1
|
Fletcher M, Paulz E, Ridge D, Michaels AJ. Low-Latency Wireless Network Extension for Industrial Internet of Things. Sensors (Basel) 2024; 24:2113. [PMID: 38610325 PMCID: PMC11014271 DOI: 10.3390/s24072113] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/16/2024] [Revised: 03/20/2024] [Accepted: 03/22/2024] [Indexed: 04/14/2024]
Abstract
The timely delivery of critical messages in real-time environments is an increasing requirement for industrial Internet of Things (IIoT) networks. Similar to wired time-sensitive networking (TSN) techniques, which bifurcate traffic flows based on priority, the proposed wireless method aims to ensure that critical traffic arrives rapidly across multiple hops to enable numerous IIoT use cases. IIoT architectures are migrating toward wirelessly connected edges, creating a desire to extend TSN-like functionality to a wireless format. Existing protocols possess inherent challenges to achieving this prioritized low-latency communication, ranging from rigidly scheduled time division transmissions, scalability/jitter of carrier-sense multiple access (CSMA) protocols, and encryption-induced latency. This paper presents a hardware-validated low-latency technique built upon receiver-assigned code division multiple access (RA-CDMA) techniques to implement a secure wireless TSN-like extension suitable for the IIoT. Results from our hardware prototype, constructed on the IntelFPGA Arria 10 platform, show that (sub-)millisecond single-hop latencies can be achieved for each of the available message types, ranging from 12 bits up to 224 bits of payload. By achieving one-way transmission of under 1 ms, a reliable wireless TSN extension with comparable timelines to 802.1Q and/or 5G is achievable and proven in concept through our hardware prototype.
Collapse
Affiliation(s)
- Michael Fletcher
- Virginia Tech National Security Institute, Blacksburg, VA 24060, USA
| | | | | | - Alan J. Michaels
- Virginia Tech National Security Institute, Blacksburg, VA 24060, USA
| |
Collapse
|
2
|
Alvi AN, Ali B, Saleh MS, Alkhathami M, Alsadie D, Alghamdi B. Secure Computing for Fog-Enabled Industrial IoT. Sensors (Basel) 2024; 24:2098. [PMID: 38610310 PMCID: PMC11014071 DOI: 10.3390/s24072098] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/26/2024] [Revised: 03/21/2024] [Accepted: 03/21/2024] [Indexed: 04/14/2024]
Abstract
Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame. For faster execution, these tasks are offloaded to nearby fog nodes. Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks. Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities. This results in an increased delay of task computation for trustworthy nodes. To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks. However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame. To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes. EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame. Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities. Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network. The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes.
Collapse
Affiliation(s)
- Ahmad Naseem Alvi
- Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad 45550, Pakistan; (A.N.A.); (B.A.)
| | - Bakhtiar Ali
- Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad 45550, Pakistan; (A.N.A.); (B.A.)
| | - Mohamed Saad Saleh
- Information Systems Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia; (M.A.); (B.A.)
| | - Mohammed Alkhathami
- Information Systems Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia; (M.A.); (B.A.)
| | - Deafallah Alsadie
- Department of Computer Science and Artificial Intelligence, College of Computing, Umm Al-Qura University, Makkah 21961, Saudi Arabia;
| | - Bushra Alghamdi
- Information Systems Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia; (M.A.); (B.A.)
| |
Collapse
|
3
|
Farooq MS, Abdullah M, Riaz S, Alvi A, Rustam F, Flores MAL, Galán JC, Samad MA, Ashraf I. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry. Sensors (Basel) 2023; 23:8958. [PMID: 37960657 PMCID: PMC10650216 DOI: 10.3390/s23218958] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/01/2023] [Revised: 10/24/2023] [Accepted: 10/31/2023] [Indexed: 11/15/2023]
Abstract
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. Owing to the large number of publications in the IoT paradigm, in particular those focusing on industrial IoT (IIoT), a comprehensive survey is significantly important to provide insights into recent developments. This survey presents the workings of the IoT-based smart industry and its major components and proposes the state-of-the-art network infrastructure, including structured layers of IIoT architecture, IIoT network topologies, protocols, and devices. Furthermore, the relationship between IoT-based industries and key technologies is analyzed, including big data storage, cloud computing, and data analytics. A detailed discussion of IIoT-based application domains, smartphone application solutions, and sensor- and device-based IIoT applications developed for the management of the smart industry is also presented. Consequently, IIoT-based security attacks and their relevant countermeasures are highlighted. By analyzing the essential components, their security risks, and available solutions, future research directions regarding the implementation of IIoT are outlined. Finally, a comprehensive discussion of open research challenges and issues related to the smart industry is also presented.
Collapse
Affiliation(s)
- Muhammad Shoaib Farooq
- Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; (M.S.F.); (M.A.); (S.R.); (A.A.)
| | - Muhammad Abdullah
- Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; (M.S.F.); (M.A.); (S.R.); (A.A.)
| | - Shamyla Riaz
- Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; (M.S.F.); (M.A.); (S.R.); (A.A.)
| | - Atif Alvi
- Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; (M.S.F.); (M.A.); (S.R.); (A.A.)
| | - Furqan Rustam
- School of Computer Science, University College Dublin, D04 V1W8 Dublin, Ireland;
| | - Miguel Angel López Flores
- Research Group on Foods, Universidad Europea del Atlantico, Isabel Torres 21, 39011 Santander, Spain; (M.A.L.F.); (J.C.G.)
- Research Group on Foods, Universidad Internacional Iberoamericana, Campeche 24560, Mexico
- Instituto Politécnico Nacional, UPIICSA, Ciudad de México 04510, Mexico
| | - Juan Castanedo Galán
- Research Group on Foods, Universidad Europea del Atlantico, Isabel Torres 21, 39011 Santander, Spain; (M.A.L.F.); (J.C.G.)
- Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA
- Department of Projects, Universidade Internacional do Cuanza, Cuito EN250, Bie, Angola
| | - Md Abdus Samad
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
| | - Imran Ashraf
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
| |
Collapse
|
4
|
Zhou X, Li A, Han G. An Intelligent Multi-Local Model Bearing Fault Diagnosis Method Using Small Sample Fusion. Sensors (Basel) 2023; 23:7567. [PMID: 37688019 PMCID: PMC10490808 DOI: 10.3390/s23177567] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/11/2023] [Revised: 08/22/2023] [Accepted: 08/24/2023] [Indexed: 09/10/2023]
Abstract
It is essential to accurately diagnose bearing faults to avoid property losses or casualties in the industry caused by motor failures. Recently, the methods of fault diagnosis for bearings using deep learning methods have improved the safety of motor operations in a reliable and intelligent way. However, most of the work is mainly suitable for situations where there is sufficient monitoring data of the bearings. In industrial systems, only a small amount of monitoring data can be collected by the bearing sensors due to the harsh monitoring conditions and the short time of the signals of some special motor bearings. To solve the issue above, this paper introduces a transfer learning strategy by focusing on the multi-local model bearing fault based on small sample fusion. The algorithm mainly includes the following steps: (1) constructing a parallel Bi-LSTM sub-network to extract features from bearing vibration and current signals of industrial motor bearings, serially fusing the extracted vibration and current signal features for fault classification, and using them as a source domain fault diagnosis model; (2) measuring the distribution difference between the source domain bearing data and the target bearing data using the maximum mean difference algorithm; (3) based on the distribution differences between the source domain and the target domain, transferring the network parameters of the source domain fault diagnosis model, fine-tuning the network structure of the source domain fault diagnosis model, and obtaining the target domain fault diagnosis model. A performance evaluation reveals that a higher fault diagnosis accuracy under small sample fusion can be maintained by the proposed method compared to other methods. In addition, the early training time of the fault diagnosis model can be reduced, and its generalization ability can be improved to a great extent. Specifically, the fault diagnosis accuracy can be improved to higher than 80% while the training time can be reduced to 15.3% by using the proposed method.
Collapse
Affiliation(s)
- Xianzhang Zhou
- Chongqing Academy of Education Science, Chongqing 400015, China;
| | - Aohan Li
- Graduate School of Informatics and Engineering, The University of Electro-Communications, Tokyo 1828585, Japan
| | - Guangjie Han
- Department of Internet of Things Engineering, Hohai University, Changzhou 213022, China;
| |
Collapse
|
5
|
Atzeni D, Ramjattan R, Figliè R, Baldi G, Mazzei D. Data-Driven Insights through Industrial Retrofitting: An Anonymized Dataset with Machine Learning Use Cases. Sensors (Basel) 2023; 23:6078. [PMID: 37447927 DOI: 10.3390/s23136078] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/26/2023] [Revised: 06/22/2023] [Accepted: 06/26/2023] [Indexed: 07/15/2023]
Abstract
Small and medium-sized enterprises (SMEs) often encounter practical challenges and limitations when extracting valuable insights from the data of retrofitted or brownfield equipment. The existing literature fails to reflect the full reality and potential of data-driven analysis in current SME environments. In this paper, we provide an anonymized dataset obtained from two medium-sized companies leveraging a non-invasive and scalable data-collection procedure. The dataset comprises mainly power consumption machine data collected over a period of 7 months and 1 year from two medium-sized companies. Using this dataset, we demonstrate how machine learning (ML) techniques can enable SMEs to extract useful information even in the short term, even from a small variety of data types. We develop several ML models to address various tasks, such as power consumption forecasting, item classification, next machine state prediction, and item production count forecasting. By providing this anonymized dataset and showcasing its application through various ML use cases, our paper aims to provide practical insights for SMEs seeking to leverage ML techniques with their limited data resources. The findings contribute to a better understanding of how ML can be effectively utilized in extracting actionable insights from limited datasets, offering valuable implications for SMEs in practical settings.
Collapse
Affiliation(s)
- Daniele Atzeni
- Department of Computer Science, University of Pisa, 56126 Pisa, Italy
| | - Reshawn Ramjattan
- Department of Computer Science, University of Pisa, 56126 Pisa, Italy
| | - Roberto Figliè
- Department of Computer Science, University of Pisa, 56126 Pisa, Italy
| | | | - Daniele Mazzei
- Department of Computer Science, University of Pisa, 56126 Pisa, Italy
- Zerynth, 56124 Pisa, Italy
| |
Collapse
|
6
|
Noor-A-Rahim M, John J, Firyaguna F, Sherazi HHR, Kushch S, Vijayan A, O’Connell E, Pesch D, O’Flynn B, O’Brien W, Hayes M, Armstrong E. Wireless Communications for Smart Manufacturing and Industrial IoT: Existing Technologies, 5G and Beyond. Sensors (Basel) 2022; 23:s23010073. [PMID: 36616671 PMCID: PMC9824593 DOI: 10.3390/s23010073] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/25/2022] [Revised: 12/09/2022] [Accepted: 12/12/2022] [Indexed: 06/12/2023]
Abstract
Smart manufacturing is a vision and major driver for change in today's industry. The goal of smart manufacturing is to optimize manufacturing processes through constantly monitoring, controlling, and adapting processes towards more efficient and personalised manufacturing. This requires and relies on technologies for connected machines incorporating a variety of computation, sensing, actuation, and machine to machine communications modalities. As such, understanding the change towards smart manufacturing requires knowledge of the enabling technologies, their applications in real world scenarios and the communication protocols and their performance to meet application requirements. Particularly, wireless communication is becoming an integral part of modern smart manufacturing and is expected to play an important role in achieving the goals of smart manufacturing. This paper presents an extensive review of wireless communication protocols currently applied in manufacturing environments and provides a comprehensive review of the associated use cases whilst defining their expected impact on the future of smart manufacturing. Based on the review, we point out a number of open challenges and directions for future research in wireless communication technologies for smart manufacturing.
Collapse
Affiliation(s)
- Md. Noor-A-Rahim
- School of Computer Science and Information Technology, University College Cork, Cork T12 R229, Ireland
| | - Jobish John
- School of Computer Science and Information Technology, University College Cork, Cork T12 R229, Ireland
| | - Fadhil Firyaguna
- School of Computer Science and Information Technology, University College Cork, Cork T12 R229, Ireland
| | | | - Sergii Kushch
- Department of Electronic and Computer Engineering, University of Limerick, Limerick V94 T9PX, Ireland
| | - Aswathi Vijayan
- School of Computer Science and Information Technology, University College Cork, Cork T12 R229, Ireland
| | - Eoin O’Connell
- Department of Electronic and Computer Engineering, University of Limerick, Limerick V94 T9PX, Ireland
| | - Dirk Pesch
- School of Computer Science and Information Technology, University College Cork, Cork T12 R229, Ireland
| | - Brendan O’Flynn
- Tyndall National Institute, University College Cork, Cork T12 R5CP, Ireland
| | - William O’Brien
- Department of Electronic and Computer Engineering, University of Limerick, Limerick V94 T9PX, Ireland
| | - Martin Hayes
- Department of Electronic and Computer Engineering, University of Limerick, Limerick V94 T9PX, Ireland
| | | |
Collapse
|
7
|
Frankó A, Hollósi G, Ficzere D, Varga P. Applied Machine Learning for IIoT and Smart Production-Methods to Improve Production Quality, Safety and Sustainability. Sensors (Basel) 2022; 22:s22239148. [PMID: 36501848 PMCID: PMC9739236 DOI: 10.3390/s22239148] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/07/2022] [Revised: 11/20/2022] [Accepted: 11/21/2022] [Indexed: 06/12/2023]
Abstract
Industrial IoT (IIoT) has revolutionized production by making data available to stakeholders at many levels much faster, with much greater granularity than ever before. When it comes to smart production, the aim of analyzing the collected data is usually to achieve greater efficiency in general, which includes increasing production but decreasing waste and using less energy. Furthermore, the boost in communication provided by IIoT requires special attention to increased levels of safety and security. The growth in machine learning (ML) capabilities in the last few years has affected smart production in many ways. The current paper provides an overview of applying various machine learning techniques for IIoT, smart production, and maintenance, especially in terms of safety, security, asset localization, quality assurance and sustainability aspects. The approach of the paper is to provide a comprehensive overview on the ML methods from an application point of view, hence each domain-namely security and safety, asset localization, quality control, maintenance-has a dedicated chapter, with a concluding table on the typical ML techniques and the related references. The paper summarizes lessons learned, and identifies research gaps and directions for future work.
Collapse
|
8
|
Zhang L, Gu Y, Wang R, Yu K, Pang Z, Li Y, Vucetic B. Enabling Real-Time Quality-of-Service and Fine-Grained Aggregation for Wireless TSN. Sensors (Basel) 2022; 22:3901. [PMID: 35632308 DOI: 10.3390/s22103901] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/07/2022] [Revised: 05/14/2022] [Accepted: 05/18/2022] [Indexed: 11/17/2022]
Abstract
Wireless Time-Sensitive Networking (WTSN) has emerged as a promising technology for Industrial Internet of Things (IIoT) applications. To meet the latency requirements of WTSN, wireless local area network (WLAN) such as IEEE 802.11 protocol with the time division multiple access (TDMA) mechanism is shown to be a practical solution. In this paper, we propose the RT-WiFiQA protocol with two novel schemes to improve the latency and reliability performance: real-time quality of service (RT-QoS) and fine-grained aggregation (FGA) for TDMA-based 802.11 systems. The RT-QoS is designed to guarantee the quality-of-service requirements of different traffic and to support the FGA mechanism. The FGA mechanism aggregates frames for different stations to reduce the physical layer transmission overhead. The trade-off between the reliability and FGA packet size is analyzed with numerical results. Specifically, we derive a critical threshold such that the FGA can achieve higher reliability when the aggregated packet size is smaller than the critical threshold. Otherwise, the non-aggregation scheme outperforms the FGA scheme. Extensive experiments are conducted on the commercial off-the-shelf 802.11 interface. The experiment results show that compared with the existing TDMA-based 802.11 system, the developed RT-WiFiQA protocol can achieve deterministic bounded real-time latency and greatly improves the reliability performance.
Collapse
|
9
|
Liu Y, Mousavi S, Pang Z, Ni Z, Karlsson M, Gong S. Plant Factory: A New Playground of Industrial Communication and Computing. Sensors (Basel) 2021; 22:147. [PMID: 35009690 PMCID: PMC8749569 DOI: 10.3390/s22010147] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/30/2021] [Revised: 12/17/2021] [Accepted: 12/21/2021] [Indexed: 06/14/2023]
Abstract
Plant Factory is a newly emerging industry aiming at transforming crop production to an unprecedented model by leveraging industrial automation and informatics. However, today's plant factory and vertical farming industry are still in a primitive phase, and existing industrial cyber-physical systems are not optimal for a plant factory due to diverse application requirements on communication, computing and artificial intelligence. In this paper, we review use cases and requirements for future plant factories, and then dedicate an architecture that incorporates the communication and computing domains to plant factories with a preliminary proof-of-concept, which has been validated by both academic and industrial practices. We also call for a holistic co-design methodology that crosses the boundaries of communication, computing and artificial intelligence disciplines to guarantee the completeness of solution design and to speed up engineering implementation of plant factories and other industries sharing the same demands.
Collapse
Affiliation(s)
- Yu Liu
- Department of Science and Technology, Campus Norrköping, Linköping University, 60221 Norrköping, Sweden; (Y.L.); (Z.N.); (M.K.)
| | | | - Zhibo Pang
- ABB Corporate Research, 72226 Västerås, Sweden;
| | - Zhongjun Ni
- Department of Science and Technology, Campus Norrköping, Linköping University, 60221 Norrköping, Sweden; (Y.L.); (Z.N.); (M.K.)
| | - Magnus Karlsson
- Department of Science and Technology, Campus Norrköping, Linköping University, 60221 Norrköping, Sweden; (Y.L.); (Z.N.); (M.K.)
| | - Shaofang Gong
- Department of Science and Technology, Campus Norrköping, Linköping University, 60221 Norrköping, Sweden; (Y.L.); (Z.N.); (M.K.)
| |
Collapse
|
10
|
Zubair Islam M, Shahzad, Ali R, Haider A, Kim H. IoTactileSim: A Virtual Testbed for Tactile Industrial Internet of Things Services. Sensors (Basel) 2021; 21:8363. [PMID: 34960454 DOI: 10.3390/s21248363] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/10/2021] [Revised: 12/07/2021] [Accepted: 12/13/2021] [Indexed: 11/17/2022]
Abstract
With the inclusion of tactile Internet (TI) in the industrial sector, we are at the doorstep of the tactile Industrial Internet of Things (IIoT). This provides the ability for the human operator to control and manipulate remote industrial environments in real-time. The TI use cases in IIoT demand a communication network, including ultra-low latency, ultra-high reliability, availability, and security. Additionally, the lack of the tactile IIoT testbed has made it more severe to investigate and improve the quality of services (QoS) for tactile IIoT applications. In this work, we propose a virtual testbed called IoTactileSim, that offers implementation, investigation, and management for QoS provisioning in tactile IIoT services. IoTactileSim utilizes a network emulator Mininet and robotic simulator CoppeliaSim to perform real-time haptic teleoperations in virtual and physical environments. It provides the real-time monitoring of the implemented technology parametric values, network impairments (delay, packet loss), and data flow between operator (master domain) and teleoperator (slave domain). Finally, we investigate the results of two tactile IIoT environments to prove the potential of the proposed IoTactileSim testbed.
Collapse
|
11
|
Kiedrowski P, Marciniak B. Pass/Fail Quality Assessment in Last Mile Smart Metering Networks Based on PRIME Interface. Sensors (Basel) 2021; 21:s21227444. [PMID: 34833519 PMCID: PMC8619238 DOI: 10.3390/s21227444] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/02/2021] [Revised: 10/06/2021] [Accepted: 11/07/2021] [Indexed: 11/16/2022]
Abstract
The pass/fail form is one of the presentation methods of quality assessment results. The authors, as part of a research team, participated in the process of creating the PRIME interface analyzer. The PRIME interface is a standardized interface—considered as communication technology for smart metering wired networks, which are specific kinds of sensor networks. The frame error ratio (FER) assessment and its presentation in the pass/fail form was one of the problems that needed to be solves in the PRIME analyzer project. In this paper, the authors present their method of a unified FER assessment, which was implemented in the PRIME analyzer, as one of its many functionalities. The need for FER unification is the result of using different modulation types and an optional forward error correction mechanism in the PRIME interface. Having one unified FER and a threshold value makes it possible to present measurement results in the pass/fail form. For FER unification, the characteristics of FER vs. signal-to-noise ratio, for all modulations implemented in PRIME, were used in the proposed algorithm (and some are presented in this paper). In communication systems, the FER value is used to forecast the quality of a link or service, but using PLC technology, forecasting is highly uncertain due to the main noise. The presentation of the measurement results in the pass/fail form is important because it allows unskilled staff to make many laborious measurements in last mile smart metering networks.
Collapse
|
12
|
Dhirani LL, Armstrong E, Newe T. Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap. Sensors (Basel) 2021; 21:3901. [PMID: 34198727 DOI: 10.3390/s21113901] [Citation(s) in RCA: 22] [Impact Index Per Article: 7.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/11/2021] [Revised: 06/03/2021] [Accepted: 06/03/2021] [Indexed: 11/17/2022]
Abstract
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.
Collapse
|
13
|
Umair M, Cheema MA, Cheema O, Li H, Lu H. Impact of COVID-19 on IoT Adoption in Healthcare, Smart Homes, Smart Buildings, Smart Cities, Transportation and Industrial IoT. Sensors (Basel) 2021; 21:3838. [PMID: 34206120 PMCID: PMC8199516 DOI: 10.3390/s21113838] [Citation(s) in RCA: 34] [Impact Index Per Article: 11.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/12/2021] [Revised: 05/25/2021] [Accepted: 05/28/2021] [Indexed: 12/23/2022]
Abstract
COVID-19 has disrupted normal life and has enforced a substantial change in the policies, priorities and activities of individuals, organisations and governments. These changes are proving to be a catalyst for technology and innovation. In this paper, we discuss the pandemic's potential impact on the adoption of the Internet of Things (IoT) in various broad sectors, namely healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT. Our perspective and forecast of this impact on IoT adoption is based on a thorough research literature review, a careful examination of reports from leading consulting firms and interactions with several industry experts. For each of these sectors, we also provide the details of notable IoT initiatives taken in the wake of COVID-19. We also highlight the challenges that need to be addressed and important research directions that will facilitate accelerated IoT adoption.
Collapse
Affiliation(s)
- Muhammad Umair
- Department of Electrical, Electronics and Telecommunication Engineering, New Campus, University of Engineering and Technology, Lahore, Punjab 54890, Pakistan;
| | - Muhammad Aamir Cheema
- Faculty of Information Technology, Monash University, Wellington Rd, Clayton, VIC 3800, Australia
| | - Omer Cheema
- IoT Wi-Fi Business Unit, Dialog Semiconductor, Green Park Reading RG2 6GP, UK;
| | - Huan Li
- Department of Computer Science, Aalborg University, Fredrik Bajers Vej 7K, 9220 Aalborg Øst, Denmark;
| | - Hua Lu
- Department of People and Technology, Roskilde University, Universitetsvej 1, 4000 Roskilde, Denmark;
| |
Collapse
|
14
|
Bruniaux A, Koutsiamanis RA, Papadopoulos GZ, Montavont N. Defragmenting the 6LoWPAN Fragmentation Landscape: A Performance Evaluation. Sensors (Basel) 2021; 21:s21051711. [PMID: 33801306 PMCID: PMC7958323 DOI: 10.3390/s21051711] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2020] [Revised: 02/05/2021] [Accepted: 02/18/2021] [Indexed: 12/05/2022]
Abstract
The emergence of the Internet of Things (IoT) has made wireless connectivity ubiquitous and necessary. Extending the IoT to the Industrial Internet of Things (IIoT) places significant demands in terms of reliability on wireless connectivity. The Institute of Electrical and Electronics Engineers (IEEE) Std 802.15.4-2015 standard was designed in response to these demands, and the IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) adaptation layer was introduced to address (among other issues) its payload size limitations by performing packet compression and fragmentation. However, the standardised method does not cope well with low link-quality situations and, thus, we present the state-of-the-art Forward Error Correction (FEC) methods and introduce our own contribution, Network Coding FEC (NCFEC), to improve performance in these situations. We present and analyse the existing methods as well as our own theoretically, and we then implement them and perform an experimental evaluation using the 6TiSCH simulator. The simulation results demonstrate that when high reliability is required and only low quality links are available, NCFEC performs best, with a trade-off between additional network and computational overhead. In situations where the link quality can be guaranteed to be higher, simpler solutions also start to be feasible, but with reduced adaptation flexibility.
Collapse
Affiliation(s)
- Amaury Bruniaux
- IMT Atlantique, IRISA, 35000 Rennes, France;
- Correspondence: (A.B.); (G.Z.P.)
| | | | | | | |
Collapse
|
15
|
Khalid H, Hashim SJ, Ahmad SMS, Hashim F, Chaudhary MA. SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems. Sensors (Basel) 2021; 21:s21041428. [PMID: 33670675 PMCID: PMC7922923 DOI: 10.3390/s21041428] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/20/2020] [Revised: 12/20/2020] [Accepted: 12/26/2020] [Indexed: 11/16/2022]
Abstract
The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.
Collapse
Affiliation(s)
- Haqi Khalid
- Department of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia, Serdang 43400, Malaysia; (S.M.S.A.); (F.H.)
- Correspondence: (H.K.); (S.J.H.)
| | - Shaiful Jahari Hashim
- Department of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia, Serdang 43400, Malaysia; (S.M.S.A.); (F.H.)
- Correspondence: (H.K.); (S.J.H.)
| | - Sharifah Mumtazah Syed Ahmad
- Department of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia, Serdang 43400, Malaysia; (S.M.S.A.); (F.H.)
| | - Fazirulhisyam Hashim
- Department of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia, Serdang 43400, Malaysia; (S.M.S.A.); (F.H.)
| | - Muhammad Akmal Chaudhary
- Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, Ajman 346, United Arab Emirates;
| |
Collapse
|
16
|
Minet P, Tanaka Y. Optimal Number of Message Transmissions forProbabilistic Guarantee of Latency in the IoT. Sensors (Basel) 2019; 19:s19183970. [PMID: 31540058 PMCID: PMC6767674 DOI: 10.3390/s19183970] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/01/2019] [Revised: 09/06/2019] [Accepted: 09/11/2019] [Indexed: 11/17/2022]
Abstract
The Internet of Things (IoT) is now experiencing its first phase of industrialization. Industrial companies are completing proofs of concept and many of them plan to invest in automation, flexibility and quality of production in their plants. Their use of a wireless network is conditioned upon its ability to meet three Key Performance Indicators (KPIs), namely a maximum acceptable end-to-end latency L, a targeted end-to-end reliability R and a minimum network lifetime T. The IoT network has to guarantee that at least R% of messages generated by sensor nodes are delivered to the sink with a latency ≤L, whereas the network lifetime is at least equal to T. In this paper, we show how to provide the targeted end-to-end reliability R by means of retransmissions to cope with the unreliability of wireless links. We present two methods to compute the maximum number of transmissions per message required to achieve R. MFair is very easy to compute, whereas MOpt minimizes the total number of transmissions necessary for a message to reach the sink. MFair and MOpt are then integrated into a TSCH network with a load-based scheduler to evaluate the three KPIs on a generic data-gathering application. We first consider a toy example with eight nodes where the maximum number of transmissions MaxTrans is tuned per link and per flow. Finally, a network of 50 nodes, representative of real network deployments, is evaluated assuming MaxTrans is fixed. For both TSCH networks, we show that MOpt provides a better reliability and a longer lifetime than MFair, which provides a shorter average end-to-end latency. MOpt provides more predictable end-to-end performances than Kausa, a KPI-aware, state-of-the-art scheduler.
Collapse
Affiliation(s)
- Pascale Minet
- Inria Research Center of Paris, 75012 Paris, France.
| | | |
Collapse
|
17
|
Derhab A, Guerroumi M, Gumaei A, Maglaras L, Ferrag MA, Mukherjee M, Khan FA. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors (Basel) 2019; 19:E3119. [PMID: 31311136 DOI: 10.3390/s19143119] [Citation(s) in RCA: 66] [Impact Index Per Article: 13.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/24/2019] [Revised: 06/05/2019] [Accepted: 07/12/2019] [Indexed: 11/17/2022]
Abstract
The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be adopted. In this paper, we focus on the security of commands in industrial IoT against forged commands and misrouting of commands. To this end, we propose a security architecture that integrates the Blockchain and the Software-defined network (SDN) technologies. The proposed security architecture is composed of: (a) an intrusion detection system, namely RSL-KNN, which combines the Random Subspace Learning (RSL) and K-Nearest Neighbor (KNN) to defend against the forged commands, which target the industrial control process, and (b) a Blockchain-based Integrity Checking System (BICS), which can prevent the misrouting attack, which tampers with the OpenFlow rules of the SDN-enabled industrial IoT systems. We test the proposed security solution on an Industrial Control System Cyber attack Dataset and on an experimental platform combining software-defined networking and blockchain technologies. The evaluation results demonstrate the effectiveness and efficiency of the proposed security solution.
Collapse
|
18
|
Cheng Y, Zhou H, Yang D. CA-CWA: Channel-Aware Contention Window Adaption in IEEE 802.11ah for Soft Real-Time Industrial Applications. Sensors (Basel) 2019; 19:s19133002. [PMID: 31288387 PMCID: PMC6651277 DOI: 10.3390/s19133002] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/12/2019] [Revised: 06/29/2019] [Accepted: 07/05/2019] [Indexed: 11/16/2022]
Abstract
In 2016, the IEEE task group ah (TGah) released a new standard called IEEE 802.11ah, and industrial Internet of Things (IoT) is one of its typical use cases. The restricted access window (RAW) is one of the core MAC mechanisms of IEEE 802.11ah, which aims to address the collision problem in the dense wireless networks. However, in each RAW period, stations still need to contend for the channel by Distributed Coordination Function and Enhanced Distributed Channel Access (DCF/EDCA), which cannot meet the real-time requirements of most industrial applications. In this paper, we propose a channel-aware contention window adaption (CA-CWA) algorithm. The algorithm dynamically adapts the contention window based on the channel status with an external interference discrimination ability, and improves the real-time performance of the IEEE 802.11ah. To validate the real-time performance of CA-CWA, we compared CA-CWA with two other backoff algorithms with an NS-3 simulator. The results illustrate that CA-CWA has better performance than the other two algorithms in terms of packet loss rate and average delay. Compared with the other two algorithms, CA-CWA is able to support industrial applications with higher deadline constraints under the same channel conditions in IEEE 802.11ah.
Collapse
Affiliation(s)
- Yujun Cheng
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
| | - Huachun Zhou
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
| | - Dong Yang
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
| |
Collapse
|
19
|
Tedeschi S, Emmanouilidis C, Mehnen J, Roy R. A Design Approach to IoT Endpoint Security for Production Machinery Monitoring. Sensors (Basel) 2019; 19:E2355. [PMID: 31121892 DOI: 10.3390/s19102355] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/09/2019] [Revised: 05/13/2019] [Accepted: 05/16/2019] [Indexed: 11/17/2022]
Abstract
The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments.
Collapse
|
20
|
Raposo D, Rodrigues A, Sinche S, Silva JS, Boavida F. Industrial IoT Monitoring: Technologies and Architecture Proposal. Sensors (Basel) 2018; 18:s18103568. [PMID: 30347883 PMCID: PMC6210632 DOI: 10.3390/s18103568] [Citation(s) in RCA: 40] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/12/2018] [Revised: 10/09/2018] [Accepted: 10/16/2018] [Indexed: 12/03/2022]
Abstract
Dependability and standardization are essential to the adoption of Wireless Sensor Networks (WSN) in industrial applications. Standards such as ZigBee, WirelessHART, ISA100.11a and WIA-PA are, nowadays, at the basis of the main process-automation technologies. However, despite the success of these standards, management of WSNs is still an open topic, which clearly is an obstacle to dependability. Existing diagnostic tools are mostly application- or problem-specific, and do not support standard-based multi-network monitoring. This paper proposes a WSN monitoring architecture for process-automation technologies that addresses the mentioned limitations. Specifically, the architecture has low impact on sensor node resources, uses network metrics already available in industrial standards, and takes advantage of widely used management standards to share the monitoring information. The proposed architecture was validated through prototyping, and the obtained performance results are presented and discussed in the final part of the paper. In addition to proposing a monitoring architecture, the paper provides an in-depth insight into metrics, techniques, management protocols, and standards applicable to industrial WSNs.
Collapse
Affiliation(s)
- Duarte Raposo
- Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal.
| | - André Rodrigues
- Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal.
- Polytechnic Institute of Coimbra, ISCAC, Coimbra 3040-316, Portugal.
| | - Soraya Sinche
- Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal.
- DETRI, Escuela Politécnica Nacional, Quito 170517, Ecuador.
| | - Jorge Sá Silva
- Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal.
| | - Fernando Boavida
- Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal.
| |
Collapse
|
21
|
Li W, Wang B, Sheng J, Dong K, Li Z, Hu Y. A Resource Service Model in the Industrial IoT System Based on Transparent Computing. Sensors (Basel) 2018; 18:E981. [PMID: 29587450 DOI: 10.3390/s18040981] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2018] [Revised: 03/14/2018] [Accepted: 03/21/2018] [Indexed: 11/17/2022]
Abstract
The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.
Collapse
|