A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

被引:7
作者
Abuhasel, Khaled Ali [1 ]
机构
[1] Univ Bisha, Coll Engn, Mech Engn Dept, Ind Engn Program, Bisha 61922, Saudi Arabia
关键词
Access control; deep learning; Industry; 5.0; zero-trust; INTERNET; FRAMEWORK; SECURITY; IOT;
D O I
10.1109/ACCESS.2023.3325879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and high-level security to achieve sustainability and error-free production operations. For improving the resilience of Industry 5.0 through adversary mitigation, this manuscript introduces a Zero-Trust Network-based Access Control Scheme (ZTN-ACS). This scheme extends its remote and limitless support for managing, monitoring, and controlling devices and operation schedules. For its limiting network over the available controllers, deep learning aids access control. The industrial controller output over the defined access is verified for efficiency and consistency compared to the expected and previous production outputs. In the verification scheme, access interrupts the controllers, and the schedules are initiated using the learning paradigm. This learning process considers the achievable production outcome and the low or high variations in the current access-based output. Therefore, the access control and security features are extended depending on the learning output over the adversaries. This scheme leverages consistency and reduces controller denials, failures, and false positives in Industry 5.0.
引用
收藏
页码:116398 / 116409
页数:12
相关论文
共 36 条
[1]   A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing [J].
Abuhasel, Khaled Ali ;
Khan, Mohammad Ayoub .
IEEE ACCESS, 2020, 8 :117354-117364
[2]   GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment [J].
Ali, Yasir ;
Khan, Habib Ullah .
COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 168
[3]  
[Anonymous], Smart Grid Monitoring Power
[4]   Towards industry 5.0: A multi-objective job rotation model for an inclusive workforce [J].
Battini, Daria ;
Berti, Nicola ;
Finco, Serena ;
Zennaro, Ilenia ;
Das, Ajay .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2022, 250
[5]   Towards Fusion Energy in the Industry 5.0 and Society 5.0 Context: Call for a Global Commission for Urgent Action on Fusion Energy [J].
Carayannis, Elias G. ;
Draper, John ;
Bhaneja, Balwant .
JOURNAL OF THE KNOWLEDGE ECONOMY, 2021, 12 (04) :1891-1904
[6]   A Survey of Network Automation for Industrial Internet-of-Things Toward Industry 5.0 [J].
Chi, Hao Ran ;
Wu, Chung Kit ;
Huang, Nen-Fu ;
Tsang, Kim-Fung ;
Radwan, Ayman .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) :2065-2077
[7]   An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System [J].
Cui, Jie ;
Bian, Fengyu ;
Zhong, Hong ;
Zhang, Qingyang ;
Xu, Sheng ;
Gu, Chengjie ;
Liu, Lu .
IEEE SYSTEMS JOURNAL, 2022, 16 (04) :6569-6580
[8]   TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing [J].
Fang, Weidong ;
Zhang, Wuxiong ;
Chen, Wei ;
Liu, Yang ;
Tang, Chaogang .
WIRELESS NETWORKS, 2020, 26 (05) :3169-3182
[9]   A Secure IIoT Gateway Architecture based on Trusted Execution Environments [J].
Froehlich, Antonio Augusto ;
Horstmann, Leonardo Passig ;
Hoffmann, Jose Luis Conradi .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)
[10]  
Golovianko Mariia, 2023, Procedia Computer Science, P102, DOI 10.1016/j.procs.2022.12.206