Cross-Domain Access Control Model in Industrial IoT Environment
Round 1
Reviewer 1 Report
1- The abstract and conclusion sections should include numerical values to support the findings, rather than relying on relative values. The research question is not clearly defined and needs to be described more clearly to be understood.
2- The paper should provide a clear and detailed explanation of the proposed decentralized cross-domain access model, including the master-slave chain structure and the reputation-based node selection mechanism.
3-The paper should provide a thorough evaluation of the proposed model's performance and scalability, including testing under various conditions and the comparison with existing access control models.
4- The paper should provide a clear explanation of how the proposed model addresses the security and privacy concerns in IIoT scenarios, such as protection against unauthorized access and data breaches.
5- The paper should provide a clear explanation of the strategy grouping retrieval method and how it improves access control efficiency in the proposed model.
6- The paper should clearly state the limitations of the proposed model and suggest potential avenues for future research, such as incorporating machine learning techniques for improved access control.
7- The manuscript does not have enough citations. Discuss a few sentences on the paper's topic and recent challenges using the 2 essential references below.
https://ieeexplore.ieee.org/abstract/document/9932414https://www.mdpi.com/2076-3417/13/4/2156
Author Response
Dear editors/reviewers:
Thank you for your comments and suggestions on our manuscript. These comments are very helpful in revising and improving our paper. We have carefully studied the comments and made some changes based on the reviewers' comments. The results of the revisions are responded to one by one in a word document. We hope our responses are sufficient to make us suitable for publication.
Kind regards.
Zhen Zhang
Author Response File: Author Response.docx
Reviewer 2 Report
Please find the comments below,
1. A table of the used abbreviations can be added.
2. Authors can elaborate more explanations on all the equations in the manuscript.
3. Regenerate the results figure for more readability.
4. A few typos here and there can be fixed.
5. The research gap has not clearly been identified and the need for this study has not been justified well.
6. The manuscript lacks a comprehensive literature review.
Authors need to be address the comments in the manuscript, thereafter paper may consider the publication.
Author Response
Dear editors/reviewers:
Thank you for your comments and suggestions on our manuscript. These comments are very helpful in revising and improving our paper. We have carefully studied the comments and made some changes based on the reviewers' comments. The results of the revisions are responded to one by one in a word document. We hope our responses are sufficient to make us suitable for publication.
Kind regards.
Zhen Zhang
Author Response File: Author Response.docx
Reviewer 3 Report
1The article provides a comprehensive overview of the challenges and opportunities associated with IIoT and emphasizes the importance of access control in enabling secure and reliable cross-domain communication and resource sharing.
The proposed decentralized cross-domain access model based on a master-slave chain and reputation-based node selection mechanism is an innovative solution that could address the scalability and data management limitations of existing blockchain-based methods.
However, to further enhance the article's contribution to the field, additional elaboration and clarification could be beneficial. For instance, the article could provide more specific examples or details on the limitations of traditional centralized access control schemes to better contextualize the proposed solution.
Additionally, more information could be included on the specific performance metrics used to evaluate the proposed scheme and how it compares to existing methods in terms of efficiency, security, and scalability.
Furthermore, it would be valuable to discuss potential limitations and challenges related to implementing a decentralized access control model based on a master-slave chain in a real-world IIoT environment. This could include exploring issues related to network latency, system interoperability, and the management of multiple master-slave chains in a multi-domain IIoT scenario.
In addition, it may be worthwhile to consider relevant research, such as the paper "Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism" by Wu et al. (2014), which could provide useful insights into reputation-based node selection mechanisms.
Author Response
Dear editors/reviewers:
Thank you for your comments and suggestions on our manuscript. These comments are very helpful in revising and improving our paper. We have carefully studied the comments and made some changes based on the reviewers' comments. The results of the revisions are responded to one by one in a word document. We hope our responses are sufficient to make us suitable for publication.
Kind regards.
Zhen Zhang
Author Response File: Author Response.docx
Round 2
Reviewer 1 Report
It can be accepted.