Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144245
A. M. Hosseini, T. Sauter, W. Kastner
The Digital Twin (DT) paradigm has received attention for its potential in diverse industrial sectors like manufacturing, automotive, healthcare, electric grid, and transportation. The Asset Administration Shell (AAS) as an instantiation of the DT paradigm is proposed by Plattform Industrie 4.0, aiming to exchange asset-related data and services from when the asset is produced to its disposal in an interoperable way involving the key stakeholders. In Industrial Control Systems (ICS), AAS integration can bring about new safety and security concerns. Although there are standards covering safety and security separately, no finalised standard supports safety and security in a combined way. The increase in safety and security concerns because of AAS integration and recent cyber attacks that showed security and safety are interconnected, encourage us to explore one of the earliest activities in system development, requirement specification. Therefore, this paper investigates the impact of AAS integration into a use case on safety and security requirements specification according to IEC 62443 and 61511. The results highlight the interconnection of safety and security requirements in the proposed use case due to AAS integration and illustrate security requirements that potentially can affect safety.
{"title":"Safety and Security Requirements in AAS Integration: Use Case Demonstration","authors":"A. M. Hosseini, T. Sauter, W. Kastner","doi":"10.1109/WFCS57264.2023.10144245","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144245","url":null,"abstract":"The Digital Twin (DT) paradigm has received attention for its potential in diverse industrial sectors like manufacturing, automotive, healthcare, electric grid, and transportation. The Asset Administration Shell (AAS) as an instantiation of the DT paradigm is proposed by Plattform Industrie 4.0, aiming to exchange asset-related data and services from when the asset is produced to its disposal in an interoperable way involving the key stakeholders. In Industrial Control Systems (ICS), AAS integration can bring about new safety and security concerns. Although there are standards covering safety and security separately, no finalised standard supports safety and security in a combined way. The increase in safety and security concerns because of AAS integration and recent cyber attacks that showed security and safety are interconnected, encourage us to explore one of the earliest activities in system development, requirement specification. Therefore, this paper investigates the impact of AAS integration into a use case on safety and security requirements specification according to IEC 62443 and 61511. The results highlight the interconnection of safety and security requirements in the proposed use case due to AAS integration and illustrate security requirements that potentially can affect safety.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144246
Jialin Zhang, W. Liang, Bo Yang, Huaguang Shi, Qi Wang, Zhibo Pang
The Industrial Internet of Things (IIoTs) plays an important role in various industrial applications, which require multiple time-critical networks to be deployed in the same region. The limited communication resources inevitably incur network coexistence problems. For scenarios where coexisting networks cannot coordinate effectively, the centralized or partial-information-based decentralized resource allocation methods cannot be implemented. To address this concern, we propose a Cooperation-Free Reinforcement Learning (CF-RL) algorithm for the fully distributed resource allocation problem in coexisting IIoT systems. Each network adopts the proposed algorithm to minimize collisions through a trial-and-error approach without any information interaction. To resist the influence of environmental dynamics, each coexisting network learns the state transition probability of the resource block instead of the resource block's position. Moreover, to potentially ensure the overall system performance, each network additionally considers the period offset in the initialization phase and action selection phase, so that the coexisting networks have different preferences for different state transitions. We conduct extensive simulations to verify the convergence performance. Evaluation results show that the CF-RL algorithm almost achieves (more than 99.88%) the effect of centralized resource allocation and has obvious superiorities over other cooperation-free algorithms in terms of the convergence rate, the number of collisions, and the resource utilization ratio.
{"title":"A Cooperation-Free Resource Allocation Algorithm Enhanced by Reinforcement Learning for Coexisting IIoTs","authors":"Jialin Zhang, W. Liang, Bo Yang, Huaguang Shi, Qi Wang, Zhibo Pang","doi":"10.1109/WFCS57264.2023.10144246","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144246","url":null,"abstract":"The Industrial Internet of Things (IIoTs) plays an important role in various industrial applications, which require multiple time-critical networks to be deployed in the same region. The limited communication resources inevitably incur network coexistence problems. For scenarios where coexisting networks cannot coordinate effectively, the centralized or partial-information-based decentralized resource allocation methods cannot be implemented. To address this concern, we propose a Cooperation-Free Reinforcement Learning (CF-RL) algorithm for the fully distributed resource allocation problem in coexisting IIoT systems. Each network adopts the proposed algorithm to minimize collisions through a trial-and-error approach without any information interaction. To resist the influence of environmental dynamics, each coexisting network learns the state transition probability of the resource block instead of the resource block's position. Moreover, to potentially ensure the overall system performance, each network additionally considers the period offset in the initialization phase and action selection phase, so that the coexisting networks have different preferences for different state transitions. We conduct extensive simulations to verify the convergence performance. Evaluation results show that the CF-RL algorithm almost achieves (more than 99.88%) the effect of centralized resource allocation and has obvious superiorities over other cooperation-free algorithms in terms of the convergence rate, the number of collisions, and the resource utilization ratio.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130344251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144125
Álvaro Medeiros, V. Cionca
The performance constraints imposed to the use of wireless communications on industrial applications collide with the severe propagation conditions of such adverse environment. The small-scale variations due to multipath and mobility of transceiver and/or scatterers must be characterized properly in order to select the most suitable fading mitigation technique. An important parameter related to the nature of the multipath components is the Rician $K$ -factor, which can be obtained from both channel impulse response and received power level time series, also known as wideband and narrowband methods. At runtime narrowband methods are straightforward due to the reduced capability of operational wireless transceivers. In this paper, we analyze wireless channel measurements of different industrial scenarios in order to compare $K$ -factor estimators. Results indicate similarities between narrowband and a wideband $K$ -factor estimator, which means accurate channel characterization at operational time is possible. Additionally, an application example evaluates the $K$ -factor estimation on the performance of wireless communication systems.
{"title":"Comparison and Analysis of Ricean $K$-Factor Estimators in Industrial Wireless Channels","authors":"Álvaro Medeiros, V. Cionca","doi":"10.1109/WFCS57264.2023.10144125","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144125","url":null,"abstract":"The performance constraints imposed to the use of wireless communications on industrial applications collide with the severe propagation conditions of such adverse environment. The small-scale variations due to multipath and mobility of transceiver and/or scatterers must be characterized properly in order to select the most suitable fading mitigation technique. An important parameter related to the nature of the multipath components is the Rician $K$ -factor, which can be obtained from both channel impulse response and received power level time series, also known as wideband and narrowband methods. At runtime narrowband methods are straightforward due to the reduced capability of operational wireless transceivers. In this paper, we analyze wireless channel measurements of different industrial scenarios in order to compare $K$ -factor estimators. Results indicate similarities between narrowband and a wideband $K$ -factor estimator, which means accurate channel characterization at operational time is possible. Additionally, an application example evaluates the $K$ -factor estimation on the performance of wireless communication systems.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144250
Dreyelian Morejón, E. Iradier, P. Angueira, J. Montalbán
Upgrading wired industrial field buses with wireless counterparts is a key driver for future industrial applications and systems. This migration faces significant challenges associated with security, reliability, and lack of generally accepted standards. Moreover, wireless PHY and MAC layer developments require accurate, reliable, and realistic propagation channel models. Reliable models for Delay Profile and Doppler Spectra are scarce in the literature. This work analyses channel models based on reliable empirical data. It includes a description of the source databases, the processing methods, and the first results of multipath distribution and Doppler metrics. The results indicate that previous assumptions on Laplacian Doppler should not be taken for granted in industrial environments.
{"title":"Empirical Delay and Doppler Profiles for Industrial Wireless Channel Models","authors":"Dreyelian Morejón, E. Iradier, P. Angueira, J. Montalbán","doi":"10.1109/WFCS57264.2023.10144250","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144250","url":null,"abstract":"Upgrading wired industrial field buses with wireless counterparts is a key driver for future industrial applications and systems. This migration faces significant challenges associated with security, reliability, and lack of generally accepted standards. Moreover, wireless PHY and MAC layer developments require accurate, reliable, and realistic propagation channel models. Reliable models for Delay Profile and Doppler Spectra are scarce in the literature. This work analyses channel models based on reliable empirical data. It includes a description of the source databases, the processing methods, and the first results of multipath distribution and Doppler metrics. The results indicate that previous assumptions on Laplacian Doppler should not be taken for granted in industrial environments.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144115
M. Cheminod, L. Seno
Securing industrial networked infrastructures has become increasingly important since the growth in their connectivity brought by production digitalization and the diffusion of paradigms such as Industrial Internet of Things (IIoT). Network segmentation is considered best practice to protect these networks from outside/inside cyber-attacks. To this purpose, network devices equipped with forwarding/filtering capabilities need to be suitably configured and deployed for the enforcement of segment-related security policies. Configuration of these devices in today industrial networked infrastructures is typically the result of a mix of manual and automated processes and, given the heterogeneity of devices and configuration languages, as well as of the supported applications and related requirements, it is often hard to make sure of its correctness and impact, e.g., on traffic latency. In this paper, a model is proposed to jointly describe network forwarding and filtering configuration. Techniques are then provided to perform static analyses such as verification of reachability intents and configuration equivalence, as well as the estimation of the latency introduced for handling specific traffic.
{"title":"Static Analysis of Packet Forwarding and Filtering Configurations in Industrial Networks","authors":"M. Cheminod, L. Seno","doi":"10.1109/WFCS57264.2023.10144115","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144115","url":null,"abstract":"Securing industrial networked infrastructures has become increasingly important since the growth in their connectivity brought by production digitalization and the diffusion of paradigms such as Industrial Internet of Things (IIoT). Network segmentation is considered best practice to protect these networks from outside/inside cyber-attacks. To this purpose, network devices equipped with forwarding/filtering capabilities need to be suitably configured and deployed for the enforcement of segment-related security policies. Configuration of these devices in today industrial networked infrastructures is typically the result of a mix of manual and automated processes and, given the heterogeneity of devices and configuration languages, as well as of the supported applications and related requirements, it is often hard to make sure of its correctness and impact, e.g., on traffic latency. In this paper, a model is proposed to jointly describe network forwarding and filtering configuration. Techniques are then provided to perform static analyses such as verification of reachability intents and configuration equivalence, as well as the estimation of the latency introduced for handling specific traffic.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/wfcs57264.2023.10144231
{"title":"CopyNotice Preface Committee ToC","authors":"","doi":"10.1109/wfcs57264.2023.10144231","DOIUrl":"https://doi.org/10.1109/wfcs57264.2023.10144231","url":null,"abstract":"","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144122
Gabriele Formis, S. Scanzio, G. Cena, A. Valenzano
The ability to reliably predict the future quality of a wireless channel, as seen by the media access control layer, is a key enabler to improve performance of future industrial networks that do not rely on wires. Knowing in advance how much channel behavior may change can speed up procedures for adaptively selecting the best channel, making the network more deterministic, reliable, and less energy-hungry, possibly improving device roaming capabilities at the same time. To this aim, popular approaches based on moving averages and regression were compared, using multiple key performance indicators, on data captured from a real Wi-Fi setup. Moreover, a simple technique based on a linear combination of outcomes from different techniques was presented and analyzed, to further reduce the prediction error, and some considerations about lower bounds on achievable errors have been reported. We found that the best model is the exponential moving average, which managed to predict the frame delivery ratio with a 2.10% average error and, at the same time, has lower computational complexity and memory consumption than the other models we analyzed.
{"title":"Predicting Wireless Channel Quality by Means of Moving Averages and Regression Models","authors":"Gabriele Formis, S. Scanzio, G. Cena, A. Valenzano","doi":"10.1109/WFCS57264.2023.10144122","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144122","url":null,"abstract":"The ability to reliably predict the future quality of a wireless channel, as seen by the media access control layer, is a key enabler to improve performance of future industrial networks that do not rely on wires. Knowing in advance how much channel behavior may change can speed up procedures for adaptively selecting the best channel, making the network more deterministic, reliable, and less energy-hungry, possibly improving device roaming capabilities at the same time. To this aim, popular approaches based on moving averages and regression were compared, using multiple key performance indicators, on data captured from a real Wi-Fi setup. Moreover, a simple technique based on a linear combination of outcomes from different techniques was presented and analyzed, to further reduce the prediction error, and some considerations about lower bounds on achievable errors have been reported. We found that the best model is the exponential moving average, which managed to predict the frame delivery ratio with a 2.10% average error and, at the same time, has lower computational complexity and memory consumption than the other models we analyzed.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144251
Wael Alsabbagh, P. Langendörfer
S7 protocol defines an appropriate format for exchanging messages between SIMATIC S7 PLCs and their corresponding engineering software i.e., TIA Portal. Recently, Siemens has provided its newer PLC models and their proprietary S7 protocols with a very developed and sophisticated integrity check mechanism to protect them from various exploits e.g., replay attacks. This paper addresses exactly this point, and investigates the security of the most developed integrity check mechanism that the newest S7CommPlus protocol version implements. Our results showed that the latest S7 PLC models as well as their related protocols are still vulnerable. We found that adversaries can manipulate two hashes that play a significant role in generating keys and bytes for the encryption processes implemented in the S7CommPlus protocol. This allows to reproduce S7 packets and conduct several attacks that eventually impact the operation of the target PLC and the entire physical process it controls. To validate our findings, we test all the attack scenarios presented in this work on a cryptographically protected S7 PLC from the 1500 family which uses the S7CommPlusV3 protocol.
{"title":"You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol","authors":"Wael Alsabbagh, P. Langendörfer","doi":"10.1109/WFCS57264.2023.10144251","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144251","url":null,"abstract":"S7 protocol defines an appropriate format for exchanging messages between SIMATIC S7 PLCs and their corresponding engineering software i.e., TIA Portal. Recently, Siemens has provided its newer PLC models and their proprietary S7 protocols with a very developed and sophisticated integrity check mechanism to protect them from various exploits e.g., replay attacks. This paper addresses exactly this point, and investigates the security of the most developed integrity check mechanism that the newest S7CommPlus protocol version implements. Our results showed that the latest S7 PLC models as well as their related protocols are still vulnerable. We found that adversaries can manipulate two hashes that play a significant role in generating keys and bytes for the encryption processes implemented in the S7CommPlus protocol. This allows to reproduce S7 packets and conduct several attacks that eventually impact the operation of the target PLC and the entire physical process it controls. To validate our findings, we test all the attack scenarios presented in this work on a cryptographically protected S7 PLC from the 1500 family which uses the S7CommPlusV3 protocol.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144233
A. M. Hosseini, Clara Fischer, Mukund Bhole, W. Kastner, T. Sauter, S. Schlund
The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changing markets. Furthermore, Industry 4.0 or even more so, Industry 5.0 emphasizes human-centred production with collaborative robots, Cobots, to create human-robot interactions. In such scenarios, safety and security are difficult to address due to the intrinsic features of reconfigurable manufacturing, like exposure to numerous requirements changes in a short period. As safety and security can conflict in different phases of the system life-cycle, one of the earliest activities to avoid conflicts is requirements engineering which can significantly diminish the cost and time of fixing issues compared to later phases like operation. This paper proposes a methodology for safety and security requirements interaction management, including conflict detection and resolution, and shows its applicability through a reconfigurable collaborative human-robot use case. Based on the proposed methodology, we detected and resolved two safety and security requirement conflicts.
{"title":"A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application","authors":"A. M. Hosseini, Clara Fischer, Mukund Bhole, W. Kastner, T. Sauter, S. Schlund","doi":"10.1109/WFCS57264.2023.10144233","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144233","url":null,"abstract":"The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changing markets. Furthermore, Industry 4.0 or even more so, Industry 5.0 emphasizes human-centred production with collaborative robots, Cobots, to create human-robot interactions. In such scenarios, safety and security are difficult to address due to the intrinsic features of reconfigurable manufacturing, like exposure to numerous requirements changes in a short period. As safety and security can conflict in different phases of the system life-cycle, one of the earliest activities to avoid conflicts is requirements engineering which can significantly diminish the cost and time of fixing issues compared to later phases like operation. This paper proposes a methodology for safety and security requirements interaction management, including conflict detection and resolution, and shows its applicability through a reconfigurable collaborative human-robot use case. Based on the proposed methodology, we detected and resolved two safety and security requirement conflicts.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144117
David Ginthoer, D. Harutyunyan
Ethernet-based industrial communication standards are dominating the communication landscape in factories. With the transition towards more flexible and wireless solutions, there is a strong interest to enable existing wired applications, such as control-to-control (C2C) use cases, over a wireless network. In this work, we investigate an example C2C application and validate its performance when operated over 5G. For this purpose, we present measurement results taken from a 5G standalone (SA) deployment in an operational factory. Our results show that 5G can replace existing wired solution, but at the cost of a lowered C2C application efficiency due to longer network latency. We furthermore investigate the impact of cross-traffic to the C2C application and effects of traffic prioritization.
{"title":"Evaluation of Control-to-Control Communication in Industrial 5G Network","authors":"David Ginthoer, D. Harutyunyan","doi":"10.1109/WFCS57264.2023.10144117","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144117","url":null,"abstract":"Ethernet-based industrial communication standards are dominating the communication landscape in factories. With the transition towards more flexible and wireless solutions, there is a strong interest to enable existing wired applications, such as control-to-control (C2C) use cases, over a wireless network. In this work, we investigate an example C2C application and validate its performance when operated over 5G. For this purpose, we present measurement results taken from a 5G standalone (SA) deployment in an operational factory. Our results show that 5G can replace existing wired solution, but at the cost of a lowered C2C application efficiency due to longer network latency. We furthermore investigate the impact of cross-traffic to the C2C application and effects of traffic prioritization.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}