industrial iot
Recently Published Documents


TOTAL DOCUMENTS

918
(FIVE YEARS 715)

H-INDEX

29
(FIVE YEARS 17)

2022 ◽  
Vol 137 ◽  
pp. 103591
Author(s):  
Ioannis T. Christou ◽  
Nikos Kefalakis ◽  
John K. Soldatos ◽  
Angela-Maria Despotopoulou

2023 ◽  
Vol 55 (1) ◽  
pp. 1-35
Author(s):  
Abhishek Hazra ◽  
Mainak Adhikari ◽  
Tarachand Amgoth ◽  
Satish Narayana Srirama

In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within the industry domain. Hence, the enactment of IoT in the industry magnifies effective optimization, authority, and data-driven judgment. However, this field undergoes several interoperable issues, including large numbers of heterogeneous IoT gadgets, tools, software, sensing, and processing components, joining through the Internet, despite the deficiency of communication protocols and standards. Recently, various interoperable protocols, platforms, standards, and technologies are enhanced and altered according to the specifications of the applicability in industrial applications. However, there are no recent survey papers that primarily examine various interoperability issues that Industrial IoT (IIoT) faces. In this review, we investigate the conventional and recent developments of relevant state-of-the-art IIoT technologies, frameworks, and solutions for facilitating interoperability between different IIoT components. We also discuss several interoperable IIoT standards, protocols, and models for digitizing the industrial revolution. Finally, we conclude this survey with an inherent discussion of open challenges and directions for future research.


2022 ◽  
Vol 27 (1) ◽  
pp. 1-35 ◽  
Author(s):  
Nikolaos-Foivos Polychronou ◽  
Pierre-Henri Thevenon ◽  
Maxime Puys ◽  
Vincent Beroulle

With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry. To reduce costs related to the time required to develop these devices, security features are usually not considered. This situation creates a major security concern. Many solutions have been proposed to protect IoT/IIoT against various attacks, most of which are based on attacks involving physical access. However, a new class of attacks has emerged targeting hardware vulnerabilities in the micro-architecture that do not require physical access. We present attacks based on micro-architectural hardware vulnerabilities and the side effects they produce in the system. In addition, we present security mechanisms that can be implemented to address some of these attacks. Most of the security mechanisms target a small set of attack vectors or a single specific attack vector. As many attack vectors exist, solutions must be found to protect against a wide variety of threats. This survey aims to inform designers about the side effects related to attacks and detection mechanisms that have been described in the literature. For this purpose, we present two tables listing and classifying the side effects and detection mechanisms based on the given criteria.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 591
Author(s):  
Yue Sun ◽  
Lu Leng ◽  
Zhe Jin ◽  
Byung-Gyu Kim

Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 572
Author(s):  
Aitizaz Ali ◽  
Mohammed Amin Almaiah ◽  
Fahima Hajjej ◽  
Muhammad Fermi Pasha ◽  
Ong Huey Fang ◽  
...  

The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system.


2022 ◽  
pp. 355-383
Author(s):  
Samyak Jain ◽  
K. Chandrasekaran

This chapter presents a comprehensive view of Industrial Automation using internet of things (IIoT). Advanced Industries are ushering in a new age of physical production backed by the information-based economy. The term Industrie 4.0 refers to the 4th paradigm shift in production, in which intelligent manufacturing technology is interconnected with physical machines. IIoT is basically a convergence of industrial systems with advanced, near-real-time computing and analytics, powered by low cost and low power sensing devices leveraging global internet connectivity. The key benefits of Industrial IoT systems are a) improved operational efficiency and productivity b) reduced maintenance costs c) improved asset utilization, monitoring and maintenance d) development of new business models e) product innovation and f) enhanced safety. Key parameters that impact Industrial Automation are a) Security b) Data Integrity c) Interoperability d) Latency e) Scalability, Reliability, and Availability f) Fault tolerance and Safety, and g) Maintainability, Serviceability, and Programmability.


2022 ◽  
Vol 2161 (1) ◽  
pp. 012001
Author(s):  
Harshit Sharma ◽  
G Sumathi

Abstract The Covid -19 is arguably the biggest pandemic in history and there are a lot of challenges that must be dealt with. One of the biggest challenges post Covid-19 is to tackle quality control challenges. This research paper discusses some of these challenges and solutions using an integrated internet of things (IoT) and internet of protocols (IoP) based approach and further showing its implementation in the industry world and hence, proving to be a solution for damage assessment. With the help of IoT- enabled quality control system, six-sigma rule is also analysed. Post Covid crisis, it is important for every institution to gain back customer trust so quality of materials should be maintained and IoT enables us to do the same. The unification of industrial IoT (IIoT) and industry 4.0 is also discussed as it leads us to understand that this unification is the next evolution of smart manufacturing and digital technologies. This methodology can lead us to accelerated innovation in applications for overcoming the eventual challenges post Covid in the near future. Also, small-scale/large-scale companies making use of the above research methodology can adhere to six-sigma criterion.


Author(s):  
Prabhat Kumar ◽  
Randhir Kumar ◽  
Govind P. Gupta ◽  
Rakesh Tripathi ◽  
Gautam Srivastava

Sign in / Sign up

Export Citation Format

Share Document