ArticlePDF Available

Evolution of IoT to IIoT: Applications & Challenges

Authors:

Abstract and Figures

The emerging Internet of Things (IoT) provides a wide range of platform to different technologies by connecting different devices and are automated by using sensors. It builds a platform and is responsible for functioning of various smart devices over a range. After installing IoT in devices they are able to communicate with each other without involving human and computer interaction, it is also being widely used in all the fields as no human intervention is required in any IoT based applications. In this paper we present a survey of how IoT is transformed into IIoT (Industrial Internet of Things), what is Industry 4.0, what are key differences between IoT and IIoT, various application of IoT in different sectors, powerful features and advance characteristics of IoT. Since the demand of IoT systems is increasing in various fields day by day and ease of life after using smart devices but then also it possesses certain limitations too. The later part of paper focuses on security threats and issues addressed by IoT based systems along with ways to overcome the limitations possessed in the system.
Content may be subject to copyright.
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
1
Evolution of IoT to IIoT: Applications & Challenges
Himanshu1, Nikhil Sharma1*, Dr. Rajinder Singh1
{himanshu.september, nikhilsharma1694}@gmail.com, rajpanihar@rediffmail.com
1HMR Institute of Technology & Management, Delhi-110036, India
Abstract: The emerging Internet of Things (IoT) provides a wide range of platform to different technologies by connecting different devices and are
automated by using sensors. It builds a platform and is responsible for functioning of various smart devices over a range. After installing IoT in devices
they are able to communicate with each other without involving human and computer interaction, it is also being widely used in all the fields as no human
intervention is required in any IoT based applications. In this paper we present a survey of how IoT is transformed into IIoT (Industrial Internet of
Things), what is Industry 4.0, what are key differences between IoT and IIoT, various application of IoT in different sectors, powerful features and
advance characteristics of IoT. Since the demand of IoT systems is increasing in various fields day by day and ease of life after using smart devices but
then also it possesses certain limitations too. The later part of paper focuses on security threats and issues addressed by IoT based systems along with ways
to overcome the limitations possessed in the system.
Keywords: IoT, Security, Privacy, IIoT, Industry 4.0.
1. Introduction
Applications of Internet of Things (IoT) has been carried out in real life
for several years. In our daily life, IoT devices are connected with each
other to share some information without involving human efforts [1].
With the help of internet, these devices are able to collect and exchange
necessary data with each other and perform accordingly to it. The spark of
connecting Internet to the nearby physical devices is increasing rapidly
[2]. In 2020, 8.4 billion devices will connect world-wide, according to
latest Gartner report. This number can be increased to 20.4 billion by
2022. There is rapid increment of IoT applications in all parts of the
world. Europe, America and China are the major countries in which the
IoT revolutions have been already started. By the end of 2024, the number
of machines to machine (M2M) connections is believed to produce 27
billion from 5.6 billion in 2016 [3]. These statistics declares that in future
IoT will be the big reason for expanding digital economy. We could
consider IoT as the one of the major pillars of economy in future [4].
Under M2M connections large variety of applications are cover like smart
environment, smart cities, smart farming, smart industries etc. [5]. In
future, the demand of smart devices (the devices which are able
communicate or transmit data with each other on the internet directly) get
increases. After studying the variety of IoT applications, the problem of
safety and protections arises. Due to trust issues and interoperable IoT
web, prominent IoT applications may lose all its capability and unable to
gain its demand. IoT also has major security troubles likewise security
problems faced by the internet, cellular net-works, and WSNs such as
authentication issues, management issues, privacy is-sues and many more.
1.1. Traditional IT Security vs IoT Security
Table 1 shows the difference between Traditional IT Security and IoT
Security.
Table 1: Difference Between IT Devices and IoT Devices with Respect
to Security [6-7]
Traditional IT Security
IoT Security
Human is responsible for the security of
IT.
In this machine itself is responsible
for security, so with proper security
measures IoT appliances need to be
equipped.
It is mainly relying on resource rich
gadgets.
Due to lack of hardware and
software, IoT devices are less secure
than IT.
Tricky algorithms are executed for
genuine security and lower potential.
Algorithms which are insubstantial
are only preferred.
Data is collected when user grant a
permission this means privacy is control
by the user.
The risk of surface attack may
increase because IoT automatically
collects user data without its
permission.
According to table 1, it is clear that due to some challenging factors it is
difficult to secure IoT environment than a normal information technology
(IT) devices. The IoT applications creates a pleasant environment for
various kinds of cyber threats. IoT applications which are installed
worldwide have been suffers from various privacy and cyber-attacks. It
was estimated, that in the last quarter of 2016, Mirai attack covered
around 2.5 million of IoT devices and launch distributed denial of services
(DDoS) attack. Hajime, and Raper are another huge botnet attack after
Mirai which infect large number of devices which are linked with the
internet.
The Industrial Internet of Things (IIoT) concerns to industrial applications
such as manufacturing and energy management and it is also referring to
interrelated sensors, tools, and other devices which are joined with
computers [8]. IoT is for trading sector and IIoT is for industrial sector. In
the period of industry 4.0, the next industrial revolution begins which is
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
2
also known to be as Industrial Internet of Things [9]. It is considered that
Industry 4.0 [10] is the part of the Fourth Industrial Revolution. Factories
have machines with wireless connectivity and sensors which is attached to
a system that can control the whole manufacturing line and make
meaningful conclusions by its own in the Industry 4.0 [11]. Both internal
and intra-organizational services are provided to users for using the
production series with the help of Internet of Services. Technologies
which are enabled by the IIoT are: cybersecurity, cloud computing, edge
computing, 3D printing, advanced robotics, vast data, and Internet of
Things [12].
1.2. IoT Features and Characteristics
The characteristics of IoT [13] are depicted in Figure 1 & explained as
follows:
Figure 1: Characteristics of IoT
Connectivity: - It establishes a proper and secure connection between
all things of IoT to IoT platform through server or cloud. It is Bi-
directional communication, means high speed requires for messaging
between the devices and cloud.
Device Virtualization: - It is the first step of connectivity. It
systematizes combination of devices with the IOT enterprise. Next
comes, Endpoint Management which manage device endpoint
identity, metadata and lifecycle circumstances for most of the devices.
It helps to manage, which data comes from where and what to do with
that data.
Analyze: - After successful connection of all relevant things, now the
time comes to analyze the collected data and that data to build
effective business intelligence. We could call our system a smart
system, if we have a good perception into data gathered from all these
things. Real time analyze must be done with respect to event
aggregation, filtering and correlation.
Integrate: - IoT integration is very important as it helps several models
to enhance the user practice as well. Integrity is very important in
order to improve and integrate the system. In order to have better
understanding of this let’s take one example for better understanding,
let us assume I have a coffee machine and the beans in the machine
gets empty and machine automatically orders the beans or purchases it
for me from amazon. So, there are lot of things we can do when we
integrate our system.
Heterogeneity: - Due to dissimilar hardware platforms and networks
the IoT devices are heterogeneous. Two or more devices are able to
interact with each other or able to interact with service platforms with
the help of various networks and this makes device a “smart device”.
Action: - Intelligence is signifies by action. This could be relied upon
debates regarding phenomena (like in smart factory decisions) like
automation, usually the most important piece.
The rest of the paper is categorized as follows: Section 2 discusses the
evolution of IoT to IIoT, Section 3 explains the applications of IoT & IIoT
in various fields, Section 4 presents the divers challenges of IIoT followed
by Conclusion of the manuscript in Section 5.
2. Transformation of IoT to IIoT
In 1999, Kelvin Ashton coined the term “Internet of things”, He gave the
name in order to demonstrate idea that how manually objects could be
connected to net-work [14]. Then later on, Industrial Internet of Things
has led to innovations like the smart factory and computing technology.
IIoT is not only set up a connection between machines but also has human
interfacing unit for flawless system. The simple and monotonous jobs like
quality control, assembly, administration and arrangement will replace by
IIoT with a huge expectation [15].
In 2013, Department of Business, Skills, and Innovation of UK get
engaged in which they looked at six global cities and noticed how they
invested in smart cities project. It was observed that how cities like
Stockholm, Rio De Janeiro, Chicago, Hong Kong, Boston, and Barcelona
confronted particular provocations when answering to the chances that a
‘smart city’ and private sector pioneers might bring. IoT devices are not
controlled by remote, actually they can:
Exchange several information with each other using several
skills.
The Entire network can be control. (including the internet)
Sends and receives various data.
Are consider as “smart” devices with their own self processing
units.
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
3
Table 2 shows the major difference between Internet of Things (IoT) and
Indus-trial Internet of Things (IIoT) for better understanding according to
their prospect.
Table 2: Comparison between IoT and IIoT [16-17]
Prospect
Industrial Internet
of Things
Linked things
Costly machines,
sensors, systems,
basically with high
degree of difficulty
Service model
Machine-based
Communication
capacity
A large range of
connectivity
technologies and
standards.
Communication
transportation
Both wired and wireless
Amount of data
High to very high
Evaluative
Becomes serious (timing,
security, privacy
reliability)
Even though, IIoT brings industries or machines to a next level, because it
pro-vides a platform for the worldwide interconnections via IP (Internet
Protocol). With the help of IP, one device is able to liaise with other
devices by using same architecture and protocols.
3. Applications of IoT and IIoT
The applications of IoT and IIoT [18] are explained in the subsection
below.
3.1. Applications of IoT
The applications of IoT are depicted in Figure 2 and explained as follows:
Figure 2: Applications of IoT
Consumer Applications: - The IoT devices are used by the users in
there day to day life which includes home automation, fashion
technology, connected vehicles, health and appliances are
interconnected with each other and easily operable with remote.
Smart home: - Lighting, heating, air conditioning, media and security
are concept of home automation which comes under IoT. There is
platform or centers on which the working of smart home based which
is further control by the smart devices and appliances [19]. There are
several dedicated smart home centers that offer a platform to connect
different smart devices or products such as Google home, Amazon
echo, Apple’s Homepod and Samsung’s Smart thing center. Facebook
CEO Mark Zuckerberg installed Jarvis at his home, which makes his
home fully smart.
Transportation: - IoT applications expends to almost all directions of
transportation systems (i.e. the vehicle, the driver or user). The inter-
and intra-vehicular communication is enables due to active connection
be-tween various parts of a transport system [20]. For example: now a
days on road a series of cameras are attaches on an iron rod, actually
cameras detect the speed of each and every vehicle which passes
under these cam-eras. If any vehicle crossed the speed limit then
cameras captures the speed of vehicle and electronic generated challan
(e-challan) is delivered to defaulter’s house. IoT is the main reason
behind this and its smooth connectivity among all devices. Sensors
such as GPS send processed form of information to IoT hub and then
the data is observed and deliver to the user. Number of road accidents
are also reducing in this way [21].
Medical and Healthcare: - The Internet of medical things (IoMT) is an
application of the IoT for medical and health related purposes [22].
Firstly, it collects data and then data is delivered for observing,
examine and analysis. It is also known as “Smart Healthcare”. This
emerging application plays an elementary part in controlling or
viewing diseases in health community. It is possible only through the
connection of powerful wire-less remote monitoring. Due to this
smooth connection the health practitioners able to collects patient’s
data and then complicated algorithms are applying on it. In 2015,
according to some report, the IoT devices could save more than $300
billion of United States in yearly healthcare spending by decreasing
cost and increasing profit. Specialized implants such as electric
wristbands, pacemakers or advanced hearing aids are monitored by
these advanced and emerging devices.
3.2. Applications of IIoT
Upgraded efficiency, observations and the modification of the
workplace all these things are included in the Industrial Internet of
Things (IIoT) [23]. By the end of 2030, it is believed that global GDP
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
4
is rise to $15 trillion when IIoT is in-stalled worldwide. The
applications of IIoT are depicted in Figure 3 and explained as follows.
Figure 3: Applications of IIoT
Manufacturing: - Many doors are open, for creating whole new
business and market good times by these highly integrated cyber-
physical space. IIoT boost the business value and it will lead to the
Industry 4.0. In manufacturing IIoT approaches prioritizes customer
data and gathering it from multiple sources to develop actionable
insights. This leads to improved solutions that allow manufactures to
respond more quickly to their customers. IIoT reduced response times
from 5 hours to 20 minutes and they reduced product waste by 10%.
Agriculture: - IoT has a wide variety of applications in farming such
as collection of data of rainfall, humidity, wind speed, soil content,
temperature, and pest infestation [24]. This data is very useful in
improving farming techniques, reduces waste, and minimizes efforts
required to manage crops and to upgrade quantity and quality of crops
and work. For example: monitoring of soil temperature, and moisture
content is now done by the farmers and even they can apply IoT-
acquired data to precision fertilization programs [25]. In August 2018,
Toyota Tsusho started an association with Microsoft to innovate a fish
farming tools using the Microsoft Azure program. Water pump system
use artificial intelligence to sum up the number of fishes, observes it
and gather the efficacy of water flow from the analyzed data.
Military Applications: - In the military province the application of IoT
technologies are majorly use for the purpose of investigation,
inspection and in any other battle related purposes and in this the use
of sensors, robots, biometrics, vehicles and another smart technology
which is applicable on the Warfield is involved.
Internet of Battlefield Things: - The U.S. Army Research Laboratory
(ARL) commenced a project Internet of Battlefield Things (IoBT)
whose priority is to increase potential of army soldiers with the help of
IoT. The ARL formed an alliance with university, industry, and Army
researchers in 2017 whose objective is to enhances the conceptual
institution of IoT technologies and their uses to Army operation. The
name of this initiative started by ARL is also known as the Internet of
Battlefield Things.
Ocean of Things: - The Defense Advanced Research Projects Agency
(DARPA) of U.S. initiated an Ocean of Things. The motive of the
project Ocean 2.0 or Ocean of Things (OoT) is to initiate or spread the
Internet of Things (IoT) which covers the large ocean areas in the
motive of gathering, observing, assembling and inspecting
environmental and vessel action data. Approximately 71 percent of the
earth surface is covered with ocean, so how it is possible? DARPA
planned to use low cost and small network which includes floating
enabled sensors, then these sensors collect the data from ocean and
then observe and transfer it to real-time monitor marine time activity.
4. Challenges faced by IIoT
The physical world is slowly transforming into digital world from
ordinary world because of smart technology and devices which allows
user and devices to be in constant communication with each other. It’s
now more efficient because of artificial intelligence, machine learning,
etc. When machine-to-machine communication is combining with big
data analytics in an industry then there is rise of unequal levels of
productivity, efficiency and performance in IIoT systems. Now, most of
the business companies wants to do business with IoT development
companies to get the latest technology involved into their business. This
arises new challenges and opportunities for business leaders. It’s analyzed
that in future, 72% of those companies may lose market share if they are
failed to implies large data strategy. There are few challenges that are
faced by IIoT [26] are depicted in Figure 4 & explained as follows:
Figure 4: Challenges of IIoT
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
5
Connectivity and Visibility: - Due to improper or poor connectivity
the critical IIoT-implementation challenges arise. Joining of machine
with IIoT is a challenging problem, and it’s necessary to ensure that
these machines are working at an optimal level and it’s important to
monitor machines to enhance the production level. Different units are
responsible for the proper working of IIoT machines, and there might
be a problem of coordination arises as a result of power blackouts,
internet outages and physical or technical errors [27]. As a result,
connected devices has to be removed from network, which disturbs
the whole production unit and company has to suffer in millions.
IIoT Integration: - Integration of the information technology (IT) is
another difficulty faced by the IIoT execution. Integration between
these two technologies suffers due to essential connectivity and
synchronization. If we don’t want to rely on defective connectivity so
we have to replace the entire equipment. With the modern ways of
thinking and operating we successfully transforms raw data into useful
information: the machine data which are count and captures by IT
department requires to match with internal organizational resources
and then data is decoded and implement to continue the process [28].
Security: - As we enjoy several comforts from the IoT, we must also
take care about safety and privacy in smart devices. We must give
main priority to security while designing the IoT devices. Privacy of
our personal data and privacy of our physical well-being are includes
in it. Security is the biggest challenge for IIoT technology team since a
small or regular threat could disintegrate the whole enterprise.
Although if a company solve this issue with IIoT or new security tools
are provided to the network, it requires increased cost and
maintenance [29]. So, businesses often avoided the idea of IIoT until
they are equipped with a solid security plan in place.
Data Storage: - Data storage is another major challenge for any
company or enterprise. The data which was stored in past are used for
the all forecasted activities. Today none of the enterprise uses an old
conventional method to tackle data which mostly would be analyzing
high-frequency data, observe it, and punctually thrown it away. It is
compulsory for any company to adopt proper plan for a secure storage
of data before run IIoT in full mode.
Analytics Challenges: - It’s necessary for Data Analytics partners to
include data processing, cleansing, and representation while executing
IoT architecture [30]. Enough space for functionality factor is left
surely and this factor add real-time or predictive analytics to an IoT
solution simply.
5. Conclusion
The paper focuses on IoT technology, its key features along with its
applications and characteristics in various sectors. The emerging trends
which aimed at shifting from IoT to IIoT, key differences between IoT
and IIoT. IoT possess certain characteristics but there are certain
limitations too. The challenges and security threats are also addressed
along with measures to overcome that. Further after reviewing this paper,
we can conclude that in future how IoT will take this world to the next
level, when IoT used in industries, it will rapidly increase the economic
and production level of industries as well as countries also.
REFERENCES
1. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey
on internet of things: Architecture, enabling technologies, security and
pri-vacy, and applications,” IEEE Internet of Things Journal, vol. 4, no.
5, pp. 11251142, 2017.
2. D. Miller, “Blockchain and the internet of things in the industrial sector,”
IT Professional, vol. 20, no. 3, pp. 1518, 2018
3. J. Huang, L. Kong, G. Chen, M.-Y. Wu, X. Liu, and P. Zeng, “Towards
se-cure industrial iot: Blockchain system with credit-based consensus
mechanism,” IEEE Transactions on Industrial Informatics, 2019
4. Y. Xu, J. Ren, G. Wang, C. Zhang, J. Yang, and Y. Zhang, “A
blockchain-based non-repudiation network computing service scheme
for industrial iot,” IEEE Transactions on Industrial Informatics, 2019.
5. Singh, A., Sharma, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Taxonomy of Attacks on Web Based Applications. 2019 2nd
International Conference on Intelligent Computing, Instrumentation and
Control Technologies (ICICICT). doi:
10.1109/icicict46008.2019.8993264
6. W. Liang, M. Tang, J. Long, X. Peng, J. Xu, and K.-C. Li, “A secure
fabric blockchain-based data transmission technique for industrial
internet-ofthings,” IEEE Transactions on Industrial Informatics, 2019.
7. H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource
trading in blockchain-based industrial internet of things,” IEEE
Transactions on Industrial Informatics, 2019.
8. Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Authentication & Encryption Based Security Services in Blockchain
Technology. 2019 International Conference on Computing,
Communication, and Intelligent Systems (ICCCIS). doi:
10.1109/icccis48478.2019.8974500
9. S. Zhao, S. Li, and Y. Yao, “Blockchain enabled industrial internet of
things technology,” IEEE Transactions on Computational Social
Systems, 2019.
10. J. Al-Jaroodi and N. Mohamed, “Blockchain in industries: A survey,”
IEEE Access, vol. 7, pp. 36 50036 515, 2019
11. T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the
applica-tion of blockchain to the next generation of cybersecure
industry 4.0 smart factories,” IEEE Access, vol. 7, pp. 45 20145 218,
2019.
12. Tiwari, R., Sharma, N., Kaushik, I., Tiwari, A., & Bhushan, B. (2019).
Evolution of IoT & Data Analytics using Deep Learning. 2019
International Conference on Computing, Communication, and
Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974481
13. K. Zhou, T. Liu, and L. Zhou, “Industry 4.0: Towards future industrial
opportunities and challenges,” in 2015 12th International conference on
fuzzy systems and knowledge discovery (FSKD). IEEE, 2015, pp.
2147 2152.
International Conference on Innovative Computing and Communication (ICICC 2020)
AUTHOR
6
14. F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in industry
4.0: A review of the concept and of energy management approached in
production based on the internet of things paradigm,” in 2014 IEEE in-
ternational conference on industrial engineering and engineering man-
agement. IEEE, 2014, pp. 697701.
15. S. Weyer, M. Schmitt, M. Ohmer, and D. Gorecky, “Towards industry
4.0-standardization as the crucial challenge for highly modular, multi-
vendor production systems,” Ifac-Papersonline, vol. 48, no. 3, pp. 579
584, 2015.
16. “The Industrial Internet of Things (IIoT): innovation, benefits and barri-
ers,” https://www.i-scoop.eu/internet-of-things-guide/industrialinternet-
things-iiot-saving-costs-innovation/, 2019, [Online; accessed 12-April-
2019].
17. Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium
block-chain for secure energy trading in industrial internet of things,”
IEEE transactions on industrial informatics, vol. 14, no. 8, pp. 3690
3700, 2018.
18. J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain,
“Ena-bling localized peer-to-peer electricity trading among plug-in
hybrid electric vehicles using consortium blockchains,” IEEE
Transactions on Industrial Informatics, vol. 13, no. 6, pp. 31543164,
2017.
19. Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Architectural Model of Security Threats & their Countermeasures in
IoT. 2019 International Conference on Computing, Communication,
and Intelligent Systems (ICCCIS). doi:
10.1109/icccis48478.2019.8974544
20. D. Liu, A. Alahmadi, J. Ni, X. Lin et al., “Anonymous reputation
system for iiot-enabled retail marketing atop pos blockchain,” IEEE
Transac-tions on Industrial Informatics, 2019.
21. Jadon, S., Choudhary, A., Saini, H., Dua, U., Sharma, N., & Kaushik, I.
(2020). Comfy Smart Home using IoT. SSRN Electronic Journal. doi:
10.2139/ssrn.3565908
22. L. Da Xu, W. He, and S. Li, “Internet of Things in industries: A survey,”
IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 22332243, Nov. 2014
23. Tiwari, A., Sharma, N., Kaushik, I., & Tiwari, R. (2019). Privacy Issues
& Security Techniques in Big Data. 2019 International Conference on
Computing, Communication, and Intelligent Systems (ICCCIS). doi:
10.1109/icccis48478.2019.8974511
24. J. M. Müller, D. Kiel, and K.-I. Voigt, “What drives the implementation
of industry 4.0? the role of opportunities and challenges in the context
of sustainability,” Sustainability, vol. 10, no. 1, p. 247, Jan. 2018.
25. D. Kiel, C. Arnold, and K.-I. Voigt, “The influence of the Industrial
Inter-net of Things on business models of established manufacturing
compa-nies—A business level perspective,” Technovation, vol. 68, pp.
419, Dec. 2017.
26. Baotong Chen, Jiafu Wan, Lei Shu, Peng Li, Mithun Mukherjee,
Boxing Yin, "Smart Factory of Industry 4.0: Key
Technologies", Application Case and Challenges, 2017.
27. Sharma, A., Singh, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Security Countermeasures in Web Based Application. 2019 2nd
International Conference on Intelligent Computing, Instrumentation and
Control Technologies (ICICICT). doi:
10.1109/icicict46008.2019.8993141
28. Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao, and M. A. Imran, “Block-
chain-enabled wireless Internet of Things: Performance analysis and op-
timal communication node deployment,” IEEE Internet Things J., vol. 6,
no. 3, pp. 57915802, Jun. 2019.
29. Hyuncheol Park, Hoichang Kim, Hotaek Joo, JaeSeung Song, "Recent
advancements in the Internet-of-Things related standards: A oneM2M
perspective", ICT Express, vol. 2, no. 3, pp. 126-129, Sep. 2016.
30. Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga, Jesus
Lazaro, "Intelligent gateway for Industry 4.0-compliant production
lines", 2016.
... This advancement has allowed for the collection of real-time data from various sensors and devices deployed in industrial environments [24]. The following summary in Table 5.3 provides a detailed overview of the adoption of IIoT in industrial settings, along with notable advancements and their respective years [23][24][25][26]. ...
... Moreover, the devices themselves require little human intervention to communicate with each other or generate/consume data [1]. IIoT is typically applied to manufacturing, military, agriculture [2], transportation and health services [3]. ...
Article
Full-text available
The expansion of the Internet of Things (IoT) in various industrial sectors (also referred to as the Industrial Internet of Things or IIoT) promises increased economic productivity and quality of life. However, the expansion of IIoT also presents unprecedented security concerns due to increased connectivity between appliances and the cloud. Among the security concerns on IIoT is the threat of intrusions on IIoT networks, resulting in unauthorised access to sensitive data generated by IIoT devices or the compromise of the entire IIoT network. Current work proposes a novel generative adversarial artificial immune network (GAAINet) model for intrusion detection in IIoT systems. GAAINet aims to improve the quality of an artificial immune network (AIN)-based classifier by introducing a generator AIN responsible for generating fake intrusion samples from a latent space to fool the classifier (or discriminator) AIN. The adversarial training of the generator and discriminator AINs is expected to improve the intrusion detection capability of the discriminator such that it potentially surpasses traditional training methods that only use preexisting datasets. Current work proposes GAAINet, an immunologically inspired generative adversarial conceptual model, for intrusion detection in IIoT systems.
... Edge processing (also known as edge computing) typically occurs directly on the IIoT or gateway device, which is physically adjacent to Table 1 Differences between consumer IoT and IIoT (Sharma & Singh, 2020b the IIoT sensor node. Fog computing occurs in processors (computers/ servers) that are connected to the same local area network (LAN) as the IIoT device but may be physically distant from the sensors and actuators. ...
Chapter
Full-text available
Process industries have been acquiring and analyzing data from their assets and products to devise data-driven decisions, enhancing the safety and efficiency of their plants. With the fourth industrial revolution (Industry 4.0), these industries are deploying modern digital technologies, such as the industrial internet of things (IIoT), big data analytics, cloud computing, and advanced data visualization techniques (virtual/augmented/mixed reality), reinventing process data analytic platforms for the process industries. Therefore, this chapter aims to provide the reader with a comprehensive overview of process data analytic platforms built around the concept of Industry 4.0. First, it presents a brief overview of the industrial revolution followed by a high-level system architecture of a process data analytic platform. This system architecture consists of four elements: hardware and sensing layer, data management layer, application layer, and networking layer. The chapter provides a comprehensive overview of each of these elements while focussing on IIoT, data analytics and example applications that include predictive maintenance, remaining useful life estimation, process reliability assessment, and cyber-physical systems. As the physical and cyber domains of Industry 4.0 based process data analytics platforms are more integrated, the chapter presents the cyber-physical implications of such tight integration. The chapter concludes with a summary and outlook for Industry 4.0 based process data analytics platforms (PDAP).
Article
Full-text available
Industry 4.0 is a concept devised for improving the way modern factories operate through the use of some of the latest technologies, like the ones used for creating Industrial Internet of Things (IIoT), robotics or Big Data applications. One of such technologies is blockchain, which is able to add trust, security and decentralization to different industrial fields. This article focuses on analyzing the benefits and challenges that arise when using blockchain and smart contracts to develop Industry 4.0 applications. In addition, this paper presents a thorough review on the most relevant blockchain-based applications for Industry 4.0 technologies. Thus, its aim is to provide a detailed guide for future Industry 4.0 developers that allows for determining how blockchain can enhance the next generation of cybersecure industrial applications.
Article
Full-text available
Blockchain has shown a great potential in Internet of Things (IoT) ecosystems for establishing trust and consensus mechanisms without involvement of any third party. Understanding the relationship between communication and blockchain as well as the performance constraints posing on the counterparts can facilitate designing a dedicated blockchain-enabled IoT systems. In this paper, we establish an analytical model for the blockchain-enabled wireless IoT system. By considering spatio-temporal domain Poisson distribution, i.e., node geographical distribution in spatial domain and transaction arrival rate in time domain are both modeled as Poisson point process (PPP), we first derive the distribution of signal-to-interference-plus-noise ratio (SINR), blockchain transaction transmission successful rate as well as overall throughput. Based on the system model and performance analysis, we design an algorithm to determine the optimal full function node deployment for blockchain system under the criterion of maximizing transaction throughput. Finally the security performance is analyzed in the proposed networks with three typical attacks. Solutions such as physical layer security are presented and discussed to keep the system secure under these attacks. Numerical results validate the accuracy of our theoretical analysis and optimal node deployment algorithm.
Article
The previous blockchain data transmission techniques in industrial Internet of Things (IoT) have low security, high management cost of the trading center, and big difficulty in supervision. To address these issues, this paper proposes a secure FaBric blockchain-based data transmission technique for industrial IoT. This technique uses the blockchain-based dynamic secret sharing mechanism. A reliable trading center is realized using the power blockchain sharing model, which can also share power trading books. The power data consensus mechanism and dynamic linked storage are designed to realize the secure matching of the power data transmission. Experiments show that the optimized FaBric power data storage and transmission has high security and reliability. The proposed technique can improve the transmission rate and packet receiving rate by 12% and 13%, respectively. Moreover, the proposed technique has good superiority in sharing management and decentralization.
Article
The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past few years, many more applications in industrial IoT (IIoT) have emerged and the blockchain technologies have attracted huge amounts of attention from both industrial and academic researchers. In this paper, we address the integration of blockchain and IIoT from the industrial prospective. A blockchain-enabled IIoT framework is introduced and involved fundamental techniques are presented. Moreover, the main applications and key challenges are addressed. A comprehensive analysis for the most recent research trends and open issues is provided associated with the blockchain-enabled IIoT.