Evolution of IoT to IIoT: Applications & Challenges Himanshu1, Nikhil Sharma1*, Dr. Rajinder Singh1 {himanshu.september, nikhilsharma1694}@gmail.com, rajpanihar@rediffmail.com 1 HMR Institute of Technology & Management, Delhi-110036, India Abstract: The emerging Internet of Things (IoT) provides a wide range of platform to different technologies by connecting different devices and are automated by using sensors. It builds a platform and is responsible for functioning of various smart devices over a range. After installing IoT in devices they are able to communicate with each other without involving human and computer interaction, it is also being widely used in all the fields as no human intervention is required in any IoT based applications. In this paper we present a survey of how IoT is transformed into IIoT (Industrial Internet of Things), what is Industry 4.0, what are key differences between IoT and IIoT, various application of IoT in different sectors, powerful features and advance characteristics of IoT. Since the demand of IoT systems is increasing in various fields day by day and ease of life after using smart devices but then also it possesses certain limitations too. The later part of paper focuses on security threats and issues addressed by IoT based systems along with ways to overcome the limitations possessed in the system. Keywords: IoT, Security, Privacy, IIoT, Industry 4.0. Table 1: Difference Between IT Devices and IoT Devices with Respect to Security [6-7] 1. Introduction Applications of Internet of Things (IoT) has been carried out in real life for several years. In our daily life, IoT devices are connected with each other to share some information without involving human efforts [1]. With the help of internet, these devices are able to collect and exchange necessary data with each other and perform accordingly to it. The spark of connecting Internet to the nearby physical devices is increasing rapidly [2]. In 2020, 8.4 billion devices will connect world-wide, according to latest Gartner report. This number can be increased to 20.4 billion by 2022. There is rapid increment of IoT applications in all parts of the world. Europe, America and China are the major countries in which the IoT revolutions have been already started. By the end of 2024, the number of machines to machine (M2M) connections is believed to produce 27 billion from 5.6 billion in 2016 [3]. These statistics declares that in future IoT will be the big reason for expanding digital economy. We could consider IoT as the one of the major pillars of economy in future [4]. Under M2M connections large variety of applications are cover like smart environment, smart cities, smart farming, smart industries etc. [5]. In future, the demand of smart devices (the devices which are able communicate or transmit data with each other on the internet directly) get increases. After studying the variety of IoT applications, the problem of safety and protections arises. Due to trust issues and interoperable IoT web, prominent IoT applications may lose all its capability and unable to gain its demand. IoT also has major security troubles likewise security problems faced by the internet, cellular net-works, and WSNs such as authentication issues, management issues, privacy is-sues and many more. Traditional IT Security IoT Security Human is responsible for the security of IT. In this machine itself is responsible for security, so with proper security measures IoT appliances need to be equipped. It is mainly relying on resource rich gadgets. Due to lack of hardware and software, IoT devices are less secure than IT. Tricky algorithms are executed for genuine security and lower potential. Algorithms which are insubstantial are only preferred. Data is collected when user grant a permission this means privacy is control by the user. The risk of surface attack may increase because IoT automatically collects user data without its permission. According to table 1, it is clear that due to some challenging factors it is difficult to secure IoT environment than a normal information technology (IT) devices. The IoT applications creates a pleasant environment for various kinds of cyber threats. IoT applications which are installed worldwide have been suffers from various privacy and cyber-attacks. It was estimated, that in the last quarter of 2016, Mirai attack covered around 2.5 million of IoT devices and launch distributed denial of services (DDoS) attack. Hajime, and Raper are another huge botnet attack after Mirai which infect large number of devices which are linked with the internet. 1.1. Traditional IT Security vs IoT Security Table 1 shows the difference between Traditional IT Security and IoT Security. The Industrial Internet of Things (IIoT) concerns to industrial applications such as manufacturing and energy management and it is also referring to interrelated sensors, tools, and other devices which are joined with computers [8]. IoT is for trading sector and IIoT is for industrial sector. In the period of industry 4.0, the next industrial revolution begins which is AUTHOR 1 Electronic copy available at: https://ssrn.com/abstract=3603739 also known to be as Industrial Internet of Things [9]. It is considered that Industry 4.0 [10] is the part of the Fourth Industrial Revolution. Factories have machines with wireless connectivity and sensors which is attached to a system that can control the whole manufacturing line and make meaningful conclusions by its own in the Industry 4.0 [11]. Both internal and intra-organizational services are provided to users for using the production series with the help of Internet of Services. Technologies which are enabled by the IIoT are: cybersecurity, cloud computing, edge computing, 3D printing, advanced robotics, vast data, and Internet of Things [12]. • Integrate: - IoT integration is very important as it helps several models to enhance the user practice as well. Integrity is very important in order to improve and integrate the system. In order to have better understanding of this let’s take one example for better understanding, let us assume I have a coffee machine and the beans in the machine gets empty and machine automatically orders the beans or purchases it for me from amazon. So, there are lot of things we can do when we integrate our system. • Heterogeneity: - Due to dissimilar hardware platforms and networks the IoT devices are heterogeneous. Two or more devices are able to interact with each other or able to interact with service platforms with the help of various networks and this makes device a “smart device”. • Action: - Intelligence is signifies by action. This could be relied upon debates regarding phenomena (like in smart factory decisions) like automation, usually the most important piece. 1.2. IoT Features and Characteristics The characteristics of IoT [13] are depicted in Figure 1 & explained as follows: The rest of the paper is categorized as follows: Section 2 discusses the evolution of IoT to IIoT, Section 3 explains the applications of IoT & IIoT in various fields, Section 4 presents the divers challenges of IIoT followed by Conclusion of the manuscript in Section 5. 2. Transformation of IoT to IIoT Figure 1: Characteristics of IoT • Connectivity: - It establishes a proper and secure connection between all things of IoT to IoT platform through server or cloud. It is Bidirectional communication, means high speed requires for messaging between the devices and cloud. • Device Virtualization: - It is the first step of connectivity. It systematizes combination of devices with the IOT enterprise. Next comes, Endpoint Management which manage device endpoint identity, metadata and lifecycle circumstances for most of the devices. It helps to manage, which data comes from where and what to do with that data. • Analyze: - After successful connection of all relevant things, now the time comes to analyze the collected data and that data to build effective business intelligence. We could call our system a smart system, if we have a good perception into data gathered from all these things. Real time analyze must be done with respect to event aggregation, filtering and correlation. In 1999, Kelvin Ashton coined the term “Internet of things”, He gave the name in order to demonstrate idea that how manually objects could be connected to net-work [14]. Then later on, Industrial Internet of Things has led to innovations like the smart factory and computing technology. IIoT is not only set up a connection between machines but also has human interfacing unit for flawless system. The simple and monotonous jobs like quality control, assembly, administration and arrangement will replace by IIoT with a huge expectation [15]. In 2013, Department of Business, Skills, and Innovation of UK get engaged in which they looked at six global cities and noticed how they invested in smart cities project. It was observed that how cities like Stockholm, Rio De Janeiro, Chicago, Hong Kong, Boston, and Barcelona confronted particular provocations when answering to the chances that a ‘smart city’ and private sector pioneers might bring. IoT devices are not controlled by remote, actually they can: • • • • Exchange several information with each other using several skills. The Entire network can be control. (including the internet) Sends and receives various data. Are consider as “smart” devices with their own self processing units. AUTHOR 2 Electronic copy available at: https://ssrn.com/abstract=3603739 Table 2 shows the major difference between Internet of Things (IoT) and Indus-trial Internet of Things (IIoT) for better understanding according to their prospect. • Consumer Applications: - The IoT devices are used by the users in there day to day life which includes home automation, fashion technology, connected vehicles, health and appliances are interconnected with each other and easily operable with remote. • Smart home: - Lighting, heating, air conditioning, media and security are concept of home automation which comes under IoT. There is platform or centers on which the working of smart home based which is further control by the smart devices and appliances [19]. There are several dedicated smart home centers that offer a platform to connect different smart devices or products such as Google home, Amazon echo, Apple’s Homepod and Samsung’s Smart thing center. Facebook CEO Mark Zuckerberg installed Jarvis at his home, which makes his home fully smart. • Transportation: - IoT applications expends to almost all directions of transportation systems (i.e. the vehicle, the driver or user). The interand intra-vehicular communication is enables due to active connection be-tween various parts of a transport system [20]. For example: now a days on road a series of cameras are attaches on an iron rod, actually cameras detect the speed of each and every vehicle which passes under these cam-eras. If any vehicle crossed the speed limit then cameras captures the speed of vehicle and electronic generated challan (e-challan) is delivered to defaulter’s house. IoT is the main reason behind this and its smooth connectivity among all devices. Sensors such as GPS send processed form of information to IoT hub and then the data is observed and deliver to the user. Number of road accidents are also reducing in this way [21]. • Medical and Healthcare: - The Internet of medical things (IoMT) is an application of the IoT for medical and health related purposes [22]. Firstly, it collects data and then data is delivered for observing, examine and analysis. It is also known as “Smart Healthcare”. This emerging application plays an elementary part in controlling or viewing diseases in health community. It is possible only through the connection of powerful wire-less remote monitoring. Due to this smooth connection the health practitioners able to collects patient’s data and then complicated algorithms are applying on it. In 2015, according to some report, the IoT devices could save more than $300 billion of United States in yearly healthcare spending by decreasing cost and increasing profit. Specialized implants such as electric wristbands, pacemakers or advanced hearing aids are monitored by these advanced and emerging devices. Table 2: Comparison between IoT and IIoT [16-17] Prospect Internet of Things Industrial Internet of Things Linked things User-level devices, basically not much expensive. Costly machines, sensors, systems, basically with high degree of difficulty Service model Human-based Machine-based Communication capacity A smaller number of communication standards A large range of connectivity technologies and standards. Communication transportation Typically, wireless Both wired and wireless Amount of data Medium to high High to very high Evaluative Quite trivial Becomes serious (timing, security, privacy reliability) Even though, IIoT brings industries or machines to a next level, because it pro-vides a platform for the worldwide interconnections via IP (Internet Protocol). With the help of IP, one device is able to liaise with other devices by using same architecture and protocols. 3. Applications of IoT and IIoT The applications of IoT and IIoT [18] are explained in the subsection below. 3.1. Applications of IoT The applications of IoT are depicted in Figure 2 and explained as follows: 3.2. Applications of IIoT Upgraded efficiency, observations and the modification of the workplace all these things are included in the Industrial Internet of Things (IIoT) [23]. By the end of 2030, it is believed that global GDP Figure 2: Applications of IoT AUTHOR 3 Electronic copy available at: https://ssrn.com/abstract=3603739 is rise to $15 trillion when IIoT is in-stalled worldwide. The applications of IIoT are depicted in Figure 3 and explained as follows. IoT. The ARL formed an alliance with university, industry, and Army researchers in 2017 whose objective is to enhances the conceptual institution of IoT technologies and their uses to Army operation. The name of this initiative started by ARL is also known as the Internet of Battlefield Things. • Figure 3: Applications of IIoT • Manufacturing: - Many doors are open, for creating whole new business and market good times by these highly integrated cyberphysical space. IIoT boost the business value and it will lead to the Industry 4.0. In manufacturing IIoT approaches prioritizes customer data and gathering it from multiple sources to develop actionable insights. This leads to improved solutions that allow manufactures to respond more quickly to their customers. IIoT reduced response times from 5 hours to 20 minutes and they reduced product waste by 10%. • Agriculture: - IoT has a wide variety of applications in farming such as collection of data of rainfall, humidity, wind speed, soil content, temperature, and pest infestation [24]. This data is very useful in improving farming techniques, reduces waste, and minimizes efforts required to manage crops and to upgrade quantity and quality of crops and work. For example: monitoring of soil temperature, and moisture content is now done by the farmers and even they can apply IoTacquired data to precision fertilization programs [25]. In August 2018, Toyota Tsusho started an association with Microsoft to innovate a fish farming tools using the Microsoft Azure program. Water pump system use artificial intelligence to sum up the number of fishes, observes it and gather the efficacy of water flow from the analyzed data. • Military Applications: - In the military province the application of IoT technologies are majorly use for the purpose of investigation, inspection and in any other battle related purposes and in this the use of sensors, robots, biometrics, vehicles and another smart technology which is applicable on the Warfield is involved. • Internet of Battlefield Things: - The U.S. Army Research Laboratory (ARL) commenced a project Internet of Battlefield Things (IoBT) whose priority is to increase potential of army soldiers with the help of Ocean of Things: - The Defense Advanced Research Projects Agency (DARPA) of U.S. initiated an Ocean of Things. The motive of the project Ocean 2.0 or Ocean of Things (OoT) is to initiate or spread the Internet of Things (IoT) which covers the large ocean areas in the motive of gathering, observing, assembling and inspecting environmental and vessel action data. Approximately 71 percent of the earth surface is covered with ocean, so how it is possible? DARPA planned to use low cost and small network which includes floating enabled sensors, then these sensors collect the data from ocean and then observe and transfer it to real-time monitor marine time activity. 4. Challenges faced by IIoT The physical world is slowly transforming into digital world from ordinary world because of smart technology and devices which allows user and devices to be in constant communication with each other. It’s now more efficient because of artificial intelligence, machine learning, etc. When machine-to-machine communication is combining with big data analytics in an industry then there is rise of unequal levels of productivity, efficiency and performance in IIoT systems. Now, most of the business companies wants to do business with IoT development companies to get the latest technology involved into their business. This arises new challenges and opportunities for business leaders. It’s analyzed that in future, 72% of those companies may lose market share if they are failed to implies large data strategy. There are few challenges that are faced by IIoT [26] are depicted in Figure 4 & explained as follows: Figure 4: Challenges of IIoT AUTHOR 4 Electronic copy available at: https://ssrn.com/abstract=3603739 • • • Connectivity and Visibility: - Due to improper or poor connectivity the critical IIoT-implementation challenges arise. Joining of machine with IIoT is a challenging problem, and it’s necessary to ensure that these machines are working at an optimal level and it’s important to monitor machines to enhance the production level. Different units are responsible for the proper working of IIoT machines, and there might be a problem of coordination arises as a result of power blackouts, internet outages and physical or technical errors [27]. As a result, connected devices has to be removed from network, which disturbs the whole production unit and company has to suffer in millions. which aimed at shifting from IoT to IIoT, key differences between IoT and IIoT. IoT possess certain characteristics but there are certain limitations too. The challenges and security threats are also addressed along with measures to overcome that. Further after reviewing this paper, we can conclude that in future how IoT will take this world to the next level, when IoT used in industries, it will rapidly increase the economic and production level of industries as well as countries also. IIoT Integration: - Integration of the information technology (IT) is another difficulty faced by the IIoT execution. Integration between these two technologies suffers due to essential connectivity and synchronization. If we don’t want to rely on defective connectivity so we have to replace the entire equipment. With the modern ways of thinking and operating we successfully transforms raw data into useful information: the machine data which are count and captures by IT department requires to match with internal organizational resources and then data is decoded and implement to continue the process [28]. 1. Security: - As we enjoy several comforts from the IoT, we must also take care about safety and privacy in smart devices. We must give main priority to security while designing the IoT devices. Privacy of our personal data and privacy of our physical well-being are includes in it. Security is the biggest challenge for IIoT technology team since a small or regular threat could disintegrate the whole enterprise. Although if a company solve this issue with IIoT or new security tools are provided to the network, it requires increased cost and maintenance [29]. So, businesses often avoided the idea of IIoT until they are equipped with a solid security plan in place. REFERENCES 2. 3. 4. 5. 6. 7. 8. • • Data Storage: - Data storage is another major challenge for any company or enterprise. The data which was stored in past are used for the all forecasted activities. Today none of the enterprise uses an old conventional method to tackle data which mostly would be analyzing high-frequency data, observe it, and punctually thrown it away. It is compulsory for any company to adopt proper plan for a secure storage of data before run IIoT in full mode. Analytics Challenges: - It’s necessary for Data Analytics partners to include data processing, cleansing, and representation while executing IoT architecture [30]. Enough space for functionality factor is left surely and this factor add real-time or predictive analytics to an IoT solution simply. 5. Conclusion 9. 10. 11. 12. 13. The paper focuses on IoT technology, its key features along with its applications and characteristics in various sectors. The emerging trends J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of things: Architecture, enabling technologies, security and pri-vacy, and applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, 2017. D. Miller, “Blockchain and the internet of things in the industrial sector,” IT Professional, vol. 20, no. 3, pp. 15–18, 2018 J. Huang, L. Kong, G. Chen, M.-Y. Wu, X. Liu, and P. Zeng, “Towards se-cure industrial iot: Blockchain system with credit-based consensus mechanism,” IEEE Transactions on Industrial Informatics, 2019 Y. Xu, J. Ren, G. Wang, C. Zhang, J. Yang, and Y. Zhang, “A blockchain-based non-repudiation network computing service scheme for industrial iot,” IEEE Transactions on Industrial Informatics, 2019. Singh, A., Sharma, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993264 W. Liang, M. Tang, J. Long, X. Peng, J. Xu, and K.-C. Li, “A secure fabric blockchain-based data transmission technique for industrial internet-ofthings,” IEEE Transactions on Industrial Informatics, 2019. H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource trading in blockchain-based industrial internet of things,” IEEE Transactions on Industrial Informatics, 2019. Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974500 S. Zhao, S. Li, and Y. Yao, “Blockchain enabled industrial internet of things technology,” IEEE Transactions on Computational Social Systems, 2019. J. Al-Jaroodi and N. Mohamed, “Blockchain in industries: A survey,” IEEE Access, vol. 7, pp. 36 500–36 515, 2019 T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the applica-tion of blockchain to the next generation of cybersecure industry 4.0 smart factories,” IEEE Access, vol. 7, pp. 45 201–45 218, 2019. Tiwari, R., Sharma, N., Kaushik, I., Tiwari, A., & Bhushan, B. (2019). Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974481 K. Zhou, T. Liu, and L. Zhou, “Industry 4.0: Towards future industrial opportunities and challenges,” in 2015 12th International conference on fuzzy systems and knowledge discovery (FSKD). IEEE, 2015, pp. 2147– 2152. AUTHOR 5 Electronic copy available at: https://ssrn.com/abstract=3603739 14. 15. 16. 17. 18. 19. 20. 21. F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in industry 4.0: A review of the concept and of energy management approached in production based on the internet of things paradigm,” in 2014 IEEE international conference on industrial engineering and engineering management. IEEE, 2014, pp. 697–701. S. Weyer, M. Schmitt, M. Ohmer, and D. Gorecky, “Towards industry 4.0-standardization as the crucial challenge for highly modular, multivendor production systems,” Ifac-Papersonline, vol. 48, no. 3, pp. 579– 584, 2015. “The Industrial Internet of Things (IIoT): innovation, benefits and barriers,” https://www.i-scoop.eu/internet-of-things-guide/industrialinternetthings-iiot-saving-costs-innovation/, 2019, [Online; accessed 12-April2019]. Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium block-chain for secure energy trading in industrial internet of things,” IEEE transactions on industrial informatics, vol. 14, no. 8, pp. 3690– 3700, 2018. J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain, “Ena-bling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains,” IEEE Transactions on Industrial Informatics, vol. 13, no. 6, pp. 3154–3164, 2017. Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974544 D. Liu, A. Alahmadi, J. Ni, X. Lin et al., “Anonymous reputation system for iiot-enabled retail marketing atop pos blockchain,” IEEE Transac-tions on Industrial Informatics, 2019. Jadon, S., Choudhary, A., Saini, H., Dua, U., Sharma, N., & Kaushik, I. (2020). Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/ssrn.3565908 22. 23. 24. 25. 26. 27. 28. 29. 30. L. Da Xu, W. He, and S. Li, “Internet of Things in industries: A survey,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014 Tiwari, A., Sharma, N., Kaushik, I., & Tiwari, R. (2019). Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974511 J. M. Müller, D. Kiel, and K.-I. Voigt, “What drives the implementation of industry 4.0? the role of opportunities and challenges in the context of sustainability,” Sustainability, vol. 10, no. 1, p. 247, Jan. 2018. D. Kiel, C. Arnold, and K.-I. Voigt, “The influence of the Industrial Inter-net of Things on business models of established manufacturing compa-nies—A business level perspective,” Technovation, vol. 68, pp. 4–19, Dec. 2017. Baotong Chen, Jiafu Wan, Lei Shu, Peng Li, Mithun Mukherjee, Boxing Yin, "Smart Factory of Industry 4.0: Key Technologies", Application Case and Challenges, 2017. Sharma, A., Singh, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993141 Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao, and M. A. Imran, “Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment,” IEEE Internet Things J., vol. 6, no. 3, pp. 5791–5802, Jun. 2019. Hyuncheol Park, Hoichang Kim, Hotaek Joo, JaeSeung Song, "Recent advancements in the Internet-of-Things related standards: A oneM2M perspective", ICT Express, vol. 2, no. 3, pp. 126-129, Sep. 2016. Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga, Jesus Lazaro, "Intelligent gateway for Industry 4.0-compliant production lines", 2016. AUTHOR 6 Electronic copy available at: https://ssrn.com/abstract=3603739