Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.05.005
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman
The implementation of Industry 4.0 technologies has improved the flexibility of the entire manufacturing system. These technologies are the Internet of Things (IoT), big data, Artificial Intelligence (AI), Additive Manufacturing (AM), advanced robotics, virtual reality, cloud computing, simulation, and among others, have arisen to improve the flexibility in the entire manufacturing system. Industry 4.0 is becoming recognised as a unique industrial paradigm. It is predicated on the widespread adoption of communication and information technology, which would lead to improved organisational performance and flexibility. The incorporation of Industry 4.0 is the true game-changer in terms of flexibility and customisation. Manufacturers may utilise this technology to build digital twins of items used by consumers in the real world. The digital twin gets real-time information from sensors on the actual objects. Manufacturers benefit from digital twin and simulation technology, including predictive maintenance and making errors easier and faster to rectify. This paper discusses Industry 4.0 and its Flexible Manufacturing System (FMS) capability. Different dimensions and technologies of Industry 4.0 Practices for improving FMS performance are studied,d and then discusses several flexible approaches using Industry 4.0 technologies are. One of the most significant benefits of adopting virtual infrastructure maintained by a service provider is improved flexibility. Cloud services allow auto-scaling, which means that the underlying computer resources automatically adjust to changing utilisation rates. Industry 4.0 increases production flexibility, allowing a facility to respond to market changes quickly. A plant control system automatically varies output depending on shifting utility rates, lowering production costs. Industry 4.0 offers some incredible benefits and has gone a long way in the last several years.
{"title":"Enabling flexible manufacturing system (FMS) through the applications of industry 4.0 technologies","authors":"Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman","doi":"10.1016/j.iotcps.2022.05.005","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.05.005","url":null,"abstract":"<div><p>The implementation of Industry 4.0 technologies has improved the flexibility of the entire manufacturing system. These technologies are the Internet of Things (IoT), big data, Artificial Intelligence (AI), Additive Manufacturing (AM), advanced robotics, virtual reality, cloud computing, simulation, and among others, have arisen to improve the flexibility in the entire manufacturing system. Industry 4.0 is becoming recognised as a unique industrial paradigm. It is predicated on the widespread adoption of communication and information technology, which would lead to improved organisational performance and flexibility. The incorporation of Industry 4.0 is the true game-changer in terms of flexibility and customisation. Manufacturers may utilise this technology to build digital twins of items used by consumers in the real world. The digital twin gets real-time information from sensors on the actual objects. Manufacturers benefit from digital twin and simulation technology, including predictive maintenance and making errors easier and faster to rectify. This paper discusses Industry 4.0 and its Flexible Manufacturing System (FMS) capability. Different dimensions and technologies of Industry 4.0 Practices for improving FMS performance are studied,d and then discusses several flexible approaches using Industry 4.0 technologies are. One of the most significant benefits of adopting virtual infrastructure maintained by a service provider is improved flexibility. Cloud services allow auto-scaling, which means that the underlying computer resources automatically adjust to changing utilisation rates. Industry 4.0 increases production flexibility, allowing a facility to respond to market changes quickly. A plant control system automatically varies output depending on shifting utility rates, lowering production costs. Industry 4.0 offers some incredible benefits and has gone a long way in the last several years.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 49-62"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000153/pdfft?md5=d12798b3d3d9158c1b328de5e3f8ee74&pid=1-s2.0-S2667345222000153-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90125207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.08.001
Rui Chen , Hai Shen , Yi Lai
This work aims to study the role of Digital Twins (DTs) technology combined with the Metaheuristic Optimization Algorithm in manufacturing energy efficiency optimization. Firstly,a machine tool model is established based on DTs technology to study the energy consumption of the milling process of Computer Numerical Machine Tools. Besides, the Particle Swarm Optimization (PSO) algorithm is introduced to optimize the milling parameters of the machining process. Meanwhile, the tool machining path is optimized by combining the Optimized Genetic algorithm and Simulated Annealing algorithm and find the optimal solution of the machining path. On the premise of ensuring the machining quality, this scheme improves the machining efficiency, reduces the energy consumption of the processing process, and improve the energy efficiency. The results demonstrate that the optimized milling parameters can ensure the lowest milling power while considering the maximum material removal rate. Take the plane model as an example. The Improved Genetic Algorithm-Simulated Annealing algorithm can significantly reduce the number of empty walking knife by adopting projection machining and helical machining. The total length of the milling path is reduced by 69.45 mm at most, a relative reduction of 10.01%. The average measured energy consumption of milling is reduced by 5.62W∗h compared with the empirical value; the measured average energy consumption of the optimized idle tool is reduced by 0.17W∗h; the total measured energy consumption of milling processing is reduced by 5.73W∗h compared with the empirical value. It can be seen that the optimization algorithm can improve the processing efficiency and reduce the energy consumption.
{"title":"A Metaheuristic Optimization Algorithm for energy efficiency in Digital Twins","authors":"Rui Chen , Hai Shen , Yi Lai","doi":"10.1016/j.iotcps.2022.08.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.08.001","url":null,"abstract":"<div><p>This work aims to study the role of Digital Twins (DTs) technology combined with the Metaheuristic Optimization Algorithm in manufacturing energy efficiency optimization. Firstly,a machine tool model is established based on DTs technology to study the energy consumption of the milling process of Computer Numerical Machine Tools. Besides, the Particle Swarm Optimization (PSO) algorithm is introduced to optimize the milling parameters of the machining process. Meanwhile, the tool machining path is optimized by combining the Optimized Genetic algorithm and Simulated Annealing algorithm and find the optimal solution of the machining path. On the premise of ensuring the machining quality, this scheme improves the machining efficiency, reduces the energy consumption of the processing process, and improve the energy efficiency. The results demonstrate that the optimized milling parameters can ensure the lowest milling power while considering the maximum material removal rate. Take the plane model as an example. The Improved Genetic Algorithm-Simulated Annealing algorithm can significantly reduce the number of empty walking knife by adopting projection machining and helical machining. The total length of the milling path is reduced by 69.45 mm at most, a relative reduction of 10.01%. The average measured energy consumption of milling is reduced by 5.62W∗h compared with the empirical value; the measured average energy consumption of the optimized idle tool is reduced by 0.17W∗h; the total measured energy consumption of milling processing is reduced by 5.73W∗h compared with the empirical value. It can be seen that the optimization algorithm can improve the processing efficiency and reduce the energy consumption.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 159-169"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000232/pdfft?md5=22ec30d0e4e20be9b6023f92f9c8ea93&pid=1-s2.0-S2667345222000232-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.12.001
Xirong Ning, Jin Jiang
In a cyber-physical system (CPS) built on Internet-of-things (IoT) technologies, whenever measurement and control signals are transferred over communication networks across cyber and physical systems, it potentially becomes a target for adversaries. The problem becomes especially serious if the adversaries are insiders. A single layer of defense may not be strong enough in such a case, as it is difficult to assess the extent of knowledge that the inside attackers may have known about the physical and cyber system configurations, communication networks/protocols, and their respective vulnerabilities. Hence, it is paramount to have a reliable and fail-safe defense-in-depth architecture to fence off would-be-attackers. In this paper, a multi-layer defense-in-depth approach has been developed. For an inside attacker with legitimate access, the first line of defense, such as access control, may have already been compromised. Given this fact, the focus of the current paper has been on detection and mitigation. Both data-driven and model-based techniques are considered to catch stealthy attacks and stop them in their tracks. Effective mitigation techniques can then be deployed to minimize the adverse effects. To demonstrate this design philosophy and validate the effectiveness of the developed methodologies, a lab-scale cyber-physical system platform based on industry-grade communication networks and physical sensors has been used for validation.
{"title":"Defense-in-depth against insider attacks in cyber-physical systems","authors":"Xirong Ning, Jin Jiang","doi":"10.1016/j.iotcps.2022.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.001","url":null,"abstract":"<div><p>In a cyber-physical system (CPS) built on Internet-of-things (IoT) technologies, whenever measurement and control signals are transferred over communication networks across cyber and physical systems, it potentially becomes a target for adversaries. The problem becomes especially serious if the adversaries are insiders. A single layer of defense may not be strong enough in such a case, as it is difficult to assess the extent of knowledge that the inside attackers may have known about the physical and cyber system configurations, communication networks/protocols, and their respective vulnerabilities. Hence, it is paramount to have a reliable and fail-safe defense-in-depth architecture to fence off would-be-attackers. In this paper, a multi-layer defense-in-depth approach has been developed. For an inside attacker with legitimate access, the first line of defense, such as access control, may have already been compromised. Given this fact, the focus of the current paper has been on detection and mitigation. Both data-driven and model-based techniques are considered to catch stealthy attacks and stop them in their tracks. Effective mitigation techniques can then be deployed to minimize the adverse effects. To demonstrate this design philosophy and validate the effectiveness of the developed methodologies, a lab-scale cyber-physical system platform based on industry-grade communication networks and physical sensors has been used for validation.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 203-211"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266734522200027X/pdfft?md5=fb3ebb68af90fd90774bf8956beede7a&pid=1-s2.0-S266734522200027X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.07.002
Zheng Xu
The unmanned vehicles (UAVs) are most useful communication elements in current technology platform. The emerging communication applications like IoT, cloud and Datamining are most prominent to surveillance. This research study is concentrated on IoT (Internet if things) based UAVs design based on information collection methodology. Autonomous flying vehicles with IoT connectivity to ensure site health and safety applications. It goes through the fundamental limits and flaws of current state-of-the-art solutions for the same goal, such as route planning optimization challenges, lightweight machine learning (ML) and machine vision algorithms, coordination in IoT communications, and IoT network scaling. As a result, this article will assist the reader in delving deeper into a variety of open research questions.
{"title":"UAV surveying and mapping information collection method based on Internet of Things","authors":"Zheng Xu","doi":"10.1016/j.iotcps.2022.07.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.07.002","url":null,"abstract":"<div><p>The unmanned vehicles (UAVs) are most useful communication elements in current technology platform. The emerging communication applications like IoT, cloud and Datamining are most prominent to surveillance. This research study is concentrated on IoT (Internet if things) based UAVs design based on information collection methodology. Autonomous flying vehicles with IoT connectivity to ensure site health and safety applications. It goes through the fundamental limits and flaws of current state-of-the-art solutions for the same goal, such as route planning optimization challenges, lightweight machine learning (ML) and machine vision algorithms, coordination in IoT communications, and IoT network scaling. As a result, this article will assist the reader in delving deeper into a variety of open research questions.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 138-144"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000219/pdfft?md5=36b28947f98e3d8267f6a1b9cae75073&pid=1-s2.0-S2667345222000219-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.09.001
Ravi Sharma, Balázs Villányi
When the Internet of Things (IoT) is used in a typical manufacturing system, the industrial plant can be controlled remotely through the Internet. This enables manufacturing and execution systems to obtain real-time work orders directly from the Enterprise Resource Planning (ERP) system. Therefore, workflows for development, production, and manufacturing can be integrated with sales, market, and finance business processes. The possibility of implementing this integration, however, is dependent on the trust, security, and authentication of IoT devices. Many IoT devices face significant security risks such as device hijacking and data leaks due to limited resources and inadequate self-protection capabilities. Despite the fact that several studies have been conducted using the physical unclonable function to protect communication between IoT devices from the aforementioned security threats, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and has a significant impact on efficiency. To fill this gap, this article proposes a Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer technique with single-share trusted device collaboration can detect an unauthenticated device. In addition, our proposed technique ensures the overall system's integrity and stability during a scaling-out phenomenon, which is becoming increasingly common in complex industrial environments. Furthermore, we present a formal and informal security analysis of the proposed protocol. According to the results of the performance analysis, our proposed technique has the lowest communication overhead, computational cost, and round-trip time when compared to other state-of-the-art schemes.
{"title":"Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0","authors":"Ravi Sharma, Balázs Villányi","doi":"10.1016/j.iotcps.2022.09.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.09.001","url":null,"abstract":"<div><p>When the Internet of Things (IoT) is used in a typical manufacturing system, the industrial plant can be controlled remotely through the Internet. This enables manufacturing and execution systems to obtain real-time work orders directly from the Enterprise Resource Planning (ERP) system. Therefore, workflows for development, production, and manufacturing can be integrated with sales, market, and finance business processes. The possibility of implementing this integration, however, is dependent on the trust, security, and authentication of IoT devices. Many IoT devices face significant security risks such as device hijacking and data leaks due to limited resources and inadequate self-protection capabilities. Despite the fact that several studies have been conducted using the physical unclonable function to protect communication between IoT devices from the aforementioned security threats, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and has a significant impact on efficiency. To fill this gap, this article proposes a Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer technique with single-share trusted device collaboration can detect an unauthenticated device. In addition, our proposed technique ensures the overall system's integrity and stability during a scaling-out phenomenon, which is becoming increasingly common in complex industrial environments. Furthermore, we present a formal and informal security analysis of the proposed protocol. According to the results of the performance analysis, our proposed technique has the lowest communication overhead, computational cost, and round-trip time when compared to other state-of-the-art schemes.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 170-179"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000244/pdfft?md5=25280775935436cfd53ac91b584c6ac8&pid=1-s2.0-S2667345222000244-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91756484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.06.001
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Shahbaz Khan , Rajiv Suman
Sustainability 4.0 is being enabled through the effective adoption of modern technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Machine Vision (MV), Data Analytics (DA), Additive Manufacturing (AM) and other modern technologies. These technologies enable services at significantly lower prices due to the effective use of energy and resources with lesser wastage. Manufacturers are constantly looking for methods to lower the operating expenses associated with production processes. Manufacturers might optimise their value chain's production and associated processes by adopting sustainability 4.0 technologies. Such technologies will help manufacturers select their optimal facilities and employees, lower operational costs, enhance productivity and resource utilisation and provide a picture of process gaps that can be addressed. Sustainability is based on the effective use and reuse of resources across the product life cycle, from materials and processes to equipment and skills. Sustainable manufacturing produces manufactured goods using economically viable procedures that reduce negative environmental consequences while preserving energy and natural resources. This paper briefs Sustainability 4.0 and its significant needs. Various fundamental technologies and futuristic research aspects for Sustainability 4.0 are discussed diagrammatically. Finally, we identified and discussed significant applications of Sustainability 4.0 in manufacturing. Sustainability 4.0 refers to a long-term vision for enterprises that allows them to continue perpetually without depleting resources faster than they can be replaced. Sustainability 4.0 entails empowering prosumers to co-create to reshape the economy and society toward social inclusion and environmental sustainability. The use of sustainability and digitisation to solve environmental, social, and economic problems appears hopeful and exhausting.
{"title":"Sustainability 4.0 and its applications in the field of manufacturing","authors":"Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Shahbaz Khan , Rajiv Suman","doi":"10.1016/j.iotcps.2022.06.001","DOIUrl":"10.1016/j.iotcps.2022.06.001","url":null,"abstract":"<div><p>Sustainability 4.0 is being enabled through the effective adoption of modern technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Machine Vision (MV), Data Analytics (DA), Additive Manufacturing (AM) and other modern technologies. These technologies enable services at significantly lower prices due to the effective use of energy and resources with lesser wastage. Manufacturers are constantly looking for methods to lower the operating expenses associated with production processes. Manufacturers might optimise their value chain's production and associated processes by adopting sustainability 4.0 technologies. Such technologies will help manufacturers select their optimal facilities and employees, lower operational costs, enhance productivity and resource utilisation and provide a picture of process gaps that can be addressed. Sustainability is based on the effective use and reuse of resources across the product life cycle, from materials and processes to equipment and skills. Sustainable manufacturing produces manufactured goods using economically viable procedures that reduce negative environmental consequences while preserving energy and natural resources. This paper briefs Sustainability 4.0 and its significant needs. Various fundamental technologies and futuristic research aspects for Sustainability 4.0 are discussed diagrammatically. Finally, we identified and discussed significant applications of Sustainability 4.0 in manufacturing. Sustainability 4.0 refers to a long-term vision for enterprises that allows them to continue perpetually without depleting resources faster than they can be replaced. Sustainability 4.0 entails empowering prosumers to co-create to reshape the economy and society toward social inclusion and environmental sustainability. The use of sustainability and digitisation to solve environmental, social, and economic problems appears hopeful and exhausting.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 82-90"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000177/pdfft?md5=deb59d935cfaaa92d2189a5a303c9578&pid=1-s2.0-S2667345222000177-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74807117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.07.003
Chen Cheng , Jing Dou , Zhijiang Zheng
The establishment of smart city database requires Internet of things technology. With the continuous expansion of the scale of the Internet of things data center, the energy consumption of the data center is increasing, which greatly limits the development of the Internet of things data center. Energy consumption of Internet of things network data center in China's smart city has increased year by year, and data center network energy conservation has become a current research hotspot. The traditional network nodes are distributed and centralized innovatively to complete centralized control, and the controller completes the collection of the whole network information, the maintenance of network status, the distribution of flow entry, etc. Firstly, the energy-saving model of digital center network and the model data center network traffic prediction algorithm based on the principle of high accuracy traffic prediction are constructed, and an energy-saving multi-layer virtual traffic scheduling algorithm is proposed. Secondly, the two algorithms are fused, and finally an empirical study is carried out. The results show that in Random mode, the energy consumption ratio of energy-efficient multi-layer virtual-software defined networking (EMV-SDN) is the lowest, and the maximum reduction of energy consumption ratio reaches 7.8% compared with equal-cost multi-path (ECMP) algorithm. In Staggered mode and Stride mode, the energy consumption ratio of EMV-SDN algorithm is the lowest. Compared with the actual data flow, the prediction result of K-means-support vector machine (KM-SVM) algorithm is closer to the actual result, and the maximum error between the predicted value and the actual value of KM-SVM algorithm is 1.2 Gbps. However, the maximum error of balanced iterative reducing and clustering using hierarchies-support vector machine (B-SVM) algorithm reaches 3.1 Gbps; the prediction accuracy of KM-SVM algorithm is always higher than that of B-SVM algorithm in both discontinuous data flow and continuous actual data flow; the accuracy of KM-SVM algorithm in different experiments is high; among the energy consumption ratios of the combined algorithm, the energy consumption ratio of EMV-SDN algorithm is the lowest under the three communication modes, and the performance of the algorithm constructed in this study is higher than that of other algorithms in simulation operation; when the traffic prediction algorithm is combined with the virtual topology energy conservation control algorithm, the network structure change is reduced and the network stability is increased in this study. In the delay comparison of EMV-SDN algorithm, ECMP algorithm, and Dijkstra algorithm in the three communication modes, the EMV-SDN algorithm has the best performance. The results of this study provide an improvement direction for the development of Internet of Things technology and the construction of smart cities.
{"title":"Energy-efficient SDN for Internet of Things in smart city","authors":"Chen Cheng , Jing Dou , Zhijiang Zheng","doi":"10.1016/j.iotcps.2022.07.003","DOIUrl":"10.1016/j.iotcps.2022.07.003","url":null,"abstract":"<div><p>The establishment of smart city database requires Internet of things technology. With the continuous expansion of the scale of the Internet of things data center, the energy consumption of the data center is increasing, which greatly limits the development of the Internet of things data center. Energy consumption of Internet of things network data center in China's smart city has increased year by year, and data center network energy conservation has become a current research hotspot. The traditional network nodes are distributed and centralized innovatively to complete centralized control, and the controller completes the collection of the whole network information, the maintenance of network status, the distribution of flow entry, etc. Firstly, the energy-saving model of digital center network and the model data center network traffic prediction algorithm based on the principle of high accuracy traffic prediction are constructed, and an energy-saving multi-layer virtual traffic scheduling algorithm is proposed. Secondly, the two algorithms are fused, and finally an empirical study is carried out. The results show that in Random mode, the energy consumption ratio of energy-efficient multi-layer virtual-software defined networking (EMV-SDN) is the lowest, and the maximum reduction of energy consumption ratio reaches 7.8% compared with equal-cost multi-path (ECMP) algorithm. In Staggered mode and Stride mode, the energy consumption ratio of EMV-SDN algorithm is the lowest. Compared with the actual data flow, the prediction result of K-means-support vector machine (KM-SVM) algorithm is closer to the actual result, and the maximum error between the predicted value and the actual value of KM-SVM algorithm is 1.2 Gbps. However, the maximum error of balanced iterative reducing and clustering using hierarchies-support vector machine (B-SVM) algorithm reaches 3.1 Gbps; the prediction accuracy of KM-SVM algorithm is always higher than that of B-SVM algorithm in both discontinuous data flow and continuous actual data flow; the accuracy of KM-SVM algorithm in different experiments is high; among the energy consumption ratios of the combined algorithm, the energy consumption ratio of EMV-SDN algorithm is the lowest under the three communication modes, and the performance of the algorithm constructed in this study is higher than that of other algorithms in simulation operation; when the traffic prediction algorithm is combined with the virtual topology energy conservation control algorithm, the network structure change is reduced and the network stability is increased in this study. In the delay comparison of EMV-SDN algorithm, ECMP algorithm, and Dijkstra algorithm in the three communication modes, the EMV-SDN algorithm has the best performance. The results of this study provide an improvement direction for the development of Internet of Things technology and the construction of smart cities.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 145-158"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000220/pdfft?md5=2ec68f56dcfb3479211251d01df631b8&pid=1-s2.0-S2667345222000220-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76369624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.05.001
Dongliang Chen , Zhihan Lv
This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities.
{"title":"Artificial intelligence enabled Digital Twins for training autonomous cars","authors":"Dongliang Chen , Zhihan Lv","doi":"10.1016/j.iotcps.2022.05.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.05.001","url":null,"abstract":"<div><p>This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 31-41"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000116/pdfft?md5=cf5256f2bb80cd6ce81c3f66b2885b73&pid=1-s2.0-S2667345222000116-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91756488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.12.002
Roshahliza M. Ramli , Waheb A. Jabbar
This paper proposes a solar-powered portable water pump (SPWP) for IoT-enabled smart irrigation system (IoT-SIS). A NodeMCU microcontroller with a Wi-Fi interface and soil moisture, temperature, and humidity sensors are exploited to monitor and control the water pump and build an IoT-based irrigation system. The proposed irrigation system updates the gathered information from sensors (moisture, temperature, and humidity) using an integrated algorithm to the Blynk IoT cloud in real-time. Farmers can access this information and control the water pump accordingly via a user-friendly interface using their smartphones. The portable and eco-friendly water pump is powered via a solar panel and can be controlled using Blynk mobile application, which is also used to monitor the surroundings. The fabricated pump is inspired by wheeled travel luggage and is equipped with a water filter and multi-nozzles sprayer. The developed solar-based water pump has managed to save electricity and mitigate operational costs. Furthermore, the integration of the IoT concept has facilitated real-time monitoring and control of the pump; thus, enhancing the water usage efficiency and enabling convenient farming operations. The system functionality has been practically tested in a real environment, and its performance has been evaluated.
{"title":"Design and implementation of solar-powered with IoT-Enabled portable irrigation system","authors":"Roshahliza M. Ramli , Waheb A. Jabbar","doi":"10.1016/j.iotcps.2022.12.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2022.12.002","url":null,"abstract":"<div><p>This paper proposes a solar-powered portable water pump (SPWP) for IoT-enabled smart irrigation system (IoT-SIS). A NodeMCU microcontroller with a Wi-Fi interface and soil moisture, temperature, and humidity sensors are exploited to monitor and control the water pump and build an IoT-based irrigation system. The proposed irrigation system updates the gathered information from sensors (moisture, temperature, and humidity) using an integrated algorithm to the Blynk IoT cloud in real-time. Farmers can access this information and control the water pump accordingly via a user-friendly interface using their smartphones. The portable and eco-friendly water pump is powered via a solar panel and can be controlled using Blynk mobile application, which is also used to monitor the surroundings. The fabricated pump is inspired by wheeled travel luggage and is equipped with a water filter and multi-nozzles sprayer. The developed solar-based water pump has managed to save electricity and mitigate operational costs. Furthermore, the integration of the IoT concept has facilitated real-time monitoring and control of the pump; thus, enhancing the water usage efficiency and enabling convenient farming operations. The system functionality has been practically tested in a real environment, and its performance has been evaluated.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 212-225"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000281/pdfft?md5=a3fe80a2f3a8843780e4a45971f30907&pid=1-s2.0-S2667345222000281-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91755889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1016/j.iotcps.2022.07.001
Eduardo B. Fernandez, Virginia M. Romero
Secure systems must be built in a systematic and holistic way, where security is an integral part of the development lifecycle and cuts across all architectural layers. This need is more evident in Cyber Physical Systems (CPSs), where attacks may target not only the information model of the system but also its physical entities. CPS systems are heterogeneous and often highly complex. Their possibly numerous components and cross-domain complexity make attacks easy to propagate and security difficult to implement. Moreover, this complexity results in a considerable variety of vulnerabilities and a large attack surface. To design secure CPS systems a good approach is to abstract their complexity and develop a common framework, namely a Reference Architecture (RA), to which we add security mechanisms in appropriate places to stop its threats to define a Security Reference Architecture (SRA). An SRA is an abstract architecture describing a conceptual model of security that provides a way to specify security requirements for a wide range of derived concrete architectures. An important type of CPS is a maritime container terminal, a facility where cargo containers are transported between ships and land vehicles for onward transportation, and vice versa. We present here an SRA for cargo ports built out of patterns, which goes beyond existing models in providing a global view and a more precise description than just block diagrams. Starting from an RA, we analyze security issues in each activity of the processes of the system and enumerate its threats. We describe threats using misuse patterns, and from them we select security patterns that realize defensive solutions.
{"title":"A security reference architecture for cargo ports","authors":"Eduardo B. Fernandez, Virginia M. Romero","doi":"10.1016/j.iotcps.2022.07.001","DOIUrl":"10.1016/j.iotcps.2022.07.001","url":null,"abstract":"<div><p>Secure systems must be built in a systematic and holistic way, where security is an integral part of the development lifecycle and cuts across all architectural layers. This need is more evident in Cyber Physical Systems (CPSs), where attacks may target not only the information model of the system but also its physical entities. CPS systems are heterogeneous and often highly complex. Their possibly numerous components and cross-domain complexity make attacks easy to propagate and security difficult to implement. Moreover, this complexity results in a considerable variety of vulnerabilities and a large attack surface. To design secure CPS systems a good approach is to abstract their complexity and develop a common framework, namely a Reference Architecture (RA), to which we add security mechanisms in appropriate places to stop its threats to define a Security Reference Architecture (SRA). An SRA is an abstract architecture describing a conceptual model of security that provides a way to specify security requirements for a wide range of derived concrete architectures. An important type of CPS is a maritime container terminal, a facility where cargo containers are transported between ships and land vehicles for onward transportation, and vice versa. We present here an SRA for cargo ports built out of patterns, which goes beyond existing models in providing a global view and a more precise description than just block diagrams. Starting from an RA, we analyze security issues in each activity of the processes of the system and enumerate its threats. We describe threats using misuse patterns, and from them we select security patterns that realize defensive solutions.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"2 ","pages":"Pages 120-137"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345222000207/pdfft?md5=87eb6db102f5744874c7aa529dd9d898&pid=1-s2.0-S2667345222000207-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73560739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}