DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet

Tao Huang , Renchao Xie , Yuzheng Ren , F. Richard Yu , Zhuang Zou , Lu Han , Yunjie Liu , Demin Cheng , Yinan Li , Tian Liu

›› 2024, Vol. 10 ›› Issue (4) : 853 -862.

PDF
›› 2024, Vol. 10 ›› Issue (4) :853 -862. DOI: 10.1016/j.dcan.2023.06.006
Research article
research-article

DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet

Author information +
History +
PDF

Abstract

In recent years, the Industrial Internet and Industry 4.0 came into being. With the development of modern industrial intelligent manufacturing technology, digital twins, Web3 and many other digital entity applications are also proposed. These applications apply architectures such as distributed learning, resource sharing, and arithmetic trading, which make high demands on identity authentication, asset authentication, resource addressing, and service location. Therefore, an efficient, secure, and trustworthy Industrial Internet identity resolution system is needed. However, most of the traditional identity resolution systems follow DNS architecture or tree structure, which has the risk of a single point of failure and DDoS attack. And they cannot guarantee the security and privacy of digital identity, personal assets, and device information. So we consider a decentralized approach for identity management, identity authentication, and asset verification. In this paper, we propose a distributed trusted active identity resolution system based on the inter-planetary file system (IPFS) and non-fungible token (NFT), which can provide distributed identity resolution services. And we have designed the system architecture, identity service process, load balancing strategy and smart contract service. In addition, we use Jmeter to verify the performance of the system, and the results show that the system has good high concurrent performance and robustness.

Keywords

Industrial Internet / NFT / IPFS / Trust / Identity resolution system

Cite this article

Download citation ▾
Tao Huang, Renchao Xie, Yuzheng Ren, F. Richard Yu, Zhuang Zou, Lu Han, Yunjie Liu, Demin Cheng, Yinan Li, Tian Liu. DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet. , 2024, 10(4): 853-862 DOI:10.1016/j.dcan.2023.06.006

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

G. Atharvan, S. Koolikkara Madom Krishnamoorthy, A. Dua, S. Gupta,A way for-ward towards a technology-driven development of Industry 4.0 using big data ana-lytics in 5g-enabled IIoT, Int. J. Commun. Syst. 35 (1) (2022) e5014.

[2]

W. Li, H. Zhu, Overview of Industrial Internet technology development and evolu-tion, in: Proc. IEEE International Conference on Electronics Information and Emer-gency Communication (ICEIEC), 2021, pp. 1-4.

[3]

J. Astorga, M. Barcelo, A. Urbieta, E. Jacob,How to survive identity management in the Industry 4.0 era, IEEE Access 9 (2021) 93137-93151.

[4]

E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, Industrial Internet of Things: challenges, opportunities, and directions, IEEE Trans. Ind. Inform. 14 (11)(2018) 4724-4734.

[5]

M. Liu, S. Fang, H. Dong, C. Xu, Review of digital twin about concepts, technologies, and industrial applications, J. Manuf. Syst. 58 (2021) 346-361.

[6]

S. Voshmgir, Token Economy: How the Web3 Reinvents the Internet, vol. 2, Token Kitchen, 2020.

[7]

H. Carter-Templeton, J. Wrigley, J.K. Owens, M.H. Oermann, Digital object identi-fier: the DOI, Nurse Author Ed. 31 (3-4) (2021) 58-61.

[8]

M. Mealling, A URN namespace of object identifiers, Tech. rep., 2001.

[9]

R. Chandrakar, Digital object identifier system: an overview, Electron. Libr. (2006).

[10]

D.L. Brock, The electronic product code (EPC), Auto-ID Center White Paper MIT-AUTOID-WH-002, 2001, pp. 1-21.

[11]

O. Sobrinho, C.E. Cugnasca, An overview of the EPCglobal network, IEEE Lat. Am. Trans. 11 (4) (2013) 1053-1059.

[12]

M. Mealling, Auto-ID object name service (ONS) 1.0, Auto-ID Center Working Draft 12, 2003.

[13]

Z.H. Siyuan Liu, Shaoyong Guo, X. Xu, Domain name service mechanism based on master-slave chain, Intell. Autom. Soft Comput. 32 (2) (2022) 951-962.

[14]

G. Schmid, Thirty years of DNS insecurity: current issues and perspectives, IEEE Commun. Surv. Tutor. 23 (4) (2021) 2429-2459.

[15]

M.A. Aslam, H. Irfan, M.F. Arshad, S.A.W. Gillani, A study to distribute the data of blockchain in a DHT-based system for DNS, in: Proc. International Conference on Open Source Systems and Technologies (ICOSST), 2021, pp. 1-6.

[16]

Information technology-open systems interconnection-part 1: Object identifier resolution system, https://www.iso.org/standard/45247.html, 2011.

[17]

F. Thiesse, F. Michahelles, An overview of EPC technology, Sens. Rev. 26 (2) (2006) 101-105.

[18]

S. Sun, L. Lannom, B. Boesch, Handle system overview, Tech. rep., 2003.

[19]

Y. Wang, Y. Kong, P. Fan, Research on trusted traceability with Block Chain and Handle System Network, in: Proc. International Conference on Information Science, Parallel and Distributed Systems (ISPDS), IEEE, 2021, pp. 125-130.

[20]

C. Sharp, Overview of the Digital Object Architecture (DOA), An Internet Society Information Paper, Internet Society, 2016.

[21]

V. Iancu, N. Ţăpuş, Towards a highly available model for processing service requests based on distributed hash tables, Mathematics 10 (5) (2022) 831.

[22]

M. Alizadeh, K. Andersson, O. Schelén, DHT and blockchain-based smart identifica-tion for video conferencing, Blockchain, Res. Appl. 3(2) (2022) 100066.

[23]

S. Nakamoto, A. Bitcoin, A peer-to-peer electronic cash system, Bitcoin 4 (2008) 2.

[24]

Y. Hassanzadeh-Nazarabadi, A. Küpçü, Ö. Özkasap, Lightchain: scalable DHT-based blockchain, IEEE Trans. Parallel Distrib. Syst. 32 (10) (2021) 2582-2593.

[25]

O. Jacobovitz, Blockchain for identity management, The Lynne and William Frankel Center for Computer Science Department of Computer Science, Ben-Gurion Univer-sity, Beer Sheva 1, 2016, 9.

[26]

Y. Liu, D. He, M.S. Obaidat, N. Kumar, M.K. Khan, K.-K.R. Choo, Blockchain-based identity management systems: a review, J. Netw. Comput. Appl. 166 (2020) 102731.

[27]

P. Hunt, M. Konar, Y. Grid, F.P. Junqueira, B. Reed, Zookeeper: Wait-Free Coordi-nation for Internet-Scale Systems, 2010.

[28]

J. Benet, IPFS-content addressed, versioned, p2p file system, arXiv preprint, arXiv: 1407.3561.

[29]

Q. Wang, R. Li, Q. Wang, S. Chen, Non-fungible token (NFT): overview, evaluation, opportunities and challenges, arXiv preprint, arXiv : 2105.07447.

[30]

X. Xu, G. Sun, L. Luo, H. Cao, H. Yu, A.V. Vasilakos, Latency performance modeling and analysis for hyperledger fabric blockchain network, Inf. Process. Manag. 58 (1)(2021) 102436.

[31]

R. Abbas, Z. Sultan, S.N. Bhatti, Comparative analysis of automated load testing tools: apache jmeter, microsoft visual studio (TFS), loadrunner, siege,in:Proc. International Conference on Communication Technologies (comtech), IEEE, 2017, pp. 39-44.

[32]

M. Ali, J. Nelson, R. Shea, M.J. Freedman, Blockstack: a global naming and storage system secured by blockchains,in:Proc. USENIX Annual Technical Conf. (USENIX ATC 16), 2016, pp. 181-194.

[33]

M. Ali, R. Shea, J. Nelson, M.J. Freedman, Blockstack technical whitepaper, Block-stack PBC, October 12, 2017.

[34]

Blockstack token whitepaper [Online]. Available: https://www.sec.gov/Archives/edgar/data/1719379/000110465919020748/a18-15736_1ex1a15addexhbd2.htm.

[35]

D. Reed, M. Sporny, D. Longley, C. Allen, R. Grant, M. Sabadello,Decentralized identifiers (DIDs) v1.0 core architecture, data model, and representations [Online]. https://w3c.github.io/did-core/.

[36]

R. Huo, S. Zeng, Y. Di, X. Cheng, T. Huang, F.R. Yu, Y. Liu, A blockchain-enabled trusted identifier co-governance architecture for the Industrial Internet of Things, IEEE Commun. Mag. 60 (6) (2022) 66-72.

[37]

H.-C. Chen, B. Irawan, P.-Y. Hsu, J.-S. Su, C.-W.J. Lin Prayitno, K.T. Putra, C. Damarjati, C.-E. Weng, Y.-H. Liang, P.-H. Chang, An implementation of trust chain framework with hierarchical content identifier mechanism by using blockchain tech-nology, Sensors 22 (13) (2022) 4831.

[38]

M. Wachs, M. Schanzenbach, C. Grothoff, A censorship-resistant, privacy-enhancing and fully decentralized name system, Proc. Int.Conf. Cryptol. Netw Security, 2014, pp. 127-142.

[39]

M. Schanzenbach, G. Bramm, J. Schütte, reclaimID: secure, self-sovereign identities using name systems and attribute-based encryption, in: Proc. IEEE Int. Conf. Trust Security Privacy Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. (Trust-Com/BigDataSE), 2018, pp. 946-957.

[40]

NSA’s MORECOWBELL: Knell for DNS [Online]. Available: http://goodtimesweb.org/surveillance/2015/MORECOWBELL-Analysis-Grothoff-etal.pdf.

AI Summary AI Mindmap
PDF

76

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/