A trust-evaluation-enhanced blockchain-secured industrial iot system

Research output: Contribution to journalArticlepeer-review

26 Scopus citations


The Industrial Internet of Things (IIoT), allowing direct wireless communications between industrial machines and people, is the key component of Industry 4.0. By grouping several IIoT devices (IIoT-Ds) into IIoT groups (IIoT-Gs), the IIoT-Ds within one group can share information and deter malicious users from accessing the network by modifying the access control list (ACL) in IIoT-Ds. In an IIoT-G, several IIoT-Ds jointly manage the access control of IIoT sensors. The security of ACL is protected by blockchains deployed in IIoT-Ds. Even secured by blockchains, a blockchain-based IIoT-G (B-IIoT-G) still cannot secure correct access control in a system with more than half of the blockchain-based IIoT-Ds (B-IIoT-Ds) from spreading wrong authorization information. In this article, we propose a B-IIoT-G with trust evaluation for each B-IIoT-D to evaluate the weight in voting for final decisions of authorization. By designing a new voting mechanism with trust evaluation for the access control in B-IIoT-G, the system has a higher probability of making correct authorization even with malicious B-IIoT-Ds. Simulation results have demonstrated that the mechanism with trust evaluation can still make, with a high probability, correct authorization even with more than half of the B-IIoT-Ds in B-IIoT-G being malicious.

Original languageEnglish (US)
Article number9222063
Pages (from-to)5510-5517
Number of pages8
JournalIEEE Internet of Things Journal
Issue number7
StatePublished - Apr 1 2021

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications


  • Access control
  • Industrial Internet of Things (IoT)
  • blockchain
  • trust evaluation
  • voting mechanism


Dive into the research topics of 'A trust-evaluation-enhanced blockchain-secured industrial iot system'. Together they form a unique fingerprint.

Cite this