Uploaded by Felipe Macedo

SSRN-id3603739

advertisement
Evolution of IoT to IIoT: Applications & Challenges
Himanshu1, Nikhil Sharma1*, Dr. Rajinder Singh1
{himanshu.september, nikhilsharma1694}@gmail.com, rajpanihar@rediffmail.com
1
HMR Institute of Technology & Management, Delhi-110036, India
Abstract: The emerging Internet of Things (IoT) provides a wide range of platform to different technologies by connecting different devices and are
automated by using sensors. It builds a platform and is responsible for functioning of various smart devices over a range. After installing IoT in devices
they are able to communicate with each other without involving human and computer interaction, it is also being widely used in all the fields as no human
intervention is required in any IoT based applications. In this paper we present a survey of how IoT is transformed into IIoT (Industrial Internet of
Things), what is Industry 4.0, what are key differences between IoT and IIoT, various application of IoT in different sectors, powerful features and
advance characteristics of IoT. Since the demand of IoT systems is increasing in various fields day by day and ease of life after using smart devices but
then also it possesses certain limitations too. The later part of paper focuses on security threats and issues addressed by IoT based systems along with ways
to overcome the limitations possessed in the system.
Keywords: IoT, Security, Privacy, IIoT, Industry 4.0.
Table 1: Difference Between IT Devices and IoT Devices with Respect
to Security [6-7]
1. Introduction
Applications of Internet of Things (IoT) has been carried out in real life
for several years. In our daily life, IoT devices are connected with each
other to share some information without involving human efforts [1].
With the help of internet, these devices are able to collect and exchange
necessary data with each other and perform accordingly to it. The spark of
connecting Internet to the nearby physical devices is increasing rapidly
[2]. In 2020, 8.4 billion devices will connect world-wide, according to
latest Gartner report. This number can be increased to 20.4 billion by
2022. There is rapid increment of IoT applications in all parts of the
world. Europe, America and China are the major countries in which the
IoT revolutions have been already started. By the end of 2024, the number
of machines to machine (M2M) connections is believed to produce 27
billion from 5.6 billion in 2016 [3]. These statistics declares that in future
IoT will be the big reason for expanding digital economy. We could
consider IoT as the one of the major pillars of economy in future [4].
Under M2M connections large variety of applications are cover like smart
environment, smart cities, smart farming, smart industries etc. [5]. In
future, the demand of smart devices (the devices which are able
communicate or transmit data with each other on the internet directly) get
increases. After studying the variety of IoT applications, the problem of
safety and protections arises. Due to trust issues and interoperable IoT
web, prominent IoT applications may lose all its capability and unable to
gain its demand. IoT also has major security troubles likewise security
problems faced by the internet, cellular net-works, and WSNs such as
authentication issues, management issues, privacy is-sues and many more.
Traditional IT Security
IoT Security
Human is responsible for the security of
IT.
In this machine itself is responsible
for security, so with proper security
measures IoT appliances need to be
equipped.
It is mainly relying on resource rich
gadgets.
Due to lack of hardware and
software, IoT devices are less secure
than IT.
Tricky algorithms are executed for
genuine security and lower potential.
Algorithms which are insubstantial
are only preferred.
Data is collected when user grant a
permission this means privacy is control
by the user.
The risk of surface attack may
increase because IoT automatically
collects user data without its
permission.
According to table 1, it is clear that due to some challenging factors it is
difficult to secure IoT environment than a normal information technology
(IT) devices. The IoT applications creates a pleasant environment for
various kinds of cyber threats. IoT applications which are installed
worldwide have been suffers from various privacy and cyber-attacks. It
was estimated, that in the last quarter of 2016, Mirai attack covered
around 2.5 million of IoT devices and launch distributed denial of services
(DDoS) attack. Hajime, and Raper are another huge botnet attack after
Mirai which infect large number of devices which are linked with the
internet.
1.1. Traditional IT Security vs IoT Security
Table 1 shows the difference between Traditional IT Security and IoT
Security.
The Industrial Internet of Things (IIoT) concerns to industrial applications
such as manufacturing and energy management and it is also referring to
interrelated sensors, tools, and other devices which are joined with
computers [8]. IoT is for trading sector and IIoT is for industrial sector. In
the period of industry 4.0, the next industrial revolution begins which is
AUTHOR
1
Electronic copy available at: https://ssrn.com/abstract=3603739
also known to be as Industrial Internet of Things [9]. It is considered that
Industry 4.0 [10] is the part of the Fourth Industrial Revolution. Factories
have machines with wireless connectivity and sensors which is attached to
a system that can control the whole manufacturing line and make
meaningful conclusions by its own in the Industry 4.0 [11]. Both internal
and intra-organizational services are provided to users for using the
production series with the help of Internet of Services. Technologies
which are enabled by the IIoT are: cybersecurity, cloud computing, edge
computing, 3D printing, advanced robotics, vast data, and Internet of
Things [12].
•
Integrate: - IoT integration is very important as it helps several models
to enhance the user practice as well. Integrity is very important in
order to improve and integrate the system. In order to have better
understanding of this let’s take one example for better understanding,
let us assume I have a coffee machine and the beans in the machine
gets empty and machine automatically orders the beans or purchases it
for me from amazon. So, there are lot of things we can do when we
integrate our system.
•
Heterogeneity: - Due to dissimilar hardware platforms and networks
the IoT devices are heterogeneous. Two or more devices are able to
interact with each other or able to interact with service platforms with
the help of various networks and this makes device a “smart device”.
•
Action: - Intelligence is signifies by action. This could be relied upon
debates regarding phenomena (like in smart factory decisions) like
automation, usually the most important piece.
1.2. IoT Features and Characteristics
The characteristics of IoT [13] are depicted in Figure 1 & explained as
follows:
The rest of the paper is categorized as follows: Section 2 discusses the
evolution of IoT to IIoT, Section 3 explains the applications of IoT & IIoT
in various fields, Section 4 presents the divers challenges of IIoT followed
by Conclusion of the manuscript in Section 5.
2. Transformation of IoT to IIoT
Figure 1: Characteristics of IoT
•
Connectivity: - It establishes a proper and secure connection between
all things of IoT to IoT platform through server or cloud. It is Bidirectional communication, means high speed requires for messaging
between the devices and cloud.
•
Device Virtualization: - It is the first step of connectivity. It
systematizes combination of devices with the IOT enterprise. Next
comes, Endpoint Management which manage device endpoint
identity, metadata and lifecycle circumstances for most of the devices.
It helps to manage, which data comes from where and what to do with
that data.
•
Analyze: - After successful connection of all relevant things, now the
time comes to analyze the collected data and that data to build
effective business intelligence. We could call our system a smart
system, if we have a good perception into data gathered from all these
things. Real time analyze must be done with respect to event
aggregation, filtering and correlation.
In 1999, Kelvin Ashton coined the term “Internet of things”, He gave the
name in order to demonstrate idea that how manually objects could be
connected to net-work [14]. Then later on, Industrial Internet of Things
has led to innovations like the smart factory and computing technology.
IIoT is not only set up a connection between machines but also has human
interfacing unit for flawless system. The simple and monotonous jobs like
quality control, assembly, administration and arrangement will replace by
IIoT with a huge expectation [15].
In 2013, Department of Business, Skills, and Innovation of UK get
engaged in which they looked at six global cities and noticed how they
invested in smart cities project. It was observed that how cities like
Stockholm, Rio De Janeiro, Chicago, Hong Kong, Boston, and Barcelona
confronted particular provocations when answering to the chances that a
‘smart city’ and private sector pioneers might bring. IoT devices are not
controlled by remote, actually they can:
•
•
•
•
Exchange several information with each other using several
skills.
The Entire network can be control. (including the internet)
Sends and receives various data.
Are consider as “smart” devices with their own self processing
units.
AUTHOR
2
Electronic copy available at: https://ssrn.com/abstract=3603739
Table 2 shows the major difference between Internet of Things (IoT) and
Indus-trial Internet of Things (IIoT) for better understanding according to
their prospect.
•
Consumer Applications: - The IoT devices are used by the users in
there day to day life which includes home automation, fashion
technology, connected vehicles, health and appliances are
interconnected with each other and easily operable with remote.
•
Smart home: - Lighting, heating, air conditioning, media and security
are concept of home automation which comes under IoT. There is
platform or centers on which the working of smart home based which
is further control by the smart devices and appliances [19]. There are
several dedicated smart home centers that offer a platform to connect
different smart devices or products such as Google home, Amazon
echo, Apple’s Homepod and Samsung’s Smart thing center. Facebook
CEO Mark Zuckerberg installed Jarvis at his home, which makes his
home fully smart.
•
Transportation: - IoT applications expends to almost all directions of
transportation systems (i.e. the vehicle, the driver or user). The interand intra-vehicular communication is enables due to active connection
be-tween various parts of a transport system [20]. For example: now a
days on road a series of cameras are attaches on an iron rod, actually
cameras detect the speed of each and every vehicle which passes
under these cam-eras. If any vehicle crossed the speed limit then
cameras captures the speed of vehicle and electronic generated challan
(e-challan) is delivered to defaulter’s house. IoT is the main reason
behind this and its smooth connectivity among all devices. Sensors
such as GPS send processed form of information to IoT hub and then
the data is observed and deliver to the user. Number of road accidents
are also reducing in this way [21].
•
Medical and Healthcare: - The Internet of medical things (IoMT) is an
application of the IoT for medical and health related purposes [22].
Firstly, it collects data and then data is delivered for observing,
examine and analysis. It is also known as “Smart Healthcare”. This
emerging application plays an elementary part in controlling or
viewing diseases in health community. It is possible only through the
connection of powerful wire-less remote monitoring. Due to this
smooth connection the health practitioners able to collects patient’s
data and then complicated algorithms are applying on it. In 2015,
according to some report, the IoT devices could save more than $300
billion of United States in yearly healthcare spending by decreasing
cost and increasing profit. Specialized implants such as electric
wristbands, pacemakers or advanced hearing aids are monitored by
these advanced and emerging devices.
Table 2: Comparison between IoT and IIoT [16-17]
Prospect
Internet of Things
Industrial Internet
of Things
Linked things
User-level devices,
basically not much
expensive.
Costly machines,
sensors, systems,
basically with high
degree of difficulty
Service model
Human-based
Machine-based
Communication
capacity
A smaller number of
communication standards
A large range of
connectivity
technologies and
standards.
Communication
transportation
Typically, wireless
Both wired and wireless
Amount of data
Medium to high
High to very high
Evaluative
Quite trivial
Becomes serious (timing,
security, privacy
reliability)
Even though, IIoT brings industries or machines to a next level, because it
pro-vides a platform for the worldwide interconnections via IP (Internet
Protocol). With the help of IP, one device is able to liaise with other
devices by using same architecture and protocols.
3. Applications of IoT and IIoT
The applications of IoT and IIoT [18] are explained in the subsection
below.
3.1. Applications of IoT
The applications of IoT are depicted in Figure 2 and explained as follows:
3.2. Applications of IIoT
Upgraded efficiency, observations and the modification of the
workplace all these things are included in the Industrial Internet of
Things (IIoT) [23]. By the end of 2030, it is believed that global GDP
Figure 2: Applications of IoT
AUTHOR
3
Electronic copy available at: https://ssrn.com/abstract=3603739
is rise to $15 trillion when IIoT is in-stalled worldwide. The
applications of IIoT are depicted in Figure 3 and explained as follows.
IoT. The ARL formed an alliance with university, industry, and Army
researchers in 2017 whose objective is to enhances the conceptual
institution of IoT technologies and their uses to Army operation. The
name of this initiative started by ARL is also known as the Internet of
Battlefield Things.
•
Figure 3: Applications of IIoT
•
Manufacturing: - Many doors are open, for creating whole new
business and market good times by these highly integrated cyberphysical space. IIoT boost the business value and it will lead to the
Industry 4.0. In manufacturing IIoT approaches prioritizes customer
data and gathering it from multiple sources to develop actionable
insights. This leads to improved solutions that allow manufactures to
respond more quickly to their customers. IIoT reduced response times
from 5 hours to 20 minutes and they reduced product waste by 10%.
•
Agriculture: - IoT has a wide variety of applications in farming such
as collection of data of rainfall, humidity, wind speed, soil content,
temperature, and pest infestation [24]. This data is very useful in
improving farming techniques, reduces waste, and minimizes efforts
required to manage crops and to upgrade quantity and quality of crops
and work. For example: monitoring of soil temperature, and moisture
content is now done by the farmers and even they can apply IoTacquired data to precision fertilization programs [25]. In August 2018,
Toyota Tsusho started an association with Microsoft to innovate a fish
farming tools using the Microsoft Azure program. Water pump system
use artificial intelligence to sum up the number of fishes, observes it
and gather the efficacy of water flow from the analyzed data.
•
Military Applications: - In the military province the application of IoT
technologies are majorly use for the purpose of investigation,
inspection and in any other battle related purposes and in this the use
of sensors, robots, biometrics, vehicles and another smart technology
which is applicable on the Warfield is involved.
•
Internet of Battlefield Things: - The U.S. Army Research Laboratory
(ARL) commenced a project Internet of Battlefield Things (IoBT)
whose priority is to increase potential of army soldiers with the help of
Ocean of Things: - The Defense Advanced Research Projects Agency
(DARPA) of U.S. initiated an Ocean of Things. The motive of the
project Ocean 2.0 or Ocean of Things (OoT) is to initiate or spread the
Internet of Things (IoT) which covers the large ocean areas in the
motive of gathering, observing, assembling and inspecting
environmental and vessel action data. Approximately 71 percent of the
earth surface is covered with ocean, so how it is possible? DARPA
planned to use low cost and small network which includes floating
enabled sensors, then these sensors collect the data from ocean and
then observe and transfer it to real-time monitor marine time activity.
4. Challenges faced by IIoT
The physical world is slowly transforming into digital world from
ordinary world because of smart technology and devices which allows
user and devices to be in constant communication with each other. It’s
now more efficient because of artificial intelligence, machine learning,
etc. When machine-to-machine communication is combining with big
data analytics in an industry then there is rise of unequal levels of
productivity, efficiency and performance in IIoT systems. Now, most of
the business companies wants to do business with IoT development
companies to get the latest technology involved into their business. This
arises new challenges and opportunities for business leaders. It’s analyzed
that in future, 72% of those companies may lose market share if they are
failed to implies large data strategy. There are few challenges that are
faced by IIoT [26] are depicted in Figure 4 & explained as follows:
Figure 4: Challenges of IIoT
AUTHOR
4
Electronic copy available at: https://ssrn.com/abstract=3603739
•
•
•
Connectivity and Visibility: - Due to improper or poor connectivity
the critical IIoT-implementation challenges arise. Joining of machine
with IIoT is a challenging problem, and it’s necessary to ensure that
these machines are working at an optimal level and it’s important to
monitor machines to enhance the production level. Different units are
responsible for the proper working of IIoT machines, and there might
be a problem of coordination arises as a result of power blackouts,
internet outages and physical or technical errors [27]. As a result,
connected devices has to be removed from network, which disturbs
the whole production unit and company has to suffer in millions.
which aimed at shifting from IoT to IIoT, key differences between IoT
and IIoT. IoT possess certain characteristics but there are certain
limitations too. The challenges and security threats are also addressed
along with measures to overcome that. Further after reviewing this paper,
we can conclude that in future how IoT will take this world to the next
level, when IoT used in industries, it will rapidly increase the economic
and production level of industries as well as countries also.
IIoT Integration: - Integration of the information technology (IT) is
another difficulty faced by the IIoT execution. Integration between
these two technologies suffers due to essential connectivity and
synchronization. If we don’t want to rely on defective connectivity so
we have to replace the entire equipment. With the modern ways of
thinking and operating we successfully transforms raw data into useful
information: the machine data which are count and captures by IT
department requires to match with internal organizational resources
and then data is decoded and implement to continue the process [28].
1.
Security: - As we enjoy several comforts from the IoT, we must also
take care about safety and privacy in smart devices. We must give
main priority to security while designing the IoT devices. Privacy of
our personal data and privacy of our physical well-being are includes
in it. Security is the biggest challenge for IIoT technology team since a
small or regular threat could disintegrate the whole enterprise.
Although if a company solve this issue with IIoT or new security tools
are provided to the network, it requires increased cost and
maintenance [29]. So, businesses often avoided the idea of IIoT until
they are equipped with a solid security plan in place.
REFERENCES
2.
3.
4.
5.
6.
7.
8.
•
•
Data Storage: - Data storage is another major challenge for any
company or enterprise. The data which was stored in past are used for
the all forecasted activities. Today none of the enterprise uses an old
conventional method to tackle data which mostly would be analyzing
high-frequency data, observe it, and punctually thrown it away. It is
compulsory for any company to adopt proper plan for a secure storage
of data before run IIoT in full mode.
Analytics Challenges: - It’s necessary for Data Analytics partners to
include data processing, cleansing, and representation while executing
IoT architecture [30]. Enough space for functionality factor is left
surely and this factor add real-time or predictive analytics to an IoT
solution simply.
5. Conclusion
9.
10.
11.
12.
13.
The paper focuses on IoT technology, its key features along with its
applications and characteristics in various sectors. The emerging trends
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey
on internet of things: Architecture, enabling technologies, security and
pri-vacy, and applications,” IEEE Internet of Things Journal, vol. 4, no.
5, pp. 1125–1142, 2017.
D. Miller, “Blockchain and the internet of things in the industrial sector,”
IT Professional, vol. 20, no. 3, pp. 15–18, 2018
J. Huang, L. Kong, G. Chen, M.-Y. Wu, X. Liu, and P. Zeng, “Towards
se-cure industrial iot: Blockchain system with credit-based consensus
mechanism,” IEEE Transactions on Industrial Informatics, 2019
Y. Xu, J. Ren, G. Wang, C. Zhang, J. Yang, and Y. Zhang, “A
blockchain-based non-repudiation network computing service scheme
for industrial iot,” IEEE Transactions on Industrial Informatics, 2019.
Singh, A., Sharma, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Taxonomy of Attacks on Web Based Applications. 2019 2nd
International Conference on Intelligent Computing, Instrumentation and
Control
Technologies
(ICICICT).
doi:
10.1109/icicict46008.2019.8993264
W. Liang, M. Tang, J. Long, X. Peng, J. Xu, and K.-C. Li, “A secure
fabric blockchain-based data transmission technique for industrial
internet-ofthings,” IEEE Transactions on Industrial Informatics, 2019.
H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource
trading in blockchain-based industrial internet of things,” IEEE
Transactions on Industrial Informatics, 2019.
Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Authentication & Encryption Based Security Services in Blockchain
Technology. 2019 International Conference on Computing,
Communication,
and
Intelligent
Systems
(ICCCIS).
doi:
10.1109/icccis48478.2019.8974500
S. Zhao, S. Li, and Y. Yao, “Blockchain enabled industrial internet of
things technology,” IEEE Transactions on Computational Social
Systems, 2019.
J. Al-Jaroodi and N. Mohamed, “Blockchain in industries: A survey,”
IEEE Access, vol. 7, pp. 36 500–36 515, 2019
T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the
applica-tion of blockchain to the next generation of cybersecure
industry 4.0 smart factories,” IEEE Access, vol. 7, pp. 45 201–45 218,
2019.
Tiwari, R., Sharma, N., Kaushik, I., Tiwari, A., & Bhushan, B. (2019).
Evolution of IoT & Data Analytics using Deep Learning. 2019
International Conference on Computing, Communication, and
Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974481
K. Zhou, T. Liu, and L. Zhou, “Industry 4.0: Towards future industrial
opportunities and challenges,” in 2015 12th International conference on
fuzzy systems and knowledge discovery (FSKD). IEEE, 2015, pp.
2147– 2152.
AUTHOR
5
Electronic copy available at: https://ssrn.com/abstract=3603739
14.
15.
16.
17.
18.
19.
20.
21.
F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in industry
4.0: A review of the concept and of energy management approached in
production based on the internet of things paradigm,” in 2014 IEEE international conference on industrial engineering and engineering management. IEEE, 2014, pp. 697–701.
S. Weyer, M. Schmitt, M. Ohmer, and D. Gorecky, “Towards industry
4.0-standardization as the crucial challenge for highly modular, multivendor production systems,” Ifac-Papersonline, vol. 48, no. 3, pp. 579–
584, 2015.
“The Industrial Internet of Things (IIoT): innovation, benefits and barriers,” https://www.i-scoop.eu/internet-of-things-guide/industrialinternetthings-iiot-saving-costs-innovation/, 2019, [Online; accessed 12-April2019].
Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium
block-chain for secure energy trading in industrial internet of things,”
IEEE transactions on industrial informatics, vol. 14, no. 8, pp. 3690–
3700, 2018.
J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain,
“Ena-bling localized peer-to-peer electricity trading among plug-in
hybrid electric vehicles using consortium blockchains,” IEEE
Transactions on Industrial Informatics, vol. 13, no. 6, pp. 3154–3164,
2017.
Varshney, T., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Architectural Model of Security Threats & their Countermeasures in
IoT. 2019 International Conference on Computing, Communication,
and
Intelligent
Systems
(ICCCIS).
doi:
10.1109/icccis48478.2019.8974544
D. Liu, A. Alahmadi, J. Ni, X. Lin et al., “Anonymous reputation
system for iiot-enabled retail marketing atop pos blockchain,” IEEE
Transac-tions on Industrial Informatics, 2019.
Jadon, S., Choudhary, A., Saini, H., Dua, U., Sharma, N., & Kaushik, I.
(2020). Comfy Smart Home using IoT. SSRN Electronic Journal. doi:
10.2139/ssrn.3565908
22.
23.
24.
25.
26.
27.
28.
29.
30.
L. Da Xu, W. He, and S. Li, “Internet of Things in industries: A survey,”
IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014
Tiwari, A., Sharma, N., Kaushik, I., & Tiwari, R. (2019). Privacy Issues
& Security Techniques in Big Data. 2019 International Conference on
Computing, Communication, and Intelligent Systems (ICCCIS). doi:
10.1109/icccis48478.2019.8974511
J. M. Müller, D. Kiel, and K.-I. Voigt, “What drives the implementation
of industry 4.0? the role of opportunities and challenges in the context
of sustainability,” Sustainability, vol. 10, no. 1, p. 247, Jan. 2018.
D. Kiel, C. Arnold, and K.-I. Voigt, “The influence of the Industrial
Inter-net of Things on business models of established manufacturing
compa-nies—A business level perspective,” Technovation, vol. 68, pp.
4–19, Dec. 2017.
Baotong Chen, Jiafu Wan, Lei Shu, Peng Li, Mithun Mukherjee,
Boxing
Yin,
"Smart
Factory
of
Industry
4.0:
Key
Technologies", Application Case and Challenges, 2017.
Sharma, A., Singh, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019).
Security Countermeasures in Web Based Application. 2019 2nd
International Conference on Intelligent Computing, Instrumentation and
Control
Technologies
(ICICICT).
doi:
10.1109/icicict46008.2019.8993141
Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao, and M. A. Imran, “Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment,” IEEE Internet Things J., vol. 6,
no. 3, pp. 5791–5802, Jun. 2019.
Hyuncheol Park, Hoichang Kim, Hotaek Joo, JaeSeung Song, "Recent
advancements in the Internet-of-Things related standards: A oneM2M
perspective", ICT Express, vol. 2, no. 3, pp. 126-129, Sep. 2016.
Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga, Jesus
Lazaro, "Intelligent gateway for Industry 4.0-compliant production
lines", 2016.
AUTHOR
6
Electronic copy available at: https://ssrn.com/abstract=3603739
Download