A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

被引:5
|
作者
Abuhasel, Khaled Ali [1 ]
机构
[1] Univ Bisha, Coll Engn, Mech Engn Dept, Ind Engn Program, Bisha 61922, Saudi Arabia
关键词
Access control; deep learning; Industry; 5.0; zero-trust; INTERNET; FRAMEWORK; SECURITY; IOT;
D O I
10.1109/ACCESS.2023.3325879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and high-level security to achieve sustainability and error-free production operations. For improving the resilience of Industry 5.0 through adversary mitigation, this manuscript introduces a Zero-Trust Network-based Access Control Scheme (ZTN-ACS). This scheme extends its remote and limitless support for managing, monitoring, and controlling devices and operation schedules. For its limiting network over the available controllers, deep learning aids access control. The industrial controller output over the defined access is verified for efficiency and consistency compared to the expected and previous production outputs. In the verification scheme, access interrupts the controllers, and the schedules are initiated using the learning paradigm. This learning process considers the achievable production outcome and the low or high variations in the current access-based output. Therefore, the access control and security features are extended depending on the learning output over the adversaries. This scheme leverages consistency and reduces controller denials, failures, and false positives in Industry 5.0.
引用
收藏
页码:116398 / 116409
页数:12
相关论文
共 50 条
  • [41] Application of Fuzzy Neural Network in the Trust-Based Access Control Model
    Su, Rina
    Zhang, Yongping
    Fan, Jianbo
    Wang, Yu
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
  • [42] Heterogeneous mobile network access control technology based on mutual trust mechanism
    Wang, Feng
    Liu, Shaojiang
    Ni, Weichuan
    Xu, Zhiming
    Wan, Zhiping
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (06) : 1489 - 1498
  • [43] Bitcoin network-based anonymity and privacy model for metaverse implementation in Industry 5.0 using linear Diophantine fuzzy sets
    Mohammed, Z. K.
    Zaidan, A. A.
    Aris, H. B.
    Alsattar, Hassan A.
    Qahtan, Sarah
    Deveci, Muhammet
    Delen, Dursun
    ANNALS OF OPERATIONS RESEARCH, 2024, 342 (02) : 1193 - 1233
  • [44] Research on Zero Trust Access Control Model and Formalization Based on Rail Transit Data Platform
    Yu, Wenjuan
    Zhang, Lei
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 689 - 695
  • [45] Network-based H∞ control for singular systems with event-triggered sampling scheme
    Wang, Huijiao
    Ying, Yujia
    Lu, Renquan
    Xue, Anke
    INFORMATION SCIENCES, 2016, 329 : 540 - 551
  • [46] A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
    Ruan, Conghao
    Hu, Chunqiang
    Zhao, Ruifeng
    Liu, Zewei
    Huang, Hongyu
    Yu, Jiguo
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17656 - 17665
  • [47] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [48] Robust Resource Control Mechanism for Connected Support to IoT-Based Sustainable Consumer Electronics for Industry 5.0
    Taneja, Ashu
    Rani, Shalli
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1463 - 1470
  • [49] Cooperative QoS Control Scheme Based on Scheduling Information in FiWi Access Network
    Fadlullah, Zubair Md.
    Nishiyama, Hiroki
    Kawamoto, Yuichi
    Ujikawa, Hirotaka
    Suzuki, Ken-Ichi
    Yoshimoto, Naoto
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (02) : 375 - 383
  • [50] RAN Slice Access Control Scheme Based on QoS and Maximum Network Utility
    Yao, Jiming
    Chen, Duanyun
    Yu, Yue
    Wang, Wei
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1853 - 1858