scholarly journals On the Use of LoRaWAN for Indoor Industrial IoT Applications

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Michele Luvisotto ◽  
Federico Tramarin ◽  
Lorenzo Vangelista ◽  
Stefano Vitturi

Low-Power Wide-Area Networks (LPWANs) have recently emerged as appealing communication systems in the context of the Internet of Things (IoT). Particularly, they proved effective in typical IoT applications such as environmental monitoring and smart metering. Such networks, however, have a great potential also in the industrial scenario and, hence, in the context of the Industrial Internet of Things (IIoT), which represents a dramatically growing field of application. In this paper we focus on a specific LPWAN, namely, LoRaWAN, and provide an assessment of its performance for typical IIoT employments such as those represented by indoor industrial monitoring applications. In detail, after a general description of LoRaWAN, we discuss how to set some of its parameters in order to achieve the best performance in the considered industrial scenario. Subsequently we present the outcomes of a performance assessment, based on realistic simulations, aimed at evaluating the behavior of LoRaWAN for industrial monitoring applications. Moreover, the paper proposes a comparison with the IEEE 802.15.4 network protocol, which is often adopted in similar application contexts. The obtained results confirm that LoRaWAN can be considered as a strongly viable opportunity, since it is able to provide high reliability and timeliness, while ensuring very low energy consumption.

Author(s):  
G. Rama Subba Reddy ◽  
K. Rangaswamy ◽  
Malla Sudhakara ◽  
Pole Anjaiah ◽  
K. Reddy Madhavi

Internet of things (IoT) has given a promising chance to construct amazing industrial frameworks and applications by utilizing wireless and sensor devices. To support IIoT benefits efficiently, fog computing is typically considered as one of the potential solutions. Be that as it may, IIoT services still experience issues such as high-latency and unreliable connections between cloud and terminals of IIoT. In addition to this, numerous security and privacy issues are raised and affect the users of the distributed computing environment. With an end goal to understand the improvement of IoT in industries, this chapter presents the current research of IoT along with the key enabling technologies. Further, the architecture and features of fog computing towards the fog-assisted IoT applications are presented. In addition to this, security and protection threats along with safety measures towards the IIoT applications are discussed.


2019 ◽  
Vol 9 (20) ◽  
pp. 4323 ◽  
Author(s):  
López de Lacalle ◽  
Posada

The new advances of IIOT (Industrial Internet of Things), together with the progress in visual computing technologies, are being addressed by the research community with interesting approaches and results in the Industry 4.0 domain[...]


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1971 ◽  
Author(s):  
Sangrez Khan ◽  
Ahmad Naseem Alvi ◽  
Muhammad Awais Javed ◽  
Byeong-hee Roh ◽  
Jehad Ali

Internet of Things (IoT) is a promising technology that uses wireless sensor networks to enable data collection, monitoring, and transmission from the physical devices to the Internet. Due to its potential large scale usage, efficient routing and Medium Access Control (MAC) techniques are vital to meet various application requirements. Most of the IoT applications need low data rate and low powered wireless transmissions and IEEE 802.15.4 standard is mostly used in this regard which offers superframe structure at the MAC layer. However, for IoT applications where nodes have adaptive data traffic, the standard has some limitations such as bandwidth wastage and latency. In this paper, a new superframe structure is proposed that is backward compatible with the existing parameters of the standard. The proposed superframe overcomes limitations of the standard by fine-tuning its superframe structure and squeezing the size of its contention-free slots. Thus, the proposed superframe adjusts its duty cycle according to the traffic requirements and accommodates more nodes in a superframe structure. The analytical results show that our proposed superframe structure has almost 50% less delay, accommodate more nodes and has better link utilization in a superframe as compared to the IEEE 802.15.4 standard.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2449
Author(s):  
Jin Qi ◽  
Zian Wang ◽  
Bin Xu ◽  
Mengfei Wu ◽  
Zian Gao ◽  
...  

The adaptive coordination of trust services can provide highly dependable and personalized solutions for industrial requirements in the service-oriented industrial internet of things (IIoT) architecture to achieve efficient utilization of service resources. Although great progress has been made, trust service coordination still faces challenging problems such as trustless industry service, poor coordination, and quality of service (QoS) personalized demand. In this paper, we propose a QoS-driven and adaptive trust service coordination method to implement Pareto-efficient allocation of limited industrial service resources in the background of the IIoT. First, we established a Pareto-effective and adaptive industrial IoT trust service coordination model and introduced a blockchain-based adaptive trust evaluation mechanism to achieve trust evaluation of industrial services. Then, taking advantage of a large and complex search space for solution efficiency, we introduced and compared multi-objective gray-wolf algorithms with the particle swarm optimization (PSO) and dragonfly algorithms. The experimental results showed that by judging and blacklisting malicious raters quickly and accurately, our model can efficiently realize self-adaptive, personalized, and intelligent trust service coordination under the given constraints, improving not only the response time, but also the success rate in coordination.


2021 ◽  
Vol 11 (2) ◽  
pp. 88-101
Author(s):  
Ibrahim Cil ◽  
Fahri Arisoy ◽  
Hilal Kilinc

Industrial Internet of Things is becoming one of the fundamental technologies with the potential to be widely used in shipyards as in other industries to increase information visibility. This article aims to analyze how to develop an industrial IoT-enabled system that provides visibility and tracking of assets at SEDEF Shipyard, which is in the digital transformation process. The research made use of data from previous studies and by using content analysis, the findings were discussed. Industrial IoT enables the collection and analysis of data for more informed decisions.  Based on the findings, sensor data in the shipyard are transmitted to the cloud via connected networks. These data are analysed and combined with other information and presented to the stakeholders. Industrial IoT enables this data flow and monitors processes remotely and gives the ability to quickly change plans as needed. Keywords: Shipyard, Industrial Internet of Things, Cyber-Physical System, Visibility, Assets tracking;        


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8363
Author(s):  
Muhammad Zubair Islam ◽  
Shahzad ◽  
Rashid Ali ◽  
Amir Haider ◽  
Hyungseok Kim

With the inclusion of tactile Internet (TI) in the industrial sector, we are at the doorstep of the tactile Industrial Internet of Things (IIoT). This provides the ability for the human operator to control and manipulate remote industrial environments in real-time. The TI use cases in IIoT demand a communication network, including ultra-low latency, ultra-high reliability, availability, and security. Additionally, the lack of the tactile IIoT testbed has made it more severe to investigate and improve the quality of services (QoS) for tactile IIoT applications. In this work, we propose a virtual testbed called IoTactileSim, that offers implementation, investigation, and management for QoS provisioning in tactile IIoT services. IoTactileSim utilizes a network emulator Mininet and robotic simulator CoppeliaSim to perform real-time haptic teleoperations in virtual and physical environments. It provides the real-time monitoring of the implemented technology parametric values, network impairments (delay, packet loss), and data flow between operator (master domain) and teleoperator (slave domain). Finally, we investigate the results of two tactile IIoT environments to prove the potential of the proposed IoTactileSim testbed.


2021 ◽  
Author(s):  
Xiaoyu Hao ◽  
Ruohai Zhao ◽  
Tao Yang ◽  
Yulin Hu ◽  
Bo Hu ◽  
...  

Abstract Edge computing has become one of the key enablers for ultra-reliable and low-latency communications in the industrial Internet of Things in the fifth generation communication systems, and is also a promising technology in the future sixth generation communication systems. In this work, we consider the application of edge computing to smart factories for mission-critical task offloading through wireless links. In such scenarios, although high end-to-end delays from the generation to completion of tasks happen with low probability, they may incur severe casualties and property loss, and should be seriously treated. Inspired by the risk management theory widely used in finance, we adopt the Conditional Value at Risk to capture the tail of the delay distribution. An upper bound of the Conditional Value at Risk is derived through analysis of the queues both at the devices and the edge computing servers. We aim to find out the optimal offloading policy taking into consideration both the average and the worst case delay performance of the system. Given that the formulated optimization problem is a non-convex mixed integer non-linear programming problem, a decomposition into sub-problems is performed and a two-stage heuristic algorithm is proposed. Simulation results validate our analysis and indicate that the proposed algorithm can reduce the risk in both the queueing and end-to-end delay.


Sign in / Sign up

Export Citation Format

Share Document