17 research outputs found

    Dealing with data and software interoperability issues in digital factories

    Get PDF
    The digital factory paradigm comprises a multi-layered integration of the information related to various activities along the factory and product lifecycle manufacturing related resources. A central aspect of a digital factory is that of enabling the product lifecycle stakeholders to collaborate through the use of software solutions. The digital factory thus expands outside the actual company boundaries and offers the opportunity for the business and its suppliers to collaborate on business processes that affect the whole supply chain. This paper discusses an interoperability architecture for digital factories. To this end, it delves into the issue by analysing the main challenges that must be addressed to support an integrated and scalable factory architecture characterized by access to services, aggregation of data, and orchestration of production processes. Then, it revises the state of the art in the light of these requirements and proposes a general architectural framework conjugating the most interesting features of serviceoriented architectures and data sharing architectures. The study is exemplified through a case study

    An Effective Supply Chain Model using Blockchain in IoT with Trust Enabled Hybrid Concensus Algorithm

    Get PDF
    With the rapid growth of multiagent systems, concerns about privacy and security have assumed a position of paramount importance. Blockchain technology has gained a lot of attention since it first appeared because of its benefits in terms of decentralization, accessibility, traceability, and the capacity to be trustless. The increasingly complicated supply chains in today's world face significant issues regarding traceability and integrity. Blockchain technology holds out the possibility of developing a new concept for supply chain traceability, lapping these worries. Thus, in this research, the trust enable hybrid consensus algorithm is proposed for establishing consistency in the network with the irrelevant traders. The authorization is identified by the proposed model for accessing the Blockchain network depending on the accessibility rules. Depending on the various information sources, the authenticity of data is calculated, which makes the interaction between both the agent as well as the resource. The efficiency of the proposed model is determined by three different measures for secure data transfer. The attained minimal transaction time is 0.856 ms, memory usage is 87.684 KB, and responsiveness is 3.599 ms, respectively

    Industry 4.0 and Cybersecurity at Automobile Manufacturing in Smart Factories

    Get PDF
    The automotive industry in smart factories is constantly developing depending on technology. Depending on the developing technology, security problems come to the fore. Industry 4.0 and cyber security are widely used in automotive sector applications as well as in all areas of our lives. These applications pose security threats to automotive users and drivers. Attacks on vehicle software, especially by autonomous vehicle users, endanger passengers and vehicle safety. It should take the necessary precautions to be protected against cyber-attacks and be equipped to solve the problem. The rapid change of technology in smart factories and with industry 4.0 brings new security vulnerabilities and new cyber attacks. The hostility arising from inter-sectoral competition has lost its value compared to previous periods and has left its authority to cyberattacks, threats, and damaging moves against system security. Industry 4.0 is also known as the Industrial Revolution Industry, which covers a specific production technology and the interests of many groups, and exchanges data without human use and innovative system. With this industrial revolution, which also plays an active role in the establishment of a smart factory, more useful work examples are obtained as it ensures that each data is collected and analyzed in the best way in the production area. In this study, cyber attacks in the automotive industry and cyber threats in automobile factories are examined. In addition, layered protection has been proposed by investigating how to take precautions against these attacks and threats

    Impact of Payment Technology Innovations on the Traditional Financial Industry: A Focus on China

    Get PDF
    With the rapid advent of e-commerce in China, the technological innovation of third-party payment has experienced explosive growth. This important technological innovation, initiated by emerging Internet companies, is helping the traditional financial industry\u27s payment business-represented by commercial banks-expand in both depth and breadth. Meanwhile, there is also a large degree of substitution, competition and crowding out among these banks in terms of the traditional financial industry\u27s basic payment and settlement functions, potential customers, deposit and loan services and traditional intermediary business. This paper explores the impact (episodic and long-term steady-state) of the technological innovation of payment on commercial banks. It also considers the impact of technological innovation on industrial evolution to clarify whether technological innovation offsets the advantages of traditional industries or promotes industrial development. This study adopts the Vector Auto-Regression (VAR) impulse response model to analyze the impact of Internet Third-Party Payment (TPP) on the traditional financial industry from 2007 to 2014. The empirical results suggest that in China, third-party payments have had a significant positive correlation with the value creation capabilities of traditional financial industries, and that this relationship tends to remain in a steady state in the long term. Based on these findings, this paper confirms that the technological innovation of methods of payment in emerging economies, such as China, has promoted the development of the financial industry and accelerated the process of industrial evolution. We conclude the paper with feasible policy suggestions

    A Roadmap for successful IoT implementation : empirical evidence from the energy industry

    Get PDF
    The Internet of Things has become a spotlight in contemporary literature in the domain of industry 4.0 and emerging technologies. Majority of research studies focuses on technicalities and theoretical implications of implementing IoT in the energy sector. However, in practice, organisations face a combination of technical and non-technical challenges. There is a clear need for the studies to empirically evaluate IoT use cases, challenges, and a roadmap for successfully implementing emerging technologies. To fulfil the research gap and provide insights for practitioners, we conducted seven semi-structured interviews with professionals working in Finland’s energy sector. Based on results retrieved through content analysis of transcribed interviews, we developed a roadmap with managerial implications for successfully implementing IoT and other emerging technologies. Furthermore, study results present practical insights on IoT applications, benefits, and major IoT utilisation challenges in the Finnish energy sector industrial ecosystem. In the end, conclusion and future research directions are discussed.©2021 the Authors. Articles published in Issues in Information Systems are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.fi=vertaisarvioitu|en=peerReviewed

    Lifelogging Data Validation Model for Internet of Things enabled Personalized Healthcare

    Get PDF
    The rapid advance of the Internet of Things (IoT) technology offers opportunities to monitor lifelogging data by a variety of IoT assets, like wearable sensors, mobile apps, etc. But due to heterogeneity of connected devices and diverse life patterns in an IoT environment, lifelogging personal data contains much uncertainty and are hardly used for healthcare studies. Effective validation of lifelogging personal data for longitudinal health assessment is demanded. In this paper, it takes lifelogging physical activity as a target to explore the possibility of improving validity of lifelogging data in an IoT based healthcare environment. A rule based adaptive lifelogging physical activity validation model, LPAV-IoT, is proposed for eliminating irregular uncertainties and estimating data reliability in IoT healthcare environments. In LPAV-IoT, a methodology specifying four layers and three modules is presented for analyzing key factors impacting validity of lifelogging physical activity. A series of validation rules are designed with uncertainty threshold parameters and reliability indicators and evaluated through experimental investigations. Following LPAV-IoT, a case study on an IoT enabled personalized healthcare platform MHA [38] connecting three state-of-the-art wearable devices and mobile apps are carried out. The results reflect that the rules provided by LPAV-IoT enable efficiently filtering at least 75% of irregular uncertainty and adaptively indicating the reliability of lifelogging physical activity data on certain condition of an IoT personalized environment

    Blockchain-based life cycle assessment: An implementation framework and system architecture

    Get PDF
    Life cycle assessment (LCA) is widely used for assessing the environmental impacts of a product or service. Collecting reliable data is a major challenge in LCA due to the complexities involved in the tracking and quantifying inputs and outputs at multiple supply chain stages. Blockchain technology offers an ideal solution to overcome the challenge in sustainable supply chain management. Its use in combination with internet-of-things (IoT) and big data analytics and visualization can help organizations achieve operational excellence in conducting LCA for improving supply chain sustainability. This research develops a framework to guide the implementation of Blockchain-based LCA. It proposes a system architecture that integrates the use of Blockchain, IoT, and big data analytics and visualization. The proposed implementation framework and system architecture were validated by practitioners who were experienced with Blockchain applications. The research also analyzes system implementation costs and discusses potential issues and solutions, as well as managerial and policy implications

    The Internet of Things: a security point of view.

    Get PDF
    Purpose-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.Design/methodology/approach-- Security requirements and solutions are analyzed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analyzed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.Finding-- IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardisation, identity management, trusted architecture, etc.Practical implications-- The implications to various applications including SCADA, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the trade-offs among security, privacy, and utility to provide security in multi-layer architecture of IoT.Originality/value-- The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security

    Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges

    Get PDF
    Traceability plays a vital role in food quality and safety management. Traditional Internet of Things (IoT) traceability systems provide the feasible solutions for the quality monitoring and traceability of food supply chains. However, most of the IoT solutions rely on the centralized server-client paradigm that makes it difficult for consumers to acquire all transaction information and to track the origins of products. Blockchain is a cutting-edge technology that has great potential for improving traceability performance by providing security and full transparency. However, the benefits, challenges and development methods of blockchain-based food traceability systems are not yet fully explored in the current literature. Therefore, the main aim of this paper is to review the blockchain technology characteristics and functionalities, identify blockchain-based solutions for addressing food traceability concerns, highlight the benefits and challenges of blockchain-based traceability systems implementation, and help researchers and practitioners to apply blockchain technology based food traceability systems by proposing an architecture design framework and suitability application analysis flowchart of blockchain based food traceability systems. The results of this study contribute to better understanding and knowledge on how to improve the food traceability by developing and implementing blockchain-based traceability systems. The paper provides valuable information for researchers and practitioners on the use of blockchain-based food traceability management and has a positive effect on the improvement of food sustainability

    Digital technology for quality management in construction:A review and future research directions

    Get PDF
    Significant developments in digital technologies can potentially provide managers and engineers with the ability to improve the quality of the construction industry. Acknowledging the current and future use of digital technologies in construction quality management (CQM), we address the following research question: What developments in digital technologies can be used to improve quality in the construction industry? In addressing this research question, a systematic review approach is used to examine the studies that have been used for the management of quality in the construction industry. This review indicates that there is a need for digital technology-based quality management to be: (1) enhance defect management for concealed work, (2) enhance pre-construction defects prevention as well as post-completion product function testing, and (3) research on construction compliance inspection as a direction. We suggest that future research focus on quality culture development, advanced data analytics, and behavioral quality assessment
    corecore