A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

被引:5
|
作者
Abuhasel, Khaled Ali [1 ]
机构
[1] Univ Bisha, Coll Engn, Mech Engn Dept, Ind Engn Program, Bisha 61922, Saudi Arabia
关键词
Access control; deep learning; Industry; 5.0; zero-trust; INTERNET; FRAMEWORK; SECURITY; IOT;
D O I
10.1109/ACCESS.2023.3325879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and high-level security to achieve sustainability and error-free production operations. For improving the resilience of Industry 5.0 through adversary mitigation, this manuscript introduces a Zero-Trust Network-based Access Control Scheme (ZTN-ACS). This scheme extends its remote and limitless support for managing, monitoring, and controlling devices and operation schedules. For its limiting network over the available controllers, deep learning aids access control. The industrial controller output over the defined access is verified for efficiency and consistency compared to the expected and previous production outputs. In the verification scheme, access interrupts the controllers, and the schedules are initiated using the learning paradigm. This learning process considers the achievable production outcome and the low or high variations in the current access-based output. Therefore, the access control and security features are extended depending on the learning output over the adversaries. This scheme leverages consistency and reduces controller denials, failures, and false positives in Industry 5.0.
引用
收藏
页码:116398 / 116409
页数:12
相关论文
共 50 条
  • [1] A novel zero-trust network access control scheme based on the security profile of devices and users
    Garcia-Teodoro, P.
    Camacho, J.
    Macia-Fernandez, G.
    Gomez-Hernandez, J. A.
    Lopez-Marin, V. J.
    COMPUTER NETWORKS, 2022, 212
  • [2] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [3] A Blockchain Empowered Smart Home Access Scheme Based on Zero-trust Architecture
    Liu, Peng
    Xu, Yinghui
    Wang, Yanqing
    Fan, Ping
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 43 - 49
  • [4] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [5] Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams
    Sasada, Taisho
    Masuda, Yuto
    Taenaka, Yuzo
    Kadobayashi, Youki
    Fall, Doudou
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 24 - 31
  • [6] A complex network-based approach for resilient and flexible design resource allocation in industry 5.0
    Ma, Nanfeng
    Yao, Xifan
    Wang, Kesai
    COMPUTERS IN INDUSTRY, 2024, 159
  • [7] Poster: Toward Zero-Trust Path-Aware Access Control
    Seaton, Joshua H.
    Hounsinou, Sena
    Wood, Timothy
    Xu, Shouhuai
    Brown, Philip N.
    Bloom, Gedare
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 267 - 269
  • [8] Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework
    Li, Yong
    Chen, Lu
    Li, Nige
    Lu, Ziang
    Dai, Zaojian
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 612 - 624
  • [9] A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
    Awan, Samia Masood
    Azad, Muhammad Ajmal
    Arshad, Junaid
    Waheed, Urooj
    Sharif, Tahir
    INFORMATION, 2023, 14 (02)
  • [10] NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
    Katsis, Charalampos
    Cicala, Fabrizio
    Thomsen, Dan
    Ringo, Nathan
    Bertino, Elisa
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 167 - 178