Internet of Things in Manufacturing: An Overview

Author(s):  
Hussam Ali Alothman ◽  
Mohammad T. Khasawneh ◽  
Nagen N. Nagarur

Internet of things or IoT represents an emerging concept where the objects and humans are identifiable, connected and can communicate over the internet or the wireless world. With IoT, everything can communicate anytime and at anyplace. IoT has many applications and one of the most important applications is the manufacturing. The IoT in industry sector, sometimes referred to as IIoT, is considered to be a very important factor in the introduction of the fourth industrial revolution. Major manufacturing powers around the world are already trying to adopt IoT in their production systems and lead the way in this new era of advanced manufacturing. A huge number of IoT devices are already being used and connected and it is expected that the number of these applications and devices will increase dramatically in the next few years. In this work, an overview of IoT in manufacturing will be presented. This includes a discussion of some of the advantages and benefits of adopting IoT in manufacturing in addition to the issues and challenges that accompany this IoT application. The discussion will also include the concept of smart manufacturing, how production processes and other related activities can be connected in real time and how this can be achieved by adopting IoT in manufacturing. Furthermore, the enabling technologies needed to realize IoT (whether it is to be applied in a new plant or in already existing machines that don’t have IoT capabilities) are shown along with the different layers or phases needed for this IoT adoption. Finally, some real life examples of factories that adopted IoT are shown.

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


Work ◽  
2021 ◽  
pp. 1-11
Author(s):  
Duan Pingli ◽  
Bala Anand Muthu ◽  
Seifedine Nimer Kadry

BACKGROUND: The manufacturing industry undergoes a new age, with significant changes taking place on several fronts. Companies devoted to digital transformation take their future plants inspired by the Internet of Things (IoT). The IoT is a worldwide network of interrelated physical devices, which is an essential component of the internet, including sensors, actuators, smart apps, computers, mechanical machines, and people. The effective allocation of the computing resources and the carrier is critical in the industrial internet of Things (IIoT) for smart production systems. Indeed, the existing assignment method in the smart production system cannot guarantee that resources meet the inherently complex and volatile requirements of the user are timely. Many research results on resource allocations in auction formats which have been implemented to consider the demand and real-time supply for smart development resources, but safety privacy and trust estimation issues related to these outcomes are not actively discussed. OBJECTIVES: The paper proposes a Hierarchical Trustful Resource Assignment (HTRA) and Trust Computing Algorithm (TCA) based on Vickrey Clarke-Groves (VGCs) in the computer carriers necessary resources to communicate wirelessly among IIoT devices and gateways, and the allocation of CPU resources for processing information at the CPC. RESULTS: Finally, experimental findings demonstrate that when the IIoT equipment and gateways are valid, the utilities of each participant are improved. CONCLUSION: This is an easy and powerful method to guarantee that intelligent manufacturing components genuinely work for their purposes, which want to integrate each element into a system without interactions with each other.


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


Author(s):  
Ravdeep Kour

The convergence of information technology (IT) and operational technology (OT) and the associated paradigm shift toward fourth industrial revolution (aka Industry 4.0) in companies has brought tremendous changes in technology vision with innovative technologies such as robotics, big data, cloud computing, online monitoring, internet of things (IoT), cyber-physical systems (CPS), cognitive computing, and artificial intelligence (AI). However, this transition towards the fourth industrial revolution has many benefits in productivity, efficiency, revenues, customer experience, and profitability, but also imposes many challenges. One of the challenges is to manage and secure large amount of data generated from internet of things (IoT) devices that provide many entry points for hackers in the form of a threat to exploit new and existing vulnerabilities within the network. This chapter investigates various cybersecurity issues and challenges in Industry 4.0 with more focus on three industrial case studies.


Author(s):  
Mustafa Atilla Arıcıoğlu ◽  
Büşra Yiğitol

It is envisioned that the fourth industrial revolution contains many concepts such as modern automation and production systems, data collection, data processing, analysis, and data transfer and consists of intelligent factory applications such as augmented reality, the internet of things, cyber physical, and cyber security systems. It reveals the fact that a new era awaits enterprises in the relationship between technology and production due to these predictions for future changes. SMEs are one of the important segments that these triggers, which are the precursors of structural change, will affect. So how will SMEs experience the Industry 4.0 process? What do unmanned factories mean for SMEs? Which countries/SMEs will have the Industry 4.0 technology and Industry 4.0 infrastructure which require high capital, Which of them will create opportunities? In this chapter, the problems that SMEs will face in the digital transformation process and the political and strategic approaches that can be developed to deal with these problems will be evaluated.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1732
Author(s):  
Zainab Iftikhar ◽  
Yasir Javed ◽  
Syed Yawar Abbas Zaidi ◽  
Munam Ali Shah ◽  
Zafar Iqbal Khan ◽  
...  

With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy preservation when a huge number of resource-constrained distributed devices is involved. Blockchain has become popular for its benefits, including decentralization, persistence, immutability, auditability and consensus. With the implementation of blockchain in IoT, the benefits provided by blockchain can be derived in order to make IoT more efficient and maintain trust. In this paper, we discuss some applications of IoT in different fields and privacy-related issues faced by IoT in resource-constrained devices. We discuss some applications of blockchain in vast majority of areas, and the opportunities it brings to resolve IoT privacy limitations. We, then, survey different researches based on the implementation of blockchain in IoT. The goal of this paper is to survey recent researches based on the implementation of blockchain in IoT for privacy preservation. After analyzing the recent solutions, we see that the blockchain is an optimal way for preventing identity disclosure, monitoring, and providing tracking in IoT.


2021 ◽  
Vol 13 (8) ◽  
pp. 210 ◽  
Author(s):  
Sheetal Ghorpade ◽  
Marco Zennaro ◽  
Bharat Chaudhari

With exponential growth in the deployment of Internet of Things (IoT) devices, many new innovative and real-life applications are being developed. IoT supports such applications with the help of resource-constrained fixed as well as mobile nodes. These nodes can be placed in anything from vehicles to the human body to smart homes to smart factories. Mobility of the nodes enhances the network coverage and connectivity. One of the crucial requirements in IoT systems is the accurate and fast localization of its nodes with high energy efficiency and low cost. The localization process has several challenges. These challenges keep changing depending on the location and movement of nodes such as outdoor, indoor, with or without obstacles and so on. The performance of localization techniques greatly depends on the scenarios and conditions from which the nodes are traversing. Precise localization of nodes is very much required in many unique applications. Although several localization techniques and algorithms are available, there are still many challenges for the precise and efficient localization of the nodes. This paper classifies and discusses various state-of-the-art techniques proposed for IoT node localization in detail. It includes the different approaches such as centralized, distributed, iterative, ranged based, range free, device-based, device-free and their subtypes. Furthermore, the different performance metrics that can be used for localization, comparison of the different techniques, some prominent applications in smart cities and future directions are also covered.


Author(s):  
Alaa Ahmed Abbood ◽  
Qahtan Makki Shallal ◽  
Mohammed A. Fadhel

<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>


2021 ◽  
pp. 1-4
Author(s):  
Janet K. Allen ◽  
Sesh Commuri ◽  
Jianxin Jiao ◽  
Jelena Milisavljevic-Syed ◽  
Farrokh Mistree ◽  
...  

Abstract This special issue is motivated by the trend of smart factories of the future towards the fourth Industrial Revolution, which makes it possible to better leverage capabilities and resources in a human-cyber-physical production environment. This emerging paradigm of Industry 4.0 poses new systems design problems at the interface of smart manufacturing, robust and flexible automation, distributed and reconfigurable production systems industrial IoT, and supply chain integration. Recent advances of design engineering in the age of Industry 4.0 are presented in this special issue. More than forty (40) papers were received and peer-reviewed, out of which thirteen (13) papers were selected for publication. These are both theoretical and practical, as well as state-of-the-art reviews, new perspectives, and outlook for future research directions in the field. The papers span a range of design aspects and Industry 4.0 technologies. There are three intersecting clusters in this category: design principles and techniques for Industry 4.0, smart manufacturing technologies, and machine learning and data-driven techniques for Industry 4.0.


2020 ◽  
Author(s):  
Dhouha Ben Noureddine ◽  
Moez Krichen ◽  
Seifeddine Mechti ◽  
Tarik Nahhal ◽  
Wilfried Yves Hamilton Adoni

Internet of Things (IoT) is composed of many IoT devices connected throughout the Internet, that collect and share information to represent the environment. IoT is currently restructuring the actual manufacturing to smart manufacturing. However, inherent characteristics of IoT lead to a number of titanic challenges such as decentralization, weak interoperability, security, etc. The artificial intelligence provides opportunities to address IoT’s challenges, e.g the agent technology. This paper presents first an overview of ML and discusses some related work. Then, we briefly present the classic IoT architecture. Then we introduce our proposed Intelligent IoT (IIoT) architecture. We next concentrate on introducing the approach using multi-agent DRL in IIoT. Finally, in this promising field, we outline the open directions of future work.


Sign in / Sign up

Export Citation Format

Share Document