiple domains need to collaborate. To address this issue, Li et al. [15] proposed a blockchain-based cross-domain access control framework for IoT. However, it was not modeled or validated. Ren et al. [16] combined blockchain and edge computing concepts and proposed a cross-domain trust model based on the Consortium chain, which reduces the traditional cross-domain access process. With the increase in IIoT devices and domains, there are higher requirements for system scalability, computing power, and storage capacity. Miao et al. [21] proposed a cross-domain access control approach based on a master–slave chain. However, this study did not address the reliability of the master chain nodes to ensure the security and reliability of the master chains.
The above models have made some contributions to the reliability of blockchain technology. However, most of the literature is not focused on the scalability of the system in access control systems. Therefore, this paper proposes a master–slave chain structure and demonstrates the system’s scalability by continuously adding slave chains. In this study, the master chain nodes were selected by evaluating the reputation, thus providing security and reusability of the master chain. Therefore, the security and reliability of the whole system are also ensured.

2.2. Access Control Methods

In the field of IIoT, with more data being generated by IIoT devices, access control has become increasingly frequent and important. Therefore, Zhang et al. [17] proposed a secure and reliable access control framework based on the maintenance of an access control list via smart contracts. With this framework, each time access control is performed, a new smart contract will be created. With the dramatic increase in the number of accesses, it requires a greater cost to deploy smart contracts and higher requirements for system storage. Feng et al. [18] proposed a role-based access control approach, where each device only needs to maintain its access control list. Access control lists record the resources that devices can access. However, when the number of resources increases, the access control list becomes complex and challenging to maintain. Shi et al. [19] proposed an attribute-based access control (ABAC) scheme in which the Uniform Resource Locator (URL) link of the ABAC strategy is stored on the blockchain, and a smart contract is deployed to receive access requests from the subject and then perform access control. However, the program does not provide a method of implementation. Zhang et al. [20] improved on this basis and proposed a framework based on smart contracts. This framework consists of multiple access control contracts, including a registration contract and a judgment contract, and is used to implement distributed access control for IoT systems, with the Ethernet platform being used as a case study to demonstrate its application. As more and more attributes are added, the strategies for accessing resources become increasingly complex, leading to longer periods of time to match attributes with strategies. This, in turn, increases the latency of the system and reduces its stability.
In summary, access control for the IIoT domain still needs to be enhanced regarding access control efficiency and dynamic fine-grained retrieval. Therefore, this paper proposes a combined attribute and role access control approach and presents a grouping strategy retrieval algorithm to shorten the retrieval strategy time.

3. Distributed Access Control Model Based on a Master–Slave Chain

3.1. Distributed Security Architecture Based on Master–Slave Chain

The master–slave chain-based access control system is designed with a three-layer distributed security architecture, as depicted in Figure 1. The upper layer is the master chain network, serving as the trusted platform for each domain. The middle layer comprises the slave chain network, acting as a reliable access platform within the domain. The lower layer consists of IIoT devices, which provide the function of collecting and accessing resources. The three layers of the architecture work together to accomplish intra-domain and cross-domain access control.
The dynamic selection mechanism of master chain nodes based on their reputation can ensure the security and reliability of the master chain more effectively. It does so by periodically selecting the node with the highest reputation among all the edge nodes in each domain to become the master chain node. Generally, more honest consensus nodes will have a better chance to become the main chain node to ensure the reliability of the master chain node. The details of the mechanism are discussed in Section 3.2. The slave chain is a reliable access platform within the domain, which records its resources’ intra-domain access control processes and access control strategy. The edge nodes within the domain maintain it. Each domain is then composed of edge nodes and IIoT devices within the domain. The Identity Management Server (IMS) IMS provides intra-domain certificate management and issuance, role, attribute, and resource strategy database maintenance. The resource strategy database stores the access control strategies for all resources in the domain. The blockchain can call the access strategy of resources through the resource strategy database to complete the process of matching attributes and help in access control.
Intra-domain access control is the access control among different devices within the same domain. It is divided into three main steps:
  • The device sends an intra-domain access request to the edge device;
  • After the edge device receives the request, it first checks the identity and then calls the access control smart contract to complete the matching process of attributes and strategies, and finally returns the access token;
  • The device completes the access control of resources through the access token.
Cross-domain access control refers to access control among the devices of different domains. It is divided into five main steps:
  • The device sends a cross-domain access control request to the edge device;
  • After receiving the request, the edge device first performs an identity check on the device and then sends the cross-domain access control request to the master chain node;
  • After receiving the request, the master chain node calls the cross-domain access smart contract to first check the node role information, then matches the attributes with the strategy, and finally, generates the access token;
  • After the master chain node generates the access token, it sends it to the device through the edge node;
  • The device completes the cross-domain access control process through the access token.

3.2. Dynamic Selection Strategy of Master Chain Nodes Based on Reputation Mechanism

In this system, the master chain is composed and maintained by master chain nodes, and both the master chain and slave chain utilize Byzantine consensus (PBFT). In order to prevent the master chain nodes from accidents in the process of cross-domain access control and ensure the security and reliability of cross-domain access control, reliable and honest nodes were selected to become master chain nodes. Therefore, this paper proposes a dynamic selection mechanism of master chain nodes based on a reputation mechanism. The reputation value of a node is affected by many factors of the node and affects the final reputation value [22]. Specifically, different domains periodically select the 10% of edge nodes with the highest reputation value as master chain nodes. All notations in the text will be presented in Table 2.

3.2.1. Reputation Mechanism Process

The reputation values of edge nodes are impacted by their behavior during the selection process of master chain nodes. Moreover, the slave chains will also record the behavior of the nodes and finally affect the final reputation value of the nodes. The block structure of the slave chains is shown in Figure 2. Edge nodes exhibiting good behavior tend to have higher reputation values. Consequently, edge nodes with high reputation values have a greater probability of becoming master chain nodes.
During the reputation-based selection process of master chain nodes, the behavior of edge nodes will be recorded when they participate in the consensus process of the slave chain. Subsequently, the blockchain will evaluate the node’s reputation value through the reputation calculation model based on each edge node’s behavior before the consensus’s end. The reputation calculation model will be further elaborated in the following section. Ultimately, the 10% of edge nodes with the highest reputation will be selected as the master chain nodes.

3.2.2. Reputation Calculation Model

All edge nodes in the slave chain maintain a node behavior record table. This table records the edge node’s reputation value and the reference factors for determining the node’s reputation value. Each edge node caches the behavior record table of all edge nodes, including itself, and the table is updated before each consensus completion.
Next, we discuss the specific calculation rules of the reputation model and calculate the edge node reputation value using the following equations.
We evaluate the degree of honesty of a node by its historically honest consensus behavior H C B i . If the node behaves honestly, it has a high degree of honesty and is likely to maintain good honest behavior. Conversely, if a node has a lot of malicious behavior, its historical consensus behavior will be low. The historical consensus behavior of a node is evaluated by assessing the ratio of the number of honest consensus behaviors to the number of historical consensus behaviors for that node. The historical consensus numbers refer to that node’s total number of consensus numbers since it joined the network. The evaluation formula is as follows:
H C B i = S C i A C i
where S C i represents the number of historical honest consensus behaviors of the edge node E n i , and A C i represents the number of historical consensus behaviors of E n i .
When an edge node sends an error message, other edge nodes can report it when they verify the digital signature, and they send their malicious behavior and data to other edge nodes for inspection. The measure of maliciousness in this reputation model is the number of times that a node acts maliciously. If a node commits malicious behavior, its reputation value will grow slowly, even if it later performs honest behaviors. With this penalty mechanism, nodes are prevented from carrying out malicious behaviors in order to make the main chain system more secure and reliable. The malicious behavior M C B i is calculated by the following formula.
M C B i = M C i
where M C i represents the number of consensus behaviors for the malicious behavior of E n i .
The historical activity H A i of E n i is used to measure the activity of the node. In the process, edge nodes need to actively complete consensus to achieve high efficiency. If the edge node does not complete the consensus within the specified time, the node may have network latency, downtime, etc., and it is likely to suffer attacks if it is offline for a long time or it has a bad network. Thus, H A i is derived from the ratio of the node’s online time O n l i n e T i and the total time T o t a l T i from it joining the network to the current time. The node itself is not a malicious node because of the node’s environment or its own problems. The node does not need to be punished; the probability of the node becoming a master chain node only needs to be reduced. Therefore, the historical consensus participation of E n i can be expressed as:
H A i = O n l i n e T i T o t a l T i
The credibility N C i of an edge node is related to the honesty achieved by that node. When an edge node joins the network, its credibility is relatively low, but when the node has reached many consensuses, its reputation will become high. This parameter is used to prevent nodes that are joining the network from increasing their reputation value too quickly, maintaining system stability.
N C i = 1 1 + e S C i
In this study, we calculated the reputation value of a node in a cross-domain access control system, based on the above reputation assessment factors. The reputation value evaluation model of E n i is:
R i j = α 1 1 + e N C i ( H C B i + H A i ) + M C B i + β M C B i + 1 R i j 1
where α and β represent the balance parameters of the historical reputation value and the impact of the current consensus behavior on the final reputation value, where α + β = 1 .
According to the calculation model established above, we obtained a list of evaluation values from the edge nodes in the chain and selected the top 10% of edge nodes in each slave chain to build the master chain nodes. The system sets a period, and after each period, the system selects the master chain node from the node behavior list.

3.3. Cross-Domain Access Control Model

3.3.1. Access Control Based on Combination of Roles and Attribute

The access control process is divided into three phases: identity registration, access request, and access control. In this study, the access request needed to be recognized and processed by the smart contract before access control. Therefore, before the access request control process started, the corresponding smart contracts needed to be deployed in the master–slave chain model.
Intra-domain access control smart contract (IDSC): The intra-domain access control smart contract is deployed on the slave chain and is responsible for intra-domain access control. When an access request is received, the IDSC passes to call a resource strategy from the resource strategy database. Then the IDSC performs its matching Algorithm 1. If the match is successful, an access token is generated. If the match fails, an error result is returned.
Algorithm 1: Intra-Domain Access Control
Input: Access requests A r Resource strategy Database RSD
Output: Access token T o k e n
1. A t t r S e t = A r . C d . A t t r s ;
2. S t r S e t = R S D . A P I . G e t S t r ( A r . D t ) ;
3. S u c c e s s f u l _ M a t h = m a t c h ( A t t r S e t , S t r S e t )
4. i f ( S u c c e s s f u l _ M a t c h = = t r u e )
5.   r e t u r n   T o k e n ;
6. e l s e i f ( S u c c e s s f u l _ M a t c h = = f a l s e )
7.   r e t u r n   f l a s e
8. E n d i f
Smart contracts that need to be deployed in the master chain:
Cross-domain access control smart contract (CDSC): The cross-domain access control smart contract is deployed on the master chain and is responsible for cross-domain access control. When an access request is received, the CDSC first performs a role check, followed by calling a resource strategy from the resource strategy database. Then the CDSC performs its matching Algorithm 2. If the match is successful, an access token is generated. If the match fails, an error result is returned.
With the above smart contracts, IIoT devices can then perform reliable and effective intra-domain access control and cross-domain access control. Due to the diversity of IIoT devices, different domains exist in different IIoT environments, so this paper proposes a cross-domain access control model based on a combination of roles and attributes. Each domain has a role identity, and all devices under that domain inherit the domain identity role. The entire access control process is divided into three main parts: device identity registration, access request, and access control. In the identity registration phase, the device needs to send registration information to IMS, including its device ID, attribute information, role information, etc. Following this, an access request is sent to the edge node, which then judges the access request. If it is an intra-domain access request, the access control smart contract is called to determine the result. If the request is cross-domain, the access request information is sent to the master chain node, which then communicates with the master chain node of the target domain to determine the access request result. Finally, the device is granted access to the target resource. More details about access control are described in Section 3.4.
Algorithm 2: Cross-Domain Access Control
Input: Access requests A r Resource strategy Database RSD
Output: Access token T o k e n
1. i f ( C h e c k R o l e ( A r . C d i . R o I d ) ) ;
2.   A t t r S e t = A r . C d . A t t r s ;
3.   S t r S e t = R S D . A P I . G e t S t r ( A r . D t ) ;
4.   S u c c e s s f u l _ M a t h = m a t c h ( A t t r S e t , S t r S e t )
5.   i f ( S u c c e s s f u l _ M a t c h = = t r u e )
6.    r e t u r n   T o k e n ;
7.   e l s e i f ( S u c c e s s f u l _ M a t c h = = f a l s e )
8.    r e t u r n   f l a s e
9.   E n d i f
10. e l s e
11.   r e t u r n   f a l s e
12. E n d i f

3.3.2. Grouping Strategy Retrieval Algorithm

In the process of attribute-based access control, the resource policy becomes more and more complex with more and more devices with properties. Currently, in the access control process of devices, many scholars compare attributes with policies one by one, so the matching of attributes and resources takes a long time, which greatly increases the delay of access requests. In order to improve the retrieval efficiency of retrieval strategies, the authors of this paper designed a binary encoding of strategies and constructed a grouped strategy retrieval algorithm. The strategy set was organized into a strategy tree. The process of attribute and strategy matching was also changed from the previous one-by-one matching of attributes and strategies in the strategy set so that only traversal access to the strategy tree is required. By accessing the attribute strategy tree, a large number of irrelevant strategies can be filtered out in the attribute matching process, thus reducing the time for strategy retrieval. The rules for constructing the strategy tree are as follows.
The number of all attributes in a strategy is taken as the total number of bits N of the binary code, each taking 0 or 1, where 0 means that the attribute is not included and 1 means that the attribute is included. Thus, all strategies in the strategy set of each resource can be represented in the form of a binary code, the code is used as a group number, and the strategies with the same code are combined into a group. The strategy set is grouped as shown in Figure 3, and the root node represents all the strategy information in the strategy set. In addition, all strategy sets are grouped by R1 to Rn. There are several sets of strategies in each grouping R. The rules for grouping the strategy sets are as follows: If a strategy in the strategy set of the root node does not contain the first attribute, it is temporarily merged into the group number 011…111, and if it does not contain the last attribute, it is temporarily merged into the group 111…110, and so on. The final binary code of the strategy group is determined as the group number. The complexity of the strategy tree is determined by the number of strategies, which can be divided into most 2 N 1 groups.

3.4. Design of Access Control Processes

3.4.1. Initialization

I M S in the slave chain network grants and verifies certificates for all devices in the domain. I M S sets the slave chain system parameters G 1 , q , G , H 1 , where G 1 represents the elliptic curve cyclic group, q represents the cyclic order, and G represents the recurrent group generator. H 1 stands for the hash function.
Based on elliptic curve encryption (ECC), I M S generates its key pair ( S K M S P , P K M S P ) and broadcasts the P K M S P to all nodes and devices in the slave chain so that the other nodes and devices can send encrypted messages to it.

3.4.2. Identity Registration

For effective access control, the domain devices must first register their identities. For example, the specific process for authentication of device D 1 A in d o m A is as follows:
Step 1: D 1 A generates a public–private key pair ( P K A i , 1 , S K A i , 1 ) and then sends a registration request r e q to I M S . With this request, D 1 A completes the request phase of identity registration.
I M S D 1 A : r e q = E n c M S P ( P K A , 1 , t , I D A , 1 , s i g A , 1 P K A , 1 , t I D A , 1 )
where t denotes the timestamp of the message r e q , and I D A , 1 denotes the I D of the device D 1 A . s i g A , 1 denotes the digital signature of D 1 A . E n c M S P denotes the elliptic curve encryption for encryption with the public key of I M S .
Step 2: I M S receives a registration request r e q from the device and needs to further verify the message reliability to ensure the trustworthiness of the D 1 A identity through authentication. The formula is as follows:
( P K A , 1 , t , I D A 1 , s i g A , 1 P K A , 1 , t I D A , 1 ) = D e c I M S ( r e q ) h = H ( P K A , 1 , t , I D A , 1 ) h = D e c A , 1 ( s i g A , 1 )
Step 3: I M S first decrypts req using its own private key to obtain ( P K A i , 1 , t , I D A 1 , s i g A i , 1 ) , and then it calculates h . Then it decrypts the signature s i g A i , 1 using the public key of D 1 A to obtain h , and finally it determines whether h and h are equal. If they are equal, the authentication passes.
Step 4: After the authentication is passed, I M S generates the certificate of identity D C A 1 as follows. With this certificate, D 1 A can then perform effective cross-domain or intra-domain access control.
I M S D 1 A : D C A , 1 = ( P K A , 1 , t , I D A , 1 , A t t r s A 1 , s i g I M S P K A , 1 , t , I D A , 1 A t t r s A , 1 , R o I d )
where s i g I M S denotes the digital signature encrypted by the private key of the identity management server. A t t r s A , 1 denotes the set of attributes of D 1 A ; R o I d denotes the role identity of D 1 A .
The identity management server stores the generated identity certificate D C A 1 for authentication before access control is performed.

3.4.3. Intra-Domain Access Control

Intra-domain access refers to access control among different devices under the same domain where the access behavior occurs. Let domain A be located to send access requests from D 1 A to D 4 A in chain S C A .
Step 1: D 1 A sends an A r request to edge node E n A 2 . The A r request represents D 1 A sending a resource access request to D 4 A . The request contains all the access information to make it complete the access request process.
D 1 A E n A 2 : { P K A , 1 , t i m e 1 , s i g A , 1 A r D C A , 1 A c ( t y p e , R e A , 4 ) }
where t i m e 1 denotes sending an access request timestamp, A r denotes the access request content, D C A , 1 denotes the access certificate of D 1 A , A c denotes the access content, t y p e determines whether the access is intra-domain or cross-domain, and R e A , 4 denotes the resource of D 1 A .
Step 2: E n A 3 receives the A r request for parsing, confirms that it is currently intra-domain access control, and then authenticates it through I M S .
(a) If the D C A , 1 is valid and legitimate, the authentication result is recorded, and the status information of D 1 A is modified. It also indicates the legitimacy of the D 1 A status.
E n A 3 { t i m e 2 , s i g I M S A r D C A , 1 A c ( t y p e , R e A , 4 ) , L e g a l }
(b) If the D C A , 1 is invalid, then E n A 3 returns a deny message to D 1 A , indicating that D 1 A is an illegitimate device, and access is terminated.
D 1 A E n A 3 { t i m e 2 , s i g I M S A r D C A , 1 A c ( t y p e , R e A , 4 ) , I l l e g a l }
Step 3: After passing the authentication, E n A 3 calls the strategy tree of the data strategy database through through the IDSC for matching with the strategy using Algorithm 1.
(a) If the attribute matches the resource strategy, the access token T o k e n is generated and then sent to the D 1 A through E n A 2 . This also means that D 1 A will have access to the resources. Then D 1 A can perform access control, as follows:
D 1 A E n A 3 : T o k e n = S i g S C A A r D C A , 1 A c ( t y p e , R e A , 4 ) L e g a l D e a d l i n e , t i m e 3
where the D e a d l i n e represents the access deadline of T o k e n . D 1 A can only have access control within the valid time.
(b) If the attributes do not match, a match failure message is sent to D 1 A through E n A 2 . Eventually, the result of this failure will also be stored in the blockchain.
D 1 A E n A 3 : S i g S C A A r D C A , 1 A c ( t y p e , R e A , 4 ) L e g a l f a i l e d
Step 4: D 1 A completes the access control of the resource in the domain for D 4 A .
The intra-domain access control process is shown in Figure 4.

3.4.4. Cross-Domain Access

Cross-domain access is access control that occurs among devices under different domains, as shown in Figure 5. The access control behavior occurs between D 5 A in the slave chain S C A where D o m A is located and D 1 B in the slave chain S C B where D o m B is located.
Step 1: D 5 A in S C A sends a cross-domain access request to E n A 2 .
D 5 A E n A 2 : { P K A 5 , t i m e 4 , s i g A , 5 A r D C A , 5 A c ( t y p e , R e B , 1 ) }
Step 2: After receiving the request, E n A 2 first authenticates the identity of D 5 A through I M S and confirms that the access control type is cross-domain access control.
a. If the authentication passes, the request is identified as a cross-domain access request and sent to M c N A of S C A .
E n A 2 M c N A : { t i m e 5 , s i g A 2 A r D C A , 5 A c f r o m , S C B t y p e , R e B , 1 L e g a l }
where f r o m indicates the domain from which the request comes, and S C B indicates the domain where the resource is located.
b. If the verification does not pass, it means that the D 5 A is not entitled to access, a deny message is returned, and the cross-domain access ends.
E n A 2 D 5 A : { t i m e 6 , s i g A 2 A r D C A , 5 A c ( t y p e , R e B , 1 ) , I l l e g a l }
Step 3: After M c N A receives a cross-domain access request, it first calls the CDSC, then the smart contract checks the identity and then matches the attributes with the strategy using Algorithm 2.
(a) If the verification is successful, T o k e n is generated and T o k e n is sent to D 5 A through E n A 2 in D o m A .
M c N B E n B 2 : T o k e n = s i g S C B A r D C A , 5 A c f r o m , S C B t y p e , R e B , 1 , L e g a l , State : t u r e , t i m e 8 , D e a d l i n e
(b) If authentication fails, the node does not have access to the resource. The results are returned to D 5 A .
E n B 2 U A 5 : s i g S C B A r D C A , 5 A c f r o m , S C B t y p e , R e B , 1 , L e g a l , State : f a l s e
Step 4: After D 5 A obtains T o k e n , it gains control access to the resources of D 1 B .

4. Security Analysis

In this section, we present a security analysis of the system.

4.1. Security and Privacy Concerns

Privacy protection: In this system, the basic information of the IMS resources is stored in the blockchain, and there is no way to cause information leakage if there is no access to the resources. The basic information of the nodes receives the protection of the IMS, and when interacting with the IMS, they need to encrypt and sign messages. If it is not the node itself, there is no way to steal the node information without the node’s private key.
Resisting masquerade attacks: Masquerade attacks are performed by malicious j-nodes to gain unauthorized access to the system by stealing passwords and login names, finding vulnerabilities in the program, etc. Our scheme is resistant to masquerade attacks because each device is required to sign messages when communicating with the b edge, and an attacker cannot have the private key of the device and, therefore, cannot continue an effective masquerade attack.
Resist replay attack: An attacker may intercept the access request sent by the user and replay the access request for the purpose of invalid access. In the proposed model, since each request is signed, the attacker cannot send multiple identical requests, and when the edge node receives a valid message, the rest of the messages are blocked.

4.2. No Falsification of Certificates

An attacker needs to obtain the S K of a legitimate node in order to forge a legitimate node. Moreover, cryptography-based ECC is an elliptic curve discrete logarithm-based problem (ECDLP). In this model, the difficulty of solving this problem is sought as a system security guarantee. With known P K and Q values, the degree of difficulty of the process of reverse-seeking S K is an ECDLP. The text attempts to solve ECDLPs by the exhaustive search method, verifying that reverse-seeking S K is almost impossible to succeed.
It is known that Q = q and P = P K , and the order of P is N. S K is found when L satisfies Q = L P , where L satisfies ( 0 L N 1 ). If the ECDLP holds, then the method does not hold.
Proof. 
Compute the sequence of points P , 2 P , 3 P ...... , n P of E ( F p ) until n P = Q , then n = L . Consider the worst case where N steps need to be computed to find the answer satisfying n P = Q , and on average, N/2 steps are needed to solve the ECDLP. Therefore, the time complexity of this computation is exponentially O ( N ) . When N is large enough, the method of this solution becomes infeasible in terms of computational time. The validity of the method cannot be guaranteed, and the ECDLP’s difficulty holds. At this point, S K ( P K , P ) in Equation (19) is infinitesimal, and the success probability S u c c A of attacker A successfully forging a legitimate node is almost 0.
S u c c A = E C D L P { S K ( P K , Q ) } A { P K , Q , E n c ( S K , H a s h ) }

5. Experimental Verification and Analysis

In this section, the proposed system in this paper is evaluated in terms of its node reputation value assessment, attribute and strategy matching time, transaction throughput, and time delay. The master–slave chain proposed in this paper is built on the Hyperledger fabric platform. The simulation experiments were conducted on three laptops, and the configurations are shown in Table 3. Each laptop was deployed with an Ubuntu 18.04 virtual machine, where the blockchain system was configured.

5.1. Figures, Tables, and Schemes

In this paper, a master–slave chain system is proposed in order to test the reliability of slave chain edge nodes through a dynamic selection strategy of master chain nodes based on a reputation mechanism. In this experiment, we simulated the change of the node reputation value by continuously maintaining honest behavior and the occurrence of illegal behavior between nodes. The reputation was calculated as shown in Equation (5), where α , β , and H A were set to 0.3, 0.7 and 0.8, respectively.
In order to study the evolution of the reputation value, we simulated the change process of the reputation value of the three edge nodes 50 times in the consensus process. Two of the nodes had illegal behaviors in the consensus. Among them, edge node 2 generated an illegal consensus between the sixth and seventh times. Edge node 3 generated illegal consensus between the 21st and 22nd times. Each of its illegal consensuses was recorded in the blockchain and finally expressed as a reputation. An honest node reaches the maximum reputation value by multiple consensuses. However, if a malicious behavior occurs in the middle, it will be recorded in the blockchain. The increase in the reputation value will be slight, reducing the possibility of the node competing as a master chain node and protecting the security and reliability of the main chain to some extent. The trust change process of the three nodes is shown in Figure 6.
When an edge node breaks down, it may also be that the bad network condition causes a delay in receiving messages and sending messages to the node, which may not receive messages or may not be able to send messages, but it does not tamper with the messages or perform other illegal actions. In this study, we reduced the reputation value of this node appropriately to reduce the possibility of this node becoming a master chain node. Equation (3) was used to determine that H A indicates the historical activity of the node. In the experiment, we set the change of node reputation by setting H A as 0.2, 0.40, 0.6, and 0.8, respectively. The rest of the parameters remained unchanged. The results are shown in Figure 7, from which it can be seen that the shorter the node was online, the more its reputation value was affected.

5.2. Grouping Strategy Matching Algorithm

In order to improve the matching rate of attributes and strategies, this paper proposes a grouping strategy retrieval algorithm, which avoids comparing unnecessary strategies by grouping them to improve the matching rates of strategies. In the experimental part, 25 strategies in 11 groups were randomly generated. The numbers of attributes of these 11 sets of strategies were 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, and 15. Moreover, this was repeated 20 times to take the average. The average matching times of the strategy sets with different numbers of attributes were compared and analyzed by the traditional method and the strategy grouping method. The results are shown in Figure 8.
As shown in Figure 8, the strategy matching times were relatively close in the beginning. However, with the increase in the number of attributes, the traditional strategy matching time increased rapidly. The grouping strategy matching time was better than the traditional method.

5.3. Throughput

Throughput measures the ability of a system to process requests or transactions per unit of time. Throughput is expressed in terms of the number of transactions per second calculated using Formula (20):
T P S = S u m t r a n s a c t i o n s / Δ t
where S u m t r a n s a c t i o n s is the number of transactions stored in the blockchain ledger during the time period Δ t . To observe the changes in the T P S , the experimental design was as follows.
Two comparison groups were set up. In the first comparison group, all schemes were master–slave chain structures. We conducted six experiments separately. Each experiment created a block every 10 s. First, the scheme of this paper was compared with the schemes of all other papers. The scheme in [21] used the PBFT consensus, and the scheme in [23] used the proof of work (pow) consensus for the master–slave chain. Figure 9 shows that the average throughputs of the scheme in [21] and the scheme in [23] were 79.2 and 106.9, respectively. The throughput of the proposed scheme in this paper is the highest—1.67 and 1.24 times higher than those of the scheme in [21] and the scheme in [23], respectively.
The second comparison group was between master–slave chains and single chains. The throughput variation between master–slave and single chains was determined by sending access requests at different rates. The results are shown in Figure 10. At lower access request volumes, the difference in throughput between the master–slave and single chains was relatively tiny. However, as accesses increased, the transactions within the domain did not need to be completed through the master chain as in the master–slave chain. The master chain only needed to be responsible for cross-domain access control, making it possible for the master and slave chains to work together. Therefore, the throughput of the master–slave chain was higher than that of the single chain.

5.4. Delay

The system performance is closely related to the time delay, which is calculated as
D e l a y = t e t s
where t s is the time when the transaction was generated, and t e is the time when the transaction is confirmed (stored on the ledger). The latency can be calculated by reading the logs of the blockchain operation. Figure 11 shows the comparison of latency between this paper and the scenarios in [23,24]. Due to the reputation selection mechanism in this paper, more reliable and stable nodes were screened to become the master chain nodes, thus ensuring the system’s stability and reducing the system’s latency. Therefore, the latency increased with the number of transactions in all scenarios. For the same number of transactions, the latency in this paper was the lowest compared to the other two scenarios.

6. Conclusions

In this study, we designed a master–slave chain structure and proposed a highly scalable and trusted cross-domain access control authentication model to solve the access control problem of resources among devices in different domains. For the master chain security problem, a reputation-based dynamic selection strategy of master-chain nodes is used. In the reputation-based master chain node selection mechanism, by evaluating the historical consensus behavior of the nodes, the consensus nodes with more honest consensus have a higher reputation, and the nodes with malicious consensus behavior are punished so that it is difficult for them to recover with a higher reputation value. Periodically, the edge node with the highest reputation in each domain is selected as the master chain node. In addition, for the special environment of the IIoT domain, the paper proposes an access control method based on the combination of roles and attributes to achieve high fine-grained access control. Finally, to address the attribute strategy matching rate problem, a grouping strategy-based matching algorithm is proposed to improve the efficiency of attribute strategy matching by constructing policy groups into policy trees so that a large number of irrelevant strategies can be excluded in the matching process. The experimental results show that the master–slave chain structure improved the throughput by 82% over the single-chain structure. There was also an improvement in the throughput and latency compared to the results of other studies.
For future work, expanding the scale of experiments and optimizing the consensus algorithm of the blockchain should be considered to create a service environment with higher performance, lower latency, and higher bandwidth for the blockchain network than the existing scheme. In addition, to further improve intelligent access control, machine learning techniques can be combined to improve access control and optimize the cross-domain access control model. Finally, in real-life blockchain-based access control systems, there are diverse and heterogeneous IoT environments, which will bring many challenges to the network latency, system operation, and unified management of the access control system, which is already our future optimization target.

Author Contributions

Conceptualization, X.W. and Z.Z.; methodology, Z.Z.; software, S.W.; validation, X.W., Z.Z. and S.W.; formal analysis, Z.Z.; investigation, Z.Z.; resources, X.W.; data curation, S.W.; writing—original draft preparation, Z.Z.; writing—review and editing, Z.Z.; visualization, S.W.; supervision, X.W.; project administration, X.W.; funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (62062006, 62062008, 62067001, 61762008), the Natural Science Basis Research Plan in Guangxi Province of China (2018JJA170028, 2019JJA170045, 2018JJA170194), the Special Funds of the Guangxi Bagui Scholars and the National Key Research and Development Program of China (2018YFB1404404). (Corresponding author: Xu Wu).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sengupta, J.; Ruj, S.; Das Bit, S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
  2. Yan, S.-R.; Pirooznia, S.; Heidari, A.; Navimipour, N.J.; Unal, M. Implementation of a Product-Recommender System in an IoT-Based Smart Shopping Using Fuzzy Logic and Apriori Algorithm. IEEE Trans. Eng. Manag. 2022. [Google Scholar] [CrossRef]
  3. Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
  4. Li, C.; Yang, H.; Sun, Z.; Yao, Q.; Bao, B.; Zhang, J.; Vasilakos, A.V. Federated Hierarchical Trust-Based Interaction Scheme for Cross-Domain Industrial IoT. IEEE Internet Things J. 2023, 10, 447–457. [Google Scholar] [CrossRef]
  5. Ryalat, M.; ElMoaqet, H.; AlFaouri, M. Design of a Smart Factory Based on Cyber-Physical Systems and Internet of Things towards Industry 4.0. Appl. Sci. 2023, 13, 2156. [Google Scholar] [CrossRef]
  6. Lou, J.; Zhang, Q.; Qi, Z.; Lei, K. A Blockchain-based key Management Scheme for Named Data Networking. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 141–146. [Google Scholar] [CrossRef]
  7. Li, G.; Wu, J.; Li, J.; Wang, K.; Ye, T. Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 4702–4711. [Google Scholar] [CrossRef]
  8. Bader, J.; Michala, A.L. Searchable Encryption with Access Control in Industrial Internet of Things (IIoT). Wirel. Commun. Mob. Comput. 2021, 2021, 5555362. [Google Scholar] [CrossRef]
  9. Fernández-Alemán, J.L.; Señor, I.C.; Lozoya, P.Á.O.; Toval, A. Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inform. 2013, 46, 541–562. [Google Scholar] [CrossRef] [PubMed]
  10. Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
  11. Li, H.; Yu, K.; Liu, B.; Feng, C.; Qin, Z.; Srivastava, G. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things. IEEE J. Biomed. Health Inform. 2022, 26, 1949–1960. [Google Scholar] [CrossRef] [PubMed]
  12. Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A. Cross-domain secure data sharing using blockchain for industrial IoT. J. Parallel Distrib. Comput. 2021, 156, 176–184. [Google Scholar] [CrossRef]
  13. Wu, J.; Dong, M.; Ota, K.; Li, J.; Pei, B. A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things. In Proceedings of the 2014 IEEE 11th International Conference on Ubiquitous Intelligence and Computing and 2014 IEEE 11th International Conference on Autonomic and Trusted Computing and 2014 IEEE 14th International Conference on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, 9–12 December 2014; pp. 666–671. [Google Scholar] [CrossRef]
  14. Xuan, S.; Xiao, H.; Man, D.; Wang, W.; Yang, W. A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications. Wirel. Commun. Mob. Comput. 2021, 2021, 9942950. [Google Scholar] [CrossRef]
  15. Li, C.; Li, F.; Yin, L.; Luo, T.; Wang, B. A Blockchain-Based IoT Cross-Domain Delegation Access Control Method. Secur. Commun. Netw. 2021, 2021, 3091104. [Google Scholar] [CrossRef]
  16. Ren, Y.; Zhu, F.; Qi, J.; Wang, J.; Sangaiah, A.K. Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things. Appl. Sci. 2019, 9, 2058. [Google Scholar] [CrossRef]
  17. Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2019, 6, 1594–1605. [Google Scholar] [CrossRef]
  18. Feng, X.; Wu, J.; Li, J.; Wang, S. Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 5221–5227. [Google Scholar] [CrossRef]
  19. Shih, D.-H.; Wu, T.-W.; Shih, M.-H.; Chen, G.-W.; Yen, D.C. Hyperledger Fabric Access Control for Industrial Internet of Things. Appl. Sci. 2022, 12, 3125. [Google Scholar] [CrossRef]
  20. Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2021, 8, 6372–6384. [Google Scholar] [CrossRef]
  21. Miao, Z. Research on Electronic Evidence Storage and Sharing Based on Blockchain. Master’s Thesis, Qinghai Normal University, Xining, China, 2022. [Google Scholar] [CrossRef]
  22. Wu, Q.; Zhang, X.; Zhang, M.; Lou, Y.; Zheng, R.; Wei, W. Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism. Sci. World J. 2014, 2014, 617087. [Google Scholar] [CrossRef] [PubMed]
  23. Huang, M.M.; Yuan, L.Y.; Pan, X.; Zhang, J. A Secure and Trusted Authentication Model under Edge Computing and Block Multi-Chain. J. Front. Comput. Sci. Technol. 2023, 17, 733. [Google Scholar]
  24. Tian, X.; Yang, M. Access Control Mechanism Based on Smart Contract in Home Internet of Things. Comput. Eng. 2023, 1–13. [Google Scholar] [CrossRef]
Figure 1. System architecture.
Figure 1. System architecture.
Applsci 13 05042 g001
Figure 2. Block structure.
Figure 2. Block structure.
Applsci 13 05042 g002
Figure 3. Attribute coding.
Figure 3. Attribute coding.
Applsci 13 05042 g003
Figure 4. Intra-domain access control.
Figure 4. Intra-domain access control.
Applsci 13 05042 g004
Figure 5. Cross-domain access control process.
Figure 5. Cross-domain access control process.
Applsci 13 05042 g005
Figure 6. Reputation change process.
Figure 6. Reputation change process.
Applsci 13 05042 g006
Figure 7. Effects of node online time on reputation.
Figure 7. Effects of node online time on reputation.
Applsci 13 05042 g007
Figure 8. Strategy matching time comparison.
Figure 8. Strategy matching time comparison.
Applsci 13 05042 g008
Figure 9. Throughput comparison between master and slave chains. Applsci 13 05042 i001 this paper; Applsci 13 05042 i002 Scheme [21]; Applsci 13 05042 i003 Scheme [23].
Figure 9. Throughput comparison between master and slave chains. Applsci 13 05042 i001 this paper; Applsci 13 05042 i002 Scheme [21]; Applsci 13 05042 i003 Scheme [23].
Applsci 13 05042 g009
Figure 10. Throughput comparison between master–slave chains and single chains.
Figure 10. Throughput comparison between master–slave chains and single chains.
Applsci 13 05042 g010
Figure 11. Delay comparison. Applsci 13 05042 i004 Scheme [23]; Applsci 13 05042 i005 Scheme [24]; Applsci 13 05042 i006 this paper.
Figure 11. Delay comparison. Applsci 13 05042 i004 Scheme [23]; Applsci 13 05042 i005 Scheme [24]; Applsci 13 05042 i006 this paper.
Applsci 13 05042 g011
Table 1. A summary of the existing work.
Table 1. A summary of the existing work.
ReferenceEnvironmentArchitectureCross-DomainAccess ControlScalability
Wu et al. [13]IoTCentralizedNoYesNo
Xuan et al. [14]IIoTCentralizedNoYesNo
Li et al. [15]IoTSingle-chainYesYesNo
Ren et al. [16]IIoTSingle-chainYesYesNo
Zhang et al. [17]IoTSingle-chainNoSmart contract-basedNo
Feng et al. [18]IIoTSingle-chainNoRole-basedNo
Shi et al. [19]IIoTSingle-chainNoAttribute-basedNo
Zhang et al. [20]Smart CitiesSingle-chainNoAttribute-basedNo
Miao et al. [21]IoTMaster–slave chainYesAttribute-basedYes
Table 2. A summary of the notations.
Table 2. A summary of the notations.
NotationDescription
E n i Edge node
D j X Device j in domain X
M c N k Master chain node
D o m X Domain X
P K i Public key of device i or node i
S K i Private key of device i or node i
S C i Number of historical honest consensus behaviors of E n i
A C i Total number of historical consensus behaviors of E n i
M C i Number of consensus times of malicious behavior of E n i
O n l i n e T Online hours of E n i
T o t a l T i Total time of E n i joining the network
R i j Reputation value of E n i in the b l o c k i
H 1 Hash function
I M S Identity management server
S C A Slave chain of domain A
IDSCIntra-domain access control smart contract
CDSCCross-domain access control smart contract
Table 3. Configurations of the three laptops.
Table 3. Configurations of the three laptops.
IPConfigurationOS
172.18.18.193Intel(R) Core (TM) i5-10500Windows 10
172.18.18.206Intel(R) Core (TM) i5-9400Windows 10
172.18.18.141AMD Ryzen 7 4800HWindows 10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Z.; Wu, X.; Wei, S. Cross-Domain Access Control Model in Industrial IoT Environment. Appl. Sci. 2023, 13, 5042. https://doi.org/10.3390/app13085042

AMA Style

Zhang Z, Wu X, Wei S. Cross-Domain Access Control Model in Industrial IoT Environment. Applied Sciences. 2023; 13(8):5042. https://doi.org/10.3390/app13085042

Chicago/Turabian Style

Zhang, Zhen, Xu Wu, and Shuang Wei. 2023. "Cross-Domain Access Control Model in Industrial IoT Environment" Applied Sciences 13, no. 8: 5042. https://doi.org/10.3390/app13085042

APA Style

Zhang, Z., Wu, X., & Wei, S. (2023). Cross-Domain Access Control Model in Industrial IoT Environment. Applied Sciences, 13(8), 5042. https://doi.org/10.3390/app13085042

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop