scholarly journals Modbus Access Control System Based on SSI over Hyperledger Fabric Blockchain

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5438
Author(s):  
Santiago Figueroa-Lorenzo ◽  
Javier Añorga Benito ◽  
Saioa Arrizabalaga

Security is the main challenge of the Modbus IIoT protocol. The systems designed to provide security involve solutions that manage identity based on a centralized approach by introducing a single point of failure and with an ad hoc model for an organization, which handicaps the solution scalability. Our manuscript proposes a solution based on self-sovereign identity over hyperledger fabric blockchain, promoting a decentralized identity from which both authentication and authorization are performed on-chain. The implementation of the system promotes not only Modbus security, but also aims to ensure the simplicity, compatibility and interoperability claimed by Modbus.

Author(s):  
Vineela Muppavarapu ◽  
Soon M. Chung

This paper proposes a semantic-based access control system for the data resources in the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI). OGSA-DAI is a widely used middleware for integrating data resources in Grids. However, the identity-based access control in OGSA-DAI causes substantial overhead for the resource providers in virtual organizations (VOs), because the access control information of individual users has to be maintained by each resource provider. To solve these problems, the authors propose a semantic-based access control system using Shibboleth and ontology. Shibboleth, an attribute authorization service, is used to manage the user attributes, and the Web Ontology Language (OWL) is used to represent the ontology of the data resources and users. By using ontology, VOs can resolve the differences in their terminologies and specify access control policies based on concepts and user roles, instead of individual resources and user identities. As a result, the administration overhead of the resource providers is reduced considerably. In addition, the eXtensible Access Control Markup Language (XACML) is used to specify the access control policies uniformly across multiple VOs. The authors also developed an XACML policy administration tool that allows the administrators to create, update, and manage XACML policies. The performance analysis shows that our proposed system adds only a small overhead to the existing security mechanism of OGSA-DAI.


2020 ◽  
Vol 4 (1) ◽  
pp. 19-21
Author(s):  
Yakubu Ajiji Makeri

Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme. Identity-based (ID-based) cryptography is very useful because it simplifies certificate management in public-key cryptocurrency. For the design of the Integrated File Level Cryptographic Access Control (IFLCAC) system, it makes file security much easier for the end-user. This system combines the advantages of traditional file-level cryptography and full-disc cryptography systems, making it safe and easy to use. We first look at existing file cryptography systems, compare them to two, and then describe the interactions between components and components of the integrated file-level cryptographic access control system. Because its defense relies on the difficulty of discrete logarithmic and integer factor problems, it proves that his scheme is safe against favorable select-plain invasion. We show that this new ID-based encryption scheme is not secure by introducing a method to retrieve the secret master key.


Author(s):  
Yiqin Bao ◽  
Zhengtang Sun

With the rapid development of wireless communication technology, Near field communication (NFC) and Ad-Hoc network (ZigBee) have attracted wide attention for their security, speed and low power consumption. NFC has been used in access control research. In the past, the system only considered the switch control of the door lock, but could not achieve safety management in large building scenarios, resulting in security loopholes and poor maintenance of access control. In order to solve the above problems, Automatic networking access control system based on NFC and ZigBee technology is implemented. The access control and Internet of Things system (IoT) are fused through NFC. NFC identity information is transmitted through ZigBee to the management for identity authentication. The wireless transmission adopts the improved reduced AES advanced encryption algorithm R-AES, which ensures reliable data transmission. On this basis, the security of access control is realized. Practical results show that the Ad-Hoc network access control system and method for edge NFC terminal can improve the management efficiency and security of building access control.


Author(s):  
Vineela Muppavarapu ◽  
Soon M. Chung

This paper proposes a semantic-based access control system for the data resources in the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI). OGSA-DAI is a widely used middleware for integrating data resources in Grids. However, the identity-based access control in OGSA-DAI causes substantial overhead for the resource providers in virtual organizations (VOs), because the access control information of individual users has to be maintained by each resource provider. To solve these problems, the authors propose a semantic-based access control system using Shibboleth and ontology. Shibboleth, an attribute authorization service, is used to manage the user attributes, and the Web Ontology Language (OWL) is used to represent the ontology of the data resources and users. By using ontology, VOs can resolve the differences in their terminologies and specify access control policies based on concepts and user roles, instead of individual resources and user identities. As a result, the administration overhead of the resource providers is reduced considerably. In addition, the eXtensible Access Control Markup Language (XACML) is used to specify the access control policies uniformly across multiple VOs. The authors also developed an XACML policy administration tool that allows the administrators to create, update, and manage XACML policies. The performance analysis shows that our proposed system adds only a small overhead to the existing security mechanism of OGSA-DAI.


Sign in / Sign up

Export Citation Format

Share Document