scholarly journals Industry 4.0: Smart Contract-based Industrial Internet of Things Process Management

Author(s):  
Charles Garrocho ◽  
Celio Marcio Soares Ferreira ◽  
Ailton Junior ◽  
Carlos Frederico Cavalcanti ◽  
Ricardo R. Oliveira

Through the Industrial Internet of Things (IIoT), a smart factory has entered the boom period expecting significant investments. In this new environment, Machine-to-Machine (M2M) communication has shown immediate potential in IIoT applications. However, most M2M communication implementations use the centralized model in which it requires a reliable intermediary for transactions between machines. Using smart contracts in M2M communication would allow a decentralized network to be used without the need for a trusted intermediary. In order to provide security, privacy, and decentralization in M2M communication and IIoT processes, a middleware based on a smart contract is proposed. Such a proposal is analyzed at the industrial level and evaluated for impacts against the stringent communication requirements that industrial applications require. Experimental results show that the application of smart contracts offers greater security and privacy than traditional proposals, but time requirements of real-time systems must still be optimized for smart contracts to be applied at the industrial field.

2019 ◽  
Vol 11 (3) ◽  
pp. 66 ◽  
Author(s):  
Samer Jaloudi

Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6647
Author(s):  
Soo Fun Tan ◽  
Azman Samsudin

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 152351-152366 ◽  
Author(s):  
Teklay Gebremichael ◽  
Lehlogonolo P. I. Ledwaba ◽  
Mohamed H. Eldefrawy ◽  
Gerhard P. Hancke ◽  
Nuno Pereira ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document