A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

被引:5
|
作者
Abuhasel, Khaled Ali [1 ]
机构
[1] Univ Bisha, Coll Engn, Mech Engn Dept, Ind Engn Program, Bisha 61922, Saudi Arabia
关键词
Access control; deep learning; Industry; 5.0; zero-trust; INTERNET; FRAMEWORK; SECURITY; IOT;
D O I
10.1109/ACCESS.2023.3325879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and high-level security to achieve sustainability and error-free production operations. For improving the resilience of Industry 5.0 through adversary mitigation, this manuscript introduces a Zero-Trust Network-based Access Control Scheme (ZTN-ACS). This scheme extends its remote and limitless support for managing, monitoring, and controlling devices and operation schedules. For its limiting network over the available controllers, deep learning aids access control. The industrial controller output over the defined access is verified for efficiency and consistency compared to the expected and previous production outputs. In the verification scheme, access interrupts the controllers, and the schedules are initiated using the learning paradigm. This learning process considers the achievable production outcome and the low or high variations in the current access-based output. Therefore, the access control and security features are extended depending on the learning output over the adversaries. This scheme leverages consistency and reduces controller denials, failures, and false positives in Industry 5.0.
引用
收藏
页码:116398 / 116409
页数:12
相关论文
共 50 条
  • [31] A Trust-based Access Control Scheme for e-Health Cloud
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [32] A game control scheme based on prediction of trust and service for wireless access service
    Gui, Jinsong
    Wu, Min
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (02): : 231 - 242
  • [33] Deep Reinforcement Learning of Graph Convolutional Neural Network for Resilient Production Control of Mass Individualized Prototyping Toward Industry 5.0
    Leng, Jiewu
    Ruan, Guolei
    Xu, Caiyu
    Zhou, Xueliang
    Xu, Kailin
    Qiao, Yan
    Liu, Zhihong
    Liu, Qiang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (11): : 7092 - 7105
  • [34] A neural network-based fault detection scheme for satellite Attitude Control Systems
    Talebi, HA
    Patel, RV
    2005 IEEE INTERNATIONAL CONFERENCE ON CONTROL APPLICATIONS (CCA), VOLS 1AND 2, 2005, : 1293 - 1298
  • [35] Network-based H∞ tracking control with event-triggering sampling scheme
    Hu, S.
    Zhang, Y.
    Du, Z.
    IET CONTROL THEORY AND APPLICATIONS, 2012, 6 (04): : 533 - 544
  • [36] Neural Network-Based Fault Diagnosis Scheme for Satellite Attitude Control System
    Gao Sheng
    Zhang Wei
    He Xu
    Cao Yunxia
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 3990 - 3995
  • [37] Neural Network-Based Bandit: A Medium Access Control for the IIoT Alarm Scenario
    Raghuwanshi, Prasoon
    Alcaraz Lopez, Onel Luis
    Mehta, Neelesh B.
    Alves, Hirley
    Latva-Aho, Matti
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 7511 - 7524
  • [38] An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain
    Jiang, Wenxian
    Lin, Zerui
    Tao, Jun
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
  • [39] SCC5G: A PQC-based Architecture for Highly Secure Critical Communication Over Cellular Network in Zero-Trust Environment
    Gharib, Mohammed
    Afghah, Fatemeh
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 11 - 18
  • [40] Heterogeneous mobile network access control technology based on mutual trust mechanism
    Feng Wang
    Shaojiang Liu
    Weichuan Ni
    Zhiming Xu
    Zhiping Wan
    Peer-to-Peer Networking and Applications, 2019, 12 : 1489 - 1498