3,511 research outputs found

    Teknoekonominen toteutettavuusanalyysi etäylläpidon liitettävyydestä tehtaissa

    Get PDF
    Maintenance activities play a major role in factory operations, as they prevent breakdowns and extend machine life. With the advances in sensor, computing and communications technology, sensor data can be increasingly exploited for real-time supervision of machine condition. However, the acquisition of the data is challenging due to proprietary technologies and interfaces applied in Industrial Networks. Therefore, sensor data is rarely utilized in other processes than automation. As the industry is heading towards a new industrial era, also referred to as Industrial Internet or Industrie 4.0, there is growing need to improve data availability for applications that can realize its potential value. In this research, the focus is on the feasibility of remote maintenance deployment in factories. The topic is approached from the connectivity viewpoint. The research is conducted by reviewing the literature, and by interviewing numerous industry experts regarding the connectivity and data exploitation in factories. These form the basis for the value network analysis, in which Value Network Configuration (VNC) method is applied, to analyze the value distribution among different actors in alternative remote connection cases. As a result of the VNC analysis, three alternative value network configurations are formed. They provide a high-level technical architecture of the remote connection implementation and discuss the accumulated value of each actor concerning remote maintenance service. The insights gained from the VNCs and literature are then employed to propose a future technical architecture for remote maintenance connectivity in factories.Huoltotoimet ovat suuressa roolissa tehtaan toiminnassa, sillä ne ehkäisevät konerikkoja ja pidentävät koneen käyttöikää. Sensori-, laskenta- ja tietoliikenneteknologian kehittymisen johdosta sensoridataa voidaan hyödyntää yhä enemmän koneen kunnon reaaliaikaiseen valvontaan. Datan saanti on kuitenkin haastavaa teollisissa verkoissa käytettyjen sovelluskohtaisten teknologioiden ja liitäntöjen takia. Sen vuoksi sensoridataa hyödynnetään harvoin muissa prosesseissa kuin automaatiossa. Teollisuuden suunnatessa kohti uutta teollista aikakautta, joka tunnetaan myös nimillä Teollinen Internet ja Teollisuus 4.0, on datan saatavuutta parannettava sovelluskohteille, jotka voivat realisoida sen potentiaalisen arvon. Tämä tutkimus tarkastelee etäylläpidon käyttöönoton toteutettavuutta tehtaissa. Aihetta lähestytään liitettävyyden näkökulmasta. Tutkimus suoritetaan tarkastelemalla kirjallisuutta sekä haastattelemalla lukuisia teollisuuden asiantuntijoita koskien liitettävyyttä ja datan hyödyntämistä tehtaissa. Nämä muodostavat perustan arvoverkkoanalyysille, jossa sovelletaan arvoverkkokonfiguraatio-menetelmää, jolla analysoidaan arvon jakautumista eri toimijoiden kesken vaihtoehtoisissa etäyhteystapauksissa. Arvoverkkokonfiguraatioanalyysin tuloksena muodostetaan kolme vaihtoehtoista arvoverkkokonfiguraatiota. Ne tarjoavat korkean tason teknisen arkkitehtuurin etäyhteyden implementaatiosta ja tarkastelevat toimijoiden kerryttämää arvoa etäylläpitopalvelun osalta. Arvoverkkokonfiguraatioista ja kirjallisuudesta saatujen näkemysten pohjalta esitellään lisäksi tulevaisuuden tekninen arkkitehtuuri etäylläpidon liitettävyydelle tehtaissa

    Intrusion tolerant routing with data consensus in wireless sensor networks

    Get PDF
    Dissertação para obtenção do Grau de Mestre em Engenharia InformáticaWireless sensor networks (WSNs) are rapidly emerging and growing as an important new area in computing and wireless networking research. Applications of WSNs are numerous, growing, and ranging from small-scale indoor deployment scenarios in homes and buildings to large scale outdoor deployment settings in natural, industrial, military and embedded environments. In a WSN, the sensor nodes collect data to monitor physical conditions or to measure and pre-process physical phenomena, and forward that data to special computing nodes called Syncnodes or Base Stations (BSs). These nodes are eventually interconnected, as gateways, to other processing systems running applications. In large-scale settings, WSNs operate with a large number of sensors – from hundreds to thousands of sensor nodes – organised as ad-hoc multi-hop or mesh networks, working without human supervision. Sensor nodes are very limited in computation, storage, communication and energy resources. These limitations impose particular challenges in designing large scale reliable and secure WSN services and applications. However, as sensors are very limited in their resources they tend to be very cheap. Resilient solutions based on a large number of nodes with replicated capabilities, are possible approaches to address dependability concerns, namely reliability and security requirements and fault or intrusion tolerant network services. This thesis proposes, implements and tests an intrusion tolerant routing service for large-scale dependable WSNs. The service is based on a tree-structured multi-path routing algorithm, establishing multi-hop and multiple disjoint routes between sensors and a group of BSs. The BS nodes work as an overlay, processing intrusion tolerant data consensus over the routed data. In the proposed solution the multiple routes are discovered, selected and established by a self-organisation process. The solution allows the WSN nodes to collect and route data through multiple disjoint routes to the different BSs, with a preventive intrusion tolerance approach, while handling possible Byzantine attacks and failures in sensors and BS with a pro-active recovery strategy supported by intrusion and fault tolerant data-consensus algorithms, performed by the group of Base Stations

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

    Get PDF
    Tese de doutoramento, Informática (Ciências da Computação), Universidade de Lisboa, Faculdade de Ciências, 2010.The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrained wireless ad hoc networks. This is a fundamental problem in distributed computing because it abstracts the need to coordinate activities among various nodes. It has been shown to be a building block for several other important distributed computing problems like state-machine replication and atomic broadcast. The thesis begins by making a thorough performance assessment of existing intrusion-tolerant consensus protocols, which shows that the performance bottlenecks of current solutions are in part related to their system modeling assumptions. Based on these results, the communication failure model is identified as a model that simultaneously captures the reality of wireless ad hoc networks and allows the design of efficient protocols. Unfortunately, the model is subject to an impossibility result stating that there is no deterministic algorithm that allows n nodes to reach agreement if more than n2 omission transmission failures can occur in a communication step. This result is valid even under strict timing assumptions (i.e., a synchronous system). The thesis applies randomization techniques in increasingly weaker variants of this model, until an efficient intrusion-tolerant consensus protocol is achieved. The first variant simplifies the problem by restricting the number of nodes that may be at the source of a transmission failure at each communication step. An algorithm is designed that tolerates f dynamic nodes at the source of faulty transmissions in a system with a total of n 3f + 1 nodes. The second variant imposes no restrictions on the pattern of transmission failures. The proposed algorithm effectively circumvents the Santoro- Widmayer impossibility result for the first time. It allows k out of n nodes to decide despite dn 2 e(nk)+k2 omission failures per communication step. This algorithm also has the interesting property of guaranteeing safety during arbitrary periods of unrestricted message loss. The final variant shares the same properties of the previous one, but relaxes the model in the sense that the system is asynchronous and that a static subset of nodes may be malicious. The obtained algorithm, called Turquois, admits f < n 3 malicious nodes, and ensures progress in communication steps where dnf 2 e(n k f) + k 2. The algorithm is subject to a comparative performance evaluation against other intrusiontolerant protocols. The results show that, as the system scales, Turquois outperforms the other protocols by more than an order of magnitude.Esta tese investiga o problema do consenso tolerante a faltas acidentais e maliciosas em redes ad hoc sem fios. Trata-se de um problema fundamental que captura a essência da coordenação em actividades envolvendo vários nós de um sistema, sendo um bloco construtor de outros importantes problemas dos sistemas distribuídos como a replicação de máquina de estados ou a difusão atómica. A tese começa por efectuar uma avaliação de desempenho a protocolos tolerantes a intrusões já existentes na literatura. Os resultados mostram que as limitações de desempenho das soluções existentes estão em parte relacionadas com o seu modelo de sistema. Baseado nestes resultados, é identificado o modelo de falhas de comunicação como um modelo que simultaneamente permite capturar o ambiente das redes ad hoc sem fios e projectar protocolos eficientes. Todavia, o modelo é restrito por um resultado de impossibilidade que afirma não existir algoritmo algum que permita a n nós chegaram a acordo num sistema que admita mais do que n2 transmissões omissas num dado passo de comunicação. Este resultado é válido mesmo sob fortes hipóteses temporais (i.e., em sistemas síncronos) A tese aplica técnicas de aleatoriedade em variantes progressivamente mais fracas do modelo até ser alcançado um protocolo eficiente e tolerante a intrusões. A primeira variante do modelo, de forma a simplificar o problema, restringe o número de nós que estão na origem de transmissões faltosas. É apresentado um algoritmo que tolera f nós dinâmicos na origem de transmissões faltosas em sistemas com um total de n 3f + 1 nós. A segunda variante do modelo não impõe quaisquer restrições no padrão de transmissões faltosas. É apresentado um algoritmo que contorna efectivamente o resultado de impossibilidade Santoro-Widmayer pela primeira vez e que permite a k de n nós efectuarem progresso nos passos de comunicação em que o número de transmissões omissas seja dn 2 e(n k) + k 2. O algoritmo possui ainda a interessante propriedade de tolerar períodos arbitrários em que o número de transmissões omissas seja superior a . A última variante do modelo partilha das mesmas características da variante anterior, mas com pressupostos mais fracos sobre o sistema. Em particular, assume-se que o sistema é assíncrono e que um subconjunto estático dos nós pode ser malicioso. O algoritmo apresentado, denominado Turquois, admite f < n 3 nós maliciosos e assegura progresso nos passos de comunicação em que dnf 2 e(n k f) + k 2. O algoritmo é sujeito a uma análise de desempenho comparativa com outros protocolos na literatura. Os resultados demonstram que, à medida que o número de nós no sistema aumenta, o desempenho do protocolo Turquois ultrapassa os restantes em mais do que uma ordem de magnitude.FC

    Interoperability middleware for IIoT gateways based on international standard ontologies and standardized digital representation

    Get PDF
    Recent advances in the areas of microelectronics, information technology, and communication protocols have made the development of smaller devices with greater processing capacity and lower energy consumption. This context contributed to the growing number of physical devices in industrial environments which are interconnected and communicate via the internet, enabling concepts such as Industry 4.0 and the Industrial Internet of Things (IIoT). These nodes have different sensors and actuators that monitor and control environment data. Several companies develop these devices, including diverse communication protocols, data structures, and IoT platforms, which leads to interoperability issues. In IoT scenarios, interoperability is the ability of two systems to communicate and share services. Therefore, communication problems can make it unfeasible to use heterogeneous devices, increasing the project’s financial cost and development time. In an industry, interoperability is related to different aspects, such as physical communication, divergent device communication protocols, and syntactical problems, referring to the distinct data structure. Developing a new standard for solving these matters may bring interoperability-related drawbacks rather than effectively solving these issues. Therefore, to mitigate interoperability problems in industrial applications, this work proposes the development of an interoperability middleware for Edge-enabled IIoT gateways based on international standards. The middleware is responsible for translating communication protocols, updating data from simulations or physical nodes to the assets’ digital representations, and storing data locally or remotely. The middleware adopts the IEEE industrial standard ontologies combined with assets’ standardized digital models. As a case study, a simulation replicates the production of a nutrient solution for agriculture, controlled by IIoT nodes. The use case consists of three devices, each equipped with at least five sensors or actuators, communicating in different communication protocols and exchanging data using diverse structures. The performance of the proposed middleware and its proposed translations algorithms were evaluated, obtaining satisfactory results for mitigating interoperable in industrial applications.Devido a recentes avanços nas áreas de microeletrônica, tecnologia da informação, e protocolos de comunicação tornaram possível o desenvolvimento de dispositivos cada vez menores com maior capacidade de processamento e menor consumo energético. Esse contexto contribuiu para o crescente nú- mero desses dispositivos na industria que estão interligados via internet, viabilizando conceitos como Indústria 4.0 e Internet das Coisas Industrial (IIoT). Esses nós possuem diferentes sensores e atuadores que monitoram e controlam os dados do ambiente. Esses equipamentos são desenvolvidos por diferentes empresas, incluindo protocolos de comunicação, estruturas de dados e plataformas de IoT distintos, acarretando em problemas de interoperabilidade. Em cenários de IoT, interoperabilidade, é a capacidade de sistemas se comunicarem e compartilharem serviços. Portanto, esses problemas podem inviabilizar o uso de dispositivos heterogêneos, aumentando o custo financeiro do projeto e seu tempo de desenvolvimento. Na indústria, interoperabilidade se divide em diferentes aspectos, como comunicação e problemas sintáticos, referentes à estrutura de dados distinta. O desenvolvimento de um padrão industrial pode trazer mais desvantagens relacionadas à interoperabilidade, em vez de resolver esses problemas. Portanto, para mitigar problemas relacionados a intoperabilidade industrial, este trabalho propõe o desenvolvimento de um middleware de interoperável para gateways IIoT baseado em padrões internacionais e ontologias. O middleware é responsável por traduzir diferentes protocolos de comunicação, atualizar os dados dos ativos industriais por meio de suas representações digitais, esses armazenados localmente ou remotamente. O middleware adota os padrões ontológicos industriais da IEEE combinadas com modelos digitais padronizados de ativos industriais. Como estudo de caso, são realizadas simulações para a produção de uma solução nutritiva para agricultura, controlada por nós IIoT. O processo utiliza três dispositivos, cada um equipado com pelo menos cinco sensores ou atuadores, por meio de diferentes protocolos de comunicação e estruturas de dados. O desempenho do middleware proposto e seus algoritmos de tradução foram avaliados e apresentados no final do trabalho, os quais resultados foram satisfatórios para mitigar a interoperabilidade em aplicações industriais

    Enabling Hardware Green Internet of Things: A review of Substantial Issues

    Get PDF
    Between now and the near future, the Internet of Things (IoT) will redesign the socio-ecological morphology of the human terrain. The IoT ecosystem deploys diverse sensor platforms connecting millions of heterogeneous objects through the Internet. Irrespective of sensor functionality, most sensors are low energy consumption devices and are designed to transmit sporadically or continuously. However, when we consider the millions of connected sensors powering various user applications, their energy efficiency (EE) becomes a critical issue. Therefore, the importance of EE in IoT technology, as well as the development of EE solutions for sustainable IoT technology, cannot be overemphasised. Propelled by this need, EE proposals are expected to address the EE issues in the IoT context. Consequently, many developments continue to emerge, and the need to highlight them to provide clear insights to researchers on eco-sustainable and green IoT technologies becomes a crucial task. To pursue a clear vision of green IoT, this study aims to present the current state-of-the art insights into energy saving practices and strategies on green IoT. The major contribution of this study includes reviews and discussions of substantial issues in the enabling of hardware green IoT, such as green machine to machine, green wireless sensor networks, green radio frequency identification, green microcontroller units, integrated circuits and processors. This review will contribute significantly towards the future implementation of green and eco-sustainable IoT

    Sixth Generation (6G)Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions

    Get PDF
    The standardization activities of the fifth generation communications are clearly over and deployment has commenced globally. To sustain the competitive edge of wireless networks, industrial and academia synergy have begun to conceptualize the next generation of wireless communication systems (namely, sixth generation, (6G)) aimed at laying the foundation for the stratification of the communication needs of the 2030s. In support of this vision, this study highlights the most promising lines of research from the recent literature in common directions for the 6G project. Its core contribution involves exploring the critical issues and key potential features of 6G communications, including: (i) vision and key features; (ii) challenges and potential solutions; and (iii) research activities. These controversial research topics were profoundly examined in relation to the motivation of their various sub-domains to achieve a precise, concrete, and concise conclusion. Thus, this article will contribute significantly to opening new horizons for future research direction
    corecore