{"id":"https://openalex.org/W3160259821","doi":"https://doi.org/10.1109/tii.2021.3078183","title":"A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT","display_name":"A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT","publication_year":2021,"publication_date":"2021-05-08","ids":{"openalex":"https://openalex.org/W3160259821","doi":"https://doi.org/10.1109/tii.2021.3078183","mag":"3160259821"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3078183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3078183","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102009762","display_name":"Yuming Feng","orcid":"https://orcid.org/0000-0001-8922-0496"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuming Feng","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085221201","display_name":"Weizhe Zhang","orcid":"https://orcid.org/0000-0003-4783-876X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhe Zhang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100392843","display_name":"Bin Zhang","orcid":"https://orcid.org/0000-0002-4879-0211"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Zhang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102009762"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":11.3826,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.98412803,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"18","issue":"4","first_page":"2840","last_page":"2848"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7572855353355408},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6324978470802307},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5534699559211731},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5225493311882019},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.44782769680023193},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4203479290008545},{"id":"https://openalex.org/keywords/control-channel","display_name":"Control channel","score":0.41617968678474426},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36428582668304443},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.36253535747528076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3349524140357971}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7572855353355408},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6324978470802307},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5534699559211731},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5225493311882019},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.44782769680023193},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4203479290008545},{"id":"https://openalex.org/C157607044","wikidata":"https://www.wikidata.org/wiki/Q5165851","display_name":"Control channel","level":3,"score":0.41617968678474426},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36428582668304443},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.36253535747528076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3349524140357971},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2021.3078183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3078183","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G1053123284","display_name":null,"funder_award_id":"61672186","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5594798832","display_name":null,"funder_award_id":"61872110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1022403279","https://openalex.org/W2030370258","https://openalex.org/W2156580773","https://openalex.org/W2588585573","https://openalex.org/W2620085947","https://openalex.org/W2788822833","https://openalex.org/W2790895976","https://openalex.org/W2792152774","https://openalex.org/W2793346081","https://openalex.org/W2890591751","https://openalex.org/W2921608598","https://openalex.org/W2923615625","https://openalex.org/W2953207480","https://openalex.org/W2960610835","https://openalex.org/W2973985832","https://openalex.org/W2979680647","https://openalex.org/W2980182496","https://openalex.org/W2983008824","https://openalex.org/W2999301152","https://openalex.org/W3000114155","https://openalex.org/W3000548332","https://openalex.org/W3005380019","https://openalex.org/W3009988793","https://openalex.org/W3100944058","https://openalex.org/W6682904396"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W4285042611","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W2145120192"],"abstract_inverted_index":{"5G-enabled":[0,60],"Industrial":[1],"Internet":[2],"of":[3,70,104,111,134,233],"Things":[4],"(IIoT)":[5],"deployment":[6],"will":[7],"bring":[8],"more":[9],"severe":[10],"security":[11,31,230],"and":[12,42,84,91,108,129,156,178,209,221,231],"privacy":[13],"challenges,":[14],"which":[15,146],"puts":[16],"forward":[17],"higher":[18],"requirements":[19],"for":[20,59,72],"access":[21,24,56,80,105,235],"control.":[22],"Blockchain-based":[23],"control":[25,57,81,106,236],"method":[26],"has":[27],"become":[28],"a":[29,54,140,175],"promising":[30],"technology,":[32],"but":[33],"it":[34,180],"still":[35],"faces":[36],"high":[37],"latency":[38],"in":[39,48,165],"consensus":[40,144,158,202],"process":[41],"weak":[43],"adaptability":[44],"to":[45,100,121,153,212],"dynamic":[46],"changes":[47],"network":[49],"environment.":[50],"This":[51],"article":[52],"proposes":[53],"novel":[55],"framework":[58,74,173,183,198],"IIoT":[61,127,135],"based":[62,159,184],"on":[63,95,116,160,174,185],"consortium":[64],"blockchain.":[65],"We":[66],"design":[67,139,226],"three":[68],"types":[69],"chaincodes":[71],"the":[73,96,102,109,131,149,166,171,182,229,234],"named":[75],"policy":[76],"management":[77,103],"chaincode":[78,82,87],"(PMC),":[79],"(ACC),":[83],"credit":[85,132],"evaluation":[86],"(CEC).":[88],"The":[89,113,191],"PMC":[90],"ACC":[92],"are":[93],"deployed":[94,115],"same":[97],"data":[98],"channel":[99,118],"implement":[101,170],"policies":[107],"authorization":[110],"access.":[112],"CEC":[114],"another":[117],"is":[119],"used":[120],"add":[122],"behavior":[123,162],"records":[124,163],"collected":[125],"from":[126],"devices":[128],"calculate":[130],"value":[133],"domain.":[136],"Specifically,":[137],"we":[138,169],"two-step":[141],"credit-based":[142],"Raft":[143],"mechanism,":[145],"can":[147,199],"select":[148],"orderer":[150],"nodes":[151],"dynamically":[152],"achieve":[154],"fast":[155],"reliable":[157],"historical":[161],"stored":[164],"ledger.":[167],"Furthermore,":[168],"proposed":[172,197],"real-world":[176],"testbed":[177],"compare":[179],"with":[181,205,216],"practical":[186],"Byzantine":[187],"fault":[188],"tolerance":[189],"consensus.":[190],"experiment":[192],"results":[193],"show":[194],"that":[195],"our":[196,225],"maintain":[200],"lower":[201,217],"cost":[203],"time":[204],"100":[206],"ms":[207],"level":[208],"achieves":[210],"four":[211],"five":[213],"times":[214],"throughput":[215],"hardware":[218],"resource":[219],"consumption":[220],"communication":[222],"consumption.":[223],"Besides,":[224],"also":[227],"improves":[228],"robustness":[232],"process.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
