scholarly journals On the performance of OPC UA and MQTT for data exchange between industrial plants and cloud servers

ACTA IMEKO ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 80 ◽  
Author(s):  
Murilo Silveira Rocha ◽  
Guilherme Serpa Sestito ◽  
Andre Luis Dias ◽  
Alfonso Celso Turcato ◽  
Dennis Brandão ◽  
...  

The Internet of Things (IoT) is a key technology in the development of Industry 4.0. An increasing number of new industrial devices are expected to communicate with each other by means of local (edge) and cloud computing servers. In this article, two well-known protocols used for IoT and Industrial IoT (IIoT) are compared in terms of their performance when they are used to send/receive data to/from cloud servers. Due to their wide diffusion and suitability, the considered protocols are open platform communication-unified architecture publisher-subscriber (OPC UA PubSub) (purposely developed and maintained by industrial consortia) and message queuing telemetry transport (MQTT), the most well-known message protocol originally developed by IBM. The performance comparison is carried out considering the overall quantity of the data transferred (user payload plus overhead) and the roundtrip time required to send in data and receive a feedback message in return. The experimental results include the evaluation of several cloud computing server and application scenarios, highlighting how each protocol is particularly suitable for certain situations. Finally, conclusions about the best choice for data exchange between devices are given.

2022 ◽  
Vol 27 (1) ◽  
pp. 1-35 ◽  
Author(s):  
Nikolaos-Foivos Polychronou ◽  
Pierre-Henri Thevenon ◽  
Maxime Puys ◽  
Vincent Beroulle

With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry. To reduce costs related to the time required to develop these devices, security features are usually not considered. This situation creates a major security concern. Many solutions have been proposed to protect IoT/IIoT against various attacks, most of which are based on attacks involving physical access. However, a new class of attacks has emerged targeting hardware vulnerabilities in the micro-architecture that do not require physical access. We present attacks based on micro-architectural hardware vulnerabilities and the side effects they produce in the system. In addition, we present security mechanisms that can be implemented to address some of these attacks. Most of the security mechanisms target a small set of attack vectors or a single specific attack vector. As many attack vectors exist, solutions must be found to protect against a wide variety of threats. This survey aims to inform designers about the side effects related to attacks and detection mechanisms that have been described in the literature. For this purpose, we present two tables listing and classifying the side effects and detection mechanisms based on the given criteria.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7760
Author(s):  
Alexandru Ioana ◽  
Adrian Korodi

Continuing the evolution towards Industry 4.0, the industrial communication protocols represent a significant topic of interest, as real-time data exchange between multiple devices constitute the pillar of Industrial Internet of Things (IIoT) scenarios. Although the legacy protocols are still persistent in the industry, the transition was initiated by the key Industry 4.0 facilitating protocol, the Open Platform Communication Unified Architecture (OPC UA). OPC UA has to reach the envisioned applicability, and it therefore has to consider coexistence with other emerging real-time oriented protocols in the production lines. The Data Distribution Service (DDS) will certainly be present in future architectures in some areas as robots, co-bots, and compact units. The current paper proposes a solution to evaluate the real-time coexistence of OPC UA and DDS protocols, functioning in parallel and in a gateway context. The purpose is to confirm the compatibility and feasibility between the two protocols alongside a general definition of criteria and expectations from an architectural point of view, pointing out advantages and disadvantages in a neutral manner, shaping a comprehensive view of the possibilities. The researched architecture is meant to comply with both performance comparison scenarios and interaction scenarios over a gateway application. Considering the industrial tendencies, the developed solution is applied using non-ideal infrastructures to provide a more feasible and faster applicability in the production lines.


Cloud computing has become extremely popular. It is one of the fastest evolving technologies. It is mostly used in industrial IoT, where the data generated is huge. It has many advantages. But there are also a few security issues we have to deal with when it comes to using the cloud. Data plays a very significant role in cloud computing. But data breaching can collapse a business. Also, any third party can log in to these cloud servers and use the valuable data for various other purposes. So trustworthy security measures have to be taken, to make sure that the information is protected and misuse of data does not take place. A few biometric methods have been implemented, but it not very cost-effective. And since the data is stored on remote servers, the data can never be a hundred percent safe. A new system has to be implemented, which is both easy to execute and demands less cost. This paper discusses how Iris and Retina scanners can be put together to ensure the security of the data stored in the cloud servers.


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


2021 ◽  
pp. 1-15
Author(s):  
Mengyao Cui ◽  
Seung-Soo Baek ◽  
Rubén González Crespo ◽  
R. Premalatha

BACKGROUND: Health monitoring is important for early disease diagnosis and will reduce the discomfort and treatment expenses, which is very relevant in terms of prevention. The early diagnosis and treatment of multiple conditions will improve solutions to the patient’s healthcare radically. A concept model for the real-time patient tracking system is the primary goal of the method. The Internet of things (IoT) has made health systems accessible for programs based on the value of patient health. OBJECTIVE: In this paper, the IoT-based cloud computing for patient health monitoring framework (IoT-CCPHM), has been proposed for effective monitoring of the patients. METHOD: The emerging connected sensors and IoT devices monitor and test the cardiac speed, oxygen saturation percentage, body temperature, and patient’s eye movement. The collected data are used in the cloud database to evaluate the patient’s health, and the effects of all measures are stored. The IoT-CCPHM maintains that the medical record is processed in the cloud servers. RESULTS: The experimental results show that patient health monitoring is a reliable way to improve health effectively.


Author(s):  
Kai Zhang

With the development of emerging technology innovations such as the internet of things, classroom management has also shown an informatization trend. Among them, smart classrooms are an important part of the current university information environment construction. The purpose of this article is to build a smart classroom into an intelligent teaching environment with many functions such as intelligent perception and identification, real-time monitoring based on the internet of things technology and cloud computing technology. A questionnaire survey was conducted among freshman students in some majors, and interviews were conducted with the instructors. It was found that 92.19% of the students were satisfied with the classroom learning in the smart classroom environment, and most teachers thought that the teaching effect had been improved. Experiments have proven that the operation of smart classrooms based on the internet of things and cloud computing realizes the intelligence of teaching management services and improves the level of education informationization in schools.


Author(s):  
Leila Zemmouchi-Ghomari

Industry 4.0 is a technology-driven manufacturing process that heavily relies on technologies, such as the internet of things (IoT), cloud computing, web services, and big real-time data. Industry 4.0 has significant potential if the challenges currently being faced by introducing these technologies are effectively addressed. Some of these challenges consist of deficiencies in terms of interoperability and standardization. Semantic Web technologies can provide useful solutions for several problems in this new industrial era, such as systems integration and consistency checks of data processing and equipment assemblies and connections. This paper discusses what contribution the Semantic Web can make to Industry 4.0.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4053 ◽  
Author(s):  
Andrea Petroni ◽  
Francesca Cuomo ◽  
Leonisio Schepis ◽  
Mauro Biagi ◽  
Marco Listanti ◽  
...  

The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized. Furthermore, the incoming 5G technology promises significant enhancements concerning the Quality of Service (QoS) in mobile communications. Having billions of devices simultaneously connected has opened new challenges about network management and data exchange rules that need to be tailored to the characteristics of the considered scenario. A large part of the IoT market is pointing to Low-Power Wide-Area Networks (LPWANs) representing the infrastructure for several applications having energy saving as a mandatory goal besides other aspects of QoS. In this context, we propose a low-power IoT-oriented file synchronization protocol that, by dynamically optimizing the amount of data to be transferred, limits the device level of interaction within the network, therefore extending the battery life. This protocol can be adopted with different Layer 2 technologies and provides energy savings at the IoT device level that can be exploited by different applications.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ruoshui Liu ◽  
Jianghui Liu ◽  
Jingjie Zhang ◽  
Moli Zhang

Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. However, it keeps the data out of users' hands which would conventionally control and manage the data. Therefore, it becomes the key issue on how to ensure the integrity and reliability of the video data stored in the cloud for the provision of video streaming services to end users. This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. Specifically, we apply dynamic operation to video data stored in the cloud with the method of block tags, so that the integrity of the data can be successfully verified. The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.


Sign in / Sign up

Export Citation Format

Share Document