{"id":"https://openalex.org/W4414647166","doi":"https://doi.org/10.1109/vtc2025-spring65109.2025.11174727","title":"Hyperledger Fabric-Based Decentralized Role-Based Access Control for Sustainable and Resilient Industrial IoT Networks","display_name":"Hyperledger Fabric-Based Decentralized Role-Based Access Control for Sustainable and Resilient Industrial IoT Networks","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W4414647166","doi":"https://doi.org/10.1109/vtc2025-spring65109.2025.11174727"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2025-spring65109.2025.11174727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-spring65109.2025.11174727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119774931","display_name":"Omar Bait Shaweesh","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Omar Bait Shaweesh","raw_affiliation_strings":["Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119774932","display_name":"Omar Zalloum","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Omar Zalloum","raw_affiliation_strings":["Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119774933","display_name":"Yazan Al-Hadid","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yazan Al-Hadid","raw_affiliation_strings":["Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Department of Computer Engineering,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023971728","display_name":"Anastassia Gharib","orcid":"https://orcid.org/0000-0001-7202-9943"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Anastassia Gharib","raw_affiliation_strings":["Princess Sumaya University for Technology,Department of Communications Engineering,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Department of Communications Engineering,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5119774931"],"corresponding_institution_ids":["https://openalex.org/I158749337"],"apc_list":null,"apc_paid":null,"fwci":9.4274,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.97729125,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.6717000007629395},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6412000060081482},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.638700008392334},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5705000162124634},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.42640000581741333},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4187000095844269},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.36980000138282776},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.36340001225471497}],"concepts":[{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.6717000007629395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6614000201225281},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6412000060081482},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.638700008392334},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5705000162124634},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5393000245094299},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.42640000581741333},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4187000095844269},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.36980000138282776},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.36340001225471497},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.33340001106262207},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.32269999384880066},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.31290000677108765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.290800005197525},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.2587999999523163},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2025-spring65109.2025.11174727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-spring65109.2025.11174727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W3005933076","https://openalex.org/W3160259821","https://openalex.org/W3198890591","https://openalex.org/W4221000415","https://openalex.org/W4284890209","https://openalex.org/W4312947664","https://openalex.org/W4389506879","https://openalex.org/W4393307081","https://openalex.org/W4404103114","https://openalex.org/W4405844585","https://openalex.org/W4405907762"],"related_works":[],"abstract_inverted_index":{"The":[0,143],"Internet":[1],"of":[2,9,26,50,59,74,80,104,162,172],"Things":[3],"(IoT)":[4],"has":[5],"become":[6],"a":[7,56,124],"foundation":[8],"Industry":[10],"4.0":[11],"with":[12,61,87,94],"numerous":[13],"industrial":[14,35,42,75,118,141,178],"facilities":[15],"relying":[16],"on":[17,176],"smart":[18],"sensors":[19],"and":[20,52,92,116,156,164],"actuators":[21],"to":[22,108,137,152],"optimize":[23],"the":[24,48,65,71,102,105,170,177],"efficiency":[25],"processes.":[27],"Nevertheless,":[28],"as":[29],"IoT":[30,44,76,119,138,179],"networks":[31,45],"are":[32],"adopted":[33],"in":[34,140],"facilities,":[36],"several":[37],"security":[38,68],"concerns":[39],"arise.":[40],"In":[41,97],"settings,":[43],"often":[46],"involve":[47],"sharing":[49],"resources":[51],"sensitive":[53],"data":[54],"among":[55],"diverse":[57],"set":[58],"users":[60,86],"different":[62],"roles,":[63],"increasing":[64],"potential":[66,103],"for":[67,114,133],"breaches.":[69],"Given":[70],"critical":[72],"nature":[73],"networks,":[77],"it":[78],"is":[79],"high":[81],"importance":[82],"that":[83],"only":[84],"authorized":[85],"pre-defined":[88],"roles":[89],"can":[90],"access":[91,111,128,135,149],"interact":[93],"these":[95],"systems.":[96],"this":[98,110],"paper,":[99],"we":[100,122],"explore":[101],"blockchain":[106],"technology":[107],"address":[109],"control":[112,129,136,150],"challenge":[113],"sustainable":[115],"resilient":[117],"networks.":[120],"Specifically,":[121],"propose":[123],"Hyperledger":[125],"Fabric-based":[126],"role-based":[127,148],"(HF-RBAC)":[130],"framework":[131],"tailored":[132],"direct":[134],"devices":[139],"facilities.":[142],"proposed":[144],"HF-RBAC":[145],"solution":[146],"leverages":[147],"principles":[151],"safeguard":[153],"against":[154],"outsiders":[155],"unauthorized":[157],"insiders,":[158],"mitigates":[159],"single":[160],"points":[161],"failure":[163],"ensuring":[165],"continuous":[166],"operation":[167],"even":[168],"under":[169],"Denial":[171],"Service":[173],"(DoS)":[174],"attack":[175],"network":[180],"leader.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
