A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

被引:5
|
作者
Abuhasel, Khaled Ali [1 ]
机构
[1] Univ Bisha, Coll Engn, Mech Engn Dept, Ind Engn Program, Bisha 61922, Saudi Arabia
关键词
Access control; deep learning; Industry; 5.0; zero-trust; INTERNET; FRAMEWORK; SECURITY; IOT;
D O I
10.1109/ACCESS.2023.3325879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and high-level security to achieve sustainability and error-free production operations. For improving the resilience of Industry 5.0 through adversary mitigation, this manuscript introduces a Zero-Trust Network-based Access Control Scheme (ZTN-ACS). This scheme extends its remote and limitless support for managing, monitoring, and controlling devices and operation schedules. For its limiting network over the available controllers, deep learning aids access control. The industrial controller output over the defined access is verified for efficiency and consistency compared to the expected and previous production outputs. In the verification scheme, access interrupts the controllers, and the schedules are initiated using the learning paradigm. This learning process considers the achievable production outcome and the low or high variations in the current access-based output. Therefore, the access control and security features are extended depending on the learning output over the adversaries. This scheme leverages consistency and reduces controller denials, failures, and false positives in Industry 5.0.
引用
收藏
页码:116398 / 116409
页数:12
相关论文
共 50 条
  • [21] Network-based control system with 'unparalleled' data access
    不详
    HYDROCARBON PROCESSING, 2003, 82 (06): : 36 - 37
  • [22] Analysis of Critical Success Factors of Sustainable and Resilient Aioe-based Supply Chain in Industry 5.0
    Nozari, Hamed
    Tavakkoli-Moghaddam, Reza
    Dolgui, Alexandre
    ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS-PRODUCTION MANAGEMENT SYSTEMS FOR VOLATILE, UNCERTAIN, COMPLEX, AND AMBIGUOUS ENVIRONMENTS, PT II, APMS 2024, 2024, 729 : 76 - 90
  • [23] Core Competence-As a Key Factor for a Sustainable, Innovative and Resilient Development Model Based on Industry 5.0
    Suciu, Marta Christina
    Plesea, Doru Alexandru
    Petre, Adrian
    Simion, Adrian
    Mituca, Mircea Ovidiu
    Dumitrescu, Decebal
    Bocaneala, Ana Maria
    Moroianu, Ramona Madalina
    Nasulea, Diana Florentina
    SUSTAINABILITY, 2023, 15 (09)
  • [24] Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV
    Wang, Jiuru
    Wang, Zhiyuan
    Song, Jingcheng
    Cheng, Hongyuan
    ELECTRONICS, 2023, 12 (23)
  • [25] A privacy preserving access control mechanism for network-based database
    Rui, Fan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 435 - 439
  • [26] Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering
    Zhao, Li
    Sun, Meng
    Yang, Binbin
    Xie, Junpeng
    Feng, Jiqiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (03) : 3189 - 3201
  • [27] An adaptive access control scheme based on trust degrees for edge computing
    Zheng, Wenying
    Chen, Bing
    He, Debiao
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [28] Network-based and attack-resilient length signature generation for zero-day polymorphic worms
    Li, Zhichun
    Wang, Lanjia
    Chen, Yan
    Judy Fu, Zhi
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2007, : 164 - +
  • [29] ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
    Huang, Wenhua
    Xie, Xuemin
    Wang, Ziying
    Feng, JingYu
    Han, Gang
    Zhang, Wenbo
    AD HOC NETWORKS, 2023, 145
  • [30] ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT
    Han, Chenchen
    Kim, Gwang-Jun
    Alfarraj, Osama
    Tolba, Amr
    Ren, Yongjun
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 289 - 295