blog




  • Essay / Industrial Internet of Things (IoT) as the most popular industrial technical paradigm and business concept

    Table of ContentsBackgroundRelated WorkSecurity and Privacy ChallengesQuality of ServiceObjectiveApproach and MethodologyBackground In recent years, the Industrial Internet of Things objects (industrial IoT) has become the most popular industrial technical paradigms and business concepts. With the continued integration of emerging information and communication technologies (ICT), the industry is expected to experience a revolution in the way it operates towards autonomy (Meng Z. et al, 2017). The envisioned industrial systems can potentially enhance collaborative practices, which promises greater production flexibility and product variability with minimized human interventions. For example, new services such as real-time event processing or 24/7 access to tracking information will be introduced into the supply chain (Sanchez-Iborra, R. Cano, M. 2016). Having an in-depth monitoring system deployed throughout the manufacturing and supply chain helps enrich the entire value chain with valuable information, minimize losses in the event of unexpected events and thus improve both business processes and the exchange of information between stakeholders (Business-to-Business (B2B). networks) (Stock, T. Seliger, G. 2016). Industrial IoT integrates machine learning and big data technology, leveraging sensor data machine-2-machine (M2M) communication and automation technologies that have existed in industrial environments for years. What is changing is that the concept of industrial IoT is pushing the automation sector to ensure greater interoperability of its products. This means that it is time to find standards to apply to these technologies and their applications. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay Related Work Industrial IoT analysis through modeling should be considered as the best method of study for a better understanding of the challenges imposed by such systems. Since industrial IoT modeling is linked to a broad context, we categorize the related works into the following categories from i to iv i. Industrial IoT Research Trends Gubbi et al. present a cloud-centric vision for implementing industrial IoT worldwide. They discuss core technologies and application areas that can define the future direction of IoT research. While Jara et al. examine the challenges and opportunities of extending the public IPv4 address space for the Internet of Things through IPv6 to support IoT capabilities. Sallai, G. first summarizes the challenges of today's Internet and outlines recent visions and capabilities of the Internet of the future, then Sallai, G. identifies groups of relevant research topics by defining them as the chapters of research activities on the future Internet in a layered model. It includes fundamental research on Internet science, Internet engineering to future Internet applications and experiences. Wireless sensor networks (WSNs) provide a virtual layer in which data about the physical world can be retrieved by any computing system. Alcaraz et al. point out that WSNs are an invaluable resource for realizing the IoT vision in terms of integration, security and other issues. Gathering, modeling, reasoning, and distributing contextbased on sensor data as well as context-aware computing play a vital role in IoT applications. Security and Privacy Challenges Babar et al. provide analysis of IoT in the context of security, privacy and privacy issues and propose the security model for IoT (Babar et al. perform analyzes of Internet of Things with respect to security , privacy and confidentiality and propose the security model for the Internet of Things.). Weber considers new security and privacy challenges arising from international legislation relating to the right to information, provisions prohibiting or otherwise limiting the use rules of computer security legislation, supporting the mechanisms for using IoT (Weber considers new security and data protection challenges arising from international law in relation to the right to information, provisions prohibiting or otherwise restricting the application of rules of IT security law, in support of IoT use mechanisms.). Skarmeta et al. propose a capacity-based distributed access control mechanism. The latter relies on public key cryptography in order to respond to certain security and confidentiality issues in the IoT. Their solution uses the optimized elliptic curve digital signature algorithm inside the smart object. Slavin et al. present security requirements models that represent reusable security practices that software engineers can apply to improve the security of their systems. The paper proposes a new method that combines a survey cycle-based approach with feature diagram scoring to examine only relevant models and quickly select security requirements models. models most appropriate to the situation (1 Skarmeta et al. propose a distributed and capacity-based access control mechanism. The latter relies on public key cryptography to address certain security and confidentiality problems on The Internet of Things solution uses the digitally optimized elliptic curve signature algorithm in the smart object. Slavin et al. provide security requirements models that represent reusable security practices that software engineers can apply. to improve the security of their systems The paper proposes a new method that combines a review cycle approach with feature diagram scoring to examine only relevant models and quickly select the most appropriate ones for the situation.)(2 Skarmeta. et al. propose a distributed and capacity-based access control mechanism It relies on public key encryption to solve some security and privacy problems in the Internet of Things. Your solution uses the optimized elliptic curve digital signature algorithm in the smart object. Slavin et al. provide security requirements models that represent reusable security practices that software engineers can apply to improve the security of their systems. The paper proposes a new method that combines a review cycle approach with feature diagram notation to review only relevant models and quickly select those that are best suited to the situation. Heer et al. discuss problems and possibilities of application of known Internet protocols and security solutions in IoT. The authors also describe the deployment model and key security requirements andhighlight technical restrictions specific to standard IP security protocols. (Heer et al. discuss the problems and possibilities of applying known Internet protocols and security solutions in IoT. The authors also describe the implementation model and basic security requirements and focus on technical limitations standard IP security protocols.) Security and Privacy Energy Issues within IoT Energy Consumption (EC) is the key issue in IoT. Zhou et al. describe the energy models (EM) of the central parts of the WSN node, such as processors, radio frequency modules and sensors. The basis of EM is the event triggering mechanism. The authors first simulate the node components and then estimate the EC of network protocols using this EM. The model presented here is suitable for WSN EC analysis, network protocol evaluation, and WSN application development. Schmidt et al. describes a method for building models for sensor nodes based on a few simple measurements. They provide an example where models are integrated into a simulation environment within the proposed execution framework to support the model-driven design process. The measurements show that the proposed model can significantly reduce the EC. Lanzisera et al. propose a “communicating power supply” (CPS) to enable communication of energy and control information between the device and a building management system. Friedman and Krivolapov describe a study that addresses a combined effect of power and throughput performance of using Bluetooth and Wi-Fi in smartphones. The study reveals interesting effects and trade-offs. In particular, the paper identifies many situations in which Wi-Fi is superior to Bluetooth, contradicting previous reports. The study also identifies some scenarios best handled by Bluetooth. The findings of this study provide preferred modes of use that could be of interest to researchers and smartphone developers. Venckauskas et al. present the configurable IoT prototype unit that allows performing various experiments to determine the relationship between energy and security in different modes of the IoT unit. The paper also presents a methodology for measuring IoT unit energy. When applied, the methodology provides results in two different modes: ideal (without noise effect in a communication environment where the IoT unit operates) and real (with noise effect). (Energy consumption (EC) is a major problem for IoT. Zhou et al. a description of the energy models (EM) of the core parts of the WSN node such as processors, radio frequency modules and sensors. EM is event-based activation mechanism The authors first simulate the node components and then evaluate the EC network protocol using this EM model presented here is suitable for EC WSN analysis, evaluation. of the network protocol and the development of WSN applications based on a few simple measurements. They form a sample in which the models are integrated into a simulation environment within the proposed execution framework to support the design. model-based measurements show that the proposed model achieves a significant reduction in EC. et al. propose a “communication power supply” (CPS) to enable communication of power and control information between the device. and building management system... Friedman and Krivolapov describe a study that addresses the combined effect of energy and bandwidth usage. of..