Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976174
Jingfang Ding, M. Zheng
Industrial Wireless Networks (IWNs) are expected to guarantee the Ultra-Reliable Low-Latency Communication (URLLC) in future manufacturing systems. However, due to limited resources and unstable radio environment, it is an inherent challenge to improve transmission reliability while maintaining low latency. This paper considers the uplink URLLC of mixed traffic (deterministic traffic and sporadic traffic) in IWNs with multiple channels. For deterministic traffic, an Automatic On-demand Retransmission scheme based on NACK REpetitions (AOR-NRE) is proposed. For sporadic traffic, a Flexible Repetition Coding-based Contention scheme (FRCC) is proposed. Then, the adaptive decision for mixed traffic on a time slicing based scheme and a frequency slicing based scheme is explored based on reliability analysis of AOR-NRE and FRCC. Finally, the advantages of the proposed retransmission schemes over existing works and the significance of adaptive decision are demonstrated via numerical results.
{"title":"Resource Allocation and Retransmission Scheme for URLLC in Industrial Wireless Networks with Mixed Traffic","authors":"Jingfang Ding, M. Zheng","doi":"10.1109/INDIN51773.2022.9976174","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976174","url":null,"abstract":"Industrial Wireless Networks (IWNs) are expected to guarantee the Ultra-Reliable Low-Latency Communication (URLLC) in future manufacturing systems. However, due to limited resources and unstable radio environment, it is an inherent challenge to improve transmission reliability while maintaining low latency. This paper considers the uplink URLLC of mixed traffic (deterministic traffic and sporadic traffic) in IWNs with multiple channels. For deterministic traffic, an Automatic On-demand Retransmission scheme based on NACK REpetitions (AOR-NRE) is proposed. For sporadic traffic, a Flexible Repetition Coding-based Contention scheme (FRCC) is proposed. Then, the adaptive decision for mixed traffic on a time slicing based scheme and a frequency slicing based scheme is explored based on reliability analysis of AOR-NRE and FRCC. Finally, the advantages of the proposed retransmission schemes over existing works and the significance of adaptive decision are demonstrated via numerical results.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976157
Quang-Duy Nguyen, S. Dhouib, K. Suri, Fadwa Rekik
Open Platform Communication Unified Architecture (OPC UA) has emerged as a highly-demanded standard in building industrial systems. One factor in this success is the concepts of OPC UA address space and OPC UA information model. OPC UA address space provides a mechanism to represent the resources of an OPC UA server and its field devices as OPC UA nodes. OPC UA information model structures OPC UA nodes as a schema. Once other devices and systems understand the schema, they can interact appropriately with the industrial system. Thus, designing the OPC UA information model is an undeniable and essential practice of OPC UA-based industrial system engineering. However, both academia and industry suffer from a lack of shared experiences on this subject. This gap motivated us to share our experiences on the development of an OPC UA information model. These experiences are based on an actual product assembly line monitoring case study developed at CEA LIST. Overall, in this paper, we aim to throw some light on the steps involved in the transformation of a requirement specification into an OPC UA information model.
{"title":"From Requirement Specification to OPC UA Information Model Design: A Product Assembly Line Monitoring Case Study","authors":"Quang-Duy Nguyen, S. Dhouib, K. Suri, Fadwa Rekik","doi":"10.1109/INDIN51773.2022.9976157","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976157","url":null,"abstract":"Open Platform Communication Unified Architecture (OPC UA) has emerged as a highly-demanded standard in building industrial systems. One factor in this success is the concepts of OPC UA address space and OPC UA information model. OPC UA address space provides a mechanism to represent the resources of an OPC UA server and its field devices as OPC UA nodes. OPC UA information model structures OPC UA nodes as a schema. Once other devices and systems understand the schema, they can interact appropriately with the industrial system. Thus, designing the OPC UA information model is an undeniable and essential practice of OPC UA-based industrial system engineering. However, both academia and industry suffer from a lack of shared experiences on this subject. This gap motivated us to share our experiences on the development of an OPC UA information model. These experiences are based on an actual product assembly line monitoring case study developed at CEA LIST. Overall, in this paper, we aim to throw some light on the steps involved in the transformation of a requirement specification into an OPC UA information model.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976099
Xuan-Thuy Vo, T. Tran, Duy-Linh Nguyen, K. Jo
Accurate instance segmentation requires high-resolution features for performing a dense pixel-wise prediction task. However, using high-resolution feature maps results in highly expensive model complexity and ineffective receptive fields. To overcome the problems of high-resolution features, conventional methods explore multi-level feature fusion that exchanges the information between low-level features at earlier layers and high-level features at top layers. Both low and high information is extracted by the hierarchical backbone network where high-level features contain more semantic cues and low-level features encompass more specific patterns. Thus, adopting these features to the training segmentation model is necessary, and designing a more efficient multi-level feature fusion is crucial. Existing methods balance such information by using top-down and bottom-up pathway connections with more inefficient convolution layers to produce richer multi-scale features. In this work, we contribute two folds: (1) a simple but effective multilevel feature reweighting layer is proposed to strengthen deep high-level features based on channel reweighting generated from multiple features of the backbone, and (2) an efficient fusion block is proposed to process low-resolution features in a depth-to-spatial manner and combine enhanced multi-level features together. These designs enable the segmentation models to predict instance kernels for mask generation on high-level feature maps. To verify the effectiveness of the proposed method, we conduct experiments on the challenging benchmark dataset MS-COCO. Surprisingly, our simple network outperforms the baseline in both accuracy and inference speed. More specifically, we achieve 35.4% APmask at 19.5 FPS on a GPU device, becoming a state-of-the-art instance segmentation method.
{"title":"Multi-level Feature Reweighting and Fusion for Instance Segmentation","authors":"Xuan-Thuy Vo, T. Tran, Duy-Linh Nguyen, K. Jo","doi":"10.1109/INDIN51773.2022.9976099","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976099","url":null,"abstract":"Accurate instance segmentation requires high-resolution features for performing a dense pixel-wise prediction task. However, using high-resolution feature maps results in highly expensive model complexity and ineffective receptive fields. To overcome the problems of high-resolution features, conventional methods explore multi-level feature fusion that exchanges the information between low-level features at earlier layers and high-level features at top layers. Both low and high information is extracted by the hierarchical backbone network where high-level features contain more semantic cues and low-level features encompass more specific patterns. Thus, adopting these features to the training segmentation model is necessary, and designing a more efficient multi-level feature fusion is crucial. Existing methods balance such information by using top-down and bottom-up pathway connections with more inefficient convolution layers to produce richer multi-scale features. In this work, we contribute two folds: (1) a simple but effective multilevel feature reweighting layer is proposed to strengthen deep high-level features based on channel reweighting generated from multiple features of the backbone, and (2) an efficient fusion block is proposed to process low-resolution features in a depth-to-spatial manner and combine enhanced multi-level features together. These designs enable the segmentation models to predict instance kernels for mask generation on high-level feature maps. To verify the effectiveness of the proposed method, we conduct experiments on the challenging benchmark dataset MS-COCO. Surprisingly, our simple network outperforms the baseline in both accuracy and inference speed. More specifically, we achieve 35.4% APmask at 19.5 FPS on a GPU device, becoming a state-of-the-art instance segmentation method.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129692170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976117
Mercedes Chacón Vásquez
A control over the network for an activated sludge wastewater treatment plant (WWTP) is presented. A predictive PID control algorithm is applied to the dissolved oxygen concentration in the aerated tank and to the nitrate level. To increase the reliability and performance of the networked solution, the effect of dropouts in the transmission was also investigated. The control strategy is evaluated using a networked wastewater control system simulator, which is an extension of the Benchmark Simulation Model No. 1 (BSM1) and a network simulator. The results showed that the approach can be used effectively for control in WWTP, since it achieves satisfactory dissolved oxygen control and dropout compensation.
{"title":"Control over networks: A case study of Wastewater Treatment Plants","authors":"Mercedes Chacón Vásquez","doi":"10.1109/INDIN51773.2022.9976117","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976117","url":null,"abstract":"A control over the network for an activated sludge wastewater treatment plant (WWTP) is presented. A predictive PID control algorithm is applied to the dissolved oxygen concentration in the aerated tank and to the nitrate level. To increase the reliability and performance of the networked solution, the effect of dropouts in the transmission was also investigated. The control strategy is evaluated using a networked wastewater control system simulator, which is an extension of the Benchmark Simulation Model No. 1 (BSM1) and a network simulator. The results showed that the approach can be used effectively for control in WWTP, since it achieves satisfactory dissolved oxygen control and dropout compensation.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127211013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976087
Jaekwon Lee, Jooyoung Kim, K. Toh
In this paper, we propose to extract the intersection points of the palmprint and the palm-vein lines from multi-spectral images and use them as reliable features for identity verification. Essentially, by utilizing a sum of cardinal directional image difference operation, the palmprint and palm-vein line features are respectively extracted from palm images of the Blue channel and the NIR channel of image spectrums based on simple matrix projection. Subsequently, the intersection locations of the two biometric line features are extracted and utilized to compute a set of keypoint descriptors. After calculating the match scores based on the extracted keypoint descriptors, a score level fusion of the matching results obtained from the Blue channel and the NIR channel is adopted to enhance the verification performance. The proposed method has been experimented on a public domain multispectral palm database where encouraging results in terms of verification accuracy have been obtained.
{"title":"Identity Verification based on the RGB and NIR Images of the Palm","authors":"Jaekwon Lee, Jooyoung Kim, K. Toh","doi":"10.1109/INDIN51773.2022.9976087","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976087","url":null,"abstract":"In this paper, we propose to extract the intersection points of the palmprint and the palm-vein lines from multi-spectral images and use them as reliable features for identity verification. Essentially, by utilizing a sum of cardinal directional image difference operation, the palmprint and palm-vein line features are respectively extracted from palm images of the Blue channel and the NIR channel of image spectrums based on simple matrix projection. Subsequently, the intersection locations of the two biometric line features are extracted and utilized to compute a set of keypoint descriptors. After calculating the match scores based on the extracted keypoint descriptors, a score level fusion of the matching results obtained from the Blue channel and the NIR channel is adopted to enhance the verification performance. The proposed method has been experimented on a public domain multispectral palm database where encouraging results in terms of verification accuracy have been obtained.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976074
V. Berezovsky, Yunfeng Bai, Ivan Sharshov, R. Aleshko, K. Shoshina, I. Vasendina
Using high resolution (HR) images collected from UAV, aerial craft or satellites is a research hotspot in the field forest areas analyzing. In practice, HR images are available for a small number of regions, while for the rest, the maximum density various around 1 px/m. HR image reconstruction is a well-known problem in computer vision. Recently, deep learning algorithms have achieved great success in image processing, so we have introduced them into the field of processing orthoimages. At the same time, we noticed that orthoimages generally have colorful blocks of different sizes. Taking into account this feature, we did not apply the classical algorithms directly, but made some improvements. Experiments show that the effect of proposed method is equivalent to the effect of classical algorithms, however, at the preprocessing stage, it significantly saves time. An approach to the forest areas analyzing, including image segmentation and the tree spices classification is proposed. The results of numerical calculations are presented.
{"title":"Orthoimage Super-Resolution via Deep Convolutional Neural Networks","authors":"V. Berezovsky, Yunfeng Bai, Ivan Sharshov, R. Aleshko, K. Shoshina, I. Vasendina","doi":"10.1109/INDIN51773.2022.9976074","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976074","url":null,"abstract":"Using high resolution (HR) images collected from UAV, aerial craft or satellites is a research hotspot in the field forest areas analyzing. In practice, HR images are available for a small number of regions, while for the rest, the maximum density various around 1 px/m. HR image reconstruction is a well-known problem in computer vision. Recently, deep learning algorithms have achieved great success in image processing, so we have introduced them into the field of processing orthoimages. At the same time, we noticed that orthoimages generally have colorful blocks of different sizes. Taking into account this feature, we did not apply the classical algorithms directly, but made some improvements. Experiments show that the effect of proposed method is equivalent to the effect of classical algorithms, however, at the preprocessing stage, it significantly saves time. An approach to the forest areas analyzing, including image segmentation and the tree spices classification is proposed. The results of numerical calculations are presented.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115051742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976177
Luyue Ji, Wen-Ruey Wu, Chaojie Gu, Jichao Bi, Shibo He, Zhiguo Shi
With the emergence of Industry 5.0, it is significant to enable efficient cooperation between humans and machines in the Industrial Internet of Things (IIoT). However, achieving real-time and reliable transmission of data flows deriving from time-sensitive applications in IIoT remains an open challenge. In this paper, we propose a three-layer software-defined IIoT (SDIIoT) architecture to enable multiple industrial services and flexible network configuration. In particular, when network services change frequently in SDIIoT, the delay of the control plane has a great influence on the end-to-end delay of data flows. To address this issue, we portray two different service curves of OpenFlow switches to adapt to dynamic network status based on Network Calculus (NC). To elevate resource efficiency and comply with friendly environments, we minimize the total worst-case network cost under strict resource constraints and transmission requirements by exploiting the joint flow routing and scheduling algorithm (JFRSA). Our numerical simulation results demonstrate the effectiveness and efficiency of our solution.
{"title":"Network Calculus-based Routing and Scheduling in Software-defined Industrial Internet of Things","authors":"Luyue Ji, Wen-Ruey Wu, Chaojie Gu, Jichao Bi, Shibo He, Zhiguo Shi","doi":"10.1109/INDIN51773.2022.9976177","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976177","url":null,"abstract":"With the emergence of Industry 5.0, it is significant to enable efficient cooperation between humans and machines in the Industrial Internet of Things (IIoT). However, achieving real-time and reliable transmission of data flows deriving from time-sensitive applications in IIoT remains an open challenge. In this paper, we propose a three-layer software-defined IIoT (SDIIoT) architecture to enable multiple industrial services and flexible network configuration. In particular, when network services change frequently in SDIIoT, the delay of the control plane has a great influence on the end-to-end delay of data flows. To address this issue, we portray two different service curves of OpenFlow switches to adapt to dynamic network status based on Network Calculus (NC). To elevate resource efficiency and comply with friendly environments, we minimize the total worst-case network cost under strict resource constraints and transmission requirements by exploiting the joint flow routing and scheduling algorithm (JFRSA). Our numerical simulation results demonstrate the effectiveness and efficiency of our solution.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976076
Guanwen Cui, Zhezhuang Xu, Xuchao Gao, Songbing Lin, Yi Guo
Single twisted pair Ethernet becomes popular in the industrial internet of thing (IIoT), since it can use only one twisted pair to provide high speed data transmission while the cables of the field bus can be reused. However, since its transmission medium is inferior to traditional Ethernet, it is easier to generate delay jitter that greatly impacts the accuracy of time synchronization. To solve this problem, in this paper, an offset estimation method based on AutoRegressive Integrated Moving Average (ARIMA) and Long Short-Term Memory (LSTM) is proposed to estimate the clock offset when the delay jitter appears. The offset estimation model is firstly obtained by training the ARIMA-LSTM with offline offset data. When the delay jitter is detected, the offset can be estimated by the model to replace the unreliable offset obtained by the time synchronization protocol. Experiments are executed in the testbed, and the results prove that the proposed method can improve the time synchronization accuracy in the single twisted pair Ethernet.
{"title":"Offset Estimation Based on ARIMA-LSTM for Time Synchronization in Single Twisted Pair Ethernet","authors":"Guanwen Cui, Zhezhuang Xu, Xuchao Gao, Songbing Lin, Yi Guo","doi":"10.1109/INDIN51773.2022.9976076","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976076","url":null,"abstract":"Single twisted pair Ethernet becomes popular in the industrial internet of thing (IIoT), since it can use only one twisted pair to provide high speed data transmission while the cables of the field bus can be reused. However, since its transmission medium is inferior to traditional Ethernet, it is easier to generate delay jitter that greatly impacts the accuracy of time synchronization. To solve this problem, in this paper, an offset estimation method based on AutoRegressive Integrated Moving Average (ARIMA) and Long Short-Term Memory (LSTM) is proposed to estimate the clock offset when the delay jitter appears. The offset estimation model is firstly obtained by training the ARIMA-LSTM with offline offset data. When the delay jitter is detected, the offset can be estimated by the model to replace the unreliable offset obtained by the time synchronization protocol. Experiments are executed in the testbed, and the results prove that the proposed method can improve the time synchronization accuracy in the single twisted pair Ethernet.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114457557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976108
Inês Lino, J. Cecílio
The Internet of Things has been applied in different application contexts, ranging from industrial, healthcare or simple home life applications. It allows adding a new level of automation to objects, making them appealing to everyone. Since several applications involve data, and in some cases, it is sensitive, those applications are more vulnerable to be attacked. As a result, researchers are constantly exploring secure mechanisms to keep the data and its owners safe. For the resource-constrained nature of these IoT applications, the design of cryptography solutions becomes a challenging task because IoT nodes should be cheap and require low power, which means lower computational performance. Lightweight cryptography algorithms are attractive solutions to reduce computation complexity, keeping the desired level of security. This work provides an experimental performance analysis of several cryptography solutions targeted for embedded platforms to help choose better algorithms for IoT systems in terms of efficiency. Execution time, code efficiency and communication influences are evaluated for a set of cryptography algorithms. The results of this work intend to help IoT developers to choose a suitable cryptography algorithm for their IoT applications.
{"title":"A Comparative Analysis of the Impact of Cryptography in IoT LoRa Applications","authors":"Inês Lino, J. Cecílio","doi":"10.1109/INDIN51773.2022.9976108","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976108","url":null,"abstract":"The Internet of Things has been applied in different application contexts, ranging from industrial, healthcare or simple home life applications. It allows adding a new level of automation to objects, making them appealing to everyone. Since several applications involve data, and in some cases, it is sensitive, those applications are more vulnerable to be attacked. As a result, researchers are constantly exploring secure mechanisms to keep the data and its owners safe. For the resource-constrained nature of these IoT applications, the design of cryptography solutions becomes a challenging task because IoT nodes should be cheap and require low power, which means lower computational performance. Lightweight cryptography algorithms are attractive solutions to reduce computation complexity, keeping the desired level of security. This work provides an experimental performance analysis of several cryptography solutions targeted for embedded platforms to help choose better algorithms for IoT systems in terms of efficiency. Execution time, code efficiency and communication influences are evaluated for a set of cryptography algorithms. The results of this work intend to help IoT developers to choose a suitable cryptography algorithm for their IoT applications.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976069
Torben Miny, Sebastian Heppner, Igor Garmaev, T. Kleinert, M. Ristin, H. W. V. D. Venn, Björn Otto, Karsten Meinecke, C. Diedrich, Nico Braunisch, M. Wollschlaeger
The digital twin, or more precisely the Asset Administration Shell, is the key element for interoperability in Industrie 4.0. Together with the asset, it forms the I4.0 component. For the development of I4.0 components, the availability of suitable software development tools is becoming increasingly relevant. However, it is not yet specified how these tools are to be systematically tested for correctness, compliance and conformity. These topics are the focus of this work. We show different established testing methods, evaluate their suitability and describe an approach for a capable test environment.
{"title":"Semi-Automatic Testing of Data-Focused Software Development Kits for Industrie 4.0","authors":"Torben Miny, Sebastian Heppner, Igor Garmaev, T. Kleinert, M. Ristin, H. W. V. D. Venn, Björn Otto, Karsten Meinecke, C. Diedrich, Nico Braunisch, M. Wollschlaeger","doi":"10.1109/INDIN51773.2022.9976069","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976069","url":null,"abstract":"The digital twin, or more precisely the Asset Administration Shell, is the key element for interoperability in Industrie 4.0. Together with the asset, it forms the I4.0 component. For the development of I4.0 components, the availability of suitable software development tools is becoming increasingly relevant. However, it is not yet specified how these tools are to be systematically tested for correctness, compliance and conformity. These topics are the focus of this work. We show different established testing methods, evaluate their suitability and describe an approach for a capable test environment.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}