مدل های طراحی برای اینترنت اشیای صنعتی
ترجمه نشده

مدل های طراحی برای اینترنت اشیای صنعتی

عنوان فارسی مقاله: الگوهای طراحی برای اینترنت اشیای صنعتی
عنوان انگلیسی مقاله: Design Patterns for the Industrial Internet of Things
مجله/کنفرانس: کارگاه بین المللی IEEE در سیستم های ارتباطی کارخانه – IEEE International Workshop on Factory Communication Systems
رشته های تحصیلی مرتبط: مهندسی فناوری اطلاعات
گرایش های تحصیلی مرتبط: اینترنت و شبکه های گسترده
کلمات کلیدی فارسی: اینترنت اشیا صنعتی، IIoT، الگوهای طراحی، صنعت ۴٫۰
کلمات کلیدی انگلیسی: Internet of Things، Sensors، Cloud computing، Security، Wireless sensor networks، Industries
شناسه دیجیتال (DOI): https://doi.org/10.1109/WFCS.2018.8402353
دانشگاه: Electrical Engineering and Computer Science – Howard University – Washington – USA
صفحات مقاله انگلیسی: 10
ناشر: آی تریپل ای - IEEE
نوع مقاله: ISI
سال انتشار مقاله: 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: بله
کد محصول: E10531
فهرست مطالب (انگلیسی)

Abstract

I- INTRODUCTION

II- INTERNET OF THINGS (IOT) BACKGROUND

III- APPLICATIONS OF THE INDUSTRIAL IOT (IIOT)

IV- DESIGN PATTERNS IN THE INDUSTRIAL IOT

V- CORRELATION WITH THE IIOT REFERENCE ARCHITECTURE

VI-  RELATED WORK

VII- CONCLUSION AND FUTURE WORK

REFERENCES

بخشی از مقاله (انگلیسی)

Abstract

The Internet of Things (IoT) is a vast collection of interconnected sensors, devices, and services that share data and information over the Internet with the objective of leveraging multiple information sources to optimize related systems. The technologies associated with the IoT have significantly improved the quality of many existing applications by reducing costs, improving functionality, increasing access to resources, and enhancing automation. The adoption of IoT by industries has led to the next industrial revolution: Industry 4.0. The rise of the Industrial IoT (IIoT) promises to enhance factory management, process optimization, worker safety, and more. However, the rollout of the IIoT is not without significant issues, and many of these act as major barriers that prevent fully achieving the vision of Industry 4.0. One major area of concern is the security and privacy of the massive datasets that are captured and stored, which may leak information about intellectual property, trade secrets, and other competitive knowledge. As a way forward toward solving security and privacy concerns, we aim in this paper to identify common input-output (I/O) design patterns that exist in applications of the IIoT. These design patterns enable constructing an abstract model representation of data flow semantics used by such applications, and therefore better understand how to secure the information related to IIoT operations. In this paper, we describe communication protocols and identify common I/O design patterns for IIoT applications with an emphasis on data flow in edge devices, which, in the industrial control system (ICS) setting, are most often involved in process control or monitoring.

Introduction

Kevin Ashton (1999) first coined the phrase IoT for a system of linked devices. IoT has taken the initial advances of Internet technology to a new level, whereby every object in our environment will ultimately have its own unique identifier and be connected to all the other objects around us. Everyday goods, such as TV sets, fridge freezers, automobiles, and even clothing, will amass data regarding the ways in which they are being used; this data will be passed around the IoT, and devices will be instructed to behave in the most efficient and user-friendly fashion as determined by the analysis of that data [1]. Progress on the IoT has been rapid and is growing exponentially. By the year 2020, Gartner predicts that there will be 25 billion unique devices attached to the global IT infrastructure [2]. The fundamental basis of IoT is that many different devices have been set up so that they can be interrogated and manipulated via the Internet by human users themselves or by programs that mirror the aims and desires of those users. The IoT is already having a transformative effect on the way human beings interact, not only with their environment but also with each other. The ways in which we work, with our houses, vehicles, civil services, shops, factories, even weapons, will be changed dramatically. Healthcare, education, and resources will be offered in a swifter, more efficient fashion that is personalized to the consumer [1]. Companies like Walmart are already using radio-frequency identification (RFID) tags to manage their stock; this is an example of very basic IoT implementation [3]. As the number and complexity of connected devices grows, so does the chance of security vulnerabilities that can be exploited by hackers who attempt to manipulate connected devices to their own advantage. As with traditional computing systems, the majority of IoT security attacks will be launched through software; the fact that many different appliances will operate using very similar software makes it ripe for malicious actions to propagate and become widespread [4]. As such, making the IoT secure will be of fundamental concern.