intervals [t1..t2] and [t4..t5]. Based on the RbE ap-
proach, whenever m1 changes value, en publishes an
NDATA message that includes m1. During the inter-
val [t1..t2], authorized views of these NDATA mes-
sages, including m1, must be sent to sa. Suppose now
that en updates m1 at time t3 immediately after t2 but
before t4. Based on the above-mentioned policy, sa
cannot see the update at t3. However, the access is
newly allowed at t4. Therefore, at t4, sa should be
made aware of the value of m1 published by en at t3,
as it is the most recent one. An open issue is, there-
fore, to find an efficient approach to communicate the
last m1 value. One possible solution could be forc-
ing en to generate an NBIRTH message that includes
m1, with a forged NCMD message requesting the en
rebirth. However, the exemplified scenario refers to a
single case of interaction, but additional cases could
be identified. A thorough analysis is therefore needed,
as well as the study of the related enforcement mech-
anisms.
Another challenge is related to policy specifica-
tion. The enforcement of access control at the metric
level could cause significant growth of the policy set
size. However, it could be reasonable to assume that
within a message payload, the sensitive metrics that
require dedicated access control policies could be a
minority. Approaches to minimizing the policy num-
ber and easing policy administration must be investi-
gated. A viable strategy could be using a policy model
that protects classes of messages satisfying a topic fil-
ter with an exception list that specifies the metrics to
be removed. For instance, referring to the previous
example, one could specify a policy p1 that matches
any NBIRTH and NDATA message published by en,
with an exception list that includes m1 and a condi-
tion specifying the time interval (t2..t4) and a policy
p2 with the same topic filter, an empty exception list,
and a condition always true.
Many policies could be specified for primary and
secondary applications that could subscribe to receiv-
ing data from any edge node and device in a Spark-
plug system. A key requirement is that the access
control policies that apply to an access request are
identified with minimal delay. For instance, policy re-
trieval could benefit from efficient in-memory NoSQL
databases like Redis (https://redis.io), which ensures
the execution of lookup-by-key operations with sub-
millisecond latency. However, data modeling strate-
gies for access control policies and indexing strategies
for such databases should be studied to minimize the
selection time of access control policies applicable to
an access request.
The efficiency of policy evaluation could depend
on the language employed to specify AC conditions.
It could be possible to rely on platforms like GraalVM
(https://www.graalvm.org), which allow code execu-
tion in multiple programming languages with high
performance. However, an empirical evaluation is
needed to assess the performance and to see whether
such a solution is oversized.
Finally, the enforcement monitor could ei-
ther be developed as an independent component
operating as a proxy of the MQTT server or
integrated into the MQTT server itself, exploit-
ing the leading brokers’ extensions mechanism,
like those of HiveMQ (https://www.hivemq.com),
EMQX (https://www.emqx.com) or Mosquitto
(https://mosquitto.org). Both approaches should be
studied by assessing aspects of performance and
scalability.
5 CONCLUSIONS
Despite the vast literature on access control for the
IoT domain, up to now no access control framework
has targeted Sparkplug systems.
In this paper, we take a step to fill this void, pre-
senting key requirements for integrating fine-grained
access control in Sparkplug-based IIoT systems and
discussing research issues to be addressed to build an
effective access control framework for this use case.
ACKNOWLEDGEMENTS
This work was supported in part by project SER-
ICS (PE00000014) under the NRRP MUR program
funded by the EU-NGEU.
REFERENCES
Ahmed, S. F., Alam, M. S. B., Hoque, M., Lameesa, A.,
Afrin, S., Farah, T., Kabir, M., Shafiullah, G. M., and
Muyeen, S. M. (2023). Industrial Internet of Things
enabled technologies, challenges, and future direc-
tions. Computers and Electrical Engineering, 110.
Boyes, H., Hallaq, B., Cunningham, J., and Watson, T.
(2018). The industrial internet of things (IIoT): An
analysis framework. Computers in Industry, 101.
Colombo, P., Ferrari, E., and T
¨
umer, E. D. (2021). Regulat-
ing data sharing across MQTT environments. Journal
of Network and Computer Applications, 174.
Gouglidis, A. and Mavridis, I. (2012). DomRBAC: An ac-
cess control model for modern collaborative systems.
Computers and Security, 31(4).
Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., and Li, K. C.
(2022). A Blockchain-Based Auditable Access Con-
Access Control Integration in Sparkplug-Based Industrial Internet of Things Systems: Requirements and Open Challenges
383