“…14) Energy Management: Energy management for the IIoT and WSANs has naturally received significant attention, as in many cases the devices operate on limited battery supplies (Table VIII). On the IIoT part, there have been energy efficient improvements on QoS-aware services composition [372] (similarly for the ICPS [386]), robust authentication protocols [392], routing and data collection [393], [394], as well as resource allocation and utilization [395] (similarly for the ICPS [398]). On the backbone of the IIoT networks, in the cases where Ethernet is used as an enabler, energy efficiency has also been a timely topic [375].…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…IIoT / ICPS [372], [386], [392], [393], [366], [367], [375], [394], [395], [398] WSAN [369]- [371], [377], [396], [373], [374], [376], [378], [379], [381] NCS -Industrial Robots [384] Assembly Line [62], [364], [365], [383], [385], [387], [6], [388]- [391], [399] M2M Communication [368], [397] whole toward minimizing energy consumption is proposed in [384]. Dynamic low-power reconfiguration [364] and machine energy consumption minimization [365] are key objectives of novel assembly lines.…”
Section: Data Enabling Technology Articles On Energy Managementmentioning
Information and communication technologies are permeating all aspects of industrial and manufacturing systems, expediting the generation of large volumes of industrial data. This article surveys the recent literature on data management as it applies to networked industrial environments and identifies several open research challenges for the future. As a first step, we extract important data properties (volume, variety, traffic, criticality) and identify the corresponding data enabling technologies of diverse fundamental industrial use cases, based on practical applications. Secondly, we provide a detailed outline of recent industrial architectural designs with respect to their data management philosophy (data presence, data coordination, data computation) and the extent of their distributiveness. Then, we conduct a holistic survey of the recent literature from which we derive a taxonomy of the latest advances on industrial data enabling technologies and data centric services, spanning all the way from the field level deep in the physical deployments, up to the cloud and applications level. Finally, motivated by the rich conclusions of this critical analysis, we identify interesting open challenges for future research. The concepts presented in this article thematically cover the largest part of the industrial automation pyramid layers. Our approach is multidisciplinary, as the selected publications were drawn from two fields; the communications, networking and computation field as well as the industrial, manufacturing and automation field. The article can help the readers to deeply understand how data management is currently applied in networked industrial environments, and select interesting open research opportunities to pursue.
“…14) Energy Management: Energy management for the IIoT and WSANs has naturally received significant attention, as in many cases the devices operate on limited battery supplies (Table VIII). On the IIoT part, there have been energy efficient improvements on QoS-aware services composition [372] (similarly for the ICPS [386]), robust authentication protocols [392], routing and data collection [393], [394], as well as resource allocation and utilization [395] (similarly for the ICPS [398]). On the backbone of the IIoT networks, in the cases where Ethernet is used as an enabler, energy efficiency has also been a timely topic [375].…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…IIoT / ICPS [372], [386], [392], [393], [366], [367], [375], [394], [395], [398] WSAN [369]- [371], [377], [396], [373], [374], [376], [378], [379], [381] NCS -Industrial Robots [384] Assembly Line [62], [364], [365], [383], [385], [387], [6], [388]- [391], [399] M2M Communication [368], [397] whole toward minimizing energy consumption is proposed in [384]. Dynamic low-power reconfiguration [364] and machine energy consumption minimization [365] are key objectives of novel assembly lines.…”
Section: Data Enabling Technology Articles On Energy Managementmentioning
Information and communication technologies are permeating all aspects of industrial and manufacturing systems, expediting the generation of large volumes of industrial data. This article surveys the recent literature on data management as it applies to networked industrial environments and identifies several open research challenges for the future. As a first step, we extract important data properties (volume, variety, traffic, criticality) and identify the corresponding data enabling technologies of diverse fundamental industrial use cases, based on practical applications. Secondly, we provide a detailed outline of recent industrial architectural designs with respect to their data management philosophy (data presence, data coordination, data computation) and the extent of their distributiveness. Then, we conduct a holistic survey of the recent literature from which we derive a taxonomy of the latest advances on industrial data enabling technologies and data centric services, spanning all the way from the field level deep in the physical deployments, up to the cloud and applications level. Finally, motivated by the rich conclusions of this critical analysis, we identify interesting open challenges for future research. The concepts presented in this article thematically cover the largest part of the industrial automation pyramid layers. Our approach is multidisciplinary, as the selected publications were drawn from two fields; the communications, networking and computation field as well as the industrial, manufacturing and automation field. The article can help the readers to deeply understand how data management is currently applied in networked industrial environments, and select interesting open research opportunities to pursue.
“…The role and importance of the security and authentication is growing every day with the growth of technology specially with the emergence of IoT . However, modern technology faces serious issues due to problems in security and authentication.…”
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource-limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key-based authentication protocol for IoT-based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.
“…Moreover, an increase in network size leads to a higher number of route discoveries and additional transmission delays. Furthermore, robust and energy efficient authentication protocol for industrial IoT [44] presented three-factor authentication and provides data security for WSN. The proposed solution offers proper mutual authentication between nodes, however, unnecessary energy is consumed during the authentication process and compromised network lifetime.…”
Section: Related Work and Research Formulationmentioning
Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.