2016 IEEE 14th International Conference on Industrial Informatics (INDIN) 2016
DOI: 10.1109/indin.2016.7819250
|View full text |Cite
|
Sign up to set email alerts
|

Enabling smart maintenance services: Broker-based equipment status data acquisition and backend workflows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…For this purpose a deployment procedure creating such trust has to be established. In this regard a deployment procedure based on a Dual-Interface Trust Anchor is proposed [20]. The application of such deployment procedure can be found in [21].…”
Section: B Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…For this purpose a deployment procedure creating such trust has to be established. In this regard a deployment procedure based on a Dual-Interface Trust Anchor is proposed [20]. The application of such deployment procedure can be found in [21].…”
Section: B Securitymentioning
confidence: 99%
“…One is based on a gatekeeper concepts with a separate data path having some of its roots in the telecom industry, see [13], [39]. The other is based on the MQTT protocol and its broker concept, see [20].…”
Section: Scalabilitymentioning
confidence: 99%
“…A variety of instruments is used to capture data on critical parameters required to analyze and predict degradation, reliability, and efficiency of machinery and equipment. The governance structure dimension of smart maintenance needs to address the responsibilities for predictive maintenance programs, sourcing technology solutions, and the data sets that will result from it (e.g., Kans and Galar 2017;Maritsch et al 2016). The different forms of responsibility can be allocated and shared in the network through a RACI matrix, as discussed by Wende (2007).…”
Section: Discussionmentioning
confidence: 99%
“…For engineering, management, and security purposes, a DeviceRegistry and a SystemRegistry (SW) are also provided. These registries enable the discovery of HW devices and their associated SW. For high-security applications, the HW must possess advanced security controllers to enable the two-way identification of the HW and associated SW [60].…”
Section: Interoperability Within the Local Cloudmentioning
confidence: 99%