Saha, Sourav, Bera, Basudeb, Das, Ashok Kumar, Kumar, Neeraj, Islam, Sk Hafizul and Park, Youngho (2023). Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing. IEEE Access, 11 , 130206 - 130229.
Abstract
The Industrial Internet of Things (IIoT) is able to connect machines, analytics and people with IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to drive smarter, faster and effective business agreements. IIoT having interconnected machines along with devices can monitor, gather, exchange, and analyze information. Since the communication among the entities in IIoT environment takes place insecurely (for instance, wireless communications and Internet), an intruder can easily tamper with the data. Moreover, physical theft of IoT smart devices provides an intruder to mount impersonation and other attacks. To handle such critical issues, in this work, we design a new private blockchain-envisioned access control scheme for Pervasive Edge Computing (PEC) in IIoT environment, called PBACS-PECIIoT. We consider the private blockchain consisting of the transactions and registration credentials of the entities related to IIoT, because the information is strictly confidential and private. The security of PBACS-PECIIoT is significantly improved due to usage of blockchain as immutability, transparency and decentralization along with protection of various potential attacks. A meticulous comparative analysis exhibits that PBACS-PECIIoT achieves greater security and more functionality features, and requires low costs for communication and computational as compared to other pertinent schemes.
| Publication DOI: | https://doi.org/10.1109/ACCESS.2023.3333441 |
|---|---|
| Divisions: | College of Engineering & Physical Sciences > School of Computer Science and Digital Technologies College of Engineering & Physical Sciences College of Engineering & Physical Sciences > School of Computer Science and Digital Technologies > Software Engineering & Cybersecurity Aston University (General) |
| Funding Information: | This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant 2020R1I1A3058605; in part by the Blockchain Project through the Ripple Centre of |
| Additional Information: | Copyright © 2023 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| Publication ISSN: | 2169-3536 |
| Last Modified: | 27 Nov 2025 08:06 |
| Date Deposited: | 26 Nov 2025 11:37 |
| Full Text Link: | |
| Related URLs: |
https://ieeexpl ... cument/10319412
(Publisher URL) |
PURE Output Type: | Article |
| Published Date: | 2023-11-27 |
| Published Online Date: | 2023-11-16 |
| Accepted Date: | 2023-11-13 |
| Authors: |
Saha, Sourav
(
0000-0002-4869-6620)
Bera, Basudeb Das, Ashok Kumar Kumar, Neeraj Islam, Sk Hafizul Park, Youngho |
0000-0002-4869-6620