1,718 results on '"IIoT"'
Search Results
352. Transformative Maintenance Technologies and Business Solutions for the Railway Assets
- Author
-
Kumar, Uday, Galar, Diego, and Misra, Krishna B., editor
- Published
- 2021
- Full Text
- View/download PDF
353. Edge Computing for Industrial IoT: Challenges and Solutions
- Author
-
Harjula, Erkki, Artemenko, Alexander, Forsström, Stefan, Mahmood, Nurul Huda, editor, Marchenko, Nikolaj, editor, Gidlund, Mikael, editor, and Popovski, Petar, editor
- Published
- 2021
- Full Text
- View/download PDF
354. Research on deep reinforcement learning based intelligent shop scheduling method
- Author
-
Zihui LUO, Chengling JIANG, Liang LIU, Xiaolong ZHENG, and Huadong MA
- Subjects
IIoT ,intelligent shop scheduling ,flexible production ,deep reinforcement learning ,shop scheduling method ,Information technology ,T58.5-58.64 ,Management information systems ,T58.6-58.62 - Abstract
The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.
- Published
- 2022
- Full Text
- View/download PDF
355. Industrial Internet of Things: Requirements, Architecture, Challenges, and Future Research Directions
- Author
-
Montdher Alabadi, Adib Habbal, and Xian Wei
- Subjects
Industry 4.0 ,IIoT ,deep learning ,edge computing ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Industry 4.0 relates to the digital revolution of manufacturing and other sectors, such as retail, distribution, oil and gas, and infrastructure. Meanwhile, the Industrial Internet of Things (IIoT) is a technological advancement that leads to Industry 4.0 implementation by boosting the manufacturing sector’s productivity and economic impact. IIoT provides the ability to provide global connectivity between components in different locations. The manufacturing sector has had various difficulties implementing IIoT, primarily due to IIoT characteristics. This paper offers an in-depth review of Industry 4.0 and IIoT, where the primary motivation behind this is to introduce the most recent advancements related to Industry 4.0 and IIoT, as well as to address the existing limitations. Firstly, this paper presents a novel taxonomy of IIoT challenges that includes aspects of each challenge, such as the terminology and approaches utilized to solve these challenges. Besides IIoT challenges, this survey provides an in-depth demonstration of the many concepts related to IIoT, such as architecture and use cases. Secondly, this paper provides a comprehensive review of the state-of-the-art of Industry 4.0 in terms of concepts, requirements, and supporting technology. In addition, the correlation between enabling technology and technical requirements is discussed in detail. Finally, this paper highlights deep learning, edge computing, and big data as key techniques for the future directions of IIoT. Furthermore, the presented techniques are thoroughly examined to present an alternative method for future adoption. In addition to the showcased techniques, a new architecture for the future of IIoT based on these three primary techniques is also proposed.
- Published
- 2022
- Full Text
- View/download PDF
356. Interactive IIoT-Based 5DOF Robotic Arm for Upper Limb Telerehabilitation
- Author
-
Preet Parag Modi, Md. Samiul Haque Sunny, Md. Mahafuzur Rahaman Khan, Helal Uddin Ahmed, and Mohammad H. Rahman
- Subjects
Telerehabilitation ,upper limb ,end effector ,IIoT ,augmented reality ,teleoperation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Significant advancements in contemporary telemedicine applications enforce the demand for effective and intuitive telerehabilitation tools. Telerehabilitation can minimize the distance, travel burden, and costs between rehabilitative patients and therapists. This research introduces an interactive novel telerehabilitation system that integrates the Industrial Internet of Things (IIoT) platform with a robotic manipulator named xARm-5, aiming to deliver rehabilitation therapies to individuals with upper limb dysfunctions. With the proposed system, a therapist can provide upper limb rehab exercises remotely using an augmented reality (AR) user interface (UI) developed using Vuforia Studio, which transmits bidirectional data through the IIoT platform. The proposed system has a stable communication architecture and low teleoperation latency. Experimental results revealed that with the developed telerehabilitation framework, the xArm-5 could be teleoperated from the developed AR platform and/or use a joystick to provide standard upper limb rehab exercises. Besides, with the designed AR-based UI, a therapist can monitor rehab/robot trajectories along with the AR digital twin of the robot, ensuring that the robot is providing passive therapy for shoulder and elbow movements.
- Published
- 2022
- Full Text
- View/download PDF
357. Adoption of Blockchain With 5G Networks for Industrial IoT: Recent Advances, Challenges, and Potential Solutions
- Author
-
Manpreet Kaur, Mohammad Zubair Khan, Shikha Gupta, and Abdullah Alsaeedi
- Subjects
Blockchain ,IIoT ,Industry 4.0 ,IoT ,5G ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
It has been proven that Internet of Things (IoT) platforms can improve the performance and efficiency of a wide range of processes. With the acceptance of IoT as a major part of the technology of Industry 4.0, the notion of leveraging the Internet in industries to enable automation and reconfigure existing industrial processes has greatly evolved. By introducing smart technology and intelligent processes, the Industrial Internet of Things (IIoT) is committed to bringing high operational efficiency, enhanced productivity, and effective management to industrial assets. Despite this, the reliance of IIoT on central architecture presents numerous challenges, including the security and maintenance of smart devices, privacy issues owing to third-party participation, and massive computations conducted by a central entity, all of which prevent its widespread adoption in businesses. Emerging blockchain technologies have the potential to transform IIoT platforms and applications. A distributed and decentralized approach followed by blockchain might offer interesting solutions to the challenges raised by IIoT. Furthermore, 5G networks are expected to deliver excellent solutions to meet the demands of decentralized systems, with a focus on application-specific vulnerabilities. Blockchain and IIoT, enabled by 5G, is a viable option to fully explore the potential of contemporary industry. In this context, this article analyzes and examines recent achievements to highlight the major obstacles in blockchain–IIoT convergence and presents a framework for potential solutions. A well-organized literature review by analyzing the existing work in three primary areas: blockchain consensus algorithms used in existing IoT and IIoT applications, blockchain for 5G-enabled IoT networks, and blockchain in industry have been performed, with major findings summarized in each area. Directions for the future are also provided and intend to assist researchers in understanding the full potential of these innovations.
- Published
- 2022
- Full Text
- View/download PDF
358. Toward Reference Architectures: A Cloud-Agnostic Data Analytics Platform Empowering Autonomous Systems
- Author
-
Attila Csaba Marosi, Mark Emodi, Attila Farkas, Robert Lovas, Richard Beregi, Gianfranco Pedone, Balazs Nemeth, and Peter Gaspar
- Subjects
Reference architecture ,blueprint ,data analytics ,autonomous systems ,IoT ,IIoT ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This work introduces a scalable, cloud-agnostic and fault-tolerant data analytics platform for state-of-the-art autonomous systems that is built from open-source, reusable building blocks. As the baseline for further new reference architectures, it represents an architecture blueprint for processing, enriching and analyzing various feeds of structured and non-structured input data from advanced Internet-of-Things (IoT) based use cases. The platform builds on industry best practices, leverages on solid open-source components in a reusable fashion, and is based on our experience gathered from numerous IoT and Big Data research projects. The platform is currently used in the framework of the National Laboratory for Autonomous Systems in Hungary (abbreviated as ARNL). The platform is demonstrated through selected use cases from ARNL including the areas of smart/autonomous production systems (collaborative robotic assembly) and autonomous vehicles (mobile robots with smart vehicle control). Finally, we validate the platform through the evaluation of its streaming ingestion capabilities.
- Published
- 2022
- Full Text
- View/download PDF
359. ОГЛЯД РІШЕНЬ З АПАРАТНОЇ БЕЗПЕКИ КІНЦЕВИХ ПРИСТРОЇВ ТУМАННИХ ОБЧИСЛЕНЬ У ІНТЕРНЕТІ РЕЧЕЙ
- Author
-
Oleh Zhurylo, Oleksii Liashenko, and Karyna Avetisova
- Subjects
хмара ,туманні обчислення ,апаратна безпека ,IoT ,IIoT ,конфіденційність ,захист ,апаратний модуль безпеки ,фізичні неклоновані функції ,Engineering economy ,TA177.4-185 - Abstract
Предметом дослідження є можливі засоби підвищення апаратної безпеки кінцевих пристроїв туманних обчислень в мережах Інтернету речей (ІоТ), популярність якого щороку стрімко зростає та потребує високого рівня захищеності від усіх типів атак. Метою роботи є огляд доступних готових комерційних продуктів та/або концептуальних апаратних рішень для захисту бюджетних пристроїв у мережах Інтернету речей на основі туманних технологій. Для досягнення поставленої мети виконано такі завдання: запропоновано концепцію туманних обчислень та визначено переваги, які вона надає мережам IoT; розглянуто кіберзагрози та апаратні атаки на мережі ІоТ; описано наслідки використання мереж Інтернету речей на основі туманних обчислень; розглянуто апаратні засоби безпеки, такі як TRM, PUF, HSM тощо. Для вирішення завдань використано такі методи дослідження, як: теоретичний аналіз літературних джерел; порівняльний аналіз хмарних, туманних і мобільних обчислень; аналіз наявних апаратних засобів безпеки. Здобуто такі результати: туманні обчислення можна розглядати як шлюз між хмарними обчисленнями та Інтернетом речей; вони мають більшість із переваг хмарних обчислень, крім того, додатково дають змогу обробляти дані на кінцевих пристроях, не навантажуючи центральний сервер. Висновки: безпека апаратного забезпечення в системах Інтернету речей не менш важлива, ніж програмна безпека. Особливо вагомо це питання постає для систем на основі туманних обчислень, де дані оброблятимуться на периферії, без передачі в хмару. Для підвищення рівня апаратної безпеки пристроїв туманних обчислень пропонується використовувати стандартні апаратні платформи безпеки, такі як: фізично неклоновані функції, апаратний модуль безпеки, система на кристалі тощо. Апаратні компоненти системи, що застосовують туманні обчислення, менш схильні до кібератак, зломів, вторгнень чи маніпуляцій.
- Published
- 2023
- Full Text
- View/download PDF
360. Sensors and machine learning and AI operation-constrained process control method for sensor-aided industrial internet of things and smart factories
- Author
-
S. Muruganandam, Anas A. Salameh, Mohd Affendi Ahmad Pozin, S.V. Manikanthan, and T. Padmapriya
- Subjects
Federated learning ,IIoT ,Multi-sensor ,Process control ,AI ,Electric apparatus and materials. Electric circuits. Electric networks ,TK452-454.4 - Abstract
The Industrial Internet of Things (IIoT) incorporates intelligent computing and artificial intelligence paradigms in smart factories for ease of production and human-less interventions. The controlling unit is integrated into the smart operations in managing, controlling, and monitoring industrial operations. This article introduces an Operation-Constrained Process Control (OCPC) for preventing time-lag errors between smart machine operation cycles. The proposed method considers the operational cycles, completion time, and output efficiency metrics for identifying time lags and errors in production. Depending on the maximum productivity-based outcomes, further allocations or modifications in the regular operational cycles are identified. The productivity is analyzed based on the previous outcomes using federated learning. This learning implies multi-sensor knowledge update and production efficiency through repeated training. Therefore, the errors in cycle assignment and production completion are synchronized under controlled error. This method is analyzed using time lag, error, production efficiency, and training instances.
- Published
- 2023
- Full Text
- View/download PDF
361. A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
- Author
-
Hakan Can Altunay and Zafer Albayrak
- Subjects
Intrusion detection system ,Convolutional neural network ,Internet of Things ,IIoT ,Long short term memory ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The Internet of Things (IoT) ecosystem has proliferated based on the use of the internet and cloud-based technologies in the industrial area. IoT technology used in the industry has become a large-scale network based on the increasing amount of data and number of devices. Industrial IoT (IIoT) networks are intrinsically unprotected against cyber threats and intrusions. It is, therefore, significant to develop Intrusion Detection Systems (IDS) in order to ensure the security of the IIoT networks. Three different models were proposed to detect intrusions in the IIoT network by using deep learning architectures of Convolutional Neural Network (CNN), Long Short Term Memory (LSTM), and CNN + LSTM generated from a hybrid combination of these. In the study conducted by using the UNSW-NB15 and X-IIoTID datasets, normal and abnormal data were determined and compared with other studies in the literature following a binary and multi-class classification. The hybrid CNN + LSTM model attained the highest accuracy value for intrusion detection in both datasets among the proposed models. The proposed CNN + LSTM architecture attained an accuracy of 93.21% for binary classification and 92.9% for multi-class classification in the UNSW-NB15 dataset while the same model attained a detection accuracy of 99.84% for binary classification and 99.80% for multi-class classification in the X-IIoTID dataset. In addition, the accurate detection success of the implemented models regarding the types of attacks within the datasets was evaluated.
- Published
- 2023
- Full Text
- View/download PDF
362. Asenkron Motorlar İçin Endüstriyel Nesnelerin İnterneti Tabanlı Sensör Kartı Uygulaması.
- Author
-
MAMUR, Hayati, İZ, Atanur, ŞİMŞEK, Haydar, and ÇIRA, Ferhat
- Subjects
- *
INTERNET of things , *MICROCONTROLLERS , *WIRELESS Internet , *INDUCTION motors , *DETECTORS , *DECISION making - Abstract
In this study, an industrial internet of things (IIoT) based sensor card system has been developed to predict the failures that may occur in induction motors (IMs), which is widely used in the industry and therefore it is important to take predictive maintenance measures. The realized system has been tested on a 3-phase IM with 250 kW power and 315L body structure. The conditions of this IM were detected by the sensors in the embedded system and transferred to a cloud network with the embedded system. The ESP-WROOM-32 microcontroller, which includes Wi-Fi and Bluetooth communication protocols in the sensor card application, is mounted on a LIS3DH accelerometer that detects frequency-dependent vibration data in three axes and NTC IM at 10 KQ for temperature data. By evaluating these sensor data, predictive maintenance determinations that may occur in the IM were made and predictive maintenance decisions were made for the IM to send warnings to the users with these detections. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
363. An approach for designing smart manufacturing for the research and development of dye-sensitize solar cell.
- Author
-
Alonso-Perez, Jorge L., Cardenas-Maciel, Selene L., Trujillo-Navarrete, Balter, Reynoso-Soto, Edgar A., and Cazarez-Cazarez, Nohe R.
- Subjects
SOLAR cells ,PHOTOVOLTAIC power systems ,DYE-sensitized solar cells ,RESEARCH & development ,TECHNOLOGICAL innovations ,MANUFACTURING processes - Abstract
The research and development (R&D) of the scale-up process of third-generation photovoltaics (PVs) can benefit from the emerging trends and technologies related to the Industrial Internet of Things. However, to migrate the small-scale laboratory PVs products to a larger version of the industrial scale, a processing platform is needed to design, fabricate, and test the production line. In this paper, after a brief introduction of the production process of thin-film PVs, specifically dye-sensitized solar cells, the Industrial Internet Reference Architecture (IIRA) has been applied to the R&D scenario for the production of thin-film PVs, in order to synchronize and manage the large amount of data generated by the real, virtual or hybrid production devices and processes. The results of this study suggest that the future implementation of IIRA is a reliable option in a learning factory environment for multidisciplinary collaboration, research training in novel technologies and methods in the Tijuana Institute of Technology. This contribution is in order to optimize and scale-up the production process of a new generation of solar cells. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
364. NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things.
- Author
-
Yinghua Zhang, Rui Cao, Lixin Tian, Rong Dai, Zhennan Cao, and Jim Feng
- Subjects
INTERNET of things ,COGNITIVE radio ,RADIO technology ,WIRELESS channels ,DATA transmission systems ,FACTORY design & construction ,MACHINE-to-machine communications ,5G networks - Abstract
With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-OrthogonalMultiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As there are a large number of production lines that need to be monitored in smart factories, it is difficult to realize real-time monitoring of all production lines due to insufficient wireless resources. Therefore, we divide the production lines into high priority and low priority, and introduce cognitive radio technology to increase the number of monitoring production lines. In order to better describe the wireless fading channel environment in the factory, the two-wave with diffuse power (TWDP) channel is discussed to simulate the real factory environment and the outage probability of the secondary production line data transmission is derived in the proposed mechanism. Compared with the traditional mechanism, the proposed transmission mechanism can ensure the continuity of the secondary transmission, greatly reduce the outage probability of the secondary transmission, and improve the efficiency of the monitoring of the production lines. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
365. FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries.
- Author
-
Verma, Priyanka, Breslin, John G., and O'Shea, Donna
- Subjects
- *
INTRUSION detection systems (Computer security) , *DEEP learning , *MANUFACTURING industries , *LONG-term memory , *CYBERTERRORISM , *CONVOLUTIONAL neural networks , *INDUSTRY 4.0 - Abstract
The rapid development in manufacturing industries due to the introduction of IIoT devices has led to the emergence of Industry 4.0 which results in an industry with intelligence, increased efficiency and reduction in the cost of manufacturing. However, the introduction of IIoT devices opens up the door for a variety of cyber threats in smart industries. The detection of cyber threats against such extensive, complex, and heterogeneous smart manufacturing industries is very challenging due to the lack of sufficient attack traces. Therefore, in this work, a Federated Learning enabled Deep Intrusion Detection framework is proposed to detect cyber threats in smart manufacturing industries. The proposed FLDID framework allows multiple smart manufacturing industries to build a collaborative model to detect threats and overcome the limited attack example problem with individual industries. Moreover, to ensure the privacy of model gradients, Paillier-based encryption is used in communication between edge devices (representative of smart industries) and the server. The deep learning-based hybrid model, which consists of a Convolutional Neural Network, Long Short Term Memory, and Multi-Layer Perceptron is used in the intrusion detection model. An exhaustive set of experiments on the publically available dataset proves the effectiveness of the proposed framework for detecting cyber threats in smart industries over the state-of-the-art approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
366. Mist and Edge Computing Cyber-Physical Human-Centered Systems for Industry 5.0: A Cost-Effective IoT Thermal Imaging Safety System.
- Author
-
Fraga-Lamas, Paula, Barros, Daniel, Lopes, Sérgio Ivan, and Fernández-Caramés, Tiago M.
- Subjects
- *
CYBER physical systems , *THERMOGRAPHY , *EDGE computing , *IMAGING systems , *INDUSTRIAL safety , *RASPBERRIES - Abstract
While many companies worldwide are still striving to adjust to Industry 4.0 principles, the transition to Industry 5.0 is already underway. Under such a paradigm, Cyber-Physical Human-centered Systems (CPHSs) have emerged to leverage operator capabilities in order to meet the goals of complex manufacturing systems towards human-centricity, resilience and sustainability. This article first describes the essential concepts for the development of Industry 5.0 CPHSs and then analyzes the latest CPHSs, identifying their main design requirements and key implementation components. Moreover, the major challenges for the development of such CPHSs are outlined. Next, to illustrate the previously described concepts, a real-world Industry 5.0 CPHS is presented. Such a CPHS enables increased operator safety and operation tracking in manufacturing processes that rely on collaborative robots and heavy machinery. Specifically, the proposed use case consists of a workshop where a smarter use of resources is required, and human proximity detection determines when machinery should be working or not in order to avoid incidents or accidents involving such machinery. The proposed CPHS makes use of a hybrid edge computing architecture with smart mist computing nodes that processes thermal images and reacts to prevent industrial safety issues. The performed experiments show that, in the selected real-world scenario, the developed CPHS algorithms are able to detect human presence with low-power devices (with a Raspberry Pi 3B) in a fast and accurate way (in less than 10 ms with a 97.04% accuracy), thus being an effective solution (e.g., a good trade-off between cost, accuracy, resilience and computational efficiency) that can be integrated into many Industry 5.0 applications. Finally, this article provides specific guidelines that will help future developers and managers to overcome the challenges that will arise when deploying the next generation of CPHSs for smart and sustainable manufacturing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
367. DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
- Author
-
Ahmad, Jawad, Shah, Syed Aziz, Latif, Shahid, Ahmed, Fawad, Zou, Zhuo, and Pitropakis, Nikolaos
- Subjects
PARTICLE swarm optimization ,INTERNET of things ,ELECTRONIC data processing ,TELECOMMUNICATION ,SMART devices ,INDUSTRIAL efficiency - Abstract
• A fast and efficient cyberattack detection scheme is introduced to enhance the security and trustworthiness of an IIoT system by using a Deep Random Neural Network (DRaNN). • A hybrid particle swarm optimization (PSO) with sequential quadratic programming (SQP) is incorporated for optimal training of DRaNN. • The proposed scheme is evaluated and its effectiveness is verified in both binary class and multiclass scenarios by using three newly reported IIoT datasets DS2OS, UNSW-NB15 and ToN_IoT. The Industrial Internet of Things (IIoT) is a rapidly emerging technology that increases the efficiency and productivity of industrial environments by integrating smart sensors and devices with the internet. The advancements in communication technologies have introduced stable connectivity and a higher data transfer rate in the IIoT. The IIoT devices generate a massive amount of information that requires intelligent data processing techniques for the development of cybersecurity mechanisms. In this regard, deep learning (DL) can be an appropriate choice. This paper proposes a Deep Random Neural Network (DRaNN) based fast and reliable attack detection scheme for IIoT environments. The RaNN is an advanced variant of the traditional Artificial Neural Network (ANN) with a highly distributed nature and better generalization capabilities. To attain a higher attack detection accuracy, the proposed RaNN is optimally trained by incorporating hybrid particle swarm optimization (PSO) with sequential quadratic programming (SQP). The SQP-enabled PSO facilitates the neural network to select optimal hyperparameters. The efficacy of the suggested scheme is analyzed in both binary and multiclass configurations by conducting extensive experiments on three new IIoT datasets. The experimental outcomes demonstrates the promising performance of the proposed design for all datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
368. Intelligent Fault Detection in Hall-Effect Rotary Encoders for Industry 4.0 Applications.
- Author
-
Agarwal, Ritik, Bhatti, Ghanishtha, Singh, R. Raja, Indragandhi, V., Suresh, Vishnu, Jasinska, Laura, and Leonowicz, Zbigniew
- Subjects
INDUSTRY 4.0 ,COMPUTERS ,INDUSTRIAL equipment ,FAULT diagnosis ,HOISTING machinery - Abstract
Sensors are the foundational components of any smart machine system and are invaluable in all modern technologies. Consequently, faults and errors in sensors can have a significant negative impact on the setup. Intelligent, lightweight, and accurate fault diagnosis and mitigation lie at the crux of modern industries. This study aimed to conceptualize a germane solution in the domain of fault detection, focusing on Hall-effect rotary encoders. Position monitoring through rotary encoders is essential to the safety and seamless functioning of industrial equipment such as lifts and hoists, and commercial systems such as automobiles. This work used multi-strategy learners to accurately diagnose quadrature and offset faults in Hall-effect rotary encoders. The obtained dataset was then run through a lightweight ensemble classifier to train a robust fault detection model. The complete mechanism was simulated through interconnected models simulated in a MATLAB Simulink™ environment. In real time, the developed fault detection algorithm was embedded in an FPGA controller and tested with a 1 kW PMSM drive system. The resulting system is computationally inexpensive and achieves an accuracy of 95.8%, making it a feasible solution for industrial implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
369. Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported.
- Author
-
Martins, Tiago and Oliveira, Sergio Vidal Garcia
- Subjects
- *
INDUSTRIAL controls manufacturing , *ACCESS control , *PROFESSIONAL-client communication , *TRUST , *SECURITY management , *INFORMATION technology - Abstract
The Zero Trust concept is being adopted in information technology (IT) deployments, while human users remain to be the main risk for operational technology (OT) deployments. This article proposes to enhance the new Modbus/TCP Security protocol with authentication and authorization functions that guarantee security against intentional unauthorized access. It aims to comply with the principle of never trusting the person who is accessing the network before carrying out a security check. Two functions are tested and used in order to build an access control method that is based on a username and a password for human users with knowledge of industrial automation control systems (IACS), using simple means, low motivation, and few resources. A man-in-the-middle (MITM) component was added in order to intermediate the client and the server communication and to validate these functions. The proposed scenario was implemented using the Node-RED programming platform. The tests implementing the functions and the access control method through the Node-RED software have proven their potential and their applicability. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
370. An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks.
- Author
-
Mohamadi, Mohamed, Djamaa, Badis, Senouci, Mustapha Reda, Grine, Yacine, and Laribi, Riad
- Abstract
The IEEE 802.15.4 Time Slotted Channel Hopping (TSCH) communication mode is a key standard in the Industrial Internet of Things (IIoT). To schedule communications, TSCH uses deterministic transmissions to deal with latency requirements and channel hopping to cope with interference in IIoT environments. Nonetheless, this latter might not be sufficient to ensure reliable delivery of critical data since industrial networks are prone to severe external interference, which impacts the quality of wireless channels. In this paper, we propose an effective local Channel Selection approach for Reliable communication Scheduling in TSCH networks, dubbed CSRS. CSRS leans on effective assessment metrics to estimate the quality of available communication channels and stateless local exchange of bad-channels blacklists. CSRS is schedule-independent; hence it can be combined with any TSCH schedule, including the standardized Minimal Scheduling Function (MSF), to reduce the negative impact of bad channels. CSRS integration with MSF is implemented in Contiki and validated through extensive realistic trace-based simulations and public testbed experiments. Obtained results demonstrate the efficiency of our proposal in terms of reliability, latency, and energy consumption when compared with state-of-the-art solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
371. A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.
- Author
-
Bedari, Aseel, Wang, Song, and Yang, Wencheng
- Subjects
- *
5G networks , *INDUSTRIALISM , *FINGERPRINT databases , *BIOMETRIC identification , *INTERNET of things , *DATA transmission systems , *ONLINE databases - Abstract
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production. However, most biometric authentication systems in the IIoT have no template protection, thus risking raw biometric data stored as templates in central databases or IIoT devices. Moreover, traditional biometric authentication faces slow, limited database holding capacity and data transmission problems. To address these issues, in this paper we propose a secure online fingerprint authentication system for IIoT devices over 5G networks. The core of the proposed system is the design of a cancelable fingerprint template, which protects original minutia features and provides privacy and security guarantee for both entity users and the message content transmitted between IIoT devices and the cloud server via 5G networks.Compared with state-of-the-art methods, the proposed authentication system shows competitive performance on six public fingerprint databases, while saving computational costs and achieving fast online matching. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
372. WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.
- Author
-
Yi, Fumin, Zhang, Lei, Xu, Lijuan, Yang, Shumian, Lu, Yanrong, and Zhao, Dawei
- Subjects
- *
WIRELESS sensor networks , *PHYSICAL layer security , *GATEWAYS (Computer networks) , *WIRELESS communications , *INTERNET of things , *INDUSTRIALIZATION - Abstract
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge–response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
373. Predictive Monitoring System for Autonomous Mobile Robots Battery Management Using the Industrial Internet of Things Technology.
- Author
-
Krot, Kamil, Iskierka, Grzegorz, Poskart, Bartosz, and Gola, Arkadiusz
- Subjects
- *
AUTONOMOUS robots , *MOBILE robots , *INDUSTRIAL management , *INTERNET of things , *LITHIUM cells , *ROBOTS , *STORAGE batteries - Abstract
The core of the research focuses on analyzing the discharge characteristic of a lithium NMC battery in an autonomous mobile robot, which can be used as a model to predict its future states depending on the amount of missions queued. In the presented practical example, an autonomous mobile robot is used for in-house transportation, where its missions are queued or delegated to other robots in the system depending on the robots' predicted state of charge. The system with the implemented models has been tested in three scenarios, simulating real-life use cases, and has been examined in the context of the number of missions executed in total. The main finding of the research is that the battery discharge characteristic stays consistent regardless of the mission type or length, making it usable as a model for the predictive monitoring system, which allows for detection of obstruction of the default shortest paths for the programmed missions. The model is used to aid the maintenance department with information on any anomalies detected in the robot's path or the behavior of the battery, making the transportation process safer and more efficient by alerting the employees to take action or delegate the excessive tasks to other robots. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
374. Two-Timescale Resource Allocation for Automated Networks in IIoT.
- Author
-
He, Yanhua, Ren, Yun, Zhou, Zhenyu, Mumtaz, Shahid, Al-Rubaye, Saba, Tsourdos, Antonios, and Dobre, Octavia A.
- Abstract
The rapid technological advances of cellular technologies will revolutionize network automation in industrial internet of things (IIoT). In this paper, we investigate the two-timescale resource allocation problem in IIoT networks with hybrid energy supply, where temporal variations of energy harvesting (EH), electricity price, channel state, and data arrival exhibit different granularity. The formulated problem consists of energy management at a large timescale, as well as rate control, channel selection, and power allocation at a small timescale. To address this challenge, we develop an online solution to guarantee bounded performance deviation with only causal information. Specifically, Lyapunov optimization is leveraged to transform the long-term stochastic optimization problem into a series of short-term deterministic optimization problems. Then, a low-complexity rate control algorithm is developed based on alternating direction method of multipliers (ADMM), which accelerates the convergence speed via the decomposition-coordination approach. Next, the joint channel selection and power allocation problem is transformed into a one-to-many matching problem, and solved by the proposed price-based matching with quota restriction. Finally, the proposed algorithm is verified through simulations under various system configurations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
375. Futuristic CRISPR-based biosensing in the cloud and internet of things era: an overview.
- Author
-
Ibrahim, Abdullahi Umar, Al-Turjman, Fadi, Sa'id, Zubaida, and Ozsoz, Mehmet
- Subjects
CRISPRS ,INTERNET of things ,ARTIFICIAL intelligence ,DATA warehousing ,GENOME editing ,CLOUD computing - Abstract
Biosensors-based devices are transforming medical diagnosis of diseases and monitoring of patient signals. The development of smart and automated molecular diagnostic tools equipped with biomedical big data analysis, cloud computing and medical artificial intelligence can be an ideal approach for the detection and monitoring of diseases, precise therapy, and storage of data over the cloud for supportive decisions. This review focused on the use of machine learning approaches for the development of futuristic CRISPR-biosensors based on microchips and the use of Internet of Things for wireless transmission of signals over the cloud for support decision making. The present review also discussed the discovery of CRISPR, its usage as a gene editing tool, and the CRISPR-based biosensors with high sensitivity of Attomolar (10
−18 M), Femtomolar (10−15 M) and Picomolar (10−12 M) in comparison to conventional biosensors with sensitivity of nanomolar 10−9 M and micromolar 10−3 M. Additionally, the review also outlines limitations and open research issues in the current state of CRISPR-based biosensing applications. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
376. Hierarchical framework for analysing the challenges of implementing industrial Internet of Things in manufacturing industries using ISM approach.
- Author
-
Malhotra, Snigdha, Agarwal, Vernika, and Kapur, P. K.
- Abstract
The integration of smart devices in the manufacturing section has brought along disruptions in the production processes. The existing literature in the field of IIoT and Industry 4.0 have focused much on the technical aspects of the network design and development, however, there is a substantial gap in examining the challenges of implementation of IIoT techniques, especially in context to India. This paper presents an exhaustive analysis and categorization of the challenges faced by the manufacturing sector in the implementation of the Industrial Internet of Things (IIoT). Challenges were categorized into technical and organizational challenges with the help of experts. The paper aims to attain a hierarchical structure, which will further be helpful to policymakers to identify the most critical challenge allowing them to make a well-versed decision. The results of this study are expected to highlight the key challenge wherein the industry and researchers can focus their strategic efforts. This will facilitate the address of implicit issues while implementing IIoT Techniques in the manufacturing industry. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
377. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments
- Author
-
Vieira Junior, Ivanilson França, Granjal, Jorge, and Curado, Marilia
- Published
- 2024
- Full Text
- View/download PDF
378. Leveraging IoT Protocols : Integrating Palletization Algorithm with Flexible Robotic Platform
- Author
-
Ferm Dubois, Mathias and Ferm Dubois, Mathias
- Abstract
This thesis explores the integration of IoT protocols to enhance supply chain efficiency and sustainability by developing a flexible automated system. The research covers the integration of a palletization optimizer with a flexible robotic platform, a project conducted in collaboration with OpiFlex and Linköping University. Flexibility and sustainability in production, particularly in the food and beverage industry, are critical yet challenging to achieve. This research addresses these challenges by proposing a system that aligns the output with customer needs by combining these technologies. The research employs a combination of case study and exploratory methodologies. The development approach synthesizes elements from Set-Based Design, Point-Based Design, and Agile development frameworks. The primary research questions focus on identifying the best system architecture for integrating the palletization optimizer with a lower-level automation platform and outlining the steps needed to transform this integration into a commercially viable product. The system includes the optimizer, capable of processing customer orders and configuring products on mixed output pallets, integrated with a flexible robotic system provided by OpiFlex. The work involved evaluating communication protocols, MQTT, OPC UA, and TCP/IP, and designing robust interactions and interfaces between the subsystems. The results demonstrate the system's architecture and interaction protocols. The thesis concludes with a discussion of the results in comparison to the application scenario and the standards consulted. The conclusion is that the chosen interface practices should remain largely intact but be re-developed using an OPC UA-based architecture. The main reasons for this are its support for both pub/sub and client-server models, increased security, and greater support for enterprise application integration. However, depending on the specific application, the downsides of OPC UA may outweigh its b
- Published
- 2024
379. Data-driven smart maintenance decision using IIoT for CBM approach
- Author
-
Alweissi, Sarah and Alweissi, Sarah
- Abstract
Industry 4.0 capabilities help manufacturing companies to dramatically reduce the timebetween an event occurring and the implementation of an appropriate response. IIoTtechnology can gain more information and having more control over their physicalresources, processes, and environments. It is necessary to use proper technology at theproper location; Therefore, the purpose of this master thesis is to be assessing thematurity level of the maintenance organization and highlighting the challenges andenablers of Industrial Internet of Things (IIoT) implementations within the ConditionBased Maintenance (CBM) approach through the investigation of eight on-going pilotprojects.
- Published
- 2024
380. Applikation för realtidsvisualisering av IIoT data för maskinutrustning
- Author
-
Sjöbom, Albin and Sjöbom, Albin
- Abstract
Denna rapport beskriver projektet och dess arbetsgång. Projektet är i samarbete med SCA där målet var att ta fram en applikation, där realtidsdata samt statisk information kan visualiseras om olika delar i processen. Med syftet att skapa ett hjälpmedel som förenklar drift- och underhållsarbete ute på SCA:s olika industrier, främst mot personal inom underhåll och service, för att samtidigt bidra med en utveckling mot den fjärde industriella revolutionen. Utvärderingar gällande applikationstyp samt en lösning för optisk teckenigenkänning har utförts. Samtidigt som ett Proof of Concept i form av en PWA har skapats som fungerar både responsivt och är generisk. Utveckling och testning av kod har utförts med hjälp av utvecklingsmiljön Visual Studio Code, och programmeringsspråken HTML, CSS, samt JavaScript. Applikationen använder sig av Azure AI Vision för den optiska teckenigenkänningen, och nyttjar plattformen Ignition’s IIoT lösning. Resultatet av projektet är en prototyp som fyller projektets syfte och mål, som idag med mindre modifikation skulle kunna implementeras ute på SCA:s anläggningar och bidra till en besparing både gällande tid och pengar.
- Published
- 2024
381. Towards Logistics 5.0: An Approach for Selecting and Integrating Industrial Internet of Things
- Author
-
Hanumantu, Divya and Hanumantu, Divya
- Abstract
Every manufacturing discipline is evolving rapidly with the emergence of Industry 5.0, which is defined as the incorporation of advanced technologies to enhance sustainability, human imperative, and resilience. Logistic activities inside a manufacturing facility is not an exception for this evolution. Industrial internet of things (IIoT) as a primary enabler for the digital transformation provides the companies with great opportunities. In this context, firms need a guidance for harmonious integration of IIoT technologies into internal logistics. Existed theoretical knowledge has not addressed this issue explicitly. Therefore, the thesis is aimed at exploring the selection and integration of IIoT into internal logistics for a more smart, automated, and connected factory. The purpose of the thesis is achieved by a qualitative case study approach in a large multinational machinery manufacturing company. The study begins with a literature review constructing a theoretical framework to answer the research questions. then, semi structured interviews, document review and observations were employed as data collection methods. Three use cases: sensors for automatic replenishment, pick to light indicators for kitting and automated goods receiving are studied thoroughly for understanding the practical aspects. Thorough analysis of the collected data shows that the challenges being faced are technological, organizational, external, and human related. Also, critical factors which impact the integration of IIoT technologies and must be considered during the process are addressed through the analysis. Connecting these findings together, a roadmap has been created with a detailed explanation of actions to be taken in each step. To the existing theoretical knowledge, this thesis adds the knowledge of human and organizational factors and how to address them through developing a roadmap. Also, this knowledge will guide the companies to better prepare their workforce. Additionally, th
- Published
- 2024
382. A Blockchain Based Scalable Domain Access Control Framework for Industrial Internet of Things
- Author
-
Usman, Muhammad, Sarfraz, Muhammad Shahzad, Aftab, Muhammad Umar, Habib, Usman, Javed, Saleha, Usman, Muhammad, Sarfraz, Muhammad Shahzad, Aftab, Muhammad Umar, Habib, Usman, and Javed, Saleha
- Abstract
Industrial Internet of Things (IIoT) applications consist of resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, and complex structure of the network further make this issue more challenging. To control the information flow in such environments, access control is critical to make collaboration and communication safe. To deal with these challenges, recent studies employ attribute-based access control on top of blockchain technology. However, the attribute-based access control frameworks suffer due to high computational overhead. In this paper, we propose an improved role-based access control framework using hyperledger blockchain to deal with IIoT requirements with less computational overhead making the information control process more efficient and real-time. The proposed framework leverages a layered architecture of chaincodes to implement the improved access control framework that handles the permission delegation and conflict management to deal with the dynamism of the IIoT network. The system uses a Policy Contract, Device Contract, and Access Contract to manage the workflow of the whole access control process. Each chaincode in the proposed framework is isolated in terms of its responsibilities to make the design low coupled. The integration of improved access control with blockchain enables the proposed framework to provide a highly scalable solution, tamper-proof, and flexible to manage conflicting scenarios. The proposed system outperforms the recent studies significantly in computational overhead in extensive simulation results. To verify the scalability and efficiency, the proposed is evaluated against a large number of concurrent virtual clients in simulation and statistical analysis proves that the proposed system is promising for further research in this domain., Validerad;2024;Nivå 2;2024-06-28 (hanlid);Full text license: CC BY
- Published
- 2024
- Full Text
- View/download PDF
383. Blockchain-IIoT Integration : Revolutionizing Smart Manufacturing Process Monitoring
- Author
-
Douaioui, Kaoutar, Oucheikh, Rachid, Mabroukil, Charif, Douaioui, Kaoutar, Oucheikh, Rachid, and Mabroukil, Charif
- Abstract
This paper examines the integration of Blockchain and the Industrial Internet of Things (IIoT) in manufacturing process monitoring. The proposed model emphasizes Blockchain's decentralization, cryptographic security, and smart contracts for enhanced security and efficiency. It addresses challenges like data security and scalability, showcasing the transformative potential of Blockchain-IIoT integration. In the end this work highlights future development opportunities in smart manufacturing.
- Published
- 2024
- Full Text
- View/download PDF
384. Peristaltic pump aging detection dataset
- Author
-
Universidad de Sevilla. Departamento de Arquitectura y Tecnología de Computadores, Universidad de Sevilla. TEP-108: Robótica y tecnología de computadores, Agencia Estatal de Investigación. España, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Montes-Sánchez, Juan Manuel, Uwate, Yoko, Nishio, Yoshifumi, Vicente Díaz, Saturnino, Jiménez Fernández, Ángel Francisco, Universidad de Sevilla. Departamento de Arquitectura y Tecnología de Computadores, Universidad de Sevilla. TEP-108: Robótica y tecnología de computadores, Agencia Estatal de Investigación. España, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Montes-Sánchez, Juan Manuel, Uwate, Yoko, Nishio, Yoshifumi, Vicente Díaz, Saturnino, and Jiménez Fernández, Ángel Francisco
- Abstract
This dataset contains samples coming from a hydraulic block from a biomedical equipment. The block mounts 3 Thomas SR10/30 DC standard perisltaltic pumps, which were filled with distilled water. Only one pump was running at the same time during these recordings, always at maximum constant speed. The cassettes of the pumps were changed before each recording. We used cassettes with 2 different levels of degradation: NEW (unused) and OLD (lifetime already expired). We defined 3 different classes: Class 1 is STOP (no pump running), class 2 is NEW (one pump running with a new cassette), and class 3 is OLD (one pump running with an old cassette). The classified samples were recorded using several sensors: 3 accelerometers, 1 gyroscope, 1 magnetometer and 1 microphone. All data were recorded at the same time at the maximum available frequency using the device "ST SensorTile.box". The raw data has already been processed into sepparate different .csv files (.wav files for audio) using python code.
- Published
- 2024
385. PQSec-DDS: Integrating Post-Quantum Cryptography into DDS Security for Robotic Applications
- Author
-
Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Blanco Romero, Javier, Lorenzo, Vicente, Almenares, Florina, Díaz Sánchez, Daniel, Serrano Navarro, Adrián, Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Blanco Romero, Javier, Lorenzo, Vicente, Almenares, Florina, Díaz Sánchez, Daniel, and Serrano Navarro, Adrián
- Abstract
Leading cybersecurity agencies and standardization bodies have globally emphasized the critical need to transition towards Post-Quantum Cryptography (PQC) to defend against emerging quantum computing threats. They advocate PQC as a practical and cost-effective solution for security systems nowadays. Nevertheless, emerging technologies such as industrial systems, e.g., autonomous vehicles, air traffic management, diagnostic imaging machines, etc., and robotics systems, e.g., ROS2 (Robotic Operating System), have not started their evolution to enhance crypto-agility and security robustness. Some of these emerging technologies use the Data Distribution Service (DDS) standard as the underlying communication middleware protocol. DDS is a distributed publish-subscribe system that allows sending and receiving data by publishing and subscribing to topics across a network of connected nodes. However, DDS’s security is based on traditional symmetric and asymmetric cryptography, which is vulnerable to quantum computing attacks. To address this issue, we propose the integration of PQC into DDS, through the development of a C/C++ library, called pqsec-dds, which can be integrated across different DDS implementations such as CycloneDDS or OpenDDS. A proof-of-concept demonstrates the viability of our approach in enhancing the security and cryptoagility of DDS-based systems
- Published
- 2024
386. Fuzzing tool for industrial communication
- Author
-
Köhler Djurberg, Markus, Heen, Isak, Köhler Djurberg, Markus, and Heen, Isak
- Abstract
Unit testing is a fundamental practice in software development and the goal is to create a test suite that tests the robustness of the software. It is challenging to create a test suite that covers every possible input to a system which can lead to security flaws not being detected. Fuzz testing is a technique that creates randomly generated, or fuzzy, input with the goal to uncover these areas of the input space potentially missed by the unit test suite. EtherNet/IP is an industrial communications protocol built on top of the TCP/IP suite. HMS Anybus develops hardware to use in secure networks in industrial settings utilizing the EtherNet/IP protocol. This report outlines the development of a Scapy-based fuzz testing tool capable of testing the implementation of the protocol on HMS devices. Additionally we propose a strategy for how the tool can be deployed in future testing. The resulting fuzz testing tool is capable of creating packets containing selected commands’ encapsulation headers and layering them with command specific data fields. These packets can be filled with static or fuzzy input depending on user configuration. The tool is implemented with the intention of providing HMS the capability for conducting fuzz testing. The report mentions multiple improvements that can be made using A.I. assisted generation of test cases and how the tool can be scaled in the future. This thesis project is a proof of concept that using Scapy to create a fuzz testing tool tailored to the EtherNet/IP protocol is possible.
- Published
- 2024
387. Forging the Industrial Metaverse for Industry 5.0: Where Extended Reality, IIoT, Opportunistic Edge Computing, and Digital Twins Meet
- Author
-
Fernández-Caramés, Tiago M., Fraga-Lamas, Paula, Fernández-Caramés, Tiago M., and Fraga-Lamas, Paula
- Abstract
[Abstract]: The Industrial Metaverse can benefit from the concepts fostered by Industry 5.0, since it implies making use of dynamic and up-to-date content, as well as fast human-to-machine interactions. To enable such enhancements, this article proposes the concept of Meta-Operator, which is essentially an industrial worker that follows the principles of Industry 5.0 and interacts with Industrial Metaverse applications and with his/her surroundings through advanced Extended Reality (XR) devices. In order to build the foundations of future Meta-Operators, this article provides a thorough description of the main technologies that support such a concept: the main components of the Industrial Metaverse, the latest XR technologies and accessories and the use of Opportunistic Edge Computing (OEC) communications (to detect and interact with the surrounding Internet of Things (IoT) and Industrial IoT (IIoT) devices). Moreover, this paper analyzes how to create the next generation of Industrial Metaverse applications based on the Industry 5.0 concepts, including the most relevant standardization initiatives, the integration of AR/MR devices with IoT/IIoT solutions, the development of advanced communications and software architectures and the creation of shared experiences and opportunistic collaborative protocols. Finally, this article provides an extensive list of potential Industry 5.0 applications for the Industrial Metaverse and analyzes thoroughly the main challenges and research lines. Thus, this article provides a holistic view and useful guidelines for the future developers and researchers that will create the next generation of applications for the Industrial Metaverse.
- Published
- 2024
388. Digital assistance for aircraft manufacturing – process requirements and technologies
- Author
-
Piontek, Simon, Schütze, Mats, Lödding, Hermann, Piontek, Simon, Schütze, Mats, and Lödding, Hermann
- Abstract
High quality and productivity requirements prevail in aircraft manufacturing. To ensure these standards are met, production processes are largely automated and digitalized. However, high product complexity leads to many manual processes which are much more prone to errors and insufficient productivity. To support workers effectively, this paper proposes a concept for workers in aircraft manufacturing, which connects different Digital Assistance Technologies using a Digital Twin. The concept results from the analysis of influencing factors in manual work processes, the investigation of workers in the production environment and a survey on the technology acceptance of different Digital Assistance Technologies.
- Published
- 2024
389. Leveraging Digital Twins and SIEM Integration for Incident Response in OT Environments
- Author
-
Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Arias, Adei, Arellano, Cristobal, Zurutuza, Urko, Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Arias, Adei, Arellano, Cristobal, and Zurutuza, Urko
- Abstract
The Industrial Internet of Things (IIoT) has digitally transformed industrial processes albeit at the expense of increasing exposure to new security threats. System Information and Event Management (SIEM) systems, typically designed for Information Technology (IT), may struggle with the high data volume, specialized security needs, and real-time response requirements of IIoT environments. Digital Twins (DT), virtual replicas of physical devices, offer a solution to these challenges. By integrating SIEM with DT, incident response can be automated in Operational Technology (OT) environments. This integration enhances real-time threat detection, response coordination and post-incident tasks to ensure the security and continuity of industrial operations. A use case and prototype validate the effectiveness of this approach and highlight its potential to strengthen OT security in the face of evolving threats.
- Published
- 2024
390. Enhancing energy efficiency with a dynamic trust measurement scheme in power distribution network
- Author
-
Wang, Yilei, Sun, Xin, Zheng, Guiping, Rashid, Ahmar, Ullah, Sami, Alasmary, Hisham, Waqas, Muhammad, Wang, Yilei, Sun, Xin, Zheng, Guiping, Rashid, Ahmar, Ullah, Sami, Alasmary, Hisham, and Waqas, Muhammad
- Abstract
The application of Intelligent Internet of Things (IIoT) in constructing distribution station areas strongly supports platform transformation, upgrade, and intelligent integration. The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer, with the former using intelligent fusion terminals for real-time data collection and processing. However, the influx of multiple low-voltage in the smart grid raises higher demands for the performance, energy efficiency, and response speed of the substation fusion terminals. Simultaneously, it brings significant security risks to the entire distribution substation, posing a major challenge to the smart grid. In response to these challenges, a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues. The scheme begins by establishing a hierarchical trust measurement model, elucidating the trust relationships among smart IoT terminals. It then incorporates multidimensional measurement factors, encompassing static environmental factors, dynamic behaviors, and energy states. This comprehensive approach reduces the impact of subjective factors on trust measurements. Additionally, the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units, ensuring the prompt identification and elimination of any malicious terminals. This, in turn, enhances the security and reliability of the smart grid environment. The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments. Notably, the scheme outperforms established trust metric models in terms of energy efficiency, showcasing its significant contribution to the field.
- Published
- 2024
391. An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM.
- Author
-
Chen Z, Li Z, Huang J, Liu S, and Long H
- Abstract
In recent years, with the application of Internet of Things (IoT) and cloud technology in smart industrialization, Industrial Internet of Things (IIoT) has become an emerging hot topic. The increasing amount of data and device numbers in IIoT poses significant challenges to its security issues, making anomaly detection particularly important. Existing methods for anomaly detection in the IIoT often fall short when dealing with data imbalance, and the huge amount of IIoT data makes feature selection challenging and computationally intensive. In this paper, we propose an optimal deep learning model for anomaly detection in IIoT. Firstly, by setting different thresholds of eXtreme Gradient Boosting (XGBoost) for feature selection, features with importance above the given threshold are retained, while those below are ignored. Different thresholds yield different numbers of features. This approach not only secures effective features but also reduces the feature dimensionality, thereby decreasing the consumption of computational resources. Secondly, an optimized loss function is designed to study its impact on model performance in terms of handling imbalanced data, highly similar categories, and model training. We select the optimal threshold and loss function, which are part of our optimal model, by comparing metrics such as accuracy, precision, recall, False Alarm Rate (FAR), Area Under the Receiver Operating Characteristic Curve (AUC-ROC), and Area Under the Precision-Recall Curve (AUC-PR) values. Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. Experiments are conducted using the UNSW-NB15 and NSL-KDD datasets. The proposed MIX_LSTM model can achieve 0.084 FAR, 0.984 AUC-ROC, and 0.988 AUC-PR values in the binary anomaly detection experiment on the UNSW-NB15 dataset. In the NSL-KDD dataset, it can achieve 0.028 FAR, 0.967 AUC-ROC, and 0.962 AUC-PR values. By comparing the evaluation indicators, the model shows good performance in detecting abnormal attacks in the Industrial Internet of Things compared with traditional deep learning models, machine learning models and existing technologies., (© 2024. The Author(s).)
- Published
- 2024
- Full Text
- View/download PDF
392. Real-Time Monitoring of Electric Motors for Detection of Operating Anomalies and Predictive Maintenance
- Author
-
Magadán, Luis, Suárez, Francisco J., Granda, Juan C., García, Daniel F., Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Santos, Henrique, editor, Pereira, Gabriela Viale, editor, Budde, Matthias, editor, Lopes, Sérgio F., editor, and Nikolic, Predrag, editor
- Published
- 2020
- Full Text
- View/download PDF
393. Lightweight Cryptography in IIoT the Internet of Things in the Industrial Field
- Author
-
Eterovic, Jorge, Cipriano, Marcelo, Garcia, Edith, Torres, Luis, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Pesado, Patricia, editor, and Arroyo, Marcelo, editor
- Published
- 2020
- Full Text
- View/download PDF
394. Optimum Frequency Utilization Model for Industrial Wireless Sensor Networks
- Author
-
Krishna Chaitanya, K., Sravan, K. S., Seetha Ramanjaneyulu, B., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Bera, Rabindranath, editor, Pradhan, Prashant Chandra, editor, Liu, Chuan-Ming, editor, Dhar, Sourav, editor, and Sur, Samarendra Nath, editor
- Published
- 2020
- Full Text
- View/download PDF
395. IIoT Gateway for Edge Computing Applications
- Author
-
Crăciunescu, Mihai, Chenaru, Oana, Dobrescu, Radu, Florea, Gheorghe, Mocanu, Ştefan, Kacprzyk, Janusz, Series Editor, Borangiu, Theodor, editor, Trentesaux, Damien, editor, Leitão, Paulo, editor, Giret Boggino, Adriana, editor, and Botti, Vicente, editor
- Published
- 2020
- Full Text
- View/download PDF
396. Rapid Sales Growth Mechanisms and Profitability for Investment Product Manufacturing SMEs Through Pay-Per-X Business Models
- Author
-
Uuskoski, Mikko, Kärkkäinen, Hannu, Menon, Karan, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Nyffenegger, Felix, editor, Ríos, José, editor, Rivest, Louis, editor, and Bouras, Abdelaziz, editor
- Published
- 2020
- Full Text
- View/download PDF
397. Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory
- Author
-
Candell, Richard, Liu, Yongkang, Kashef, Mohamed, Montgomery, Karl, Foufou, Sebti, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Nyffenegger, Felix, editor, Ríos, José, editor, Rivest, Louis, editor, and Bouras, Abdelaziz, editor
- Published
- 2020
- Full Text
- View/download PDF
398. A Naming System for 'The Internet of Things' Adapted to Industry - A Case Study in Electrical Engineering
- Author
-
Dourgnon, Anne, Dang, Tuan, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, and Malaka, Rainer, Editorial Board Member
- Published
- 2020
- Full Text
- View/download PDF
399. Ubiquitous Manufacturing in the Age of Industry 4.0: A State-of-the-Art Primer
- Author
-
Pramanik, Pijush Kanti Dutta, Mukherjee, Bulbul, Pal, Saurabh, Upadhyaya, Bijoy Kumar, Dutta, Shubhendu, Pisello, Anna Laura, Editorial Board Member, Hawkes, Dean, Editorial Board Member, Bougdah, Hocine, Editorial Board Member, Rosso, Federica, Editorial Board Member, Abdalla, Hassan, Editorial Board Member, Boemi, Sofia-Natalia, Editorial Board Member, Mohareb, Nabil, Editorial Board Member, Mesbah Elkaffas, Saleh, Editorial Board Member, Bozonnet, Emmanuel, Editorial Board Member, Pignatta, Gloria, Editorial Board Member, Mahgoub, Yasser, Editorial Board Member, De Bonis, Luciano, Editorial Board Member, Kostopoulou, Stella, Editorial Board Member, Pradhan, Biswajeet, Editorial Board Member, Abdul Mannan, Md., Editorial Board Member, Alalouch, Chaham, Editorial Board Member, O. Gawad, Iman, Editorial Board Member, Nayyar, Anand, Editorial Board Member, Amer, Mourad, Series Editor, and Kumar, Akshi, editor
- Published
- 2020
- Full Text
- View/download PDF
400. si3-Industry: A Sustainable, Intelligent, Innovative, Internet-of-Things Industry
- Author
-
Kumar, Akshi, Nayyar, Anand, Pisello, Anna Laura, Editorial Board Member, Hawkes, Dean, Editorial Board Member, Bougdah, Hocine, Editorial Board Member, Rosso, Federica, Editorial Board Member, Abdalla, Hassan, Editorial Board Member, Boemi, Sofia-Natalia, Editorial Board Member, Mohareb, Nabil, Editorial Board Member, Mesbah Elkaffas, Saleh, Editorial Board Member, Bozonnet, Emmanuel, Editorial Board Member, Pignatta, Gloria, Editorial Board Member, Mahgoub, Yasser, Editorial Board Member, De Bonis, Luciano, Editorial Board Member, Kostopoulou, Stella, Editorial Board Member, Pradhan, Biswajeet, Editorial Board Member, Abdul Mannan, Md., Editorial Board Member, Alalouch, Chaham, Editorial Board Member, O. Gawad, Iman, Editorial Board Member, Nayyar, Anand, Editorial Board Member, Amer, Mourad, Series Editor, and Kumar, Akshi, editor
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.