Access Control in Industrial Internet of PDF
Access Control in Industrial Internet of PDF
Access Control in Industrial Internet of PDF
Abstract
1. Introduction
The Internet of Things (IoT) is a term widely used to describe the existence of an
ecosystem where pervasive and ubiquitous computing technologies are used to
provide connectivity to physical things and make them part of a network where
people, devices and things coexist and interact. IoT was greatly benefited from the
development of underlying technologies in wireless and mobile networks, which
in turn enabled the evolution of both the cloud and Wireless Sensor Networks
(WSNs). WSNs provide things with sensors and actuators that are used to sense
and produce, as well as consume data and interact with the environment.
Advances in the IoT domain are so rapid that although the estimation of 50 billion
devices in 2020 seems optimistic, the trend is inambiguous and a number of 20-30
billion seems feasible [19]. IoT is currently used in a number of domains, such as
smart homes, smart cities, medical applications and the industry.
Over time, there have been some significant advances in technology that were
acknowledged as milestones for the industry development, even characterizing the
whole era: In the nineteenth century, steam provided the means for machine
development and made the first industrial era possible. Afterwards, the significant
development, that started the second era, was the deployment of electricity and its
impact in the industry. The third era was characterized by the adoption of
Information and Communication Technologies (ICT) that allowed for the
development of Programmable Logic Controllers (PLCs) and Supervisory Control
and Data Acquisition (SCADA) systems. Today, we witness the transition into the
fourth industrial era, that is aided by the integration of a whole ecosystem of
networked sensors and actuators into every aspect of the production stage. This
integration between legacy industrial information systems and IoT, was initially
described by the Industrie 4.0 initiative, mainly developed in Germany to provide
competitive advantages by lowering production cost and providing workflow
flexibility [25]. The outcome of the aforementioned integration is known as the
Industrial Internet of Things (IIoT).
As in many emerging technologies, the adaption of ICT technologies in IIoT
introduced issues with regards to standardization and security. Thus, a number of
commercial entities have created the Industrial Internet Consortium (IIC) which
has published a number of publicly accessible white papers on architecture and
security [13]. In ICT, as well as in the IoT, information security (i.e.,
confidentiality, integrity and availability) is of major concern. However, in IIoT,
additional concepts should be taken into consideration regarding the applicability
in the application environment as well as the need for safety. Controlling access to
resources for ecosystem stakeholders is crucial to fulfill both targets.
Introducing access control in IIoT is considered to be a challenging task
stemming from the diversity that characterizes these industrial environments. The
diversity is mainly introduced by the great variety of technologies and protocols
supported by the IIoT devices and networks. Access control in Cyber-Physical
3
Systems (CPSs) has been examined in [18], where access control models are
compared and a set of requirements is examined. Yet, we anticipate that further
investigation may be required to cope with access control challenges in IIoT. The
aim of this chapter is to provide additional information about the most promising
access control models for IIoT, examine access control mechanisms able to
support the described models and propose an access control architecture for IIoT
based on virtualization technologies.
Specifically, in the following of this chapter, in Section 2, we provide
background information on IIoT architectural trends, which are necessary to gain
visibility to the ecosystem and extract access control requirements. In Section 3,
major families of access control models and mechanisms are extensively
presented. Access control approaches proposed in the literature for application in
IIoT is examined in Section 4. The various components that constitute an access
control architecture for IIoT are investigated in Section 5. Finally, in Section 6, we
briefly elaborate on a set of open issues with regards to access control and IIoT
and provide concluding remarks.
2. Background
The IoT is defined by the pervasive presence of things that are uniquely identified
and are able to interact among them and with the rest of the network [3]. Initially
introduced by Radio-Frequency Identification (RFID) tagging to provide
Electronic Product Code (EPC), today IoT includes a number of heterogenous
devices inter-connected using various protocols and technologies to provide the
most efficient means of connectivity and interoperation.
Specifically, IoT describes a network of objects that may collect and share data
in an autonomous manner and without requiring assistance by humans. Examples
of such objects are considered to be various type of sensors that monitor and
measure the temperature or humidity of the environment, the acceleration or
position of an object, etc. The application scenarios of IoT are considered to be
numerous, ranging from smart appliances (e.g., smart lighting and heating
devices) to fitness devices (e.g., Fitbit).
The International Telecommunications Union (ITU) has released ITU-T
Y.2060 [29], which is a recommendation that provides an overview of IoT.
According to the recommendation, IoT adds a third axis in the already existing
“anytime” and “anyplace” communication, that could be even provided by legacy
ICT systems. The new axis is called “anything” and represents communication not
only between computer devices, but also between human to human, human to
thing and thing to thing. Things are objects that exist in the physical world and can
be sensed and identified. The identification can be performed utilizing virtual
entities which can exist without the presence of the physical ones.
4
Due to IoT great success and adoption rates, IoT technologies are also
embraced by the industry and introduced in industrial environments as a means to
improve operational efficiency [5]. Therefore, IIoT, “IoT Version 4.0” or
“Manufacturing IoT” are expressions frequently used to denote the use of IoT for
industrial purposes. By the end of 2020, it is estimated that more than 10 billion
devices will account for the IIoT and represent the 57% of IoT spending [19].
IoT has already been a part of everyday life, including, but not limited to, smart
cities, healthcare, agriculture, leisure (smart homes), construction, intelligent
transportation systems, etc. There are many initiatives aim to exploit IoT in
industrial environments, such as smart factories, Industrial Internet, Factories of
the Future, etc. [25]. Although IoT and underlying technologies are well
established and evolving constantly, adoption in the industry is a challenging task
considering both the different environment and the fact that there are already well-
established ICT systems in place (e.g., Distributed Control Systems (DCS) and
SCADA systems) that control and monitor production process.
Industrie 4.0 is an initiative to support manufacturing in optimizing production
efficiency and increase product quality. The initiative’s underlying concept is to
integrate IoT into legacy production field industrial information systems, thus
being able to create a new concept, the IIoT. IIoT is enabled by the advances on
Machine to Machine (M2M) communication, network efficiency and simplicity
induced by 4G and 5G development and of protocols like 6LoWPAN and
LoRaWAN and faces all challenges that exist in the IoT, such as resource
constrained devices, heterogeneity, limited connectivity, etc. In the industrial
environment an important factor is also the requirement for safety [25]. Although
safety is not directly concerned with information security, being a key objective in
IIoT operation, it must be taken under consideration to prevent accidents that
could potentially threat the integrity of humans and machinery, as well as the
availability of services. Access control models do not take safety under
consideration as an inherent design feature, so safety provision should be
considered, if possible, when creating access control policies.
In March 2014, AT&T, Cisco, General Electric, Intel, and IBM co-founded the
Industrial Internet Consortium (IIC) with the aim to promote the growth of IIoT.
IIC has released version 1.8 of the IIoT Reference Architecture [16] where an IIoT
analysis define four different viewpoints, i.e., business, usage, functional and
implementation viewpoints. In this chapter we are mainly concerned with the
implementation viewpoint where technological aspects can be revealed and
examined.
With regards to the implementation viewpoint, IIC defines a three-tier
architecture, namely, the edge, platform and enterprise tiers. The edge tier is
5
where data collection is performed from industrial and other end devices such as
vehicles, machinery, workstations, automations, and all other sensors representing
“things” in the industrial area. Data collected from the edge tier is sent to the
platform tier, which is the medium between data collection and data exploitation,
with the latter taking place to the enterprise tier (upper tier). Nodes residing on
these tiers are inter and intra connected using different kinds of networks. These
include the proximity network, which connects assets within the edge tier, the
access network that connects the edge to the platform tier, and finally the service
network that connects the platform with the enterprise tier.
The edge tier includes all the ICT components that are located in the production
space. Example of such components are sensors, actuators and all other legacy
devices and CPSs. The evolution of IoT led to the multiplication of the number of
edge nodes that are characterised by physical limitations on computing and energy
resources. The platform tier includes all the necessary processing that is required
for edge device provisioning and data consolidation before those are delivered to
the enterprise tier where services are developed. IIC does not provide topology-
related constraints so, in its simplest form, platform and enterprise tier can be
physically either located in premises or be powered by the cloud. Considering the
volume of collected data, the cloud can be an enabling computing paradigm since
it may provide the best candidate for big data processing. Connecting edge nodes
directly to the cloud though, can be challenging considering the resource
restrictions of many edge devices and latency induced by logical distance. The
latter can be a potential threat to service provisioning as well as to system safety
since the delay induced can lead to delayed actions that may cause damage. To
overcome this issue, fog computing can be used as a middle layer between the
edge and the cloud, thus reducing both distance and latency.
Fog was initially proposed by Cisco Systems [4] to provide a location aware
and low latency virtualized layer between the edge and the cloud, thus bringing
services nearer to the actual stakeholder. A fog layer is populated by private,
community, public or hybrid [14] fog nodes that process information from edge
devices and communicate with the cloud when necessary. In the fog concept, all
information processing is performed in the fog nodes and little or none in the edge
devices. Nevertheless, since nowadays network fabric can also provide the means
to integrate processing into the network itself, a new layer can be developed
between the edge and the fog. This is created by low-resources microcontroller-
based devices with low-resources and is known as the mist layer [14]. Mist nodes
are actually embedded in the same environment with the edge device, providing
more accurate context information and enabling processing at the edge of the
network, which further reduce the overall latency, provide contextual accuracy,
and reduce power requirements from end devices.
6
Although IIC edge tier is clearly matched to the edge layer, it is not so clear
how to map the platform tier and the enterprise layer. Such a mapping usually
depends on the specific application domain and topology. In Figure 1 an indicative
mapping is depicted.
Access control is essential in all systems that require to control and limit actions or
operations that are performed by a user or process on a set of system resources [6].
An access control system is considered of three abstractions, namely, the access
control policies, models, and mechanisms. Based on these abstractions, an access
control system is made responsible for enforcing the access control policies and
preventing them from subversion. Access control policies are characterized as
high-level requirements that specify how and when a user, or a process, may
access a resource. The access control policies are enforced through an access
control mechanism, which is responsible for granting or denying access. An
access control model is an abstract container of a collection of access control
mechanism implementations, capable of preserving support for the reasoning of
7
the access control policies through a conceptual framework. Thus, access control
models are bridging the abstraction gap between the policies and the mechanisms
in an access control system.
In [24] an IoT enabled ecosystem utilizing the notion of fog computing in
Intelligent Transportation Systems (ITSs) is presented. Considering the number of
access control issues presented there, the following requirements can be extracted:
• Context awareness: Contextual information characterises the situation of an
entity and the environment [1]. Context can influence access control decision
and allow for policy creation that considers factors beyond subject’s and
object’s identity. Having visibility into the context, access control policies can
also be designed with an eye on safety on top of information security.
• Inter-domain operation: IIoT is deployed in multiple domains supporting
operation of remote sectors under the same administration authority. Any
access control solution should be able to support a coherent operation among
different domains.
• Privacy assurance: Privacy is nowadays an important factor that needs to be
considered in the deployment of every ICT solution (privacy by design). Since
2018, it is also a legal obligation in the European Union, defined by the
General Data Protection Regulation (GDPR). An access control mechanism
should be designed in a way that no private data should be ever disclosed.
• Resource efficiency: Most devices on the edge are designed to perform
specific tasks and consume the less power possible. This limits available
resources, both in terms of processing power and storage space, so any
component designed to run on those, should take these limitations under
consideration.
• Manageability: There should be a centralized way to create, store and enforce
policies, that would not induce extra latency and could function over low-
bandwidth networks, that may even sometimes become unavailable.
• Accountability: Auditing should be supported to provide respective
stakeholders with the ability to monitor and reveal any violations or system
misuse.
The list of the aforementioned requirements is not exhaustive, but instead it
operates as stepping stones in choosing a more appropriate authorization scheme.
In the following, we provide more information about families of access control
models and frameworks towards their investigation in the context of IIoT
environments.
authorizations. The pre prefix refers timely before the requested right and the
ongoing prefix during the time span of access.
Furthermore, obligations in UCON are used to capture the requirements that
must be met from a subject requesting the usage of an object. These are expressed
as functional predicates and, as already mentioned, they are used in the evaluation
of access both in the usage function as well as with authorizations. Obligations are
also divided into pre obligations and ongoing obligations. The former is used
usually for the retrieval of history information and the latter to check whether the
requested requirement is fulfilled during the time span of access. Finally,
conditions in UCON are used to capture factors that are accrued from the
environment of the system. The semantic difference between conditions and other
variables, namely authorization and obligation, is that the former cannot be
mutable since there is no direct semantic association with subjects.
this mapping, as identified in [12]. Subjects and actions refer to the same concept,
in both XACML and ABAC. A subject refers to the entity that requests access,
and an action refers to the performed operation on the requested entity. A resource
in XACML is mapped to an object in ABAC – resources or objects are entities
that a subject request to access. The environment in XACML is mapped to
environment condition in ABAC – that is a dynamic factor, independent of
subjects and objects. Lastly, while the term element is used in NIST’s guidelines
document to refer to subjects, objects, actions, and environment conditions, the
term category is used in XACML instead to refer to subjects, resources, actions,
and environments.
Event Processing Point (EPP); one PAP; one PIP; and one or more Resource
Access Points (RAPs). Further information about the operation of the individual
functions in NGAC is provided in [12].
It is worth mentioning that although both XACML and NGAC frameworks
share some functionality, yet they differ. For example, the PAP, PDP, and PIP
appear to provide slightly different functionality in each framework. Differences
apply also when it comes to their access decision process, which is logic based in
XACML and enumerated in NGAC [12].
5. Components Placement
From the above it is evident that considering an access control architecture for
application in an IIoT environment requires a carefully investigation of all its
functional components. This will provide – depending on the applied framework
(e.g., XACML, NGAC) – indications on where to place each of the functional
components in respect to the layers, as depicted in Figure 1. The placement is not
just an arbitrary architectural decision since it affects both the functionality and
the efficiency of the applied framework in the specific context.
The cloud is an important element in the development of IIoT. It provides a
unified, ubiquitous platform for data sharing and can support various applications
in the context of IIoT. Alsheri et al. [2] propose a cloud-enabled architecture for
access control deployment in IoT. That architecture includes a layered
environment that consists of the object layer, the application layer and the in-
between middle layer(s). Specifically, the object layer includes the things residing
on the edge, whereas the middle layer includes the virtual object and cloud
services layers. The virtual objects layer is an abstraction used to provide the
constant presence of things including both current and historical information [26].
The cloud services layer provides resources to objects, and finally, the
application layer offers an interface to communicate with the objects. In such an
approach, the access control decision making is provided by a PDP placed in the
cloud layer and the enforcement of access control decisions is performed by a PEP
placed on the object layer. Access control administration is performed in the
administration layer.
In [24] an ABAC specific deployment is proposed where cloud, fog and edge
layers are used for the various components of access control system. Access
control administration is provided by a PAP, which is located on the cloud along
with a PIP that stores subject, object and system attributes. PDPs are in turn
located in various fog nodes and interact with the PAP and PIP in the cloud.
Finally, PEP is performed on the edge layer. Integrating PEP on the edge is a
challenging task considering all resource limitations and the heterogeneity of
objects that renders the consistent enforcement deployment to be a challenging
task.
17
PAP is the term used by ABAC models to describe the entity that is used to
create and manage policies of an access control system. Deploying PAP in the
cloud makes it available enterprise-wide and it eases any consideration regarding
policy exchange between remote federations, provided that all required
mechanisms (e.g., authentication) are in place. The same applies to any other
model implementation when it comes to policy administration.
PDP on the other hand provides time-critical services since their use is to reach
into access control decisions. Access control decision making requires on the one
hand resources to allow for quick processing of policies and on the other hand low
latency to communicate the decision to enforcement points instantly upon making.
Placing PDP on the cloud may not be the most efficient architectural decision,
mainly due to the distance between stakeholders and the cloud itself. Extending
cloud near the edge though, which is the case when exploiting fog computing,
lowers this distance and makes the fog layer the prevalent candidate to host PDPs.
In the ABAC case, which is a suitable model in implementing context-aware
access control mechanisms, thus mechanisms which use context to provide
relevant information and/or services to the user, where relevancy depends on the
user’s task [1], required attributes need to be retrieved from PDP to perform
access decision. This information is provided to PDP upon request to PIP. To
achieve this, PIP should be both aware of all available attributes but also able to
both retrieve and deliver attributes in real time without stalling the whole process.
Since most attributes are domain-specific in the industrial environment,
considering the uniqueness of each deployment, PIP needs to have visibility to the
specific domain. To achieve this fog can be utilized and host an additional “local”
PIP to provide cloud functionality in close vicinity to the stakeholders.
Apart from communication between PDP and PIP, the former needs to obtain
the policies to consider. Having placed PAP on the cloud and PDP in the fog may
induce latency or connectivity issues between those. However, given the benefits
in policy management that cloud provides, it is a matter of context handler
implementation to perform propagation of policies and disconnected decisions.
Access control decisions should be enforced from PEP. The enforcement
usually happens in the edge, where stakeholders exist. Considering an industrial
environment, main issues in this layer are resource limitation, device
heterogeneity and proprietary communication methods. As a result, consistency in
PEP deployment is hard to achieve. The mist layer, as introduced for IIoT
deployment, can provide the area to deploy PEP.
18
In the IoT reference by ITU [29], edge devices can communicate either directly
with the upper layers or through a gateway node. Regarding PEP deployment, it
can be either integrated with the device or with the gateway. Integrating PEP in a
gateway enables support for joining proprietary or other devices that cannot be
natively controlled. Moreover, access control in the industrial environment can
heavily rely on mist implementation directly into the edge network fabric [14],
thus potentially eliminating any latency or connectivity issues. An indicative
component placement is presented in Figure 2.
There are still issues to promote further research in the deployment of access
control in IIoT, some of which are presented in this section.
In ABAC, stakeholder and contextual attributes are evaluated in order to allow
or deny access requests. In an environment like IIoT it is challenging to limit the
scope of a domain into a specific area and control interactions with other domains.
While RBAC models the definition of inter-domain policies requires to exchange
19
References
[1] Abowd GD, Dey AK, Brown PJ, et al (1999) Towards a Better Understanding of Context and
Context-Awareness. In: Gellersen H-W (ed) Handheld and Ubiquitous Computing. Springer
Berlin Heidelberg, Berlin, Heidelberg, pp 304–307
20
[2] Alshehri A, Sandhu R (2016) Access Control Models for Cloud-Enabled Internet of Things:
A Proposed Architecture and Research Agenda. IEEE, pp 530–538
[3] Atzori L, Iera A, Morabito G (2010) The Internet of Things: A survey. Computer Networks
54:2787–2805. doi: 10.1016/j.comnet.2010.05.010
[4] Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of
things. ACM Press, p 13
[5] Daugherty P, Banerjee P, Negm W, Alter AE (2015) Driving unconventional growth through
the industrial internet of things. Accenture (https://www accenture com/us-
en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-
Unconventional-Growth-through-IIoT pdf Downloaded 15 July 2016)
[6] Ferraiolo DF, Kuhn DR, Chandramouli R (2003) Role-Based Access Control, Artech House.
Inc, Norwood, MA
[7] Gouglidis A, Grompanopoulos C, Mavridou A (2018) Formal Verification of Usage Control
Models: A Case Study of UseCON Using TLA+. In: International Workshop on Methods and
Tools for Rigorous System Design
[8] Gouglidis A, Hu VC, Busby JS, Hutchison D (2017) Verification of Resilience Policies That
Assist Attribute Based Access Control. In: Proceedings of the 2Nd ACM Workshop on
Attribute-Based Access Control. ACM, New York, NY, USA, pp 43–52
[9] Gouglidis A, Mavridis I (2012) domRBAC: An access control model for modern
collaborative systems. Computers & Security 31:540–556. doi: 10.1016/j.cose.2012.01.010
[10] Grompanopoulos C, Gouglidis A, Mavridis I (2013) A Use-Based Approach for Enhancing
UCON. In: Jøsang A, Samarati P, Petrocchi M (eds) Security and Trust Management.
Springer Berlin Heidelberg, Berlin, Heidelberg, pp 81–96
[11] Hu VC, Ferraiolo D, Kuhn R, et al (2014) Guide to Attribute Based Access Control
(ABAC) Definition and Considerations. National Institute of Standards and Technology
[12] Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-Based Access Control. Computer 48:85–
88. doi: 10.1109/MC.2015.33
[13] Industrial Internet Consortium. Technical papers, publications, and white papers.
https://www.iiconsortium.org/white-papers.htm. Accessed 1 June 2018.
[14] Iorga M, Feldman L, Barton R, et al (2018) Fog computing conceptual model. National
Institute of Standards and Technology, Gaithersburg, MD
[15] Jin X, Krishnan R, Sandhu R (2012) A Unified Attribute-Based Access Control Model
Covering DAC, MAC and RBAC. In: Cuppens-Boulahia N, Cuppens F, Garcia-Alfaro J (eds)
Data and Applications Security and Privacy XXVI. Springer Berlin Heidelberg, Berlin,
Heidelberg, pp 41–55
[16] Lin S-W, Miller B, Durand J, et al (2015) Industrial internet reference architecture.
Industrial Internet Consortium (IIC), Tech Rep
[17] Liu Q, Zhang H, Wan J, Chen X (2017) An Access Control Model for Resource Sharing
Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet
of Things. IEEE Access 5:7001–7011. doi: 10.1109/ACCESS.2017.2693380
[18] Lopez, J. and Rubio, J.E., 2018. Access control for cyber-physical systems interconnected to
the cloud. Computer Networks, 134, pp.46-54.
[19] Navarro-Ortiz J, Sendra S, Ameigeiras P, Lopez-Soler JM (2018) Integration of LoRaWAN
and 4G/5G for the Industrial Internet of Things. IEEE Communications Magazine 56:60–67.
doi: 10.1109/MCOM.2018.1700625
[20] OASIS Standard. eXtensible Access Control Markup Language (XACML) Version 3.0.
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. Accessed 1 June 2018.
[21] Ouaddah A, Mousannif H, Abou Elkalam A, Ait Ouahman A (2017) Access control in the
Internet of Things: Big challenges and new opportunities. Computer Networks 112:237–262.
doi: 10.1016/j.comnet.2016.11.007
[22] Park J, Sandhu R (2004) The UCON ABC usage control model. ACM Transactions on
Information and System Security 7:128–174. doi: 10.1145/984334.984339
21
[23] Pesonen LIW, Eyers DM, Bacon J (2006) A capability-based access control architecture for
multi-domain publish/subscribe systems. IEEE, pp 7 pp. – 228
[24] Salonikias S, Mavridis I, Gritzalis D (2016) Access Control Issues in Utilizing Fog
Computing for Transport Infrastructure. In: Rome E, Theocharidou M, Wolthusen S (eds)
Critical Information Infrastructures Security. Springer International Publishing, Cham, pp
15–26
[25] Serpanos D, Wolf M (2018) Internet-of-Things (IoT) Systems. Springer International
Publishing, Cham
[26] Welbourne E, Battle L, Cole G, et al (2009) Building the Internet of Things Using RFID:
The RFID Ecosystem Experience. IEEE Internet Computing 13:48–55. doi:
10.1109/MIC.2009.52
[27] Wilkes MV, Needham RM (1979) The Cambridge CAP Computer and Its Operating
System. Elsevier
[28] X.812 : Information technology - Open Systems Interconnection - Security frameworks for
open systems: Access control framework. https://www.itu.int/rec/T-REC-X.812/en.
Accessed 1 Jun 2018
[29] Y.2060 : Overview of the Internet of things. https://www.itu.int/rec/T-REC-Y.2060-201206-
I. Accessed 1 Jun 2018
[30] Zhang X, Nakae M, Covington MJ, Sandhu R (2008) Toward a Usage-Based Security
Framework for Collaborative Computing Systems. ACM Transactions on Information and
System Security 11:1–36. doi: 10.1145/1330295.1330298