Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104764
Aydin E. Homay, M. Sousa, L. Almeida
An emerging trend in industry 4.0 is to use wireless communication infrastructure and mesh networks in applications requiring high reliability and safety. Although not a typical industrial production process, railway vehicular networks are also an industrial application which come with stringent reliability and safety requirements. Current research is focusing on using vehicular networks as an enabling technology to actively control the separation between two consecutive vehicles, enforcing a safe distance which is nevertheless much shorter than currently used to maintain vehicle separation. In this respect, we analyze a hopping strategy for Time-Slotted Channel-Hopping (TSCH), which was introduced in the IEEE 802.15.4e amendment with a view of improving the reliability of IEEE 802.15.4 networks. We define a probability framework to estimate the chance of successful hopping assuming two previously merged vehicles, and we design a zero-sum game and propose a payoff function to always place communicating nodes in a Nash equilibrium by choosing whether to hop or not, and therefore maximizing the communication throughput by mitigating jamming signals.
{"title":"Nash equilibrium for proactive anti-jamming in IEEE 802.15.4e (Emerging wireless sensor actuator technologies for I4.0)","authors":"Aydin E. Homay, M. Sousa, L. Almeida","doi":"10.1109/INDIN.2017.8104764","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104764","url":null,"abstract":"An emerging trend in industry 4.0 is to use wireless communication infrastructure and mesh networks in applications requiring high reliability and safety. Although not a typical industrial production process, railway vehicular networks are also an industrial application which come with stringent reliability and safety requirements. Current research is focusing on using vehicular networks as an enabling technology to actively control the separation between two consecutive vehicles, enforcing a safe distance which is nevertheless much shorter than currently used to maintain vehicle separation. In this respect, we analyze a hopping strategy for Time-Slotted Channel-Hopping (TSCH), which was introduced in the IEEE 802.15.4e amendment with a view of improving the reliability of IEEE 802.15.4 networks. We define a probability framework to estimate the chance of successful hopping assuming two previously merged vehicles, and we design a zero-sum game and propose a payoff function to always place communicating nodes in a Nash equilibrium by choosing whether to hop or not, and therefore maximizing the communication throughput by mitigating jamming signals.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"35 1","pages":"161-167"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75416538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104762
J. Pimentel, O. Baltuano, R. Chan, Jean-Pierre Tincopa
In this paper, we present a systematic analysis on the energy consumption of specific implementation of a WSN for rural areas. The implementation uses extremely low cost commercially available devices and transceivers operating in the 240 to 930 MHz thus covering the main sub-mega Hz ISM bands. The main objective of our analysis is the minimization of the energy consumption for a fairly generic type of WSN similar to the one deployed and tested in a rural area in Peru. The study is based on practical considerations at the design and implementation stage and the use of extremely low cost devices and radio transceivers available in the market. Our study provides an accurate characterization of the Intra cluster total energy consumption in terms of all parameters of interest of our actual WSN implementation. We have determined the optimum values for adjusting the transmission power for realistic scenarios and commercially available low cost devices. In addition, we have also characterized the actual energy consumption of our WSN using commercially available devices and compare them to their optimum values. As a result of our systematic analysis of the energy consumption we improved the antennas, reduced cable losses, improved antenna impedance matching, used elevated fixtures to place the various nodes to reduce path losses, and used appropriate operating frequencies.
{"title":"Energy optimization of an experimental wireless sensor network for remote areas, part I: Intra-cluster communications","authors":"J. Pimentel, O. Baltuano, R. Chan, Jean-Pierre Tincopa","doi":"10.1109/INDIN.2017.8104762","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104762","url":null,"abstract":"In this paper, we present a systematic analysis on the energy consumption of specific implementation of a WSN for rural areas. The implementation uses extremely low cost commercially available devices and transceivers operating in the 240 to 930 MHz thus covering the main sub-mega Hz ISM bands. The main objective of our analysis is the minimization of the energy consumption for a fairly generic type of WSN similar to the one deployed and tested in a rural area in Peru. The study is based on practical considerations at the design and implementation stage and the use of extremely low cost devices and radio transceivers available in the market. Our study provides an accurate characterization of the Intra cluster total energy consumption in terms of all parameters of interest of our actual WSN implementation. We have determined the optimum values for adjusting the transmission power for realistic scenarios and commercially available low cost devices. In addition, we have also characterized the actual energy consumption of our WSN using commercially available devices and compare them to their optimum values. As a result of our systematic analysis of the energy consumption we improved the antennas, reduced cable losses, improved antenna impedance matching, used elevated fixtures to place the various nodes to reduce path losses, and used appropriate operating frequencies.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"37 1","pages":"147-154"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78109551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104902
Sankhadeep Chatterjee, S. Sarkar, N. Dey, S. Sen, T. Goto, N. Debnath
Domestic and industrial pollutions affected the water quality to a greater extent. Polluted water became a major reason behind several community diseases, mainly in undeveloped and developing countries. The public health condition is deteriorating and putting an extra burden of countermeasures to prevent such water borne diseases from spreading. Detecting the drinking water quality can prevent such scenarios prior to the critical stage. Recent research works have achieved reasonable success in predicting the water quality. However, the accuracy levels of already proposed models are to be improved, keeping in mind the sensitivity of the problem domain. In the current work, multi-objective genetic algorithm was employed to train the artificial neural network (NN-MOGA) to improve its performance over its traditional counterparts. The proposed model gradually minimizes two different objective functions; namely the root mean square error (RMSE) and Maximum Error in order to find the optimal weight vector for the artificial neural network (ANN). The proposed model was compared with three other, well established models namely NN-GA (ANN trained with Genetic Algorithm), NN-PSO (ANN trained with Particle Swarm Optimization) and SVM in terms of accuracy, precision, recall, F-Measure, Matthews correlation coefficient (MCC) and Fowlkes-Mallows index (FM index). The simulation results established superior accuracy of NN-MOGA over the other models.
{"title":"Water quality prediction: Multi objective genetic algorithm coupled artificial neural network based approach","authors":"Sankhadeep Chatterjee, S. Sarkar, N. Dey, S. Sen, T. Goto, N. Debnath","doi":"10.1109/INDIN.2017.8104902","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104902","url":null,"abstract":"Domestic and industrial pollutions affected the water quality to a greater extent. Polluted water became a major reason behind several community diseases, mainly in undeveloped and developing countries. The public health condition is deteriorating and putting an extra burden of countermeasures to prevent such water borne diseases from spreading. Detecting the drinking water quality can prevent such scenarios prior to the critical stage. Recent research works have achieved reasonable success in predicting the water quality. However, the accuracy levels of already proposed models are to be improved, keeping in mind the sensitivity of the problem domain. In the current work, multi-objective genetic algorithm was employed to train the artificial neural network (NN-MOGA) to improve its performance over its traditional counterparts. The proposed model gradually minimizes two different objective functions; namely the root mean square error (RMSE) and Maximum Error in order to find the optimal weight vector for the artificial neural network (ANN). The proposed model was compared with three other, well established models namely NN-GA (ANN trained with Genetic Algorithm), NN-PSO (ANN trained with Particle Swarm Optimization) and SVM in terms of accuracy, precision, recall, F-Measure, Matthews correlation coefficient (MCC) and Fowlkes-Mallows index (FM index). The simulation results established superior accuracy of NN-MOGA over the other models.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"20 1","pages":"963-968"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78462649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104916
H. V. Lierde, T. Chow
The ever-growing amount of textual data available online creates the need for automatic text summarization tools. Probabilistic topic models are able to infer semantic relationships between sentences which is a key step of extractive summarization methods. However, they strongly rely on word co-occurrence patterns and fail to capture the actual semantic relationships between words such as synonymy, antonymy, etc. We propose a novel algorithm which incorporates pre-trained word embeddings in the probabilistic topic model in order to capture semantic similarities between sentences. These similarities provide the basis for a sentence ranking algorithm for query-oriented summarization. The summary is then produced by extracting highly ranked sentences from the original corpus. Our method is shown to outperform state-of-the-art algorithms on a benchmark dataset.
{"title":"Incorporating word embeddings in the hierarchical dirichlet process for query-oriented text summarization","authors":"H. V. Lierde, T. Chow","doi":"10.1109/INDIN.2017.8104916","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104916","url":null,"abstract":"The ever-growing amount of textual data available online creates the need for automatic text summarization tools. Probabilistic topic models are able to infer semantic relationships between sentences which is a key step of extractive summarization methods. However, they strongly rely on word co-occurrence patterns and fail to capture the actual semantic relationships between words such as synonymy, antonymy, etc. We propose a novel algorithm which incorporates pre-trained word embeddings in the probabilistic topic model in order to capture semantic similarities between sentences. These similarities provide the basis for a sentence ranking algorithm for query-oriented summarization. The summary is then produced by extracting highly ranked sentences from the original corpus. Our method is shown to outperform state-of-the-art algorithms on a benchmark dataset.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"4 1","pages":"1037-1042"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74958796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104895
Marius Brinkmann, A. Hahn
Cyber physical Systems (CPS) are a key technology to enable the development of highly automated and autonomous maritime systems. The development of new complex and distributed safety-critical systems increases the challenges of testing due to a variety of Verification and Validation (V+V) methods, strictly required confidence to functional correctness of heterogenous cooperating systems and management of test data. To facilitate these efforts, suitable engineering and risk assessment methods exist which will be performed by using a test environment building the basis for putting the system under test in a controlled test setting. The maritime physical testbed LABSKAUS is per definition a CPS and implements components such as a research boat, sensor infrastructure and a reference waterway as part of an overarching testbed approach for virtual to physical tests along the design process. This paper describes components to support the development of new maritime technologies by a physical testbed following an open and modular design and show the applicability by testing a shore based bridge.
{"title":"Testbed architecture for maritime cyber physical systems","authors":"Marius Brinkmann, A. Hahn","doi":"10.1109/INDIN.2017.8104895","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104895","url":null,"abstract":"Cyber physical Systems (CPS) are a key technology to enable the development of highly automated and autonomous maritime systems. The development of new complex and distributed safety-critical systems increases the challenges of testing due to a variety of Verification and Validation (V+V) methods, strictly required confidence to functional correctness of heterogenous cooperating systems and management of test data. To facilitate these efforts, suitable engineering and risk assessment methods exist which will be performed by using a test environment building the basis for putting the system under test in a controlled test setting. The maritime physical testbed LABSKAUS is per definition a CPS and implements components such as a research boat, sensor infrastructure and a reference waterway as part of an overarching testbed approach for virtual to physical tests along the design process. This paper describes components to support the development of new maritime technologies by a physical testbed following an open and modular design and show the applicability by testing a shore based bridge.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"78 1","pages":"923-928"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75148787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104756
Hunor Sándor, P. Haller, B. Genge, Z. Kátai
A large variety of modern technologies fade the borders between the cyber and the physical worlds. Nonetheless, the two-dimensional architecture of cyber-physical systems also enabled the proliferation of innovative attacks where traditional computer systems malware caused significant damages to physical infrastructures, such as the power grid. In this work, we propose a methodology that provides optimal intervention strategies for fixing vulnerabilities discovered in production cyber-physical systems. The main goal of the technique is to decrease the risk of vulnerabilities being exploited by malicious actors, by leveraging risk modeling together with advanced job scheduling algorithms. The proposal is evaluated through use-cases from the healthcare domain.
{"title":"Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems","authors":"Hunor Sándor, P. Haller, B. Genge, Z. Kátai","doi":"10.1109/INDIN.2017.8104756","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104756","url":null,"abstract":"A large variety of modern technologies fade the borders between the cyber and the physical worlds. Nonetheless, the two-dimensional architecture of cyber-physical systems also enabled the proliferation of innovative attacks where traditional computer systems malware caused significant damages to physical infrastructures, such as the power grid. In this work, we propose a methodology that provides optimal intervention strategies for fixing vulnerabilities discovered in production cyber-physical systems. The main goal of the technique is to decrease the risk of vulnerabilities being exploited by malicious actors, by leveraging risk modeling together with advanced job scheduling algorithms. The proposal is evaluated through use-cases from the healthcare domain.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"116 1","pages":"115-120"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79282160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104807
Mercedes Chacón Vásquez, R. Katebi
Four new predictive control algorithms are presented to compensate dropouts in wireless networked control systems. The control strategies are based on Model based predictive control (MBPC) with PID control structure. The control scheme is combined with a Kalman filter to achieve stability when the communication is subject to dropouts from sensor to controller. Notably, the proposed strategies are also applicable to compensate dropouts from controller to actuator. Several experiments using the TrueTime network simulator are provided to demonstrate the performance of the algorithms and their effectiveness.
{"title":"New predictive PID controllers for packet dropouts in wireless networked control systems","authors":"Mercedes Chacón Vásquez, R. Katebi","doi":"10.1109/INDIN.2017.8104807","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104807","url":null,"abstract":"Four new predictive control algorithms are presented to compensate dropouts in wireless networked control systems. The control strategies are based on Model based predictive control (MBPC) with PID control structure. The control scheme is combined with a Kalman filter to achieve stability when the communication is subject to dropouts from sensor to controller. Notably, the proposed strategies are also applicable to compensate dropouts from controller to actuator. Several experiments using the TrueTime network simulator are provided to demonstrate the performance of the algorithms and their effectiveness.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"30 1","pages":"413-418"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79323890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104770
Dorothea Schwung, Fabian Csaplar, Andreas Schwung, S. Ding
This paper presents a novel approach to operate industrial robots as used for manufacturing lines within a cooperative robot station. The proposed framework consists of the application of especially to the cooperative robot handling problem adjusted Reinforcement Learning (RL) algorithms. Such RL-algorithms deal with sequential decision making processes in a trial-and-error learning interaction with the environment, to finally gain an optimal team-working behavior among the robots. In particular application results to a real team-working robot station underline the effectiveness of the novel RL approach.
{"title":"An application of reinforcement learning algorithms to industrial multi-robot stations for cooperative handling operation","authors":"Dorothea Schwung, Fabian Csaplar, Andreas Schwung, S. Ding","doi":"10.1109/INDIN.2017.8104770","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104770","url":null,"abstract":"This paper presents a novel approach to operate industrial robots as used for manufacturing lines within a cooperative robot station. The proposed framework consists of the application of especially to the cooperative robot handling problem adjusted Reinforcement Learning (RL) algorithms. Such RL-algorithms deal with sequential decision making processes in a trial-and-error learning interaction with the environment, to finally gain an optimal team-working behavior among the robots. In particular application results to a real team-working robot station underline the effectiveness of the novel RL approach.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"71 1","pages":"194-199"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85198722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104750
B. Genge, A. Duka, P. Haller, Bogdan Crainicu, Hunor Sándor, Flavius Graur
Until recently, IT security received limited attention within the scope of Process Control Systems (PCS). In the past, PCS consisted of isolated, specialized components running closed process control applications, where hardware was placed in physically secured locations and connections to remote network infrastructures were forbidden. Nowadays, industrial communications are fully exploiting the plethora of features and novel capabilities deriving from the adoption of commodity off the shelf (COTS) hardware and software. Nonetheless, the reliance on COTS for remote monitoring, configuration and maintenance also exposed PCS to significant cyber threats. In light of these issues, this paper presents the steps for the design, verification and implementation of a lightweight remote attestation protocol. The protocol is aimed at providing a secure software integrity verification scheme that can be readily integrated into existing industrial applications. The main novelty of the designed protocol is that it encapsulates key elements for the protection of both participating parties (i.e., verifier and prover) against cyber attacks. The protocol is formally verified for correctness with the help of the Scyther model checking tool. The protocol implementation and experimental results are provided for a Phoenix-Contact industrial controller, which is widely used in the automation of gas transportation networks in Romania.
{"title":"Design, verification and implementation of a lightweight remote attestation protocol for process control systems","authors":"B. Genge, A. Duka, P. Haller, Bogdan Crainicu, Hunor Sándor, Flavius Graur","doi":"10.1109/INDIN.2017.8104750","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104750","url":null,"abstract":"Until recently, IT security received limited attention within the scope of Process Control Systems (PCS). In the past, PCS consisted of isolated, specialized components running closed process control applications, where hardware was placed in physically secured locations and connections to remote network infrastructures were forbidden. Nowadays, industrial communications are fully exploiting the plethora of features and novel capabilities deriving from the adoption of commodity off the shelf (COTS) hardware and software. Nonetheless, the reliance on COTS for remote monitoring, configuration and maintenance also exposed PCS to significant cyber threats. In light of these issues, this paper presents the steps for the design, verification and implementation of a lightweight remote attestation protocol. The protocol is aimed at providing a secure software integrity verification scheme that can be readily integrated into existing industrial applications. The main novelty of the designed protocol is that it encapsulates key elements for the protection of both participating parties (i.e., verifier and prover) against cyber attacks. The protocol is formally verified for correctness with the help of the Scyther model checking tool. The protocol implementation and experimental results are provided for a Phoenix-Contact industrial controller, which is widely used in the automation of gas transportation networks in Romania.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"44 1","pages":"75-82"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79744741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104888
Silia Maksuti, Ani Bicaku, Markus Tauber, Silke Palkovits-Rauter, Sarah Haas, J. Delsing
The digital transformation of industrial production is driven by the advance of Cyber-Physical Production Systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and use it as a tool to describe an end-to-end communication use case from an ongoing research project. Based on this use case we develop a business process performance and security trade-off model, which shows that maximazing both parameters at the same time is not possible, thus an efficient balance between them has to be achieved. Motivated by the result, we propose self adaptation as a solution towards a flexible and secure end-to-end communication in Industry 4.0. To identify and document the self-adaptation points in a structured methodological and lightweight way we use the bespoken meta-model.
{"title":"Towards flexible and secure end-to-end communication in industry 4.0","authors":"Silia Maksuti, Ani Bicaku, Markus Tauber, Silke Palkovits-Rauter, Sarah Haas, J. Delsing","doi":"10.1109/INDIN.2017.8104888","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104888","url":null,"abstract":"The digital transformation of industrial production is driven by the advance of Cyber-Physical Production Systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and use it as a tool to describe an end-to-end communication use case from an ongoing research project. Based on this use case we develop a business process performance and security trade-off model, which shows that maximazing both parameters at the same time is not possible, thus an efficient balance between them has to be achieved. Motivated by the result, we propose self adaptation as a solution towards a flexible and secure end-to-end communication in Industry 4.0. To identify and document the self-adaptation points in a structured methodological and lightweight way we use the bespoken meta-model.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"449 1","pages":"883-888"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79755567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}