High-quality academic publishing is built on rigorous peer review [...]
高质量的学术出版建立在严格的同行评审的基础上[…]
{"title":"Acknowledgment to the Reviewers of IoT in 2022","authors":"IoT IoT Editorial Office","doi":"10.3390/iot4010003","DOIUrl":"https://doi.org/10.3390/iot4010003","url":null,"abstract":"High-quality academic publishing is built on rigorous peer review [...]","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79704405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.
{"title":"Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)","authors":"Mazen Juma, Fuad Alattar, Basim Touqan","doi":"10.3390/iot4010002","DOIUrl":"https://doi.org/10.3390/iot4010002","url":null,"abstract":"The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80259066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to a central monitoring station with smartphone notifications in a real-time setting. This action helps in the early detection of a fire and firefighters can be notified immediately—thus the spread of the fire and the harm caused by it can be reduced. The proposed system detects fires from the presence of smoke and a sudden increase in temperature. The system also logs the temperature, humidity, carbon dioxide, rain, light, and wind speed in different areas of the forest. The sensor nodes transmit the data to a hub using a long-range wireless transmitter and the hub then sends the data to the central monitoring station using the cellular Internet. The sensor nodes and hub are designed with ultra-low-power hardware and software architecture, consuming current values of only 0.37 and 1.4 mA, respectively, so that they can be powered by solar panels throughout the year. The central server and smartphone app contain maps, and the wildfire locations are marked in the case of a fire. In the present study, a prototype of the proposed system is successfully developed and tested.
{"title":"Ultra-Low-Power Architecture for the Detection and Notification of Wildfires Using the Internet of Things","authors":"Tareq Khan","doi":"10.3390/iot4010001","DOIUrl":"https://doi.org/10.3390/iot4010001","url":null,"abstract":"Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to a central monitoring station with smartphone notifications in a real-time setting. This action helps in the early detection of a fire and firefighters can be notified immediately—thus the spread of the fire and the harm caused by it can be reduced. The proposed system detects fires from the presence of smoke and a sudden increase in temperature. The system also logs the temperature, humidity, carbon dioxide, rain, light, and wind speed in different areas of the forest. The sensor nodes transmit the data to a hub using a long-range wireless transmitter and the hub then sends the data to the central monitoring station using the cellular Internet. The sensor nodes and hub are designed with ultra-low-power hardware and software architecture, consuming current values of only 0.37 and 1.4 mA, respectively, so that they can be powered by solar panels throughout the year. The central server and smartphone app contain maps, and the wildfire locations are marked in the case of a fire. In the present study, a prototype of the proposed system is successfully developed and tested.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"327 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86776758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/978-981-19-2012-7
{"title":"Industry 4.0: Technologies, Applications, and Challenges","authors":"","doi":"10.1007/978-981-19-2012-7","DOIUrl":"https://doi.org/10.1007/978-981-19-2012-7","url":null,"abstract":"","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84375484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1109/MetroInd4.0IoT57462.2023.10180191
M. M. Céspedes
{"title":"Interference Management in Visible Light Communications based on Reconfigurable Photodetectors for Industrial IoT","authors":"M. M. Céspedes","doi":"10.1109/MetroInd4.0IoT57462.2023.10180191","DOIUrl":"https://doi.org/10.1109/MetroInd4.0IoT57462.2023.10180191","url":null,"abstract":"","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"1 1","pages":"376-381"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78354302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management level. Due to its highly scalable and interoperable architecture, it is well-positioned for future deployment in smart embedded devices towards Industry 4.0, especially in environments where there are heterogeneous communication nodes. In this paper, we aim to evaluate the performance of OPC UA for communication in Industrial Internet of Things (IIoT) environments to better understand the technical implementation of OPC UA and the feasibility of incorporating OPC UA directly to resource-constrained edge devices. We propose an architectural system framework for OPC UA performance evaluation across a wide range of experiments. Our experimental results demonstrated the efficacy of the proposed system and evaluation framework. The OPC UA-based IIoT system architecture and budget-friendly/cost-effective testbed setup can be flexibly adopted for protocol testing, prototyping and educational purposes.
{"title":"Performance Analysis of OPC UA for Industrial Interoperability towards Industry 4.0","authors":"Marc Ladegourdie, Jonathan Kua","doi":"10.3390/iot3040027","DOIUrl":"https://doi.org/10.3390/iot3040027","url":null,"abstract":"Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management level. Due to its highly scalable and interoperable architecture, it is well-positioned for future deployment in smart embedded devices towards Industry 4.0, especially in environments where there are heterogeneous communication nodes. In this paper, we aim to evaluate the performance of OPC UA for communication in Industrial Internet of Things (IIoT) environments to better understand the technical implementation of OPC UA and the feasibility of incorporating OPC UA directly to resource-constrained edge devices. We propose an architectural system framework for OPC UA performance evaluation across a wide range of experiments. Our experimental results demonstrated the efficacy of the proposed system and evaluation framework. The OPC UA-based IIoT system architecture and budget-friendly/cost-effective testbed setup can be flexibly adopted for protocol testing, prototyping and educational purposes.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88689846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, traffic monitoring, etc., human feedback can be limited or infeasible. Moreover, for immersive augmented and virtual reality, as well as other mulsemedia applications, the evaluation in terms of quality cannot only focus on the sight and hearing senses. Therefore, the traditional QoE definition and approaches for evaluating multimedia services might not be suitable for the IoT paradigm, and more quality metrics are required in order to evaluate the quality in IoT. In this paper, we review existing quality definitions, quality influence factors (IFs) and assessment approaches for IoT. This paper also introduces challenges in the area of quality assessment for the IoT paradigm.
随着多媒体业务的蓬勃发展,体验质量(Quality of Experience, QoE)受到了广泛的关注。QoE将用户的需求和期望与多媒体应用程序和网络性能联系在一起。然而,在各种物联网(IoT)应用中,如医疗保健、监控系统、交通监控等,人工反馈可能是有限的或不可行的。此外,对于沉浸式增强现实和虚拟现实以及其他多媒体应用,质量的评价不能只关注视觉和听觉。因此,传统的QoE定义和评估多媒体服务的方法可能不适合物联网范式,需要更多的质量指标来评估物联网中的质量。在本文中,我们回顾了现有的物联网质量定义、质量影响因素(if)和评估方法。本文还介绍了物联网范式质量评估领域的挑战。
{"title":"Defining and Assessing Quality in IoT Environments: A Survey","authors":"Aggeliki Sgora, P. Chatzimisios","doi":"10.3390/iot3040026","DOIUrl":"https://doi.org/10.3390/iot3040026","url":null,"abstract":"With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, traffic monitoring, etc., human feedback can be limited or infeasible. Moreover, for immersive augmented and virtual reality, as well as other mulsemedia applications, the evaluation in terms of quality cannot only focus on the sight and hearing senses. Therefore, the traditional QoE definition and approaches for evaluating multimedia services might not be suitable for the IoT paradigm, and more quality metrics are required in order to evaluate the quality in IoT. In this paper, we review existing quality definitions, quality influence factors (IFs) and assessment approaches for IoT. This paper also introduces challenges in the area of quality assessment for the IoT paradigm.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"139 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79983548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The proposed approach consists of an access platform called Access UAV (A_UAV) that stochastically coordinates the data collection from the Inspection-UAVs (I_UAVs) equipped with a visual sensor to relay the same to the cloud. Our approach jointly considers the trajectory optimization of A_UAV and the stability of the data queues at each UAV. In particular, the Distance and Access Latency Aware Trajectory (DLAT) optimization for A_UAVs is developed, which generates a fair access schedule for I_UAVs. Moreover, a Lyapunov-based online optimization ensures the system stability of the average queue backlogs for dynamic data collection while minimizing total system energy. Coordination between I_UAV and A_UAV is achieved through a message-based mechanism. The simulation results validate the performance of our proposed approach against several baselines under different parameter settings.
{"title":"Optimizing Trajectory and Dynamic Data Offloading Using a UAV Access Platform","authors":"A. Kaur, S. S. Jha, Jiong Jin, Hadi Ghaderi","doi":"10.3390/iot3040025","DOIUrl":"https://doi.org/10.3390/iot3040025","url":null,"abstract":"The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The proposed approach consists of an access platform called Access UAV (A_UAV) that stochastically coordinates the data collection from the Inspection-UAVs (I_UAVs) equipped with a visual sensor to relay the same to the cloud. Our approach jointly considers the trajectory optimization of A_UAV and the stability of the data queues at each UAV. In particular, the Distance and Access Latency Aware Trajectory (DLAT) optimization for A_UAVs is developed, which generates a fair access schedule for I_UAVs. Moreover, a Lyapunov-based online optimization ensures the system stability of the average queue backlogs for dynamic data collection while minimizing total system energy. Coordination between I_UAV and A_UAV is achieved through a message-based mechanism. The simulation results validate the performance of our proposed approach against several baselines under different parameter settings.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78853288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.
{"title":"Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control","authors":"Noon Hussein, A. Nhlabatsi","doi":"10.3390/iot3040024","DOIUrl":"https://doi.org/10.3390/iot3040024","url":null,"abstract":"The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"491 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78130733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model is carried out and the transient analytical solution to the system is derived with a group of recursive coefficients by using the ordinary differential equations (ODEs) technique. From which the steady-state probabilities are solved. Then, some performance metrics of interest are derived along with numerical results. Although the paper is initiated from the IoT based edge computing platform, the proposed system modeling and analysis method can be extended to more general situations such as telecommunication, manufacturing, transportation, and many other areas that are closely related to people’s daily lives.
{"title":"Transient Analysis of a Finite Queueing System with Bulk Arrivals in IoT-Based Edge Computing Systems","authors":"Shensheng Tang","doi":"10.3390/iot3040023","DOIUrl":"https://doi.org/10.3390/iot3040023","url":null,"abstract":"Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model is carried out and the transient analytical solution to the system is derived with a group of recursive coefficients by using the ordinary differential equations (ODEs) technique. From which the steady-state probabilities are solved. Then, some performance metrics of interest are derived along with numerical results. Although the paper is initiated from the IoT based edge computing platform, the proposed system modeling and analysis method can be extended to more general situations such as telecommunication, manufacturing, transportation, and many other areas that are closely related to people’s daily lives.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"481 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80859473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}