A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry
<p>Industrial IoT trends show recent applications for industrial IoT.</p> "> Figure 2
<p>Key components of IoT smart industry.</p> "> Figure 3
<p>The 6LoWPAN layer structure.</p> "> Figure 4
<p>IIoT four-layer architecture.</p> "> Figure 5
<p>IIoT network-based platform on big data analytics.</p> "> Figure 6
<p>The cloud computing-based industrial IoT network platform.</p> "> Figure 7
<p>Conceptual designfor smart industry.</p> "> Figure 8
<p>Remote monitoring topology in a manufacturing unit of smart industry.</p> "> Figure 9
<p>Low-power wireless sensor network topology.</p> "> Figure 10
<p>IoT applications in smart industry.</p> "> Figure 11
<p>Smartphone applications for Industrial IoT.</p> "> Figure 12
<p>Industrial IoT attacks.</p> ">
Abstract
:1. Introduction
1.1. Survey Contributions and Comparison with Related Work
1.2. Organization of Survey
2. Major Components Related to IoT-Based Smart Industry
3. IIoT Network Infrastructure
3.1. Layered Structure of IoT-Enabled Industrial Network Architecture
3.1.1. Perception Layer
3.1.2. Network Layer
3.1.3. Application Layer
3.1.4. Processing Layer
3.2. IoT-Enabled Industrial Network Platform
3.2.1. IIoT Network Platform Based on Big Data Analytics
- Employee’s Experience: The employee experience layer is created to benefit employees by monitoring equipment health and identifying temperature, humidity, air, pressure, and moisture-based indoor climate change. This identification helps industries to resolve production risks and increase income.
- Predictive Analysis: Predictive analysis uses smart IIoT technology and market intelligence to make a smart environment. The key role of predictive analysis is to monitor, examine, and progress smart industrial technology for digital wakefulness. In addition, predictive analysis is used to check if the manufacturing process is working in the right direction without technical faults and risks. Based on manufacturing process management, different detection devices are used to identify indoor climate changes, equipment health, profit/loss estimation, and data analysis.
- Sensing and Monitoring Analysis: The sensing and monitoring process is performed using various sensing and detecting equipment to store information about the manufacturing process. The sensing layer automatically analyzes the data collected from different resources. In addition, statistical analysis is performed on data received from sensors to actuate the production risks. Sensors such as vibration sensors, air sensors, temperature sensors, current monitoring, and humidity sensors provide crucial data regarding production units and help the smart industry run smoothly.
- Storage Service: The data related to the smart industry are saved to perform future analyses to enhance manufacturing productivity appropriately.
- Communication Protocols: Smart industrial data are collected and summarized in communication protocols. Therefore, the central pillar of IIoT analyzes and transmits data using different protocols. Third-party service providers like code division multiple access (CDMA), long-term evolution (LTE), or the global system for mobile communications (GSM) are no longer available. Researchers across the globe recommend ZigBee as the leading protocol for communication over long distances.
- Physical Implementations: Several sensors, actuators, and microcontrollers monitor various IIoT applications. In addition, additional devices in the network such as routers, switches, and gateways are major components of the physical layer. This layer detects the whole environment and activates according to specified commands. The microcontroller works as a controller and performs network-related tasks and other functions handled by sensors and actuators.
3.2.2. IIoT Network Platform Based on Cloud Computing
3.3. IoT-Enabled Industrial Network Topology and Protocols
3.3.1. IoT-Enabled Industrial Network Platform
3.3.2. IIoT Communication Protocols
- ZigBee: ZigBee technology is a low-data-rate, low-power consumption, and low-cost wireless networking protocol developed by the ZigBee Alliance for automation and sensor networks. The ZigBee network can contain many nodes in an industrial environment and connect them into a single control network [43].
- Bluetooth: Bluetooth is a low-power, short-range personal area network (PAN). It was developed by Ericson but operated under the auspices of the Bluetooth special interest group (SIG), which created the Bluetooth standards (IEEE 802.15.1). Moreover, to close the energy efficiency gap between Zigbee and Bluetooth for no-streaming sensor node-type applications, the low energy standard for IIoT-based Bluetooth has been modified [44].
- WiFi: In the current era of modern advancements, the availability of WiFi has become a necessity. WiFi stands for wireless fidelity, and was introduced by the Institute of Electrical and Electronics Engineers (IEEE) and is a communication standard for wireless local area networks (WLANs). WiFi operates on physical and data link layers. Furthermore, these standards operate at different bandwidths, ranging from 5 GHz to 60 GHz. The communication and manufacturing processes are discussed in [45].
- MQTT: MQTT is a remote connection between two messages queuing telemetry transport protocols in the IoT. It is a combination of low-power protocols with high bandwidth efficiency. In the smart manufacturing industry, MQTT is utilized for monitoring and development. The use of MQTT to track, monitor, and investigate the manufacturing process and improve efficiency has been presented as a low-cost, web-based IoT solution [46].
- Lora Wan: Lora WAN is a long-distance communication protocol designed for IoT and mobile-to-mobile (M2M) applications that provide a cellular-style, low-data-rate communications network. The primary goal of the Lora WAN protocol is to ensure interoperability across several operators in the IIoT [47].
- Mobile Cellular Networks: There are many generations of mobile communication standards, including 2G, 3G, 4G, and 5G. Each generation of mobile phones has its own challenges and capabilities. For example, smart manufacturing based on cyber-physical manufacturing systems helps IIoT in automation, real-time monitoring, and collaborative control. Although 3G and 4G cannot meet the CPMS standard requirements, 5G can support IIoT [48].
- RFID: RFID records data by assigning a unique number to each object. RFID systems comprise readers, hosts, and tags that receive and broadcast radio waves, also known as the communicators. RFID tags can be active or passive, and they come in a range of sizes and designs. Passive tags are less expensive than active tags and are more profitable. Tags have unique ID numbers and IIoT environmental information, such as moisture level, temperature condition, humidity, etc. In the IIoT, RFID monitors the manufacturing process [49].
- WiMax: The data transfer rate of WiMAX ranges from 1.5 Mb to 1 Gb per second. However, technical advancements have improved the data transfer rate in recent years. Furthermore, WiMAX offers multi-access connectivity, including wired and wireless connectivity for fixed, mobile, portable, and mobile communication, used in IIoT [50].
- LR-WPAN: In recent years, advancements in high-level communication protocols such as ZigBee have developed low-rate wireless personal area network (LR-WPAN) standards. LR-WPAN offers data rates ranging from 40 to 250 Kb per second. This standard’s key feature is that it delivers low-speed and low-cost communication services. It has a frequency band that ranges from 868/915 MHz to 2.4 GHz. LR-WPAN has been used in IIoT control applications and manufacturing monitoring systems [51].
4. IIoT Applications
4.1. IIoT Sub-Applications
4.1.1. Transportation and Logistics
- Mobile Ticketing: Smart transportation uses near-field communication (NFC) tags, a numeric identifier, and a visual marker [59]. Using IIoT technologies, consumers obtain information about various possibilities from the web services by passing their mobile phone over the NFC tag or directing their mobile phone toward the visual markers. The mobile phone obtains data from connected web services (stations, passengers, pricing, available seats, and type of services) and allows users to purchase equivalent tickets [60].
- Monitoring Environmental Parameters: IIoT technology can help monitor our daily environment, like the temperature and humidity [61]. For example, food manufactured in a factory and traveling thousands of kilometers to reach customers must be monitored to reduce the risk of food spoilage. IoT-based advanced technologies, sensor technologies, and pervasive computing improve the productivity of the food supply chain [62].
4.1.2. Healthcare
- Patient-Centered Medical Home Care: Patient-centered medical home (PCMH) care is a simple solution to many problems faced by the healthcare industry, such as chronic disease management, overuse of emergency rooms, patient satisfaction, high medical costs, and accessibility [68,69]. The IIoT has completely changed the healthcare industry. The use of modern technology saves time and allows nursing staff to perform more work in less time, such as taking blood pressure without wasting time. IIoT devices can be utilized to collect patient data, upload it to the cloud, and have a doctor make a fast diagnosis and suggest appropriate therapy. Moreover, a doctor can make a timely decision for appropriate treatment. For example, Cambridge consultants’ flow health hub (FHH) IIoT home diagnostics can gather samples and promptly deliver blood pressure, cholesterol, and diabetes medication [66]. In addition, this method automatically alerts doctors that their patients need or want assistance.
- Improved Medical Equipment Efficiency: The fast growth of IIoT technology gives doctors more useful information. With a concept known as medical device plug-and-play (MD PnP), IIoT allows modern medical equipment to be connected instantly. MD PnP is a cyber-physical system for medical devices [70]. The healthcare industry is affected by two sides of CPSs. The first involves discrete computer logic of various secured medical equipment in the cyber-world. The second is that it offers a complicated biochemical system that includes a patient-in-the-loop mechanism [71]. As a result, CPSs offer valuable data and reduce patients’ waiting times. Thus, CPS sensors provide real-time data to guide doctors in making the best decisions for their patients [72].
- Sensing: Sensor devices provide valuable information on patient health and diagnosing patient disease [73]. In addition, the IIoT application domain offers telemedicine solutions such as informing patient welfare and monitoring patient health with advanced medical equipment [74]. Sensors are useful for both in-patient and out-patient treatment. In addition, wireless-based remote monitoring systems are generally employed to outreach to patients anywhere in the world through the employment of multiple wireless technologies paired with real-time bio-signal monitoring systems to capture the patient’s movements dynamically [75].
- Doctor Recommendation: Today, choosing the right doctor online and getting an appointment is a tough job for patients. Patients have a big problem without real-time data and valuable information about professional doctors [76]. In this capacity, IIoT-based applications have developed a doctor recommendation system to get an online appointment with a doctor [77]. In addition, recommendation systems are still a hot topic in machine learning, image processing, and data mining [78]. The sensor data received from patients, feedback for qualifying doctor suggestions, and doctor appointment policies have been updated in the doctor recommendation system [38].
4.1.3. Smart Factory
- Smart Machine: A smart machine combines an autonomous, networked system, sensors, processing capabilities, and communication devices in IIoT [81]. Smart machines have also been linked to other field devices and humans and can work remotely. In addition, smart machines use IIoT to perform self-operability, self-maintenance, and self-awareness [16].
- Smart Manufacturing: The IIoT directly impacts the manufacturing industry by merging cyber-physical production systems and the IoT, resulting in smart manufacturing, which connects the practical and physical worlds [41]. The smart manufacturing process is automated, efficient, and effective, and its real-time performance is one of its key characteristics [82]. Smart manufacturing processes require industries to dynamically fulfill customer requests based on the interconnectivity provided by the IIoT to manage personalization [44]. Furthermore, customer feedback plays a vital role in manufacturing [83]. As a result, both the cyber-physical production system and the IIoT concepts are integrated into the smart manufacturing concept [84]. IIoT consists of smart sensors that can send information about machines, fleets, and components and monitor the production system [85].
- Smart Engineering: Smart engineering in smart factories creates product engineering, product design, and product development [86]. Big data analytics are generally employed to attain continuous feedback, providing a more effective engineering process in IIoT, dispensing efficient optimization, and improving productivity.
- Manufacturing IT: Manufacturing IT refers to smart factories’ information technology infrastructure [79]. Manufacturing IT involves the production system’s algorithms, software, and hardware infrastructure, such as sensors and actuators that offer smart monitoring and control of physical devices. In addition, IIoT enables production management systems to integrate many technologies and maintain all data generated during manufacturing.
- Cloud Computing and Big Data: The latest high-performance computing, IIoT technologies, service-oriented technologies, and cloud services are part of cloud computing and big data [35]. In addition, cloud computing and big data built a business model for the manufacturing industry, creating smart factory networks that support productive collaboration and helping it adjust product innovation with business policy [36]. Cloud computing fulfills customers’ requests for services, including product design, management, manufacturing, and testing. Moreover, trends in smart manufacturing, innovation, and future methodologies focus on the cloud, the CPS, and the IoT [37]. For example, the design of smart manufacturing has been reviewed by Saldivar et al. [87]. In addition, Rugman et al. [88] explain the benefits for the manufacturing industry and highlight the latest technologies, such as big data analytics, autonomous robots, cyber security, system integration, cloud computing, augmented reality, simulation, and additive manufacturing.
4.1.4. Energy Consumption
- Advance Control System: The management and control of old energy systems require many workers, whereas the new IIoT energy system requires less labor [92]. Furthermore, the effective application of new technologies in connectivity and interoperability improves system operability. The latest communication and information technologies have a tremendous change in the IIoT energy system, such as big data analytics, software-defined machines, and smart sensing [13]. These new technologies have continually been improving the system’s operational performances.
- Remote Monitoring: Old energy systems needed a large amount of labor to run them. In contrast, the new energy production systems use remote monitoring systems to build a safe environment in IIoT. The IIoT system utilizes communication and sensor technologies to operate the production system remotely. Remote monitoring technologies can help the energy industry enhance its production performance while also reducing the risk for workers [93].
- Predictive Maintenance Technique: Energy production systems in the IIoT hold data analytics and big data to generate predictive analytics information to help prevent unplanned downtime and major losses and minimize the risk of a complete shutdown [94]. However, the energy production industry faces a big problem in maintaining good conditions of the equipment.
- Improved Safety and Efficiency: Different security policies exist for IIoT risk management and system control security principles [95]. In addition, the IIoT energy system can detect faults and energy consumption of multiple components through continuous monitoring and real-time data processing. As a result, the system can reduce serious and dangerous incidents and unnecessary losses and increase overall energy efficiency [42].
4.2. Smartphone Applications Solutions for IIoT
- Remote Equipment Management and Monitoring Apps: Apps used to manage and monitor the equipment remotely, like Atera, Domotz Pro, etc.
- Production Implementation Apps: Apps providing platforms for administrators for production control.
- Quality Control Apps: Apps aiming to provide quality control for single and multiple software, while others provide long-term tracking solutions.
- Safety Management Apps: Apps that focus on providing different kinds of security controls like hazard management, audit management, and corrective and preventive action.
- Predictive Maintenance Apps: Apps that provide predictive tools for predicting asset maintenance.
- Supply Chain Optimization Apps: These apps offer platforms to optimize supply chain operations.
4.3. Sensors and Devices in Industrial IoT
5. IIoT Security Threats
5.1. Physical Attacks
5.1.1. Permanent Denial-of-Service
5.1.2. Denial of Sleep
5.1.3. RF Interface/Jamming
5.1.4. Side-Channel Attack
5.1.5. Fake Node Injection
5.1.6. Malicious Code Injection
5.1.7. Tampering
5.1.8. Countermeasures for Physical Attacks
5.2. Network Attacks
5.2.1. Traffic Analysis Attack
5.2.2. Spoofing Unauthorized Access
5.2.3. Distributed Denial of Service Attacks
5.2.4. Wormhole Attack
5.2.5. Selective Forwarding
5.2.6. Replay Attack
5.2.7. Sybil Attack
5.2.8. Man-in-the-Middle Attack
5.2.9. Routing Information Attacks
5.2.10. Countermeasures for Network Attacks
5.3. Software and Data Link Attacks
5.3.1. Trojan Horses, Virus, Adware, Worms, and Spyware
5.3.2. Malware
5.3.3. Data Breach
5.3.4. Data Inconsistency
5.3.5. Countermeasures for Software and Data Link Layer Attacks
6. Research Directions and Future Implementation
6.1. Blockchain and 5G Technologies
6.2. IIoT Integration with Security Systems
6.3. IIoT High-Power Secured Communication Model
6.4. Detective and Preventive Measures
6.5. Advanced IIoT Support Architecture
6.6. IIoT Security Authorization Models
7. Industrial IoT Challenges
7.1. Energy Consumption and Management Schemes
7.2. Energy Optimization
7.3. Data Confidentiality
7.4. High Connectivity in IIoT
7.5. Network Latency
7.6. Limitations of Sensors in Industries
7.7. Co-Existence and Interoperability
7.8. Scalability
- i.
- Scalability of data. The increasing number of sensors in IIoT creates a considerable amount of sensing data continually. As a result, the process required for industrial control applications, such as motion-control applications, is typically very high.
- ii.
- Furthermore, the high-frequency data scalable combination affects the system’s scalability. For example, control systems are usually controlled independently in traditional industrial approaches and do not scale. As a result, enabling heterogeneous devices and approaches to communicate becomes challenging.
- iii.
- Collaboration. Scalable management becomes a challenge for heterogeneous devices. The horizontal and vertical integration of numerous industrial components and systems presents a non-trivial management and maintenance challenge to system administrators. As a result, to achieve scalability, current management technologies must be integrated into the system management process.
7.9. Fault Detection and Reconfiguration
7.10. Long-Lived Components
7.11. Security and Privacy Challenges
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Ma, H.D. Internet of things: Objectives and scientific challenges. J. Comput. Sci. Technol. 2011, 26, 919–924. [Google Scholar] [CrossRef]
- Okano, M.T. IOT and industry 4.0: The industrial new revolution. In Proceedings of the International Conference on Management and Information Systems, Istanbul, Turkey, 17–20 October 2017; Volume 25, p. 26. [Google Scholar]
- Tabaa, M.; Monteiro, F.; Bensag, H.; Dandache, A. Green Industrial Internet of Things from a smart industry perspectives. Energy Rep. 2020, 6, 430–446. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Salman, T.; Zolanvari, M.; Erbad, A.; Jain, R.; Samaka, M. Security services using blockchains: A state of the art survey. IEEE Commun. Surv. Tutor. 2018, 21, 858–880. [Google Scholar] [CrossRef]
- Cardenas, A.A.; Amin, S.; Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar]
- Khan, W.Z.; Rehman, M.; Zangoti, H.M.; Afzal, M.K.; Armi, N.; Salah, K. Industrial internet of things: Recent advances, enabling technologies and open challenges. Comput. Electr. Eng. 2020, 81, 106522. [Google Scholar] [CrossRef]
- Chen, B.; Wan, J.; Shu, L.; Li, P.; Mukherjee, M.; Yin, B. Smart factory of industry 4.0: Key technologies, application case, and challenges. IEEE Access 2017, 6, 6505–6519. [Google Scholar] [CrossRef]
- Soori, M.; Arezoo, B.; Dastres, R. Internet of things for smart factories in industry 4.0, a review. Internet Things-Cyber-Phys. Syst. 2023, 3, 192–204. [Google Scholar] [CrossRef]
- Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis. In Proceedings of the Workshop on Fog Computing and the IoT, New York, NY, USA, 15 April 2019; pp. 56–63. [Google Scholar]
- Yu, X.; Guo, H. A survey on IIoT security. In Proceedings of the 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), Singapore, 28–30 August 2019; pp. 1–5. [Google Scholar]
- Sengupta, J.; Ruj, S.; Bit, S.D. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A.V. Software-defined industrial internet of things in the context of industry 4.0. IEEE Sens. J. 2016, 16, 7373–7380. [Google Scholar] [CrossRef]
- Aazam, M.; Zeadally, S.; Harras, K.A. Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans. Ind. Inform. 2018, 14, 4674–4682. [Google Scholar] [CrossRef]
- Omoniwa, B.; Hussain, R.; Javed, M.A.; Bouk, S.H.; Malik, S.A. Fog/edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things J. 2018, 6, 4118–4149. [Google Scholar] [CrossRef]
- Boyes, H.; Hallaq, B.; Cunningham, J.; Watson, T. The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 2018, 101, 1–12. [Google Scholar] [CrossRef]
- Pan, Y.; White, J.; Schmidt, D.; Elhabashy, A.; Sturm, L.; Camelio, J.; Williams, C. Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. Int. J. Interact. Multimed. Artif. Intell. 2017, 4, 45–54. [Google Scholar] [CrossRef]
- Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef]
- Chhetri, S.R.; Rashid, N.; Faezi, S.; Al Faruque, M.A. Security trends and advances in manufacturing systems in the era of industry 4.0. In Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, USA, 13–16 November 2017; pp. 1039–1046. [Google Scholar]
- Alcácer, V.; Cruz-Machado, V. Scanning the industry 4.0: A literature review on technologies for manufacturing systems. Eng. Sci. Technol. Int. J. 2019, 22, 899–919. [Google Scholar] [CrossRef]
- Oztemel, E.; Gursev, S. Literature review of Industry 4.0 and related technologies. J. Intell. Manuf. 2020, 31, 127–182. [Google Scholar] [CrossRef]
- Mabkhot, M.M.; Al-Ahmari, A.M.; Salah, B.; Alkhalefah, H. Requirements of the smart factory system: A survey and perspective. Machines 2018, 6, 23. [Google Scholar] [CrossRef]
- Saheb, T.; Izadi, L. Paradigm of IoT big data analytics in the healthcare industry: A review of scientific literature and mapping of research trends. Telemat. Inform. 2019, 41, 70–85. [Google Scholar] [CrossRef]
- Babar, M.; Arif, F. Real-time data processing scheme using big data analytics in internet of things based smart transportation environment. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 4167–4177. [Google Scholar] [CrossRef]
- Hossein Motlagh, N.; Mohammadrezaei, M.; Hunt, J.; Zakeri, B. Internet of Things (IoT) and the energy sector. Energies 2020, 13, 494. [Google Scholar] [CrossRef]
- Chen, C.H.; Lin, M.Y.; Guo, X.C. High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things. Comput. Electr. Eng. 2017, 61, 48–66. [Google Scholar] [CrossRef]
- Jayalaxmi, P.; Saha, R.; Kumar, G.; Kumar, N.; Kim, T.H. A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges. IEEE Access 2021, 9, 25344–25359. [Google Scholar] [CrossRef]
- Domingo, M.C. An overview of the Internet of Things for people with disabilities. J. Netw. Comput. Appl. 2012, 35, 584–596. [Google Scholar] [CrossRef]
- Jia, X.; Feng, Q.; Fan, T.; Lei, Q. RFID technology and its applications in Internet of Things (IoT). In Proceedings of the 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, China, 21–23 April 2012; pp. 1282–1285. [Google Scholar]
- Darwish, D. Improved layered architecture for Internet of Things. Int. J. Comput. Acad. Res. 2015, 4, 214–223. [Google Scholar]
- Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.S. IoT elements, layered architectures and security issues: A comprehensive survey. Sensors 2018, 18, 2796. [Google Scholar] [CrossRef]
- Iqbal, F.; Altaf, A.; Waris, Z.; Aray, D.G.; Flores, M.A.L.; Díez, I.d.l.T.; Ashraf, I. Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. Sensors 2023, 23, 5263. [Google Scholar] [CrossRef]
- Ashraf, I.; Park, Y.; Hur, S.; Kim, S.W.; Alroobaea, R.; Zikria, Y.B.; Nosheen, S. A survey on cyber security threats in iot-enabled maritime industry. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2677–2690. [Google Scholar] [CrossRef]
- Almujally, N.A.; Aljrees, T.; Saidani, O.; Umer, M.; Faheem, Z.B.; Abuzinadah, N.; Alnowaiser, K.; Ashraf, I. Monitoring Acute Heart Failure Patients Using Internet-of-Things-Based Smart Monitoring System. Sensors 2023, 23, 4580. [Google Scholar] [CrossRef]
- Kaur, K.; Garg, S.; Aujla, G.S.; Kumar, N.; Rodrigues, J.J.; Guizani, M. Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay. IEEE Commun. Mag. 2018, 56, 44–51. [Google Scholar] [CrossRef]
- Ibarra, D.; Ganzarain, J.; Igartua, J.I. Business model innovation through Industry 4.0: A review. Procedia Manuf. 2018, 22, 4–10. [Google Scholar] [CrossRef]
- Kang, H.S.; Lee, J.Y.; Choi, S.; Kim, H.; Park, J.H.; Son, J.Y.; Kim, B.H.; Noh, S.D. Smart manufacturing: Past research, present findings, and future directions. Int. J. Precis. Eng.-Manuf.-Green Technol. 2016, 3, 111–128. [Google Scholar] [CrossRef]
- Jiang, H.; Xu, W. How to find your appropriate doctor: An integrated recommendation framework in big data context. In Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Healthcare and e-Health (CICARE), Orlando, FL, USA, 9–12 December 2014; pp. 154–158. [Google Scholar]
- Mantravadi, S.; Møller, C.; Chen, L.; Schnyder, R. Design choices for next-generation IIoT-connected MES/MOM: An empirical study on smart factories. Robot.-Comput.-Integr. Manuf. 2022, 73, 102225. [Google Scholar] [CrossRef]
- Shrouf, F.; Ordieres, J.; Miragliotta, G. Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. In Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia, 9–12 December 2014; pp. 697–701. [Google Scholar]
- Vogel-Heuser, B.; Weber, J.; Folmer, J. Evaluating reconfiguration abilities of automated production systems in Industrie 4.0 with metrics. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–6. [Google Scholar]
- Garetti, M.; Taisch, M. Sustainable manufacturing: Trends and research challenges. Prod. Plan. Control 2012, 23, 83–104. [Google Scholar] [CrossRef]
- Souza, V.; Cruz, R.; Silva, W.; Lins, S.; Lucena, V. A digital twin architecture based on the industrial internet of things technologies. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019; pp. 1–2. [Google Scholar]
- Qi, Q.; Tao, F. A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access 2019, 7, 86769–86777. [Google Scholar] [CrossRef]
- Olivares, E.; Ye, H.; Herrero, A.; Nia, B.A.; Ren, Y.; Donovan, R. Applications of information channels to physics-informed neural networks for WiFi signal propagation simulation at the edge of the industrial internet of things. Neurocomputing 2021, 454, 405–416. [Google Scholar] [CrossRef]
- Dobrilovic, D.; Brtka, V.; Stojanov, Z.; Jotanovic, G.; Perakovic, D.; Jausevac, G. A Model for Working Environment Monitoring in Smart Manufacturing. Appl. Sci. 2021, 11, 2850. [Google Scholar] [CrossRef]
- Pötsch, A.; Hammer, F. Towards end-to-end latency of LoRaWAN: Experimental analysis and IIoT applicability. In Proceedings of the 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27–29 May 2019; pp. 1–4. [Google Scholar]
- Cheng, J.; Chen, W.; Tao, F.; Lin, C.L. Industrial IoT in 5G environment towards smart manufacturing. J. Ind. Inf. Integr. 2018, 10, 10–19. [Google Scholar] [CrossRef]
- Zhai, C.; Zou, Z.; Chen, Q.; Xu, L.; Zheng, L.R.; Tenhunen, H. Delay-aware and reliability-aware contention-free MF–TDMA protocol for automated RFID monitoring in industrial IoT. J. Ind. Inf. Integr. 2016, 3, 8–19. [Google Scholar] [CrossRef]
- Goudarzi, S.; Anisi, M.H.; Abdullah, A.H.; Lloret, J.; Soleymani, S.A.; Hassan, W.H. A hybrid intelligent model for network selection in the industrial Internet of Things. Appl. Soft Comput. 2019, 74, 529–546. [Google Scholar] [CrossRef]
- Shahzad, K.; O’Nils, M. Condition monitoring in industry 4.0-design challenges and possibilities: A case study. In Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, Brescia, Italy, 16–18 April 2018; pp. 101–106. [Google Scholar]
- Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Karakostas, B. A DNS architecture for the internet of things: A case study in transport logistics. Procedia Comput. Sci. 2013, 19, 594–601. [Google Scholar] [CrossRef]
- Riasanow, T.; Jäntgen, L.; Hermes, S.; Böhm, M.; Krcmar, H. Core, intertwined, and ecosystem-specific clusters in platform ecosystems: Analyzing similarities in the digital transformation of the automotive, blockchain, financial, insurance and IIoT industry. Electron. Mark. 2021, 31, 89–104. [Google Scholar] [CrossRef]
- Suchy, J.; Paces, P. BMW iDrive automotive hid device in EFIS control. In Proceedings of the 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC), Atlanta, GA, USA, 16–18 December 2014; pp. 1–11. [Google Scholar]
- Zhang, Y.; Chen, B.; Lu, X. Intelligent monitoring system on refrigerator trucks based on the internet of things. In International Conference on Wireless Communications and Applications; Springer: Berlin/Heidelberg, Germany, 2011; pp. 201–206. [Google Scholar]
- Dikmen, M.; Burns, C. Trust in autonomous vehicles: The case of Tesla autopilot and summon. In Proceedings of the 2017 IEEE International Conference on Systems, MAN, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; pp. 1093–1098. [Google Scholar]
- Shahzad, Y.; Javed, H.; Farman, H.; Ahmad, J.; Jan, B.; Zubair, M. Internet of energy: Opportunities, applications, architectures and challenges in smart industries. Comput. Electr. Eng. 2020, 86, 106739. [Google Scholar] [CrossRef]
- Broll, G.; Rukzio, E.; Paolucci, M.; Wagner, M.; Schmidt, A.; Hussmann, H. Perci: Pervasive service interaction with the internet of things. IEEE Internet Comput. 2009, 13, 74–81. [Google Scholar] [CrossRef]
- Qiu, T.; Chi, J.; Zhou, X.; Ning, Z.; Atiquzzaman, M.; Wu, D.O. Edge computing in industrial internet of things: Architecture, advances and challenges. IEEE Commun. Surv. Tutor. 2020, 22, 2462–2488. [Google Scholar] [CrossRef]
- Wang, T.; Wang, P.; Cai, S.; Ma, Y.; Liu, A.; Xie, M. A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 6083–6091. [Google Scholar] [CrossRef]
- Rejeb, A.; Keogh, J.G.; Treiblmaier, H. Leveraging the internet of things and blockchain technology in supply chain management. Future Internet 2019, 11, 161. [Google Scholar] [CrossRef]
- Cerruela García, G.; Luque Ruiz, I.; Gómez-Nieto, M.Á. State of the art, trends and future of bluetooth low energy, near field communication and visible light communication in the development of smart cities. Sensors 2016, 16, 1968. [Google Scholar] [CrossRef]
- Verma, A.; Shukla, V.K.; Sharma, R. Convergence of IOT in Tourism Industry: A Pragmatic Analysis. J. Phys. Conf. Ser. IOP Publ. 2021, 1714, 012037. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Alturjman, S. Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inform. 2018, 14, 2736–2744. [Google Scholar] [CrossRef]
- Li, J.Q.; Yu, F.R.; Deng, G.; Luo, C.; Ming, Z.; Yan, Q. Industrial internet: A survey on the enabling technologies, applications, and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 1504–1526. [Google Scholar] [CrossRef]
- Pang, Z.; Chen, Q.; Tian, J.; Zheng, L.; Dubrova, E. Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things. In Proceedings of the 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, Republic of Korea, 27–30 January 2013; pp. 529–534. [Google Scholar]
- Driscoll, D.L.; Hiratsuka, V.; Johnston, J.M.; Norman, S.; Reilly, K.M.; Shaw, J.; Smith, J.; Szafran, Q.N.; Dillard, D. Process and outcomes of patient-centered medical care with Alaska Native people at Southcentral Foundation. Ann. Fam. Med. 2013, 11, S41–S49. [Google Scholar] [CrossRef] [PubMed]
- Crabtree, B.F.; Nutting, P.A.; Miller, W.L.; McDaniel, R.R.; Stange, K.C.; Jaen, C.R.; Stewart, E. Primary care practice transformation is hard work: Insights from a 15-year developmental program of research. Med. Care 2011, 49, S28. [Google Scholar] [CrossRef] [PubMed]
- Sha, L.; Gopalakrishnan, S.; Liu, X.; Wang, Q. Cyber-physical systems: A new frontier. In Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), Taichung, Taiwan, 11–13 June 2008; pp. 1–9. [Google Scholar]
- Li, T.; Tan, F.; Wang, Q.; Bu, L.; Cao, J.N.; Liu, X. From offline toward real time: A hybrid systems model checking and CPS codesign approach for medical device plug-and-play collaborations. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 642–652. [Google Scholar]
- Zhang, Y.; Qiu, M.; Tsai, C.W.; Hassan, M.M.; Alamri, A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 2015, 11, 88–95. [Google Scholar] [CrossRef]
- Kumar, P.M.; Lokesh, S.; Varatharajan, R.; Babu, G.C.; Parthasarathy, P. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Future Gener. Comput. Syst. 2018, 86, 527–534. [Google Scholar] [CrossRef]
- Aceto, G.; Persico, V.; Pescapé, A. Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0. J. Ind. Inf. Integr. 2020, 18, 100129. [Google Scholar] [CrossRef]
- Niyato, D.; Hossain, E.; Camorlinga, S. Remote patient monitoring service using heterogeneous wireless access networks: Architecture and optimization. IEEE J. Sel. Areas Commun. 2009, 27, 412–423. [Google Scholar] [CrossRef]
- Huang, Y.F.; Liu, P.; Pan, Q.; Lin, J.S. A doctor recommendation algorithm based on doctor performances and patient preferences. In Proceedings of the 2012 International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP), Chengdu, China, 17–19 December 2012; pp. 92–95. [Google Scholar]
- Hossain, M.S.; Muhammad, G. Cloud-assisted industrial internet of things (iiot)-enabled framework for health monitoring. Comput. Netw. 2016, 101, 192–202. [Google Scholar] [CrossRef]
- Chen, F.; Deng, P.; Wan, J.; Zhang, D.; Vasilakos, A.V.; Rong, X. Data mining for the internet of things: Literature review and challenges. Int. J. Distrib. Sens. Netw. 2015, 11, 431047. [Google Scholar] [CrossRef]
- Lee, J.Y.; Yoon, J.S.; Kim, B.H. A big data analytics platform for smart factories in small and medium-sized manufacturing enterprises: An empirical case study of a die casting factory. Int. J. Precis. Eng. Manuf. 2017, 18, 1353–1361. [Google Scholar] [CrossRef]
- Wang, S.; Wan, J.; Li, D.; Zhang, C. Implementing smart factory of industrie 4.0: An outlook. Int. J. Distrib. Sens. Netw. 2016, 12, 3159805. [Google Scholar] [CrossRef]
- Bu, L.; Zhang, Y.; Liu, H.; Yuan, X.; Guo, J.; Han, S. An IIoT-driven and AI-enabled framework for smart manufacturing system based on three-terminal collaborative platform. Adv. Eng. Inform. 2021, 50, 101370. [Google Scholar] [CrossRef]
- Scheuermann, C.; Verclas, S.; Bruegge, B. Agile factory-an example of an industry 4.0 manufacturing process. In Proceedings of the 2015 IEEE 3rd International Conference on Cyber-Physical Systems, Networks, and Applications, Kowloon, Hong Kong, 19–21 August 2015; pp. 43–47. [Google Scholar]
- Sundar, R.; Balaji, A.; Kumar, R.S. A review on lean manufacturing implementation techniques. Procedia Eng. 2014, 97, 1875–1885. [Google Scholar] [CrossRef]
- Park, K.T.; Lee, J.; Kim, H.J.; Noh, S.D. Digital twin-based cyber physical production system architectural framework for personalized production. Int. J. Adv. Manuf. Technol. 2020, 106, 1787–1810. [Google Scholar] [CrossRef]
- Moens, P.; Bracke, V.; Soete, C.; Vanden Hautte, S.; Nieves Avendano, D.; Ooijevaar, T.; Devos, S.; Volckaert, B.; Van Hoecke, S. Scalable fleet monitoring and visualization for smart machine maintenance and industrial IoT applications. Sensors 2020, 20, 4308. [Google Scholar] [CrossRef]
- ur Rehman, M.H.; Yaqoob, I.; Salah, K.; Imran, M.; Jayaraman, P.P.; Perera, C. The role of big data analytics in industrial Internet of Things. Future Gener. Comput. Syst. 2019, 99, 247–259. [Google Scholar] [CrossRef]
- Saldivar, A.A.F.; Li, Y.; Chen, W.n.; Zhan, Z.h.; Zhang, J.; Chen, L.Y. Industry 4.0 with cyber-physical integration: A design and manufacture perspective. In Proceedings of the 2015 21st International Conference on Automation and Computing (ICAC), Glasgow, UK, 11–12 September 2015; pp. 1–6. [Google Scholar]
- Rüßmann, M.; Lorenz, M.; Gerbert, P.; Waldner, M.; Justus, J.; Engel, P.; Harnisch, M. Industry 4.0: The future of productivity and growth in manufacturing industries. Boston Consult. Group 2015, 9, 54–89. [Google Scholar]
- Judge, M.A.; Manzoor, A.; Khattak, H.A.; Din, I.U.; Almogren, A.; Adnan, M. Secure transmission lines monitoring and efficient electricity management in ultra-reliable low latency industrial Internet of Things. Comput. Stand. Interfaces 2021, 77, 103500. [Google Scholar] [CrossRef]
- Bhattacharjee, S.; Nandi, C. Implementation of industrial internet of things in the renewable energy sector. In The Internet of Things in the Industrial Sector; Springer: Berlin/Heidelberg, Germany, 2019; pp. 223–259. [Google Scholar]
- Truong, V.T.; Ha, D.B.; Nayyar, A.; Bilal, M.; Kwak, D. Performance analysis and optimization of multiple IIoT devices radio frequency energy harvesting NOMA mobile edge computing networks. Alex. Eng. J. 2023, 79, 1–20. [Google Scholar] [CrossRef]
- Beier, G.; Niehoff, S.; Ziems, T.; Xue, B. Sustainability aspects of a digitalized industry—A comparative study from China and Germany. Int. J. Precis. Eng.-Manuf.-Green Technol. 2017, 4, 227–234. [Google Scholar] [CrossRef]
- Huang, X. Intelligent remote monitoring and manufacturing system of production line based on industrial Internet of Things. Comput. Commun. 2020, 150, 421–428. [Google Scholar] [CrossRef]
- Civerchia, F.; Bocchino, S.; Salvadori, C.; Rossi, E.; Maggiani, L.; Petracca, M. Industrial Internet of Things monitoring solution for advanced predictive maintenance applications. J. Ind. Inf. Integr. 2017, 7, 4–12. [Google Scholar] [CrossRef]
- Mouratidis, H.; Diamantopoulou, V. A security analysis method for industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 4093–4100. [Google Scholar] [CrossRef]
- Perera, C.; Liu, C.H.; Jayawardena, S. The emerging internet of things marketplace from an industrial perspective: A survey. IEEE Trans. Emerg. Top. Comput. 2015, 3, 585–598. [Google Scholar] [CrossRef]
- Chang, V.; Martin, C. An industrial IoT sensor system for high-temperature measurement. Comput. Electr. Eng. 2021, 95, 107439. [Google Scholar] [CrossRef]
- Chavhan, S.; Kulkarni, R.A.; Zilpe, A.R. Smart Sensors for IIoT in Autonomous Vehicles. In Smart Sensors for Industrial Internet of Things; Springer: Berlin/Heidelberg, Germany, 2021; pp. 51–61. [Google Scholar]
- Park, D.; Kim, S.; An, Y.; Jung, J.Y. LiReD: A light-weight real-time fault detection system for edge computing using LSTM recurrent neural networks. Sensors 2018, 18, 2110. [Google Scholar] [CrossRef]
- Ghosh, A.; Mukherjee, A.; Misra, S. SEGA: Secured Edge Gateway Microservices Architecture for IIoT-based Machine Monitoring. IEEE Trans. Ind. Inform. 2021, 18, 1949–1956. [Google Scholar] [CrossRef]
- Strauß, P.; Schmitz, M.; Wöstmann, R.; Deuse, J. Enabling of predictive maintenance in the brownfield through low-cost sensors, an IIoT-architecture and machine learning. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 12–13 October 2018; pp. 1474–1483. [Google Scholar]
- Sinha, N.; Pujitha, K.E.; Alex, J.S.R. Xively based sensing and monitoring system for IoT. In Proceedings of the 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
- Ali, J.B.; Fnaiech, N.; Saidi, L.; Chebel-Morello, B.; Fnaiech, F. Application of empirical mode decomposition and artificial neural network for automatic bearing fault diagnosis based on vibration signals. Appl. Acoust. 2015, 89, 16–27. [Google Scholar]
- Budiarti, R.P.N.; Tjahjono, A.; Hariadi, M.; Purnomo, M.H. Development of IoT for automated water quality monitoring system. In Proceedings of the 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE), Jember, Indonesia, 16–17 October 2019; pp. 211–216. [Google Scholar]
- Ashraf, I.; Narra, M.; Umer, M.; Majeed, R.; Sadiq, S.; Javaid, F.; Rasool, N. A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics 2022, 11, 667. [Google Scholar] [CrossRef]
- El Akrami, N.; Hanine, M.; Flores, E.S.; Aray, D.G.; Ashraf, I. Unleashing the Potential of Blockchain and Machine Learning: Insights and Emerging Trends from Bibliometric Analysis. IEEE Access 2023, 11, 78879–78903. [Google Scholar] [CrossRef]
- Akram, U.; Sharif, W.; Shahroz, M.; Mushtaq, M.F.; Aray, D.G.; Thompson, E.B.; Diez, I.d.l.T.; Djuraev, S.; Ashraf, I. IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System. Sensors 2023, 23, 6379. [Google Scholar] [CrossRef]
- Kim, J.; Park, J.; Lee, J.H. Analysis of recent IIoT security technology trends in a smart factory environment. In Proceedings of the 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia, 20–23 February 2023; pp. 840–845. [Google Scholar]
- Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of security attacks. In Proceedings of the 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 11–12 August 2016; pp. 321–326. [Google Scholar]
- Tamilmani, S.; Mohan, T.; Jeyalakshmi, S.; Shukla, G.P.; Gehlot, A.; Shukla, S.K. Blockchain integrated with Industrial IOT towards Industry 4.0. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 27–29 January 2023; pp. 575–581. [Google Scholar]
- Rustam, F.; Mushtaq, M.F.; Hamza, A.; Farooq, M.S.; Jurcut, A.D.; Ashraf, I. Denial of service attack classification using machine learning with multi-features. Electronics 2022, 11, 3817. [Google Scholar] [CrossRef]
- Kambourakis, G.; Kolias, C.; Stavrou, A. The mirai botnet and the iot zombie armies. In Proceedings of the MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 267–272. [Google Scholar]
- Raymond, D.R.; Midkiff, S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput. 2008, 7, 74–81. [Google Scholar] [CrossRef]
- Seneviratne, S.; Hu, Y.; Nguyen, T.; Lan, G.; Khalifa, S.; Thilakarathna, K.; Hassan, M.; Seneviratne, A. A survey of wearable devices and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 2573–2620. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Ye, F.; Luo, H.; Lu, S.; Zhang, L. Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 2005, 23, 839–850. [Google Scholar]
- Al-Khurafi, O.B.; Al-Ahmad, M.A. Survey of web application vulnerability attacks. In Proceedings of the 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 8–10 December 2015; pp. 154–158. [Google Scholar]
- Shah, S.; Simnani, S.S.A.; Banday, M.T. A study of security attacks on internet of things and its possible solutions. In Proceedings of the 2018 International Conference on Automation and Computational Engineering (ICACE), Greater Noida, India, 3–4 October 2018; pp. 203–209. [Google Scholar]
- Rustam, F.; Ashraf, I.; Jurcut, A.D.; Bashir, A.K.; Zikria, Y.B. Malware detection using image representation of malware data and transfer learning. J. Parallel Distrib. Comput. 2023, 172, 32–50. [Google Scholar] [CrossRef]
- Chaganti, R.; Boppana, R.V.; Ravi, V.; Munir, K.; Almutairi, M.; Rustam, F.; Lee, E.; Ashraf, I. A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges. IEEE Access 2022, 10, 96538–96555. [Google Scholar] [CrossRef]
- Sicari, S.; Rizzardi, A.; Miorandi, D.; Coen-Porisini, A. Dynamic policies in internet of things: Enforcement and synchronization. IEEE Internet Things J. 2017, 4, 2228–2238. [Google Scholar] [CrossRef]
- Le, D.N.; Parvathy, V.S.; Gupta, D.; Khanna, A.; Rodrigues, J.J.; Shankar, K. IoT enabled depthwise separable convolution neural network with deep support vector machine for COVID-19 diagnosis and classification. Int. J. Mach. Learn. Cybern. 2021, 12, 3235–3248. [Google Scholar] [CrossRef]
- Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
- Gomes, T.; Salgado, F.; Tavares, A.; Cabral, J. Cute mote, a customizable and trustable end-device for the internet of things. IEEE Sens. J. 2017, 17, 6816–6824. [Google Scholar] [CrossRef]
- Bolotnyy, L.; Robins, G. Physically unclonable function-based security and privacy in RFID systems. In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom’07), White Plains, NY, USA, 19–23 March 2007; pp. 211–220. [Google Scholar]
- Saivarun, K.; Ramakrishnan, R.; Kishore, M. Iot Based Smart Industry Monitoring And Alerting System. In Proceedings of the 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, 18–19 November 2022; pp. 1108–1111. [Google Scholar]
- Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int. J. Distrib. Sens. Netw. 2014, 10, 357430. [Google Scholar] [CrossRef]
- Deepa, G.; Thilagam, P.S. Securing web applications from injection and logic vulnerabilities: Approaches and challenges. Inf. Softw. Technol. 2016, 74, 160–180. [Google Scholar] [CrossRef]
- Chahid, Y.; Benabdellah, M.; Azizi, A. Internet of things security. In Proceedings of the 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco, 19–20 April 2017; pp. 1–6. [Google Scholar]
- Jiang, J.; Han, G.; Wang, H.; Guizani, M. A survey on location privacy protection in wireless sensor networks. J. Netw. Comput. Appl. 2019, 125, 93–114. [Google Scholar] [CrossRef]
- Damghani, H.; Damghani, L.; Hosseinian, H.; Sharifi, R. Classification of attacks on IoT. In Proceedings of the 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation, Tehran City, Iran, 20–21 November 2019. [Google Scholar]
- Sonar, K.; Upadhyay, H. A survey: DDOS attack on Internet of Things. Int. J. Eng. Res. Dev. 2014, 10, 58–63. [Google Scholar]
- Pongle, P.; Chavan, G. Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 2015, 121, 840–847. [Google Scholar] [CrossRef]
- Liu, A.; Liu, X.; Li, H.; Long, J. MDMA: A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs. IEICE Trans. Inf. Syst. 2016, 99, 2010–2018. [Google Scholar] [CrossRef]
- Yang, X.; Karampatzakis, E.; Doerr, C.; Kuipers, F. Security Vulnerabilities in LoRaWAN. In Proceedings of the 2018 IEEE/ACM 3rd International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA, 17–20 April 2018; pp. 129–140. [Google Scholar]
- Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 2018, 6, 379–387. [Google Scholar] [CrossRef]
- Mohapatra, H.; Rath, S.; Panda, S.; Kumar, R. Handling of man-in-the-middle attack in wsn through intrusion detection system. Int. J. 2020, 8, 1503–1510. [Google Scholar] [CrossRef]
- Perazzo, P.; Vallati, C.; Anastasi, G.; Dini, G. DIO suppression attack against routing in the Internet of Things. IEEE Commun. Lett. 2017, 21, 2524–2527. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, C.; Fang, Y. Epic: A differential privacy framework to defend smart homes against internet traffic analysis. IEEE Internet Things J. 2018, 5, 1206–1217. [Google Scholar] [CrossRef]
- Farha, F.; Ning, H.; Ali, K.; Chen, L.; Nugent, C. SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet Things J. 2020, 8, 5904–5913. [Google Scholar] [CrossRef]
- Glissa, G.; Rachedi, A.; Meddeb, A. A secure routing protocol based on RPL for Internet of Things. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar]
- Tao, M.; Ota, K.; Dong, M. Locating compromised data sources in IoT-enabled smart cities: A great-alternative-region-based approach. IEEE Trans. Ind. Inform. 2018, 14, 2579–2587. [Google Scholar] [CrossRef]
- Zarpelão, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [Google Scholar] [CrossRef]
- Anju, J.; Sminesh, C. An improved clustering-based approach for wormhole attack detection in MANET. In Proceedings of the 2014 3rd International Conference on Eco-Friendly Computing and Communication Systems, Mangalore, India, 18–21 December 2014; pp. 149–154. [Google Scholar]
- Djedjig, N.; Tandjaoui, D.; Medjek, F.; Romdhani, I. Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 2020, 52, 102467. [Google Scholar] [CrossRef]
- Haripriya, A.; Kulothungan, K. Secure-MQTT: An efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 90. [Google Scholar]
- Lohachab, A.; Karambir. ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J. Inf. Secur. Appl. 2019, 46, 1–12. [Google Scholar] [CrossRef]
- Karati, A.; Islam, S.H.; Biswas, G.; Bhuiyan, M.Z.A.; Vijayakumar, P.; Karuppiah, M. Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J. 2017, 5, 2904–2914. [Google Scholar] [CrossRef]
- Yin, D.; Zhang, L.; Yang, K. A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 2018, 6, 24694–24705. [Google Scholar] [CrossRef]
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
- Costin, A.; Zaddach, J. Iot malware: Comprehensive survey, analysis framework and case studies. BlackHat USA 2018, 1, 1–9. [Google Scholar]
- Fisher, J.A. Secure my data or pay the price: Consumer remedy for the negligent enablement of data breach. Wm. Mary Bus. L. Rev. 2012, 4, 215. [Google Scholar]
- Miao, D.; Cai, Z.; Li, J.; Gao, X.; Liu, X. Complexity and efficient algorithms for data inconsistency evaluating and repairing. arXiv 2020, arXiv:2001.00315. [Google Scholar]
- Batra, I.; Verma, S.; Alazab, M. A lightweight IoT-based security framework for inventory automation using wireless sensor network. Int. J. Commun. Syst. 2020, 33, e4228. [Google Scholar] [CrossRef]
- Pilato, C.; Garg, S.; Wu, K.; Karri, R.; Regazzoni, F. Securing hardware accelerators: A new challenge for high-level synthesis. IEEE Embed. Syst. Lett. 2017, 10, 77–80. [Google Scholar] [CrossRef]
- Latif, S.; Zou, Z.; Idrees, Z.; Ahmad, J. A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 2020, 8, 89337–89350. [Google Scholar] [CrossRef]
- Zheng, D.; Wu, A.; Zhang, Y.; Zhao, Q. Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power. IEEE Access 2018, 6, 28019–28027. [Google Scholar] [CrossRef]
- Zhang, J.; Xin, Y.; Gao, Y.; Lei, X.; Yang, Y. Secure ABE scheme for access management in blockchain-based IoT. IEEE Access 2021, 9, 54840–54849. [Google Scholar] [CrossRef]
- Gai, K.; Choo, K.K.R.; Qiu, M.; Zhu, L. Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 2018, 5, 3059–3067. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 2018, 6, 580–589. [Google Scholar] [CrossRef]
- Song, T.; Li, R.; Mei, B.; Yu, J.; Xing, X.; Cheng, X. A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 2017, 4, 1844–1852. [Google Scholar] [CrossRef]
- Khan, P.W.; Byun, Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy 2020, 22, 175. [Google Scholar] [CrossRef]
- Lyu, L.; Chen, C.; Zhu, S.; Guan, X. 5G enabled codesign of energy-efficient transmission and estimation for industrial IoT systems. IEEE Trans. Ind. Inform. 2018, 14, 2690–2704. [Google Scholar] [CrossRef]
- Bahga, A.; Madisetti, V.K. Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 2016, 9, 533–546. [Google Scholar] [CrossRef]
- Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
- Mumtaz, S.; Alsohaily, A.; Pang, Z.; Rayes, A.; Tsang, K.F.; Rodriguez, J. Massive Internet of Things for industrial applications: Addressing wireless IIoT connectivity challenges and ecosystem fragmentation. IEEE Ind. Electron. Mag. 2017, 11, 28–33. [Google Scholar] [CrossRef]
- Haseeb, K.; Saba, T.; Rehman, A.; Ahmed, I.; Lloret, J. Efficient data uncertainty management for health industrial internet of things using machine learning. Int. J. Commun. Syst. 2021, 34, e4948. [Google Scholar] [CrossRef]
- Astarloa, A.; Bidarte, U.; Jiménez, J.; Zuloaga, A.; Lázaro, J. Intelligent gateway for Industry 4.0-compliant production. In Proceedings of the IECON 2016—42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy, 24–27 October 2016; pp. 4902–4907. [Google Scholar]
- Bouachir, O.; Aloqaily, M.; Tseng, L.; Boukerche, A. Blockchain and fog computing for cyberphysical systems: The case of smart industry. Computer 2020, 53, 36–45. [Google Scholar] [CrossRef]
- Sharma, P.; Jain, S.; Gupta, S.; Chamola, V. Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 2021, 123, 102685. [Google Scholar] [CrossRef]
- IBM. What Is Industry 4.0? 2021. Available online: https://www.ibm.com/topics/industry-4-0 (accessed on 20 October 2023).
- Intel. Industrial IoT (IIOT) and Automation Technology. 2021. Available online: https://www.intel.com/content/www/us/en/manufacturing/manufacturing-industrial-overview.html (accessed on 20 October 2023).
- Oracle. Remote Monitoring & Maintenance: Mission Critical Operations at the Competitive Edge. 2021. Available online: https://www.oracle.com/us/solutions/internetofthings/iot-remote-monitoring-brief-2881653.pdf (accessed on 2 March 2023).
- Oracle. What Is IoT? 2021. Available online: https://www.oracle.com/internet-of-things/what-is-iot/ (accessed on 2 March 2023).
- Microsoft. Microsoft and Nokia Collaborate to Accelerate Digital Transformation and Industry 4.0 for Communications Service Providers and Enterprises. 2021. Available online: https://news.microsoft.com/2019/11/05/microsoft-and-nokia-collaborate-to-accelerate-digital-transformation-and-industry-4-0-for-communications-service-providers-and-enterprises/ (accessed on 2 March 2023).
- HQ Software. Development and Industrial IoT Solutions. 2021. Available online: https://hqsoftwarelab.com/solutions/internet-of-things/industrial-iot/ (accessed on 22 March 2023).
- Cisco. Industrial IoT Solutions for Digital Manufacturing. 2021. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/iot-digital-manufacturing-solution.html (accessed on 22 March 2023).
- Bembe, M.; Abu-Mahfouz, A.; Masonta, M.; Ngqondi, T. A survey on low-power wide area networks for IoT applications. Telecommun. Syst. 2019, 71, 249–274. [Google Scholar] [CrossRef]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Kantareddy, S.N.R.; Mathews, I.; Sun, S.; Layurova, M.; Thapa, J.; Correa-Baena, J.P.; Bhattacharyya, R.; Buonassisi, T.; Sarma, S.E.; Peters, I.M. Perovskite PV-powered RFID: Enabling low-cost self-powered IoT sensors. IEEE Sensors J. 2019, 20, 471–478. [Google Scholar] [CrossRef]
- Mao, W.; Zhao, Z.; Chang, Z.; Min, G.; Gao, W. Energy-efficient industrial internet of things: Overview and open issues. IEEE Trans. Ind. Inform. 2021, 17, 7225–7237. [Google Scholar] [CrossRef]
- Younan, M.; Houssein, E.H.; Elhoseny, M.; Ali, A.A. Challenges and recommended technologies for the industrial internet of things: A comprehensive review. Measurement 2020, 151, 107198. [Google Scholar] [CrossRef]
- Humayun, M.; Jhanjhi, N.; Alruwaili, M.; Amalathas, S.S.; Balasubramanian, V.; Selvaraj, B. Privacy protection and energy optimization for 5G-aided industrial Internet of Things. IEEE Access 2020, 8, 183665–183677. [Google Scholar] [CrossRef]
- del Campo, G.; Calatrava, S.; Cañada, G.; Olloqui, J.; Martinez, R.; Santamaria, A. IoT Solution for Energy Optimization in Industry 4.0: Issues of a Real-life Implementation. In Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018; pp. 1–6. [Google Scholar]
- Sajid, A.; Abbas, H.; Saleem, K. Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
- Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K. Challenges and opportunities in securing the industrial internet of things. IEEE Trans. Ind. Inform. 2020, 17, 2985–2996. [Google Scholar] [CrossRef]
- Stouffer, K.; Falco, J.; Scarfone, K. Guide to Industrial Control Systems (ICS) Security; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2008.
- Dolui, K.; Datta, S.K. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar]
- Shi, C.; Ren, Z.; Yang, K.; Chen, C.; Zhang, H.; Xiao, Y.; Hou, X. Ultra-low latency cloud-fog computing for industrial internet of things. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
- Hong, Z.; Chen, W.; Huang, H.; Guo, S.; Zheng, Z. Multi-hop cooperative computation offloading for industrial IoT–edge–cloud computing environments. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 2759–2774. [Google Scholar] [CrossRef]
- Pei-Breivold, H.; Sandström, K. Internet of things for industrial automation-challenges and technical. In Proceedings of the iThings 2015: The 8th IEEE International Conference on Internet of Things, Sydney, Australia, 11–13 December 2015; pp. 532–539. [Google Scholar]
- Munirathinam, S. Industry 4.0: Industrial internet of things (IIOT). In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2020; Volume 117, pp. 129–164. [Google Scholar]
- Ghorpade, S.; Zennaro, M.; Chaudhari, B. Survey of localization for internet of things nodes: Approaches, challenges and open issues. Future Internet 2021, 13, 210. [Google Scholar] [CrossRef]
- Saqlain, M.; Piao, M.; Shim, Y.; Lee, J.Y. Framework of an IoT-based industrial data management for smart manufacturing. J. Sens. Actuator Netw. 2019, 8, 25. [Google Scholar] [CrossRef]
- Wu, Y.; Dai, H.N.; Wang, H. Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J. 2020, 8, 2300–2317. [Google Scholar] [CrossRef]
- Iglesias-Urkia, M.; Orive, A.; Barcelo, M.; Moran, A.; Bilbao, J.; Urbieta, A. Towards a lightweight protocol for Industry 4.0: An implementation based benchmark. In Proceedings of the 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics (ECMSM), Donostia, Spain, 24–26 May 2017; pp. 1–6. [Google Scholar]
- Gebremichael, T.; Ledwaba, L.P.; Eldefrawy, M.H.; Hancke, G.P.; Pereira, N.; Gidlund, M.; Akerberg, J. Security and privacy in the industrial internet of things: Current standards and future challenges. IEEE Access 2020, 8, 152351–152366. [Google Scholar] [CrossRef]
- Grüner, S.; Pfrommer, J.; Palm, F. RESTful industrial communication with OPC UA. IEEE Trans. Ind. Inform. 2016, 12, 1832–1841. [Google Scholar] [CrossRef]
- Ankele, R.; Marksteiner, S.; Nahrgang, K.; Vallant, H. Requirements and recommendations for IoT/IIoT models to automate security assurance through threat modelling, security analysis and penetration testing. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Vienna, Austria, 26–29 August 2019; pp. 1–8. [Google Scholar]
- Feng, J.; Yang, L.T.; Zhang, R.; Qiang, W.; Chen, J. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Trans. Ind. Inform. 2020, 18, 7009–7018. [Google Scholar] [CrossRef]
Ref. | IIoT Security | Major Attacks | Countermeasures | Blockchain | Software-Based IIoT | Fog-Based IIoT |
---|---|---|---|---|---|---|
[10] | Yes | No | Yes | No | No | No |
[11] | Yes | No | Yes | No | No | No |
[12] | Yes | Yes | Yes | No | No | No |
[13] | No | No | Yes | No | Yes | Yes |
[14] | No | No | Yes | No | Yes | Yes |
[15] | No | Yes | Yes | No | No | Yes |
[16] | Yes | No | No | Yes | No | No |
[17] | Yes | No | No | Yes | No | No |
Current | Yes | Yes | Yes | Yes | Yes | Yes |
Protocols | Frequency Band | Standards | Transmission Range | Data Rate | Cost | Energy Usage |
---|---|---|---|---|---|---|
ZigBee | 2.4 GHz | IEEE 802.15.4 | 10–20 m | 20–250 Kilobyte | Low | Low |
Bluetooth | 24 GHz | IEEE 802.15.1 | 8–10 m | 1–24 Mbs | Low | Very Low |
WIFI | 5–60 GHz | IEEE 802.11 | 20–100 m | 1 Mbegabite–7 Gigabyte | High | High |
MQTT | 2.4 GHz | OASIS | - | 250 kilobyte per second | Low | Low |
Lora WAN | 868/900 MHz | Lora WAN R1.0 | <30 KM | 0.3–50 Kb per second | High | Very Low |
Mobile Cellular Networks | 865–MHz, 2.4 GHz | 2G–GSM, CDMS–3GUMTS, CDMA2000, 4G–LTE | Entire Cellular Area | 2G: 50–100 Kb per second 3G 200 Kb per second 4G: 0.1–1 Gb/s | Medium | Medium |
RFID | 860–960 MHz | ISO 18,000–6C | 1–5 m | 40–160 Kb per second | Low | Low |
WiMAX | 2 GHz–66 GHz | IEEE 802.16 | <50 KM | 1 Mb per second–1 Gb per second (Fixed) 50–100 Mb/s (mobile) | High | Medium |
LR–WPAN | 868/915–MHz, 2.4 GHz | IEEE 802.15.4 | 10–20 m | 40–250 Kb per second | Low | Low |
Sensors | Description of Sensors, IoT Connections/Roles |
---|---|
Temperature Sensor | One of the most important requirements for this sensor is to help prevent moisture on a large production floor. In addition, temperature sensors also help detect extremely high temperatures in manufacturing processes and display our performance rating [97]. |
Humidity Sensor | Humidity sensors, which monitor the quantity of moisture in the air, are the most useful IIoT sensors. The humidity would build in our customer’s application, and the flooring would become completely soaked. The production line was severely affected by wet feet. IIoT humidity sensors could be used during the production line to monitor the humidity [98]. |
Pressure Sensor | IIoT sensors generally require the ability to read pressure. Therefore, choosing the correct pressure sensor for every application, from detecting air pressure to harmful gases and liquids, requires some research. In industrial applications, pressure sensor designs detect leaks or flow blockages. Other transmissions may be issued if pressure fluctuations surpass predefined limitations. Pressure sensors provide a fast payback period, especially when faults are found [99]. |
Current- monitoringSensor | When IIoT sensor procedures are used, power consumption monitoring cannot be minimized [100]. The current monitoring method helps you to check utility bills. Unfortunately, the current monitoring devices do not help predict the system’s failure [101]. When an application fails on an industrial motor, the first thing that happens is friction. A larger load on an engine is caused by friction. When power consumption exceeds expected levels, motor utilization can detect failures. The most significant utilization evidence has come from industrial freezers. When compressors fail, for example, one of two things can happen: current consumption is significantly lowered (allowing the motor to spin freely without load) due to internal component failure, or recent consumption increases due to friction [102]. |
VibrationSensor | Vibration sensors are crucial components of IIoT sensors. Vibration sensors can alert the user to frequent faults with working machinery and devices, making them a solution for many predictive preservation applications. Accelerometers are used in vibration sensors to read microchanges over a wide range of frequencies. NCD vibration sensors can detect malfunctioning items from heavy machinery and motors to industrial pipe flow vibration monitoring. However, this sensor can save lives when utilized appropriately, making it the top-ranked sensor for predictive maintenance applications because of its early detection abilities. Furthermore, the vibration sensor is the most commonly utilized in industrial applications that do not require human intervention [103]. |
Water-DetectionSensor | Water-detection sensors are essential sensors for industrial applications. When water is exposed, they send an alert, and when the sensor has been restored to its dry state, they send another alert. Water detection sensors also communicate data regularly, letting you know they are still watching out for you. The battery state is also communicated, as it is with all NCD sensors, to control the sensor’s overall health. Water detection sensors have been used to detect floods in unexpectedly large numbers of applications. In addition, this sensor is commonly used to detect water in basements. Detecting water on solid floors and walls is one of the most fundamental detecting applications [104]. |
Ref. | Countermeasures/Solutions | Physical Attacks | Effects |
---|---|---|---|
[121] | NOS middleware | Permanent denial-of-service (PDoS) | Resource destruction |
[122,123] | Support vector machine (SVM) | Sleep denial | Node shutdown |
[124] | CUTE Mote; packets’ rerouting to alternative routes | RF interference/jamming | DoS; hinder/jam communication |
[125] | Masking technique; authentication using PUF | Side-channel attack | Collect encryption keys |
[127] | PAuthKey | Fake node injection | Control data flow; man-in-the-middle |
[128] | PUF-based authentication | Malicious code injection and physical tampering | DoS attacks; leak sensitive information |
Ref. | Countermeasures/Solutions | Network Attacks | Effects |
---|---|---|---|
[139] | Privacy-preserving traffic obfuscation framework | Traffic analysis attack | Data leakage |
[140] | SRAM-based PUF | RFID spoofing and unauthorized access | Data manipulation and modification (read, write, delete) |
[141] | Hash chain authentication | Routing information attacks | Routing loops |
[142] | Hash chain authentication; monitor-based approach | Selective forwarding | Message destruction |
[143] | Hash chain authentication; intrusion detection | Sinkhole attack | Data alteration or leakage |
[144] | Clustering-based intrusion detection system | Wormhole attack | Packet tunneling |
[145] | Trust aware protocol | Sybil attack | Unfair resource allocation; redundancy |
[146,147] | Secure MQTT; inter-device authentication | Man-in-the-middle attack | Data privacy violation |
[148] | Signcryption | Replay attack | Network congestion; DoS |
[149] | DDoS server; SDN-based IoT framework | DoS/DDoS attack | Network flooding; network crash |
Refs. | Countermeasures/Solutions | Physical Attacks | Effects |
---|---|---|---|
[154,155] | Lightweight framework; high-level synthesis (HLS) | Trojan horses, virus, adware, worms, and spyware. | Resource destruction |
[156,157] | Lightweight neural network framework; malware image classification | Malware | Infected data |
[158] | Privacy-preserving ABE; blockchain-based ABE | Unauthorized access | Violation of data privacy |
[159,160] | Two-factor authentication; DPP; ISDD | Data breach | Data leakage |
[161,162] | Chaos-based scheme; blockchain architecture | Data inconsistency | Data inconsistency |
Firms | Directions and Trends |
---|---|
IBM, Armonk, NY, USA | IBM can increase process product quality, capabilities, and insights, decrease production errors, and save money and time by applying AI-powered visual inspection of components and assemblies. Quality control workers can use a smartphone connected to the cloud to monitor manufacturing operations from anywhere at no cost. Furthermore, manufacturers can spot mistakes earlier rather than later using machine learning algorithms when more expensive repair work is needed [171]. |
Intel, Santa Clara, CA, USA | Intel can help quicken the time of value data-driven, interoperable IIoT solutions. The ecosystem of innovators and a collection of flexible solutions help develop and integrate intelligent industrial edge solutions that reduce costs, increase profits, and move you ahead of the competition. In addition, Intel enables the deployment of smart factory solutions to achieve new productivity levels while exposing new opportunities to maximize income [172]. |
Samsung, Seoul, Korea | Samsung takes action in the world of IoT. Samsung SDS’s IoT platform lets users connect with various devices and many IoT communication protocols like Zigbee, Lora WAN, MQTT, BLE, and Modbus [173]. |
Oracle, Austin, TX, USA | Oracle’s digital world applications include customer experience (CX), supply chain, HR, and ERP to increase operational efficiency, boost worker productivity, improve CX, generate new business models and prospects, and support intelligent, predictive algorithms, and digital twins [174]. |
Microsoft, Redmond, WA, USA | Microsoft is the reason behind the digital transformation of smart manufacturing to improve in productivity and grow industrial processes. In addition, Microsoft also helps IIoT sensors communicate with artificial intelligence (AI) to create smart machines and equipment that communicate. In addition, since IIoT generates massive volumes of big data, it needs a fast, powerful system [175]. |
HQ Software, New York, NY, USA | HQ Software gives solutions for IIoT services to make the whole process of manufacturing more efficient. One of the efficiency parameters is a shorter manufacturing cycle; IIoT results in choosing the right IoT automation software to decrease the manufacturing cycle time and cut costs [176]. |
Cisco, San Jose, CA, USA | Cisco gives a solution for a secure and strong network infrastructure for the success of Industry IoT [177]. |
Google, Mountain View, CA, USA | Google Cloud Open System infrastructure provides an IIoT solution for developing opportunities, new devices, technologies, and business models. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Farooq, M.S.; Abdullah, M.; Riaz, S.; Alvi, A.; Rustam, F.; Flores, M.A.L.; Galán, J.C.; Samad, M.A.; Ashraf, I. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry. Sensors 2023, 23, 8958. https://doi.org/10.3390/s23218958
Farooq MS, Abdullah M, Riaz S, Alvi A, Rustam F, Flores MAL, Galán JC, Samad MA, Ashraf I. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry. Sensors. 2023; 23(21):8958. https://doi.org/10.3390/s23218958
Chicago/Turabian StyleFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad, and Imran Ashraf. 2023. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry" Sensors 23, no. 21: 8958. https://doi.org/10.3390/s23218958
APA StyleFarooq, M. S., Abdullah, M., Riaz, S., Alvi, A., Rustam, F., Flores, M. A. L., Galán, J. C., Samad, M. A., & Ashraf, I. (2023). A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry. Sensors, 23(21), 8958. https://doi.org/10.3390/s23218958