2023
DOI: 10.1109/access.2023.3325879
|View full text |Cite
|
Sign up to set email alerts
|

A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0

Khaled Ali Abuhasel

Abstract: This new era of the industry is characterized by the integration of artificial intelligence and the Internet of Things (IoT) to optimize production processes and reduce waste while also promoting humancentric approaches to work. To ensure sustainability and continuous industrial performance, Industry 5.0 integrates automated technology, robots, humans, and others. This modern paradigm relies on data and highlevel security to achieve sustainability and error-free production operations. For improving the resilie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…In addition, evaluating the confidence levels of the DoD's ML models, devices, users, and resources is routinely performed to ensure minimal security vulnerabilities. Recent advancements towards the Industry 5.0 paradigm now require zerotrust network-based access using AI for effective cybersecurity and real-time monitoring, controlling, and allocations of production sequences to prevent false rates and maximize productivity [28]. Current academic research has also investigated the employment of the ZTA for strong IoT security.…”
Section: Zero-trust Cyberdefense In Iotmentioning
confidence: 99%
“…In addition, evaluating the confidence levels of the DoD's ML models, devices, users, and resources is routinely performed to ensure minimal security vulnerabilities. Recent advancements towards the Industry 5.0 paradigm now require zerotrust network-based access using AI for effective cybersecurity and real-time monitoring, controlling, and allocations of production sequences to prevent false rates and maximize productivity [28]. Current academic research has also investigated the employment of the ZTA for strong IoT security.…”
Section: Zero-trust Cyberdefense In Iotmentioning
confidence: 99%
“…Various cryptographic algorithms come naturally by means that are out of use in different domains, for example, the technique of secure electronic commerce, digital signature, and steganographic-based hiding information over insecure networks [48], [49]. In addition, it is evaluated that the RSA cryptographic algorithms are one of the most successfully designed, which solves integer factorization and manufactories' privacy protection and security.…”
Section: Cryptographic Algorithms For Securing the Environment Of Ind...mentioning
confidence: 99%