Professional Documents
Culture Documents
Handbook I 4.0 SMARTSystems
Handbook I 4.0 SMARTSystems
0
and SMART Systems
Handbook of Industry 4.0
and SMART Systems
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made
to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all
materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all
material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future
reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized
in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.
copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-
8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that
have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Preface...................................................................................................................................................... vii
Authors....................................................................................................................................................... xi
Index....................................................................................................................................................... 365
v
Preface
Modern market becomes more global and less national or local. Developed world market is reflected in
the wide range of new products, the rapid obsolescence of products, and the emergence of new products,
high quality standards, short delivery, and decreasing costs. Such conditions are very difficult for the
classical industrial production we have today, and thanks to the 29 progress of modern technological
achievements, such as communication networks and the Internet, that force us to develop and introduce
a new modern era of industrial production based on communicational informational linking of manufac-
turers and customers. This transformative shift in production and manufacturing paradigm is popularly
termed as Industry 4.0. Industry 4.0 has elicited much interest from both industry and academia. A recent
literature survey identified the basic concept, perspectives, key technologies, and industrial applications
of Industry 4.0 and examined its challenges and future trends [1,2] . However, no work has established
a systematic framework of smart manufacturing systems for Industry 4.0 that guides academic research
and industrial implementation until now. To fill the gap, this study proposes a conceptual framework for
Industry 4.0 and Smart Systems.
Actually many disruptive technologies, such as Cloud Computing, Internet of Things (IoT), big data
analytics, and artificial intelligence, have emerged. These technologies are permeating the manufacturing
industry and make it smart and capable of addressing current challenges, such as increasing customized
requirements, improved quality, and reduced time to market. An increasing number of sensors are being
used in equipment (e.g., machine tools) to enable them to self-sense, self-act, and communicate with one
another. Through these technologies, real-time production data can be obtained and shared to facilitate
rapid and accurate decision making. The connection of physical manufacturing equipment and devices
over the Internet together with big data analytics in the digital world (e.g., the cloud) has resulted in the
emergence of a revolutionary means of production, namely, Cyber Physical Production Systems (CPPS).
CPPS are a materialization of the general concept CPS in the manufacturing environment. The intercon-
nection and interoperability of CPS entities in manufacturing shop floors together with analytics and
knowledge learning methodology provide an intelligent decision support system. The widespread appli-
cation of CPS (or CPPS) has ushered in the fourth stage of industrial production, namely, Industry 4.0.
CPPS consist of autonomous and cooperative elements and subsystems, connecting communications
and interactions in different situations, at all levels of production, machines, processes to manufacturing,
and logistics networks. Their operational modeling and forecasting allows the implementation of a series
of basic applied oriented research tasks, and above all controlled systems at any level. The basic assump-
tion in terms of CPPS is reflected in the research and defining relations through the prism of autonomy,
cooperation, optimization and response to the assigned tasks. By integrating analytic and simulation-
based approaches, this prediction may be described in greater detail than ever before. Such systems must
confront a series of new challenges in terms of operational sensor networks, smart actuators, databases
and many others, above all, communication protocols.
CPPS will enable and support the communication between humans, machines, and products alike.
The elements of a CPPS are able to acquire and process data, and can self-control certain tasks and
interact with humans via interfaces.
Although extensive effort continues to be exerted to make systems smart, smart systems do not have a
widely accepted definition. In Industry 4.0, CPPS can be regarded as smart manufacturing systems. CPPS
comprise smart machines, warehousing systems, and production facilities that have been developed digi-
tally and feature end-to-end Information and Communication Technology (ICT)-based integration from
inbound logistics to production, marketing, outbound logistics, and service. Smart manufacturing sys-
tems can generally be defined as fully integrated and collaborative manufacturing systems that respond
in real time to meet the changing demands and conditions in factories and supply networks and satisfy
vii
viii Preface
varying customer needs. Key enabling technologies for smart manufacturing systems include CPS, IoT,
Internet of Services (IoS), cloud-based solutions, Artificial Intelligence (AI), and Big Data Analytics.
Today we are on the threshold of a new industrial revolution, the revolution by which digital networks
are related to operating values in the intelligent factory, and that includes everything from the initial
idea, through design, development, and manufacture, to maintenance, service, and recycling. Industries
4.0 include horizontal integration of data flow between partners, suppliers, and customers, as well as
vertical integration within the organization’s frames – from development to final product. It merges the
virtual and the real world. The result is a system in which all processes are fully integrated – system in
information in real-time frame. The speed and rate of changes in consumer trends will be a significant
driver of Industry 4.0.
Since the products are configured to respond to the preferences of individual users, production must
be more flexible and must be shorter.
The point is to create value for customers, and that means to involve them in the process from the
beginning. Of course, the companies that use the highly efficient mass production to achieve economies
of scale are in benefit, while at the same time they have the opportunity to offer a high level of adaptation.
The industries in developed countries in Europe and North America are based on the exploitation of
CPS through technology based on the integration of wireless systems, wireless control system, machine
learning, and production-based sensors. Such industries are developing a national platform for new pro-
duction systems and new age of Industry4.0-based access to the Internet and CPS.
CPS are a new generation of systems that integrate computer and physical abilities. With the combi-
nation of cyber systems and physical systems, user semantic laws can be traced and thus communicate
with people. Cybernetic systems are a summation of logic and sensor unit, while the physical systems
are a summation of actuator units. Through the ability to interact and expand capabilities of the physical
world using computing power, communication technologies and control mechanisms, CPS allow feed-
back loops, improving production processes and optimum support of people in their decision-making
processes. By using the corresponding sensor technology, CPS are able to receive direct physical data
and convert them into digital signals. They can share this information and access the available data that
connect it to digital networks, thereby forming an IOT.
On the other hand, production of new generation should be adjusted to changeable conditions and
issues put before it. Optimization of plant operations will be implemented by improving and speeding
up communications. Starting points are the solutions offered by a vision of “smart environment” for
production.
In order to create a large-scale smart system, smart devices are used. The term “smart” (often used
to mark intelligence) seems to be applicable in different contexts, because its meaning with respect to
objects is not yet clearly defined.
Smart, in some contexts, refers to an independent device, which usually consists of the sensor, and/or
to activate the microprocessor and transceiver. However, adjective smart is used to characterize and that
contributes to the implementation of additional meanings, which introduced multi-platform communi-
cation and increase of its computing capacity. Intelligence is revealed through cooperation in networks
with other smart devices, which have the possibility to check the system updates and decide whether to
act on them or not. Such a network is called smart grid. They may find a reference to smart objects as
objects that have the ability to connect the stored data, as well as offer access to it for human or machine’s
needs. There are so much smart products that are equipped with memory options so that they can be
understood as a kind of living product.
This era, which is which sensors and chips identify and locate products, and in which products know
their history and current status. This network of machines, storage systems, and manufacturing plants
that will exchange inevitably ahead of us is by the scientific circles of developed European countries
cooled new industrial revolution or Industry 4.0.
The modern process of globalization is characterized by its essential dimensions. First, it marks the
objective planetary processes:
Preface ix
• The essence of technological evolution; compression of time and space, reducing the distance
and time required for more branched, global communication.
• Close connection and interdependence of societies; everything is in a wider range of activities
that have become transnational, and cannot be managed solely within the individual states.
Globalization means the spread of identical form (industrialism and then post-industrialism,
market economy and multi-party political system) to almost the entire social world space.
The book covers a wide range of topics, including Fundamentals and Architecture of Industry 4.0, Cyber
Physical Systems (CPS), Smartness and Pervasive Computing, Cloud Computing, Big Data Analytics,
Cybersecurity and Risks, and finally Industry 4.0 across the sectors. A number of demonstrative sce-
narios are presented, and current challenges and future research directions are discussed.
We expect that the book will be useful for the beginners as well as for the researchers working in the
field of Industry 4.0 and smart systems
Authors
Diego Galar Pascual is a Professor of Condition Monitoring in the Division of Operation and
Maintenance Engineering at Luleå University of Technology (LTU), where he is coordinating several
H2020 projects related to different aspects of cyber-physical systems, Industry 4.0, IoT, or industrial Big
Data. He was also involved in the SKF UTC center located in Lulea focusing on SMART bearings and
also actively involved in national projects with the Swedish industry or funded by Swedish national agen-
cies such as Vinnova. He has been involved in the raw materials business of Scandinavia, especially with
mining and oil and gas for Sweden and Norway, respectively. Indeed, LKAB, Boliden or STATOIL have
been partners or funders of projects in the CBM field for specific equipment such as loaders, dumpers,
rotating equipment, linear assets, and so on.
He is also the principal researcher in Tecnalia (Spain), heading the Maintenance and Reliability
research group within the Division of Industry and Transport.
He has authored more than 500 journal and conference papers, books, and technical reports in the
field of maintenance, working also as a member of editorial boards, scientific committees, and chairing
international journals and conferences and actively participating in national and international commit-
tees for standardization and R&D in the topics of reliability and maintenance.
In the international arena, he has been a Visiting Professor at the Polytechnic of Braganza (Portugal),
University of Valencia, NIU (USA) and the Universidad Pontificia Católica de Chile. Currently, he is
Visiting Professor at the University of Sunderland (UK), University of Maryland (USA), University of
Stavanger (NOR), and Chongqing University (China).
Pasquale Daponte was born in Minori (SA), Italy, on March 7, 1957. He obtained his bachelor’s degree
and master’s degree “cum laude” in Electrical Engineering in 1981 from the University of Naples, Italy.
He is a Full Professor of Electronic Measurements at the University of Sannio—Benevento.
From 2016, he is the Chair of the Italian Association on Electrical and Electronic Measurements. He is
Past President of IMEKO.
He is a member of I2MTC Board, Working Group of the IEEE Instrumentation and Measurement
Technical Committee N°10 Subcommittee of the Waveform Measurements and Analysis Committee,
IMEKO Technical Committee TC-4 “Measurements of Electrical Quantities,” Editorial Board
of Measurement Journal, Acta IMEKO and of Sensors. He is an Associate Editor of IET Science
Measurement & Technology journal.
He has organized some national or international meetings in the field of Electronic Measurements and
European cooperation, and he was the General Chairman of the IEEE Instrumentation and Measurement
Technical Conference for 2006, and Technical Programme Co-Chair for I2MTC 2015.
He was a co-founder of the IEEE Symposium on Measurement for Medical Applications MeMeA; now,
he is the Chair of the MeMeA Steering Committee (memea2018.ieee-ims.org). He is the co-founder of the
IEEE Workshop on Metrology for AeroSpace (www.metroaerospace.org), IEEE Workshop on Metrology
for Archaeology and Cultural Heritage (www.metroarcheo.com), IMEKO Workshop on Metrology for
Geotechnics (www.metrogeotechnics.org), IEEE Workshop on Metrology for the Sea (www.metrosea.org),
and IEEE Workshop on Metrology for Industry 4.0 and IoT (www.metroind40iot.org).
He is involved in some European projects. He has published more than 300 scientific papers in journals
and presented papers at national and international conferences on the following subjects: Measurements
and Drones, ADC and DAC Modelling and Testing, Digital Signal Processing, and Distributed
Measurement Systems.
He received the award for the research on the digital signal processing of the ultrasounds in echo-
ophthalmology in 1987 from the Italian Society of Ophthalmology, the IEEE Fellowship in 2009, the
Laurea Honoris Causa in Electrical Engineering from Technical University “Gheorghe Asachi” of
xi
xii Authors
Iasi (Romania) in 2009, “The Ludwik Finkelstein Medal 2014” from the Institute of Measurement and
Control of United Kingdom, and the “Career Excellence Award” from the IEEE Instrumentation and
Measurement Society “For a lifelong career and outstanding leadership in research and education on
instrumentation and measurement, and a passionate and continuous service, international in scope, to the
profession” in May 2018, and IMEKO Distinguished Service Award in September 2018.
Uday Kumar is Chair Professor of Operation and Maintenance Engineering, Director of Research and
Innovation (Sustainable Transport), and Director of Luleå Railway Research Center at Luleå University
of Technology, Luleå, Sweden.
His teaching, research, and consulting interests are equipment maintenance, reliability and maintain-
ability analysis, product support, life cycle costing (LCC), risk analysis, system analysis, eMaintenance,
and asset management.
He is a Visiting Faculty at the Center of Intelligent Maintenance System (IMS) – a center sponsored by
National Science Foundation, Cincinnati, USA, since 2011; External Examiner and Program Reviewer
for Reliability and Asset Management Program of the University of Manchester; Distinguished Visiting
Professor at Tsinghua University, Beijing; honorary professor at Beijing Jiao Tong University, Beijing; etc.
Earlier, he has been a Visiting Faculty at Imperial College London; Helsinki University of Technology,
Helsinki; University of Stavanger, Norway; etc.
He has more than 30 years of experience in consulting and finding solutions to industrial problems,
directly or indirectly related to maintenance of engineering asserts. He has published more than 300
papers in international journals and conference proceedings dealing with various aspects of maintenance
of engineering systems, and has coauthored four books on Maintenance Engineering and contributed to
World Encyclopaedia on Risk Management.
He is an elected member of Royal Swedish Academy of Engineering Sciences.
1
Fundamentals of Industry 4.0
CONTENTS
1.1 Introduction....................................................................................................................................... 3
1.2 Industry 4.0....................................................................................................................................... 4
1.2.1 Definition of Industry 4.0.................................................................................................... 5
1.2.2 What Is Industry 4.0?.......................................................................................................... 5
1.2.2.1 Industry 4.0—What Is It?................................................................................... 5
1.2.2.2 Talking about a Revolution: What Is New in Industry 4.0?............................... 6
1.2.2.3 On the Path to Industry 4.0: What Needs to Be Done?..................................... 6
1.2.3 Key Paradigm of Industry 4.0............................................................................................. 6
1.2.4 Industry 4.0 Conception...................................................................................................... 7
1.2.4.1 Five Main Components of Networked Production............................................ 7
1.2.5 Framework of Industry 4.0: Conception and Technologies................................................ 8
1.2.6 Nine Pillars of Technological Advancement...................................................................... 8
1.2.6.1 Big Data and Analytics...................................................................................... 9
1.2.6.2 Autonomous Robots..........................................................................................11
1.2.6.3 Simulation.........................................................................................................11
1.2.6.4 Horizontal and Vertical System Integration.....................................................11
1.2.6.5 Industrial IoT.....................................................................................................11
1.2.6.6 Cybersecurity................................................................................................... 12
1.2.6.7 The Cloud......................................................................................................... 12
1.2.6.8 Additive Manufacturing................................................................................... 12
1.2.6.9 Augmented Reality........................................................................................... 12
1.2.7 Macro Perspective of Industry 4.0.................................................................................... 12
1.2.8 Micro Perspective of Industry 4.0......................................................................................14
1.2.9 Industry 4.0 Components.................................................................................................. 15
1.2.9.1 Cyber-Physical Systems (CPS)......................................................................... 15
1.2.9.2 Internet of Things............................................................................................. 15
1.2.9.3 Internet of Services...........................................................................................16
1.2.9.4 Smart Factories.................................................................................................17
1.2.10 Industry 4.0: Design Principles..........................................................................................17
1.2.10.1 Interoperability..................................................................................................17
1.2.10.2 Virtualization....................................................................................................18
1.2.10.3 Decentralization................................................................................................18
1.2.10.4 Real-Time Capability........................................................................................18
1.2.10.5 Service Orientation...........................................................................................18
1.2.10.6 Modularity.........................................................................................................18
1.2.11 Impact of Industry 4.0........................................................................................................18
1.2.11.1 Quantifying the Impact: Germany as an Example...........................................18
1.2.11.2 Producers: Transforming Production Processes and Systems......................... 19
1.2.11.3 Manufacturing-System Suppliers: Meeting New Demands and Defining
New Standards................................................................................................. 21
1
2 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLES
1.1 Introduction
Industry 4.0 is one of the most frequently discussed topics among practitioners and academics today.
For example, the German federal government announced Industry 4.0 as one of the key initiatives of its
high-tech strategy in 2011 (Kagermann et al., 2013). Since then, numerous academic publications, practi-
cal articles and conferences have focused on the topic (Hermann et al., 2015).
The fascination for Industry 4.0 is twofold. First, for the first time, an industrial revolution has been
predicted a priori, not observed ex-post (Drath, 2014). This provides opportunities for companies and
research institutes to actively shape the future. Second, the economic impact of this industrial revolu-
tion is supposed to be huge, as Industry 4.0 promises substantially increased operational effectiveness
as well as the development of entirely new business models, services and products (Kagermann et al.,
2013; Kagermann et al., 2014; Kempf et al., 2014). A recent study has estimated that these benefits will
have contributed as much as 78 billion euros to the German GDP by the year 2025 (Bauer et al., 2014).
Germany will not be the sole country to profit; similar benefits are expected throughout the world.
With Industry 4.0 becoming a top priority for many research centers, universities and companies within
the past three years, the manifold contributions from academics and practitioners have made the mean-
ing of the term more blurry than concrete (Bauernhansl et al., 2014). Even the key promoters of the idea,
the “Industry 4.0 Working Group” and the “Plattform Industry 4.0,” only describe the vision, the basic
technologies the idea aims at and selected scenarios (Kagermann et al., 2013). They do not provide a
clear definition. As a result, a generally accepted definition of Industry 4.0 has not been published to date
(Bauer et al., 2014).
According to Jasperneite et al. (2012), scientific research is always impeded if clear definitions are
lacking, as any theoretical study requires a sound conceptual and terminological foundation. Companies
also face difficulties when trying to develop ideas or take action, but are not sure what exactly for. “Even
though Industry 4.0 is one of the most frequently discussed topics these days, I could not explain to
my son what it really means,” a production site manager with automotive manufacturer Audi puts it.
This comment reflects the finding of a recent study that “most companies in Germany do not have a
clear understanding of what Industry 4.0 is and what it will look like” (eco—Verband der deutschen
Internetwirschaft, 2014).
4 Handbook of Industry 4.0 and SMART Systems
As the term is unclear, companies are struggling when it comes to identifying and implementing
Industry 4.0 scenarios. Design principles explicitly address this issue by providing a “systemization of
knowledge” (Gregor et al., 2009) and describing the constituents of a phenomenon. In this way, design
principles support practitioners by developing appropriate solutions. From an academic perspective,
design principles are the foundation of design theory (Gregor et al., 2002). However, we could not find
any explicit Industry 4.0 design principles during our search of the literature (Hermann et al., 2015).
This chapter aims to fill this gap in the research. Based on a literature review, it provides a definition
of Industry 4.0 and identifies six design principles that companies should consider when implementing
Industry 4.0 solutions (Hermann et al., 2015).
Horizontal integration across the entire value creation network includes cross-company and internal
company intelligent cross-linking and digitalization of value creation modules throughout the value
chain of a product life cycle and between value chains of adjoining product life cycles.
End-to-end engineering across the entire product life cycle refers to intelligent cross-linking and digi-
talization throughout all phases of a product life cycle, from the raw material acquisition to manufactur-
ing, product use, and product end of life.
Vertical integration and networked manufacturing systems include the intelligent cross-linking and
digitalization within the different aggregation and hierarchical levels of a value creation module from
manufacturing stations via manufacturing cells, lines and factories, also integrating the associated value
chain activities, such as marketing and sales or technology development (Acatech, 2015).
Intelligent cross-linking and digitalization covers the application of an end-to-end solution using infor-
mation and communication technologies (ICTs) embedded in the cloud (Stock and Seliger, 2016).
In a manufacturing system, intelligent cross-linking is realized by the application of CPS operating in
a self-organized and decentralized manner (Acatech, 2015; Gausemeier et al., 2015; Spath et al., 2013).
They are based on embedded mechatronic components, i.e., applied sensor systems for collecting data,
as well as actuator systems for influencing physical processes (Gausemeier et al., 2015). Cyber-physical
systems are intelligently linked with each other and are continuously interchanging data via virtual
networks such as the cloud in real-time. The cloud itself is implemented in the Internet of Things (IoT)
and services (Acatech, 2015). As part of a sociotechnical system, CPS use human–machine interfaces to
interact with operators (Hirsch-Kreinsen and Weyer, 2014).
that are already being delivered and in use can send data to the manufacturer. By using these
data, the manufacturer can improve his or her products and offer the customer novel services.
• Optimized logistics: Algorithms can calculate ideal delivery routes; machines indepen-
dently report when they need new material—smart networking enables an optimal flow
of goods.
• Use of data: Data on the production process and the condition of a product can be combined and
analyzed. Data analysis will provide guidance on how to make a product more efficiently. More
importantly, there is a foundation for completely new business models and services. For exam-
ple, lift manufacturers can offer their customers “predictive maintenance”: elevators equipped
with sensors that continuously send data about their condition. Product wear can be detected
and corrected before it leads to an elevator system failure.
• Resource-efficient circular economy: The entire life cycle of a product can be considered with
the support of data. The design phase will be able to determine which materials can be recycled
(Plattform Industrie 4.0).
adapt to challenging work environments (Schmitt et al., 2013). As the most flexible entity in production
systems, workers will be faced with a variety of jobs, ranging from specification and monitoring to ver-
ification of production strategies. By the same token, they will manually intervene in the autonomously
organized production system, if required. Optimum support can be provided by mobile, context-
sensitive user interfaces and user-focused assistance systems (Gorecky et al., 2014). Established inter-
action technologies offer forward-looking solutions, including some from the consumer goods market
(e.g., tablets, smart glasses and smart watches). Of course the latter need to be adapted to industrial
conditions. Through technological support, workers can realize their full potential, thereby becoming
strategic decision-makers and fl exible problem solvers capable to handle the steadily rising technical
complexity (Weyer et al., 2015).
• Digital workpieces
Each workpiece knows the dimensions, quality requirements and order of its own processing.
• Intelligent machines
Intelligent machines communicate simultaneously with the production control system and the
workpiece being processed, so that the machine coordinates, controls and optimizes itself.
• Vertical network connections
After processing the customer’s unique specifications for the product to be manufactured, the
production control system forward automated rules to the equipment. Essentially, the products
control their own manufacturing process, as they communicate with the equipment, devices
and other workpieces on the conditions of production.
• Horizontal network connections
Communication is realized not only within one factory, but throughout the whole supply chain,
between the suppliers, manufacturers and service providers. The main purpose is to enhance
the efficiency of production and to utilize the resources in a more economical way.
• Smart workpieces
The product to be manufactured senses the production environment with internal sensors and
controls and monitors its own production process to meet the production standards; it can do
so because it can communicate with the equipment, as well as with the components already
incorporated or about to be incorporated.
8 Handbook of Industry 4.0 and SMART Systems
Industry 4.0 is not a future technology. In July 2015, the Changing Precision Technology Company
(in Dongguan, China) became the first factory where only robots work. Each labor process is exe-
cuted by machines: production is done by computer-operated robots and transport is implemented
by self-driven vehicles; even the storage process is completely automatic (Gubán and Kovás, 2017).
Autonomous
Robots
System
Cybersecurity
integraon
Cloud Addive
compung manufacturing
FIGURE 1.1 Main technologies of Industry 4.0. (From Rübmann, M. et al., Industry 4.0: The Future of Productivity and
Growth in Manufacturing Industries, The Boston Consulting Group (BCG), 2015.)
Fundamentals of Industry 4.0 9
Autonomous
Big data and Robots
analy
cs
Simula
on
INDUSTRY 4.0
Addi
ve The Industrial
manufacturing Internet of Things
FIGURE 1.2 Nine advances transforming industrial production. (From Rübmann, M. et al., Industry 4.0: The Future of
Productivity and Growth in Manufacturing Industries, The Boston Consulting Group (BCG), 2015.)
technology: big data and analytics; autonomous robots, simulation, horizontal and vertical system inte-
gration, the Industrial IoT, cybersecurity, the cloud, additive manufacturing and augmented reality (see
Figure 1.2). In this transformation, sensors, machines, workpieces and IT systems are connected along
the value chain beyond a single enterprise. These connected systems (also called CPS) can interact with
one another using standard Internet-based protocols. They can analyze data to predict failure, config-
ure themselves and adapt to changes. Industry 4.0 will make it possible to gather and analyze data across
machines, enabling faster, more flexible and more efficient processes to produce high-quality goods at
reduced costs. This, in turn, will increase manufacturing productivity, shift economics, foster industrial
growth and modify the profile of the workforce, ultimately changing the competitiveness of companies
and regions (Rübmann et al., 2015).
Many of the nine advances in technology are already used in manufacturing, but with Industry 4.0,
they will totally transform production: isolated, optimized cells will come together as a fully integrated,
automated and optimized production flow, leading to greater efficiency and changing traditional produc-
tion relationships among suppliers, producers and customers, as well as between human and machine
(see Figure 1.3) (Rübmann et al., 2015).
Automated
Automated
Automated
Automated Automated
FIGURE 1.3 Industry 4.0 is changing traditional manufacturing relationships. (From Rübmann, M. et al., Industry 4.0: The Future of Productivity and Growth in Manufacturing
Industries, The Boston Consulting Group (BCG), 2015.)
Handbook of Industry 4.0 and SMART Systems
Fundamentals of Industry 4.0 11
1.2.6.3 Simulation
In the engineering phase of production, three-dimensional (3-D) simulations of products, materials and
production processes are already used, but in the future, simulations will be used more extensively in
plant operations as well. These simulations will leverage real-time data to mirror the physical world in
a virtual model, which can include machines, products and humans. This will allow operators to test
and optimize the machine settings for the next product in line in the virtual world before the physical
changeover, thereby reducing machine setup times and increasing quality.
For example, Siemens and a German machine-tool vendor developed a virtual machine that can simu-
late the machining of parts using data from the physical machine. This lowers the setup time for the
actual machining process by as much as 80% (Rübmann et al., 2015).
1.2.6.6 Cybersecurity
Many companies still rely on unconnected or closed management and production systems. With the
increased connectivity and the use of the standard communications protocols accompanying Industry
4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats
increases dramatically. As a result, secure, reliable communications, as well as sophisticated identity and
access management of machines and users, are essential.
Several industrial-equipment vendors have joined forces with cybersecurity companies through part-
nerships or acquisitions (Rübmann et al., 2015).
1.2.6.7 The Cloud
Companies are already using cloud-based software for some enterprise and analytics applications, but
with Industry 4.0, more production-related undertakings will require increased data sharing across sites
and company boundaries. At the same time, the performance of cloud technologies will improve, achiev-
ing reaction times of just several milliseconds. As a result, machine data and functionality will increas-
ingly be deployed in the cloud, enabling more data-driven services for production systems. Even systems
that monitor and control processes may become cloud-based.
Vendors of manufacturing execution systems have started to offer cloud-based solutions (Rübmann
et al., 2015).
Smart Logiscs
Smart Factory
Manufacturing
Mining
Consumer
Renewable Energies
FIGURE 1.4 Macro perspective of Industry 4.0. (From Stock, T. and Seliger, G., Opportunities of Sustainable
Manufacturing in Industry 4.0. 13th Global Conference on Sustainable Manufacturing—Decoupling Growth from
Resource Use, Institute of Machine Tools and Factory Management, Technische Universität Berlin, 10587 Berlin, Germany.
2212–8271© 2016 The Authors. Published by Elsevier B.V, 2016.)
From the macro perspective, horizontal integration is characterized by a network of value cre-
ation modules. Value creation modules are defined as the interplay of different value creation factors,
i.e., equipment, human, organization, process and product (Seliger et al., 2007). The value creation
modules, represented in their highest level of aggregation by factories, are cross-linked throughout
the complete value chain of a product life cycle, as well as with the value creation modules in value
chains of adjoining product life cycles. This linkage results in an intelligent network of value creation
modules covering the value chains of different product life cycles. This intelligent network provides
an environment for new and innovative business models and is thus leading to a change in business
models.
As shown in Figure 1.4, end-to-end engineering from the macro perspective is the cross-linking of
stakeholders, products and equipment along the product life cycle, beginning with the raw material acqui-
sition phase and ending with the end-of-life phase. The products, the various stakeholders such as cus-
tomers, workers or suppliers, and the manufacturing equipment are embedded in a virtual network and
are interchanging data in and between the phases of a product life cycle. This life cycle consists of the
raw material acquisition phase, the manufacturing phase—containing the product development, the engi-
neering of the related manufacturing system and the manufacturing of the product—the use and service
phase, the end-of-life phase—containing reuse, remanufacturing, recycling, recovery and disposal—and
the transport between all phases.
These value creation modules, i.e., factories embedded in this ubiquitous flow of smart data, will
evolve to become smart factories. Smart factories are already manufacturing smart products and are
being supplied with energy from smart grids and with water from freshwater reservoirs. The material
flow along the product life cycle and between adjoining product life cycles will be accomplished by
smart logistics. The stream of smart data between the various elements of the value creation networks is
interchanged via the cloud (Stock and Seliger, 2016).
Smart data are created by expediently structuring information from big data; smart data can be used
for knowledge advances and decision-making throughout the product life cycle (Smart Data Innovation
14 Handbook of Industry 4.0 and SMART Systems
Lab., 2015). When smart factories use embedded CPS for value creation, the smart product can self-
organize its required manufacturing processes and its flow throughout the factory in a decentralized
manner by interchanging smart data with the CPS (Kletti et al., 2015).
A smart product contains information on its requirements for the manufacturing processes and manu-
facturing equipment. Smart logistics use CPS to support the material flow within the factory and between
factories, customers and other stakeholders. They are controlled in a decentralized manner according to
the requirements of the product. A smart grid using renewable energies dynamically matches the energy
generation of suppliers with the energy demand of consumers, e.g., smart factories or smart homes, by
using short-term energy storages for buffering. Within a smart grid, energy consumers and suppliers can
be the same (Stock and Seliger, 2016).
Smart Factory
Consumer
Smart Grid
Outbound
Logiscs
Renewable Final
Water Energies Product
Reservoir
Cloud Service
Procurement
Technology Human
Development
Human Resource
Management
Infrastructure
FIGURE 1.5 Micro perspective of Industry 4.0. (From Stock, T., and Seliger G., Opportunities of Sustainable
Manufacturing in Industry 4.0. 13th Global Conference on Sustainable Manufacturing—Decoupling Growth from
Resource Use, Institute of Machine Tools and Factory Management, Technische Universität Berlin, 10587 Berlin, Germany.
2212–8271© 2016 The Authors. Published by Elsevier B.V, 2016.)
Fundamentals of Industry 4.0 15
From the micro perspective, horizontal integration is characterized by cross-linked value creation
modules along the material flow of the smart factory and smart logistics. The in- and outbound
logistics to and from factories will be characterized by transport equipment able to agilely react
to unforeseen events, such as a change in traffic or weather, and to autonomously operate between
the starting point and the destination. The autonomously operating transport equipment such as
automated guided vehicles (AGVs) will be used for in-house transport along the material flow. All
transport equipment will interchange smart data with the value creation modules to achieve the
decentralized coordination of supplies and products with the transport systems. For this purpose,
the supplies and products will contain identification systems, e.g., radio-frequency identification
(RFID) chips or QR codes, to enable a wireless identification and localization of all materials in the
value chain (Stock and Seliger, 2016).
From the macro perspective, vertical integration requires the intelligent cross-linking of value creation
factors, including products, equipment and humans, along the various aggregation levels of the value
creation modules, from manufacturing stations via manufacturing cells, to manufacturing lines, up to the
level of the smart factory. This networking throughout the aggregation levels includes the cross-linking
of the value creation modules with the different value chain activities, e.g., marketing and sales, service,
procurement and so on. (Porter 2015).
The value creation module in a factory refers to an embedded CPS. The manufacturing equipment,
e.g., machine tools or assembly tools, use sensor systems to identify and localize the value creation fac-
tors, such as the products or the humans, and to monitor the manufacturing processes, e.g., the cutting,
assembly or transport processes. Depending on the monitored smart data, the applied actuators in the
manufacturing equipment can react in real time on specific changes in products, humans or processes.
The communication and the exchange of the smart data between the value creation factors, between the
value creation module and the transport equipment and between the different levels of aggregation and
value chain activities are executed via the cloud.
Table 1.1 provides an overview of the main trends and expected development in the value creation fac-
tors of Industry 4.0 (Stock and Seliger, 2016).
TABLE 1.1
Trends and Expected Developments in Value Creation Factors
Equipment Manufacturing equipment will be characterized by the application of highly automated machine
tools and robots. The equipment will be able to flexibly adapt to changes in the other value
creation factors; for example, robots will work together collaboratively with human workers
on joint tasks (Kagermann et al., 2015).
Human Jobs in manufacturing sectors are likely to become automated (Frey and Osborne, 2013). The numbers
of workers will thus decrease. The remaining manufacturing jobs will contain more knowledge work
and more short-term and hard-to-plan tasks (Spath et al., 2013). Workers increasingly have to monitor
automated equipment, are being integrated in decentralized decision-making, and are participating in
engineering activities as part of the end-to-end engineering.
Organization The increasing organizational complexity in the manufacturing system cannot be managed centrally
from a certain point. Decision-making will thus become decentralized. Decision-making will
autonomously incorporate local information (Kletti et al., 2015). The decision itself will be made
by the workers or by the equipment using methods from artificial intelligence.
Process Additive manufacturing technologies, also known as 3-D printing, will be increasingly deployed in
value creation processes, as the costs of additive manufacturing are rapidly dropping and speed and
precision are simultaneously increasing (Hagel III et al., 2015). This allows designing more
complex, stronger, and more lightweight geometries and the application of additive manufacturing
to higher quantities and larger scales of the product (Hagel III et al., 2015).
Product Products will be manufactured in a batch size according to the individual requirements of the
customer (Acatech 2015). This mass customization of the product integrates the customer as
early as possible in the value chain. The physical product will also be combined with new
services offering functionality and access rather than product ownership to the customer as
part of new business models (Hagel III et al., 2015).
Source: Stock, T. and Seliger, G., Opportunities of Sustainable Manufacturing in Industry 4.0, 13th Global Conference on
Sustainable Manufacturing—Decoupling Growth from Resource Use, Institute of Machine Tools and Factory
Management, Technische Universität Berlin, 10587 Berlin, Germany. 2212–8271© 2016 The Authors. Published
by Elsevier B.V, 2016.
Therefore, the IoT can be defined as a network in which CPS cooperate with each other through unique
addressing schemas. Application examples of the IoT include smart factories, smart homes, and smart
grids (Bauernhansl et al., 2014).
1.2.10.1 Interoperability
Interoperability is a very important enabler of Industry 4.0. Interoperability means all CPS within a plant
(workpiece carriers, assembly station and products) are able to communicate with each other “through
open nets and semantic descriptions” (Hermann et al., 2015).
TABLE 1.2
Design Principles of Each Industry 4.0 Component
Cyber-Physical Internet Internet Smart
Systems of Things of Services Factory
Interoperability X X X X
Virtualization X — — X
Decentralization X — — X
Real-time capability — — — X
Service orientation — — X —
Modularity — — X —
Source: Hermann, M. et al., Design Principles for Industrie 4.0 Scenarios: A Literature Review,
Technische Universität Dortmund. Fakultät Maschinenbau, Audi Stiftungslehrstuhl
Supply Net Order Management, Working Paper No. 01/2015, 2015.
18 Handbook of Industry 4.0 and SMART Systems
1.2.10.2 Virtualization
Through virtualization, CPS are able to monitor physical processes. Sensor data are linked to virtual
plant models and simulation models, creating a virtual copy of the physical world. In the SmartFactoryKL
plant, the virtual model includes the condition of all CPS. In the case of failure, a human can be noti-
fied. In addition, all necessary information, such as the next working steps or safety arrangements, is
provided (Gorecky et al., 2014). Thus, humans are supported in handling the rising technical complexity
(Hermann et al., 2015).
1.2.10.3 Decentralization
The rising demand for individual products makes it increasingly difficult to control systems centrally.
Embedded computers enable CPS to make decisions on their own. Only in cases of failure are tasks
delegated to a higher level (Hompel and Otto, 2014). Nevertheless, for quality assurance and traceability,
it is necessary to keep track of the whole system at all times. In the context of the SmartFactoryKL, plant
decentralization means the RFID tags “tell” machines which working steps are necessary. Therefore,
central planning and controlling are no longer needed (Schlick et al., 2014).
1.2.10.6 Modularity
Modular systems can flexibly adapt to changing requirements by replacing or expanding individual
modules. Therefore, modular systems can be easily adjusted to accommodate seasonal fluctuations
or changed product characteristics. In the SmartFactoryKL plant, new modules can be added using the
Plug&Play principle. Based on standardized software and hardware interfaces (Schlick et al., 2014), new
modules are identified automatically and can be utilized immediately via the IoS (Hermann et al., 2015).
• Productivity. During the next 5–10 years, Industry 4.0 will be embraced by more compa-
nies, boosting productivity across all German manufacturing sectors by €90–€150 billion.
Productivity improvements on conversion costs, which exclude the cost of materials, will range
Fundamentals of Industry 4.0 19
from 15% to 25%. When the materials costs are factored in, productivity gains of 5%–8% will
be achieved. These improvements will vary by industry. Industrial component manufacturers
stand to achieve some of the largest productivity improvements (e.g., 20%–30%), and automo-
tive companies can expect increases of 10%–20% (see Figure 1.6).
• Revenue Growth. Industry 4.0 will also drive revenue growth. Manufacturers’ demand for
enhanced equipment and new data applications, as well as consumer demand for a wider vari-
ety of increasingly customized products, will drive additional revenue growth of approximately
€30 billion a year, or roughly 1% of Germany’s GDP.
• Employment. In our analysis of Industry 4.0’s impact on German manufacturing, we found
that the growth it stimulates will lead to a 6% increase in employment during the next 10 years
(see Figure 1.7). The demand for employees in the mechanical engineering sector may also
rise even more—by as much as 10% during the same period. However, different skills will be
required. In the short term, the trend toward greater automation will displace some of the often
low-skilled laborers who perform simple, repetitive tasks. At the same time, the growing use of
software, connectivity and analytics will increase the demand for employees with competen-
cies in software development and IT technologies, such as mechatronics experts with software
skills. (Mechatronics is a field of engineering that comprises multiple engineering disciplines.)
This competency transformation is one of the key challenges ahead.
• Investment. Adapting production processes to incorporate Industry 4.0 will require that
German producers invest approximately €250 billion during the next 10 years (approximately
1%–1.5% of manufacturers’ revenues).
The estimated benefits in Germany illustrate the potential impact of Industry 4.0 on manufacturing
globally. Industry 4.0 will have a direct effect on producers and their labor force and on companies that
supply manufacturing systems (Rübmann et al., 2015).
• Along the value chain, production processes will be optimized by the use of integrated IT
systems. Today’s insular manufacturing cells will be replaced by fully automated, integrated
production lines.
• Products, production processes and production automation will be designed and commis-
sioned virtually in one integrated process through the collaboration of producers and suppliers.
Physical prototypes will be reduced to an absolute minimum.
• Manufacturing processes will increase in flexibility and allow the economical production of
small lot sizes. Robots, smart machines and smart products that communicate with one another
and make certain autonomous decisions will provide this flexibility.
• Manufacturing processes will be enhanced through learning and self-optimizing pieces of
equipment that will, e.g., adjust their own parameters, as they sense certain properties of the
unfinished product.
• Automated logistics using autonomous vehicles and robots will adjust automatically to produc-
tion needs.
Industry 4.0 allows a faster response to customer needs than it is possible today. It improves the flexibil-
ity, speed, productivity and quality of the production process. In addition, it lays the foundation for the
adoption of new business models, production processes and other innovations. This will enable a new
level of mass customization as more industrial producers invest in Industry 4.0 technologies to enhance
and customize their offerings systems (Rübmann et al., 2015).
20
55
10 - 15 4-7
1
25 - 35 9 - 12
Mechanical
Engineering
6
20 - 30 10 - 15
6
20 - 30 4-7
10
20 - 30 5 - 10
22
10 - 20 6-9
FIGURE 1.6 In Germany, Industry 4.0 will generate significant productivity gains. (From Rübmann, M. et al., Industry 4.0: The Future of Productivity and Growth in Manufacturing
Industries, The Boston Consulting Group (BCG). 2015.)
Handbook of Industry 4.0 and SMART Systems
Fundamentals of Industry 4.0 21
Thounsands of employees
Mechanical
0.9
Engineering 6,400
Food and
0.7
beverage 6,300
Automove 0.2 15
50 22
Other 0.6 6,200
95
6,100
6,060
0
FIGURE 1.7 In Germany, Industry 4.0 will lead to increased manufacturing employment. (From Rübmann, M. et al.,
Industry 4.0: The Future of Productivity and Growth in Manufacturing Industries, The Boston Consulting Group (BCG).
2015.)
benefit from a higher degree of flexibility, as this will generate productivity gains, e.g., and industries
that demand high quality, such as semiconductors and pharmaceuticals, will benefit from data-
analytics-driven improvements that reduce error rates.
Countries with high-cost skilled labor will be able to capitalize on the higher degree of automation
combined with the increased demand for more highly skilled labor. However, many emerging markets
with a young, technology-savvy workforce might jump at the opportunity to create entirely new manu-
facturing concepts.
To actively shape the transformation, producers and system suppliers must take decisive action to
embrace the nine pillars of technological advancement mentioned earlier. They must also address the
need to adapt to the appropriate infrastructure and education (Rübmann et al., 2015).
• Identify key areas for improvement, such as flexibility, speed, productivity and quality. Then,
consider how the nine pillars of technological advancement can drive improvement in the des-
ignated areas. Avoid getting stuck in incremental approaches; instead, consider more funda-
mental changes enabled by a combination of the nine technologies.
• Analyze the long-term impact on the workforce and conduct strategic workforce planning.
Adapt roles, recruiting, and vocational training to prepare the workforce with the additional IT
skills that will be required.
While these improvements already hold significant potential for existing industries, emerging fields
could use Industry 4.0 technology to dislodge existing standards using innovative factory layouts and
production processes (Rübmann et al., 2015).
• Define which business model to leverage for their enhanced or new offers.
• Build the technological foundation, such as the tool base for analytics.
• Build the right organization structure and capabilities.
• Develop partnerships in the digital world.
• Participate in and shape technological standardization.
In parallel, system suppliers need to build a scenario-based vision of the long-term industry evolution and
ensure that their strategy will prepare them for the most likely scenarios (Rübmann et al., 2015).
• Adapt school curricula, training and university programs and strengthen entrepreneurial
approaches to increase the IT-related skills and innovation abilities of the workforce.
Industry 4.0 presents tremendous opportunities for innovative producers, system suppliers and entire
regions. However, as with previous transformational developments, Industry 4.0 poses a severe threat to
laggards. As business models, economics and skill requirements shift, we could well see major changes
in top positions, at both company and regional levels (Rübmann et al., 2015).
1. Digitization and integration of networks, both simple technical-economic ones and complex
technical-economic ones,
2. Digitization of products and services and
3. New market models.
These activities are interconnected by communication systems, including IoT, IoS and Internet of People.
Because of these technologies, entities will be able to communicate with each other and utilize data from
the production owner during the entire life cycle of systems, while also removing borders between enter-
prises and countries. All entities throughout the whole production-market network will have relevant
data. For example, producers will be able to draw on features of very modern components even in the
design and testing phase.
The digitization of industrial production will create new digital market models. For example, on the
basis of the data accessible in the cloud, users will be able to predict a shutdown of production of some
of production entities.
To achieve this complex production-market network, a number of German firms—the leading country
in Industry 4.0 activities and ideas—developed and published Reference Architecture Model Industry
4.0 (RAMI 4.0). Because of the abovementioned three interconnected factors, RAMI 4.0 includes a 3-D
graphical model (Zezulka et al., 2016).
Value Stream
IEC 62890
Layers
Business
Funconal
Informaonal
Communicaonal
Integraon
Asset
Maintenance Maintenance
Development Producon
/ Usage / Usage
Type Instance
FIGURE 1.8 RAMI 4.0 model. (From VDI/VDE-GMA (Gesellschaft Messund Automatisierungstechnik), Statusreport:
Industrie 4.0—Technical Assets Basic terminology concepts, life cycles and administration models, 2016.)
The right-hand side of the horizontal axis describes the function of the components in the Industry 4.0.
Only the function of the components is specified, there is no specification for implementation. The axis
follows both IEC 6224 and the 61512 standards. However, the IEC 6224 and the 61512 standards are
intended for components in one enterprise or work unit only. Therefore, the highest level on this side is
the Connected world (Zezulka et al., 2016).
• Information Layer
This layer provides run time for preprocessing events and executing event-related rules. It enables
formal description of the rules and event pre-processing. Other functions include ensuring data
integrity, consistent integration of different data, obtaining new, higher quality data (data, infor-
mation, knowledge) and providing structured data by means of service interfaces. It also receives
events and transforms them to match the data available for the higher layer.
• Functional Layer
This layer enables formal descriptions of functions and creates a platform for horizontal integra-
tion of various functions. It contains a modeling environment for services supporting business
processes and a run time environment for applications and technical functionality. Rules and
decision-making logic are generated in the Functional Layer. Some users apply to lower layers
as well, but remote access and horizontal integration can occur only within the Functional layer
because of the need for data integrity.
• Business Layer
This layer ensures the integrity of functions in the value stream, thus enabling mapping busi-
ness models and the overall process. It follows legal and regulatory framework conditions and
enables modeling of the rules that the system has to follow. It also creates a link among differ-
ent business processes.
Area
Work
Centers Process cell Producon Unit Producon Line Storage zone
Work Equipment
Unit Unit Work cell Storage unit
Units
Equipment used
Equipment Equipment
Staon for storage or
Module Module
movent
Field Device
Enhancement Industrie 4.0
Product
The most important feature is the ability for virtual objects and processes to communicate with real
objects and processes of production. Any component of an Industry 4.0 system can take an electronic
container (shell) of secured data during the entire life cycle of a product. The data are available to all
entities in the technical-production chain (Zezulka et al., 2016).
This model offers standardized, secure and safe real-time communication among all production com-
ponents. The electronic container (shell) of data and the Industry 4.0 component model are shown in
Figure 1.10 (VDI/VDE-GMA, 2015b).
1. An entire machine can become an Industry 4.0 component as a result of its control system (e.g.,
programmable logic controller ([PLC]). This is done, e.g., by the producer and PLC integrator.
2. A strategically important assembly from a supplier can be regarded as an Industry 4.0 compo-
nent and registered separately as an asset management and maintenance system. This can be
done by the component manufacturer.
3. A terminal block can also be considered an Industry 4.0 component, as it may be important to
keep it up to date throughout the life cycle. This can be implemented by an electrical engineer.
4. The software can represent an important asset in the production equipment. Such software
could be a required standard for large sets of machines. The supplier may also wish to sell
extended functions for his or her products separately.
The Industry 4.0 component model has the following requirements (VDI/VDE-GMA, 2015a):
1. A network of Industry 4.0 components must be structured in such a way that connections
between any end points (i.e., Industry 4.0 components) are possible. The Industry 4.0 compo-
nents and their contents must follow a common model.
2. It must be possible to define the concept of an Industry 4.0 component in such a way that it can
meet requirements in different areas, i.e., office floor and shop floor.
3. The Industry 4.0 communication must perform in such a way that the data of a virtual represen-
tation of an Industry 4.0 component can be kept either in the object itself or in a (higher level)
IT system.
As mentioned above, for Industry 4.0 systems, communication is a high priority. Therefore, if the properties
of an Industry 4.0 component are to be made available, at least one information system must be connected
with the object. This requires at least passive communication by the object; this means an object does
not necessarily have to have the ability to carry out Industry 4.0 compliant communication as set out by the
GMA Technical Committee 7.21. Rather, the object can be extended to constitute Industry 4.0 components.
In this way, e.g., a Profinet device can become an Industry 4.0 component (VDI/VDE-GMA, 2015a).
The second priority of Industry 4.0 is virtual representation. This occurs in the information layer of
the RAMI 4.0 model. Virtual representation contains data of the object (thing). These data can either be
kept in the Industry 4.0 component itself and made available to the outside world by Industry 4.0 compli-
ant communication or be stored in an IT system, which makes them available to the outside world by
Industry 4.0 compliant communication. One important part of the virtual representation is the “manifest.”
The manifest is a directory of the individual data contents of the virtual representation. It contains meta-
information. It also contains necessary data on the Industry 4.0 component. Further data in the virtual
representation include those on individual life cycle phases, e.g., CAD data, terminal diagrams or manu-
als. A schematic of the Industry 4.0 component is shown in Figure 1.11 (Umsetyungsstrategie Industrie
4.0: Ergebnisbericht der Plattform Industrie 4.0., 2015).
The virtual representation of an object has to be data-structured. Therefore, the administrative shell
of any Industry 4.0 component should contain specific information expressed in a proper Industry 4.0
vocabulary and in an Industry 4.0 format. Depending on the purpose, the Industry 4.0 component can
have more than one administrative shell.
I4.0 components
Thing
Thing
FIGURE 1.11 Industry 4.0 component. (From Umsetyungsstrategie Industrie 4.0: Ergebnisbericht der Plattform
Industrie 4.0., 2015.)
Fundamentals of Industry 4.0 29
Maintenance/ Maintenance/
Producon Design
Usage Usage
Instance Type
Repository
Access to data and funcon
Shopfloor
Idenficaon
FIGURE 1.12 Repository of the digital factory. (From Umsetyungsstrategie Industrie 4.0: Ergebnisbericht der Plattform
Industrie 4.0., 2015.)
It is important to note that an Industry 4.0 component can have a technical function. It can be, e.g., soft-
ware for local planning in connection with the object (thing), software for project planning, configuration,
operator control and services. It can also contain value added to the object and further technical functions.
The technical function is in the functional layer of the RAMI 4.0 model. Figure 1.12 shows the deploy-
ment of Industry 4.0 components in the future digital factory. Components are mapped into the repository
based on their administrative shells and their mutual connections. The physical factory is then represented
in a digital form in the repository (digital factory) in administrative shells and their connections (reposi-
tory) by means of dynamic actualization during the life cycle of the factory (Manzei et al., 2016).
The Industry 4.0 components must be able to enter into and initiate all possible cross-connections
within the Industry 4.0 factory.
1.4 Servitization
Industry 4.0 is changing the shape of the manufacturing sector. In Industry 4.0, real and virtual worlds
are merging, with equipment, products, and people increasingly connected via the Internet. These con-
nected systems, of CPS, interact to analyze data, predict failure modes, reconfigure themselves, and
continuously adapt to changes in customer demand. As mentioned at the beginning of the chapter, the
concept of Industry 4.0 first appeared in the German manufacturing sector (Schlaepfer and Koch, 2015)
and is currently used globally.
Another concept making inroads globally is servitization, i.e., the delivery of a service component along
with a product, to add value to that product. It is quickly becoming a business imperative. Industry 4.0 pres-
ents many opportunities for firms who have servitized or are looking to do so (Huxtable and Schaefer, 2016).
ancillary services to products to include the desire of manufacturers to get closer to customers and accom-
modate their underlying needs (Schmenner 2009). Mitchell says the business models of manufactur-
ing firms are changing, with companies adding complementary services to what was already provided,
(Mitchell, 2004). Essentially, companies still offer the same products (although these are evolving), but
with the different business models, these can be commercialized in different ways yielding different
returns. In short, servitization is a strategy embracing a service orientation to satisfy customers’ needs,
to achieve competitive advantages and to enhance the performance of the firm (Ren and Gregory, 2007).
Businesses, governments and academics are showing a growing interest in the development of
service-led strategies, arguably because the servitization shift has important economic implications. It is
associated with activities to create additional value and to develop distinctive competencies and capabili-
ties, both of which might lead to competitive advantages in economies previously based simply on cost
(Baines et al., 2009).
Servitizing firms deliver capabilities to customers to gain a competitive edge (Jacob and Ulaga, 2008).
The goal is not to sell “just” products but to offer solutions to customers (Baines et al., 2007), by integrat-
ing services with the products, creating a bundle (Vandermerwe and Rada, 1988).
Many manufacturing firms have already implemented servitization. Goedkoop identified almost
150 in 1999. A commonly cited example is the Rolls-Royce concept of “TotalCare,” whereby the com-
pany shifted from just selling airplane engines to also offering subsequent services (Neely et al., 2008).
Another is the Xerox offer of “pay per click” scanning, printing and copying (Baines et al., 2013). These
examples (analyzed later in the text), together with many others (see Hilti et al., 2017), indicate the trend
to offer customers “value in use” (Baines et al., 2009). This means offering capabilities to solve the users’
own particular problems (Bureca et al., 2017).
TABLE 1.3
Servitization Definitions
Neely et al. (2008) “The innovation of organizations’ capabilities and processes to better create mutual
value through a shift from selling products to selling product service systems.”
Baines et al. (2009) “Servitization is the concept of manufacturers offering services tightly coupled to
their products.”
Van Looy and Visnjic (2013) “A trend in which manufacturing firms adopt more and more service components
in their offerings.”
Source: Huxtable, J. and Schaefer, D., On Servitization of the Manufacturing Industry in the UK. Changeable, Agile,
Reconfigurable & Virtual Production. Procedia CIRP 52 (2016), 46–51. University of Bath, Bath, BA2 7AY, UK, 2016.
Fundamentals of Industry 4.0 31
perspectives on the world, they are converging toward a common conclusion that manufacturing compa-
nies should be focusing on selling integrated solutions or PSS. A link with servitization is also identified
by Baines et al. (2007); they define PSS as an integrated combination of products and services that deliv-
ers value in use. Although these two bodies of research have developed separately, it currently seems
appropriate to refine the servitization definition to encompass the PSS theme. This leads to the following
definition: servitization represents the changing of an organization’s capabilities and processes to better
create mutual value through a shift from selling products to selling PSS (Baines et al., 2009).
Advanced
Autonomy Cyber Segurity Cloud Big Data
Tesng Equiment as
a service
Machine / Tools as a
service
Monitoring
Safety Services Product focused
Cyber Training
SaaS
Predicve Intermediate
Risk Management Manintenance Services
Autonomous Soware
Informaon Outsourcing
Cyber Segurity Big Data
Packages Consulng
Data re-sell
Automated Base
Services Services
Big Data
Outsourcing
Industry 4.0
FIGURE 1.13 I4 servitization framework. (From Huxtable, J. and Schaefer, D., Procedia CIRP, 52, 46–51, 2016.)
34 Handbook of Industry 4.0 and SMART Systems
Most authors see a PSS as a competitive proposition and refer to the need for customer satisfaction and
economic viability. Many also link PSS with achieving sustainability, but only Manzini et al. (2001)
see this as the ultimate goal. Interestingly, the concept of dematerialization is frequently applied to the
concept of PSS (see Table 1.4).
Fundamentals of Industry 4.0 35
TABLE 1.4
Popular Definitions of a Product-Service System
Goedkoop et al. (1999) “A product-service system is a system of products, services, networks of ‘players’
and supporting infrastructure that continuously strives to be competitive, satisfy
customer needs and have a lower environmental impact than traditional business
models.”
Centre for Sustainable Design “A pre-designed system of products, supporting infrastructure and necessary
(2002) networks that fulfill a user’s needs on the market, have a smaller environmental
impact than separate product and services with the same function fulfillment and
are self-learning.”
Mont et al. (2001) “A system of products, services, supporting networks, and infrastructure that is
designed to be: competitive, satisfy customer needs and have a lower environmental
impact than traditional business models.”
Manzini and Vezolli (2003) “An innovation strategy, shifting the business focus from designing (and selling)
physical products only, to designing (and selling) a system of products and services
which are jointly capable of fulfilling specific client demands.”
Brandstotter (2003) “A PSS consists of tangible products and intangible services, designed
and combined so that they are jointly capable of fulfilling specific
customer needs. Additionally PSS tries to reach the goals of
sustainable development.”
Wong et al. (2004) “Product-Service Systems (PSS) may be defined as a solution offered for sale that
involves both a product and a service element, to deliver the required functionality.”
ELIMA (2005) “A product-service system is defined as a system of products, services, supporting
networks, and infrastructure that is designed to [be]: Competitive, Satisfy customer
needs, & Have a lower environmental impact than traditional business models.”
Source: Baines, T. S. et al., Proc. I. Mech. Eng. B-J. Eng., 221(10), 1543–1552, 2007.
Dematerialization refers to the opportunity offered by a PSS to break the link between value deliv-
ered to the customer or user and the amount of physical material needed to create that value, thus pro-
viding environmental benefits. While this is often stated as an important aim by PSS practitioners and
researchers, the term seldom appears in definitions. Accordingly, Baines et al. (2007) offer the following
definition:
“A PSS is an integrated product and service offering that delivers value in use. A PSS offers the
opportunity to decouple economic success from material consumption and hence reduce the
environmental impact of economic activity. The PSS logic is premised on utilizing the knowl-
edge of the designer manufacturer to both increase value as an output and decrease material and
other costs as an input to a system” (Baines et al., 2007).
Product
Service System
Product(s) Service(s)
and and
Service(s) Product(s)
Product(s) Service(s)
FIGURE 1.14 Evolution of the product-service system concept. (From Baines, T.S. et al., Proc. I. Mech. Eng. B J Eng.
221(10), 1543–1552, 2007.)
customer seeks only to use the asset, to do so, he or she must first purchase the equipment (asset), and
then monitor performance, arrange servicing, and take responsibility for equipment disposal. In short,
the responsibilities of ownership lie with the customer.
With a PSS, asset ownership is not transferred to the customer (Figure 1.15b). In the case of the photo-
copier, the manufacturer will typically provide “a document management solution.” Then, the manufac-
turer, rather than the customer, will select and provide the equipment, monitor performance, and carry
out servicing and disposal. In return, the manufacturer receives payment as the customer uses the printing
capability.
Although different authors use different labels and different subdivisions, there is some convergence
in their ideas. As highlighted by Manzini and Vezolli (2003), Manzini et al. (2001), Mont (2002) and
ELIMA (2005), authors tend to agree on the existence of three types of PSS (see Figure 1.16):
1. Product-oriented PSS: promoting or selling the product in a traditional manner, while including
in the original act of sale additional services such as after-sales service to guarantee function-
ality and durability of the product owned by the customer (maintenance, repair, re-use, and
recycling, and helping customers optimize the application of a product through training and
consulting). The company is motivated to introduce a PSS to minimize costs for a long-lasting,
well-functioning product and to design products to take account of product end-of-life (reusable
or easily replaceable or recyclable parts).
2. Use-oriented PSS: selling the use or availability of a product that is not owned by the customer
(e.g., leasing, sharing). In this case, the company is motivated to create a PSS to maximize the
use of the product needed to meet demand and to extend the life of the product and materials
used to produce it.
3. Result-oriented PSS: selling a result or capability instead of a product. Companies offer a cus-
tomized mix of services where the producer maintains ownership of the product and the cus-
tomer pays only for the provision of agreed results.
All three types satisfy customer needs by combining products and services systemized to deliver the
desired utility or function. However, the results-orientated model is more sophisticated and represents
the most popular interpretation of the features of a PSS (Baines et al., 2007).
Fundamentals of Industry 4.0 37
Use Cash
Cash Technology
Monitor Service
Consumables
Selec
on & disposal
(a)
Use Cash
Disposal
Service
(b) Monitor
Cash Consumables
Technology
FIGURE 1.15 (a) Traditional purchase of photocopier; (b) purchase of a document management capability. (From Baines,
T.S. et al., Proc. I. Mech. Eng. B J Eng., 221, 1543–1552, 2007.)
Product content
Value mainly in (tangible
tangible)) Value mainly in
service content Service content product content
(intangible)
intangible)
SERVITIZATION SHIFT
FIGURE 1.16 Product-service systems. (From Tukker, A., Bus. Strat. Env., 13, 246–260, 2004.)
Use-oriented PSS are aimed at offering the maximum possible availability of the product to sell its
effective use rather than its property rights (Baines et al., 2007). Hence, unlike PoPSS, the ownership
of the product is not transferred to the customer, but is retained by the firm. They are a sort of
“pay-as-you-go” or “spend-when-you-use” applications, in which, following Tukker (2004), the product
might be leased, shared, rented or pooled between different users. An example is Hilti’s “Total Fleet
Management” offer (Hilti, 2017), which is about renting—instead of selling—all the tools necessary for
many applications in the construction industry, ensuring their availability, functioning and maintenance.
Repair
FIGURE 1.17 PSS exemplification. (From Tukker, A., Bus. Strat. Env., 13, 246–260, 2004.)
Such efforts lead to increased efficiency in resource use, the optimized use of assets, and decreased
waste and pollution (Goedkoop et al., 1999; Manzini et al., 2001; Oman et al., 2003; Baines et al., 2007).
Benefits accrue not only to the producer and customer, but also to the society and the environment (Mont
et al., 2002).
Value Added
Aer sales
R&D services
High High
marning marning
Assembly
Low marning
Low
Upstream Downstream Value Chain
SERVITIZATION SHIFT
FIGURE 1.18 Smiling curve in a servitization perspective. (From Bureca, A., The Role of the Internet of Things from
A Servitization Perspective, Opportunities and challenges for the implementation of Product-Service Systems, A mul-
tiple case study, Double Degree Program: Master’s degree in Management—LUISS MSc, In Innovation and Industrial
Management—GU, Academic Year 2016–2017, 2017.)
Fundamentals of Industry 4.0 41
The UK-based Ellen MacArthur Foundation calculates the creation of a circular economy could help
European manufacturers save around 630 USD billion a year in 2025 (Lovins et al., 2014). Although dis-
cussing a circular economy is not our purpose here, in some of its applications, the PSS concept certainly
comes close to it. Arguably, then, its widespread implementation could lead to decreases in production
costs for the manufacturer, boosting its margins (as foreseen by the smiling curve). Moreover, substantial
long-lasting revenues might be captured by using a product base with a long life cycle, as suggested by
Oliva and Kallenberg (2003). However, product-service sales tend to be countercyclical and thus resist
economic cycles in general (Oliva and Kallenberg, 2003).
Baines (2007, 2009) says the potential loss of sales caused by increasing services (because of the
higher product life cycle and utilization of the installed product base, as explained earlier) is more than
offset by higher profit margins and increased stability in income.
connected and interconnected, and services can be moved from reactive to predictive (Masson et al.,
2016). These evolving conditions may have progressively led manufacturers to increasingly use ICT to
servitize their offers (Bureca et al., 2017).
Most recently, incredible progress has been made in the quality, size, potential and price of sens-
ing systems, so that they now offer great and affordable service opportunities (Thoben et al., 2017).
The study by Goldman Sachs reports, in the last decade, the prices of sensors dropped by 60%, on aver-
age, processing costs declined by nearly 60X, and wireless connectivity became available for free or at a
very low cost (Goldman Sachs Global Investment Research, 2014).
These opportunities may convince manufacturers to offer their customers the advantages of tech-
nological applications. They could make use of their existing product base, but could be remote from
customers while still keeping track of their utilization patterns, in order to trigger service components
(Shah et al., 2006; Tamburini et al., 2016).
REFERENCES
Acatech, Umsetzungsempfehlungen für das Zukunftsprojekt Industrie 4.0—Abschlussbericht des Arbeitskreises
Industrie 4.0, 2013.
Acatech, Umsetzungsstrategie Industrie 4.0 Ergebnisbericht der Plattform Industrie 4.0. acatech, 2015.
Baines T. S., Servitization impact study: How UK based manufacturing organisations are transforming them-
selves to compete through advanced services. Aston Centre for Servitization Research and Practice,
Aston Business School, Birmingham, UK, 2013.
Baines T. S., Lightfoot H. W., Benedettini O., and Kay J. M., The servitization of manufacturing. A review
of literature and reflection on future challenges. Journal of Manufacturing Technology Management,
20(5), 2009.
Baines T. S., Lightfoot H., Evans E., Neely A., Greenough R., Peppard J., Roy R. et al., State-of-the-art in
product-service systems. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of
Engineering Manufacture 221(10), 1543–1552, 2007.
Bauer W., Schlund S., Marrenbach D., and Ganschar O., Industrie 4.0—Volkswirtschaftliches Potenzial für
Deutschland, Studie. Fraunhofer IAO, 2014.
Bauernhansl T., Hompel M., and Vogel-Heuser B., Industrie 4.0 in Produktion, Automatisierung und Logistik:
Anwendung, Technologie, Migration, 2014.
Berger R., Industry 4.0—The new industrial revolution—How Europe will succeed. Roland Berger Strategy
Consultants, Munich, Germany, 2014.
Brandstotter M., (Austrian Society for Syst. Eng. & Autom., Xx, Austria), Haberl, M., Knoth, R., Kopacek, B.,
and Kopacek, P. IT on demand—Towards an environmental conscious service system for Vienna (AT).
The Third International Symposium on Environmentally Conscious Design and Inverse Manufacturing—
EcoDesign’03 (IEEE Cat. No.03EX895), pp. 799–802, 2003.
Bureca A., The Role of the Internet of Things from A Servitization Perspective. Opportunities and challenges
for the implementation of Product- Service Systems. A multiple case study. Double Degree Program:
Master’s degree in Management—LUISS MSc. In Innovation and Industrial Management—GU.
Academic Year 2016–2017, 2017.
Buxmann P., Hess T., and Ruggaber R., Internet of services. Business & Information Systems Engineering, 5,
341–342, 2009.
Centre for Sustainable Design, Sustainable service systems (3S). Transition towards sustainability. Sixth
International Conference, 2002.
Deutsche Kommission Elektrotechnik (DKE), Elektronik Informationstechnik in DIN und VDE. Deutsche
Normungs-Roadmap Industrie 4.0, Version 2. Am DIN-Platz Burggrafenstraße 6 10787, Berlin,
Germany, 2015. http://www.industrialradio.de/Publications/NR_Industrie%204.0_V2_DE.pdf. Accessed
August 31, 2018.
Drath R., Industrie 4.0—eine Einführung, 2014. http://www.kybeidos.de/fileadmin/user_upload/
Dateien/Industrie40/Einf%C3%BChrung_Industrie40-OpenAutomation.pdf. Accessed August 30,
2018.
eco—Verband der deutschen Internetwirschaft e. V., Wirtschaft ohne Orientierung bei Industrie 4.0, 2014.
Fundamentals of Industry 4.0 43
ELIMA Report, Environmental life cycle information management and acquisition for consumer products,
2005.
European Commission, Factories of the Future, http://ec.europa.eu/research/industrial_technologies/facto-
ries-of-the-future_en.html. Accessed August 31, 2018.
Frambach R. T., Wels-Lips I., and Gündlach A., Proactive product service strategies: An application in the
European health market. Industrial Marketing Management, 26, 341–352, 1997.
Fraunhofer-Institut für Materialfluss und Logistik (IML), Smart face—Smart Micro factory for Electric
Vehicles with Lean Production Planning. Smart Face—Smart Micro Factory für Elektrofahrzeuge mit
schlanker Produktionsplanung. Christoph Mertens, Supply Chain Engineering, 2014. https://www.iml.
fraunhofer.de/content/dam/iml/de/documents/OE%20220/Referenzen/jahresbericht2016/Smart%20
Face_Smart%20Micro%20Factory.pdf. Accessed August 30, 2018.
Frey C. B., and Osborne M. A., The future of employment: How susceptible are jobs to computerisation?
Retrieved September 7, 2013.
Forrester Consulting, The Internet of Things has the potential to connect and transform businesses. A Forrester
Consulting Thought Leadership paper commissioned by SAP and Intel, 2015.
Gausemeier J., Czaja A., and Dülme C., Innovationspotentiale auf dem Weg zu Industrie 4.0. In: Wissenschafts-
und Industrieforum Intelligente Technische Systeme, Heinz Nixdorf Institut, 2015.
Gebauer H., Identifying service strategies in product manufacturing companies by exploring environment‐
strategy considerations, Industrial Marketing Management, 37, 278–291, 2008.
Gebauer H., Fleisch E., and Friedli T., Overcoming the service paradox in manufacturing companies,
European Management Journal, 23(1), 14–26, 2005.
Gerpott T. J., and May S., Integration of Internet of Things components into a firm’s offering portfolio—A
business development framework, Info, 18(2), 53–63, 2016.
Giusto D., Iera A., Morabito G., and Atzori L., The Internet of Things: A survey, Computer Networks, 54(15),
2787–2805, 2010.
Goedkoop M. J., Halen V. C. J. G., Riele H. R. M., and Rommens P. J. M., Product Service Systems, Ecological
and Economic Basis; Technical Report; Pre Consultants: Amersfoort, the Netherlands, 1999.
Goldman Sachs Global Investment Research, The Internet of Things: Making sense of the next mega-trend,
Goldman Sachs, 2014.
Gorecky D., Schmitt M., and Loskyll M., Mensch-Maschine-Interaktion im Industrie 4.0-Zeitalter, 2014.
Grant R. M., Contemporary Strategy Analysis, 8th edition, John Wiley & Sons, Chichester, UK, 2013.
Gregor S., A theory of theories in information systems. in Information Systems Foundations: Building the
Theoretical Base (S. Gregor and D. Hart (eds., pp. 1–20)), Australian National University, Canberra,
Australia, 2002.
Gregor S., Building theory in the sciences of the artificial. in Proceedings of the 4th International Conference
on Design Science Research in Information Systems and Technology (V. Vaishanvi ed.), 2009.
Gubán M., and Kovás G., Industry 4.0 Conception. Acta Technica Corviniensis—Bulletin of Engineering
Tome X [2017] Fascicule 1 [January–March] ISSN: 2067–3809, 2017.
Günthner W., Klenk E., and Tenerowicz-Wirth P., Adaptive Logistiksysteme als Wegbereiter der Industrie 4.0, 2014.
Hagel III J., Brown J., Kulasooriya D., Giffi C., and Chen M., The Future of Manufacturing—Making Things
in a Changing World. Deloitte University Press, 2015.
Hermann M., Pentek T., and Otto B., Design Principles for Industrie 4.0 Scenarios: A Literature Review.
Technische Universität Dortmund. Fakultät Maschinenbau. Audi Stiftungslehrstuhl Supply Net Order
Management. Working Paper No. 01/2015, 2015.
Hewitt P., The Government’s Manufacturing Strategy, 2002.
Hilti, https://www.hilti.com/content/hilti/W1/US/en/services/tool-services/fleet-management.html, 2017. Accessed
September 1, 2018.
Hirsch-Kreinsen H., and Weyer J., Wandel von Produktionsarbeit – Industrie 4.0. Soziologisches Arbeitspapier
38, TU Dortmund, 2014.
Hompel T., and Otto B., Technik für die wandlungsfähige Logistik. Industrie 4.0. 23. Deutscher Materialfluss-
Kongress, 2014.
Huxtable J., and Schaefer D., On servitization of the manufacturing industry in the UK. changeable, agile,
reconfigurable & virtual production. Procedia CIRPs, 52, 46–51. University of Bath, Bath, UK, 2016.
IDC Manufacturing Insights, 2013.
44 Handbook of Industry 4.0 and SMART Systems
Industrie 4.0 Whitepaper FuE-Themen, Plattform Industrie 4.0, Stand: 7, 2015. https://www.din.de/blob/67744/
de1c706b159a6f1baceb95a6677ba497/whitepaper-fue-themen-data.pdf. Accessed September 1, 2018.
Jacob F., and Ulaga W., The transition from product to service in business markets: An agenda for academic
inquiry, Industrial Marketing Management, 37(3), 247–253, 2008.
James M., Chui M., Bisson P., Woetzel J., Dobbs R., Bughin J., and Aharon D., The Internet of Things:
Mapping the value beyond the hype. McKinsey Global Institute, 2015.
Jasperneite J., Alter Wein in neuen Schlauchen, Computer & Automation, 12, 24–28, 2012.
Jian Z., and Wu Z., A research on the paths selection of servitization in manufacturing: Based on the view-
point of smiling curve, Science of Science and Management of S. & T, 12, 021, 2011.
Kagermann H., Chancen von Industrie 4.0 nutzen, 2014.
Kagermann H., Lukas W., Wahlster W., Abschotten ist keine Alternative, VDI Nachrichten, 16, 2015.
Kagermann H., Lukas W., and Wahlster W., Industry 4.0: Mit dem Internet der Dinge auf dem Weg zur 4.
industriellen Revolution. VDI nachrichten, 13, 2011.
Kagermann H., Wahlster W., and Helbig J., Recommendations for implementing the strategic initiative
Industrie 4.0: Final report of the Industrie 4.0 Working Group, 2013.
Kempf D., Vorwort. In F. I. BITKOM, ed., Industrie 4.0—Volkswirtschaftliches Potenzial für Deutschland,
5, 2014.
Kletti J., Zukunftskonzept MES 4.0 Dezentrale Regelkreise synchronisieren, IT & Production, 2015(4), 2015.
Kowalkowski C., Kindström D., and Gebauer H., ICT as a Catalyst for Service Business Orientation, Journal
of Business & Industrial Marketing, 28(6), 2013.
Lee E. A., Cyber physical systems: Design challenges, 11th IEEE Symposium on Object Oriented Real-Time
Distributed Computing (ISORC), 363–369, 2008.
Lewis M., Staudacher A. P., and Slack N., Beyond products and services: Opportunities and threats in serviti-
zation. Proceedings of the IMS International Forum. Cernobbio, May 17–19: IMS International Forum
Italy, 2004.
Lightfoot H., and Baines T., Made to Serve, Wiley, Hoboken, NJ, 2013.
Lightfoot, H., Baines, T., and Smart, P., The servitization of manufacturing—A systematic literature review
of interdependent trends, International Journal of Operations & Production Management, 33(11/12),
1408–1434, 2012.
Loskyll M., Heck I., Schlick J., and Schwarz M., Context-based orchestration for control of resource-efficient
manufacturing processes. Future Internet, 4(3), 737–761, 2012.
Lovins B., A New Dinamic Effective Business in a Circular Economic. Ellen Mac Arthur Foundation,
2014.
Lucke D., Constantinescu C., and Westkämper E., Smart factory—A step towards the next generation of
manufacturing, in Manufacturing Systems and Technologies for the New Frontier, the 41st CIRP
Conference on Manufacturing Systems (M. Mitsuishi, K. Ueda and F. Kimura eds., pp. 115–118), Tokyo,
Japan, 2008.
Manzei C., Schleupner L., and Heinze R., Industrie 4.0 im internationalen Kontext, 2016.
Manzini E., and Vezolli C., A strategic design approach to develop sustainable product service systems:
Examples taken from the “environmentally friendly innovation” Italian prize, Journal of Cleaner
Production, 11, 851–857, 2003.
Manzini E., Vezzoli C., and Clark G., Product service-systems: Using an existing concept as a new approach
to sustainability, Journal of Design Research, 1(2), 2001.
Masson, From commoditization to servitization: Transforming your business to compete in the new age of
field service with IoT, 2016.
Mathieu V., Product services: From a service supporting the product to a service supporting the client, Journal
of Business & Industrial Marketing, 16(1), 27–40, 2001.
Meijkamp R., Changing consumer behaviour through eco-efficient services. An empirical study of car sharing
in the Netherlands. Delft University of Technology, p. 296, 2000.
Mikolajek M., Otevrel V., Koziorek J., and Slanina Z., Data trends in industry automation using .NET frame-
work. IFAC-PapersOnLine, 48(4), 418–423, 2015.
Mont O., Introducing and developing a PSS in Sweden, (IIIEE, Lund University) 6, 2001.
Mont O., Clarifying the concept of product service- systems, Journal of Cleaner Production, 10(3), 237–245,
2002.
Fundamentals of Industry 4.0 45
Morelli N., Product service-systems, a perspective shift for designers: A case study—The design of a telecen-
tre. School of Architecture and Design, Aalborg University. Design Studies, 24(1), 73–99, 2003.
Neely A., Exploring the financial consequences of the servitization of manufacturing. Operations Management
Research, 1(2), 103–118, 2008.
Oman I., Product Service-Systems and their impacts on sustainable development—A multi-criteria evaluation
for Austrian Companies. Frontiers, 2, 2003.
Oliva R., and Kallenberg R., Managing the transition from products to services. International Journal of
Service Industry Management, 14(2), 1–10, 2003.
Plattform Industrie 4.0.© Federal Ministry for Economic Affairs and Energy. https://www.plattform-i40.de/I40/
Navigation/EN/Industrie40/WhatIsIndustrie40/what-is-industrie40.html. Accessed August 30, 2018.
Porter M. E., Competitive Advantage: Creating and Sustaining Superior Performance, Free Pass, New york, 2015.
Prahald C. K., and Ramaswamy, V., Co-creating Unique value with customer. Strategy & Leadership, 32 (3),
4–9, 2004.
PricewaterhouseCoopers (PwC) International Limited Company, Global Industry 4.0 Survey: Industry
4.0: Building the digital enterprise, 2016. https://www.pwc.com/gx/en/industries/industries-4.0/
landing-page/industry-4.0-building-your-digital-enterprise-april-2016.pdf. Accessed August 30,
2018.
Ren G., and Gregory M. J., Servitization in manufacturing companies: A conceptualization, critical review,
and research agenda. Frontiers in Service Conference October 4–7, San Francisco, CA, 2007.
Roger W. S., Manufacturing, service, and their integration: Some history and theory, International Journal of
Operations & Production Management, 29(5), 431–443, 2009.
Rübmann M., Lorenz M., Gerbert P., Waldner M., Justus J., Engel P., and Harnisch M., Industry 4.0: The Future
of Productivity and Growth in Manufacturing Industries. The Boston Consulting Group (BCG), 2015.
Sawhney M., Balasubramanian S., and Krishnan V., Creating growth with services. MIT Sloan Management
Review, 34(4), 34–43, 2004.
Scheer A. W., Industrie 4.0: Wie sehen Produktionsprozesse im Jahr 2020 aus? 2013.
Schlaepfer D. R. C., and Koch M., Industry 4.0 Challenges and solutions for the digital transformation and use
of exponential technologies. Deloitte. Audix. Tax. Consulting. Corporate Finance, 2015.
Schlick J., Stephan P., Loskyll M., and Lappe D., Industrie 4.0 in der praktischen Anwendung, 2014.
Schmenner R. W., Manufacturing, service, and their integration: Some history and theory, International
Journal of Operations & Production Management, 29(5), 431–443, 2009.
Schmitt M., Meixner G., Gorecky D., Seissler M., and Loskyll M., Mobile Interaction Technologies in the
Factory of the Future. IFAC/IFIP/IFORS/IEA Symposium on Analysis, Design, and Evaluation of
Human-Machine Systems. Las Vegas, NV, 2013.
Seliger G., Nachhaltige industrielle Wertschöpfungsnetze, Tagungsband 12. Produktionstechnisches
Kolloquium PTK, 2007.
Shah, D., Rust, R. T., Parasuraman, A., Staelin, R., and Day, G. S., The path to customer centricity, Journal of
Service Research, 9(2), 113–124, 2006.
Slack N., Operations strategy: Will it ever realize its potential. Gestao & Producao, 12(3), 323–332, 2005.
Smart Data Innovation Lab., Förderung der Smart Data Spitzenforschung 2015. http://www.sdil.de/de/.
Accessed September 1, 2018.
Spath D., Ganschar O., Gerlach S., Hämmerle M., Krause T., and Schlund S., Produktionsarbeit der Zukunft—
Industrie 4.0. Fraunhofer IAO, Fraunhofer Verlag, 2013.
Stock T., and Seliger G., Opportunities of Sustainable Manufacturing in Industry 4.0. 13th Global Conference
on Sustainable Manufacturing—Decoupling Growth from Resource Use. Institute of Machine Tools
and Factory Management, Technische Universität Berlin, 10587 Berlin, Germany. 2212–8271 © 2016
The Authors. Published by Elsevier B.V, 2016.
Tamburini D., Industrial Internet of Things: From talk to reality, 2016.
Thoben K.D., Wiesner S., and Wuest T., Industrie 4.0 and Smart Manufacturing, a review of research issues
and application examples. International Journal of Automation Technology, 11(1), 4–16, 2017.
Torsten J., and May S., Integration of Internet of things components into a firm’s offering portfolio—A busi-
ness development framework, Info, 18(2), 53–63, 2016.
Tukker A., Eight types of product–service system. Eight ways to sustainability? Experiences from SusProNet,
Business Strategy and the Environment, 13(4), 246–260, 2004.
46 Handbook of Industry 4.0 and SMART Systems
Umsetyungsstrategie Industrie 4.0: Ergebnisbericht der Plattform Industrie 4.0., Plattform Industrie 4.0, 2015.
https://www.its-owl.de/fileadmin/PDF/Industrie_4.0/2015-04-10_Umsetzungsstrategie_Industrie_4.0_
Plattform_Industrie_4.0.pdf. Accessed August 31, 2018.
UNEP, Product Service Systems and Sustainability. Opportunities for Sustainable Solutions. UNEP–DTIE:
Paris, France, 2002.
Vandermerwe S., and Rada, J., Servitization of business: Adding value by adding services. European
Management Journal Volume, 6(4), 314–324, 1988.
Van Looy B., and Visnjic I., Servitization: Disentangling the impact of service business model innovation on
manufacturing firm performance, Journal of Operations Management, 31(4), 169–180, 2013.
VDI/VDE-GMA (Gesellschaft Messund Automatisierungstechnik), Status report Referenzarchitekturmodell
Industrie 4.0. VDI/VDE-GMA, 2015a.
VDI/VDE-GMA (Gesellschaft Messund Automatisierungstechnik), Status Report: Reference Architecture
Model Industrie 4.0 (RAMI4.0) (Vol. 0), 2015b.
VDI/VDE-GMA (Gesellschaft Messund Automatisierungstechnik), 2016. Statusreport: Industrie 4.0—
Technical Assets Basic terminology concepts, life cycles and administration models.
Ward Y., and Graves A., The provision integrated customer solutions by aerospace manufacturers. University
of Bath. School of Management, Working paper series, 2005.
Weyer S., Schmitt M., Ohmer M., and Gorecky D., Towards Industry 4.0—Standardization as the crucial
challenge for highly modular, multi-vendor production systems. German Research Center for Artificial
Intelligence, Trippstadter Straße 122, 67663 Kaiserslautern, Germany. IFAC-PapersOnLine 48-3 (2015),
579–584, 2015.
Wise R., and Baumgartner P., Go downstream: The new profit imperative in manufacturing. Harvard Business
Review, No. September/October, 133–141, 1999.
Wong M., Implementation of innovative product service-systems in the consumer goods industry. PhD Thesis,
Cambridge University, 2004.
Zamfirescu C., Pîrvu B., Loskyll M., and Zühlke D., Do Not Cancel My Race with Cyber-Physical Systems.
IFAC: Promoting automatic control for the benefit of humankind. Cape Town, South Africa, 2014.
Zezulka F., Marcon P., Vesely I., and Sajdl O., Industry 4.0—An Introduction in the Phenomenon.
ScienceDirect, IFAC-PapersOnLine 49-25, (2016) 008–012, 2016.
2
SMARTness and Pervasive Computing
CONTENTS
2.1 Pervasive Computing..................................................................................................................... 48
2.1.1 Introduction..................................................................................................................... 48
2.1.2 Definitions of Pervasive Computing............................................................................... 49
2.1.3 History of Pervasive Computing..................................................................................... 50
2.1.3.1 Distributed Systems....................................................................................... 50
2.1.3.2 Mobile Computing..........................................................................................51
2.1.3.3 Three Waves of Computing........................................................................... 52
2.1.3.4 Core Concepts of Pervasive Computing........................................................ 53
2.1.3.5 Goals of Pervasive Computing...................................................................... 54
2.1.3.6 Research Issues of Pervasive Computing...................................................... 54
2.2 Problems of Pervasive Computing................................................................................................. 55
2.3 Proposed Infrastructure for Pervasive (Ubiquitous) Computing: UbiCloud................................. 56
2.4 Applications of Pervasive Computing........................................................................................... 59
2.4.1 Smart Homes................................................................................................................... 59
2.4.2 Smart Appliances.............................................................................................................61
2.4.3 Smart Cars........................................................................................................................61
2.4.4 Smart “Things”............................................................................................................... 62
2.4.5 Social Networking........................................................................................................... 63
2.5 Health Care.................................................................................................................................... 63
2.5.1 Transportation................................................................................................................. 64
2.6 Two Stages of Pervasive Computing Development....................................................................... 65
2.7 Impact of Pervasive Computing..................................................................................................... 67
2.7.1 Impact on Privacy........................................................................................................... 67
2.7.2 Economic Impact............................................................................................................ 67
2.7.3 Social Impact.................................................................................................................. 67
2.7.4 Winners and Losers in Pervasive Computing................................................................. 68
2.8 Differences between Traditional Networking and Pervasive Computing..................................... 68
2.8.1 Advantages of Pervasive Computing.............................................................................. 68
2.9 Typical Sensors Needed in Pervasive Computing......................................................................... 69
2.9.1 Movement........................................................................................................................ 69
2.9.2 Acceleration.................................................................................................................... 69
2.9.3 Light................................................................................................................................ 69
2.9.4 Proximity......................................................................................................................... 70
2.9.5 Audio............................................................................................................................... 70
2.9.6 Temperature.................................................................................................................... 70
2.9.7 Mechanical Force............................................................................................................ 71
2.9.8 Humidity......................................................................................................................... 71
2.10 Defining Smart Spaces.................................................................................................................. 71
2.10.1 EasyMeeting.................................................................................................................... 71
2.10.2 MavHome........................................................................................................................ 72
2.10.3 GatorTech Smart Home................................................................................................... 72
47
48 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
FIGURE 2.1 Pervasive computing: a vision of the future of computers. (From Vasseur, J.P. and Dunkels, A.,
Interconnecting Smart Objects with IP. The Next Internet, Morgan Kaufmann Publishers is an Imprint of Elsevier,
Amsterdam, the Netherlands, 2010.)
Almost any device, from clothing to tools to appliances to cars to homes to the human body, can be
embedded with chips to connect the device to an infinite network of other devices. The goal of per-
vasive computing is to make devices “smart,” thus creating a sensor network capable of collecting,
processing and sending data, and, ultimately, communicating as a means to adapt to the data’s context
and activity; in essence, a network that can understand its surroundings, also can improve the human
experience and quality of life.
The goal of pervasive computing, which combines current network technologies with wireless comput-
ing, voice recognition, Internet capability, and artificial intelligence, is to create an environment where
the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always
available (Zaslavsky, 2008).
Pervasive computing encompasses a wide range of topics, including UbiComp, IoT, distributed com-
puting, mobile computing, human-computer interaction, context-aware computing, and artificial intelli-
gence (Remijn, 2013). Its applications include energy, military, safety, consumer, health care, production,
social networking, assisted living, smart spaces, and logistics. All applications require adaptability,
reliability, context awareness, and flexibility (Raychoudhury et al., 2013).
An example of pervasive computing is an Apple Watch informing a user of a phone call and allowing him
to complete the call through the watch, or a registered user of Amazon’s streaming music service may ask
her Echo device to play a song, and the song is played without any other user intervention (Rouse, 2016).
Pervasive computing systems have a human-centric structure, mobility and pervasiveness. They also
need to be fault-tolerant and robust. Multidisciplinary areas cooperate in pervasive computing, and for
this reason, security, and privacy are vital (Zaharakis and Komninos, 2012).
• Pervasive computing enables people to interact with information-processing devices more nat-
urally and casually, and in ways that suit whatever location or context they find themselves in
(Bartram, 2008).
• Pervasive computing is a paradigm shift where technology becomes virtually invisible in our
lives (Hamed Mousa, 2013).
Remote communicaon
protocol layering, RPC, end to end args…
Fault tolerence
ACID, two-phasecommit, nested transacons…
High availavility
replicaon, rollback recovery…
DISTRIBUTED
SYSTEMS X MOBILE
COMPUTING X PERVASIVE
COMPUTING
Distributed security
encrypon, mutual authencaon...
Mobile networking
mobile IP, ad hoc networks, wireless TCP fixes...
Locaon sensivity
GPS, WaveLan triangulaon, context-awareness...
FIGURE 2.2 Taxonomy of research problems in pervasive computing. (From Satyanarayanan, M., IEEE Personal
Commun., 8, 10–17, 2001.)
SMARTness and Pervasive Computing 51
Although the World Wide Web was not designed to be a distributed computing infrastructure, its
networking ubiquity has made it an attractive choice for experimenting with distributed computing con-
cepts. It has also created a culture that is substantially more amenable to the deployment of pervasive
computing environments than the culture that existed when Weiser first articulated his vision. The ad hoc
nature of the Web’s growth has proved that we can distribute computing capabilities in a big way without
losing scalability. The simple mechanisms for linking resources have provided a means for integrating
distributed information bases into a single structure.
Most importantly, the Web has pioneered the creation of a nearly ubiquitous information and com-
munications infrastructure. Many users now routinely refer to their point of presence within the digital
world—typically, their homepages, portals, or e-mail addresses. The computer they use to access these
“places” has become largely irrelevant. Although the Web does not pervade the real world of physical
entities, it is a potential starting point for pervasive computing (Saha and Mukherjee, 2003).
The research from the mid-1970s through the early 1990s created a conceptual framework and
algorithmic base that has enduring value in all work involving two or more computers connected by a
network—whether mobile or static, wired or wireless, or sparse or pervasive. This body of knowledge
spans many areas foundational to pervasive computing and is well codified in textbooks (Couloris et al.,
2001; Lynch and Patt-Shamir, 1993; Mullender, 1993).
Briefly summed up, distributed computing involves the following:
• Remote communication, including protocol layering, remote procedure calls (Birrell and
Nelson, 1984), the use of timeouts, and the use of end-to-end arguments in functionality
(Saltzer et al., 1984).
• Fault tolerance, including atomic transactions, distributed and nested transactions, and two-
phase commit (Gray and Reuter, 1993).
• High availability, including optimistic and pessimistic replica control (Davidson, Garcia-
Molina and Skeen, 1985), mirrored execution (Borg et al., 1989), and optimistic recovery
(Strom and Yemini, 1985).
• Remote information access, including caching, function shipping, distributed file systems, and
distributed databases (Satyanarayanan, 1989).
• Security, including encryption-based mutual authentication and privacy (Needham and
Schroeder, 1978).
Applicaons Applicaons
Pervasive middleware
Pervasive
networking
Pervasive Pervasive
device device
User interface User interface
Pervasive
device
User interface
Applicaons Applicaons
FIGURE 2.3 Pervasive computing framework. (From Saha, D. and Mukherjee, A., Computer, 36, 25–33, 2003.)
• Mobile networking, including Mobile IP (Bhagwat et al., 1966), ad hoc protocols (Royer and
Toh, 1999), and techniques for improving TCP performance in wireless networks (Bakre and
Badrinath, 1995; Brewer et al., 1998).
• Mobile information access, including disconnected operation (Kistler and Satyanarayanan,
1992), bandwidth-adaptive file access (Mummert et al., 1995), and selective control of data
consistency (Tait and Duchamp, 1992; Terry et al., 1995).
• Support for adaptive applications, including transcoding by proxies (Fox et al., 1996) and adap-
tive resource management (Noble et al., 1997).
• System-level energy saving techniques, such as energy-aware adaptation (Flinn and
Satyanarayanan, 1999), variable-speed processor scheduling (Weiser et al., 1994), and energy-
sensitive memory management (Lebeck et al., 2000).
• Location sensitivity, including location sensing (Want et al., 1992; Ward et al., 1997) and
location-aware system behavior (Schilit et al., 1994; Spreitzer and Theimer, 1993; Voelker and
Bershad, 1994).
18
* Mainframe (one computer, many people).
16
* PC (one person, one computer).
14
* Ubiquitous Compung (one person,
many computers).
12
10
Sales
8
6
4
2
0
1975
1955
1995
1965
2005
1945
1985
1950
1970
1990
1960
2000
1940
1980
Year
FIGURE 2.4 Major trends in computing. (From Hamed Mousa, A.A., Ubiquitous/Pervasive Computing, Ecommerce
Technical Support Systems Manager, Cairo, Egypt, 2, 2013.)
• Pervasive computing (2000s to present): In The Rise of the Network Society, Manuel Castells
suggests there is an ongoing shift from already-decentralized, stand-alone microcomput-
ers and mainframes toward entirely pervasive computing. Castells uses the example of the
Internet as the start of a pervasive computing system. The logical progression from that
paradigm is a system where that networking logic becomes applicable in every realm of daily
activity, in every location and every context. Castells envisages a system where billions of
miniature, ubiquitous intercommunication devices will be spread worldwide (see Figure 2.4).
Three basic forms for pervasive system devices are tabs, pads, and boards (Hamed Mousa, 2013):
These three forms are characterized by being macro-sized, having a planar form and incorporating
visual output displays. Each can be expanded into a much more diverse and potentially more useful range
of pervasive computing devices.
More recently, the following three forms have been proposed for pervasive systems (Hamed Mousa,
2013):
• Dust: miniaturized devices can be without visual output displays, e.g., microelectromechanical
systems (MEMS), ranging from nanometers through micrometers to millimeters.
• Skin: fabrics based on light emitting and conductive polymers and organic computer devices
can be formed into more flexible non-planar display surfaces and products, such as clothes or
curtains. Microelectromechanical system devices can also be painted onto various surfaces so
that a variety of physical world structures can act as networked surfaces of MEMS.
• Clay: ensembles of MEMS can be formed into arbitrary three-dimensional shapes as artifacts
resembling many different kinds of physical object.
Pervasive computing may be seen as consisting of many layers, each with its own role, which together
form a single system (Hamed Mousa, 2013):
• Layer 1: task management layer. This layer monitors user task, context, and index, maps user
task to need for the services in the environment, and manages complex dependencies.
• Layer 2: environment management layer. This layer monitors resources and their capabilities
and maps service need and user-level states of specific capabilities.
• Layer 3: environment layer. This layer monitors relevant resources and manages the reliability
of these resources.
While it is possible to get caught up in the “pervasive-ness” part of this new technology, it is also
important to realize how much such systems rely on existing information bases and infrastructures.
In transportation, for example, services such as Google Maps provide much of the raw information
needed to create the value added, location-based service. Pervasive systems are therefore only part of a
larger information infrastructure. It is necessary to appreciate both how small a part of the overall sys-
tem may need to be pervasive, but equally how large is the impact of providing seamless integration of
services in everyday life (Satyanarayanan, 2001).
This brings us to several research issues. The first issue is the effective use of smart spaces. A smart space
is a work or living space with embedded computers, information appliances, and multimodal sensors that
allow people to work and live efficiently (together or individually) with an unprecedented access to informa-
tion and support from local computers (Stanford et al., 2003). Examples of suitable sites for smart spaces
include a business meeting room, a medical consultation meeting room, a training and education facility, a
house, a classroom, and a crisis management command center. A smart space should adapt to the changes in
an environment, recognizing different users and providing personalized services (Ye et al., 2009).
The second research issue is invisibility. Streitz and Nixon identify two forms of invisibility (Streitz
and Nixon, 2005):
• Physical invisibility refers to the miniaturization of computing devices and their embedding
within and throughout the individual and the environment, e.g., in clothes, glasses, pens, cups,
or even the human body.
• Cognitive invisibility refers to the ability to use the system’s services in a manner that is free from
distraction. A pervasive computing environment should interact with users at almost a subcon-
scious level if it is to continuously meet the expectations of users; it should rarely present them
with surprises. This is also described as minimal user distraction by Satyanarayanan (2001).
The third research issue is localized scalability. Scalability is a critical problem in pervasive computing,
as the intensity of interactions between devices will increase in environments where more and more
users are involved. The density of these interactions must be decreased by reducing distant interactions
that are of little relevance to current applications.
The fourth research issue is masking heterogeneity. The rate of penetration of pervasive comput-
ing technology into infrastructure will vary considerably. Making pervasive computing technology
invisible requires reductions in the amount of variation in different technologies, infrastructures, and
environments (Ye et al., 2009). One way to reduce the amount of variation seen by a user is to have
his or her personal computing space compensate for ‘‘dumb’’ environments. As a trivial example,
a system capable of disconnected operation is able to mask the absence of wireless coverage in its
environment. Complete invisibility may be impossible, but reduced variability is well within our reach
(Satyanarayanan, 1996).
User preferences should be invisible and shift seamlessly over time, but preferences differ;
6. Computational resources, battery power, memory, and bandwidth can be limited.
7. Enormous number of distributed system elements (Estrin et al., 2002);
8. Need for mobility, with computing sessions distributed over a range of devices (Henricksen
et al., 2001);
9. Human attention is an especially scarce resource in such environments, because the user is
often preoccupied with walking, driving, or other real-world interactions (Garlan et al., 2002).
• CC component: This component represents the cloud with all its service models (IaaS, PaaS,
SaaS). It provides users in the pervasive computing environment with all services they need.
For example, if the pervasive computing environment is a mall, the restaurant service provider
can help a user find an Italian restaurant. If a user is looking for stores with sales or bargains,
the sales service provider can help him find a good deal. It is the responsibility of cloud service
providers (CSPs) to offer these services to users based on the service-level agreements (Joint
FIGURE 2.5 UbiCloud environment. (From Youssef, A., Int. J. Ad hoc, Sens. Ubiquitous Comp., 4, 2013.)
SMARTness and Pervasive Computing 57
and Baker, 2011). However, these services should also satisfy the pervasive computing envi-
ronment characteristics of invisibility, adaptability, and localized scalability (Youssef, 2013).
• UbiComp component: This component represents the pervasive computing environment and
includes the following entities (Youssef, 2013):
• Service directory (SD): a directory for all services offered in UbiCloud
• User agent (UA): any embedded device that receives a service request from the user and
sends it to SD
• Mobile user (mobUser): any user who moves in the smart place or from one smart place to
another and uses a mobile device to interact with UA.
The protocol organizing interactions between these entities inside the UbiCloud environment can be
described as follows:
• First, each service provider (SP) in the cloud registers its service at the SD. This can be done
via a service_register message sent from SP to SD and an ACK message sent from SD to SP.
Hence, SD contains all services provided by the cloud for this smart place and knows which
SP provides each service.
• On startup, UA identifies users’ preferences and intentions from the information on their
mobile device.
• Service directory creates a service list for the smart space and broadcasts it via a service_list
message to all UAs located in this smart place. Later, if a new SP registers a service at SD, it
updates the service list and broadcasts the update list to all UAs.
• Based on users’ intentions and preferences, UA suggests services that may be of interest to
a specific user and sends it with the service list to mobUser via the message id_service_list/
suggested_services. These steps are illustrated in Figure 2.6.
SP SD UA mobUser
service_register
ACK
me
service_register
ACK
service_list
id_service_list/
suggested service
FIGURE 2.6 UA suggests service of interest and sends it with the service list to mobUser via the message id_service_list/
suggested_services. (From Youssef, A., Int. J. Ad hoc Sens. Ubiq. Co., 4, 2013.)
58 Handbook of Industry 4.0 and SMART Systems
SP SD UA mobUser
service_request
id_service_request
id_service_request
me
id_service_response
id_service_response
service_response
FIGURE 2.7 Interactions between SD, UA, and mobUser. (From Youssef, A., Int. J. Ad hoc Sens. Ubiq. Co.,
4, 2013.)
The interaction between SD, UA, and mobUser is shown in Figure 2.7 and is described below (Youssef,
2013):
1. The mobUser uses his or her mobile device to send a service request message to UA.
2. User agent adds a user identity header to the message (id_service_request) and forwards it to
Service Agent (SA).
3. SA knows which SP provides this service on the cloud; thus, it forwards the message to the
appropriate SP.
4. When SP receives a service request message from SA, it replies with id_service_response to UA.
5. User agent forwards the service response message to the mobUser.
The cloud services registered at SD are relevant to the smart space. When the user moves from one smart
place to another, a different service list is registered at SD of the new place. This helps achieve local
scalability and adaptability. This concept is depicted in Figure 2.8.
The UbiCloud infrastructure helps solve some inherent problems in pervasive computing. With the
power of computing, storage, and networking capabilities of the cloud, intensive applications that are
time-sensitive or need large storage space or wider bandwidth can now run in pervasive computing
environments. With the high scalability of CC, more computing resources can be added. Therefore,
more services can be provided by CSPs to more users in the pervasive computing environment. These
services are available as users move inside or across pervasive environments at any time, because they
are provided by the cloud.
SMARTness and Pervasive Computing 59
FIGURE 2.8 Achievement of localized scalability and adaptability. (From Youssef, A., Int. J. Ad hoc, Sens.
Ubiquitous Comp., 4, 2013.)
14 1
13
2
12
11
10
5
9
8 6
7
FIGURE 2.9 Applications of pervasive computing. (From Estrin, D., Commun. ACM, 43, 38–39, 2000.)
SMARTness and Pervasive Computing 61
The goal is to maximize the comfort and security of the inhabitants and minimize operation cost.
For example, applications in a smart home can improve energy efficiency by automatically adjusting
heating, cooling, or lighting levels according to the condition of the inhabitants (e.g., location or body
temperature). They can provide reminders of shopping orders according to the usage of groceries and
schedule the entertainment system (e.g., playing music or movies, or switching on a TV) according to the
inhabitants’ hobbies and habits. In these cases, pervasive computing technologies are applied to identify,
automate, and predict the activity patterns of inhabitants from synthetic and real collected data (Cook
et al., 2003; Logan et al., 2007).
In the United States, tens of thousands of homes are already equipped with home-automation devices,
and there are signs that Europe—which has much lower home Internet use—is following suit (Turban
et al., 2005).
Ideally, smart cars eventually will be able to drive themselves. Known as autonomous land vehicles,
these cars follow geographic information system maps and use sensors in a wireless environment to iden-
tify obstacles. Such vehicles are already on the roads in California, Pennsylvania, and Germany (on an
experimental basis, of course) (Turban et al., 2005).
• Barcodes. A typical barcode, known as the Universal Product Code, is made up of 12 digits, in
various groups. The first two show the country where it was issued, the next four represent the
manufacturer, and the remaining six are the product code assigned by the manufacturer. On a
package, the code is represented by a series of bars and spaces of varying widths.
Barcodes have been used for 25 years, but they have some limitations. First, they require line-
of-sight of the scanning device. This is fine in a store but can pose substantial problems in a
manufacturing plant, a warehouse, or on a shipping or receiving dock. Second, they are printed
on paper and so can be ripped, soiled, or lost. Third, the barcode identifies the manufacturer
and product, not the item. For example, every carton of milk of a given producer has the same
barcode, regardless of when it was produced. This makes a barcode useless in determining
things such as the expiration date.
• Auto-ID. This is an alternative identification method that overcomes the limitations of bar-
codes. It has been promoted over the past couple of years by the Auto Identification (Auto-ID)
Center (autoidcenter.org). This organization is a partnership of more than 87 global companies
and three of the world’s leading research universities: MIT in the United States, University
of Cambridge in the UK, and University of Adelaide in Australia. The companies include
manufacturers (e.g., Coca-Cola, Gillette, Canon), retailers (e.g., Wal-Mart, Tesco in the UK),
shippers (e.g., UPS, US Postal Service), standards bodies (e.g., Uniform Code Council), and
government agencies (e.g., US Department of Defense).
The mission of the Auto-ID Center goes well beyond replacing one code with another. Its
stated aim is to create an IoT, a network that connects computers to objects—ranging from
boxes of laundry detergent to pairs of jeans to airplane engines. This IoT will provide the abil-
ity to track individual items, as they move from factories to store shelves to recycling facilities.
This will make possible near-perfect supply chain visibility.
• Radio-frequency identification (RFID): RFID uses radio waves to automatically identify indi-
vidual items. Typically, a microchip with product information and an antenna are embedded in
an RFID tag. The antenna transmits the identification information by radio waves to an RFID
reader; the reader passes the information on to computers that can make use of it.
RFID has been around for a while. In World War II, RFIDs were used to identify
friendly aircraft. Today, they are used in wireless tollbooth systems, such as E-ZPass.
In Singapore, they are used in a system called Electronic Road Pricing, which charges dif-
ferent prices to drive on different roads at different times, encouraging drivers to stay off
busy roads at busy times. Every car has an RFID tag that communicates with card readers
on the major roads.
RFID can also be used in health care. For example, RFID can monitor patients and staff in a hospital.
Initially, RFID tags were mounted on patients at certain places; later, low-frequency and high-frequency
RFID systems were placed on patients but these systems were restricted because of their short range and
very low data transfer rate. Today, they are mounted in the human body instead of on the body (Sani
et al., 2010).
Until now, a main problem with RFID has been the expense. Tags have cost at least US 50 cents,
which makes them unusable for low-priced items. A California company called Alien Technology
SMARTness and Pervasive Computing 63
(alientechnology.com) has invented a way to mass-produce RFID tags for less than US 10 cents apiece for
large production runs. In January 2003, Gillette placed an order with Alien Technology for 500 million
RFID tags (RFID Journal, November 15, 2002). Gillette is using the tags in a number of trial programs.
In one of the early trials, Gillette attached the tags to Mach 3 razors shipped to Wal-Mart, whose store
shelves are equipped with special RFID readers. The overall success of RFID tags in the marketplace
will depend on the outcome of trials such as this.
FIGURE 2.10 Pervasive computing technologies in health care. (From Adamer, K. et al., Developing a wearable assistant
for hospital ward rounds: An experience report, Proceedings of the International Conference for Industry and Academia
on Internet of Things, Springer-Verlag Berlin Heidelberg, 2008.)
64 Handbook of Industry 4.0 and SMART Systems
collect and process an ever-increasing range of telemetric data from instruments used in an operating
room and augment human ability to detect patterns that could require immediate action (Borriello
et al., 2007).
2.5.1 Transportation
Pervasive computing technologies are entering everyday life as embedded systems in transportation
(Farkas et al., 2006; Cunningham and Cahill, 2000). The introduction of pervasive computing into trans-
portation has been facilitated by a range of technologies, particularly networks and positioning systems
(Ye et al., 2009).
A number of applications have already emerged. In tourist guides, a pervasive computing system can
provide personalized services (such as locating a specific type of restaurant or planning a day trip) for
visitors based on their location and preferences. In traffic control, a system can be immediately informed
of congestion or accidents and notify all approaching drivers. In route planning, a system can suggest
the most convenient routes for users based on the current traffic conditions and the transportation mode
being used. At a public transportation hub, a system can provide high value-added services to improve
customer convenience (see Figure 2.11) (Nakagawa et al., 2011).
FIGURE 2.11 Providing on-demand information for customers from departure place to destination. (From Study on
new value creation for a ubiquitous society, Special edition paper. JR EAST Technical Review-No. 9, Frontier Service
Development Laboratory, Research and Development Center of JR East Group, https://www.jreast.co.jp/e/development/
tech/pdf_9/Tec-09-17-27eng.pdf. Accessed 2018.)
SMARTness and Pervasive Computing 65
FIGURE 2.12 Two stages of pervasive computing development. (From Gabriel, P. and Bovenschulte, M., Pervasive
Computing: Trends and Impacts. Federal Office for Information Security, Bibliographic information of the German
National Library, © 2006 Bundesamt für Sicherheit in der Informationstechnik–BSI Godesberger Allee 185–189, 53175
Bonn, Germany, 2006.)
66 Handbook of Industry 4.0 and SMART Systems
technology based on artificial intelligence and knowledge management paradigms. These agents’ flex-
ible world models will permit a functional, adaptive logic. User-defined action will be possible in different—
even unfamiliar—contexts.
Qualitative leaps similar to those expected in the transition from PvC-1 to PvC-2 are expected in
pervasive computing’s impact as well. The embedding of pervasive computing components into a vast
number of everyday objects will pose new challenges to recycling. The integration of pervasive comput-
ing components will turn those objects, which are currently relatively homogeneous, into mixed-material
objects. They will no longer be compatible with present recycling methods based on unmixed materials.
Laborious pretreatment and/or entirely new procedures will be required, even for some of today’s ordi-
nary consumer materials.
The number of components in pervasive computing will grow significantly during the transition
to PvC-2 as media ruptures will have been overcome, the technology will have matured and the
cost-effective mass production of products and applications will have begun. The number of smart
objects will increase rapidly. On the one hand, this means recycling will constantly face new quali-
tative challenges; on the other hand, the cumulative impact of these changes will push the existing
recycling infrastructure to its limits.
Figure 2.13 illustrates the key development trends and cross-linkages in pervasive computing. It pro-
vides a highly condensed illustration of the prospects for pervasive computing development (Gabriel and
Bovenschulte, 2006).
FIGURE 2.13 Developments and dependencies in pervasive computing. (Arrows within the category describe evolu-
tionary processes and arrows reaching across categories represent influences.) (From Gabriel, P. and Bovenschulte, M.,
Pervasive Computing: Trends and Impacts. Federal Office for Information Security, Bibliographic information of the
German National Library, © 2006 Bundesamt für Sicherheit in der Informationstechnik–BSI Godesberger Allee 185–189,
53175 Bonn, Germany, 2006.)
SMARTness and Pervasive Computing 67
Pervasive computing is not expected to produce any negative “rebound effects,” which would offset
or even negate pervasive computing’s positive effects. This is true for work and attention efficiency,
resource consumption, and a man or woman’s ability to orient and locate himself or herself in the envi-
ronment (Gabriel and Bovenschulte, 2006).
• Many will have small, inexpensive processors with limited memory and little or no persistent storage.
• They will connect to other computing elements without the direct intervention of users.
• They will often be connected by wireless networks.
• They will change rapidly, sometimes by being mobile, sometimes by going on and offline
at widely varying rates. Over time, they will be replaced (or fail) far more rapidly than is
now common.
• They will be used as a source of information, often sending that information into the center of
the network to which they are attached.
• It will allow individuals to finish an expanding number of individual and expert transactions
utilizing a class of adroit and convenient machines or “sharp gadgets” installed with chips that
permit clients to connect to insightful systems.
SMARTness and Pervasive Computing 69
• It will regulate straightforward and secure access to important data. Individuals will have help-
ful access to applicable data archived on effective systems, permitting them to make a move
anyplace, at any time.
• It will empower people to be more effective in their work (Chandini et al., 2014).
2.9.1 Movement
The detection of simple movements and movement patterns of objects is a component of many applica-
tions. Devices are mostly only active when they are grabbed by the user and therefore moved. A move-
ment sensor can determine the movement state of an object and distinguish between activity levels or
even recognize special conditions or situations. The MediaCup application can detect if someone is
holding the cup, drinking, or if the cup is simply sitting on the table. Another context is vibration, with
sensors built into environments to detect situations such as earthquakes.
The most popular movement sensors are ball or mercury switches. The ball switch is much more sensitive
and can react very fast and even detect vibrations coming from sound sources. It only requires one digital input/
output line to the microprocessor and consumes no extra power besides the output signal (Beigl et al., 2004).
2.9.2 Acceleration
This sensor can replace simple movement sensors but can also go beyond them. Acceleration is an impor-
tant way to supervise the condition of sensitive goods (Decker et al., 2004). The acceleration vector of
a moved object is an excellent source for generating the shared context of physically collocated objects,
e.g., for context proximity.
In the Smart-It Friends application (Holmquist et al., 2001), objects compare their acceleration vectors
and decide whether they are together in a compound or not.
Acceleration sensors can be used to measure the earth’s gravitational force on an object to determine
its angle of orientation relative to the ground. One sample usage scenario was to find the orientation of
furniture parts during the assembly process of Smart Furniture (Holmquist et al., 2004).
Because of the size and the power consumption, only MEMS types of acceleration sensors are appli-
cable on a small and wireless device. They have accuracies down to some mg resolution at update rates
around 100 Hz. This is sufficient to determine movement patterns or to measure angles with respect
to the earth’s gravity, but not enough to realize inertial navigation systems. In comparison to simple
movement sensors, their power consumption is higher and their response time is lower. In addition, their
values are of much broader use (Beigl et al., 2004).
2.9.3 Light
Measuring light intensities at various wavelengths is mainly used to detect environmental conditions.
Precision is less important than efficiency—especially power consumption—and flexibility in the choice
of the detected wavelength. Combining measurements from different spectral areas allows distinguish-
ing between light sources, such as sunlight or artificial light, as each source has its own spectral distribu-
tion. Typical contexts that can be acquired include abstract location determinations according to the light
pattern. For example, in the TEA project, light sensors are used to decide whether a person is outside or
indoors. A light sensor may serve as a replacement for a movement sensor by processing the knowledge
of how movement influences the light level on parts of a moved object.
70 Handbook of Industry 4.0 and SMART Systems
A benefit of light sensors is their low power data communication. The limited distance of the propa-
gation of light signals makes them the ideal choice for building location beacons, as in the MemoClip
application and other IrDA SIR standard-based systems.
To minimize the package size of the light sensor, parts with integrated filters and amplification are
preferred, as they do not require additional circuitry. Available sensors either generate an analog value
representing the light level or are stand-alone sensors with a digital interface such as I2C. A major prob-
lem of cheap low power light sensor types is that their sensitivity range is limited. Applying different
optical filters can solve this problem. Such light sensors are normally inexpensive and small and are
therefore applied in many settings (Beigl et al., 2004).
2.9.4 Proximity
Like the movement sensor, the detection of the proximity of a subject can be used to launch applications that
are inactive when no user is around. In contrast to other sensor types, this sensor directly provides a simple
context without interpretation, namely the “subject is around” context. Derived contexts are (human) activ-
ity level in an environment that can be derived from the pattern delivered by proximity sensors.
Determining proximity is generally done with passive infrared sensors or capacitive sensors. They nor-
mally carry an integrated design and signal activity in an observed area.
These sensors are still quite large and consume considerable amounts of energy. Their use is therefore
only valuable in dedicated settings (Beigl et al., 2004).
2.9.5 Audio
Analyzing audio information from the environment can be useful to understand the context of a mobile
device. Even simple algorithms can produce valuable information. The sound level can lead to conclu-
sions about the activity level in a certain surrounding, and zero-crossing detections can inform about
the sound source and distinguish between speech, music, male or female speakers, or situations such as
audio in a car or in a meeting. Moreover, sound is a local, unique, and fast-changing context and provides
a good basis for automatic generation of keys or finding nearby objects using context proximity algo-
rithms (Robinson and Beigl, 2003).
Typically, audio sensing needs three parts: a microphone, an amplifier, and an A/D converter. For the
conditions of small package and low power operation, only capacitive microphones are applicable.
Design of the amplification is restricted by available space and power consumption, which makes the
resulting audio sensor subsystem suitable for analyzing environment noises and speech in rooms of up
to 40 m2 in size. Applications requiring extensive analysis of signals beyond 10 kHz or requiring high
signal-to-noise ratio are beyond these simple audio sensor subsystems. Still, many audio algorithms can
be implemented to work on-the-fly without the need to store the sampled audio values—an exhausting
task on small processors with limited resources (Beigl et al., 2004).
2.9.6 Temperature
The temperature of an object (e.g., for a liquid in a cup) or the environment may be of interest. For both
measurements, the flexibility of use and robustness are more important than precision of the device.
In many cases, not the temperature value itself (in degrees) but a differentiation between some states is
sufficient. The MediaCup, for example, has only three temperature distinctions, “cold,” “warm,” and “hot.”
Temperature sensors are also used for product monitoring during transportation (Decker et al., 2004).
Temperature sensors are available as temperature sensitive materials (positive temperature coefficient
[PTC] / Negative temperature coefficient [NTC]) that require contact with the object or as infrared sensors
that measure radiation. The easiest way is to use integrated sensors connected via a bus such as I2C. These
sensors are very small and easy to use. As temperature normally changes slowly, the period for measure-
ments for a continuous monitoring of temperature in typical pervasive computing settings is in the 10-second
range. This makes a temperature sensor very low power in its mean consumption (Beigl et al., 2004).
SMARTness and Pervasive Computing 71
2.9.8 Humidity
Sensing the air humidity is useful for determining both environmental and internal conditions. This mea-
surement can be exploited in the monitoring of goods during transportation that are sensitive to humidity,
such as paintings. Collaborative readings of these sensor values in buildings, together with temperature
and vibration, provide the basis for the analysis of the status of such constructions.
Often, humidity sensors are just a net of small printed wires on a material measuring the resistance
of that material, which strongly varies with the humidity it is exposed to. When used in construction,
these sensors are often separated from the rest of the sensor electronics and embedded into the mea-
sured object, e.g., into concrete. Intelligent sensors with integrated amplification and a digital data bus
can be used to measure environmental humidity (Beigl et al., 2004).
2.10.1 EasyMeeting
EasyMeeting (Chen et al., 2004) is a smart meeting environment with the aim of providing appropriate
services and information to participants and the speaker within its perimeter. This environment exploits
the distributed nature of intelligent agents, computing devices, services, and sensors, integrated by a
context-aware broker (CoBra) to provide a coherent view of the environment. In addition, CoBra medi-
ates sharing a coherent view of the environment with intelligent agents.
The current state of the art for EasyMeeting is the exploitation of meeting context to deliver appropri-
ate services and information. By meeting context, Chen et al. (2004) mean meeting-related events such
as identity of participants, speakers, start time of the meeting, slide presentation, and other related tasks.
To achieve this, however, the environment uses sensing devices to detect Bluetooth-enabled devices of
participants, such as phones and PDAs, and a speech recognition system to recognize and respond to the
speaker’s voice (Lupiana et al., 2009).
72 Handbook of Industry 4.0 and SMART Systems
2.10.2 MavHome
MavHome is a multidisciplinary project with the aim of developing a smart environment that acts as an
agent of its inhabitants (Das et al., 2004). The ultimate goal of this environment is to provide maximum
comfort to its inhabitants with minimum operational costs. Ideally, this environment will be able to
predict, based on daily movement patterns, where the inhabitant goes and automatically do things previ-
ously performed manually.
MavHome leverages integration, artificial intelligence, multimedia, and database systems to meet its
goals. The environment monitors activity through sensors; then the information is transferred to an agent
that selects appropriate commands to affect the environment. The captured information from sensors, along
with the proposed decision, is stored in a database for future reference. The environment also monitors
users’ mobility by periodically searching for terminal sensors worn by inhabitants (Lupiana et al., 2009).
Wireless
Networks
Reasoning
Mechanism
UbiComp
Sensors
Devices
FIGURE 2.14 Components of smart spaces. (From Lupiana, D. et al., Defining smart space in the context of ubiquitous
computing, Special Issue on ICIT 2009 Conference—Web and Agent Systems, Dublin Institute of Technology, Dublin,
Ireland, 2009.)
SMARTness and Pervasive Computing 73
2.11.1.2 Sensors
Sensors can be widely defined as physical devices that augment the physical sensing of the environment
(Tilak et al., 2002). Based on this definition, audio microphones and video cameras are regarded as sen-
sors, although they are only currently becoming sufficiently miniaturized to be unseen. Smart sensors go
further to include limited reasoning on the sensed information (Cook and Das, 2007). Sensors provide
real-time data about the environment that allows the smart space to react to a user’s desires. Regardless
FIGURE 2.15 Palm-sized mobile computer. (From Lupiana, D. et al., Defining smart space in the context of ubiquitous
computing, Special Issue on ICIT 2009 Conference—Web and Agent Systems, Dublin Institute of Technology, Dublin,
Ireland, 2009.)
74 Handbook of Industry 4.0 and SMART Systems
of their capabilities, sensors, when connected with a wireless network, enable smart spaces to model
and communicate the current state of the physical environment to the reasoning mechanism (Lupiana
et al., 2009).
REFERENCES
Adamer K., Bannach D., Klug T., Lukowicz P., Sbodio M. L., Tresman M., Zinnen A., and Ziegert T.,
Developing a wearable assistant for hospital ward rounds: An experience report, Proceedings of the
International Conference for Industry and Academia on Internet of Things, Springer-Verlag Berlin
Heidelberg, 2008.
Al-Muhtadi J., Ranganathan A., Chetan S., and Campbell R., Cerberus: A context-aware security scheme for
smart spaces, Presented at Pervasive Computing and Communications, (PerCom 2003), Proceedings
of the First IEEE International Conference on, 2003.
Ashton K., That “Internet of Things” Thing. In the real world, things matter more than ideas. RFID Journal,
June 22, 2009, https://www.rfidjournal.com/articles/view?4986. Accessed October 14, 2018.
Bakre A., and Badrinath B. R., Handoff and system support for indirect TCP/IP, Proceedings of the Second
Usenix Symposium on Mobile & Location-Independent Computing, Ann Arbor, MI, 1995.
Bhagwat P., Perkins C., and Tripathi S., Network layer mobility: An architecture and survey, IEEE Personal
Communications, 3(3), 1996.
SMARTness and Pervasive Computing 75
Bartram L., Pervasive Computing 2: Sensors and Networks. IAT 351, Week10, Lecture 1. 2008, http://www.
sfu.ca/iat351/Lectures/IAT351-week10.pdf. Accessed October 8, 2018.
Beigl M., Krohn A., Zimmer T., and Decker C., Typical sensors needed in ubiquitous and pervasive comput-
ing, Telecooperation Office (TecO), University of Karlsruhe. Proceedings of INSS, 2004.
Birrell A. D., and Nelson B. J., Implementing remote procedure calls, ACM Transactions on Computer
Systems, 2(1), 39–59, 1984.
Bohn J., Gartner F., and Vogt H., Dependability issues of pervasive computing in a healthcare environment,
Proceedings of the First International Conference on Security in Pervasive Computing, Boppard,
Germany, 53–70, 2003.
Borg A., Blau W., and Graetsch W., Fault Tolerance Under Unix, ACM Transactions on Computer Systems,
7(1), 1989.
Borriello G., Stanford V., Narayanaswami C., and Menning W., Pervasive computing in healthcare, Proceedings
of the International Conference on Pervasive computing, 17–19, 2007.
Brewer E. A., Katz R. H., Chawathe Y., Gribble S. D., Hodes T., Nguyen G., Stemm M. et al., A network
architecture for heterogeneous mobile computing, IEEE Personal Communications, 5(5), 8–24, 1998.
Chandini N., Shekar Reddy N. C., and Bashwanth N., Pervasive computing goals and its challenges for new
epoch, International Journal of Advanced Research in Computer and Communication Engineering,
3(5), 2014.
Chen H., Finin T., Joshi A., and Kagal L., Intelligent agents meet the semantic web in smart spaces, IEEE
Internet Computing, 8, 69–79, 2004.
Cook D., and Das S., How smart are our environments? An updated look at the state of the art, Pervasive and
Mobile Computing, 3, 53–73, 2007.
Cook D. J., Youngblood M., Heierman III E. O., and Gopalratnam K., MavHome: An agent-based smart home,
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications,
521–524, 2003.
Couloris G., Dollimore J., and Kindberg T., Distributed Systems Concepts and Design, 3rd ed., Addison-
Wesley, New York, 2001.
Coyle L., Neely S., Stevenson G., Sullivan M., Dobson S., and Nixon P., Sensor fusion-based middleware for
smart homes, International Journal of Assistive Robotics and Mechatronics, 8(2), 53–60, 2007.
Cunningham R., and Cahill V., System support for smart cars: Requirements and research directions,
Proceedings of the 9th Workshop on ACM SIGOPS European Workshop: Beyond the PC: New
Challenges for the Operating System, 159–164, 2000.
Das S., Cook D., Bhattacharya A., Heierman E., and Lin T., The role of prediction algorithms in the MavHome
smart home architecture, IEEE Wireless Communications, 9, 77–84, 2004.
Davidson S. B., Garcia-Molina H., and Skeen D., Consistency in partitioned networks, ACM Computing
Surveys, 17(3), 341–370, 1985.
Decker, C., Beigl, M., Krohn, A., Kubach, U., Robinson, P., eSeal—A system for enhanced electronic asser-
tion of authenticity and integrity, International Conference on Pervasive Computing, Springer, Berlin,
Germany, 254–268, 2004.
Ebling M. R., and IBM T. J. Watson Research Center, Pervasive Computing and the Internet of Things,
Published by the IEEE CS. 1536-1268/16 © 2016 IEEE, 2016.
Estrin D., Embedding the internet, Communications of the ACM, 43, 38–39, 2000.
Estrin D., Culler D., Pister K., and Sukhatme G., Connecting the physical world with pervasive networks,
IEEE Pervasive Computing, 1(1), 59–69, 2002.
Farkas K., Heidemann J., and Iftode L., Intelligent transportation and pervasive Computing, IEEE Pervasive
Computing, 5(4), 18–19, 2006.
Flinn J., and Satyanarayanan M., Energy-aware adaptation for mobile applications, Proceedings of the 17th
ACM Symposium on Operating Systems and Principles, Kiawah Island, SC, 1999.
Fox A., Gribble S. D., Brewer E. A., and Amir E., Adapting to network and client variability via on-demand
dynamic distillation, Proceedings of the Seventh International ACM Conference on Architectural
Support for Programming Languages and Operating Systems, Cambridge, MA, 1996.
Gabriel P., and Bovenschulte M., Pervasive Computing: Trends and Impacts. Federal Office for Information
Security, Bibliographic information of the German National Library, Bundesamt für Sicherheit in der
Informationstechnik–BSI Godesberger Allee 185–189, Bonn, Germany, 2006.
76 Handbook of Industry 4.0 and SMART Systems
Garlan D., Siewiorek D., Smailagic A., and Steenkiste P., Project aura: Toward distraction-free pervasive
computing, IEEE Pervasive Computing, 1(2), 22–31, 2002.
Gray J., and Reuter A., Transaction Processing: Concepts and Techniques. Morgan Kaufman, San Mateo, CA,
1993.
Hansmann U., Pervasive Computing: The Mobile World. Springer, Berlin, Germany, 2003.
Helal S., Mann W., El-Zabadani H., King J., Kaddoura Y., and Jansen E., The gator tech smart house: A pro-
grammable pervasive space, Computer, 38, 50–60, 2005.
Henricksen K., Indulska J., and Rakotonirainy A., Infrastructure for pervasive computing: Challenges, in
Informatik, Osterreichische Computer Gesellschaft, (K. Bauknecht, W. Brauer and T. Muck eds., 214–
222), Vienna, Austria, 2001.
Holmquist L. E., Mattern F., Schiele B., Alahuhta P., Beigl M., and Gellersen H.W., Smart-its friends: A tech-
nique for users to easily establish connections between smart artefacts, International Conference on
Ubiquitous Computing, Springer, Berlin, Germany, 2001.
Holmquist L. E., Gellersen H. W., Kortuem G., Antifakos S., Michahelles F., Schiele B., Beigl M., and Mazé,
R., Building intelligent environments with smart-its, IEEE Computer Graphics, 24, 56–64, 2004.
IBM. Pervasive Computing. IBM’s pervasive computing division.
Joint A., and Baker E., Knowing the past to understand the present-issues in the contracting for cloud based
services, Computer Law and Security Review, 27, 407–415, 2011.
Kirci P., A brief summary of pervasive computing system’s main Structure, Machine Learning Research, 2(3),
110–112, 2017. doi:10.11648/j.mlr.20170203.15.
Kistler J. J., and Satyanarayanan M., Disconnected operation in the coda file system, ACM Transactions on
Computer Systems, 10(1), 3–25, 1992.
Lebeck A. R., Fan X., Zheng H., and Ellis C. S., Power aware page allocation, Proceedings of the Ninth International
Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
Logan B., Healey J., Philipose M., Tapia E. M., and Intille S. S., A long-term evaluation of sensing modali-
ties for activity recognition, Proceeding of the 9th International Conference on Ubiquitous computing
(Ubicomp 2007), 483–500, 2007.
Lupiana D., O’Driscoll C., and Mtenzi F., Defining smart space in the context of ubiquitous computing,
Special Issue on ICIT 2009 Conference—Web and Agent Systems, Dublin Institute of Technology,
Dublin, Ireland, 2009.
Lynch N. A., and Patt-Shamir B., Distributed Algorithms, Lecture Notes for 6.825, San Francisco, CA:
Morgan Kaufmann Publishers Inc., 1993.
Mousa A. A., Ubiquitous/Pervasive Computing, Ecommerce Technical Support Systems Manager, 2(10), 2013.
Mozer M., The neural network house: An environment that adapts to its inhabitants. Presented at Proceedings
of the American Association for Artificial Intelligence Spring Symposium on Intelligent Environments,
AAAI Press, Menlo Park, CA, 1998.
Mullender S. J., Distributed Systems, 2nd edition, ACM Press Frontier Series. Addison Wesley, Reading, MA,
1993.
Mummert L. B., Ebling M. R., and Satyanarayanan M., Exploiting weak connectivity for mobile file access,
Proceedings of the 15th ACM Symposium on Operating Systems Principles. Copper Mountain Resort,
CO, 1995.
Nakagawa T., Utsunomiya M., Yanagisawa G., and Tsunoda F., Study on new value creation for a ubiqui-
tous society, Special edition paper, JR EAST technical review-no. 9, Frontier Service Development
Laboratory, Research and Development Center of JR East Group, 2011, https://www.jreast.co.jp/e/develop-
ment/tech/pdf_9/Tec-09-17-27eng.pdf. Accessed October 10, 2018.
Needham R. M., and Schroeder M. D., Using encryption for authentication in large networks of computers,
Communications of the ACM, 21(12), 993–999, 1978.
Noble B. D., Satyanarayanan M., Narayanan D., Tilton J. E., Flinn J., and Walker K. R., Agile application-
aware adaptation for mobility, Proceedings of the 16th ACM Symposium on Operating Systems
Principles, Saint-Malo, France, 1997.
Norman D. A., The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is so Complex,
and Information Appliances Are the Solution, MIT Press, Cambridge, MA, 1998.
Obaidat M. S., Denko M., and Woungang I., Pervasıve Computıng and Networkıng, John Wiley & Sons,
Hoboken, NJ, 2011.
SMARTness and Pervasive Computing 77
Raychoudhury V., Cao J., Kumar M., and Zhang D., Middleware for pervasive computing: A survey, Pervasive
and Mobile Computing, 9(2), 177–200, 2013.
Remijn L., Pervasive (sensor) computing, a new disruptive paradigm shift. Whitepaper Pervasive—HR—
Creating 010, Rotterdam University of Applied Sciences, 2013, http://creating010.com/wp-content/
uploads/2013/04/whitepaper_Pervasive_HR.pdf. Accessed October 6, 2018.
Robinson B., Trust context spaces: An infrastructure for pervasive security in context-aware environments,
Conference on Security in Pervasive Computing, 2003.
Royer E. M., and Toh C. K., A review of current routing protocols for Ad Hoc mobile wireless networks, IEEE
Personal Communications, 6(2), 1999.
Saha D., and Mukherjee A., Pervasive computing: A paradigm for the 21st century, Computer, 36(3), 25–33, 2003.
Saltzer J. H., Reed D. P., and Clark D. D., End-to-end arguments in system design, ACM Transactions on
Computer Systems, 2(4), 1984.
Sani A., Rajab M., Foster R., and Hao Y., Antennas and propagation of implanted RFIDs for pervasive health-
care applications, Proceedings of the IEEE, 98, 1648–1655, 2010.
Satyanarayanan, M., A survey of distributed file systems, in Annual Review of Computer Science (J.F. Traub,
B. Grosz, B. Lampson and N. J. Nilsson, N.J eds.), Annual Reviews, Palo Alto, CA, 1989.
Satyanarayanan M., Fundamental challenges in mobile computing, Proceedings of the Fifteenth ACM
Symposium on Principles of Distributed Computing, Philadelphia, PA, 1996.
Satyanarayanan M., Pervasive computing: Vision and challenges, IEEE Personal Communications, 8(4),
10–17, 2001.
Satyanarayanan M., A catalyst for mobile and ubiquitous computing, IEEE Pervasive Computing, 1(1), 2–5,
2002.
Schilit B., Adams N., and Want R., Context-aware computing applications, Proceedings of the IEEE Workshop
on Mobile Computing Systems and Applications, 1994.
Spreitzer M., and Theimer M., Providing location information in a ubiquitous computing environ-
ment, Proceedings of the 14th ACM Symposium on Operating System Principles, 1993.
Stanford V., Garofolo J., Galibert O., Michel M., and Laprun C., The NIST smart space and meeting room
projects: Signals, acquisition, annotation and metrics, Proceedings ICASSP 2003 in Special Session on
Smart Meeting Rooms, 4, IV-736-9, 2003.
Streitz N., and Nixon P., The disappearing computer, Communications of the ACM, 48, 33–35, 2005.
Strom R. E., and Yemini S., Optimistic recovery in distributed systems, ACM Transactions on Computer
Systems, 3(3), 204–226, 1985.
Szewcyzk S., Dwan K., Minor B., Swelove B., and Cook D., Annotating smart environment sensor data for
activity learning, Technology and Health Care, 17(3), 161–169, 2009.
Tait C. D., and Duchamp D., An efficient variable-consistency replicated file service, Proceedings of the
USENIX File Systems Workshop, Ann Arbor, MI, 1992.
Terry D. B., Theimer M. M., Petersen K., Demers A. J., Spreitzer M. J., and Hauser and C. H., Managing update
conflicts in a weakly connected replicated storage system, Proceedings of the 15th ACM Symposium on
Operating Systems Principles, Copper Mountain Resort, CO, 1995.
Tilak S., Abu-Ghazaleh B., and Heinzelman W., A taxonomy of wireless micro-sensor network models.
Mobile Computing and Communications Review, 6, 28–36, 2002.
Turban E., Rainer R. K., and Potter R., Chapter 6: Mobile, wireless, and pervasive computing, Introduction to
Information Technology (608 Pages), 3rd edition, 2005. https://www.wiley.com/college/sc/trp/ch06.pdf.
Accessed October 7, 2018.
Vasseur J. P., and Dunkels A., Interconnecting Smart Objects with IP. The Next Internet, Morgan Kaufmann
Publishers is an Imprint of Elsevier, Amsterdam, the Netherlands, 2010.
Voelker G. M., and Bershad B. N., Mobisaic: An information system for a mobile wireless computing envi-
ronment. Proceedings of the Workshop on Mobile Computing Systems and Applications, Santa Cruz,
CA, 1994.
Want R., Hopper A., Falcao V., and Gibbons J., The active badge location system, The ACM Transactions on
Information Systems, 10 (1), 91–102, 1992.
Want R., Schilit B., Adams N., Gold R., Petersen K., Golberg D., Ellis J., and Weiser M., The parcTab
ubiquitous computing experiment, Kluwer International Series in Engineering and Computer Science,
45–97, 1995.
78 Handbook of Industry 4.0 and SMART Systems
Ward A., Jones A., and Hopper A., A new location technique for the active office, IEEE Personal
Communications, 4(5), 42–47, 1997.
Weiser M., The computer for the twenty-first century, Scientific American, 3(265), 94–104, 1991.
Weiser M., Welch B., Demers A., and Shenker S., Scheduling for reduced CPU energy, Proceedings of the First
USENIX Symposium on Operating System Design and Implementation. Monterey, CA, 1994.
Ye J., Dobson S., and Nixon P., An Overview of Pervasive Computing Systems, 2009.
Ying-Qun Y., Xiao-Dong C., On the instability of slotted ALOHA with capture, IEEE Transactions on
Wireless Communications, 5(2), 257–261, 2006.
York J., and Pendharkar P. C., Human–computer interaction issues for mobile computing in a variable work
context, International JournalHuman-Computer Studies, 60, 771–797, 2004.
Youssef A., Towards pervasive computing environments with cloud services, International Journal of Ad hoc,
Sensor & Ubiquitous Computing (IJASUC), 4(3), 1–9, 2013.
Zaharakis I. D., and Komninos A., Ubiquitous computing—A multidisciplinary endeavour, IEEE Latın
Amerıca Transactıons, 10, 1850–1852, 2012.
Zsaslavsky A., Smartness of Pervasive Computing Systems Through Context-Awareness, Luleå University of
Technology, Sweden, ruSmart’ 2008; Saint Petersburg, Russia, 2008.
3
The Industry 4.0 Architecture and
Cyber-Physical Systems
CONTENTS
3.1 Cyber-Physical Systems (CPSs)..................................................................................................... 81
3.1.1 Introduction..................................................................................................................... 81
3.1.2 Concept and Characteristics of Cyber-Physical Systems............................................... 82
3.1.2.1 Concept............................................................................................................ 82
3.1.2.2 Characteristics.................................................................................................. 84
3.1.3 Research on CPS Architecture....................................................................................... 85
3.2 CPS 5C Level Architecture........................................................................................................... 88
3.2.1 Smart Connection............................................................................................................ 89
3.2.2 Data-to-Information Conversion..................................................................................... 89
3.2.3 Cyber............................................................................................................................... 89
3.2.4 Cognition......................................................................................................................... 90
3.2.5 Configuration.................................................................................................................. 90
3.3 Implementation of 5C CPS Architecture in Factories................................................................... 90
3.3.1 CPS-Based Smart Machines........................................................................................... 91
3.4 Adaptive Clustering for Self-Aware Machine Analytics............................................................... 94
3.4.1 Similarity-Based Clustering for Machine Condition and Working Regimes.................. 94
3.4.2 Prognostics of Machine Health under Complex and Multi-regime Conditions............. 95
3.5 Classic Applications of CPS.......................................................................................................... 96
3.6 Classification of CPS in Context of Industry 4.0........................................................................... 98
3.6.1 Building Blocks of Industry 4.0: Cyber-Physical Systems............................................. 99
3.6.2 Cyber-Physical Systems (CPS) in Industry 4.0 Vision................................................... 99
3.6.3 Cyber-Physical Systems: Summary of Key Characteristics......................................... 100
3.7 Operational Technology and Information Technology.................................................................101
3.7.1 OT Support.....................................................................................................................101
3.7.2 IT Support......................................................................................................................101
3.8 IT and OT Convergence in Industrial IoT................................................................................... 103
3.8.1 IT and OT: A Disappearing Distinction....................................................................... 104
3.8.2 How Does IoT Bring IT and OT Together?.................................................................. 104
3.8.2.1 When Worlds Collide—Industrial Internet of Things................................... 104
3.8.2.2 New Concerns for Both Sides........................................................................ 105
3.8.2.3 Finding Common Ground.............................................................................. 106
3.9 Data and Optimization across the Value Chain: IT, OT and Cyber-Physical Systems in
“Smart Anything”....................................................................................................................... 106
3.10 Industry 4.0 Principles: Horizontal and Vertical Integration...................................................... 108
3.10.1 Horizontal Integration in Industry 4.0.......................................................................... 108
3.10.2 Vertical Integration in Industry 4.0............................................................................... 109
3.11 Basic Functions and Uses of CPS.................................................................................................110
3.12 Practical Example of a Cyber-Physical System: The Self-Modifying Machine..........................112
79
80 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLES
TABLE 3.1
Comparison of Today’s Factory and an Industry 4.0 Factory
Today’s Factory Industry 4.0
Data
Source Attributes Technologies Attributes Technologies
Component Sensor Precision Smart sensors and fault Self-aware Degradation
detection Self-predict monitoring &
remaining useful life
prediction
Machine Controller Producibility & Condition-based Self-aware Uptime with predictive
performance monitoring & diagnostics Self-predict health monitoring
Self-compare
Production Networked Productivity & Lean operations: work and Self-configure Worry-free productivity!
system system overall waste reduction Self-maintain
equipment Self-organize
effectiveness
Source: From Lee, J. et al., A cyber-physical systems architecture for industry 4.0-based manufacturing systems, NSF
Industry/University Cooperative Research Center on Intelligent Maintenance Systems (IMS), University of
Cincinnati, Cincinnati, OH, 2014.
82 Handbook of Industry 4.0 and SMART Systems
Cyber-physical system is in the initial stage of development. For it to reach its full potential in the
industry, it is essential to clearly define its structure and methodology. With this in mind, a unified system
framework has been designed for general applications. Corresponding algorithms and technologies have
been proposed at each system layer to collaborate with the unified structure to achieve enhanced equip-
ment efficiency, reliability and product quality (Lee et al., 2014).
1. Design, analyze, and verify components at various levels of abstraction, including the system
and software architecture levels, subject to constraints from other levels;
2. Analyze and understand interactions between the vehicle control systems and other subsystems
(engine, transmission, steering, wheel, brake and suspension);
3. Ensure safety, stability, and performance while minimizing vehicle cost to the consumer. New
functionality and the cost of vehicle control systems are increasingly becoming major differen-
tiating factors in the business viability of automobile manufacturing.
Cyber-physical systems is an emerging research area that involves the overlapping and integration of
multiple fields of science and engineering; computer scientists and network professionals must collabo-
rate closely with experts in many different fields such as automation and control, civil engineering,
The Industry 4.0 Architecture and Cyber-Physical Systems 83
mechanical engineering and biology. Therefore, definitions of CPS mostly reflect the perspective of the
scholars positing them (Liu et al., 2017).
Lee defines CPS as the integration of computational and physical processes, with embedded computer
and networks monitoring and controlling the physical processes. Physical processes affect computations
by feedback loops and vice versa (Lee, 2007). In another study, He regards CPS as controllable, credible
and scalable networked physical equipment systems, an in-depth integration of computation, communi-
cations and control ability on the basis of environmental perception (He, 2010). Finally, Liu et al. (2017)
say that through the feedback loop of mutual effects between computing processes and physical pro-
cesses, in-depth integrations and real-time interactions increase or expand the function of networks and
physical systems and monitor or control a physical entity in a safe, reliable, efficient and real-time way.
The service-oriented architecture of CPS is shown in Figure 3.1.
Gonzalez et al. (2008) propose that CPS is a network physical engineering system, which monitors and
controls the operations of physical system through computation. The US Defense Advanced Research
Projects Agency says the physical network system refers to systems whose functions are largely derived
from software and electromechanical systems. In fact, all defense systems (such as aircraft, spacecraft,
naval vessels, ground vehicles, etc.) and their subsystems are CPS. Integrated circuits, microelectrome-
chanical systems and nanoelectromechanical systems are also types of CPS (Liu et al., 2017).
Wireless sensor networks (WSNs) and the Internet of Things (IoT) are different. Wireless sensor net-
work senses a signal but does not necessarily identify a specific object out of many objects being sensed.
It emphasizes the perception of information and provides data support for a variety of specific applica-
tions through data collection, processing, integration and routing.
IoT interconnects Internet information sensing devices such as wireless sensors and radio-frequency
identification (RFID) through wireless networks and Internet technology; it is a new type of network
that can realize the overall perception, reliable transmission and intelligent processing of information.
In contrast, CPS is a controllable, credible and scalable network system; it integrates computing, com-
munication and control on the basis of information acquisition in IoT. Through the feedback loop of the
interaction between the calculation process and the physical process, deep integration and real-time
interactions are realized to increase or to extend a new function, so that a physical entity can be detected
or controlled in a safe, reliable, and efficient way. The IoT generally has a perception, but no or just
simple control of the physical world, while CPS not only has the ability to sense the physical world, but
also possesses the ability to control. Its requirement of computing capability for equipment far exceeds
that of IoT and WSN (Liu et al., 2017).
To sum up, CPS features a tight combination of and coordination between network systems and
physical systems. By organic integration and in-depth collaboration of computation, communications
and control (3C) technology, CPS can realize the real-time sensing, dynamic control and information
FIGURE 3.1 Service-oriented architecture of CPS. (From Liu, Y. et al., IEEE/CAA J. Autom. Sinica, 4, 27–40, 2017.)
84 Handbook of Industry 4.0 and SMART Systems
FIGURE 3.2 System integration of CPS. (From Liu, Y. et al., IEEE/CAA J. Autom. Sinica, 4, 27–40, 2017.)
services of large engineering systems. The term CPS also refers to distributed heterogeneous systems
that contain network systems and physical systems with different functions; in addition, the structure
and function vary among their subsystems and are distributed in different geographic scopes. Wired or
wireless communications are needed for subsystems to coordinate. Cyber-physical system integration is
shown in Figure 3.2.
3.1.2.2 Characteristics
Cyber-physical system interacts with physical systems through networks; the end system of a CPS is
normally a centralized and tightly coupled embedded computing system, which contains a large number
of physical systems composed of intelligent wireless sensors (Liu et al., 2017). CPS has the following
characteristics:
1. Physical system: This includes physical system design such as hardware design, energy man-
agement, hardware size and connectivity encapsulation and system testing. Engineers and
scientists in this field have a deep understanding of mechanics, electronics, biology and chem-
istry; they understand the technical characteristics of sensors, and they know how to process
measurement data using signal processing technology. Every physical system has its own net-
work characteristics, a maximized multilevel network coverage, a variety of complex tempo-
ral and spatial scales to meet the time requirements of different tasks and a high degree of
automation.
2. Information system: The information in physical system engineering can be transformed into
the rules and models of a software system. The most basic task is to reach a balance among
factors such as real-time system, network system, file system, hierarchical storage system,
memory management, modular software design, concurrent design and formal verification.
3. Integration of heterogeneous systems: CPS are heterogeneous distributed systems featuring the
integration and interaction of information systems and physical systems.
4. Security, real-time capability and predictability: Because network systems and physical system
are open, invasions, tampering, counterfeiting and other malicious attacks may occur, as well
as delays in network transmission. Cyber-physical system must be able to offer credibility,
security, validity, real-time capability, dynamism and predictability. For credibility, the iden-
tity of information-collecting sources or control instruction senders must be authenticated, and
the receiver must be able to determine the real identity of the sender to prevent counterfeiting.
Security requires the encryption and decryption of sent or received information, and the pri-
vacy of information must be protected. For validity, the accuracy of processing, as well as the
The Industry 4.0 Architecture and Cyber-Physical Systems 85
validity and integrity of information or instructions sent, must be guaranteed to prevent uncer-
tainties and noise in CPS processing from affecting the system’s processing accuracy. Real-
time capability means collected information or instructions must be transmitted in a timely
manner to meet the real-time requirements of task processing. Dynamism includes dynamic
reorganization and reconfiguration, automatically adjusting rules and generating commands
based on the task requirements; it also includes changes in external environments to eliminate
bias and meet task requirements according to preset rules. With predictability, CPS resource
allocation strategy can reasonably allocate resources to multiple competing real-time tasks at
any moment and in any case, so that the real-time requirements of every real-time task can be
satisfied.
1. Sensor networks: Acquire real-time data through a variety of sensors and embedded sys-
tems; conduct analog-to-digital conversion of collected data and other processes, includ-
ing data encryption and data integration through collection nodes; protect the security of
data transmission (privacy, integrity and non-repudiation); reduce the network energy con-
sumption by energy management; apply real-time data protection technology to real-time
processing.
2. Next-generation network systems: Deploy anti-hacking and defense technology against
a variety of network attacks; ensure the safety of data transmission with high-performance
encryption algorithms and certification authority (CA) authentication technology; realize rapid
exchange of data transmission by optimizing existing routing algorithms; change the existing
network system structure through “best efforts” to provide real-time network transmission
services.
3. Data center: Stores data transmitted by sensor networks through next-generation network sys-
tems; checks authenticity and integrity of received data and stores data if they pass inspection,
otherwise sends a message to control center (control center then sends control signals to the
actuator who notifies the sensor network nodes to collect data again); conducts routine mainte-
nance of the database; responds to instructions sent by control center, such as query; performs
regular emergency treatments to prevent database from collapse.
86 Handbook of Industry 4.0 and SMART Systems
FIGURE 3.3 Architecture of CPS. (From Liu, Y. et al., IEEE/CAA J. Autom. Sinica, 4, 27–40, 2017.)
The Industry 4.0 Architecture and Cyber-Physical Systems 87
4. Control center: Receives inquiry instructions sent by users; sends query command to data
center after identity authentication; categorizes the query results according to control strate-
gies; reports back to the user if queries meet the requirements, otherwise determines the
location of the node by node positioning technology and sends control instructions to actua-
tors for corresponding processing; conducts forecast analysis and performance analysis of
CPS behavior through data mining technology and uncertainty processing technology; detects
network and node failure through fault diagnosis technology and conduct corresponding pro-
cessing; ensures the real-time control processing of CPS through real-time control technol-
ogy. It should be noted that control center configuration policy can be dynamically adjusted
according to users’ needs.
5. Actuator networks: Receive control instructions from control center; send control instructions
to corresponding nodes.
6. System user: Communicates with CPS; sends inquiry instructions to control center; receives
feedback data; can send definitions and revised control strategies to control center to be exe-
cuted. System users include a variety of WEB servers, individual hosts and external devices.
In this model, CPS runs under closed-loop control; the model considers real-time capability, security and
system performance so that it can preliminarily meet future CPS requirements.
Some scholars have studied the system architecture of CPS from different application perspectives
(Liu et al., 2017). For example, Sun et al. (2007) argue that the advanced power grid is a complex real-
time system with network and physical components. Each part may function well independently, but
not when they are combined, because the interference may cause errors, for example, the violation of
Nyquist rate in the frequency domain. They propose using RT-Promela to build a model that can repre-
sent frequency interference and use the real-time interference of real-time sensor protocol for informa-
tion via negotiation detection to test the accuracy of CPS components. The model solves the problem
of multiple clock variables in collaboration processing caused by a lack of real-time and asynchronous
interaction of components (Sun et al., 2007).
Ilic et al. (2010) established a CPS energy system dynamic model with distributed sensing and
control and discussed the process of information exchange between components in this model; they
also discussed using the model to develop interactive protocols between an embedded system control
terminal and a network system (Ilic et al., 2010). In another study, He built a coordination framework
based on the perception of model and future energy system control. He also improved the opera-
tion of complex power system using data mining techniques and new sensor technologies (He, 2010).
Unfortunately, these studies can only be applied in power systems and do not have enough versatility
(Liu et al., 2017).
An actuator network is composed of a plurality of actuator units and control nodes. Control nodes are
responsible for receiving the control command from the control center and sending commands to one or
more specific actuator unit for execution, so that certain physical attributes of the physical world can be
adjusted and controlled. To solve the problem of the collaborative design of feedback control and sched-
uling, Zhang et al. discuss a method of scheduling when several actuators are controlled by a controller
(single processor) to achieve a balance between the time delay and the control performance by adopting
off-line and online strategies, respectively. However, the method only considers the physical system, i.e.,
the control part, and ignores the information system (Zhang et al., 2008a). Tan et al. (2010) study the archi-
tecture of CPS and propose a CPS system model adopting an event-driven real-time scheduling scheme,
which solves the problem of real-time task scheduling in the sensor nodes periodic task model and the
actuator event-triggered task model. However, the authors do not provide experimental verification; thus,
the system running efficiency is not verified (Tan et al., 2010). Zhang et al. (2008b) propose to simultane-
ously process periodic and non-periodic events in CPS-oriented real-time middleware, and they suggest
the corresponding algorithms of access control and load balancing, but they do not analyze the time cost
of middleware services. Finally, the random server concept proposed by Faggioli et al. (2010) performs
88 Handbook of Industry 4.0 and SMART Systems
well in processing event-triggered random tasks and meets time predictability requirements, but there are
deficiencies in the processing mechanism if there is time overhead or server overload (Liu et al., 2017).
Cyber-physical system has strict requirements for real-time capability and the abstraction of physical
awareness. As system components might need synchronous or asynchronous interaction with the physi-
cal world, a global reference time is fundamental for all CPS components to communicate and work
properly.
Information and events of physical systems are abstractions of system components, and the objects
abstracted have a life cycle. Different system components can have different credibility and reliability
for different input sources according to individual preferences, experiences and knowledge. Thus, the
abstraction of the same input events may produce completely different outputs because of the different
system components. Therefore, CPS must have unified time, trust quantification and communication
mechanisms at the system level.
Tan puts forward a CPS architectural prototype using aspects of the global reference time, information-
driven events, trust quantification, publish or subscribe plans, control semantics and network technology.
In this architectural prototype, an advanced control unit adopts a tight coupling sensor and actuator
mechanism and conducts precise real-time control at the system level to ensure the validity of the control
loop (Tan et al., 2008). However, the prototype does not solve problems such as how to publish a sched-
uling plan or how to define event models and information models in large-scale heterogeneous CPS.
Crenshaw et al. (2007) design plants controlled by external association, executive control equipment and
domain models to estimate the state of plants; they create a simple reference model that satisfies security
requirements.
In CPS, it is difficult to realize real-time predictability to control physical systems. To enhance the sus-
tainability and predictability of CPS, Lin and Panahi (2010) study real-time service-oriented architecture
(SOA) and establish a real-time service-oriented architecture enterprise service bus model. They use
real-time SOA middleware services to establish a service accountability mechanism and a real-time
global resource management service process (Lin and Panahi, 2010). Because of the limitations of ser-
vices and known resources, the authors adopt the method of reserving resources and using middleware
to monitor the performance of every service in the process in advance to ensure real-time prediction.
Pasqualetti et al. (2013) propose a model and method of automatically extracting cyber-physical systems
using a custom programming language; it can be applied to temperature sensors with fault tolerance.
However, the model lacks versatility because the abstraction accuracy of the automatic processing is
not considered, and the scope of application is limited (Liu et al., 2017).
Cyber-physical system research is limited by the specific application environment, the development
environment and the theoretical system in question. Most existing system models were established spe-
cifically for different local applications and do not consider the correlation of various demands and
restrictions in CPS networks. As there is no mature global system model, further research is necessary
(Liu et al., 2017).
1. Advanced connectivity ensures real-time data acquisition from the physical world and informa-
tion feedback from cyberspace;
2. Intelligent data management, analytics and computational capability construct cyberspace.
However, these requirements are abstract and not specific enough for implementation. In contrast, the 5C
architecture clearly defines, in a sequential workflow manner, how to construct CPS from the initial data
acquisition, to the analytics, to the final value creation. Figure 3.4 outlines the 5C architecture.
The Industry 4.0 Architecture and Cyber-Physical Systems 89
FIGURE 3.4 5C architecture to implement CPS. (From Lee, J. et al., A cyber-physical systems architecture for indus-
try 4.0-based manufacturing systems, NSF Industry/University Cooperative Research Center on Intelligent Maintenance
Systems (IMS), University of Cincinnati, Cincinnati, OH, 2014.)
3.2.3 Cyber
The cyber level is a central information hub, with information pushed to it from every connected machine.
Massive amounts of information are gathered; thus, specific analytics have to be used to extract relevant
information on the status of individual machines. With these analytics, the performance of a single
machine can be compared with others in the fleet and rated accordingly. In addition, similarities between
machine performance and the performance of previous assets (historical information) can be measured
to predict future behavior (Lee et al., 2014).
90 Handbook of Industry 4.0 and SMART Systems
FIGURE 3.5 Applications and techniques associated with each level of the 5C architecture. (From Lee, J. et al., A cyber-
physical systems architecture for industry 4.0-based manufacturing systems, NSF Industry/University Cooperative
Research Center on Intelligent Maintenance Systems (IMS), University of Cincinnati, Cincinnati, OH, 2014.)
3.2.4 Cognition
Implementing CPS on this level generates a thorough knowledge of the monitored system. Proper pre-
sentation of the acquired knowledge to expert users will lead to the correct decision. As comparative
information and individual machine status are both available, it is possible to determine the priority of
tasks and optimize the maintenance process. Proper info-graphics are necessary to completely transfer
acquired knowledge to users (Lee et al., 2014).
3.2.5 Configuration
The configuration level features feedback from cyberspace to physical space. This level acts as a supervisory
control system or a resilience control system. The machines self-configure and self-adapt, and the corrective
and preventive decisions made in the cognition level are applied to the monitored system (Lee et al., 2014).
FIGURE 3.6 Flow of data and information in a CPS-enabled factory based on 5C CPS architecture. (From Lee, J.
et al., A cyber-physical systems architecture for industry 4.0-based manufacturing systems, NSF Industry/University
Cooperative Research Center on Intelligent Maintenance Systems (IMS), University of Cincinnati, Cincinnati, OH,
2014.)
FIGURE 3.7 Overall CPS setup for band saw machines. (From Lee, J. et al., Industrial big data analytics and cyber-
physical systems for future maintenance & service innovation, The Fourth International Conference on Through-
life Engineering Services, NSF I/UCRC Center for Intelligent Maintenance Systems (IMS), University of Cincinnati,
Cincinnati, OH, 3–7, 2015.)
At the conversion level, the industrial computer performs feature extraction and data preparation.
The feature extraction consists of extracting conventional time domain and frequency domain features,
such as RMS, kurtosis, frequency band energy percentage and so on, from vibration and acoustic signals.
Calculated features, along with other machine state data, are sent through Ethernet or a Wi-Fi network
to the cloud server where the feature values are managed and stored in the database (Lee et al., 2015).
At the cyber level, the cloud server applies an adaptive clustering method to segment the blade perfor-
mance history (from installation to the present time) into discrete working regimes based on the relative
change of the features compared to the normal baseline and the local noise distribution (see Figure 3.8).
The adaptive clustering method compares the current values of the features with the baseline and historical
working values. It identifies the most suitable cluster from the history to match with the present working
condition. If no suitable cluster is found, the algorithm generates a new cluster as a new working regime and
generates related health models for that regime. If the same working condition happens again, the algorithm
has its signatures in memory and will automatically cluster the new data into that specific working regime
(Yang et al., 2015).
The health stages can be further utilized at the cognition level and configuration level for optimization
purposes. For example, when the blade is new, a higher cutting speed can be used for high productivity
without hampering the quality, while after a certain amount of degradation has been detected, a more
moderate cutting should be applied to ensure quality. To help in the decision-making process, Web and
iOS-based user interfaces have been developed so that the health information of each connected machine
tool can be accessed in real time (see Figure 3.9) (Lee et al., 2015).
Cyber-physical systems are becoming more common in the manufacturing industry. Managing indus-
trial big data is challenging, making a generic architecture for implementing CPS necessary. The 5C
architecture discussed here can automate and centralize data processing, health assessment and prog-
nostics. This architecture covers all necessary steps from acquiring data, processing the information,
presenting information to the users and supporting decision-making. The health information generated
The Industry 4.0 Architecture and Cyber-Physical Systems 93
FIGURE 3.8 Adaptive health state recognition for blade condition (each color represents a cluster of feature values for
a specific working regime). (From Lee, J. et al., Industrial big data analytics and cyber-physical systems for future main-
tenance & service innovation, The Fourth International Conference on Through-life Engineering Services, NSF I/UCRC
Center for Intelligent Maintenance Systems (IMS), University of Cincinnati, Cincinnati, OH, 3–7, 2015.)
FIGURE 3.9 User interface for real-time access of machine health information. (From Lee, J. et al., Industrial big data
analytics and cyber-physical systems for future maintenance & service innovation, The Fourth International Conference
on Through-life Engineering Services, NSF I/UCRC Center for Intelligent Maintenance Systems (IMS), University of
Cincinnati, Cincinnati, OH, 3–7, 2015.)
by the system can also be used for higher level functions, such as maintenance scheduling and optimized
control, to achieve higher overall system productivity and reliability. As the case study suggests, the 5C
architecture would be helpful in processing and managing a fleet of CNC sawing machines. Its applica-
tion would be equally useful in other sectors.
Integration of the 5C CPS architecture is still in its infancy, but all five levels of the architecture offer an
enormous possibility. For example, the cyber level has the potential to develop new algorithms for fleet-
level analysis of machines’ performance over distributed data management systems (Lee et al., 2015).
94 Handbook of Industry 4.0 and SMART Systems
Time
Machine
Knowledge based
for health Normal 1 Normal 2
assessment
Failure 2
Failure 1 New
Cluster
Compare with
exisng clusters
Similar
Yes cluster found No
Cluster Assign new
update Cluster
FIGURE 3.10 Adaptive clustering algorithm. (From Bagheri, B. et al., Cyber-physical systems architecture for self-aware
machines in industry 4.0 environment, Center for Intelligent Maintenance Systems, University of Cincinnati Cincinnati,
OH, 1622–1627, 2015.)
The Industry 4.0 Architecture and Cyber-Physical Systems 95
algorithm compares the latest input to the existing cluster and tries to identify one cluster that is most
similar to the input sample using a multidimensional distance measurement.
The search for a similar cluster will have one of two possible results (Bagheri et al., 2015):
1. Similar cluster found. If it is this case, the machine from which the sample has been collected
will be labeled as having the health condition defined by the identified cluster. Depending on
the deviation between the existing cluster and the latest sample, the algorithm will update the
existing cluster using new information from the latest sample.
2. No similar cluster found. In this case, the algorithm will hold its operation with the current
sample until it sees enough out-of-cluster samples. When the out-of-cluster samples exceed a
certain number, it means there is a new machine behavior that has not been modeled. The algo-
rithm will automatically create one or more new clusters to represent the new behavior.
The clustering algorithm can be very adaptive to new conditions. Moreover, the self-growing
cluster can be used as the knowledge base for health assessment in the proposed cyberspace.
With such a mechanism, different machine performance behavior can be accumulated in the
knowledge base and utilized in future health assessments.
FIGURE 3.11 Utilization matrix-based prognostics. (From Bagheri, B. et al., Cyber-physical systems architecture for
self-aware machines in industry 4.0 environment, Center for Intelligent Maintenance Systems, University of Cincinnati
Cincinnati, OH, 1622–1627, 2015.)
96 Handbook of Industry 4.0 and SMART Systems
TABLE 3.2
Stress Matrix for Rotating Machinery
High Load Low Load
High speed Degradation rate 1 Degradation rate 1
Low speed Degradation rate 1 Degradation rate 1
Source: Bagheri, B. et al., Cyber-physical systems architecture for self-
aware machines in industry 4.0 environment, Center for Intelligent
Maintenance Systems, University of Cincinnati Cincinnati, OH,
1622–1627, 2015.
For some systems, such as CNC machines, more dimensions (e.g., material hardness, machining
parameters, volume of removed material, etc.) need to be added to the stress matrix to cover all major
factors that cause degradation. After the stress matrix is defined, machine learning algorithms such as
Bayesian belief network and hidden Markov model can be used to relate the different degradation rates
observed in a fleet of equipment to the corresponding stress history. Eventually, a degradation rate as
shown in Table 3.2 can be generated and used for prediction under different usage patterns in real-world
applications (Bagheri et al., 2015).
FIGURE 3.12 CPS in an operating room. (From Rajkumar, R., CPS briefing, Carnegie Mellon University, 2007; Krogh,
B.H., Cyber Physical Systems: The need for new models and design paradigms, Presentation report, PPT, Carnegie Mellon
University, 1–31, 2015.)
FIGURE 3.13 CPS electric power grid. (From Rajkumar, R., CPS briefing, Carnegie Mellon University, 2007; Krogh,
B.H., Cyber Physical Systems: The need for new models and design paradigms, Presentation report, PPT, Carnegie Mellon
University, 1–31, 2015.)
98 Handbook of Industry 4.0 and SMART Systems
FIGURE 3.14 Integrated intelligent road with unmanned vehicles. (From Shi, J. et al., In International Conference on
Wireless Communications and Signal Processing (WCP), 1–6, 2011.)
FIGURE 3.15 Cyber-physical system in a smart factory. (From Amberg, J., Industry 4.0 and Cyber Physical Systems—
Classification and Practical Example, Managing Director of halstrup-walcher GmbH, Format Change in Machine Building,
Kirchzarten, Germany, 2015.)
Every participant in production has a virtual image and can be networked to interact with other pro-
duction participants; this is the CPS we have been discussing in the previous sections. “Cyber” refers to
the virtual image, and “physical” refers to the object that can be perceived.
As shown in Figure 3.15, CPS interact among each other; information is provided, and high-level
recipients and decision-makers, from local machine operators to external customers and suppliers, are
integrated. For example, a tool itself may notice the first signs of wear and tear and order its own replace-
ment from external tool suppliers (Amberg, 2015).
FIGURE 3.16 Industry 4.0: organization and control in the lifecycle of products (a) CPS as a basis and enabler/CPS with
new capacities and smart x; (b) CPS: a system, an evolution (i-SCOOP (a)).
It is noted that there is a difference between CPS and cyber-physical manufacturing systems or cyber-
physical production systems (CPSS), as the latter two are more technological and have a less important
process and application dimension (i-SCOOP (a)).
To sum up, the key characteristics of CPS are the following (i-SCOOP (a)):
3.7.2 IT Support
Software tools are crucial to operating the Industry 4.0 smart factory. Figure 3.17 depicts the well-known
pyramid structure of modern production systems (Rojko, 2017), each with its own software support.
The ERP tool is implemented on the business level, at the top of the pyramid. Enterprise resource plan-
ning supports enterprise-wide planning such as business planning, SCM, sales and distribution, account-
ing, human resource management and so on. Usually, commercially available solutions are implemented.
A leading solution is Systems, Applications and Products in data processing (SAP), developed by the
German company SAP SE. Most available ERP solutions do not support fast adaptation in production
planning when unplanned events occur (Rojko, 2017).
102 Handbook of Industry 4.0 and SMART Systems
FIGURE 3.17 Pyramid structure of modern production systems and accompanying software. (Form Rojko, A., Industry 4.0
Concept: Background and Overview, ECPE European Center for Power Electronics e. V., Nuremberg, Germany, 11, 2017.)
An MES is used on the second level of the pyramid. These software applications support production
reporting, scheduling, dispatching, product tracking, maintenance operations, performance analysis,
workforce tracking, resource allocation and so on. Manufacturing execution system covers aspects such
as management of the shop floor and communication with the enterprise (business) systems. Most of the
software solutions available on the market are centralized and not distributed to the shop floor. This is a
major limiting factor when flexibility is needed because of the dynamics of customers’ orders and/or the
changing production environment, including shop floor configuration.
The next operative level is the process level control; here SCADA control system software is
common.
The bottom level of the pyramid is the machine or device level. Unlike the top two layers, this level
has a naturally distributed control level (Rojko, 2017). Software includes PLCs, robot controllers and
other controllers.
Enterprise resource planning and MES tools represent basic software in the company and have been
used for many years. They typically have a modular structure and are centralized in their operation; thus,
they have limited capability for dynamic adaptation of the production plan (Bratukhin and Sauter, 2011).
Nevertheless, already implemented conventional ERP and MES systems should not be seen as obstacles
to the introduction of the Industry 4.0 concept. In fact, the introduction of a common MES tool requires
an advanced IT infrastructure on the shop floor level, and this is a precondition for further development
toward smart factory (Rojko, 2017).
The next important issue is the integration of information available in ERP, MES and other soft-
ware tools used in the company, such as customer–relationship management or business intelligence.
Problems such as database integration and communication protocols still need to be resolved (Bratukhin
and Sauter, 2011).
In short, for Industry 4.0, the classic pyramid structure is not flexible enough to adapt to dynamic
changes. A distributed MES solution, where most of the functions are decentralized, may be more suit-
able for reconfigurable production systems (see Figure 3.18). For full support of reconfigurable systems,
however, a continuous flow of information (vertical and horizontal integration) between all elements
must be realized (Rojko, 2017).
The Industry 4.0 Architecture and Cyber-Physical Systems 103
FIGURE 3.18 Industry 4.0 structure of IT support and operative level control. (Form Rojko, A., Industry 4.0 Concept:
Background and Overview, ECPE European Center for Power Electronics e. V., Nuremberg, Germany, 11, 2017.)
FIGURE 3.20 IT and OT meet and converge in industrial Internet of Things (i-SCOOP (b)).
The scope of Industrial Internet has exploded into more general Internet connectivity, as opposed to
the historically closed systems that relied on physical security to ensure integrity. With the shift from
closed to open systems comes an even greater interdependence and overlap between OT and IT, along
with new security concerns (Desai, 2016).
• Identifying and authenticating all devices and machines within the system, both in manufac-
turing plants and in the field, to ensure only approved devices and systems are communicating
with each other. This would mitigate the risk of a hacker inserting a rogue, untrusted device
into the network and taking control of any systems or machines.
• Encrypting all communications between devices to ensure the privacy of the data being transmitted.
• Ensuring the integrity of the data generated from these systems. Smart analytics are a major
driver in the adoption of the industrial Internet, but those analytics are worthless if the data are
inaccurate.
• Enabling the ability to perform remote upgrades down the road, if the manufactured goods
contain software or firmware themselves, and ensuring the integrity of those updates.
The separation of OT and IT will continue to disappear. In the meantime, each side must consider the
other’s expertise and point of view and work together to achieve the ultimate goal—a secure, productive
Industrial Internet (Desai, 2016).
Industry 4.0 builds upon data models and data mapping across the product lifecycle and value stream.
All the technologies in Industry 4.0 need to be integrated. As discussed in previous sections, the first
integration (or convergence) is IT and OT. Without IT and OT convergence, there is no industrial trans-
formation. The essence of IT and OT convergence revolves around data and data systems, processes and
people or teams.
The IoT is an essential part of this process. In fact, it is safe to say that Industry 4.0 is only pos-
sible because of IoT, as the convergence of IT, OT and their backbones essentially boils down to an
advanced and enhanced application of Internet, IT technologies and IT infrastructure impacted by IoT
data (cloud infrastructure, server infrastructure, storage and edge infrastructure, etc.) (i-SCOOP (a)) (see
Figure 3.21).
FIGURE 3.21 Industry 4.0: the convergence of IT, OT and cyber-physical systems (i-SCOOP (a)).
108 Handbook of Industry 4.0 and SMART Systems
This type of thinking is still in its infancy; whether it concerns product data or information about other
processes across the horizontal value chain (e.g., the path from supplier and production to end customer
and/or other stakeholders or partners), there is still work to do. Nevertheless, it is critical for Industry 4.0
and for business overall.
The benefits and drivers of horizontally connected information systems are comparable to those in
information management, as are the disadvantages if systems are not integrated. Both are concerned with
customer service and satisfaction (with many customers in supply chains), planning, employee productiv-
ity and satisfaction, speed and so forth. Consider the information management challenges in an insurance
scenario: if back-office information on, for instance, a claims process, is not connected with the front
end, customer service agents can’t help the customer fast enough if he or she seeks information or help
on the status of the process. It’s exactly the same in Industry 4.0 and manufacturing. We just have more
stakeholders, more highly interdependent processes and stakeholders, far more processes and data.
Horizontal integration helps with horizontal coordination, collaboration, cost savings, value creation,
speed as an enabler of smooth service and operations, faster time to market and worker efficiency, and
helps to create horizontal ecosystems of value, based on information (Figure 3.23).
FIGURE 3.23 Horizontal integration in Industry 4.0/Horizontal ecosystems of value, based on information (i-SCOOP (a)).
110 Handbook of Industry 4.0 and SMART Systems
planning, quality management and so on; the enterprise planning level includes order management and
processing, bigger overall production planning and so on (Figure 3.24).
Typical solutions and technologies in vertical integration include PLCs, which control manufacturing
processes at the control level; SCADA, which enables various production process level and supervisory
tasks in ICS; MES at the management level; intelligent ERP at the enterprise level, the highest level in the
hierarchy. As mentioned earlier, MES plays a central role in the first stages of Industry 4.0 transforma-
tion as the digital hub of information and connectivity.
The three subsystems enable CPS to assume its new role include sensors, actuators and embedded sys-
tems and a microprocessor-based, decentralized intelligence. The CPS can record its current situation in
the environment with the aid of integrated sensors. For example, a machine’s optical sensors can supply
comprehensive information about the type and state of the workpieces to be processed. Actuators are
used to execute actions. For example, a grappler that picks the selected workpieces is extended. At the
same time, the decentralized intelligence evaluates the sensor information, as well as information flow-
ing in from other CPS. Based on this, it makes its decisions and passes these on to its own actuators.
At the same time, it contacts other CPS and prompts these to action.
The virtual image of CPS is not simply a snapshot of the current status and links. It also includes
information about the entire lifecycle.
Even in the design phase, information emerges on geometry, mechanical properties, logical connec-
tions and sets of parameters. All other life cycle phases such as engineering, start-up and operation,
including maintenance and service, provide additional information. Based on all this information, CPS
can react to situations independently. Ideally, it can also use past information to be able to adapt decision
rules to the new situation each time.
Based on this, each CPS can now have knowledge about its integration into the entire production
facility. That can be used by the CPS to configure itself during start-up, automatically establish com-
munication with its production partners (other CPS) and thus greatly reduce the costly start-up time.
The optimization phase can be performed during the day-to-day production. In the process, the various
CPS can optimize themselves due to their intelligence. In the simplest case, this can be an independent
discovery of the optimum operating point. In more complex cases, it can be a choice between predefined
or even newly determined procedure scenarios. If problems occur at one time in the production sequence,
for instance, if a machine has malfunctioned or required material is missing, alternative strategies that
“heal” the process and keep it running can be developed.
However, such problems should be avoided or at least made visible with good lead time by CPS gen-
erating early warning information, making preventive maintenance possible by supporting condition
monitoring. In decentralized communication between various CPS, it is not absolutely necessary for
this to be directly between one CPS and another. Rather, a multitude of communicative CPS platforms
will use their services and applications to network people, external systems and CPS with each other.
Two communication channels, i.e., direct CPS exchange and the path via CPS platforms, complement
each other (see Figure 3.25). To give an example, a CPS transport container can immediately enter into
FIGURE 3.25 CPS platforms linking individual CPS, external systems and the operator. (From Amberg, J., Industry
4.0 and Cyber Physical Systems—Classification and Practical Example, Managing Director of halstrup-walcher GmbH,
Format Change in Machine Building, Kirchzarten, Germany, 2015.)
112 Handbook of Industry 4.0 and SMART Systems
a communication exchange at some stages of production, because it can technically do this. All other
stages of production that do not have CPS functionality are controlled via a CPS platform. The CPS
transport container can thus make decentralized requests for supplies in all production areas relevant to
it and locally trigger operations (Amberg, 2015).
FIGURE 3.26 Conventional hierarchical integration of a positioning system into a machine that itself acts as a CPS.
(From Amberg, J., Industry 4.0 and Cyber Physical Systems—Classification and Practical Example, Managing Director of
halstrup-walcher GmbH, Format Change in Machine Building, Kirchzarten, Germany, 2015.)
The Industry 4.0 Architecture and Cyber-Physical Systems 113
FIGURE 3.27 Positioning system as independent CPS within the machine. (From Amberg, J., Industry 4.0 and Cyber
Physical Systems—Classification and Practical Example, Managing Director of halstrup-walcher GmbH, Format Change
in Machine Building, Kirchzarten, Germany, 2015.)
As shown in Figure 3.27, the CPS positioning system can be embedded by breaking through the hierar-
chical structures of the machine control unit. Instead of a vertical exchange with the machine control, the
CPS positioning system enters into a direct exchange with decentralized components (Amberg, 2015).
Consider the example of a new format being detected by a sensor. An optical sensor in a packaging
line detects that a shift must be made to a new packaging size because of a new product format. The sen-
sor gives the positioning system a direct decentralized specification of the new target positions; with this
information, the guide rail, packaging tools and if necessary the inspection camera are moved to the new
position. The higher-level machine control and the operator at his or her panel are continuously informed
of the actual position and are notified when target positions are reached. This information is accompanied
by reports that make preventive maintenance possible. Another example is the independent coordination
of two synchronously running positioning systems without the need to incorporate the control unit.
This decentralized embedding of the positioning system as an independent CPS leads to increased
adaptability and responsiveness. The central machine control unit can focus on its own CPS tasks and on
the machine’s integration into the overall production process. The person in charge can intervene via the
control panel if necessary or concentrate on the optimization of the production process instead of having
to trigger simple and regular processes such as format changeovers.
The ability to manage format changes at both levels described above, i.e., modification of the machine
user’s production and modification during machine design, will be a crucial factor in competitiveness.
What mostly concerned industry’s major groups yesterday is currently the focus of medium-sized com-
panies. Everyone involved needs to keep up. To paraphrase Albert Einstein: “Life is like riding a bicycle.
If you stop moving, you will fall off” (Amberg, 2015).
for digital ecosystems. These platforms are shaping the technology landscape and have the potential to
touch every aspect of human lives. They bridge businesses, influence behaviors, build communities and
can outline an entire ecosystem around themselves.
Needless to say, this paradigm shift has received the interest of technology companies and digital
leaders. They are developing new technology platforms and formulating new business models. While
it may not be imperative for a company to own its own platform ecosystem, it is essential to have a
robust platform strategy and the business know-how to execute it. If harnessed well, this global eco-
nomic revolution will transform the way business is done for many years to come. Enterprises used to
have large monolithic platforms, which served only one or two purposes. With the advent of mobile
and digital, they are building customized platforms to suit their industry process and needs, as well
as delivering personalized and contextual information to their customers. The new platforms need to
touch the consumer via mobile devices, engage in product awareness, monitor campaigns, undertake
loyalty management and analyze data, along with providing personalized offers (Shankavaram and
Gartner, 2016).
FIGURE 3.28 Digital connects everything. (From Shankavaram, D. and Gartner, Travelling to the future with Digital
Platforms, Capgemini, Consulting Technology Outsourcing, Capgemini India Pvt Limited, 2016.)
The Industry 4.0 Architecture and Cyber-Physical Systems 115
• Information systems platform: supports the back office and operations, such as ERP and core systems.
• Customer experience platform: contains the main customer-oriented elements, such as cus-
tomer and citizen portals, multichannel commerce and customer apps.
• Data and analytics platform: contains information management and analytical capabilities;
data management programs and analytical applications fuel data-driven decision-making and
algorithms automate discovery and action.
• IoT platform: connects physical assets for monitoring, optimization, control and monetization;
capabilities include connectivity, analytics and integration to core and OT systems.
• Ecosystems platform: supports the creation of, and connection to, external ecosystems, market-
places and communities; application programming interface (API) management, control and
security are its main elements.
• Determine which of the five platforms need to be implemented or renovated and when.
• Do a “checklist” exercise to determine what parts are missing or need to be improved and
modernized.
• Start with prototyping and pilots while completing the renovation of the information systems,
customer experience and data and analytics platforms.
116 Handbook of Industry 4.0 and SMART Systems
Partners
Ecosystems Plaorm
Customers Employees
Data and Analy cs
Customers Plaorm Informa on
Experience Plaorm Systems Plaorm
IoT Plaorm
Things
IoT: Internet of Things
FIGURE 3.29 Digital business technology platform. (From Shankavaram, D. and Gartner, Travelling to the future with
Digital Platforms, Capgemini, Consulting Technology Outsourcing, Capgemini India Pvt Limited, 2016.)
Interacon Layer
Portals Apps APIs
Customer Informaon
Employees
FIGURE 3.30 Cross-cutting concerns. (From Merckx, J., Digital transformation: From application thinking to platform
thinking, https://www.ae.be/blog-en/digital-transformation-from-application-thinking-to-platform-thinking/, 2018.)
The Industry 4.0 Architecture and Cyber-Physical Systems 117
As organizations cannot predict and control technological developments, they need to experiment,
measure and learn, to be able to adapt a platform in an agile way to accommodate trends in the outside
world (Merckx, 2016).
REFERENCES
Amberg J., Industry 4.0 and Cyber Physical Systems—Classification and Practical Example. Managing
Director of halstrup-walcher GmbH. Format Change in Machine Building. D-79199 Kirchzarten,
Germany, 2015.
Baheti R., and Gill H., Cyber physical systems (CPS), The Impact of Control Technology, 2011, 161–166, 2011.
Bagheri B., Yang S., Kao H. A., and Lee J., Cyber-physical Systems Architecture for Self-Aware Machines
in Industry 4.0 Environment, Center for Intelligent Maintenance Systems, University of Cincinnati,
Cincinnati, OH, IFAC-PapersOnLine, pp. 1622–1627, 2015.
Bratukhin A., and Sauter T., Functional analysis of manufacturing execution system distribution, IEEE
Transactions on Industrial Informatics, 7(4), 740–749, 2011.
Crenshaw T. L., Gunter E., Robinson C. L., Sha L., and Kumar P. R., The simplex reference model: Limiting
fault-propagation due to unreliable components in cyber-physical system architectures, Proceeding 28th
IEEE International Real-Time Systems Symposium, Tucson, AZ, 400–412, 2007.
Desai N., IT vs. OT for the Industrial Internet—Two Sides of the Same Coin? GlobalSign, GMO Internet
Group. GlobalSign Blog 2016. https://www.globalsign.com/en/blog/it-vs-ot-industrial-internet/.
Accessed September 12, 2018.
Faggioli D., Bertogna M., and Checconi F., Sporadic server revisited, Proceeding 2010 ACM Symposium
Applied Computing, Sierre, Switzerland, 340–345, 2010.
Gartner C. P., Gartner Says the Worlds of IT and Operational Technology Are Converging. STAMFORD,
Conn, 2011. https://www.gartner.com/newsroom/id/1590814. Accessed September 13, 2018.
Gonzalez G. R., Organero M. M., and Kloos C. D., Early infrastructure of an Internet of Things in spaces
for learning, Proceedings 8th IEEE International Conference on Advanced Learning Technologies,
Santander, Cantabria, 381–438, 2008.
He J. F., Cyber physical systems, Communication China Computer Federation, 6(1), 25–29, 2010.
i-SCOOP (a). Industry 4.0: the fourth industrial revolution—Guide to Industrie 4.0, 2008. https://
www.i-scoop.eu/industry-4–0/#Industry_40_the_essence_explained_in_a_nutshell. Accessed September 9,
2018. i-SCOOP (b). IT and OT convergence—Two worlds converging in Industrial IoT, 2008. https://
www.i-scoop.eu/internet-of-things-guide/industrial-internet-things-it-ot/. Accessed September 9, 2018.
Ilic M. D., Xie L., Khan U. A., and Moura J. M. F., Modelling of future cyber-physical energy systems for
distributed sensing and control, IEEE Transaction Systems Man Cybernetics A: Systems Humans, 40(4),
825–838, 2010.
Krogh B. H., Cyber physical systems: The need for new models and design paradigms. Presentation report,
PPT. Carnegie Mellon University, Pittsburgh, PA, 1–31, 2015.
Lee E. A., Computing foundations and practice for Cyber Physical Systems: A preliminary report. Tech. Rep.
UCB/EECS-2007–72, University of California, Berkeley, CA, 2007.
Lee E. A., Design challenges for cyber-physical systems. Strategies for Embedded Computing Research
International Policy Conference, Vienna, 2010. https://pdfs.semanticscholar.org/presentation/2ac1/
f0ea2a7d10ea48ac3a189ef4cd0d18fac3fd.pdf. Accessed October 2, 2018.
Lee J., Industry 4.0 in big data environment, German Harting Magazine, 1(1), 8–10, 2013.
Lee J., Ardakani H. D., Yang S., and Bagheri B., Industrial big data analytics and cyber-physical systems
for future maintenance & service innovation. The Fourth International Conference on Through-life
Engineering Services. NSF I/UCRC Center for Intelligent Maintenance Systems (IMS), University of
Cincinnati, Cincinnati, OH. Procedia CIRP 38, 3–7, 2015.
Lee J., Bagheri B., and Kao H. A., A cyber-physical systems architecture for industry 4.0-based manufactur-
ing systems, NSF Industry/University Cooperative Research Center on Intelligent Maintenance Systems
(IMS), University of Cincinnati, Cincinnati, OH, 2014.
Lee J., and Lapira E., Predictive factories: The next transformation, Manufacturing Leadership Journal,
20(1), 13–24, 2013.
118 Handbook of Industry 4.0 and SMART Systems
Lee J., Lapira E., Bagheri B., and Kao H., Recent advances and trends in predictive manufacturing systems in
big data environment, Manufacturing Letter, 38, 41, 2013a.
Lee J., Lapira E., Yang S., and Kao H. A., Predictive manufacturing system trends of next generation production
systems, Proceedings of the 11th IFAC Workshop on Intelligent Manufacturing Systems, 150–156, 2013b.
Lin K. J., and Panahi M., A real-time service-oriented framework to support sustainable cyber-physical systems,
Proceeding 8th IEEE International Conference on Industrial Informatics, Osaka, Japan, 15–21, 2010.
Liu Y., Peng Y., Wang B., Yao S., and Liu Z., Review on cyber physical systems, IEEE/CAA Journal of
Automatica Sinica, 4(1), 27–40, 2017.
McMillin B., Gill C., and Crow M. L., Cyber-Physical Systems distributed control: The advanced electric
power grid. Electrical Energy Storage Applications and Technologies, Sandia Corporation, Livermore,
CA, 2007.
Merckx J., Digital transformation: From application thinking to platform thinking, 2016. https://www.ae.be/
blog-en/digital-transformation-from-application-thinking-to-platform-thinking/. Accessed September 19,
2018.
National Institute of Standards and Technology, Workshop report on foundations for innovation in cyber-
physical systems, 2013. https://www.nist.gov/sites/default/files/documents/el/CPS-WorkshopReport-
1–30-13-Final.pdf. Accessed September 10, 2018.
Pasqualetti F., Dorfler F., and Bullo F., Attack detection and identification in cyber-physical systems, IEEE
Transactions on Automatic Control, 58(11), 2715–2729, 2013.
Rajkumar R., CPS briefing. Carnegie Mellon University, Pittsburgh, PA, 2007.
Rojko A., Industry 4.0 concept: Background and overview. ECPE European Center for Power Electronics e.
V., Nuremberg, Germany. iJIM, 11(5), 2017.
Rouse M., IT/OT convergence, 2016. https://searchitoperations.techtarget.com/definition/IT-OT-convergence.
Accessed September 9, 2018.
SAP SE. https://www.sap.com/corporate/en.html. Accessed September 9, 2018.
Shankavaram D., and Gartner, 2016. Travelling to the future with Digital Platforms. Capgemini, Consulting
Technology Outsourcing. Capgemini India Pvt Limited.
Shi J., Wan J., Yan H., and Suo H., A survey of cyber-physical systems, International Conference on Wireless
Communications and Signal Processing (WCP), 1–6, 2011.
Stadler A., Industry 4.0: Huge potential for value creation waiting to be tapped, Deutsche Bank Research,
2015.
Sun Y., McMillin B., Liu X. Q., and Cape D., Verifying non-interference in a cyber physical system the
advanced electric power grid, Proceeding 7th International Conference Quality Software, Portland,
OR, 363–369, 2007.
Tan P. L., Shu J., and Wu Z. H., An architecture for cyber-physical systems, Journal Computational Research
Development, 47(Suppl.), 312–316, 2010.
Tan Y., Goddard S., and Pérez L. C., A prototype architecture for cyber-physical systems, ACM SIGBED
Review, 5(1), 26, 2008.
Tan Y., Vuran M. C., and Goddard S., Spatio-temporal event model for cyber-physical systems, Proceeding of
29th IEEE International Conference on Distributed Computing Systems Workshops, 2009.
Vijayaraghavan A., Sobel W., Fox A., Dornfeld D., and Warndorf P., Improving machine tool interoperability
using standardized interface protocols: MTConnect, Proceedings of the 2008 International Symposium
on Flexible Automation (ISFA), Atlanta, GA, 2008.
Wolf W., Cyber-physical systems, Computer, 42(3), 88–89, 2009.
Yang S., Bagheri B., Kao H. A., and Lee J., A unified framework and platform for designing of cloud-based
machine health monitoring and manufacturing systems, Journal of Manufacturing Science and
Engineering, 137(4), 040914, 2015.
Zhang F. M., Szwaykowska K., Wolf W., and Mooney V., Task scheduling for control oriented requirements
for cyber-physical systems. Proceeding 2008 Real-time Systems Symposium, Barcelona, 47–56, 2008a.
Zhang Y. F., Gill C., and Lu C. Y., Reconfigurable real-time middleware for distributed cyber-physical systems
with a periodic events. Proceeding 28th International Conference Distributed Computing Systems,
Beijing, China, 581–588, 2008b.
4
Cloud Computing, Data Sources and Data Centers
CONTENTS
4.1 IT vs. OT........................................................................................................................................121
4.1.1 New Concerns for Both Sides.......................................................................................... 122
4.1.1.1 New Concerns for IT........................................................................................ 122
4.1.1.2 New Concerns for OT....................................................................................... 122
4.1.2 Finding Common Ground................................................................................................ 123
4.1.3 Differences between IT and OT Applications................................................................. 123
4.1.4 Technological Needs........................................................................................................ 123
4.1.5 Conditions of Conservation.............................................................................................. 124
4.1.6 Security............................................................................................................................. 124
4.1.7 Regulations and Protocols................................................................................................ 124
4.1.8 Data vs. Processes............................................................................................................ 124
4.1.9 Update Frequency............................................................................................................. 124
4.1.10 Internet of Things (IoT) Devices in Industry 4.0............................................................. 124
4.1.11 What Industrial Processes Will Improve with IT/OT Integration?.................................. 125
4.2 CMMS, ERP, MES, PLM and Other Actors................................................................................ 125
4.2.1 PLM.................................................................................................................................. 125
4.2.2 ERP................................................................................................................................... 126
4.2.3 MES.................................................................................................................................. 126
4.2.4 PLM-ERP-MES................................................................................................................ 127
4.2.5 PLM + MES + ERP = Closed-Loop Product Lifecycle................................................. 127
4.2.6 CMMS.............................................................................................................................. 129
4.2.6.1 Computerized.................................................................................................... 129
4.2.6.2 Maintenance...................................................................................................... 129
4.2.6.3 Management...................................................................................................... 129
4.2.6.4 System............................................................................................................... 130
4.2.7 What Does CMMS Stand For?........................................................................................ 130
4.2.8 The Value of CMMS........................................................................................................ 130
4.3 Cloud Computing Taxonomies..................................................................................................... 130
4.3.1 The Need for a Taxonomy................................................................................................ 130
4.3.2 Existing Taxonomies.........................................................................................................132
4.3.2.1 NIST’s Software, Platform, and Infrastructure (SPI) Model............................132
4.3.2.2 Youseff’s Five-Layer Ontology..........................................................................132
4.3.2.3 Sam Johnston’s Six-Layer Stack........................................................................133
4.3.2.4 Dave Linthicum’s 10-Layer Taxonomy..............................................................135
4.3.3 Comparison and Limitations of Existing Taxonomies......................................................135
4.3.4 A Proposed Taxonomy..................................................................................................... 136
4.4 Cloud Services.............................................................................................................................. 138
4.4.1 Cloud Services Basics...................................................................................................... 138
4.4.2 Six Advantages and Benefits of Cloud Computing.......................................................... 138
4.4.3 Cloud Computing Services Features and Benefits........................................................... 139
4.4.4 Types of Cloud Computing Services................................................................................ 139
4.4.4.1 Software as a Service (SaaS)............................................................................ 139
119
120 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLES
4.1 IT vs. OT
In the industrial sector, information technology (IT) and operation technology (OT) are usually under-
stood separately. Information technology and OT are two different concepts, but they can be combined.
However, we must know their differences to understand their convergence.
Although the technologies can work together to enhance their separate functionalities, their uses are
very different, as are the environments in which they must be maintained. Knowing the differences is
important to ensure a responsible and functional convergence in Industry 4.0 (Diferencias Entre It Y Ot
Y Su Convergencia, 2018) (Figure 4.1).
MARITIME
Impaired propulsión or
navigaon systems
AUTOMOBILE
Interference with car assembly PHARMACEUTICAL & CHEMICAL
process, tampering with PLANTS
autonomous vehicles. Changed drug/chemical composion,
palnt operaons disrupon
NUCLEAR
Environmental RAIL
disaster, loss of life, Malfucons in rails and
power disrupon
OT
jucons witching, mismed
signaling, and train crashing
0100
0001
IT 0100
0001
0100 0100
Operational technology (OT) can be defined as “hardware and software that detects or causes a change
through the direct monitoring and/or control of physical devices, processes and events in the enterprise.”
(Gartner, 2019).
Information technology can be defined as “an entire spectrum of technologies for information pro-
cessing, including software, hardware, communications technologies and related services. In general, IT
does not include embedded technologies that do not generate data for enterprise use.” (Gartner, 2019).
Traditionally, IT and OT have had fairly separate roles within an organization, but with the emergence
of the Industrial Internet and the integration of complex physical machinery with networked sensors and
software, the lines are blurring. With the shift from closed to open systems comes interdependence and
overlap, along with new security concerns.
• Identifying and authenticating all devices and machines within the system, both within manufac-
turing plants and in the field, to ensure only approved devices and systems are communicating
with each other. This would mitigate the risk of a hacker inserting a rogue, untrusted device into
the network and taking control of any systems or machines.
• Encrypting all communications between these devices to ensure the privacy of the data being
transmitted.
• Ensuring the integrity of the data generated from these systems. Smart analytics are a major
driver in the adoption of the Industrial Internet, but these analytics are worthless if the data are
inaccurate.
• Assuming the manufactured goods contain software or firmware themselves, enabling
the ability to perform remote upgrades down the road and ensuring the integrity of these
updates.
Over time, the separation between OT and IT will fade. In the meantime, each needs to consider the
other’s expertise and point of view. The two must work together toward the ultimate goal: a secure, pro-
ductive Industrial Internet (Nisarg, 2019).
OT deploys a large number of widely distributed devices and fewer people. Simply stated, an IT device
requires a professional to control it, while OT technology is more autonomous.
4.1.6 Security
Operational technology prioritizes the operation of machines and devices generating data through
sensors. Information technology prioritizes the confidentiality of the data generated. In this sense, one
of the differences between IT and OT is clear: security. Operational technology is a more pragmatic
sector and stresses the functionality of machinery. Integrity remains the second most important objec-
tive and confidentiality ceases to be prioritized in these cases.
• It allows the direct management of production processes when all the devices are connected to
each other and to a control center.
• IoT devices are not simple sensors, but have autonomy within their configuration or previous
programming.
Cloud Computing, Data Sources and Data Centers 125
• IoT devices can keep the information if there is a problem in the communications and send it
later; thus, data are never lost.
• A management center collects all data and transforms data into indicators and scorecards that
improve decision-making.
4.2.1 PLM
Product lifecycle management provides the upstream platform for product creation and engineering
data management. At the concept phase, product creation processes allow flexibility and creativity with
limited or no change management and the ability to reuse data from past or other products. As products
mature, the data management process becomes tighter; change management kicks in, as more organi-
zational functions are required to collaborate to make things happen. Product lifecycle management
addresses the following questions (non-exhaustive list):
• What PLM data will be fed to ERP, and how will it be used downstream?
• What technical decisions are made at the PLM level and what are the implications
upstream?
Data traceability in PLM relates to the ability to reuse data, to manage historical information and new
ideas. Some data are released into new products, but the majority of data are not passed to manufacturing
and the wider enterprise.
As PLM feeds data downstream to ERP, product and business information combine, while data are
restructured to allow the extended enterprise to operate and collaborate above and beyond the engineer-
ing teams. At this stage, various departments and functions interact across the enterprise, controlling and
managing supply chain data, customer data, financial data, procurement data, HR data, planning data,
multiple metrics and key performance indicators (KPIs).
4.2.2 ERP
Enterprise resource planning regroups the core business data backbone where strategy and operations
converge. The ERP data model cannot follow the PLM data structure because it is not meant to manage
such levels of creativity and product prototypes. The ERP data must be structured so that they can feed the
downstream functions (manufacturing, supply chain, sales and marketing, etc.) in a transactional manner.
Data traceability in ERP relates to planning, strategic alignment, operations, compliance and upstream
and downstream coordination. Due to their transactional nature, ERP data have a clear status and align-
ment within the relevant business processes. In a nutshell, ERP addresses the following questions (non-
exhaustive list):
• Why does the organization exist, and what is its product strategy?
• How does the business plan to achieve long-term sustainable growth?
• Why (and what) engineering data cascade from PLM into ERP to feed the “business engine,”
and what is relevant to top floor decision-making?
• How does the strategy translate into operations across all business functions?
• What strategic (and business-related operational) decisions are made at the ERP level, and what
are the implications upstream and downstream?
• How can the business prevent incidents, protect its workforce and ensure products meet standards?
Enterprise resource planning data are fed back upstream to PLM to allow integrated change manage-
ment processes, including supplier and cost data, material and compliance data and product and platform
configuration data.
Enterprise resource planning data are fed downstream to MES to provide reference product informa-
tion, production demand, master schedules, master data, bills of materials (BOMs), standard operating
procedures (SOPs), change orders, inventories, planned resources, target performance metrics and so on.
4.2.3 MES
Manufacturing execution system is the de facto shop floor performance and operations management
engine behind the most mass-production control activities. It regroups all plant-wide manufacturing
decisions, focusing on rapid actions, detailed planning, forecasting, continuous improvement, planned
and actual metric analysis and ongoing adjustments.
Data traceability in MES relates to “live” operations, performance, upstream feedback on results
and required input (materials, resources, etc.). By default, MES is the most transactional system of the
manufacturing organization, with the highest level of reactiveness needed to anticipate, align and adjust
production and business parameters. Manufacturing execution system addresses the following questions
(non-exhaustive list):
Cloud Computing, Data Sources and Data Centers 127
• How can technology be optimized for the organization to become more efficient?
• How can the organization effectively manage risks and safeguard performance issues?
• How can operational excellence objectives be implemented and achieved on the shop floor?
• How can planning, execution and control information be combined into a continuous feedback
loop to align and optimize production and business operations?
Manufacturing execution system feds data back upstream to ERP with order status, resource usage
(labor, equipment, materials), as-built genealogy yields, time events and so on.
4.2.4 PLM-ERP-MES
Most of the ERP data fed to MES contain evolutions or restructured PLM data. Product lifecycle man-
agement systems allow production, shop floor and logistics simulation, digital and virtual optimization.
Hence, the need for the MES-ERP feedback loop to extend further upstream to PLM for “closed-loop
validation” and ongoing earning, as explained by design for manufacturing and assembly principles.
Product lifecycle management, ERP and MES are coming together to create a foundation for a
modern-day interpretation of lean manufacturing. As part of the product-to-production platform, there
are direct connections from PLM to the shop floor, such as work instructions, routing information and
vice versa from the shop floor to PLM with nonconformance results. The PLM-MES direct link has the
potential to deliver agility through shop floor execution excellence.
Downstream PLM-MES interfaces include BOM and bills of process, components, process lists, work
instructions, engineering change orders, work certification, resource types, control resources and so on.
Upstream MES-PLM interfaces include closed-loop product and process data, change requests with
mark-up, updated work instructions, selected and evaluated KPIs, nonconformance failure modes and
so on.
Product lifecycle management-manufacturing execution system integration allows continuous response
to shifting demands by distributing the latest product designs and assembly methods to a more connected,
more efficient and more effective production value chain.
The three important questions must be answered to achieve an integrated PLM-ERP-MES holistic
landscape:
• What MES data need to be integrated back upstream to ERP and PLM?
• How much data are to be fed upstream from MES to PLM via ERP vs. directly from MES to
PLM?
• What level of data and process visibility is required in the ERP platform and how can a certain
level of agility and consistency be maintained across each PLM-ERP-MES layer?
This again relates to key MDM considerations and assumptions when integrating the three platforms.
Finally, collaboration is the new norm; being able to collaborate is currently a basic matter of survival
(mandatory but not sufficient to compete). The level of integration and how lean the organization can be
constituting a paradigm of the new competitive advantage. For example, too much integration can dam-
age the ability of the organization to operate swiftly and/or compromise the purpose of the enterprise
platforms (PLM-ERP-MES); alternatively, not enough integration might hinder its ability to execute and
optimize (Grealou, 2017).
By closing the loop between PLM, MES and ERP systems, manufacturers are hoping to facilitate data
sharing between the functional areas of engineering, the shop floor and the front office. The goal is to
deliver visibility that will help streamline product delivery cycles, eliminate redundant manual processes
and waste and proactively pinpoint and correct quality issues before they become too costly and pose
barriers to customer satisfaction.
ERP-to-MES integration is a bit further along, almost standard practice for synchronizing the system
of record for customers, order and inventory data with the shop floor to meet production requirements
and reconcile material consumption for better planning. PLM-to-MES integration, a more recent phe-
nomenon, is catching on, as manufacturers look to accelerate product ramp-up times and establish a
feedback loop between product design and production as part of ongoing quality efforts. Creating link-
ages between all the three systems remains a long-term vision for most, but experts contend it will be a
necessary goal for manufacturers moving forward.
Without such integration, data sharing is manual, introducing errors, bottlenecks and delays, while
making it harder to analyze and achieve complete visibility into core business processes. In contrast,
an integrated MES-PLM-ERP platform creates a closed loop that enables manufacturers to be more
responsive and agile.
Looking even further, MES-PLM-ERP integration is crucial to the notion of a digital enterprise,
where the real-world environment—from concept design to physical production of a product through
customer usage in the field—is connected and simulated in a virtual world. By weaving a digital thread
throughout all phases of a product’s lifecycle and by connecting core systems, manufacturers can gain
insights to help optimize the product and key processes to achieve higher levels of productivity.
Despite the huge upside, integration of these core enterprise systems is relatively immature for a very
simple reason: it’s historically been too complex. Closed systems coupled with proprietary networks and
communication protocols have been huge technical hurdles preventing data from flowing easily between
core enterprise platforms to create a closed-loop system (Figure 4.2).
Even a one-off integration is no guarantee of success. Traditionally, there’s been much reliance on cus-
tom code to integrate MES and PLM or MES and ERP, but these can break with subsequent upgrades,
thus requiring constant maintenance and rework.
The rise of virtualization and the cloud are changing the nature of such integrations. The cloud, in par-
ticular, is rewriting the rules, reducing reliance on middleware and custom programming and facilitating
real-time integration between systems such as ERP and PLM (Figure 4.3).
Objects
Item
Item Specificaon
ERP EXCHANGE Component
FIGURE 4.2 Kenandy partnered with Arena Solutions to integrate their cloud-based ERP and PLM systems.
Cloud Computing, Data Sources and Data Centers 129
SMC Cloud:
An End-to-End Closed Loop
Product
PLAN MAKE OPTIMIZE
planning/MDM Financial reporng
FIGURE 4.3 The cloud serves as the glue to stitch together MES/PLM/ERP in Oracle’s comprehensive suite.
The cloud can join MES/PLM/ERP. Easy connectivity and a common data model across systems
greatly simplify integration while keeping manufacturers’ extended teams on the same release cycle,
eliminating the need to maintain existing one-off integrations.
4.2.6 CMMS
CMMS stands for computerized maintenance management system (or software) and is sometimes
referred to as enterprise asset management. Broadly stated, a CMMS is computer software designed to
simplify maintenance management.
4.2.6.1 Computerized
Computerized refers to the fact that with a CMMS, maintenance data are stored on a computer.
Before the 1980s, maintenance data were generally recorded with a pencil and paper. Because of this,
maintenance was largely reactive rather than proactive, performed only when something went wrong.
Preventive maintenance was less common because it was unrealistic to track that assets needed routine
maintenance when all maintenance records were kept in a filing cabinet.
When CMMS solutions came into fruition in the late 1980s and early 1990s, organizations began to
migrate from pencil/paper to computers. Suddenly, organizations could track work orders, quickly gen-
erate accurate reports, and instantly determine which of their assets required preventive maintenance.
This led to extended asset lifespans, improved organization, reduced costs and increased profits.
4.2.6.2 Maintenance
Maintenance is what users of CMMS software do every day, whether responding to an on-demand work
order for a broken window or performing a routine inspection on a generator.
Computer software cannot accomplish the work of a skilled technician. What it can do, however, is
ensure tasks are prioritized correctly and that everything is in place (inventory, labor) to ensure success.
Computerized maintenance management system solutions give technicians the freedom to focus less on
paperwork and more on hands-on maintenance.
4.2.6.3 Management
Managing maintenance is the most essential role of a CMMS solution. Maintenance management
software is designed to give users immediate insight into the state of their maintenance needs with
130 Handbook of Industry 4.0 and SMART Systems
comprehensive work order schedules, accurate inventory forecasts and instant access to hundreds of
invaluable reports. Computerized maintenance management system solutions make maintenance man-
agement easier by empowering managers with information so that they can make the most informed
decisions possible.
4.2.6.4 System
A system can be thought of as the overall combination of features and capabilities within a CMMS.
Different CMMS solutions offer different types of systems. The best CMMS system is one that allows
users to accomplish their existing maintenance practices more effectively while introducing time-saving
features that lead to a reduction of costs and a savings of time.
A maintenance CMMS makes it easy to manage work orders, preventive maintenance tasks, assets,
purchase orders, fleet, inventory levels and so on (What is a CMMS? 2018).
Increase availability: Keep equipment maintained and available, reduce downtime and extend the
life of assets.
Maintain compliance: Ensure safety, track incidents, adhere to proper processes, stay ahead of
regulations and be prepared with a clear audit trail.
Control costs: Manage planned and unplanned maintenance, warranties, inventory and spare parts
costs.
Boost productivity: Improve scheduling, vendor management, workflow and financial reporting
(What does CMMS stand for?).
However, cloud computing is an evolving concept. Even core aspects such as possible structures,
architectures and application scenarios are the topic of discussion (Armbrust et al., 2009). Cloud
computing solutions are being developed and becoming available for users, despite the lack of clear
classifications and while new features are still under research (IDC, 2010). A recurring issue is
the free and unrestrained creation of definitions and classification categories by service providers,
who are commonly promoting their solutions’ features rather than following a technical perspective
(Willis, 2009).
Motivated by this concern, the UN National Institute of Standards and Technology (NIST) and the
European Community have started the process of standardizing the key aspects of cloud computing,
aiming to unify existing concepts and to simplify the task of identifying the main purposes of each cloud
solution (Hoover, 2009).
National Institute of Standards and Technology’s efforts to standardize the basic cloud computing
concepts are associated with the increasing use of cloud computing solutions by US government agen-
cies. Most of the Institute’s work focuses on US government requirements for cloud computing, from
both technical and legal points of view. National Institute of Standards and Technology defines cloud
computing as follows:
“Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential characteristics, three service
models, and four deployment models” (Mell and Grance, 2009).
According to NIST, the main characteristics of cloud computing are the following:
• On-demand self-service: The resources provided are easily scaled; thus, the customer can
allocate or free them automatically whenever needed, without human interaction with
providers;
• Broad network access: Services are available through Internet using standardized interfaces
(such as browsers or remote console control) and are accessible from any device able to connect
and use these interfaces;
• Resource pooling: Provider infrastructure is organized to offer services to multiple customers
using the concept of multi-tenancy, according to which resources are managed according to the
demand, while resource management is transparent to users;
• Rapid elasticity: Cloud capabilities are promptly and easily scaled to satisfy the customers’ needs
in such a manner that the cloud resources appear to be unlimited from the users’ point of view;
• Measured service: Services are automatically controlled and optimized to offer metering capa-
bilities according to the type of service (Mell and Grance, 2009).
In comparison, the European Union Agency for Network and Information Security (ENISA) defines
cloud computing as an on-demand service model for IT provision, based on virtualization and distrib-
uted computing technologies (ENISA, 2009). According to the Agency, the key characteristics of cloud
computing are:
• Highly abstracted resources: Virtualized infrastructures are the core of cloud computing, either
by directly offering a virtualized platform or delivering services based on these structures;
• Scalability and flexibility: Clouds are highly scalable, provisioning customers with the required
resources; they are also flexible enough to conform itself to the customers’ needs;
• Instantaneous provisioning: The resources appear to the customers as unlimited and promptly
provisioned as necessary;
• Shared resources: The provider infrastructure (including hardware, database and memory) is
shared by customers; this has security implications, as the logical layers can be separated but
the hardware cannot;
132 Handbook of Industry 4.0 and SMART Systems
• Service on demand with “pay as you go” billing systems: The elasticity of the cloud enables the
precise definition of what resources the customer needs, and when they are needed;
• Programmatic management: Web services programming interfaces allow the management of
the cloud infrastructure and the integration of local software and cloud resources.
It should be noted that both definitions (and others (CPNI, 2010; CSA, 2009) highlight the “pay as you go”
feature for highly abstracted resources, provided by the same shared infrastructure that, as such, must achieve
a minimum level of scalability and CSA (2009)) high to adapt itself to the demand from multiple tenants.
It is important to understand how cloud services interact with other services, as well as the mecha-
nisms that can (or must) be used to assure communication between them. This task requires a robust
model capable of classifying the services according to their types, which has led to the creation of several
taxonomies, described in the following section (Jaekel and Luhn, 2009).
• Software as a Service (SaaS): Cloud services that are developed, deployed, run and maintained
by the provider and are accessible through a Web browser. The customer does not manage or
control the underlying infrastructure that supplies the required resources while securing the
assets involved and guaranteeing service level agreements;
• Platform as a Service (PaaS): Services that provide a platform to develop and deploy web
applications. The customer does not have control over the cloud infrastructure but can directly
access and use its resources, commonly made available through the use of specialized applica-
tion programming interfaces (APIs);
• Infrastructure as a Service (IaaS): Cloud solutions able to offer infrastructural utilities and
tools, such as processing, storage, virtual machines (VMs) or other computing basic resources.
The customer has considerable control over the infrastructure, even though there is no direct
access to the physical hardware itself.
This taxonomy presents a succinct but comprehensive classification of cloud services, abstracting three
main possibilities:
• SaaS: Aggregates all software-oriented solutions, e.g. salesforce customer relationship man-
agement (CRM) (Salesforce, 2010b), Google Apps (Google, 2010d) and so on;
• PaaS: Application development platforms, e.g., Google App Engine (Google, 2010a), Salesforce
Apex (Salesforce, 2010a), Hadoop (Borthakur, 2007), Yahoo Pig! (Olston et al., 2008) and so on;
Cloud Computing, Data Sources and Data Centers 133
Cloud Applicaon
(e.g. SaaS)
Computaonal Communicaons
Storage (DaaS)
Resources (IaaS) (CaaS)
Soware Kernel
FIGURE 4.4 Youseff’s five-layer ontology. (From Youseff, L. et al., Toward aunified ontology of cloud computing, Grid
Computing Environments Workshop, GCE’08, 1–10, 2008.)
• IaaS: Computational resources that can be moved to the cloud, mainly represented by virtual-
ization, e.g., Amazon EC2 (Amazon, 2010b), Enomalism (Enomaly, 2010), Eucalyptus (Nurmi
et al., 2009), OpenNebula (Fontán et al., 2008) and so on;
• Data as a Service: Refers to remotely managed solutions for data storage, e.g., Google FileSystem
(Google, 2010b), Bayou (Demers et al., 1994), Dynamo (DeCandia et al., 2007), Amazon S3
(Amazon, 2010e), EMC (2010) and so on;
• Communication as a Service (CaaS): Solutions providing service-oriented communication
for cloud users, including Voice over Internet Protocol (VoIP) systems, instant messaging
and audio or video conferencing, e.g., Microsoft Connected Services Framework (Microsoft,
2010a; Hofstader, 2007);
• Hardware as a Service: Services where the provider operates, manages and upgrades the hard-
ware used by the customer, e.g., Morgan Stanley IBM utility computing (Hines, 2004), PXE
(Johnston, 1999), UBL (UBOOT, 2010), IBM Kittyhawk (Appavoo et al., 2008) and so on.
The five layers abstract computing environments, starting from the application (top layer), going through
the environment (which provides the resources to the application to run), software infrastructure (the
resources enabled by the operating system), kernel and hardware.
• Clients: Computer hardware and/or software that rely on the cloud to deliver services and
applications, e.g., browsers in general, cloud operating systems, Cirtas (2010), g-Eclipse
(Gjermundrod et al., 2008), StorSimple (2010) and so on;
• Services: Web services that allow direct interaction between customers and providers’ solutions;
• Application: Solutions that eliminate the need to install or run software on local machines,
e.g., Google Apps (Google, 2010d), Zoho (2010) and so on;
• Platform: Computing platform to deploy applications without having to purchase the required
infrastructure, e.g., Force.com (SalesForce, 2010), Google App Engine (Google, 2010a), Heroku
(2010), OrangeScape (2010), Rackspace (2010) and so on;
134 Handbook of Industry 4.0 and SMART Systems
Clients
Services
Applicaon
Plaorm
Storage
Infrastructure
FIGURE 4.5 Sam Johnston’s six-layer stack. Taxonomy that organizes the cloud ecosystem in six layers.
• Storage: Delivering storage as a service, either in the form of raw storage or database utili-
ties, e.g., Amazon S3 (Amazon, 2010e), Amazon SimpleDB (Amazon, 2010f), Dropbox (2010),
Evernote (2010), Mozy (Decho, 2010), Windows Live Skydrive (Microsoft, 2010b) and so on;
• Infrastructure: Services that offer virtualization solutions for customers, allowing direct access
to the cloud infrastructure, e.g., Amazon EBS (Amazon, 2010a), Amazon MI (Amazon, 2010c),
AppNexus (2010), Cloudera (2010), ElasticHosts (2010), GoGrid (2010), Hadoop (Borthakur,
2007), RightScale (2010) and so on (Figure 4.6).
The resulting stack shares many similarities with the one used by Youseff et al. but includes the “Clients”
layer, which represents elements that use the services from the adjacent layer. The same taxonomy is
presented in Figure 4.6; the figure shows the categories and the examples used to contextualize them.
Amazon
StorSimple Heroku Dropbox Machine
Imagines
Windows ElascHosts
Skydrive
GoGrid
RightScale
FIGURE 4.6 Sam Johnston’s six-layer stack. Categories and the examples used to contextualize the six layers.
Cloud Computing, Data Sources and Data Centers 135
• Storage as a Service: Has ability to leverage storage handled by the customer; thus, it becomes
physically remote but logically local, e.g., Amazon S3 (Amazon, 2010e), Box.net (2010), Google
Base (Google, 2010c) and so on;
• Database as a Service (DBaaS): Follows the same principle as Storage, but focuses exclusively
on databases, offering the space needed for storing the data and offering interfaces to use the
database tools, e.g., Amazon SimpleDB (Amazon, 2010f), Trackvia (2010) and so on;
• Information as a Service: Offers APIs and interfaces to access remotely hosted information,
such as stock prices, address validation, credit reporting or meteorology;
• Process as a Service: Provides structures able to bind other resources together, creating business pro-
cesses that are easily changeable, e.g., Appian Anywhere (Appian, 2010), Itensil (2010) and so on;
• Application as a Service: Software accessible through a browser, e.g., Salesforce CRM
(Salesforce, 2010b), Google Apps (Google, 2010d) and so on;
• Platform as a Service: Includes the application development platform, interfaces to access the
cloud infrastructure (including database utilities), raw storage and testing, e.g., Google App
Engine (Google, 2010a), Heroku (2010) and so on;
• Integration as a Service: An integration stack that includes application interfaces, flow con-
trol and integration designs, allowing intercommunication between different programs or pro-
cesses, e.g., Amazon SQS (Amazon, 2010d) and so on;
• Software as a Service: Mainly related to identity management, e.g., Ping Identity (Identity, 2010);
• Management as a Service: On-demand services that provide resources and structure to manage
other cloud services in terms of topology, resource utilization, virtualization and task manage-
ment, e.g., RightScale (2010);
• Testing as a Service: Services able to test other cloud services, eliminating performance issues
and bugs during development, deployment and production, e.g., SOASTA (2010).
This taxonomy introduces many categories to divide the cloud ecosystem, but it lacks some important
aspects, as the IaaS set of services is not entirely covered (there is not a clear category for virtualization
services) and there are no clear interrelationships between different categories.
TABLE 4.1
Comparison of Taxonomies Using SPI Model as Reference
Taxonomy SaaS PaaS IaaS
Youseff’s five-layer Software Platform Computer resources
Storage
Communications
Johnston’s six-layer Services Application Platform Storage Infrastructure
Linthicum’s 10-layer Application Testing Security Platform Integration Storage Database
Information Process Management
One example is the Amazon EC2 (Amazon, 2010b); it does not fit into any of Linthicum’s taxonomy
(Linthicum, 2009) categories: even though it is a storage service, it also offers virtualization and database
features.
Despite their importance, the abovementioned taxonomies are either too broad—not providing
the granularity needed for deeper and more complex comparisons between distinct services—or too
narrow—lacking the flexibility to add new, more complex services—and do not offer an explicit connec-
tion between the different categories.
• Software:
• e-Commerce: Services that enable the creation of online stores and catalogs for local physi-
cal products and application stores for mobile platforms;
• Software management: Services that communicate with other software (hosted or not in a
cloud) with management purposes, such as a hosted web application or an antivirus server.
This category can be further divided into monitoring services (e.g., for checking service uptime,
performance, security or service level agreement (SLA) compliance), controlling (for creating,
starting and stopping other services) and integrating (for data synchronization and conversion);
• Financial management: Financial transactions, such as payment and billing services;
With this format, we can classify a service not only using specific categories (represented by the leaves),
but also using more generic levels—this is especially recommended when a service is very complex or
when it aggregates different solutions.
Some Amazon web services are interesting examples to contextualize both situations. The Amazon
S3 (Amazon, 2010e) is a storage service, which is initially classified as an IaaS; using the proposed
model, this service is classified as Infrastructure-Storage. The Amazon EC2 (Amazon, 2010b), which
is related to virtualization, offers a complete platform to run software over a virtualized infrastructure;
it is classified as an Infrastructure service, because it offers resources related to its leaves. It should be
noted that both services would be simply classified as IaaS by the SPI model—which is correct and
adequate if a simple analysis is required, but insufficient if we require a comparison between various
IaaS providers, each of which offers different solutions.
We emphasize, however, that the categories enumerated above are not necessarily exhaustive. Instead,
the taxonomy instance depicted in the figure is better regarded as an application of the proposed model
for common cloud services; as such, this taxonomy can be easily extended without losing its main
characteristics, as long as the SPI root is kept untouched. This extensibility feature also enables a clear
evolution path, similar to the way networking standards are created and maintained by standardization
entities such as IEEE and IETF (for instance, using tags to identify the taxonomy version).
It is important to emphasize that the combinations between services may be very complex. For example,
while using Heroku to develop a dynamic website for an enterprise, the service consumer may decide to
include Netsuite Ecommerce to integrate local products to an online store, to use Amazon S3 or SimpleDB
to store any information related to business processes, customers and commercial transactions, and finally,
to adopt SOASTA to improve the website performance. This example illustrates that classifying services
into more complex categories while keeping a solid foundation enables swift and useful identification of
potential services that, when combined, can create a complete toolkit for developing the desired business.
Table 4.2 shows the classification of some existing services according to this taxonomy.
The proposed model is an extension of (rather than a replacement for) the SPI model, empowering
the latter with an organization that allows a finer-grained analysis to be performed whenever needed.
Its instances should not be regarded as fixed and absolute taxonomies, however, but as evolving struc-
tures that can follow the cloud computing evolution itself. Future studies on criteria and other functional
aspects of the cloud may improve the model, reorganizing the services to facilitate the development of
more sophisticated cloud computing solutions (Gonzalez et al., 2011).
138 Handbook of Industry 4.0 and SMART Systems
TABLE 4.2
Classification of Existing Services Using Proposed Taxonomy
Service Main Category Subdivision
Amazon EC2 (Amazon, 2010b) Infrastructure –
Amazon EC2 (Amazon, 2010e) Infrastructure Storage—Database
Amazon SimpleDB (Amazon, 2010d) Software Software management—Integration
Appian Anywhere (Appian, 2010) Software Business management—BPM
Boomo (Boomi, 2010) Software Software management—Integration
Box.net (Box.net, 2010) Infrastructure Storage
Elastra (Das et al., 2010) Software Software management
EMC SMS (EMC, 2010) Infrastructure Storage
Enomaly WCP (Enomaly, 2010) Infrastructure –
Google App Engine (Google, 2010d) Platform Deploying
Heroku (Heroku, 2010) Platform Developing, deploying
Netsuite Apps (Netsuite, 2010) Software Financial management
OpSource Connect (OpSource, 2010) Software Business management—Integration
Oracle OnDemand (Oracle, 2010) Software Business management—CRM
RightScale (RightScale, 2010) Software Cloud management
rPath (rPath, 2010) Software Cloud management
Salesforce CRM (Salesforce, 2010b) Software CRM
SOASTA (SOASTA, 2010) Platform Testing
Trackvia (Trackvia, 2010) Infrastructure Database
3. Stop guessing: Companies can access as much or as little as they need, and scale up and down
as required with only a few minutes notice.
4. Increase speed and agility: In a cloud computing environment, new IT resources are a click
away, reducing the time it takes to make resources available from weeks to just minutes.
This results in a dramatic increase in organizational agility, as the cost and time to experiment
and develop are significantly lower.
5. Stop spending money on running and maintaining data centers: Companies can focus on proj-
ects that differentiate their business, not the infrastructure.
6. Go global in minutes: An application can be deployed in multiple regions around the world.
• Hosted and maintained by the provider: The cloud hosting provider purchases, hosts, and main-
tains the necessary hardware and software in their own facility. Service users avoid capital
expenditures and maintenance costs.
• Self-service through a web interface: Service users can initiate functions of specific service and
increase or decrease their service usage level, though a web interface with little or no interac-
tion with the service provider.
• Pay for use: Service users pay only for the amount of service they use. This can result in
substantial cost savings compared to the traditional approach of developing on-site IT capaci-
ties geared toward maximum usage scenarios, and then having that capacity be under-utilized
much of the time.
• Near-limitless scalability: Cloud computing services providers typically have the infrastructure
to deliver their service at massive scale. For cloud service users, the cloud can easily accom-
modate business growth or periodic spikes in service usage.
• IaaS: IaaS provides users access to raw computing resources such as processing power, data
storage capacity and networking, in the context of a secure data center.
• PaaS: Geared toward software development teams, PaaS offerings provide computing and stor-
age infrastructure and also a development platform layer, with components such as web servers,
database management systems and software development kits (SDKs) for various programming
languages.
• SaaS: SaaS providers offer application-level services tailored to a wide variety of business
needs, such as CRM, marketing automation or business analytics.
of hardware acquisition, provisioning and maintenance, as well as software licensing, installation and
support. The other benefits of the SaaS model include:
• Flexible payments: Rather than purchasing software to install, or additional hardware to sup-
port it, customers subscribe to a SaaS offering. Generally, they pay for this service on a monthly
basis using a pay-as-you-go model. Transitioning costs to a recurring operating expense allows
many businesses to exercise better and more predictable budgeting. Users can also terminate
SaaS offerings at any time to stop these recurring costs.
• Scalable usage: Cloud services such as SaaS offer high scalability, giving customers the option
to access more, or fewer, services or features on-demand.
• Automatic updates: Rather than purchasing new software, customers can rely on a SaaS pro-
vider to automatically perform updates and patch management. This further reduces the burden
on in-house IT staff.
• Accessibility and persistence: As SaaS applications are delivered over the Internet, users can
access them from any Internet-enabled device and location.
However, SaaS also has some potential disadvantages. Businesses must rely on outside vendors to pro-
vide the software, keep that software up and running, track and report accurate billing and facilitate
a secure environment for the business’ data. Providers who experience service disruptions impose
unwanted changes to service offerings, experience a security breach or any other issue can have a pro-
found effect on the customers’ ability to use their SaaS offerings. As a result, users should understand
their SaaS provider’s service-level agreement and make sure it is enforced.
Software as a Service is closely related to the application service provider and on-demand computing
software delivery models. The hosted application management model of SaaS is similar to ASP: the
provider hosts the customer’s software and delivers it to approved end users over the Internet. In the
software on-demand SaaS model, the provider gives customers network-based access to a single copy of
an application that the provider has created specifically for SaaS distribution. The application’s source
code is the same for all customers, and when new features and functionalities are rolled out, they are
rolled out to all customers. Depending upon the SLA, the customer’s data for each model may be stored
locally, in the cloud or both locally and in the cloud.
Organizations can integrate SaaS applications with other software using application programming
interfaces (APIs). For example, a business can write its own software tools and use the SaaS provider’s
APIs to integrate those tools with the SaaS offering.
There are SaaS applications for fundamental business technologies, such as email, sales management,
CRM, financial management, human resource management, billing and collaboration. Leading SaaS
providers include Salesforce, Oracle, SAP, Intuit and Microsoft (Rouse and Casey, 2016).
install the enterprise workload into that VM. Customers can then use the provider’s services to track
costs, monitor performance, balance network traffic, troubleshoot application issues, manage disaster
recovery and more.
Any cloud computing model requires the participation of a provider. The provider is often a third-
party organization that specializes in selling IaaS. Amazon Web Services and Google Cloud Platform
(GCP) are examples of independent IaaS providers. A business might also opt to deploy a private cloud,
becoming its own provider of infrastructure services.
Organizations choose IaaS because it is often easier, faster and more cost-efficient to operate a work-
load without having to buy, manage and support the underlying infrastructure. With IaaS, a business can
simply rent or lease that infrastructure from another business.
Infrastructure as a Service is an effective model for temporary or experimental workloads or work-
loads that change unexpectedly. For example, if a business is developing a new software product, it might
be more cost-effective to host and test the application using an IaaS provider. Once the new software is
tested and refined, the business can remove it from the IaaS environment for a more traditional, in-house
deployment. Conversely, the business could commit that piece of software to a long-term IaaS deploy-
ment, where the costs of a long-term commitment may be less.
In general, IaaS customers pay on a per-use basis, typically by the hour, week or month. Some IaaS
providers also charge customers based on the amount of VM space they use. This pay-as-you-go model
eliminates the capital expense of deploying in-house hardware and software (Figure 4.8).
The advantages of IaaS include the following:
• Development and tests: Teams can quickly set up and unmount development and testing envi-
ronments, reducing the time to market for new applications. With IaaS, scaling and vertically
reducing development and testing environments is faster and cheaper.
• Hosting websites: Running websites with IaaS can be cheaper than traditional web hosting.
• Storage, backup and recovery: Organizations avoid the capital outlay necessary to obtain stor-
age and the complexity of managing it, for which it is usually necessary to have qualified
personnel to administer the data and meet a series of legal requirements. Infrastructure as a
Service is very useful to control unpredictable demand and the increasing need for storage.
It can also simplify the planning and administration of backup and recovery systems.
• Web applications: IaaS provides all the necessary infrastructure to support web applications,
such as storage, web and application servers and network resources. Organizations can imple-
ment web applications quickly in IaaS, as well as vertically scale or reduce the infrastructure,
without difficulty, when the demand for applications is unpredictable.
• Cloud billing is extremely granular, and it is broken out to reflect the precise usage of ser-
vices. It is common for users to experience sticker shock—or finding costs to be higher than
expected—when reviewing the bills for every resource and service involved in an application
deployment. Users should monitor their IaaS environments and bills closely to understand how
IaaS is being used and to avoid being charged for unauthorized services.
• Insight is another common problem for IaaS users. Because IaaS providers own the infrastruc-
ture, the details of their infrastructure configuration and performance are rarely transparent to
IaaS users. This lack of transparency can make systems management and monitoring more
difficult for users.
• IaaS users are also concerned about service resilience. The workload’s availability and performance
is highly dependent on the provider. If an IaaS provider experiences network bottlenecks or any
form of internal or external downtime, the users’ workloads will be affected. In addition, because
IaaS is a multi-tenant architecture, the noisy neighbor issue can negatively impact users’ workloads.
There are many IaaS vendors offering a range of products and services:
• AWS offers storage services such as Simple Storage Services (S3) and Glacier, as well as com-
pute services, including its Elastic Compute Cloud (EC2).
• GCP offers storage and compute services through Google Compute Engine.
• Microsoft Azure also offers storage and compute services.
• Smaller or niche players in the IaaS marketplace include Rackspace Managed Cloud,
CenturyLink Cloud, DigitalOcean and more.
Services can include serverless functions, such as AWS Lambda, Azure Functions or Google Cloud
Functions, database access, big data compute environments, monitoring, logging, and more. Users will
need to carefully consider the services, reliability and costs before choosing a provider—and be ready to
select an alternate provider and to redeploy to the alternate infrastructure if necessary (Rouse et al., 2018).
The principal benefit of PaaS is simplicity and convenience for users—the PaaS provider supplies
much of the infrastructure and other IT services, which users can access anywhere via a web browser.
Platform as a Software providers then charge for that access on a per-use basis—a model that many
enterprises prefer, as it eliminates the capital expenses they traditionally have for on-premises hardware
and software. Some PaaS providers charge a flat monthly fee to access their service, as well as the apps
hosted within it.
There are some potential concerns, however:
• Service availability or resilience can be a concern with PaaS. If a provider experiences a ser-
vice outage or other infrastructure disruption, this can adversely affect customers and result in
costly lapses of productivity.
• Provider lock-in is another common concern, as users cannot easily migrate many of the
services and much of the data produced through one PaaS product to another competing
product. Users must evaluate the business risks of service downtime and lock-in before they
commit to a PaaS provider.
• Internal changes to a PaaS product is a final potential issue. For example, if a PaaS provider
stops supporting a certain programming language or opts to use a different set of develop-
ment tools, the impact on users can be difficult and disruptive. Users must follow the PaaS
provider’s service roadmap to understand how the provider’s plans will affect its environment
and capabilities.
Many PaaS providers supply the tools and services needed to build enterprise applications in the
cloud.
• Google App Engine supports distributed web applications using Java, Python, PHP and Go.
• Red Hat OpenShift is a PaaS offering for creating open source applications using a wide variety
of languages, databases and components.
• Heroku PaaS offers Unix-style container computing instances that run processes in isolated
environments, while supporting languages such as Ruby, Python, Java, Scala, Cloture and
Node.js.
• Microsoft Azure supports application development in .NET, Node.js, PHP, Python, Java
and Ruby, and allows developers to use SDKs and visual studio to create and deploy
applications.
• AWS Elastic Beanstalk allows users to create, deploy and scale web applications and services
developed with Java, .NET, PHP, Node.js, Python, Ruby, Go and Docker on common servers,
such as Apache, Nginx, Passenger and IIS.
While many PaaS providers offer similar services, each provider can pose unique nuances and limita-
tions. It is important for users to test prospective providers to ensure their services meet any business or
technical requirements, such as languages supported and service availability.
FIGURE 4.9 Service models for cloud computing. (From Rouse M, and Bigelow S., https://searchcloudcomputing.tech-
target.com/definition/Platform-as-a-Service-PaaS?int=off, 2017a.)
• Software as a Service (SaaS) provides application, data and backup storage systems in the cloud,
• DBaaS provides access to a database platform through the cloud. Public cloud providers such
as AWS and Azure have DBaaS offerings.
• Disaster Recovery as a Service (DRaaS),
• CaaS,
• Network as a Service, and
• Malware as a Service (MaaS) uses the public cloud to help organizations guard against com-
mon attacks, such as ransomware and distributed denial of service. VMware AppDefense is
one emerging example of MaaS.
Organizations often choose XaaS because the as-a-service model can cut costs and simplify IT deploy-
ments. With every additional cloud service, an organization can shed pieces of its in-house IT infra-
structure, leading to fewer servers, hard drives, network switches, software deployments, and more. Less
on-premises IT means less physical overhead—such as equipment space, power and cooling. This trans-
lates to reductions in IT staffing and firefighting or allows IT staff to focus on more important, value-
added projects for the business. In addition, using an outside service rather than on-premises technology
shifts many capital expenses (Capex) to operational expenses (Opex) for the business.
Despite their benefits, XaaS offerings sometimes contend with issues of resilience and Internet
reliability. Some enterprises also want more visibility into their service provider’s environment and
Cloud Computing, Data Sources and Data Centers 145
infrastructure so that they can better gauge service health and assume a more proactive role. In addition,
a service provider who goes out of business, gets acquired, discontinues a particular service or alters its
feature roadmap can have a profound impact on XaaS users.
The combination of cloud computing and ubiquitous, high-bandwidth, global Internet access provides
a fertile environment for XaaS growth. Some organizations have been tentative to adopt XaaS because
of security, compliance and business governance concerns. However, service providers increasingly
address these concerns, allowing organizations to bring additional workloads into the cloud (Rouse and
Bigelow, 2017b).
• A data warehouse is a large data repository that aggregates data usually from multiple sources
or segments of a business, without the data being necessarily related.
• A data lake is a large data repository that stores unstructured data that are classified and tagged
with metadata.
• Data marts are subsets of the data repository. These data marts are more targeted to what the
data user needs and easier to use. Data marts are also more secure because they limit autho-
rized users to isolated data sets. These users cannot access all the data in the data repository.
• Metadata repositories store data about data and databases. The metadata explains where the
data source is, how it was captured, and what it represents.
• Data cubes are lists of data with three or more dimensions stored as a table—as you may find
in a spreadsheet.
• Isolation allows easier and faster data reporting or analysis because the data are clustered together.
• Database administrators have an easier time-tracking issues because data repositories are
compartmentalized.
• Data are preserved and archived.
• Growing data sets could slow down systems; therefore, it is necessary to ensure that the data-
base management systems can scale with data growth.
• A system crash could affect all the data; databases must be backed up and access to applications
must be isolated to restrain system risk.
• Unauthorized users can access all sensitive data more easily than if they were distributed across
several locations.
Cloud Computing, Data Sources and Data Centers 147
NOTE: As difficult as it is to secure one source of data, distributing the data in several locations makes
them more difficult to secure. This risk must be addressed when planning data repository management.
• Enlist a high-level business champion to engage all stakeholders during the project develop-
ment and during its use, not a developer but someone who can work across departments, engag-
ing people who will use the data repository.
• The data repository will need to grow. Treat it as an ongoing system.
• Hire experts who can build and maintain the data repository.
• In the beginning, keep the scope of the data repository modest. Collect smaller sets of data
and restrict the number of data subjects. Build complexity as data users learn the system and
discover ROI.
• Use Extract-Transformation-Load tools to migrate data to the data repository. These tools
ensure data quality in the transfer.
• Build a data warehouse first; then build the data marts.
• Decide how often the data warehouse will load new data. This often depends on the volume
of data.
• Metadata are necessary for quality data analysis and reporting.
• Data users need to have access to education and support.
• The data repository will need to evolve. The types of data it collects and the uses for them will
change. Having flexible plans will allow for changes in technology.
As more organizations adopt data repositories to store and manage their ever-growing volume of
data, a secure approach is pertinent to an enterprise’s overall security posture. Adopting sound
security practices, such as developing comprehensive access rules to allow only authorized users
with a legitimate business need to access, modify or transmit data, are crucial. Combined with a
digital signature approach or multifactor authentication, access rules go a long way toward keeping
sensitive data stored in a data repository secure. These and other security measures enable today’s
enterprises to fully leverage large volumes of data without introducing unnecessary security risks
(Aldorisio, 2018).
Regardless of classification, effective data center operation is achieved through a balanced investment
in the facility and equipment housed. The elements of a data center break down as follows:
• Facility: The location and “white space” or usable space available for IT equipment. Providing
round-the-clock access to information makes data centers some of the most energy-consuming
facilities in the world. A high emphasis is placed on the design to optimize white space and
environmental control to keep equipment within manufacturer-specified temperature or humid-
ity range.
• Support infrastructure: Equipment contributing to securely sustaining the highest level of
availability possible. Some components for supporting infrastructure include:
• Uninterruptible power sources—battery banks, generators and redundant power sources.
• Environmental control—computer room air conditioners (CRAC), heating, ventilation,
and air conditioning systems and exhaust systems.
• Physical security systems—biometrics and video surveillance systems.
• IT equipment—actual equipment for IT operations and storage of the organization’s data.
This includes servers, storage hardware, cables and racks, as well as a variety of informa-
tion security elements, such as firewalls.
• Operations staff—to monitor operations and maintain IT and infrastructural equipment
around the clock.
Data centers have evolved significantly, adopting technologies such as virtualization to optimize resource
utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand ser-
vices, many organizations are moving toward cloud-based services and infrastructure. A focus has also
been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating
more efficient technologies and practices in data center management. Data centers built to these stan-
dards have been coined “green data centers.” (What is a Data Center?)
Standard for Data Centers,” which defines four tiers of data center design and implementation guidelines.
Each subsequent tier is intended to provide more resilience, security and reliability than the previous tier.
For example, a tier 1 data center is little more than a server room, while a tier 4 data center offers redun-
dant subsystems and high security.
Although it is generally assumed that data privacy is better protected in central computing environments
as a consequence of the favorable security history of mainframe technology, the apparently controlled
execution of processes and the known location of data, this is not entirely true.
• First, the leading cloud providers have an impressive safety record with no major known
incidents.
• Second, services such as banking are currently offered from diverse locations and are acces-
sible through remote channels. This creates possible attack points to mainframe systems, which
in some cases were not designed to be open to third parties.
• Third, although the location of the data in a public cloud is not always evident, the main cloud
providers provide tools that allow users to establish the geographic area where the data will be
stored and processed, if they wish.
In terms of information security, cloud computing seems to be as well positioned as (or even better than)
mainframe technology when it comes to safeguarding integrity and availability. The services in the cloud
incorporate redundancy, high availability and flexibility because of their distributed nature. In most cases,
cloud providers are more secure than many individual companies can maintain and manage on-site.
Despite the supposed loss of control of data and processes executed in a public cloud, users can choose
the degree of protection or control needed for each type of data. In fact, the providers offer most of the
security options available in traditional technologies adapted to the cloud (encryption, virtualization,
etc.), as well as other security features specific to the cloud and even Software as a Service (SaaS).
In addition, cloud providers are responsible for keeping systems up-to-date. Some of them even design
their own hardware. This makes their systems more difficult to hack, reduces the need to patch the soft-
ware and allows a higher level of automation.
Cloud computing also offers a better response to incidents, because a wide range of clients that oper-
ate simultaneously can identify vulnerabilities and share security information more quickly. As a result,
users can decide on the security approach and make it more harmonized, flexible and adaptive than in a
mainframe environment.
REFERENCES
Aldorisio J., What is a Data Repository? 2018. https://digitalguardian.com/blog/what-data-repository.
Amazon, Amazon elastic block storage. 2010a. http://aws. amazon.com/ebs/.
Amazon, Amazon elastic compute cloud. 2010b. http://aws.amazon.com/ec2/.
Cloud Computing, Data Sources and Data Centers 151
Rouse M., Godinho R., and Bigelow S., Data center. 2017. https://searchdatacenter.techtarget.com/definition/
data-center.
Salesforce, Salesforce apex. 2010a. http://wiki.developerforce.com/.
Salesforce, Salesforce customer relationship management (CRM). 2010b. http://www.salesforce.com/crm/.
SalesForce, Force.com. 2010. http://www.salesforce.com/platform/.
SOASTA, SOASTA cloud test. 2010. http://www.soasta.com/.
StorSimple, 2010. http://www.storsimple.com.
Trackvia, Trackvia cloud database. 2010. http://www.trackvia.com/products/cloud-database.
UBOOT, Das U-Boot: The universal boot loader. 2010. http://www.denx.de/wiki/U-Boot/.
Velte A. T., Velte T. J., and Elsenpeter R., CloudComputing: A Practical Approach. McGraw-Hill, New York,
2009.
Wait, what are cloud services? What you need to know. 2010. https://searchitchannel.techtarget.com/
Wait-what-are-cloud-services-What-you-need-to-know.
What does CMMS stand for? https://www.ibm.com/internet-of-things/business-solutions/cmms-software/
what-is-a-cmms.
What is a CMMS? 2018. https://www.micromain.com/what-is-a-cmms/.
What is Cloud Computing? https://aws.amazon.com/what-is-cloud-computing/?nc1=h_ls.
What is a Data Center? https://www.paloaltonetworks.com/cyberpedia/what-is-a-data-center.
Willis J. M., Unified ontology of cloud computing|IT management and cloud blog. 2009. http://www.johnmwillis.
com/cloud-computing/unified-ontology-of-cloud-computing/.
Youseff L., Butrico M., and da Silva D., Toward a unified ontology of cloud computing. Grid Computing
Environments Workshop, GCE’08, pp. 1–10, 2008.
Zoho, Zoho.com. 2010. http://www.zoho.com/.
5
Big Data Analytics as Service Provider
CONTENTS
5.1 Connection: Sensors and Networks.............................................................................................. 156
5.1.1 Wireless Sensor Network................................................................................................. 156
5.1.1.1 Characteristics.................................................................................................. 159
5.1.1.2 Platforms........................................................................................................... 160
5.1.1.3 Unique Features of WSN: Challenges and Requirements.................................162
5.1.1.4 Types of WSNs...................................................................................................163
5.1.1.5 Application Domains and Deployments........................................................... 164
5.1.1.6 Potential Applications of WSN......................................................................... 166
5.1.1.7 Potential Synergies........................................................................................... 166
5.1.2 Software-Defined Networking in a Wide Area Network................................................. 166
5.1.3 Virtual Private Network....................................................................................................167
5.1.4 Software-Defined Networking..........................................................................................168
5.1.5 Low-Power Wide-Area Network.......................................................................................168
5.1.6 Wireless Sensor and Actuator Network............................................................................168
5.1.6.1 Actors vs. Actuator............................................................................................169
5.1.6.2 Peculiarities of Wireless Sensor and Actor Networks.......................................169
5.2 Content or Context.........................................................................................................................170
5.2.1 The Age of Content...........................................................................................................170
5.2.2 The Age of Context...........................................................................................................171
5.3 Data Sharing and Collaboration.....................................................................................................171
5.3.1 Introduction.......................................................................................................................171
5.3.1.1 Background: Understanding the Analyst’s Needs for Collaboration................172
5.3.1.2 Understanding Domain Knowledge..................................................................172
5.3.1.3 Understanding the Data Model..........................................................................173
5.3.1.4 Understanding the Data.....................................................................................173
5.3.1.5 Need for Knowledge Management....................................................................174
5.4 Big Data Analytics.........................................................................................................................175
5.5 Descriptive Analytics.....................................................................................................................176
5.5.1 Definition...........................................................................................................................176
5.5.2 Process of Descriptive Analytics......................................................................................177
5.5.3 Understanding the Data.....................................................................................................177
5.6 Diagnostic Analytics......................................................................................................................178
5.6.1 Predictive Analytics..........................................................................................................178
5.6.1.1 Definition...........................................................................................................178
5.6.1.2 Predictive Analytics Process.............................................................................179
5.7 Prescriptive Analytics....................................................................................................................182
5.7.1 Definition...........................................................................................................................182
5.7.2 Process of Prescriptive Analysis.......................................................................................183
5.7.3 When to Use Prescriptive Analysis...................................................................................183
5.8 What Types of Data Analytics Do Companies Choose?.............................................................. 184
References............................................................................................................................................... 184
155
156 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
Figure 5.1 (a) Typical architecture of sensor node and (b) typical connection of sensor + node
+ gateway......................................................................................................................... 157
Figure 5.2 Remote services.............................................................................................................. 158
Figure 5.3 Types of networks........................................................................................................... 159
Figure 5.4 Types of WSN..................................................................................................................163
Figure 5.5 Taxonomy of WSN applications......................................................................................165
Figure 5.6 Wireless body area network (WBAN).............................................................................165
Figure 5.7 Examples of WSN applications deployed in a real environment.................................... 166
Figure 5.8 Potential synergies between WSN and other existing and emerging technologies.........167
Figure 5.9 Physical architecture of a WSAN....................................................................................169
Figure 5.10 R
obots designed by several robotics research laboratories: (a) Ground mapping
and air-to-ground cooperation of autonomous robotic vehicles, (b) autonomous
untethered robot, (c) autonomous battlefield robot, (d) sub-kilogram intelligent
tele-robots.........................................................................................................................170
Figure 5.11 Four types of data analytics.............................................................................................175
Figure 5.12 Types of Big Data analytics.............................................................................................176
Figure 5.13 Descriptive analytics........................................................................................................178
Figure 5.14 Predictive analytics value chain...................................................................................... 180
Figure 5.15 Predictive analytics process............................................................................................ 180
Figure 5.16 Predictive analytics process with model monitoring.......................................................181
Figure 5.17 Predictive analytics..........................................................................................................182
LIST OF TABLE
Transceiver
Sensor 1
Power Source
Micro-controller ADC
Sensor 2
External Memory
(a)
Salidas:
Discretas y Analogas
Comunicación:
TCP o Ethernet IP
NODO GATEWAY
Sensor QM42VT1
PLC O HMI
Red Local
(b) Inalambrica
FIGURE 5.1 (a) Typical architecture of sensor node (Wikipedia, 2018) and (b) typical connection of sensor + node + gateway.
(From DAKORA, S.A.S., Supervisión de vibraciones y temperatura, April 2018, http://dakora.com.co/2018/04/26/supervision-
de-vibraciones-y-temperatura-2/, 2018.)
commands from a central computer and transmits data to that computer. The power for each sensor
node is derived from a battery (Rouse Margaret, 2006). Figure 5.1 shows typical architecture of sensor
node and typical connection of sensor + node + gateway. On the other hand, Figure 5.2 shows a system
remote services.
Wireless sensor network refers to a group of spatially dispersed and dedicated sensors for monitoring
and recording the physical conditions of the environment and organizing the collected data at a central
location. Wireless sensor networks measure environmental conditions such as temperature, sound, pol-
lution levels, humidity, wind and so on.
These are similar to wireless ad hoc networks in that they rely on wireless connectivity and the spon-
taneous formation of networks so that sensor data can be transported wirelessly to a main location. The
more modern networks are bidirectional, enabling control of sensor activity. The development of WSNs
was motivated by military applications such as battlefield surveillance; today, such networks are used in
158 Handbook of Industry 4.0 and SMART Systems
many industrial and consumer applications, such as industrial process monitoring and control, machine
health monitoring and so on.
The WSN is built of “nodes,” from a few to several hundreds or even thousands, where each node is
connected to one (or sometimes several) sensors. Each such sensor network node typically has several
parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller,
an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embed-
ded form of energy harvesting. Sensor nodes vary in size from a shoebox to a grain of dust, although
functioning “motes” with genuine microscopic dimensions have yet to be created. The cost of sensor
nodes is similarly variable, ranging from a few dollars to hundreds of dollars, depending on the com-
plexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding
constraints on resources, such as energy, memory, computational speed and communications bandwidth.
The topology of WSNs can vary from a simple star network to an advanced multi-hop wireless mesh
network. The propagation technique between the hops of the network can be routing or flooding (Dargie
and Poellabauer, 2010; Sohraby et al., 2007).
In computer science and telecommunications, WSNs are an active research area, with numerous work-
shops and conferences arranged each year, for example, IPSN, SenSys and EWSN (Wikipedia, 2019e).
Figure 5.3 shows types of networks.
A WSN has a processor, a radio interface, an analog-to-digital converter, sensors, memory, and a
power supply. The processor provides the mote management functions and performs data process-
ing. The sensors attached to the mote are capable of sensing temperature, humidity, light and so
on. Due to bandwidth and power constraints, motes primarily support low data units with limited
computational power and a limited sensing rate. Memory is used to store programs (instructions
Big Data Analytics as Service Provider 159
Mix
Double Ring
Tree Red
FIGURE 5.3 Types of networks. (From Güimi, Redes de comunicaciones, April, 2009, https://guimi.net/monograficos/
G-Redes_de_comunicaciones/G-Redes_de_comunicaciones.pdf, 2009.)
executed by the processor) and data (raw and processed sensor measurements). Motes are equipped
with a low-rate (10–100 kbps) and short-range (less than 100 m) wireless radio, for example, IEEE
802.15.4 radio, to communicate among themselves. As radio communication consumes most of the
power, the radio must incorporate energy-efficient communication techniques. A commonly used
power source is rechargeable batteries. As motes can be deployed in remote and hostile environments,
they must use little power and employ built-in mechanisms to extend network lifetime. For example,
motes may be equipped with effective power harvesting methods such as solar cells, permitting them
to be left unattended for years.
Sensor nodes can be deployed in an ad hoc or a pre-planned manner. An ad hoc deployment is
good for large uncovered regions where a network of a very large number of nodes can be deployed
and left unattended to perform monitoring and reporting functions. Network maintenance, such as
managing connectivity and detecting failures, is difficult in such a WSN because of the large num-
ber of nodes. However, pre-planned deployment is good for limited coverage; when fewer nodes are
deployed at specific locations, the network maintenance and management costs become lower (Rawat
et al., 2013).
5.1.1.1 Characteristics
The main characteristics of a WSN include the following (Wikipedia, 2019e):
• Power consumption constraints for nodes using batteries or energy harvesting; examples of
suppliers are ReVibe Energy (2017) and Perpetuum (PERPETUUM, 2018);
• Ability to cope with node failures (resilience);
• Some mobility of nodes (for highly mobile nodes, see mobile WSNs);
• Heterogeneity of nodes;
• Homogeneity of nodes;
• Scalability to large scale of deployment;
• Ability to withstand harsh environmental conditions;
• Ease of use;
• Cross-layer design (Saleem et al., 2009; Miao et al., 2016; Aghdam et al., 2014).
160 Handbook of Industry 4.0 and SMART Systems
Cross-layering is becoming an important research topic for wireless networks (Miao et al., 2016), as the
traditional layered approach traditionally used in wired networks has the following three main issues:
• It cannot share different information among different layers; thus, each layer has incomplete
information.
• It cannot guarantee the optimization of the entire network.
• It does not have the ability to adapt to environmental change.
In other words, because of the interference between the different users, access conflicts, fading, and
the change of environment in the WSNs, the traditional layered approach is not applicable to wireless
networks.
A cross-layer approach can be used for optimal modulation to improve the transmission performance,
such as data rate, energy efficiency, and quality of service (QoS) (Miao et al., 2016). Sensor nodes can be
imagined as small computers, which are extremely basic in terms of their interfaces and their components.
They usually consist of a processing unit with limited computational power and limited memory, sensors
or microelectromechanical systems (including specific conditioning circuitry), a communication device
(usually radio transceivers or possibly optical) and a power source usually in the form of a battery. Other
possible inclusions are energy harvesting modules (Magno et al., 2014), secondary application-specific
integrated circuits and secondary communication interfaces (e.g., RS-232 or universal serial bus).
The base stations are one or more components of the WSN with much more computational energy and
communication resources. They act as a gateway between sensor nodes and the end user, as they typi-
cally forward data from the WSN to a server.
Other special components in routing-based networks are routers, designed to compute, calculate and
distribute the routing tables (Wikipedia, 2019e).
5.1.1.2 Platforms
• Hardware
One major challenge in a WSN is to produce tiny, low-cost sensor nodes. An increasing num-
ber of companies are producing WSN hardware, but many nodes are still in the research and
development stage, particularly their software. Another challenge is the use of very low-power
methods for radio communication and data acquisition (Wikipedia, 2019e).
In many applications, a WSN communicates with a local area network (LAN) or wide area net-
work (WAN) through a gateway. The gateway acts as a bridge between the WSN and another
network. This enables data to be stored and processed by devices with more resources, for
example, in a remotely located server. A wireless WAN used primarily for low-power devices
is known as a low-power wide-area network (LPWAN) (Wikipedia, 2019e).
• Standards and solutions for connectivity
There are several wireless standards and solutions for sensor node connectivity. Thread and
ZigBee can connect sensors operating at 2.4 GHz with a data rate of 250 kbit/s. Many use
a lower frequency to increase radio range (typically 1 km); for example, Z-wave operates at
915 MHz, and in the EU, 868 MHz has been widely used, but these have a lower data rate (typi-
cally 50 kbit/s). The IEEE 802.15.4 working group provides a standard for low-power device
connectivity; sensors and smart meters commonly use one of these standards for connectiv-
ity. With the emergence of Internet of Things (IoT), many other proposals have been made to
provide sensor connectivity. LoRa is a form of LPWAN, which provides long-range low-power
wireless connectivity for devices; it has been used in smart meters. Wi-SUN connects devices
at home. NarrowBand IoT and LTE-M can connect up to millions of sensors and devices using
cellular technology (Wikipedia, 2019)e.
• Software
Energy is the scarcest resource of WSN nodes, but it determines the lifetime of WSNs. Wireless
sensor networks may be deployed in large numbers in various environments, including remote
Big Data Analytics as Service Provider 161
and hostile regions, where ad hoc communications are a key component. For this reason,
algorithms and protocols need to address the following issues (Wikipedia, 2019e):
• Increased lifespan,
• Robustness and fault tolerance,
• Self-configuration and
• Lifetime maximization.
Energy or power consumption of the sensing device should be minimized, and sensor nodes should be
energy efficient as their limited energy resource determines their lifetime. To conserve power, wire-
less sensor nodes normally power off both the radio transmitter and the radio receiver when not in use
(Miao et al., 2016).
• Operating systems
Operating systems (OSs) for WSN nodes are typically less complex than general-purpose OSs.
They more strongly resemble embedded systems, for two reasons. First, WSNs are typically
deployed with a particular application in mind, rather than as a general platform. Second, a
need for low costs and low power leads most wireless sensor nodes to have low-power micro-
controllers ensuring that mechanisms such as virtual memory are either unnecessary or too
expensive to implement.
It is therefore possible to use embedded OSs such as eCos or µC/OS for sensor networks.
Such OSs are often designed with real-time properties (Wikipedia, 2019e).
Operating systems for WSNs include the following (Wikipedia, 2019e):
• TinyOS is perhaps the first (Ranjbaran et al., 2013) operating system specifically designed
for WSNs. It is based on an event-driven programming model instead of multithreading.
Its programs are composed of event handlers and tasks with run-to-completion seman-
tics. When an external event occurs, such as an incoming data packet or a sensor reading,
TinyOS signals the appropriate event handler to handle the event. Event handlers can post
tasks that are scheduled by the TinyOS kernel sometime later.
• LiteOS is a newly developed OS for WSNs; it provides UNIX-like abstraction and support
for the C programming language.
• Contiki is an OS that uses a simpler programming style in C while providing advances such
as 6LoWPAN and Protothreads.
• RIOT (operating system) is a more recent real-time OS including functionality similar to
Contiki.
• PreonVM (VIRTENIO, 2011) is an OS for WSNs, which provides 6LoWPAN based on
Contiki and support for the Java programming language.
• Online collaborative sensor data management platforms
Online collaborative sensor data management platforms are online database services that allow sen-
sor owners to register and connect their devices to feed data into an online database for storage. They
also allow developers to connect to the database and build their own applications based on those data.
Examples include the Xively and Wikisensing platforms.
The Wikisensing system (Silva et al., 2012) includes application programming interface (APIs) and inter-
faces for online collaborators, a middleware containing the business logic needed for the sensor data manage-
ment and processing, and a storage model suitable for the efficient storage and retrieval of large volumes of
data.
Such platforms simplify online collaboration between users over diverse data sets ranging from
energy and environment data to data collected from transport services. Other services include allow-
ing developers to embed real-time graphs and widgets in websites, analyze and process historical data
pulled from the data feeds, and send real-time alerts from any data stream to control scripts, devices
and environments (Wikipedia, 2019e).
162 Handbook of Industry 4.0 and SMART Systems
TABLE 5.1
Challenges vs. Required Mechanisms in WSN
Challenges Required Mechanisms
Resource constraints Efficient use of resources
Dynamic and extreme environment Adaptive network operation
conditions
Data redundancy Data fusion and localized processing
Unreliable wireless communication Reliability
No global identification (ID) for sensor Data-centric communication paradigm
nodes
Prone to node failures Fault tolerance
Large scale deployment Low-cost small-sized sensors with self-configuration and self-organization
Source: Rawat, P. et al., J. Supercomput., 4–7, 15–17, 31, 2013.
Big Data Analytics as Service Provider 163
• Terrestrial WSN: It consists of a large number (hundreds to thousands) of low-cost nodes deployed
on land in a given area, usually in an ad hoc manner (e.g., nodes dropped from an airplane). In
terrestrial WSNs (Akyildiz et al., 2002) sensor nodes must be able to effectively communicate
data back to the base station in a dense environment. As battery power is limited and usually non-
rechargeable, terrestrial sensor nodes can be equipped with a secondary power source such as
solar cells. Energy can be conserved with multi-hop optimal routing, short transmission range, in-
network data aggregation and low duty-cycle operations. The common applications of terrestrial
WSNs are environmental sensing and monitoring, industrial monitoring and surface explorations.
• Underground WSN: It consists of sensor nodes deployed in caves or mines or underground to
monitor underground conditions (Akyildiz and Stuntebeck 2006; Li and Liu, 2007). In order to
relay information from the underground sensor nodes to the base station, additional sink nodes
are located above ground. They are more expensive than terrestrial WSNs as they require appro-
priate equipment to ensure reliable communication through soil, rocks and water. Wireless com-
munication is a challenge in such an environment because of high attenuation and signal loss.
Moreover, it is difficult to recharge or replace the battery of nodes buried underground, mak-
ing it important to design an energy-efficient communication protocol for prolonged lifetime.
Underground WSNs are used in many applications, such as agriculture monitoring; landscape
management; underground monitoring of soil, water, or mineral; and military border monitoring.
• Underwater WSN: It consists of sensors deployed underwater, for example, in the ocean envi-
ronment (Akyildiz et al., 2004; Heidemann et al., 2006). Because these nodes are expensive,
only a few are deployed, and autonomous underwater vehicles are used to explore or gather
data from them. Underwater wireless communication uses acoustic waves, and this presents
various challenges, including limited bandwidth, long propagation delay, high latency and sig-
nal fading. These nodes must be able to self-configure and adapt to the extreme conditions
of the ocean environment. Nodes are equipped with a limited battery that cannot be replaced
FIGURE 5.5 Taxonomy of WSN applications. (From Rawat, P. et al., J. Supercomput., 4–7, 15–17, 31, 2013.)
FIGURE 5.6 Wireless body area network (WBAN). (From Jovanov, E. et al., J. Neuroeng. Rehabil., 2, 6, 2005.)
166 Handbook of Industry 4.0 and SMART Systems
FIGURE 5.7 Examples of WSN applications deployed in a real environment. (From Rawat, P. et al., J. Supercomput.,
4–7, 15–17, 31, 2013.)
Several applications have been deployed and with the advancement in technology, new application
areas keep emerging. Figure 5.7 shows some examples of WSN applications that have been tested in the
real environment (Rawat et al., 2013).
• Industrial automation;
• Automated and smart homes;
• Video surveillance;
• Traffic monitoring;
• Medical device monitoring;
• Monitoring of weather conditions;
• Air traffic control;
• Robot control.
FIGURE 5.8 Potential synergies between WSN and other existing and emerging technologies. (From Rawat, P. et al., J.
Supercomput., 4–7, 15–17, 31, 2013.)
FIGURE 5.9 Physical architecture of a WSAN. (From BWN-LAB, Wireless Sensor and Actor Networks (WSAN),
Broadband & Wireless Networking Laboratory Personnel, http://bwn.ece.gatech.edu/actors/.)
buildings. That accuracy is expected to be enabled through the combined use of the sensors in the device.
The applications of that capability are varied. For example, numerous individuals using smart devices
could, in effect, form a WSAN to monitor entire populations (Rouse Margaret, 2015a).
Wireless sensor and actuator networks are part of the increasing trend toward the IoT, in which any
entity imaginable can be outfitted with a unique identifier (UID) and have the ability to transmit data over
the network. As with many other elements of the IoT, however, WSANs raise privacy and security issues.
The physical architecture of the WSAN is shown in Figure 5.9. In such a network, sensors gather
information about the physical world; based on that information, actors make decisions and then perform
appropriate actions. This allows remote, automated interaction with the environment (BWN-LAB).
• While sensor nodes are small, inexpensive devices with limited sensing, computation and wire-
less communication capabilities, actors are usually resource-rich devices equipped with better
processing capabilities, stronger transmission powers and longer battery life.
• In WSANs, depending on the application there may be a need to rapidly respond to sensor
input. Moreover, to provide right actions, sensor data must be valid at the time of acting. The
issue of real-time communication is very important in WSANs, as actions are performed on the
environment after sensing occurs.
• The number of sensor nodes deployed in studying a phenomenon may be in the order of hun-
dreds or thousands. However, such a dense deployment is not necessary for actor nodes because
of the different coverage requirements and physical interaction methods. Hence, in WSANs,
the number of actors is much lower than the number of sensors.
• A distributed local coordination mechanism is necessary among sensors and actors to provide
effective sensing and acting.
170 Handbook of Industry 4.0 and SMART Systems
FIGURE 5.10 Robots designed by several robotics research laboratories: (a) Ground mapping and air-to-ground
cooperation of autonomous robotic vehicles, (b) autonomous untethered robot, (c) autonomous battlefield robot, (d)
sub-kilogram intelligent tele-robots. (From BWN-LAB, Wireless Sensor and Actor Networks (WSAN), Broadband &
Wireless Networking Laboratory Personnel, http://bwn.ece.gatech.edu/actors/.)
In many real applications, robots are used as actor nodes. The robots designed by several robotics
research laboratories are shown in Figure 5.10. The low-flying helicopter platform shown in Figure 5.10a
provides ground mapping and air-to-ground cooperation of autonomous robotic vehicles. However, it
is likely that in the near future, more actuation functionalities, such as water sprinkling or disposing
of gas, will be supported by this helicopter platform. Possibly, the world’s smallest autonomous unte-
thered robot (1/4 cubic inch and weighing less than an ounce) is being developed in Sandia National
Laboratories and is shown in Figure 5.10b. Although it is not yet capable of performing difficult tasks
that are done with much larger robots, it is very likely that it will be the robot of the future. The
Robotic Mule, an autonomous battlefield robot, is shown in Figure 5.10c. In the United States, several
autonomous battlefield robot projects are sponsored by Space and Naval Warfare Systems Command
and Defense Advanced Research Projects Agency. These battlefield robots can detect and mark mines,
carry weapons, and function as tanks; in the future, they totally replace soldiers on the battlefield.
Finally, the sub-kilogram intelligent tele-robots shown in Figure 5.10d are networked tele-robots with a
radio turret enabling communication over ultra-high frequencies at 4800 kbit/s. These robots can coor-
dinate with each other by exploiting their wireless communication capabilities and perform the tasks
determined by the application (BWN-LAB).
To put things into perspective, 1 Exabyte (1018) of data is created on the Internet daily, amounting to
roughly the equivalent of data in 250 million DVDs. Humankind produces in two days the same amount
of data it took from the dawn of civilization until 2003 to generate, and as the IoT becomes a reality and
more physical objects become connected to the Internet, we will enter the Brontobyte (1027) era.
The issue is no longer one of content, i.e., accumulating data; rather, it is context, i.e., interpreting those
data.
collaborative effort, is often tedious and improperly documented. How can we make the collaborative
process of knowledge discovery from multi-enterprise data more productive? How can we make it easy
for any analyst to learn about datasets he or she has never seen before? How can we enable analysts or
companies to share knowledge with their peers and make multiagency or multicompany interactions a
productive experience—not just for the analysts employed today but also for the analysts in the future?
(Sukumar and Ferrell, 2013).
domain begins when the analysts have shared data dictionaries but do not yet have access to the data
records. Understanding the domain is an iterative learning process that progresses as analysts spend
more time exploring the data (Sukumar and Ferrell, 2013).
The data model generally encodes much information about the domain. While some of this information
is revealed by careful study of the data structures specified and their relationships, other highly useful
information may not be as readily apparent. With extremely large datasets, seemingly simple calcula-
tion queries that compute sums and averages can take more time, and a simple query may return reli-
able data that is grossly inaccurate due to an incomplete understanding of the construction of the data
model. Sometimes, the lack of a good understanding can stem from the fact that relational databases
go through many changes in real-world deployments. For example, mistakes may have been made in
the initial schema. These mistakes need to be corrected, and at times, these corrections do not happen
until long after the system is deployed. Sometimes, business needs change; new data elements have
to be added, or old ones have to be removed, and even if the database was designed correctly in the
beginning, it becomes vital from an analyst’s perspective to track the schema evolution. In addition,
analysts and developers may add new datasets and create relational linkages between these data and the
original data structure. Finding and exploring potential data links between similar or related systems
can greatly expand understanding of the business and may provide new ways of exploring and utilizing
data already available at no additional cost. As new actionable data are added to a data repository and
linkages can be made between the original data and the enhanced information, new queries will be
generated to analyze the impact of considering the old data in light of the added information. These new
queries may lead to a new understanding of data relationships and result in the generation of further
relational data (Sukumar and Ferrell, 2013).
Continuing with the health insurance example given above, the data model would pose questions such
as the following (Sukumar and Ferrell, 2013):
1. What are the primary keys and foreign keys in the data model?
2. What are the UIDs for a beneficiary (customer ID, name, address, etc.)?
3. What are the UIDs for the providers (provider ID, license number, name, etc.)?
4. How do we differentiate between a physician and a hospital based on the data?
5. Why does the data model have separate tables for provider practice location and billing
location?
6. What are the one-to-one relationships and one-to-many relationships in the data model?
action has occurred. In addition, when insight into data relationships is combined with business process
knowledge of the data collection and representation, a greatly enhanced capability to analyze and under-
stand data begins that is often expanded upon while querying.
Understanding the data before beginning to execute queries and generating reports is important, not only to
ensure completeness or cohesiveness of the reports, but also to discover data quality and provenance issues.
While data quality issues can plague any dataset, such issues may be more problematic with Big Data.
A significant subset of “bad” data easily hides undetected in a large data repository, particularly in fields
with less structure or in architectures such as Hadoop, where adherence to the data model is not mandated
before retrieval. Although understanding the process and the model may confirm the importance of a data
element, the assumption that the data element is actually filled in correctly can be incorrect. Missing data,
corrupt data and/or data filled with default or miscellaneous characters that hamper interpretation of anal-
ysis results often shows up in the real world. Knowing about these fields is important to be able to prune
the data elements of value to the analyst. This not only saves query execution time but also contributes to
the accuracy of the analyst’s reports. Certain business rules that were not implemented during the design
of the schema will have to be implemented while querying as well. Such queries are difficult to design
without understanding the aspects of the domain and the model, along with the data. However, once the
query is constructed, it will capture the results of the analyst’s knowledge about the data and the domain,
and there is significant business value in sharing the logic and code with fellow analysts.
As an analyst’s knowledge of a dataset and the processes of the domain grows in completeness, the value
of his or her analytic extractions increases as well. The value of the analyst’s knowledge often translates
into value to the enterprise in terms of cost savings and actionable intelligence (Sukumar and Ferrell, 2013).
• As more data were received and analysts began to bring their individual interests and experi-
ence to the project, there was a proliferation of new third-party reference information and data
sources that all analysts were eager to utilize. In addition, several new data sources were arriv-
ing, but limited or no metadata was provided to elaborate on exactly what kind of information
was in each data set, how it was generated and how it might relate to datasets already received.
The complex combination of table data and the sheer volume of data to retrieve for business
user requirements frequently strained the client system’s capability to manage such requests.
• To manage short-term needs for proof of concept or for testing theories, new data silos were
being developed to facilitate difficult or complex analysis concepts. Unfortunately, important
metadata about the limitation of the data extracted for these silos was often lost, but these data
silos became popular for their simplicity and speed. In addition, they had the potential to hold
stale data because no mechanism was in place to support their maintenance or upkeep.
Big Data Analytics as Service Provider 175
• Power users who accessed the multi-tenant data warehouses directly through SQL query inter-
faces, or analysis tools such as SAS/EG found the disparate data models too complex and/or
difficult to integrate and use. They were interested in a metadata search capability and data
dictionary management system. They sought commonly used queries and BI tools to help
understand the complex data sources to which they had access.
Analysts were requesting insulation from the underlying complexities of the data model, as well as an
easier way to navigate through the data structure to retrieve the data they needed. They were also inter-
ested in using both the results and the historical queries made to improve their own query capability and
speed of analysis (Sukumar and Ferrell, 2013).
In recent years, the attention paid to Big Data, BI, analytics, performance management, data lakes and
AI have diverted attention from the real reason for them—decision support. Implementing all these tools
is meant to help humans make better decisions, to augment the ability of a person to decide with the
assistance of information.
These decisions, ranging from high-level strategic to operational to customer-facing tactical, are made
by executives, managers and operational employees, respectively. In all cases, decision-making is a pro-
cess. In addition, decision support is not simply information delivery or reporting or creating a dashboard
or a spreadsheet. It is a series of steps that enable a person to make the best possible decision based on
the best information available at that moment (Dan Vesset et al., 2018a).
FIGURE 5.12 (a, b) Types of Big Data analytics. (From Pyne, S., and Rao, P., Big Data Analytics: Methods and Applications,
https://books.google.es/books?id=_xhADQAAQBAJ&printsec=frontcover&dq=big+data+analytics&hl=en&sa=X&
ved=0ahUKEwiB3_fVps_dAhULyYUKHaEDDUgQ6AEIOzAD#v=onepage&q=big%20data%20analytics&f=false,
2016; BSD, Descriptive, predictive, and prescriptive analytics explained, September 2017, https://forums.bsdinsight.com/
threads/descriptive-predictive-and-prescriptive-analytics-explained.41558/, 2017.)
The different types of decisions have different characteristics such as (Dan Vesset et al., 2018a):
• Decision risk: What is the risk involved if the wrong decision is made? Is the decision correct-
able, or is it not easily reversed?
• Time window: How much time is there to make a decision or resolve an issue? How firm is the
decision deadline?
• Variability: To what extent is the issue routine or ad hoc? Is this a frequently made decision or
an exception?
Descriptive analytics show at an aggregate level what is going on in a company; they can summarize
and describe different aspects of the business. Descriptive analytics mines massive data repositories
to extract potential patterns existing in the data, such as variations in operating costs, sales of differ-
ent products and customer buying preferences. Most of the statistical analysis used in day-to-day BI
on a company’s production, financial operations, sales, inventory and customers come under descrip-
tive analytics (Wolpin, 2006). Descriptive analytics involve simple techniques such as performing
regression analyses to determine the correlation among various variables to identify trends in the
data or drawing charts to visualize data in a meaningful and understandable way. For example, Dow
Chemicals used descriptive analytics to identify under-utilized space in its offices and labs. As a
result, they were able to increase space utilization by 20% and save approximately $4 million annually
(Watson IoT - IBM, 2013).
FIGURE 5.13 Descriptive analytics. (From DeZyre, Types of Analytics: descriptive, predictive, prescriptive analytics,
February 08, 2016, https://www.dezyre.com/article/types-of-analytics-descriptive-predictive-prescriptive-analytics/209, 2016.)
happened, what might happen next and what to do about it. All other analytics depend on descriptive
analytics to establish a common language grounded in business metrics and a roadmap for applying the
other types of analytics (see Figure 5.13) (Dan Vesset et al., 2018b).
or influence organizational processes that pertain to large numbers of individuals, including those in mar-
keting, credit risk assessment, fraud detection, manufacturing, health care, government operations and law
enforcement. Predictive analytics is used in actuarial science (Conz et al., 2008) marketing (Fletcher et
al., 2011), financial services (Korn et al. 2011), telecommunications (Barkin et al. 2011), retail (Das and
Vidyashankar, 2006), travel (McDonald et al., 2010), mobility (Moreira et al., 2016), health care (Stevenson
et al., 2011), child protection (Lindert et al., 2014; Cabrera et al., 2016), pharmaceuticals, (McKay et al.,
2009), social networking (De et al., 2017), maintenance and other fields (Wikipedia, 2019d).
One of the best-known applications is credit scoring (Nyce, 2007) which is used throughout finan-
cial services. Scoring models process a customer’s credit history, loan application, customer data
and so on to rank-order individuals by their likelihood of making future credit payments on time
(Wikipedia, 2019d).
Predictive analytics provide estimates about the likelihood of a future outcome, but it is important
to remember that no statistical algorithm can “predict” the future with 100% certainty. Companies
use these statistics to forecast what might happen in the future because the foundation of predictive
analytics is based on probabilities. These statistics take the data and fill in the missing data with
best guesses. They combine historical data found in computerized maintenance management system
(CMMS), enterprise resource planning (ERP), customer relationship management (CRM), human
resources (HR) and point of sale (POS) systems to identify patterns in the data and apply statistical
models and algorithms to capture relationships between various data sets. Predictive analytics can
be used throughout the organization, from forecasting customer behavior and purchasing patterns to
identifying trends in sales activities or forecasting demand from the supply chain, operations, and
inventory (Halo, 2019).
For example, industries use predictive analytics to predict machine failures using streaming sensor
data. In the United States, Southwest Airlines has partnered with the National Aeronautics and Space
Administration to work on a Big Data mining project. They apply text-based analysis on data from sen-
sors in the planes to identify patterns that indicate potential malfunction or safety issues.
Purdue University uses Big Data analytics to predict academic and behavioral issues. For each student,
the system predicts and generates a risk profile indicating how far a student will succeed in a course and
labels the risk levels as green (high probability of success), yellow (potential problems) and red (risk of
failure) by using data from various sources, such as student information and course management systems
for this analytics.
e-Commerce applications apply predictive analytics on customer purchase history, customer behavior
online, like page views, clicks, and time spent on pages, and from other sources. Retail organizations
want to predict customer behavior so that they can target appropriate promotions and recommenda-
tions. They use predictive analysis to determine the demand for inventory and maintain the supply chain
accordingly. Predictive analysis also helps to change price dynamically to attract consumers and maxi-
mize profits (Pyne and Rao, 2016).
In short, predictive analytics allows organizations to become proactive, forward-looking, antici-
pating outcomes and behaviors based upon the data, not on a hunch or assumptions (see Figure 5.14)
(PAT RESEARCH).
1. Define project: It defines the project outcomes, deliverables, scoping of the effort, business
objectives and identifies the data sets to be used.
2. Data collection: Data mining for predictive analytics prepares data from multiple sources for
analysis.
3. Data analysis: Data analysis is the process of inspecting, cleaning, transforming and modeling
data with the objective of discovering useful information and arriving at conclusions.
180 Handbook of Industry 4.0 and SMART Systems
Predicve Analycs
TIME
Reporng/ Predicve
Data Analysis
Monitoring
Analycs
What What is
What is
happened? going to
happening
Why that happen in
now?
happened? future?
ACTION
FIGURE 5.14 Predictive analytics value chain. (From PAT RESEARCH, What is predictive analytics? https://www.
predictiveanalyticstoday.com/what-is-predictive-analytics/.)
4. Statistics: Statistical analysis validates the assumptions and hypotheses and tests them using
standard statistical models.
5. Modeling: Predictive modeling provides the ability to automatically create accurate predictive
models about the future. There are also options to choose the best solution with multi-model
evaluation.
6. Deployment: Predictive model deployment provides the option to deploy the analytical results
in the everyday decision-making process to obtain results, reports and output by automating the
decisions based on the modeling.
7. Model monitoring: Models are managed and monitored to review the model performance to
ensure they are providing the results expected (see Figures 5.16).
FIGURE 5.16 Predictive analytics process with model monitoring. (From Wikipedia, Predictive analytics,
https://en.wikipedia.org/wiki/Predictive_analytics#cite_note-16, 2019d.)
182 Handbook of Industry 4.0 and SMART Systems
FIGURE 5.17 Predictive analytics. (From DeZyre, Types of Analytics: descriptive, predictive, prescriptive analytics,
February 08, 2016, https://www.dezyre.com/article/types-of-analytics-descriptive-predictive-prescriptive-analytics/209, 2016.)
not yet using them in their daily business (Halo, 2019). According to Gartner, only 3% of companies cur-
rently use prescriptive analytics in their decision-making. When implemented correctly, however, they
can have a large impact on how companies make decisions and on their bottom line.
Some larger companies are already successfully using prescriptive analytics to optimize production,
scheduling, and inventory in the supply chain to make sure they are delivering the right products at the
right time and optimizing the customer experience.
Oil and gas exploration industries use prescriptive analytics to optimize the exploration process.
Explorers are using massive data sets from different sources in the exploration process and use prescrip-
tive analytics to optimize drilling location. They use earth’s sedimentation characteristics, temperature,
pressure, soil type, depth, chemical composition, molecular structures, seismic activity, machine data
and others to determine the best possible location to drill. This helps to optimize the selection of drilling
location and avoid the cost and effort of unsuccessful drills.
Health care is another sector benefiting from applying Big Data prescriptive analytics. Prescriptive
analytics can recommend diagnoses and treatments to a doctor by analyzing a patient’s medical history,
medicines, environmental conditions, stage of cure and so on (Pyne and Rao, 2016).
Prescriptive analytics is not failproof, however; it is subject to the same distortions that can upend
descriptive and predictive analytics, including data limitations and unaccounted for external forces. The
effectiveness of predictive analytics also depends on how well the decision model captures the impact of
the decisions being analyzed (Rouse Margaret, 2012).
While prescriptive analytics are dependent on rules, the most transformative power of prescriptive ana-
lytics along with the other four types of analytics is to “break the rules”—to use machine learning to
identify new rules, monitor them over time and adjust the rules as needed (Dan Vesset et al., 2018c).
Prescriptive analytics is best suited for situations where constraints are precise. This usually happens
with tactical choices, where many decisions need to be made within a given period. Examples of this
include programmatic advertising buys, stock trading and fraud detection. However, the universe of situ-
ations where prescriptive analytics are being applied continues to expand and will eventually permeate
many types of decision-making processes.
Broader adoption of prescriptive analytics is often hindered not by the functionality of prescriptive
analytics solutions, but by external factors such as government regulation, market risk or organizational
behavior. This is the situation in health care, for example, where there are some early successes, but
broad adoption of prescriptive analytics will still take years. Regardless of the timeframe for pervasive
adoption of prescriptive analytics, every enterprise should begin to assess the applicability of this type
of analytics for its own operations (Dan Vesset et al., 2018c).
REFERENCES
Adelantado, F., Vilajosana, X., Tuset-Peiro, P., Martinez, B., Melià-Seguí, J., and Watteyne, T., Understanding
the limits of LoRaWAN, 2017.
Aghdam, S. M., Khansari, M., Rabiee, H. R., and Salehi, M., WCCP: A congestion control protocol for wire-
less multimedia communication in sensor networks, Ad Hoc Networks, 13, 516–534, 2014. doi:10.1016/j.
adhoc.2013.10.006.
Akyildiz, I., and Stuntebeck, E., Wireless underground sensor networks: Research challenges, Ad Hoc
Networks, 4(6), 669–686, 2006.
Akyildiz, I., Melodia, T., and Chowdhury, K., A survey on wireless multimedia sensor networks, Computer
Networks, 51(4), 921–960, 2007.
Akyildiz, I., Pompili, D., and Melodia, T., Challenges for efficient communication in under-water acoustic
sensor networks, ACM Review, 1(2), 8, 2004.
Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E., A survey on sensor networks, IEEE
Communications Magazine, 40(8), 102–114, 2002.
AUMI. SICK-REMOTE-SERVICES-GRAFIK-EN. https://aumi.com.vn/thu-thap-phan-tich-truyen-du-lieu-
quan-ly-he-thong-quan-trac-khi-thai-bang-meac/sick-remote-services-grafik-en/.
Barkin, E., CRM + Predictive analytics: Why it all adds up, Destination CRM, 2011.
Bekker, A., 4 types of data analytics to improve decision-making. 2018. https://www.scnsoft.com/blog/
4-types-of-data-analytics.
Berberidis, K., and Ampeliotis, D., Signal processing & communication challenges in sensor networks 2009.
Beser, N. B., Operating cable modems in a low power mode. U.S. Patent No. 7,389,528. June 17, 2008.
BSD, Descriptive, predictive, and prescriptive analytics explained. September 2017. https://forums.bsdinsight.
com/threads/descriptive-predictive-and-prescriptive-analytics-explained.41558/.
BWN-LAB, Wireless Sensor and Actor Networks (WSAN). Broadband & Wireless Networking Laboratory
Personnel. http://bwn.ece.gatech.edu/actors/.
Big Data Analytics as Service Provider 185
Cabrera, M., Florida leverages predictive analytics to prevent child fatalities — Other states follow.
The Huffington Post. December 21, 2016. https://www.huffpost.com/entry/florida-leverages-predictiv
e_b_8586712?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_refer-
rer_sig=AQAAAMYwDfIMUPnwvXcH0QOOoYaNLCXFLz0fRLIMsseOoruUWI4zCUEhlXy
DS3AyEjMUH87o8eQJlInRGI14a54cVFcrnIh96d2f7v0H2s3oTwjGzkFqS8C95nyFba1bN9RCV
pVm_yP0AMYXVe1kcFnnZz7aOnHgBc5AHrtONGlQlJI5.
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. C., Body area networks: A survey, Mobile
Networks and Applications, 16(2), 171–193, 2011.
Coker, F., Pulse: Understanding the Vital Signs of Your Business (1st ed., pp. 30, 39, 42, more), Ambient Light
Publishing, Bellevue, WA, 2014.
Conz, N., Insurers shift to customer-focused predictive analytics technologies, Insurance & Technology, 2008.
DAKORA, S.A.S., Supervisión de vibraciones y temperatura. April 2018. http://dakora.com.co/2018/04/26/
supervision-de-vibraciones-y-temperatura-2/.
Dan Vesset, Descriptive analytics 101: What happened? 2018b. https://www.ibm.com/blogs/business-analytics/
descriptive-analytics-101-what-happened/.
Dan Vesset, Planning analytics 101: What is our plan? 2018a. https://www.ibm.com/blogs/business-analytics/
planning-analytics-101-what-is-our-plan/.
Dan Vesset, Prescriptive analytics 101: What should be done about it? 2018c. https://www.ibm.com/blogs/
business-analytics/prescriptive-analytics-done/.
Dargie, W., and Poellabauer, C., Fundamentals of Wireless Sensor Networks: Theory and Practice, (pp. 168–183,
191–192) John Wiley & Sons, Hoboken, NJ, 2010.
Das, K., and Vidyashankar, G. S., Competitive advantage in retail through analytics: Developing insights,
creating value, Information Management, 2006.
De, S., Maity, A., Goel, V., Shitole, S., and Bhattacharya, A., Predicting the popularity of Instagram posts for a
lifestyle magazine using deep learning, 2nd IEEE Conference on Communication Systems, Computing
and IT Applications, 174–177, 2017. doi:10.1109/CSCITA.2017.8066548.
DeZyre, Types of Analytics: descriptive, predictive, prescriptive analytics, February 08, 2016. https://www.
dezyre.com/article/types-of-analytics-descriptive-predictive-prescriptive-analytics/209, 2016.
Eckerson, W., Extending the value of your data warehousing investment, The Data Warehouse Institute,
2007.
Fletcher, H., The 7 best uses for predictive analytics in multichannel marketing, Target Marketing, 2011.
Gewirtz Little, R., InCNTRE’s OpenFlow SDN testing lab works toward certified SDN product”.
Search Networking. June 21, 2013. https://searchnetworking.techtarget.com/news/2240186631/
InCNTREs-OpenFlow-SDN-testing-lab-works-toward-certified-SDN-product.
Gewirtz Little, R., Software-defined networking is not OpenFlow, companies proclaim. Search Networking. June
25, 2012. https://searchnetworking.techtarget.com/news/2240158633/Software-defined-networking-is-
not-OpenFlow-companies-proclaim.
Güimi, Redes de comunicaciones, April, 2009. https://guimi.net/monograficos/G-Redes_de_comunicaciones/
G-Redes_de_comunicaciones.pdf.
Halo, Descriptive, predictive, and prescriptive analytics explained. 2019. https://halobi.com/blog/
descriptive-predictive-and-prescriptive-analytics-explained/.
HARD VPN.NET. How It Works. http://www.hardvpn.net/how-it-works/.
Heidemann, J., Li, Y., Syed, A., Wills, J., and Ye, W., Underwater sensor networking: Re-search challenges
and potential applications. In: Proceedings of the IEEE Wireless Communications and Networking
Conference, 2006.
Jovanov, E., Milenkovic, A., Otto, C., and De Groen, P., A wireless body area network of in-telligent motion
sensors for computer assisted physical rehabilitation, Journal of NeuroEngineering and Rehabilitation,
2(1), 6, 2005.
Korn, S., The opportunity for predictive analytics in finance, HPC Wire, 2011.
Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks,
Wireless Networks, 17(1), 1–18, 2011.
Li, M., and Liu, Y., Underground structure monitoring with wireless sensor networks. In Proceedings of the
6th International Conference on Information Processing in Sensor Networks, ACM, p. 78, 2007.
Lindert, B., Eckerd rapid safety feedback bringing business intelligence to child welfare (PDF), Policy &
Practice, 2014.
186 Handbook of Industry 4.0 and SMART Systems
Lorentz, A., With big data, Context is a big issue. 2018. https://www.wired.com/insights/2013/04/
with-big-data-context-is-a-big-issue/.
Magno, M., Boyle, D., Brunelli, D., O’Flynn, B., Popovici, E., and Benini, L., Extended wireless monitoring
through intelligent hybrid energy supply. IEEE Transactions on Industrial Electronics, 61(4), 1871,
2014. doi:10.1109/TIE.2013.2267694.
Mainwaring, A., Szewczyk, R., Anderson, J., and Polastre, J., Habitat monitoring on great duck island. In:
Proceedings of ACM SenSys, Vol. 4, 2007.
Mason, A. G., Cisco Secure Virtual Private Network (p. 7), Cisco Press, Indianapolis, IN, 2002.
McDonald, M., New technology taps ‘predictive analytics’ to target travel recommendations, Travel Market
Report, archived from the original on September 10, 2015.
McKay, L., The new prescription for pharma, Destination CRM, 2009.
Miao, G., Zander, J., Sung, K. W., and Slimane, B., Fundamentals of Mobile Data Networks, Cambridge
University Press, Cambridge, UK, 2016.
Microsoft TechNet, Virtual private networking: An overview, Microsoft Technet, September 4, 2001.
Moreira-Matias, L., Gama, J., Ferreira, M., Mendes-Moreira, J., and Damas, L., Time-evolving O-D matrix
estimation using high-speed GPS data streams, Expert Systems with Applications, 44, 275–288, 2016.
doi:10.1016/j.eswa.2015.08.048.
Nyce, C., Predictive analytics white paper (PDF), American Institute for Chartered Property Casualty
Underwriters/Insurance Institute of America, p. 1, 2007.
PAT RESEARCH. What is predictive analytics? https://www.predictiveanalyticstoday.com/what-is-predic-
tive-analytics/.
PERPETUUM, THE WORLD LEADER IN VIBRATION HARVESTER POWERED WIRELESS
SENSING SYSTEMS. Archived from the original on 13 April 2018. https://perpetuum.com/, 2018.
Pyne, S., and Rao, P., Big Data Analytics: Methods and Applications. 2016. https://books.google.es/
books?id=_xhADQAAQBAJ&printsec=frontcover&dq=big+data+analytics&hl=en&sa=X&ved
=0ahUKEwiB3_f Vps_dAhULyYUKHaEDDUgQ6AEIOzAD#v=onepage&q=big%20data%20
analytics&f=false.
Ranjbaran, H., TinyOS Programming - ناریا میسیب رگسح یاه هکبش یشهوژپ یملع داینب. Archived
from the original on December 30, 2013. http://forum.manetlab.com/threads/25/.
Rawat, P., Singh, K. D., Chaouchi, H., and Bonnin, J. M., Wireless sensor networks: A survey on recent devel-
opments and potential synergies. The Journal of Supercomputing, 4–7, 15–17, 31, 2013.
ReVibe Energy, Powering The Industrial IoT. revibeenergy.com. Archived from the original on 22 September
2017. Gothenburg. ScienceWISE. 2017. http://sciencewise.info/resource/WSN/WSN_by_Wikipedia.
Rouse Margaret, Descriptive analytics. 2015b. https://whatis.techtarget.com/definition/descriptive-analytics.
Rouse Margaret, 2015a. https://internetofthingsagenda.techtarget.com/definition/WSAN-wireless-
sensor-and-actuator-network.
Rouse Margaret, 2012. https://searchcio.techtarget.com/definition/Prescriptive-analytics.
Rouse Margaret, Wireless sensor network (WSN). 2006. https://searchdatacenter.techtarget.com/definition/
sensor-network.
Saleem, K., Fisal, N., Hafizah, S., Kamilah, S., Rashid, R., and Baguda, Y., Cross layer based biological
inspired self-organized routing protocol for wireless sensor network. In TENCON 2009–2009 IEEE
Region 10 Conference (pp. 1–6). IEEE, 2009.
Schwartzman, A., and Leano, C., Methods and apparatus for enabling and disabling cable modem receiver
circuitry. U.S. Patent No. 7,587,746. 8 September 2009.
Silva, D., Ghanem, M., and Guo, Y., WikiSensing: An online collaborative approach for sensor data manage-
ment, Sensors, 12(12), 13295–332, 2012. doi:10.3390/s121013295.
Sohraby, K., Minoli, D., and Znati, T., Wireless Sensor Networks: Technology, Protocols, and Applications
(pp. 203–209), John Wiley & Sons, Hoboken, NJ, 2007.
Stevenson, E., Tech beat: Can you pronounce health care predictive analytics? Times-Standard, 2011.
Sukumar, S. R., and Ferrell, R. K., ‘Big Data’ collaboration: Exploring, recording and sharing enterprise
knowledge, Information Services & Use, 257–262, 2013.
VigilNet, An integrated sensor network system for energy-efficient surveillance. 2006 University of Virginia,
Department of Computer Science. 2006. http://www.cs.virginia.edu/wsn/vigilnet/.
VIRTENIO, PreonVM – Java programmable virtual machine for embedded systems. Archived 2017-11-11 at
the Wayback Machine. 2011. https://www.virtenio.com/en/portfolio-items/preonvm/.
Big Data Analytics as Service Provider 187
Watson IoT - IBM, 2013. Descriptive, predictive, prescriptive: Transforming asset and facilities management
with analytics. October 2013.
Wikipedia, LPWAN. 2019c. https://en.wikipedia.org/wiki/LPWAN#cite_note-3.
Wikipedia, Nodo sensor. Septiembre 2018. https://es.wikipedia.org/wiki/Nodo_sensor.
Wikipedia, Predictive analytics. 2019d. https://en.wikipedia.org/wiki/Predictive_analytics#cite_note-16.
Wikipedia, SD-WAN. 2019a. https://en.wikipedia.org/wiki/SD-WAN.
Wikipedia, Software-Defined Networking (SDN). 2019b. https://en.wikipedia.org/wiki/Software-defined_
networking.
Wikipedia, Wireless Sensor Network. 2019e. https://en.wikipedia.org/wiki/Wireless_sensor_network.
Wolpin, S., An exploratory study of an intranet dashboard in a multi-state healthcare system, 2006.
Yick, J., Mukherjee, B., and Ghosal, D., Wireless sensor network survey, Computer Networks, 52(12), 2292–
2330, 2008.
6
IoT and the Need for Data Rationalization
CONTENTS
6.1 Internet of Things (IoT)..................................................................................................................191
6.1.1 Introduction......................................................................................................................191
6.1.2 Internet of Things Definition.......................................................................................... 192
6.1.3 IoT Architecture.............................................................................................................. 193
6.1.4 Future of IoT.................................................................................................................... 193
6.1.4.1 Internet of Everything...................................................................................... 193
6.1.4.2 Industrial IoT.................................................................................................... 195
6.1.4.3 Smartness in IoT.............................................................................................. 195
6.1.4.4 Growth of IoT................................................................................................... 195
6.1.4.5 Humans in the Loop......................................................................................... 196
6.1.5 History of Internet of Things.......................................................................................... 196
6.2 Internet of Things: Vision and Possibilities.................................................................................. 197
6.2.1 IoT Technologies............................................................................................................. 198
6.2.2 Dangers of IOT................................................................................................................ 200
6.3 Internet of Things Framework....................................................................................................... 200
6.4 Architecture of Internet of Things................................................................................................ 201
6.4.1 Security Architectures.................................................................................................... 201
6.4.2 Reference Architectures.................................................................................................. 202
6.4.2.1 Service-Oriented Architecture-Based Architectures...................................... 203
6.4.2.2 API-Oriented Architecture.............................................................................. 204
6.5 How IoT Works.............................................................................................................................. 204
6.6 Essential Technologies of the Internet of Things.......................................................................... 206
6.6.1 Hardware......................................................................................................................... 206
6.6.2 Middleware...................................................................................................................... 206
6.6.3 Software.......................................................................................................................... 207
6.6.3.1 Cloud Computing............................................................................................. 207
6.7 Key Technologies Involved in Internet of Things......................................................................... 207
6.7.1 Identification Technology................................................................................................ 208
6.7.2 IoT Architecture Technology.......................................................................................... 208
6.7.3 Communication Technology........................................................................................... 208
6.7.4 Networking Technology...................................................................................................210
6.7.5 Network Discovery Mechanisms.....................................................................................211
6.7.6 Software and Algorithms.................................................................................................211
6.7.7 Hardware..........................................................................................................................211
6.7.8 Data and Signal Processing Technology: XML...............................................................212
6.7.9 Discovery and Search Engine Technologies....................................................................212
6.7.10 Relationship Network Management Technologies...........................................................212
6.7.11 Power and Energy Storage Technologies.........................................................................213
6.7.12 Security and Privacy Technologies..................................................................................213
6.7.13 Standardization................................................................................................................213
189
190 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLES
Service inspecons Maintenance work Logiscs, retail Inspecon of Digital product Safety & security
& verificaons instrucons space opmizaon digital prototypes controls training
FIGURE 6.1 Growth of IoT in the 2000s. (From Evans, G.D., The Internet of Things—How the Next Evolution of the
Internet is Changing Everything, Cisco Internet Business Solutions Group (IBSG), White paper, 2011.)
For consumers, new IoT products such as Internet-enabled appliances, home automation components,
and energy management devices are moving us toward the “smart home,” offering more security and
energy efficiency. Other personal IoT devices such as wearable fitness and health monitoring devices and
network-enabled medical devices are transforming the way health care services are delivered. This tech-
nology promises to be beneficial for people with disabilities and the elderly, enabling improved levels of
independence and quality of life at a reasonable cost. IoT systems such as networked vehicles, intelligent
traffic systems, and sensors embedded in roads and bridges move us closer to the idea of “smart cities,”
which help minimize congestion and energy consumption. IoT technology also offers the possibility to
transform agriculture, industry, and energy production and distribution by increasing the availability of
information along the value chain of production using networked sensors (Rose et al., 2015).
Some observers see the IoT as a revolutionary fully interconnected “smart” world of progress, effi-
ciency, and opportunity, with the potential to add billions in value to industry and the global economy
(Thierer and Castillo, 2015). Others warn that the IoT represents a darker world of surveillance, privacy
and security violations, and consumer lock-in. Some fear Internet-connected automobiles will be hacked
(Greenberg, 2015), while others voice surveillance concerns because of the voice recognition features in
“smart” TVs (CBSN, 2015). Still, others fear the potential misuse of IoT data (Bradbury, 2015). IoT will
likely have varying consequences in different economies and regions, bringing a diverse set of opportuni-
ties and challenges across the globe (Rose et al., 2015).
The true value of the IoT for enterprises can be fully realized when connected devices can communi-
cate with each other and integrate with vendor-managed inventory systems, customer support systems,
business intelligence applications, and business analytics (Lee and Lee, 2015).
The adoption of this technology is rapidly gaining momentum, as technological, societal, and com-
petitive pressures push firms to innovate and transform themselves. As IoT technology advances and
increasing numbers of firms adopt the technology, IoT cost-benefit analysis will become a subject of
great interest. Because of the potential but uncertain benefits and high investment costs of the IoT, firms
need to carefully assess every IoT-induced opportunity and challenge to ensure that their resources are
spent judiciously (Lee and Lee, 2015).
Depth
Stereo CCD Hand- Spaal
sensor
based
Desktop- devices
based HCI HHD HMD
devices
CAMERA
Vision- Sensor-
based based
FIGURE 6.2 IoT basic architecture. (From Uviase, O., Kotonya, G., IoT Architectural Framework: Connection and Integration Framework for IoT Systems, School of Computer Science
and Communication, Lancaster University, Lancaster, UK, 2018.)
Handbook of Industry 4.0 and SMART Systems
IoT and the Need for Data Rationalization 195
• Standardization and openness of the communication standards used, from layers interfacing
with the physical world (i.e., tags and sensors) to the communication layers between nodes and
with the Internet;
• Object addressability (direct IP address) and multifunctionality (i.e., the possibility that a net-
work built for one application (e.g., road-traffic monitoring) would be available for other pur-
poses (e.g., environmental pollution monitoring or traffic safety) (Da Xu et al., 2014).
Internet of Everything
35.000.000
Esmated number of devices
30.000.000
25.000.000
20.000.000
15.000.000
10.000.000
5.000.000
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
FIGURE 6.3 IoT trend forecast. (From Business Insider Intelligence, Research for the digital age, https://intelligence.
businessinsider.com/, 2015.)
196 Handbook of Industry 4.0 and SMART Systems
From this perspective, the IoT represents the convergence of a variety of computing and connectivity
trends that have been evolving for many decades. At present, a wide range of industry sectors, includ-
ing automotive, health care, manufacturing, home and consumer electronics, and others, are consider-
ing the potential for incorporating IoT technology into their products, services, and operations (Rose
et al., 2015).
• Connect inanimate and living things: Early trials and deployments of IoT networks began with
connecting industrial equipment. Today, the vision of IoT has expanded to connect everything
from industrial equipment to everyday objects. The types of items range from gas turbines to
automobiles to utility meters. It can also include living organisms such as plants, farm animals,
and people. For example, the Cow Tracking Project in Essex uses data collected from radio
positioning tags to monitor cows for illness and track behavior in the herd. Wearable comput-
ing and digital health devices, such as Nike + Fuel band and Fitbit, are examples of how people
are connecting in the IoT landscape. A US-based company, Cisco Systems, refers to the IoE, a
concept which includes people, places, objects, and things. Basically, anything you can attach a
sensor and connectivity to can participate in the new connected ecosystems.
• Use sensors for data collection: The physical objects that are being connected will possess
one or more sensors. Each sensor will monitor a specific condition such as location, vibration,
motion, and temperature. In IoT, these sensors will connect to each other and to systems that
can understand or present information from the sensor’s data feeds. These sensors will provide
new information to a company’s systems and to people.
• Change what types of items communicate over an IP network: In the past, people communi-
cated with people and with machines. IoT-enabled objects will share information about their
condition and the surrounding environment with people, software systems, and other machines.
This information can be shared in real-time or collected and shared at defined intervals. Going
forward, everything will have a digital identity and connectivity, which means humans will
identify, track, and communicate with objects.
• Change the nature of data required: Data will be small in size and frequent in transmission.
• Change the number of devices: The number of devices or nodes that are connecting to the net-
work will be much greater in IoT than in traditional PC computing.
As IoT becomes ubiquitous, M2M communications and intelligence drawn from the devices and the net-
work will allow businesses to automate certain basic tasks without depending on central or cloud-based
applications and services (Lopez Research LLC, 2013).
In the future, storage and communication services will be pervasive and distributed: people, smart
objects, machines, platforms, and the surrounding space (e.g., with wireless or wired sensors, M2M
devices, radio-frequency identification (RFID) tags, etc.) will create a highly decentralized common pool
of resources (up to the very edge of the “network”) interconnected by a dynamic network of networks.
The new “communication language” will be based on interoperable protocols, operating in hetero-
geneous environments and platforms. IoT in this context is a generic term, and all objects will play an
active role because of their connection to the Internet by creating smart environments. This powerful
communication tool will provide access to information, media, and services, through wired and wireless
broadband connections.
The convergence of consumer, business, and Industrial Internet, as shown in Figure 6.4, will create
an open, global network connecting people, data, and things, leveraging the cloud to connect intelligent
things that sense and transmit a broad array of data, helping to create services that would not be obvious
without this level of connectivity and analytical intelligence.
198 Handbook of Industry 4.0 and SMART Systems
FIGURE 6.4 Convergence of consumer, business, and Industrial Internet. (From Vermesan, O. and Friess P., Internet
of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, River Publishers, Gistrup,
Denmark, 2013.)
IoT is driven by transformative technologies such as cloud, things, and mobility. The cloud will
enable a global infrastructure to generate new services, allowing anyone to create content and appli-
cations for global users. Networks of things will connect things globally and maintain their identity
online. Mobility will allow connection to this global infrastructure anytime, anywhere. The result
will be a globally accessible network of things, users, and consumers, who are available to create
businesses, contribute content, generate and purchase new services (Vermesan and Friess, 2013).
The first two categories can be jointly understood as functional building blocks required to turn “intel-
ligence” into “things,” the features that differentiate IoT from Internet. The third category is not a
functional but a de facto requirement, without which IoT penetration would be severely reduced.
IoT developments imply that the environments, cities, buildings, vehicles, clothing, portable devices, and
other objects have more information associated with them and/or the ability to sense, communicate, network,
and produce new information. Thus, network technologies have to cope with new challenges, such as very
high data rates, dense crowds of users, low latency, low energy, low cost, and a massive number of devices
(METIS, 2015). In addition, we can include non-sensing things: things that may have functionality, but do
not provide information or data (Weiser, 1995). Communications challenges are summarized in Figure 6.5.
Table 6.1 shows the differences between wired and wireless networking.
The installed base for the IoT will grow to approximately 212 billion devices by 2020, a number that
includes 30 billion connected devices (Figure 6.6). IDC sees this growth driven largely by intelligent systems
that will be installed and collecting data—across both consumer and enterprise applications (IDC, 2013).
IoT and the Need for Data Rationalization 199
FIGURE 6.5 Future communication challenges. (From METIS, Mobile and wireless communications Enablers for
the Twenty-twenty (2020), Information Society, https://www.chalmers.se/en/projects/Pages/Mobile-and-wireless-
communications-Enablers-for-Twenty-twenty.aspx, 2015.)
TABLE 6.1
Wired vs. Wireless Networking
Wired Wireless
Capacity Abundant Scarce
Topology Point-to-point Broadcast
Reliability Reliable Unreliable
Mobility Fixed Mobile
FIGURE 6.6 Internet-connected devices and their evolution. (From Vermesan, O. and Friess P., Internet of Things:
Converging Technologies for Smart Environments and Integrated Ecosystems, River Publishers, Gistrup, Denmark, 2013.)
200 Handbook of Industry 4.0 and SMART Systems
• Data that were initially generated and exchanged to coordinate manufacturing and logistics
activities between different companies could, if read in conjunction with other data, suddenly
provide third parties with highly sensitive information about one of the partner companies that
might, for example, give them an insight into its business strategies.
• New instruments will be required if companies wish to pursue the conventional strategy of
keeping such knowledge secret to protect their competitive advantage.
• New regulated business models will also be necessary; the raw data generated may contain infor-
mation valuable to third parties, and companies may wish to make a charge for sharing them.
• These new models will require legal safeguards (predominantly in the shape of contracts) to
ensure that the value added created is shared out fairly, e.g., through the use of dynamic pricing
models (Platiform INDUSTRIE 4.0, 2013).
• Contract decoupling: An IoT system contains heterogeneous devices with disparate commu-
nication protocols. An integration framework should efficiently handle contract decoupling,
i.e., the ability of service consumers and service producers to independently evolve without
terminating the contract between them (Richards, 2016). For example, a service might be in a
JavaScript Object Notation (JSON) format but the service consumer needs input in Extensible
Markup Language (XML). The framework should provide support to transform the message to
the format that fulfills the contract (Uviase and Kotonya, 2018).
• Scalability: Given the evolving nature of IoT, an efficient integration framework should be scal-
able and evolvable enough to support the billions of things soon to be connected to the Internet
(Uviase and Kotonya, 2018).
• Ease of testing: An integration framework should support ease of testing and debugging.
It should provide support for debugging defects and failures, integration testing, component
testing, system testing, compatibility testing, installation test, functional and nonfunctional
testing, performance testing, and security testing.
• Ease of development: An IoT integration framework should provide a means of easy development for
developers. Without being complex, it should provide proper documentation for non-developers and
developers with basic programming knowledge to easily understand the internals of the framework.
• Fault tolerance: An IoT system must be dependable and resilient. An intelligent integration
framework should handle faults as IoT devices can eventually toggle between offline and online
states. The framework should provide self-healing mechanisms for transient faults (network
faults, node level faults, etc.), unauthorized access errors, server crash failures, omission fail-
ures (when the server does not receive incoming requests from client), timing faults, and so on.
• Lightweight implementation: Integration frameworks should have a lightweight overhead both
in its development and deployment stage. It should be lightweight and easy to install, uninstall,
activate, deactivate, update, versioning, and adaptable.
IoT and the Need for Data Rationalization 201
Regardless of the research community or disparity in research, a common goal is extensibility, flexibility,
scalability, design reuse, and implementation reuse (Uviase and Kotonya, 2018).
1. Coding layer
The coding layer is the foundation of IoT; it identifies the objects of interest. In this layer, each
object is assigned a unique ID, making it easy to discern objects (Cheng et al., 2012).
2. Perception layer
This is the device layer of IoT; it gives a physical meaning to each object. The layer consists
of data sensors in different forms such as RFID tags, infrared sensors, or other sensor net-
works, which sense the temperature, humidity, speed and location, and so on of the objects
(Bandyopadhyay and Sen, 2011). This layer gathers useful information on objects from the sen-
sor devices linked with them and converts the information into digital signals, which are then
passed on to the network layer for further action (Farooq et al., 2015).
3. Network layer
This layer receives the useful information in the form of digital signals from the perception
layer and transmits it to the processing systems in the middleware layer through the transmis-
sion mediums such as Wi-Fi, Bluetooth, WiMAX, Zigbee, GSM, and 3G with protocols such
as Internet protocol version 4 (IPv4), IPv6, message queuing telemetry transport (MQTT), and
data distribution service (DDS) (Zhang, 2011).
202 Handbook of Industry 4.0 and SMART Systems
Coding Layer
Percepon Layer
Netwok Layer
Middleware Layer
Applicaon Layer
Business Layer
FIGURE 6.7 Six-layered architecture of IoT. (From Farooq, M.U. et al., Int. J. Comput. Appl., (0975 8887), 113, 1–7, 2015.)
4. Middleware layer
This layer processes the information received from the sensor devices (Shen and Liu, 2011).
It includes technologies such as cloud computing or ubiquitous computing, which ensures a
direct access to the database to store all the necessary information in it. Using intelligent pro-
cessing equipment, the information is processed and a fully automated action is taken based on
the results (Farooq et al., 2015).
5. Application layer
This layer realizes the applications of IoT for all kinds of industry, based on the processed
data. Applications promote the development of IoT, so this layer is very helpful in the large-
scale development of an IoT network (Wu et al., 2010). IoT-related applications could be smart
homes, smart transportation, and so on (Farooq et al., 2015).
6. Business layer
This layer manages the applications and services of IoT and is responsible for all the research related
to IoT. It generates different business models for effective business strategies (Khan et al., 2012).
Broker
Device Mangement
Communicaons Layer
FIGURE 6.8 Reference architecture for IoT. (From Buyya, R. and Dastjerdi, A.V., Internet of Things: Principles and
Paradigms, Elsevier, Amsterdam, the Netherlands, 2016.)
Reference architectures and models give a bird’s eye view of the whole system; hence, their advantage
over other architectures relies on providing a better and greater level of abstraction, but this hides spe-
cific constraints and implementation details (Buyya and Dastjerdi, 2016).
Figure 6.8 depicts an outline of an extended version of a reference architecture for IoT (Fremantle,
2015). Service layers include event processing and analytics, resource management, and service discov-
ery, as well as message aggregation and enterprise service bus services built on top of the communica-
tion and physical layers. Application programming interface (API) management, essential for defining
and sharing system services, and web-based dashboards (or equivalent smartphone applications) for
managing and accessing these APIs are included in the architecture. Because of the importance of device
management, security and privacy enforcement in different layers and the ability to uniquely iden-
tify objects and control their access level, these components are stressed independently (Buyya and
Dastjerdi, 2016).
• Sensing layer: is integrated with available hardware objects to sense the status of things.
• Network layer: has the infrastructure to support wireless or wired connections.
• Service layer: creates and manages services required by users or applications.
• Interface layer: consists of the interaction methods with users or applications.
Generally, in such architectures, a complex system is divided into subsystems that are loosely coupled
and can be reused later (modular decomposability feature), providing an easy way to maintain the whole
system by taking care of its individual components (Guinard et al., 2011). Thus, in the case of a com-
ponent failure, the rest of the system (components) can still operate normally. This is of immense value
for effective design of an IoT application architecture, where reliability is the most significant parameter
(Buyya and Dastjerdi, 2016).
204 Handbook of Industry 4.0 and SMART Systems
Service-oriented architecture has been intensively used in wireless sensor network (WSN) because of
its appropriate level of abstraction and the advantages of its modular design (Li and Yu, 2011; Su et al.,
2011). Bringing these benefits to IoT, SOA has the potential to augment the level of interoperability and
scalability among the objects in IoT. Moreover, from the user’s perspective, all services are abstracted
into common sets, removing extra complexity because the user does not have to deal with different layers
and protocols (Dohr et al., 2010). Finally, the ability to build diverse and complex services by composing
different functions of the system (i.e., modular composability) through service composition suits the het-
erogeneous nature of IoT, where accomplishing each task requires a series of service calls on all entities
spread across multiple locations (Valipour et al., 2009).
Web Data
Network
Applicaons Storage and Sensor
Components
Processing
FIGURE 6.9 Major components of IoT. (From Gupta, R. and Gupta, R., ABC of Internet of Things: Advancements,
Benefits, Challenges, Enablers and Facilities of IoT. 2016 Symposium on Colossal Data Analysis and Networking (CDAN),
Pune, India, 2016.)
Anyme
Connecvity
* Anywhere
* Any
* Network
Compung
* Anybody
* Any
* Sensor
Anywhere
FIGURE 6.10 4 As and 4 Cs of IoT. (From Gupta, R. and Gupta, R., ABC of Internet of Things: Advancements, Benefits,
Challenges, Enablers and Facilities of IoT, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Pune,
India, 2016.)
Figure 6.10 depicts the concept. For this to happen, however, IoT requires identification, network compat-
ibility and large storage space (Gupta and Gupta, 2016).
First, a unique identity is required to set up communication over the network. Next, the diverse
devices must be compatible with the underlying network architecture. Once the connection is estab-
lished, the storage servers can deliver web right information to the right place at the right time (Gupta
and Gupta, 2016).
206 Handbook of Industry 4.0 and SMART Systems
6.6.1 Hardware
Much of the hardware upon which the IoT is being built already exists and is currently in wide-
spread use. Critical hardware infrastructure includes: RFID, NFC, and Sensor Networks (Whitmore
et al., 2014).
While sensors “sense” the state of an environment or object, actuators perform actions to affect the
environment or object in some way. Actuators can affect the environment by emitting sound, light, radio
waves or even smells. These capabilities are one way that IoT objects can communicate with people.
Actuators are frequently used in combination with sensors to produce sensor-actuator networks. One
example of the use of actuators in such a network would be the use of a sensor to detect the presence
of carbon monoxide in a room and the use of an actuator to produce a loud noise altering people to the
detection of the harmful gas. Thus, the combination of sensors and actuators can enable objects to simul-
taneously be aware of their environment and interact with people, both goals of the IoT.
6.6.2 Middleware
Middleware is a software layer interposed between software applications to make it easier for software
developers to perform communication and input/output. Its feature of hiding the details of different
IoT and the Need for Data Rationalization 207
technologies is fundamental to free IoT developers from software services that are not directly relevant
to the specific IoT application. Middleware gained popularity in the 1980s due to its major role in sim-
plifying the integration of legacy technologies into new ones. It also facilitated the development of new
services in the distributed computing environment.
A complex distributed infrastructure of the IoT with numerous heterogeneous devices requires simpli-
fying the development of new applications and services; thus, the use of middleware is an ideal fit with
IoT application development. IoT middleware sits between the IoT hardware and data and the applica-
tions that developers create to exploit the IoT. Thus, IoT middleware helps bring together a multitude of
devices and data in a way that enables developers to create and deploy new IoT services without having
to write different code for each kind of device or data format.
For example, Global Sensor Network is an open source sensor middleware platform enabling the
development and deployment of sensor services with almost zero programming effort. Most middleware
architectures for the IoT follow a service-oriented approach to support an unknown and dynamic net-
work topology (Lee and Lee, 2015).
Many researchers have proposed the use of semantic middleware to interoperate the different classes
of devices communicating through different communication formats. The semantic model typically
uses XML and ontologies to establish the metadata and meaning necessary to support interoperability
(Aberer, 2006; Gómez and López, 2010; Huang and Li, 2010; Song et al., 2010). Like the semantic web,
semantic middleware seeks to create a common framework that enables data sharing and exchange
across distributed devices, applications, and locations (Whitmore et al., 2014).
6.6.3 Software
While the IoT may rely upon the existing hardware infrastructure to a large extent, new software must be
written to support the interoperability between numerous heterogeneous devices and searching the data
generated by them (Whitmore et al., 2014).
• Identification technology,
• IoT architecture technology,
• Communication technology,
• Network technology,
• Network discovery technology,
• Software and algorithms,
• Hardware technology,
• Data and signal processing technology,
• Discovery and search engine technology,
208 Handbook of Industry 4.0 and SMART Systems
Automac Vehicle
Locaon (AVL)
SCADA
Outage Management
Advanced Metering System (OMS)
Infrastructure (AMI)
FIGURE 6.11 SOA-based architecture for IoT middleware. (From Bandyopadhyay, D. and Sen J., Wirel. Pers. Commun.,
58, 49–69, 2011.)
Such an extensive design space makes IoT application development a complicated process. One approach
may be to design the most restrictive point in the design space, e.g., minimum thing capabilities, high
mobility, and so on. However, there is frequently no such global minimum and it may be desirable to
exploit the characteristics of the various points in the design space. This implies that no single hardware
and software platform will be sufficient to support the whole design space. Complex and heterogeneous
systems will be a natural requirement (Bandyopadhyay and Sen, 2011).
Wireless personal area networks (WPANs) enable energy-efficient wireless access and data transfer
to smart objects over a short distance (1–100 m). Examples of WPANs are Bluetooth and ZigBee.
Bluetooth defines a complete WPAN architecture, including a security layer. However, the main dis-
advantage of Bluetooth is its relatively high energy consumption. Therefore, Bluetooth is not usually
used by sensors powered by a battery. Zigbee is a corresponding technology but simpler and less
expensive. Additionally, it has low power consumption and is more energy efficient (Kopetz, 2011;
Wang et al., 2014).
210 Handbook of Industry 4.0 and SMART Systems
6.7.7 Hardware
Hardware research is focused on miniaturization, low cost, and increased functionality in wireless iden-
tifiable systems.
Silicon IC technology will be used to design systems with increased functionalities and enhanced
nonvolatile memory for sensing and monitoring ambient parameters.
Further research is needed in many areas, including ultra-low power, low-voltage, and low-leakage
designs in submicron RF complementary metal-oxide-semiconductor (CMOS) technologies, high-
efficiency DC-DC power-management solutions, ultra-low power, low-voltage controllable nonvolatile
memory, integration of RF microelectromechanical system (MEMS) and MEMS devices, and so on.
Research on highly miniaturized integrated circuits will include:
6.7.13 Standardization
Standards should be designed to support a wide range of applications and address common require-
ments from a wide range of industry sectors; they should also address the needs of the environment,
society, and individual citizens. Through consensus processes involving multiple stakeholders, it should
be possible to develop standardized semantic data models and ontologies, common interfaces, and pro-
tocols, initially defined at an abstract level, then with example bindings to specific cross-platform, cross-
language technologies such as XML, ASN.1, web services, and so on. The use of semantic ontologies
and machine-readable codification should help to overcome ambiguities resulting from human error or
differences and misinterpretation due to different human languages in different regions of the world and
also assist with cross-referencing to additional information available through other systems.
Standards are required for bidirectional communication and information exchange among things, their
environment, their digital counterparts in the virtual cloud, and entities with an interest in monitoring,
controlling, or assisting the things. In addition, the design of standards for IoT needs to consider efficient
and judicial use of energy and network capacity, as well as respecting other constraints such as those exist-
ing regulations that restrict permitted frequency bands and power levels for RF communications. As IoT
evolves, it may be necessary to review such regulatory constraints and investigate ways to ensure sufficient
capacity for expansion, such as seeking additional radio spectrum allocation as it becomes available.
A particular challenge in this regard is ensuring global interoperability, particularly for things and
devices that make use of radio spectrum. Historically, various bands of radio spectrum have been allocated
214 Handbook of Industry 4.0 and SMART Systems
for various purposes, such as broadcast communications (AM, FM, digital audio broadcasting, analog ter-
restrial television, digital terrestrial television), mobile telephony, citizen-band radio, emergency services
communications, wireless Internet, and short-range radio. Unfortunately, the frequency band allocations
are not harmonized across all regions of the world, and some bands that are available for a particular pur-
pose in one region are not available for the same purpose in another region, often because they are being
used for a different purpose.
Reallocation of radio spectrum is a slow process, involving government agencies, regulators, and
international bodies such as the International Telecommunications Union (ITU) and regional bodies
such as the European Telecommunications Standards Institute (ETSI) or the Federal Communications
Commission (ETSI, 2018). Careful discussions are needed to minimize disruption to existing users of
radio spectrum and to plan for future needs. In the meantime, many IoT devices using radio spectrum
will need to be capable of using multiple protocols and multiple frequencies. An example of this is the
ISO 18000-6C/EPCglobal UHF Gen2 standard, which is implemented using slightly different frequen-
cies within the 860–960 MHz band, depending on the region of operation, as well as different power
levels and different protocols (at least initially in Europe, where the Listen-Before-Talk protocol was
required) (Bandyopadhyay and Sen, 2011).
As for the larger IoT paradigm, a very interesting standardization effort has currently started in ETSI,
the producer of globally applicable information and communication technology (ICT)-related standards.
The M2M Technical Committee was formed within ETSI to conduct standardization activities relevant
to M2M systems and sensor networks. The goals of the ETSI M2M committee include: developing and
maintaining an end-to-end architecture for M2M and strengthening the standardization efforts for M2M,
including sensor network integration, naming, addressing, location, QoS, security, charging, manage-
ment, application, and hardware interfaces (ETSI Technical Committee M2M, 2018; Shelby, 2009).
The Internet Engineering Taskforce (IETF) recently formed a group for IPv6 networks, 6LoWPAN
(i.e., Low-Power Wireless Personal Area Networks) (Kushalnagar et al., 2009). 6LoWPAN has defined
a set of protocols that can be used to integrate sensor nodes into IPv6 networks. The core protocols for
6LoWPAN architecture have already been specified and some commercial products implementing this
protocol suite have been launched (Bandyopadhyay and Sen, 2011).
Another working group in IETF, this one on routing over low power and lossy (ROLL) networks, has
recently produced an routing protocol for low-power and lossy networks (RPL) routing protocol draft.
This will be the basis for ROLL networks, including 6LoWPAN (Bandyopadhyay and Sen, 2011).
An emerging idea is to consider IoT standardization as an integral part of the future Internet defini-
tion and standardization process. For example, a cluster of European research and development projects
on IoT (CERP-IoT) reports that the integration of different things into wider networks, either mobile or
fixed, will allow their interconnection with the future Internet (Santucci, 2009).
Enablers of IoT
NFC
QR
Structured
Data
Beacons
Bluetooth
FIGURE 6.12 Enablers of IoT. (From Gupta, R. and Gupta, R., ABC of Internet of Things: Advancements, Benefits, Challenges,
Enablers and Facilities of IoT, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Pune, India, 2016.)
6.8.4 Beacons
Asynchronous JavaScript and XML (AJAX), Hypertext Markup Language, and other open source
web technologies, in combination with structured datatype, can provide good support for IoT.
However, the limitation of open source technologies is that they do not have the capability to iden-
tify objects.
Beacons attached to objects could be used to overcome the gap between the physical and virtual world.
Compared to NFC and QR Codes, beacons have better utility; they can broadcast a uniform resource
locator along with other information that can help with ranging (Gupta and Gupta, 2016).
6.8.5 Bluetooth
Another good option for tagging is Bluetooth low energy (BLE) (Heydon, 2013; Oliveira and Matos,
2016). Most mobile smartphones are embedded with BLE hardware, providing various capabilities with
the help of operating system support (Gupta and Gupta, 2016).
216 Handbook of Industry 4.0 and SMART Systems
Bluetooth low energy could make object identity known by transmitting one advertisement packet per
second; this requires a very low-power supply and can operate for up to one year on a lithium coin cell
battery (Gupta and Gupta, 2016).
and 1990s, it briefly looked as if there would be potential for installing additional lines, e.g., for fax and
dial-up Internet, the arrival of copper-based broadband Internet connections (e.g., x Digital Subscriber
Line [xDSL]) ended this possibility.
Not only can the telecommunication industry profit from the enabling technologies for the IoT by
exploiting their benefits internally (e.g., by optimizing internal processes), but it can also foster active
players in the field by providing communication infrastructure and developing new hardware and ser-
vices. With millions of smart objects communicating with each other, the income generated by data traffic
might continue to grow at a faster rate than spending for voice traffic. As illustrated in Figure 6.14, global
revenues for data are growing at a much faster rate than for voice. As mobile markets reach saturation,
there is increased data use among users and a much keener interest in providing data-enabled devices
(International Telecommunication Union (ITU), 2005).
• A number of new technologies, such as RFID in combination with advanced wireless services
(e.g., 3G mobile and wireless broadband technologies), have enhanced the ubiquity of the Internet
(i.e., it is accessible from almost any point) and its mobility (i.e., it is accessible from small, por-
table hand-held devices). This coincides with the availability of much higher speeds for Internet
access.
• Operators and equipment vendors are running out of consumers to whom they can sell current
telecommunication services and equipment. The new emerging market for thing-to-thing com-
munications will sustain future growth prospects.
The missing element from the convergence of these two forces of technological and commercial push is
demand-pull. Do consumers really want fridges that order the groceries or vacuum cleaners that com-
municate with their makers to report faults? More importantly, what types of applications are consumers
willing to pay for? (International Telecommunication Union (ITU), 2005).
FIGURE 6.14 Data outstrips voice. (From International Telecommunication Union (ITU), The Internet of Things, ITU
Internet Reports, Geneva, Switzerland, 2005.)
218 Handbook of Industry 4.0 and SMART Systems
6.10.1 “Datafication”
Although IoT entails universal connectivity, including personal computers and smartphones, the
focus of most observers when discussing IoT is the opportunity to connect existing machines that
were not previously connected (e.g., aircraft engines) and dramatically expand the number of con-
nected points in the environment through sensors, actuators, and devices that would never have been
developed or deployed without the underlying infrastructure to connect them into a pervasive ICT
infrastructure.
Some view the current push to IoT as analogous to the transformation of electrical infrastructure
from specialized and isolated point systems to a commoditized and essential building block of the mod-
ern industrialized world. From the 1880s to the early 1900s, companies did not have access to an all-
encompassing electrical grid. Those needing electricity deployed local generators and hired managers to
oversee the very specialized infrastructure.
Today, electricity is essentially a commodity service available everywhere in the industrialized world.
The pervasive, standardized electrical grid delivers power comparatively easily. This type of abstrac-
tion, having access to power without having to devote extraordinary resources to sourcing and manag-
ing that power, was a catalyst of the enormous economic growth of the twentieth century. Individuals,
companies, organizations, and governments could focus on innovating without the need to focus on the
fundamentals of powering their innovations.
Similarly, through a number of initiatives (including IoT platforms, standards development, regulatory
actions, and ecosystem formation), connectivity will become ubiquitous and, more importantly, data from
connected machines and sensors will be available as a fundamental service, almost like a commodity.
Data are much more varied and complex than electricity. “Datafication” and “electrification” are
not perfectly correlated, but the analogy captures the core idea of isolated, complex, and limited
systems transforming into a pervasive utility. Electrification had a fundamental impact on most
industries and markets in the twentieth century. Datafication may have a similar impact in this cen-
tury (Lucero, 2016).
FIGURE 6.15 IoT market over time. (From Lucero, S., IHS Technology. IoT Platforms: Enabling the Internet of Things,
Sr. Principal Analyst, M2M and IoT, Whitepaper, 2016.)
1. The things, all of which are equipped with some kind of identification identifier, such as an RFID tag;
2. The read device which reads the identity of the thing based on its label, e.g. reading the infor-
mation encoded into an RFID tag. The read device would then make a request to the name
resolution server to access more detailed information about that particular device.
Active identity-related services broadcast information and are usually associated with having constant
power, or at least are under battery power. Passive identity-related services are services that have no
power source and require some external device or mechanism to pass on its identity. For example, an
active RFID tag is battery-powered and can transmit signals once an external source has been identi-
fied. A passive RFID tag has no batteries and requires an external electromagnetic field to initiate a
signal transmission. In general, active identity services can transmit or actively send their information to
another device, whereas passive services must be read from (Gigli and Koo, 2011).
FIGURE 6.16 Aggregate network diagram with sensor network and access gateways. (From Gigli, M. and Koo, S., Adv.
IoT, 1, 27–31, 2011.)
infrastructure naturally requires higher reliability and speed and will require the terminals to either
have more processing power or be linked with some other device that does (Gigli and Koo, 2011).
Smart grids use IoT technology to collect data about energy consumption and make the data available
online. The data are typically incorporated into reports showing patterns of use and include recommen-
dations on how to reduce energy consumption and cost (Liu et al., 2011). IoT technologies are also being
used inside homes and offices. They are being equipped with sensors and actuators that track utility
consumption, monitor, and control building infrastructure such as lights and heating, ventilation, and air
conditioning (HVAC) systems, and conduct surveillance to meet security needs (Darianian and Michael,
2008; Li et al., 2011). On a broader scale, IoT technologies can be employed to make cities more efficient.
The goal of smart cities is to leverage IoT to improve the lives of citizens by improving traffic control,
monitoring the availability of parking spaces, evaluating air quality, and even providing notification
when trash containers are full (Schaffers et al., 2011; Vicini et al., 2012).
FIGURE 6.17 Internet of Things schematic showing end-users and application areas. (From Gubbi, J. et al., Future
Gener. Comp. Sy., 29, 1645–1660, 2013.)
6.12.6 Enterprise
IoT can be used within a work environment as an enterprise-based application. Information collected
from such networks is used only by the owners, and the data may be released selectively.
Environmental monitoring is a common application implemented to keep track of the number of occu-
pants and manage the utilities within the building (e.g., HVAC, lighting) (Gubbi et al., 2013).
Sensors have always been an integral part of security, automation, climate control, and so on. These
will eventually be replaced by wireless systems giving the flexibility to make changes whenever
required.
224 Handbook of Industry 4.0 and SMART Systems
TABLE 6.2
Potential IoT Applications in Melbourne
Citizens
Health care triage, patient monitoring, personnel monitoring, disease spread modeling and
containment—real-time health status and predictive information to assist
practitioners in the field, or policy decisions in pandemic scenarios
Emergency services, defense remote personnel monitoring (health, location): resource management and distribution,
response planning; sensors built into building infrastructure to guide first responders
in emergencies or disaster scenarios
Crowd monitoring crowd flow monitoring for emergency management; efficient use of public and retail
spaces; workflow in commercial environments
Transport
Traffic management Intelligent transportation through real-time traffic information and path optimization
Infrastructure monitoring Sensors built into infrastructure to monitor structural fatigue and other maintenance;
accident monitoring for incident management and emergency response coordination
Services
Water Water quality, leakage, usage, distribution, waste management
Building management Temperature, humidity control, activity monitoring for energy usage management:
heating, ventilation, and air conditioning (HVAC)
Environment Air pollution, noise monitoring, waterways, industry monitoring
Source: Gubbi, J. et al., Future Gener. Comp. Sys., 29, 1645–1660, 2013.
6.12.7 Cities
An area currently drawing attention is Smart Environment IoT (Gluhak et al., 2011; Li et al., 2011).
Several testbeds are being implemented and many more are planned for the coming years.
The applications or use-cases within the urban environment that can benefit from the realization of a
smart city WSN capability are shown in Table 6.2. These applications are grouped according to their impact
areas. This includes the effect on citizens’ health and well-being; the impact of transport on mobility, pro-
ductivity, and pollution; and critical community services managed by local government (Gubbi et al., 2013).
6.12.8 Utilities
The information from the networks in this application domain is usually for service optimization rather
than consumer consumption. IoT applications are already being used by utility companies (electricity
supply companies use smart meters) for resource management to optimize cost vs. profit. These are made
up of very extensive networks (on regional and national scales) to monitor critical utilities and efficient
resource management. The backbone network used can vary between cellular, Wi-Fi, and satellite com-
munication (Gubbi et al., 2013).
Smart grid and smart metering are potential IoT applications and are being implemented around the
world (Yun and Yuxin, 2010). Efficient energy consumption can be achieved by continuously monitor-
ing every electricity point within a house and using this information, to modify the way electricity is
consumed. This information at the city scale is used for maintaining the load balance, within the grid
ensuring high QoS (Gubbi et al., 2013).
Expectaons
Internet TV
NFC Payment
Acvity Streams
Private Cloud Compung
Wireless Power Augmented Reality
Social Analycs Cloud Compung
Group Buying Media Tablet
Gamificaon Virtual Assistants
3D Prinng In-Memory Database Management Systems
Image Recognion
Context-Enriched Services Gesture Recognion
Speech-to-Speech Translaon
Internet of Things Machine-to-Machine Communicaon Services
Natural Lenguage Quesons Answering Locaon-Aware
Mobile Robots Applicaons
Mes Networks: Sensor
FIGURE 6.18 Cycle of emerging technologies. (From Gartner, Gartner’s Hype Cycle Special Report for 2011, Gartner Inc
https://www.gartner.com/doc/1758314/gartners-hype-cycle-special-report, 2011.)
application, already helps track targets, identify suspicious activities, detect left luggage, and monitor
unauthorized access. Automatic behavior analysis and event detection (as part of sophisticated video
analytics) are in its infancy, and breakthroughs are expected in the next decade (see Figure 6.18) (Gubbi
et al., 2013).
6.12.11 Transportation
Despite being part of the urban use of IoT, smart transportation and smart logistics can be placed in a
separate domain because of the nature of data sharing and backbone implementation required.
Urban traffic is the main contributor to traffic noise pollution and a major contributor to urban air qual-
ity degradation and greenhouse gas emissions. Traffic congestion imposes significant costs on economic
and social activities in most cities. Supply chain efficiencies and productivity, including just-in-time
operations, are severely impacted by congestion causing freight delays and delivery schedule failures.
Dynamic traffic information will positively affect freight movement, allow better planning, and lead to
improved scheduling.
Transport-related IoT will enable the use of large scale WSNs for online monitoring of travel times,
origin-destination (O-D) route choice behavior, queue lengths, and air pollution and noise emissions.
226 Handbook of Industry 4.0 and SMART Systems
IoT is likely to replace the traffic information provided by the sensor networks of inductive loop vehi-
cle detectors employed at the intersections of existing traffic control systems. They will also under-
pin the development of scenario-based models for planning and designing mitigation and alleviation
plans, as well as improved algorithms for urban traffic control, including multi-objective control systems.
Combined with information gathered from the urban traffic control system, valid and relevant informa-
tion on traffic conditions can be presented to travelers (Kumar et al., 2005).
The prevalence of Bluetooth technology (BT) devices reflects the current IoT penetration in a number of
digital products such as mobile phones, car hands-free sets, and navigation systems. BT devices emit signals
with a unique Media Access Identification (MAC-ID) number that can be read by BT sensors within the
coverage area. Readers placed at different locations can be used to identify the movement of the devices.
Complemented by other data sources, such as traffic signals or bus GPS, problems that can be addressed
include vehicle travel time on motorway and arterial streets, dynamic (time-dependent) O-D matrices on the
network, identification of critical intersections, and accurate and reliable real-time transport network state
information (Lin et al., 2005). There are many privacy concerns by such usages, however, and digital forget-
ting is an emerging domain of research in IoT (Mayer-Schönberger, 2011).
Another important application is efficient logistics management (Lin et al., 2005). This includes moni-
toring the items being transported and efficient transportation planning. The monitoring of items is car-
ried out locally, but transport planning is carried out using a large-scale IoT network (Gubbi et al., 2013).
the current IoT into a dynamically configured web of platforms for connected devices, objects, smart
environments, services, and persons.
Numerous industrial analyses (Acatech, Cisco, Ericsson, IDC, Forbes) have identified the evolution
of the IoT embedded in Smart Environments and Smart Platforms forming a smart web of everything
as one of the next big concepts to support societal changes and economic growth. Dozens of connected
devices per human being on the planet are conservatively anticipated in the next decade.
On the way toward “Platforms for Connected Smart Objects” the biggest challenge will be to overcome
the fragmentation of vertically oriented closed systems and architectures and application areas and move
toward open systems and integrated environments and platforms, which support multiple applications of
social value by bringing contextual knowledge of the surrounding world and events into complex busi-
ness or social processes. The task is to create and master innovative ecosystems beyond smartphones and
device markets.
To specify challenges for IoT in deployment, technological and business model validation, and accept-
ability, large-scale pilots could play an important role, addressing security and trust issues in an inte-
grated manner and contributing to certification and validation ecosystems in the IoT arena.
A non-exhaustive list of objectives for IoT large-scale pilots would address the following topics:
• Solving remaining technological barriers, with a strong focus on security. In addition, some
engineering issues need to be solved to speed up the engineering process for conceiving,
designing, testing, and validating IoT-based systems. It is also important to manage a very high
number of IoT devices that cannot be controlled individually but need be run automatically, and
this calls for advances in software.
• Exploring the integration potential of IoT architectures and components together with Cloud
solutions and Big Data approaches. This conceptual novel approach needs to be substantiated
in more depth. Moreover, the actors in the field are continuing to develop and exploit their own
domains, e.g., IoT, Cloud, and Big Data.
• Validating user acceptability, focusing on applications, which are not operational today and still
require research. One such example could be car-to-car communication or enhanced assisted
living to relay safety-critical information. These kinds of applications also come with regula-
tory issues, e.g., in terms of liability.
• Promoting innovation on sensor or object platforms. Future Internet pilot activities have fos-
tered this type of pilot by giving the power to a set of users to develop innovative applications
out of data collected from the sensors. More innovation is certainly also needed in the way
non-experienced users could communicate with smart objects.
• Demonstrating cross-use case issues to validate the concepts of generic technologies that can
serve a multiplicity of environments and imply the cooperation of incumbents, e.g., for Smart
Homes, Smart manufacturing, dedicated Smart City areas, Smart Food Value Chain or Digital
social communities, creative industries, city and regional development. In addition, it is essen-
tial to run pilots deploying agent-driven applications and to test system of systems in physical
spaces in relation to the human scale (Vermesan and Friess, 2013).
• Connected devices and gateways, including hardware platforms (Arduino prototyping plat-
form, T-Mote Sky, Zolertia Z1, and other platforms based on Texas Instruments MSP430) and
software platforms (TinyOS, Contiki OS) and the related standards (such as the gateway speci-
fications by Home Gateway Initiative [2018]);
• Connectivity between the devices and the Internet, that may be implemented, e.g., through a
mobile wireless modem or a Wi-Fi router, or through a WPAN gateway device, on hardware
platforms (e.g., single-chip modems by RMC [Renesas Mobile Corporation, 2019]), on the stan-
dards and protocols governing the communication (e.g., IETF 6LoWPAN, ROLL, and CoAP
protocols promoted by IPSO Alliance, WPAN standards by ZigBee Alliance), or on the software
platforms to support the connectivity (e.g., Californium Java CoAP framework (Kovatsch et al.,
2012), Erbium CoAP framework for Contiki (Kovatsch et al., 2011));
• Application services built on top of this connectivity with the help of common software plat-
forms and standards governing the service composition and data format compatibility (EPC,
JSON, SOA) (Mazhelis et al., 2011);
• Supporting services needed for the provisioning, assurance, and billing of the application ser-
vices (e.g., NSN M2M software suite; Harjula, 2011; Ericsson Device Connection Platform,
Blockstrand et al., 2011), as well as M2M optimized network elements (e.g., the Gateway GPRS
Support Node [GGSN]-enabling network initiated Packet Data Protocol [PDP] context) and
related standards (e.g., the standards developed by ETSI M2M technical committee).
These common assets with a potential to serve as a core for an IoT ecosystem are shown in Table 6.3,
where they are categorized as hardware platforms, software platforms, or standards. This categorization
is not exclusive, as, for example, the standards for the application services are likely to concern the con-
nected devices (Mazhelis et al., 2011).
Thus, deriving from the definitions of Moore (1996), Iansiti and Levien (2004), and Talvitie (2011), an
IoT business ecosystem can be defined as a community of interacting companies and individuals, along
with their socioeconomic environment, where the companies are competing and cooperating by utiliz-
ing a common set of core assets related to the interconnection of the physical world of things with the
virtual world of Internet. These assets may be in a form of hardware and software products, platforms,
or standards that focus on the connected devices, on the connectivity thereof, on the application services
TABLE 6.3
Examples of IoT Ecosystem Cores
Core Hardware Platform Software Platform Standards
Connected device Arduino, T-Mote Sky TinyOS, TinyOS, Processing, Home gateway initiative
Processing, Contiki OS
Connectivity Wi-Fi or Zigbee systems-on-chip Californium, Erbium IPSO Alliance, Zigbee Alliance
Application services Cloud infrastructure Pachube SOA, JSON, EPC
Supporting services M2M-optimized GGSN NSN M2M suite, ETSI M2M TC
Ericsson Device
Connection Platform
Source: Mazhelis, O. et al., Defining an Internet of Things Ecosystem, Springer-Verlag, Berlin, Germany, 2011.
IoT and the Need for Data Rationalization 229
built on top of this connectivity, or on the supporting services needed for the provisioning, assurance,
and billing of the application services (Mazhelis et al., 2011).
Plaorm
FIGURE 6.19 Elements and enablers of an IoT ecosystem. (From Valdez-de-Leon O., Key Elements and Enablers for
Developing an IoT Ecosystem, https://iot.ieee.org/newsletter/may-2017/key-elements-and-enablers-for-developing-an-iot-
ecosystem.html, 2017.)
230 Handbook of Industry 4.0 and SMART Systems
There are a number of key enablers that enterprises should focus on when developing their IoT ecosys-
tems. These are briefly discussed below.
• Enabling platforms: As mentioned above, platforms are the foundation of the ecosystem.
Businesses need to deploy IoT platforms that fulfill the expectations of both customers and
partners in terms of functionality, reliability, security, and flexibility. The platform needs to
enable not only vertical solutions, but a true ecosystem in the form of a marketplace for IoT
products and services.
• APIs: APIs are the basic building blocks of an IoT ecosystem, and businesses must therefore
develop a strong API strategy. This strategy should be based on a deep understanding of the
IoT markets that the business intends to target. Designing and supporting APIs for everyone is
impractical, so a focused approach is recommended. The business should also develop an API
roadmap that is in line with its overall IoT strategy, while the API pricing and support model must
be aligned with the business’ ecosystem revenue model. The application programming interface
can ultimately foster—or discourage—network effects. If using a company’s APIs is too onerous
or does not create sufficient value, ecosystem partners will be reluctant to invest time or effort.
It is therefore vital that businesses define their API strategies with market and partner needs in
mind.
• Communities: For ecosystems to be true ecosystems, communities of partners need to
exist. These partners should be able to develop products and services based on the company
resources (via APIs), as well as those of other ecosystem participants. The benefits to busi-
nesses can be immense. By enabling others to invest and create new products and services,
the business can boost innovation. This is achieved without incurring every cost and risk
involved, but by sharing these with the ecosystem partners. Companies like IBM, Amazon,
and Microsoft are very active in this area, sponsoring hackathons and university research
programs and incubators.
• Revenue models: Revenue models are a key aspect of the successful development of IoT
ecosystems. Businesses looking to attract ecosystem partners need to define the right rev-
enue generation and sharing model—one that incentivizes partners to join the ecosystem,
reduces risks for partners to innovate, and fits with the business model of the individual
partners. Some partners will be attracted to a revenue sharing model, while others will prefer
a licensing or fixed royalty-based model. Models like “freemium” can be good to encour-
age experimentation and early adoption in IoT communities. This means firms will need to
support several revenue and partnership models; this, in turn, will require new decision and
management systems.
• Ecosystem support functions: The final (and perhaps most overlooked) enabler is the inter-
nal organization and the related support functions. A critical function is partner management,
which not only means being able to recruit but also to incentivize and support ecosystem part-
ners throughout the partnership lifecycle. This capability goes beyond basic reseller agree-
ments. Businesses will also require dedicated teams to support the ecosystem. This support
includes technical (e.g., how to use an API), marketing (e.g., sell your apps on our marketplace),
and operational (e.g., “fulfilled by Amazon”).
Moreover, a governance model that establishes clear “ecosystem rules” is critical to maintain harmony
among members and a healthy cooperative ecosystem.
In the battle to establish leadership, the ecosystem will ultimately be the competitive unit. At the same
time, building an IoT ecosystem is a complex undertaking that requires many interconnected factors
to be balanced. The challenge for businesses is to establish an IoT ecosystem strategy that is holistic,
considering all the elements described above, and to adopt an ecosystem mindset that moves away from
vertical value chains with one set of customers at the end of it. When it comes to developing an IoT eco-
system, businesses need to take the view that they have customers not only in the form of end-customers;
IoT and the Need for Data Rationalization 231
they also have intermediate customers in the form of partners who need attracting, supporting, and
delighting just as much as an end customer (Valdez-de-Leon, 2017).
innovation, demand and new uses for connected devices will grow. At a higher level, IoT has a role to
play in helping companies create more sustained value by moving from a one-time transaction focus to
a continuous, relationship focus with customers, suppliers, workers, and assets.
While technical issues that affect reliable connectivity and performance still exist, enterprises will
be more willing to adopt IoT solutions if they can see significant, lasting benefits to the business that
outweigh the real and perceived risks of connection. Participants in the IoT ecosystem will need to work
together to create solutions that improve enterprise adopters’ business performance, not just in the short
term but over time. In so doing, they will unlock the business value for enterprise adopters and grow the
IoT market for everyone. The potential for the next stage of IoT is unbounded and it will be shaped by the
decisions that participants in the IoT ecosystem make today (Deloitte, 2014).
REFERENCES
Aberer K., Hauswirth M., and Salehi A., Middleware support for the “Internet of Things,” Proceedings of the
5th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, 2006.
Akyildiz I. F., Melodia T., Chowdhury K. R., A survey on wireless multimedia sensor networks, Computer
Networks, 51(4), 921–960, 2007.
An J., Gui X. L., and He X., Study on the architecture and key technologies for Internet of Things, In Advances
in Biomedical Engineering, Vol.11, IERI-2012, 329–335, 2012.
Arduino open-source electronics prototyping platform, https://www.arduino.cc/. Viewed: October 2, 2018.
Atzori L., Iera A., and Morabito G., The Internet of Things: A survey, Computer Networks, 54(1), 52787–52805,
2010.
Bandyopadhyay D., and Sen J., Internet of Things—Applications and Challenges in Technology and
Standardization, Wireless Personal Communications, 58(1) 49–69, 2011.
Batten C., and Wills-Sandford T., The connected home: A reality, intellect report, Information Technology
Telecommunications and Electronics Association, 2011.
Bauer M., Boussard M., Bui N., and Carrez F., Internet of Things—Architecture IoT-A Deliverable D1.5—
Final architectural reference model for the IoT v3.0, Technical Report, 2013.
Blockstrand M., Holm T., Kling L.-Ö., Skog R., and Wallin B., Operator opportunities in the Internet of
Things, Ericsson Review, 1, 2011.
Bradbury D., How Can Privacy Survive in the Era of the Internet of Things? The Guardian, April 7, 2015,
sec. Technology, 2015.
Business Insider Intelligence, Research for the digital age, 2015. https://intelligence.businessinsider.com/.
Accessed: September 24, 2018.
Buyya R., and Dastjerdi A. V., Internet of Things: Principles and Paradigms, Elsevier, Amsterdam, the
Netherlands, 2016.
Carnegie Mellon University, 1998. The “Only” Coke Machine on the Internet. Computer Science Department, 2015.
https://www.cs.cmu.edu/~coke/history_long.txt. Accessed September 24, 2018.
Castellani A. P., Bui N., Casari P., Rossi M., Shelby Z., and Zorzi M., Architecture and protocols for the
Internet of Things: A case study, Proceedings of the 8th IEEE International Conference on Pervasive
Computing and Communications Workshops (PERCOM Workshops), 2010.
CBSN, 2015, Buyya R., Dastjerdi A. V., 2016. Samsung Smart TV’s Voice Recognition Creates Privacy
Concerns. CBS This Morning. CBS News, 2015. https://www.cbsnews.com/video/samsung-smart-tvs-
voice-recognition-creates-privacy-concerns/. Accessed September 24, 2018.
Chen W., An IBE based security scheme of Internet of Things, Cloud Computing and Intelligent Systems
(CCIS), 1046–1049, 2012.
Cheng X., Zhang M., and Sun F., Architecture of Internet of Things and its key technology integration based-on
RFID. Fifth International Symposium on Computational Intelligence and Design, pp. 294–297, 2012.
Contiki, Connecting Next Billion Devices—Contiki is the open source oS for the Internet of Things, 2003. https://
www.sics.se/projects/contiki-connecting-the-next-billion-devices. Accessed September 28, 2018.
Darianian M., and Michael M. P., Smart Home Mobile RFID-based Internet-of-Things systems and ser-
vices. Proceedings of the International Conference on Advanced Computer Theory and Engineering
(ICACTE’08), 2008.
IoT and the Need for Data Rationalization 233
Dastjerdi A. V., Sharifi M., and Buyya R., On application of ontology and consensus theory to human-centric
IoT: An emergency management case study. Proceedings of the Eighth IEEE International Conference
on Internet of Things (iThings 2015, IEEE CS Press, USA), Sydney, Australia, December 11–13, 2015.
Datta S. K., Bonnet C., and Nikaein N., An IoT gateway centric architecture to provide novel m2m services,
IEEE World Forum on Internet of Things (WF-IoT), 514–519, 2014.
Da Xu L., He W., and Li S., Internet of Things in industries: A survey, Information IEEE Transactions, 10(4),
2233–2243, 2014.
Dohr A., Modre-Opsrian R., Drobics M., Hayn D., and Schreier G., The Internet of Things for ambient assisted
living, Seventh International Conference on Information Technology: New generations (ITNG), 804–
809, 2010.
Deloitte., The Internet of Things Ecosystem: Unlocking the Business Value of Connected Devices, 2014, Deloitte
Development LLC. 2014. https://www2.deloitte.com/global/en/pages/technology-media-and-telecommu-
nications/articles/internet-of-things-ecosystem.html. Accessed October 3, 2018.
Elmangoush A., Magedanz T., Blotny A., and Blum N., Design of RESTful APIs for M2M services, Sixteenth
International Conference on Intelligence in Next Generation Networks (ICIN), 50–56, 2012.
ETSI Technical Committee M2M (Technology of Machine-to-Machine communication) meeting, https://www.
etsi.org/technologies-clusters/technologies/internet-of-things. Accessed October 2, 2018.
European Telecommunication Telecommunications Standards Institute (ETSI). https://www.etsi.org/.
Accessed September 28, 2018.
Evans G. D., The Internet of Things—How the Next Evolution of the Internet is Changing Everything, Cisco
Internet Business Solutions Group (IBSG), White paper, 2011.
Farooq M. U., Waseem M., and Mazhar S., A Review on Internet of Things (IoT), International Journal of
Computer Applications (0975 8887), 113(1) 1–7, 2015.
Flügel C., and Gehrmann V., Scientific Workshop 4: Intelligent objects for the Internet of Things: Internet
of Things—Application of sensor networks in logistics. In Constructing Ambient Intelligence,
Communications in computer and Information Science (H. Gerhäuser, J. Hupp, C. Efstratiou, and
J. Heppner eds., Vol. 32, pp. 16–26), Springer, Berlin, Germany, 2009.
Fraser S., Quentin, The Trojan Room Coffee Pot, N.p., May 1995.
Fremantle P., Co-Founder, WSO2. A reference architecture for the Internet of Things. White Paper. 2015.
https://wso2.com/wso2_resources/wso2_whitepaper_a-reference-architecture-for-the-internet-of-
things.pdf. Accessed September 26, 2018.
Gartner, Gartner‘s Hype Cycle Special Report for 2011, Gartner Inc. 2011. https://www.gartner.com/
doc/1758314/gartners-hype-cycle-special-report. Accessed September 30, 2018.
Gartner, Gartner says the Internet of Things will transform the data center, 2014. https://www.datacenter-
dynamics.com/news/gartner-internet-of-things-will-disrupt-the-data-center/. Accessed September 24,
2018.
Gartner, Gartner Says 6.4 Billion Connected. Stamford, CT, 2015. https://www.gartner.com/newsroom/
id/3165317. Accessed September 24, 2018.
Gigli M., and Koo S., Internet of Things: Services and applications categorization, Advances in Internet of
Things, 1, 27–31, 2011.
Gluhak A., Krco S., Nati M., Pfisterer D., Mitton N., and Razafindralambo T., A survey on facilities for experi-
mental Internet of Things research, IEEE Communications Magazine, 49 (2011), 58–67, 2011.
Greenberg A., Hackers Remotely Kill a Jeep on the Highway–With Me in It. WIRED, 2015.
Gómez G. A., and López D., A triple space-based semantic distributed middleware for Internet of Things,
in Current Trends in web Engineering, Lecture Notes in Computer Science (F. Daniel, and F. M. Facca
eds., Vol. 6385, pp. 447–458), Springer, Berlin, Germany, 2010.
Gubbi J., Buyya R., Marusic S., and Palaniswami M., Internet of Things (IoT): A vision, architectural ele-
ments, and future directions, Future Generation Computer Systems, 29(7), 1645–1660, 2013.
Guinard D., Trifa V., Mattern F., and Wilde E., From the Internet of Things to the web of things: Resource-
oriented architecture and best practices. in Architecting the Internet of Things (D. Uckelmann, M.
Harrison, and F. Michahelles eds., pp. 97–129), Springer, Berlin, Germany, 2011.
Guinard D., Trifa V., Karnouskos S., Spiess P., and Savio D., Interacting with the SOA-based Internet of
Things: Discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions
on Services Computing, 3(3), 223–235, 2010.
234 Handbook of Industry 4.0 and SMART Systems
Guo B., Yu Z., Zhou X., and Zhang D., Opportunistic IoT: Exploring the social side of the Internet of Things,
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in
Design (CSCWD), IEEE, 2012.
Guo B., Zhang D., and Wang Z., Living with Internet of Things: The emergence of embedded intelligence,
Proceedings of the IEEE International Conferences on Internet of Things, and Cyber, Physical and
Social Computing (iThings/CPSCom). IEEE, 2011.
Gupta R., and Gupta R., ABC of Internet of Things: Advancements, Benefits, Challenges, Enablers and Facilities
of IoT, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Pune, India, 2016.
Harjula J., Nokia Siemens Networks promotes GSM for Machine to Machine applications. Press release, 2011.
https://www.rcrwireless.com/20110711/network-infrastructure/nokia-siemens-networks-promotes-gsm-
for-machine-to-machine-applications-2. Accessed October 2, 2018.
Hauben R., A Study of the ARPANET TCP/IP Digest and of the Role of Online Communication in the
Transition from the ARPANET to the Internet, 1998. http://www.columbia.edu/~rh120/other/tcpdigest_
paper.txt. Accessed September 26, 2018.
Heydon R., 2013. Bluetooth Low Energy, Prentice Hall, 2013.
Home Gateway Initiative publications. http://www.homegatewayinitiative.org/. Accessed October 2, 2018.
Hsueh C. F., and Chang M. S., A model for intelligent transportation of perishable products, International
Journal of Intelligent Transportation Systems Research, 8(1), 36–41, 2010.
Huang Y., and Li G., A semantic analysis for Internet of Things, Proceedings of the International Conference
on Intelligent Computation Technology and Automation (ICICTA). IEEE, 2010.
IDC, Worldwide Internet of Things 2013–2020 Forecast: Billions of Things, Trillions of Dollars, Doc #:
243661, 2013.
Iansiti M., and Levien R., The Keystone Advantage: What the New Dynamics of Business Ecosystems Mean
for Strategy, Innovation, and Sustainability, Harvard Business Press, Brighton, MA, 2004.
International Standard (ISO) 55000 (E), Asset management—Overview, principles and terminology,
International Organization for Standardization, 2014.
International Telecommunication Union (ITU), The Internet of Things. ITU Internet Reports, Geneva,
Switzerland, 2005.
Ishaq I., Hoebeke J., Rossey J., De Poorter E., Moerman I., and Demeester P., Enabling the web of things:
Facilitating deployment, discovery and resource access to IoT objects using embedded web services,
International Journal of Web and Grid Services, 10(2), 218–43, 2014.
Jara A. J., Belchi F. J., Alcolea A. F., Santa J., Zamora-Izquierdo M. A., and Gomez-Skarmeta A. F., A phar-
maceutical intelligent information system to detect allergies and adverse drugs reactions based on
Internet of Things. Proceedings of the 8th IEEE International Conference on Pervasive Computing
and Communications Workshops (PERCOM Workshops), 2010.
Jun-Wei H., Shouyi Y., Leibo L., Zhen Z., and Shaojun W., A crop monitoring system based on wireless sensor
network, Procedia Environmental Sciences, 11 (2011), 558–565, 2011.
Khan R., Khan S. U., Zaheer R., and Khan S., Future Internet: The Internet of Things Architecture, possible
applications and key challenges, in Proceedings of Frontiers of Information Technology (FIT), 257–260,
2012.
Kato H., and Tan K. T., Pervasive 2D barcodes for camera phone applications, IEEE Pervasive Computing,
6(4), 76–85, 2007.
Khodadadi F., Dastjerdi A. V., and Buyya R., Simurgh: A framework for effective discovery, programming,
and integration of services exposed in IoT, International Conference on Recent Advances in Internet of
Things (RIoT), 1–6, 2012.
Kinnunen S. K., Ylä-Kujala A., Marttonen-Arola S., Kärri T., and Baglee D., Internet of Things Technologies
to Rationalize the Data Acquisition in Industrial Asset Management, Conference Paper, 2016.
Kopetz H., Real-time Systems Series: Design Principles for Distributed Embedded Applications, 2nd edition,
Springer, Berlin, Germany, 2011.
Kortuem G., Kawsar F., Fitton D., and Sundramoorthy V., Smart objects as building blocks for the Internet of
Things, Internet Computing, IEEE 14(1), 44–51, 2010.
Kovatsch M., Duquennoy S., and Dunkels A., A Low-Power CoAP for Contiki, Proceedings of the 8th
IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), Valencia,
Spain, 855–860.
IoT and the Need for Data Rationalization 235
Kovatsch M., Mayer S., and Ostermaier B., Moving application logic from the firmware to the cloud: Towards
the thin server architecture for the Internet of Things, Proceedings of the 6th International Confer
ence on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), Palermo, Italy,
2012.
Kumar P., Ranganath S., Huang W., and Sengupta K., Framework for real-time behavior interpretation from
traffic video, IEEE Transactions on Intelligent Transportation Systems, 6, 43–53, 2005.
Kushalnagar N., Montenegro G., and Schumacher C., IPv6 over Low-Power Wireless Personal Area Networks
(6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, IETF RFC 4919, 2009.
Lee I., and Lee K., The Internet of Things (IoT): Applications, investments, and challenges for enterprises.
Kelley School of Business, Indiana University. Published by Elsevier Inc. All rights reserved. Business
Horizons 58, 431–440, 2015.
Lehr W. H., and Chapin J. M., On the convergence of wired and wireless access network architectures.
Published 2010 in Information Economics and Policy, 2010.
Li B., and Yu J., Research and application on the smart home based on component technologies and Internet
of Things. Procedia Engineering 15, 2087–2092, 2011.
Li L., Study of Security Architecture in the Internet of Things, Measurement, Information and Control (MIC),
1, 374–377, 2012.
Li X., Lu R., Liang X., Shen X., Chen J., and Lin X., Smart community: An Internet of Things application,
IEEE Communications Magazine, 49(11), 68–75, 2011.
Lin H., Zito R., and Taylor M., A review of travel-time prediction in transport and logistics, Proceedings of the
Eastern Asia Society for Transportation Studies, 5 (2005), 1433–1448, 2005.
Liu J., Li X., Chen X., Zhen Y., and Zeng L., Applications of Internet of Things on smart grid in China. Proceedings
of the 13th International Conference on Advanced Communication Technology (ICACT), IEEE, 2011.
Lopez Research LLC, An Introduction to the Internet of Things (IoT), San Francisco, CA, 2013.
Lucero S., IHS Technology. IoT platforms: Enabling the Internet of Things. Sr. Principal Analyst, M2M and
IoT. Whitepaper, 2016.
Manzalini A., Minerva R., and Moiso C., If the web is the platform, then what is the SDP? Thirteenth
International Conference on Intelligence in Next Generation Networks (ICIN 2009), 1–6, 2009.
Marston S., Li Z., Bandyopadhyay S., Zhang J., and Ghalsasi A., Cloud computing—The business perspective,
Decision Support Systems, 51, 176–189, 2011.
Mayer-Schönberger V., Failing to Forget the—Drunken Pirate, Delete: The Virtue of Forgetting in the Digital
Age (New in Paper), 1st edition, Princeton University Press, pp. 3–15, 2011.
Mazhelis O., Luoma E., and Warma H., Defining an Internet of Things Ecosystem Springer-Verlag, Berlin,
Germany, p.1, 2011.
McEwen A., and Cassimally H., Designing the Internet of Internet, 1st edition. John Wiley & Sons, West
Sussex, UK, 2013.
Mell P., and Grance T., The NIST Definition of Cloud Computing, NIST Special Publication 800-145. National
Institute of Standards and Technology, Information Technology Laboratory, 2011.
METIS, Mobile and wireless communications Enablers for the Twenty-twenty (2020). Information Society,
2015. https://www.chalmers.se/en/projects/Pages/Mobile-and-wireless-communications-Enablers-for-
Twenty-twenty.aspx. Accessed September 26, 2018.
Moore J. F., Death of Competition, John Wiley & Sons, Hoboken, NJ, 1996.
Naur P., and Randell B., Software Engineering. Report of a Conference Sponsored by the NATO Science
Committee, Garmisch, Germany, Brussels, Scientific Affairs Division, NATO, 1968.
Oliveira P., and Matos P. J., BLEGen—A code generator for bluetooth low energy services, Lecture Notes on
Software Engineering 4(1), 2016.
Ortutay B., IBM to invest $3-billion in new “Internet of Things” unit, 2015. https://www.reuters.com/article/us-
ibm-investment-idUSKBN0MR0BS20150331. Accessed September 25, 2018.
Pasley J., How BPEL and SOA are changing web services development, IEEE Internet Computing, 9(3),
65–67, 2005.
Plattform INDUSTRIE 4.0, Securing the future of German manufacturing industry “Recommendations for
implementing the strategic initiative industrie 4.0,” Final report of the Industrie 4.0. Working Group, 2013.
https://www.din.de/blob/76902/e8cac883f42bf28536e7e8165993f1fd/recommendations-for-implementing-
industry-4-0-data.pdf. Accessed September 26, 2018.
236 Handbook of Industry 4.0 and SMART Systems
Phil Tien N., and Aggarwal A., Enhanced DNS-based Service Discovery in an Internet of Things (IoT)
Environment. U.S. Patent 20,150,341,446, 2015.
Polsonetti, C., Know the Difference Between IoT and M2M. Automation World, 2015.
Renesas Mobile Corporation. Wireless Modem Chipsets, 2019. https://www.renesas.com. Accessed July 26, 2019.
Richards M., Micro services vs. Service-Oriented Architecture, O’Reilly Media, Inc., Sebastopol, CA, 2016.
Rose K., Eldridge S., and Chapin L., Internet of Things: An Overview—Understanding the Issues and
Challenges of a More Connected World. Internet Society, 2015.
Samsung Newsroom, The Internet of Things Needs Openness and Industry Collaboration to Succeed, Says Samsung
Electronics. CEO BK Yoon, 2015. https://news.samsung.com/us/the-internet-of-things-needs-openness-and-
industry-collaboration-to-succeed-says-samsung-electronics-ceo-bk-yoon/. Accessed September 24, 2018.
Santucci G., Internet of the future and Internet of Things: What is at stake and how are we getting prepared
for them? in eMatch’99- Future Internet Workshop, Oslo, Norway, 2009.
Schaffers H., Komninos N., Pallot M., Trousse B., Nilsson M., and Oliveira A., Smart cities and the
future internet: Towards cooperation frameworks for open innovation, in The Future Internet,
Lecture Notes in Computer Science (J. Domingue et al. eds. Vol. 6656, pp. 431–446), Springer,
Berlin, Germany, 2011.
Schlautmann A., Levy D., Keeping S., and Pankert G., Wanted: Smart market-makers for the “Internet of
Things,” Prism, 2, 35–47, 2011.
Shelby Z., ETSI M2M Standardization, 2009.
Shen G., and Liu B., The visions, technologies, applications and security issues of Internet of Things,
E-Business and E -Government (ICEE), 1–4, 2011.
Sinclair B., IoT Ecosystems versus IoT Platforms. IoT Inc. Article, 2018. https://www.iot-inc.com/iot-ecosys-
tems-versus-iot-platforms-article/. Accessed October 2, 2018.
Song Z., Cárdenas A. A., and Masuoka R., Semantic middleware for the Internet of Things. Proceedings of
the Internet of Things (IoT). IEEE, 2010.
Sundmaeker H., Guillemin P., Friess P., and Woelffle S., Vision and Challenges for Realizing the Internet of
Things, European Commission, 2010.
Stankovic J. A., Research directions for the Internet of Things, IEEE Internet of Things Journal, 1(1), 3–9,
2014. doi:10.1109/jiot.2014.2312291.
Stirbu V., Towards a restful plug and play experience in the web of things, IEEE International Conference on
Semantic Computing, 512–517, 2008.
Su K., Li J., and Fu H., Smart city and the applications, International Conference on Electronics,
Communications and Control (ICECC), 1028–1031, 2011.
Suo H., Wan J., Zou C., and Liu J., Security in the Internet of Things: A review, in Computer Science and
Electronics Engineering (ICCSEE), 648–651, 2012.
Talvitie J., Business Ecosystem Creation—Supporting collaborative business concept development, Tivit
Business Forum, 2011.
Thaler D., Hannes Tschofenig H., and Barnes M., Architectural Considerations in Smart Object Networking.
IAB RFC 7452. 2015.
Thierer A., and Castillo A., Projecting the Growth and Economic Impact of the Internet of Things. George
Mason University, Mercatus Center, 2015.
Tschofenig H., and Arkko J., Report from the Smart Object Workshop, Internet Architecture Board (IAB).
Request for Comments: 6574, 2012.
Uviase O., and Kotonya G., IoT architectural framework: connection and integration framework for IoT sys-
tems, School of Computer Science and Communication. Lancaster University, Lancaster, UK, 2018.
Valdez-de-Leon O., Key Elements and Enablers for Developing an IoT Ecosystem, 2017. https://iot.ieee.
org/newsletter/may-2017/key-elements-and-enablers-for-developing-an-iot-ecosystem.html. Accessed
October 1, 2018.
Valipour M. H., Amirzafari B., Maleki K. N., and Daneshpour N., A brief survey of software architecture con-
cepts and service oriented architecture, Second IEEE International Conference on Computer Science
and Information Technology (ICCSIT 2009), 34–38, 2009.
Vazquez J. I., and Lopez-de-Ipina D., Social devices: Autonomous artifacts that communicate on the internet,
in The Internet of Things, Lecture Notes in Computer Science (C. Floerkemeier, M. Langheinrich, E.
Fleisch, F. Mattern, and S. E. Sarma eds., Vol. 4952, pp. 308–324), Springer, Berlin, Germany, 2008.
IoT and the Need for Data Rationalization 237
Vermesan O., and Friess P., Internet of Things: Converging technologies for smart environments and inte-
grated ecosystems. River Publishers, 2013.
Vicini S., Sanna A., and Bellini S., A living lab for Internet of Things vending machines, in The Impact of
Virtual, Remote, and Real Logistics Labs, Communications in Computer and Information Science (D.
Uckelmann, B. Scholz-Reiter, I. Rügge, B. Hong, and A. Rizzi eds., Vol. 282, pp. 35–43), Springer,
Berlin, Germany, 2012.
Vilajosana X., OpenMote: Open-source prototyping platform for the industrial IoT, in Ad hoc networks,
Springer International Publishing, New York, pp. 211–222, 2015.
Wang F., Hu L., Zhou J., and Zhao K., A survey from the perspective of evolutionary process in the Internet of
Things, International Journal of Distributed Sensor Networks, 11(3), 462752, 2015.
Wang N., Guan P., Du H., and Zhao Y., Implementation of asset management system based on wireless sensor
technology, Sensors and Transducers, 164(2), 136–144, 2014.
Weiser M., 1995. The Computer for the 21st-Century, Scientific American, 265, 94–104, 1995.
Whitmore A., Agarwal A., and Xu L. D., The Internet of Things—A Survey of Topics and Trends, Springer
Science+Business Media, New York, 2014.
White C. C., and Cheong T., In-transit perishable product inspection, Transportation Research Part E:
Logistics and Transportation Review, 48(1), 310–330, 2012.
Wu M., Lu T. L., Ling F. Y., Sun L., and Du H. Y., Research on the architecture of Internet of Things,
Advanced Computer Theory and Engineering (ICACTE), 484–487, 2010.
Xing X. J., Wang J. L., and Li M. D., Services and Key Technologies of the Internet of Things, ZTE
Communications, 8(2), 2010.
Yan B., and Huang G., Supply chain information transmission based on RFID and Internet of Things,
Proceedings of the ISECS International Colloquium on Computing, Communication, Control, and
Management, 2009.
Yu E., Singapore unveils plan in push to become smart nation, 2014. https://www.zdnet.com/article/singapore-
unveils-plan-in-push-to-become-smart-nation/. Accessed September 25, 2018.
Yun M., and Yuxin B., Research on the architecture and key technology of Internet of Things (IoT) applied on
smart grid, Proceedings of the International Conference on Advances in Energy Engineering (ICAEE),
2010.
Zhang Y., Technology framework of the Internet of Things and its application, Electrical and Control
Engineering (ICECE), 4109–4112, 2011.
Zhengxia W., and Laisheng X., Modern logistics monitoring platform based on the Internet of Things, Proceedings
of the International Conference on Intelligent Computation Technology and Automation (ICICTA), 2010.
7
OPERATOR 4.0
CONTENTS
7.1 Augmented Reality for O&M....................................................................................................... 242
7.1.1 Augmented Reality (AR).................................................................................................. 242
7.1.1.1 Essential Parts of an AR System...................................................................... 244
7.2 Wearable Devices.......................................................................................................................... 246
7.2.1 Wearable Robots............................................................................................................... 246
7.2.2 Wearable Computers........................................................................................................ 248
7.2.3 Wearable Health Care Devices......................................................................................... 250
7.2.3.1 Wireless Blood Pressure Monitor..................................................................... 250
7.2.3.2 Quell Relief........................................................................................................251
7.2.3.3 Heart Monitor....................................................................................................251
7.2.3.4 Google Smart Contact Lenses...........................................................................251
7.2.3.5 Stress Relief Monitor.........................................................................................251
7.3 Wearables and Localization Devices.............................................................................................251
7.3.1 Demographic Preference Research...................................................................................251
7.3.2 Strings and Speech........................................................................................................... 252
7.3.2.1 Strings............................................................................................................... 252
7.3.2.2 Speech............................................................................................................... 252
7.3.3 Quality Assurance............................................................................................................ 252
7.3.4 Localization Devices........................................................................................................ 252
7.3.4.1 Geographic Information Systems (GIS)........................................................... 253
7.3.4.2 Global Positioning System (GPS)..................................................................... 254
7.3.4.3 Radio-Frequency Identification (RFID)........................................................... 257
7.3.4.4 Wireless Local Area Network (WLAN).......................................................... 262
7.4 Intelligent Health and Safety Devices for Operators.................................................................... 263
7.4.1 Types of Safety Devices................................................................................................... 263
7.4.1.1 SmartCap.......................................................................................................... 263
7.4.1.2 Smartwatch....................................................................................................... 263
7.4.1.3 Connected Worker............................................................................................ 264
7.4.1.4 Smart Helmet.................................................................................................... 264
7.4.1.5 Training for Work in a Hazardous Environment: SafeScan............................. 265
7.4.2 Sensors Used in Wearable Devices.................................................................................. 265
7.4.2.1 Environmental Sensors..................................................................................... 265
7.4.2.2 Biosensors......................................................................................................... 266
7.4.2.3 Position and Location Tracking Sensors.......................................................... 267
7.4.2.4 Other Sensors.................................................................................................... 268
7.4.3 A Multibillion Dollar Market........................................................................................... 268
7.4.4 Research and Innovation to Unlock the Full Potential of Wearables.............................. 269
7.5 Collaborative Robotics in Industry 4.0......................................................................................... 270
7.5.1 Characteristics of Cobots................................................................................................. 270
7.5.2 How Cobots Are Used in Operations............................................................................... 272
7.5.2.1 Hand Guiding.................................................................................................... 272
7.5.2.2 Power and Force Limiting................................................................................ 272
239
240 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLE
Modern O&M has evolved with technology to include advanced systems that provide insight into
data that previously were simply estimated. These systems may track, supply and manage energy in
commercial buildings and facilities; they may include interconnected Wi-Fi sensor networks embed-
ded within equipment to monitor operating parameters or the life span of parts. Understanding mod-
ern real-time O&M data can be a challenge, especially for the multidisciplinary groups that often
are tasked with evaluating O&M data and implementing recommendations (https://acensium.com/
protect-facility-armar-augmented-reality-maintenance-repair/).
To give one example of how this could work, Dr. Gerhard Schall at the Graz University of Technology has
created an AR system in which city workers can get an “X-ray vision” of city infrastructure. For instance,
they can look down at the street and see the electrical and plumbing systems underground. Systems like
this have many potential applications, not only for maintenance, but also for situations such as disaster
relief. By having a virtual projection of how things are supposed to be, a relief worker should be able
to assess damage more quickly. For example, a metric to decide whether a building is badly damaged is
“interstory drift,” or how much a building is leaning. This may be difficult, especially in the aftermath
of an earthquake, when equipment is scarce and the time to assess each building is limited. An AR
system could project what the building should look like over what the building does look like, allowing
inspectors to make a rapid accurate judgment (Azuma, 1997).
In general, AR may allow us to quickly acquire skills that formerly required a huge amount of training.
This could dramatically increase efficiency and may save lives in situations where the job being done is
dangerous if mistakes are made.
Figure 7.1 summarizes some industrial tasks and sectors where AR could bring value.
One of the most common applications of industrial AR (IAR) is assistance to workers in main-
tenance or repair or control tasks through instructions with textual, visual or auditory information
(Alesky et al., 2014). Such information is rendered ubiquitously, so that the worker perceives the
instructions with less effort, thus avoiding the change from a real context to a virtual one where the
relevant data are accessed.
Remote assistance is also key when companies have machines installed in remote locations. Such
machines need to be monitored, operated and repaired with the minimum amount of people on-site.
Industrial AR can help by easing remote collaboration between workers (Reddy et al., 2015; Smparounis
et al., 2008). Augmented communications can also be used for collaborative visualization in engineering
processes during stages related to design or manufacturing (Schneider et al., 2017). Likewise, IAR can
help workers in decision-making, as it can combine physical experience with information extracted in
real time from databases (Moloney, 2006). Industrial AR can also provide quick access to documentation
such as manuals, drawings or three-dimensional (3D) models (Henderson and Feiner, 2011; Qi, 2010;
Zollmann et al., 2014).
Well-trained operators are essential for productive factories. Industrial AR can help during the train-
ing process by giving step-by-step instructions to develop specific tasks. This is especially useful
Service inspecons Maintenance work Logiscs , retail Inspecon of Digital product Safety & security
& verificaons instrucons space opmizaon digital prototypes controls training
when training workers to operate machinery like that used for assembly in sequence, as it reduces the
time and effort required to check manuals (Hořejší, 2015). Thus, IAR can reduce the training time for
new employees and lower the skill requirements for new hires. In addition, it is possible to adjust the
instructions to the experience of the worker, accelerating the learning process by focusing on acquiring
skills.
The 3D models provided by IAR are a useful tool for engineers who are creating or evaluating designs
and products (Nee et al., 2012; Ong et al., 2008). Industrial AR makes it possible to place a virtual object
anywhere and observe at full scale whether it fits or not in a specific scenario. Moreover, IAR enables
on-site computer-aided design (CAD) model corrections, thus improving accuracy, alignment and other
details of the model (Naik et al., 2015; Wuest et al., 2016). Finally, during the different product manufac-
turing stages, IAR can help with quality assurance (QA) controls and performance dashboards (Vassell
et al., 2016).
In manufacturing, IAR can deliver the right information at the right time to avoid mistakes and increase
productivity (Loch et al., 2016). This is critical in dangerous manufacturing tasks, where a mistake may
mean a worker gets injured or that costly equipment is damaged. In such situations, an IAR solution
could be used as a monitoring and diagnosis tool capturing the information provided by control and
management systems and sensors (Shin et al., 2014). Frigo et al. (2016) show some cases in aerospace
manufacturing processes.
The following are essential in the development of a successful IAR application:
• An element to capture images, for example, a charge-coupled device, stereo or depth-sensing camera.
• A display to project the virtual information onto the images acquired by the capture element.
There are two types of display technologies: video-mixed (Figure 7.2) and optical see-through
displays (Benko et al., 2015) (e.g., projection-based systems). There is a growing interest in
retinal projection, but its use is rare in industrial environments. In a video-mixed display, the
virtual and real information previously acquired with a camera are digitally merged and repre-
sented on a display. This technology has the disadvantage of providing limited fields of vision
and reduced resolution. In contrast, in an optical see-through display, virtual information is
superimposed on the user’s field of view by using an optical projection system. The hardware
used by these two display technologies can be classified as:
• Hand-held displays (HHD): HHDs embed a screen that fits into a user’s hand (e.g., tablets,
smartphones).
• Spatial displays: Digital projectors show graphic information about physical objects.
These displays ease collaborative tasks among users, as they are not associated with a
single user.
OPERATOR 4.0 245
• Head-mounted displays (HMDs): HMDs are included in devices such as smart glasses and
smart helmets, which allow users to see the entire environment that surrounds them.
• Processing unit: This unit outputs the virtual information to be projected.
• Activating elements: These include images, GPS positions, QR markers or sensor values
from accelerometers, gyroscopes, compasses, altimeters or thermal sensors that trigger the
display of virtual information.
FIGURE 7.4 Two-dimensional shop floor plans and 3D pipe model superimposed on an industrial pipeline. (From
Azuma, http://www.dtic.mil/dtic/tr/fulltext/u2/a606245.pdf, 1997.)
and register them with the user’s view of the factory, obviating the need for a general-purpose tracking
system (Figure 7.4). Similarly, they take advantage of the physical constraints of a C-arm X-ray machine to
automatically calibrate the cameras with the machine and register the X-ray imagery with the real objects.
TABLE 7.1
Classification of Wearable Technologies
Type Properties Capabilities Applications
Smartwatch • Low operating power • Displays specific • Business, administration
• User-friendly interface information • Marketing, insurance
with both touch and • Payment • Professional sport,
voice commands • Fitness/activity tracking training
• Communication • Education
• Navigation • Infotainment
Smart eyewear • Controlled by touching • Visualization • Surgery
the screen, head • Language interpretation • Aerospace and defense
movement, voice • Communication • Logistics
command, and hand • Task coordination • Education
shake • Infotainment
• Low operating power
• Sends sound directly to
the ear
Fitness tracker • High accuracy • Physiological wellness • Fitness
• Waterproof • Navigation • Healthcare
• Lightweight • Fitness/activity tracking • Professional sport
• Wireless communication • Heart rate monitor • Outdoor/indoor sport
Smart clothing • No visual interaction • Heart rate, daily • Professional sport-fitness
with user via display or activities, temperature, • Medicine
screen and body position • Military
• Data are obtained by tracking • Logistics
body sensors and • Heating or cooling the
actuators body automatic payment
Wearable camera • Making first-person • Captures real-time • Defense
capture attachable on first-person photos and • Fitness
clothes or body videos • Industry
• Smaller dimensions • Live streaming • Education
• Night vision • Fitness/activity tracking
Wearable • Pain management • Cardiovascular diseases • Fitness
medical device • Physiological tracking • Physiological disorders • Cardiovascular medicine
• Glucose monitoring • Chronic diseases; • Psychiatry
• Sleep monitoring diabetes • Surgery
• Brain activity monitoring • Surgery • Oncology
• Neuroscience • Dermatology
• Dermatology • Respirology
• Rehabilitation
Source: Mardonova, M. and Choi, Y., Review of wearable device technology and its applications to the mining industry,
https://www.mdpi.com/1996-1073/11/3/547/htm, 2018.
A particular characteristic of the wearable robot interface is that these pieces of hardware can be pro-
grammed in a variety of ways. Sensors or devices can take in verbal, behavioral or other input to facilitate
specific types of movement. These kinds of resources represent an exciting application of new technology
to medical use, where paralyzed (see Figure 7.6) or disabled individuals may benefit. These wearable
robots feature the junction of sophisticated new hardware, big data and wireless technologies (Wearable
Robot, https://www.techopedia.com/definition/15325/wearable-robot).
Ekso Bionics (Figure 7.7) is a life-changing technology. It consists of mechanized legs that work on
their own power. The development of Ekso (also known as eLEGS) will allow wheelchair users to stand
and walk (Techgrown1, Ekso Bionics, 2014).
248 Handbook of Industry 4.0 and SMART Systems
FIGURE 7.5 Different types of wearable technology. (From Rodrigues, J.J. et al., IEEE Access, 6, 13129–13141, 2018.)
FIGURE 7.6 Wearable gloves. (Form Open source arduino UNO somatosensory wearable Robot Gloves, https://www.
bidorbuy.co.za/item/366104069/Open_Source_Arduino_UNO_Somatosensory_Wearable_Robot_Gloves.html, 2018.)
surroundings. Wearable computers provide constant computer and user interaction. In extreme cases, they
serve much like a prosthetic, in that device use does not require users to cease other activities.
Wearable computers designed for commercial use may provide:
In 1961, mathematician Edward O. Thorp designed the first modern-day wearable computer as an analog
computer used to predict roulette wheels. During the 1970s, other prototypes were created, including the
CMOS 6502 microprocessor, which was a shoe computer used for radio communications between data
gatherers and gamblers. A camera-to-tactile vest for the blind and Hewlett-Packard’s algebraic calculator
watch were also invented in this decade.
The 1980s delivered bicycles with onboard computers. Later, electronic notebooks, keyboards and
other belt-attached devices were developed. Over the years, many other wearable computing products
have been marketed, but few have been adopted on a widespread level.
In 2002, Kevin Warwick’s Project Cyborg crossed the line of wearable into the realm of implanted
devices, which monitored or were activated by the human nervous system.
Wearable computer technology has many benefits but raises some concerns, including:
The HX2, shown in Figure 7.8, is an example of a wearable computer. It is designed for a fast high-volume
picking environment; it is voice-directed, using voice recognition technology (HX2 Wearable Computer,
https://www.varinsights.com/doc/hx2-wearable-computer-0002).
FIGURE 7.9 Wearable device integration. (From Wearable devices integration, http://techno-soft.com/devices-and-
wearables.html.)
OPERATOR 4.0 251
7.3.2.2 Speech
Wearables often use voice as the main or supporting communication tool with the user. A sports wear-
able headset can have many different lines recorded with a virtual coach. This coach does a few things,
including prompting the user to take a drink, responding when she asks for her heart rate, and telling her
how far she has run. The coach requires a database of sentences to be created so that it understands what
the user is saying. This database requires different considerations.
Some sentences may be too long for a runner to reasonably say during exercise, as it interferes with
his breathing. This may prove more difficult in different languages as word and sentence lengths vary.
The same commands could be spoken in different ways. “What is my heart rate?” and “What is my
bpm?” would prompt the same answer. Different languages might have more ways to say the same thing.
These variations make ranking voice commands an important part of the localization and voice data
collection process. For example, “What is my heart rate?” would hold a higher rank than “How fast is
my heart beating?” Both would lead to the same answer, but the first would be a more common way to
ask. A user-friendly device requires much research and development to get this interaction right. Does a
device have a persona? Can that persona be used in both China and Canada?
FIGURE 7.10 Application areas and product categories for wearables. (From Application areas and product categories for
wearables, http://www.beechamresearch.com/article.aspx?id=20.)
FIGURE 7.11 Integrated application of GIS. (From Geographic Information Systems [GIS], http://www.powersystem.org/
mapping-and-gis.)
and dependent on a reliable GIS, including field design or staking, outage management systems, outage
management prediction, line personnel maps, system planning, electric system modeling, inventory sys-
tems, asset accounting and others (see Figure 7.11). On the other hand, Figure 7.12 shows the real-world
overview: GIS world model.
FIGURE 7.12 Real-world overview: GIS world model. (From Geographic Information System [GIS] Mapping, https://
www.balchspringslibrary.org/news-events/lib-cal/geographic-information-system-gis-mapping.)
FIGURE 7.13 Three core segments of a GPS. (Image adapted from Hinch, S.W., Outdoor Navigation with GPS,
Wilderness Press Keen Communications, Birmingham, AL, 2010.)
and a message on navigation (i.e., position and direction). The carrier frequency described as the two
sine waves and the digital codes help measure the distance between the GPS receiver and the trans-
mitting satellites. The navigation message compliments the tracking system by providing information
on the exact location of a satellite based on timing. The movement of the space segment involves a
circular orbit of a GPS, each one taking approximately 11 hours and 1 minute. Each orbital plane is
positioned at a 55° tilt to the Earth’s equator. To visualize this system, no less than six satellites are
always within electromagnetic transmission (i.e., line of sight) aided by a transmitting antenna and a
receiving antenna.
By determining the position of the receiver, a display map is presented, along with information about
direction, speed and position of the moving object. Figure 7.14a–c demonstrates exactly how the user
segment works as part of a GPS network.
256 Handbook of Industry 4.0 and SMART Systems
Satellite 1
Distance from
Satellite 1
(a)
Satellite 1
Distance from
Satellite 1
Satellite 2
Distance from
Satellite 2
(b)
Satellite 3
Distance from
Satellite 3
Satellite 1
Distance from
Satellite 1
Satellite 2
Distance from
Satellite 2
(c)
FIGURE 7.14 Application of a GPS receiver to identify the position of a moving object. (a) One satellite will only provide
limited information about the position of a moving object within a certain circumference. (b) Application of two satellites
will help to map out a precise location of a moving object because the receiver can only be in one of two predicted locations
within an area. (c) By measuring the distance to three individual satellites, the GPS can provide information on the exact
location of a moving object from all the three satellites. (Image adapted from Hinch, S.W., Outdoor Navigation with GPS,
Wilderness Press Keen Communications, Birmingham, AL, 2010.)
OPERATOR 4.0 257
FIGURE 7.17 RFID in laundry automation. (Form Fujitsu UHF RFID tag adopted by shinkansai linen supply in their linen
supply system: First case of implementation in Japan’s textile rental industry, http://www.fujitsu.com/jp/group/frontech/en/
resources/news/press-releases/2011/0216.html, 2011.)
FIGURE 7.18 RFID in defense. (From Department of Defense Radio Frequency Identification [RFID], https://www.
slideshare.net/PeterSam67/department-of-defense-radio-frequency-identification-rfid.)
FIGURE 7.19 Use of RFID tags in apparel manufacturing. (From RFID: Has its time finally come for retail? https://www.
fungglobalretailtech.com/research/rfid-time-finally-come-retail/.)
260 Handbook of Industry 4.0 and SMART Systems
FIGURE 7.20 RFID-based asset tracking solutions. (Wireless case study: How cisco tracks RFID with active RFID and
Wireless LANs, https://www.cisco.com/c/en/us/about/cisco-on-cisco/enterprise-networks/wireless-rfid-asset-tracking-web.
html.)
FIGURE 7.21 Real-life example of integrated production, packaging, warehousing and shipping, using scanning to
track processes and direct steps. (From Further automate processes and synchronize manufacturing operations with
DELMIA apriso RFID, http://www.apriso.com/products/machine_integrator/rfid.php.)
OPERATOR 4.0 261
Detecon of
relocaons
Documents not
Posion Informaon
to be taken out
Tracking
DTS
RFID tags Documents not
RFID Tag Reader to be copied
Invesgaon tracking
Administrator
Server
Document
History
SHELF ANTI-THEFT
BOOK DROP
MANAGEMENT DETECTION
FIGURE 7.23 Library RFID management system. (From RFID library system for schools, http://schoolpixa.com/rfid/library.)
262 Handbook of Industry 4.0 and SMART Systems
FIGURE 7.24 Integrated traceability system for agricultural products. (From Sugahara, K., Traceability system for
agricultural products based on RFID and mobile technology, http://www.fftc.agnet.org/library.php?func=view
&id=20110721154120& type_id=2, 2007.)
The use of RFID technology in agriculture can be extended beyond an individual farm and an indi-
vidual farmer. Figure 7.24 shows the concept of an integrated traceability system for agricultural products
to record and store data on the production and distribution processes using RFID and network computing
(Sugahara, 2007).
7.4.1.2 Smartwatch
In May 2016, the Tata Group announced that it had doubled its number of published patents over two
years, from about 3,500 at the end of 2013 to 7,000 at the end of 2015. Some of these relate to wearables
and, in particular, a smartwatch for factory workers. This has a two-way alarm so that the wearer can
notify or be warned of dangerous situations at the push of a button. It has sensors that monitor health and
environmental risks, such as heart rate and the presence of noxious gases. The watches are being piloted
by crane operators at Tata Steel in Jamshedpur, India, and the company has identified several thousand of
its workers who could benefit from the wearable in the future (see Figure 7.27).
FIGURE 7.26 Devices for employee safety. (From Twentyman, J., Wearable devices aim to reduce workplace accidents,
https://www.ft.com/content/d0bfea5c-f820-11e5-96db-fc683b5e52db, 2016.)
264 Handbook of Industry 4.0 and SMART Systems
FIGURE 7.27 Smartwatch.
FIGURE 7.28 Connected worker technology. (From Twentyman, J., Wearable devices aim to reduce workplace
accidents, https://www.ft.com/content/d0bfea5c-f820-11e5-96db-fc683b5e52db, 2016.)
OPERATOR 4.0 265
FIGURE 7.30 Virtual reality training. (From Twentyman, J., Wearable devices aim to reduce workplace accidents,
https://www.ft.com/content/d0bfea5c-f820-11e5-96db-fc683b5e52db, 2016.)
266 Handbook of Industry 4.0 and SMART Systems
• Light sensors (see Figure 7.31a) that can be used to detect light are widespread in scientific
applications and everyday consumer products; these include motion light sensors, ambient light
sensors, outside lights, security lights and traffic light sensors.
• Sound sensors or microphones (see Figure 7.31b) are employed to determine the sound inten-
sity of an environment. They come in multiple forms, including condensers, ribbons, carbon
and dynamic microphones (Wearable Devices Integration, http://techno-soft.com/devices-and-
wearables.html; Wild and Hinckley, 2008). The most common type is a dynamic microphone
that measures noise levels in decibels at frequencies to which humans are sensitive.
• A humidity sensor (see Figure 7.31c) measures the relative humidity in the air for use in mois-
ture and temperature measurements (Application areas and product categories for wearables,
http://www.beechamresearch.com/article.aspx?id=20; Yeo et al., 2008). These are sometimes
referred to as humidity or dew sensors, and can be found in heating, ventilation or air condition-
ing systems in buildings.
• Flame sensors (see Figure 7.31d) are used to detect open flames or fire and are more sensitive
and accurate than commonly used smoke or heat detectors. Fume sensors (see Figure 7.31e)
perform a similar function in detecting smoke, alcohol and other harmful airborne gases.
7.4.2.2 Biosensors
The scope of biosensors has expanded with the increasing demand for health monitoring. These sensors
allow people to be aware of their health status at all times and are used by health care professionals in the
early diagnosis and prevention of disease (Bonsor, 2018; Geographic Information Systems (GIS), http://
www.powersystem.org/mapping-and-gis; Monošík et al., 2012; Wang, 2006). Examples include body
temperature sensors, heart-rate monitoring sensors, ECG, electroencephalography, electromyography
sensors, blood pressure sensors and glucose level sensors.
A heart-rate monitoring module (Figure 7.32a) can be used to measure the electrical activity of the heart
and is intended for use in extracting, amplifying and filtering biopotential signals to generate the heart
rate (Geographic Information System (GIS) Mapping, https://www.balchspringslibrary.org/news-events/
lib-cal/geographic-information-system-gis-mapping; Wang et al., 2010). Typically, heart monitors require
the use of biomedical sensor pads and cables. The finger-clip heart rate sensor shown in Figure 7.32b is a
high-performance optical biosensor that measures the change in the movement of blood in the body.
FIGURE 7.31 Environmental sensors: (a) light sensor; (b) sound sensor; (c) humidity sensor; (d) flame sensor; (e) fume
sensor.
OPERATOR 4.0 267
FIGURE 7.32 Optical biosensors: (a) electrocardiogram (ECG) heart-monitoring sensor; (b) finger-clip heart rate sensor.
Biosensors are also common in medical electronics intended for indoor use to monitor the patient’s
health (Fletcher and Kulkarni, 2010; Kaur, 2012).
FIGURE 7.33 Location-tracking sensors: (a) global positioning system (GPS) module; (b) six-axis accelerometer and
compass; (c) digital compass.
268 Handbook of Industry 4.0 and SMART Systems
Another common type of inertial sensor is an accelerometer, which has an extended range of sensing
capability. They are available in one-, two-, three-, or six-axis implementations (see Figure 7.33c), and
have high capability in fall detection and safety management applications.
80
Fashion & other
70
Market Suizo/USD billions
Opcal Sensor
Stretch and
Pressure Sensors
FIGURE 7.35 Relative healthcare market size by wearable sensor type in 2020. (From IDTechEx, http://www.idtechex.
com/research/reports/wearable-technology-2016-2026-000483.asp, 2015.)
Other 12.6%
FIGURE 7.36 Compound annual growth rate (CAGR) by sensor type: 10 year forecast (2015–2025). (From IDTechEx,
http://www.idtechex.com/research/reports/wearable-technology-2016-2026-000483.asp, 2015.)
Most sensors used in wearables today are an adaptation of sensors deployed in automotive or mobile
devices. However, with new properties such as flexibility and washability becoming important, further
sensor developments will be needed. Chemical sensors are expected to take the largest share of this
new market, but the fastest growth is expected in the emerging stretch and pressure sensors, planned to
be used in motion detection and health care monitoring (Smart Wearables: Reflection and Orientation
Paper, http://ec.europa.eu/newsroom/document.cfm?doc_id=40542).
Research and development efforts in the area of wearables are thus essential to unlock innovation and
bring the “next generation wearables” to consumers and professional users. Multidisciplinary research
and development in enabling technologies (e.g., sensors, materials, energy storage and management,
smart system integration) and in other areas such as microfluidics and micro-nano-bio systems are
needed.
Advances in organic electronics on flexible displays and sensors will allow devices to conform to our
bodies and our clothes. This will solve major design restrictions by reducing the space required for dis-
plays in devices given their thin structure.
Future wearables will have to be shapeable, stretchable and washable or cleanable on-demand, e.g., in
the case of textile and clothing (a wearable should indeed look like natural clothing because of comfort,
breathability and washability). Automated production techniques need to be developed to directly inte-
grate electronics into the yarn during the production of smart textiles.
Experimentation and testing in a real-world environment are needed when developing and validating
the use-cases. Ecosystem building activities (e.g., bringing together the textile and electronic communi-
ties or fashion industry) can address issues such as the compatibility of manufacturing practices or design,
which have an impact on cost and conformability of final products (Smart Wearables: Reflection and
Orientation Paper, http://ec.europa.eu/newsroom/document.cfm?doc_id=40542).
FIGURE 7.37 History of cobots. (From Universal Robots. History of COBOTS. https://www.universal-robots.com/about-
universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/.)
• Collaborative: Cobot and operator work together to complete the assigned tasks
(Østergaard, The role of cobots in industry 4.0, https://cdn2.hubspot.net/hubfs/2631781/
HQ%20Content%20and%20Enablers/HQ%20Enablers/White%20papers/The%20role%20of%
20cobots%20in%20industry.pdf).
• Easy to program: No programming expertise is needed to set up and operate cobots quickly.
Often, these simply plug and play or are easily programmed through a tablet or by adjusting
the cobot’s arms.
272 Handbook of Industry 4.0 and SMART Systems
• Fast to set up: Unlike traditional industrial robots that take weeks to be operational, the setup
time for most cobots is just a few hours.
• Flexible: Traditional robots are often bolted to the floor and deployed for a particular applica-
tion. Cobots are flexible and mobile; they don’t require much space and can be redeployed very
easily to support new and multiple applications.
• Safe: Cobots don’t need safety cages to keep your human workforce safe on the job when they
are working. They can sense obstacles and adjust their speed or reverse to avoid crashing into
humans (or other obstacles) (Marr, 2018).
• Ford Fiesta plant: In Cologne, Germany, Ford factory workers and cobots are working
together on its assembly lines to install shock absorbers on cars (Marr, 2018). The cobots
and humans team up for accuracy, strength and dexterity. Cobots are used to lift and posi-
tion shock absorbers into a wheel arch. A button is pushed to complete the installation
(see Figure 7.38).
• The cobots, developed by German robot manufacturer KUKA Roboter GmbH, are a bit more
than three feet high and work with workers at two stations. They stop immediately if their sen-
sors detect an arm or finger in the path. To date, the cobots are deployed at two work stations
and are being evaluated on an ongoing basis (Dignan, 2016).
OPERATOR 4.0 273
FIGURE 7.38 Collaborative robot working with a human to install shock absorbers in a Ford Fiesta (Image: Ford).
(From Dignan, L., Ford tests collaborative robots in German Ford Fiesta plant, https://www.zdnet.com/article/ford-tests-
collaborative-robots-in-german-ford-fiesta-plant/, 2016.)
• Amazon fulfillment center: Cobots bring shelves of merchandise to Amazon associates to pre-
pare for shipment. It currently takes 15 minutes to complete an order that used to take an hour
(Marr, 2018). The cobots lift the towers using a large black cylinder that can handle a serious
amount of weight and which locks onto the shelves using a corkscrew action. They navigate
by following barcodes stuck to the warehouse floor and have a front-mounted camera that
ensures they don’t collide with each other. They pause for five minutes of recharging every
hour and get their instructions from software that runs on a cloud server.
• The introduction of cobots to Amazon warehouses in the United States and Europe has
released huge amounts of space once taken up by the storage facilities built around people.
It has also considerably trimmed the time it takes to complete an order. In the very near
future, when Amazon customers receive a package from a center such as this, its prepara-
tion will have involved no more than a minute of human work. Amazon is by no means
alone in its use of cobots to save both time and space (Harris, 2017). Amazon cobots are
shown in Figures 7.39 and 7.40.
• Online supermarket Ocado: Similar to how Amazon uses cobots, the human pickers who fill
orders stay in one place, while the cobots move around to get products (see Figure 7.41).
As well as its own brand, Ocado manages orders for Waitrose and Morrisons. Most online shopping is
still based on distribution centers such as a conventional supermarket; thus, workers pace up and down
endless aisles and fill trolleys. Here, things could not be more different. The systems that run the center
have been in operation since 2012 and, as with Amazon, have steadily moved toward a model in which
human “pickers” stay put, and machines move everything around.
In partnership with a British firm called Oxbotica, Ocado has tested driverless delivery vans, and together
with Disney Corporation, the company is involved in robotics work aimed at approximating the dexterity
of the human hand—trying to crack the same problem Amazon has: how to automate the job of picking,
particularly fruit and vegetables, without causing damage. Its robotics teams are working on a suction-
based picking robot that can move cans, boxes and other products with a uniform shape. It uses a camera
to look into the bin and figure out what and where to pick, and then where to place it (Harris, 2017).
Companies are turning to technology to compete in response to shrinking labor pools as baby boomers
retire, and labor costs increase. Cobots manufactured by companies such as Rethink Robotics, Kuka and
Universal Robots hope to provide solutions to these labor and cost concerns. We can only expect interest
in cobots to continue as the new reality of humans working alongside robotic colleagues becomes the
standard for better performance.
274 Handbook of Industry 4.0 and SMART Systems
FIGURE 7.39 Amazon cobot. Photograph: Ben Quinton. (From Harris, J., Meet your new cobot: Is a machine coming
for your job? https://www.theguardian.com/money/2017/nov/25/cobot-machine-coming-job-robots-amazon-ocado, 2017.)
FIGURE 7.40 Cobots moving shelves at Amazon’s fulfillment center in Manchester. Photograph: Ben Quinton. (From
Harris, J., Meet your new cobot: Is a machine coming for your job? https://www.theguardian.com/money/2017/nov/25/
cobot-machine-coming-job-robots-amazon-ocado, 2017.)
OPERATOR 4.0 275
FIGURE 7.41 Ocado’s automated Hatfield HQ. Photograph: Ben Quinton for the Guardian. (From Harris, J., Meet your
new cobot: Is a machine coming for your job? https://www.theguardian.com/money/2017/nov/25/cobot-machine-coming-
job-robots-amazon-ocado, 2017.)
FIGURE 7.42 Robo Packer: an integrated module with a six-axis arm. (From Kavanaugh, C., Proco to show cobots
for packaging, palletizing, http://www.plasticsnews.com/article/20180423/NEWS/180429970/proco-to-show-cobots-for-
packaging-palletizing, 2018.)
FIGURE 7.43 Cobot palletizing a handling unit with its respective packaging units. (From Milk crate palletizer, http://
www.robovic.com/en/palletizing/milk-crate-palletizer/.)
OPERATOR 4.0 277
FIGURE 7.44 CAD of welding cobot. (From Generate Robot Welding & Cutting Code from CAD/CAM, http://www.
fabricatingandmetalworking.com/2015/10/generate-robot-welding-cutting-code-from-cadcam/, 2015.)
To give an example of how useful cobots can be, traditional welding robot systems require expertise
in robot programming and welding techniques (see Figure 7.44). A benefit of many cobot systems is the
ease of programming either through place and position record methods or traditional computer-aided
manufacturing (CAD) or CAM programming, easing the robotic programming and allowing anyone
with welding experience to program a cobot (Gonzalez, 2018).
FIGURE 7.45 CAD model of component inspection. (From Universal Robots, How cobots are changing quality assur-
ance in manufacturing, http://en.ict.com.hk/newsdetails/113.htm, 2016.)
7.6.1.4 Clients
At the end of each manufacturing process, there is a client or a group of clients. Marketing and business
development specialists evaluate the expectations and requirements of clients and report that back to the
manufacturing place. In Industry 4.0, data collection is automatized and analysis is performed by com-
puter algorithms created by system designers (Kinzel, 2016).
1. Fundamental physiological needs (e.g., food, air, water, shelter from the elements, sexuality);
2. Safety and security needs (stability, protection, order);
3. Love and belongingness needs (love, belongingness, affection);
4. Esteem needs (self-respect, esteem of others, prestige);
280 Handbook of Industry 4.0 and SMART Systems
The Maslow hierarchy of needs is often depicted as a pyramid (see Figure 7.46) (Kinzel, 2016).
FIGURE 7.46 Maslow motivational model. (From Kelly J., Maslow’s motivation model, http://thepeakperformancecenter.
com/educational-learning/learning/principles-of-learning/maslows-hierarchy-needs/, 2014.)
OPERATOR 4.0 281
It does not matter if this individual is a member of the design team, a member of the operating team or
someone who is in any other way influenced by the system. The point is that a person must feel some kind
of ownership in the complex system and understand the design concept. The designers of any system in
Industry 4.0 need to consider this desire to be involved. Involvement creates ownership and acceptance.
Without this acceptance, the system will fail (Kinzel, 2016).
7.6.3.1 Mediation
Mediation is a well-established method to resolve conflicts. It is a structured process in which an inde-
pendent third party, the mediator, assists two or more conflicting parties to identify the cause of their
conflict and to develop and agree on a solution. The mediator will establish communication between
the conflicting parties and guide them through a number of phases. The parties must start an open and
preferably creative conflict solution dialog. They need to be able to listen to the other side and understand
the requirements and needs of their opponent (Kessen and Troja, 2009).
The process of mediation can generally be divided into the following phases (Kracht, 2009):
Arguably, the most important step is the transition between the positions of the conflicting parties to the needs
of the parties. If the underlying needs driving the positions of the conflicting parties have been expressed and
have been understood by the other party, this leads to the solution finding phase (Kinzel, 2016).
7.6.3.2 Mediators
The style and personality of the mediator are a key factor. In an ideal world, the mediator is completely neu-
tral, and he or she is just conducting the communication process. In the real world, the mediator often helps
to overcome obstacles in the solution finding process and even expresses his or her own opinion on a possible
way to success, especially when asked by the conflicting parties. However, it is important that the mediating
person stays neutral and impartial, an “all-party” mediator who valued the interests of all parties and the
mediation process itself. The mediator should never have the power to enforce a solution. The agreement on
how to solve the conflict is the sole responsibility of the conflicting parties (Kinzel, 2016).
The various parties can express their needs, develop joint solutions and thus eventually claim ownership
in the new system(s).
REFERENCES
Accelerating the Path to Industry 4.0, http://www.analog.com/en/applications/markets/industrial-automation-
technology-pavilion-home/industry-4-pt-0.html.
Alesky M., Vartiainen E., Domova V., and Naedele M., Augmented reality for improved service delivery,
Proceedings of the IEEE 28th International Conference Advanced Information Networking and
Applications, 382–389, 2014.
Azuma, 1997. http://www.dtic.mil/dtic/tr/fulltext/u2/a606245.pdf.
Baek J., Choi Y., Lee C., Suh J., and Lee S., BBUNS: Bluetooth beacon-based underground navigation system
to support mine haulage operations, Minerals, 7, 228, 2017.
Benko H., Ofek E., Zheng F., and Wilson A. D., FoveAR: Combining an optically see-through near-eye
display with projector-based spatial augmented reality, Proceedings of 28th Annual ACM Symposium
User Interface Software Technology (UIST), 129–135, 2015.
Bonsor K., How Location Tracking Works, 2018. https://electronics.howstuffworks.com/everyday-tech/
location-tracking1.htm.
Chatterjee A., Aceves A., Dungca R., Flores H., and Giddens K., Classification of wearable computing: A sur-
vey of electronic assistive technology and future design, Proceedings of the 2016 Second International
Conference on Research in Computational Intelligence and Communication Networks (ICRCICN),
Kolkata, India, 22–27, 2016.
Curtis D., Several devils in the details: Making an AR application work in the airplane factory, Proceedings
Int’l Workshop Augmented Reality (IWAR 98), A.K. Peters, Natick, MA, 47–60, 1998.
OPERATOR 4.0 283
Dignan L., Ford tests collaborative robots in German ford fiesta plant, 2016. https://www.zdnet.com/article/
ford-tests-collaborative-robots-in-german-ford-fiesta-plant/.
Edwards P., and Ramirez P., When should workers embrace or resist new technology? New Technology, Work
and Employment, 31, 99–113, 2016.
Fletcher R. R., and Kulkarni S., Clip-on wireless wearable microwave sensor for ambulatory cardiac monitor-
ing, Proceedings of the 2010 Annual International Conference of the IEEE Engineering in Medicine
and Biology Society, EMBC’10, Buenos Aires, Argentina, 365–369, 2010.
Frigo M. A., da Silva E. C. C., and Barbosa G. F., Augmented reality in aerospace manufacturing: A review,
Journal of Industrial Intelligent Information, 4(2), 125–130, 2016.
Fujitsu UHF RFID tag adopted by shinkansai linen supply in their linen supply system: First case of implemen-
tation in Japan’s textile rental industry, 2011. http://www.fujitsu.com/jp/group/frontech/en/resources/
news/press-releases/2011/0216.html.
Generate Robot Welding & Cutting Code from CAD/CAM, 2015. http://www.fabricatingandmetalworking.
com/2015/10/generate-robot-welding-cutting-code-from-cadcam/.
Gonzalez C., 7 common applications for cobots, 2018. https://www.machinedesign.com/motion-control/7-
common-applications-cobots.
Harris J., Meet your new cobot: Is a machine coming for your job? 2017. https://www.theguardian.com/
money/2017/nov/25/cobot-machine-coming-job-robots-amazon-ocado.
Healthcare Technology, Top 5 Gamechanger Wearable devices in healthcare, 2016. http://triotree.com/blog/
top-5-gamechanger-wearable-devices-in-healthcare/.
Henderson S., and Feiner S., Exploring the benefits of augmented reality documentation for maintenance and
repair, IEEE Transactions on Visualization and Computer Graphics, 17(10), 1355–1368, 2011.
Hinch S. W., Outdoor Navigation with GPS, Wilderness Press Keen Communications, Birmingham, UK,
2010.
Hořejší P., Augmented reality system for virtual training of parts assembly, Proceedings 25th DAAAM
International Symposium on Intelligence Manufacturing Automation (DAAAM), 100, 699–706, 2015.
Johnson L., GPS in mining, Mining Magazine, 178, 387–389, 1998.
Jones K. W., Environmental sensors, in Sensors Set: A Comprehensive Survey (W. Göpel, J. Hesse, J. N. Zemel
eds. Vol. 8, pp. 451–489), Weinheim, Germany, 2008.
Kaur K., Understanding the global positioning system, 2012. https://www.azosensors.com/article.aspx?
ArticleID=29.
Kavanaugh C., Proco to show cobots for packaging, palletizing, 2018. http://www.plasticsnews.com/
article/20180423/NEWS/180429970/proco-to-show-cobots-for-packaging-palletizing.
Kelly J., Maslow’s motivation model, 2014. http://thepeakperformancecenter.com/educational-learning/
learning/principles-of-learning/maslows-hierarchy-needs/.
Kelly and Zack Weinersmith, 2017. https://ieeexplore.ieee.org/document/8298525. Accessed October 2, 2018.
Kessen S., and Troja M., Die Phasen und Schritte der Mediation als Kommunikationsprozess, in Handbuch
Mediation (F. Haft and K. G. von Schlieffen ed., pp. 293–319), Verlag C.H. Beck, München, Germany,
2009.
Kinzel H., Digitalisierung der Öl- und Gas-Industrie einmal anders: Die Analyse einer Literaturdatenbank
gibt Aufschlüsse über das kollektive Sicherheitsbewusstsein unserer Industrie, DGMK/ÖGEW-
Frühjahrstagung, Fachbereich Aufsuchung und Gewinnung, Celle, Germany, 2016.
Kracht S., Rolle und Aufgabe des Mediators—Prinzipien der Mediation, in Handbuch Mediation (F. Haft and
K. G. von Schlieffen ed., pp. 267–292), Verlag C.H. Beck, München, Germany, 2009.
Kramer B., and Zimolong B., Führungsverantwortung für die Arbeitssicherheit in sozioökonomischen
Systemen, Beiträge zur Mensch-Maschine-Systemtechnik aus Forschung und Praxis: Festschrift für
Klaus-Peter Timpe, Düsseldorf, Germany, Symposium, pp. 367–386, 2005.
Kung H. T., and Vlah D., Efficient location tracking using sensor networks, Proceedings of the 2003 IEEE
Wireless Communications and Networking, New Orleans, LA, 3, 1954–1961, 2003.
Liu X., Biagioni J., Eriksson J., Wang Y., Forman G., and Zhu Y., Mining large-scale, sparse GPS traces
for map inference. Proceedings of the 18th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining—KDD’12, Beijing, China, 669, 2012.
Loch F., Quint F., and Brishtel I., Comparing video and augmented reality assistance in manual assembly,
Proceedings of the 12th International Conference on Intelligence Environmental (IE), 147–150, 2016.
284 Handbook of Industry 4.0 and SMART Systems
Mardonova M., and Choi Y., Review of wearable device technology and its applications to the mining indus-
try, 2018. https://www.mdpi.com/1996-1073/11/3/547/htm.
Marr B., The future of work: Are you ready for smart cobots? https://www.forbes.com/sites/bernard-
marr/2018/08/29/the-future-of-work-are-you-ready-for-smart-cobots/#39849dad522b.
Maslow A. H., A theory of human motivation, Psychological Review, 50(1943), 370–396, Motivation and
personality, Harper and Row, New York, 1970.
Milk Crate Palletizer, http://www.robovic.com/en/palletizing/milk-crate-palletizer/.
Moloney J., Augmented reality visualisation of the built environment to support design decision making,
Proceedings of 20th International Conference on Information Visualization, 687–692, 2006.
Monošík R., Stred’anský M., and Šturdík E., Biosensors: Classification, characterization and new trends, Acta
Chimica Slovenica, 5, 109–120, 2012.
Naik H., Tombari F., Resch C., Keitler P., and Navab N., A step closer to reality: Closed loop dynamic registra-
tion correction in sar, Proceedings IEEE International Symposium on Mixed and Augmented Reality,
112–115, 2015.
Navab N., Bascle B., Appel M., and Cubillo E., Scene augmentation via the fusion of industrial drawings and
uncalibrated images with a view to markerless calibration, Proceedings 2nd Int’l Workshop Augmented
Reality (IWAR 99), IEEE CS Press, Los Alamitos, CA, 125–133, 1999.
Nee A., Ong S., Chryssolouris G., and Mourtzis D., Augmented reality applications in design and manu-
facturing, CIRP Annals, 61(2), 657–679, 2012, http://www.sciencedirect.com/science/article/pii/
S0007850612002090.
Ong S. K., Yuan M. L., and Nee A. Y. C., Augmented reality applications in manufacturing: A survey,
International Journal of Production Research, 46(10), 2707–2742, 2008.
Open Source Arduino UNO Somatosensory Wearable Robot Gloves, 2018. https://www.bidorbuy.co.za/
item/366104069/Open_Source_Arduino_UNO_Somatosensory_Wearable_Robot_Gloves.html.
Park K., Shin H., and Cha H., Smartphone-based pedestrian tracking in indoor corridor environments,
Personal and Ubiquitous Computing, 17, 359–370, 2013.
Peshkin M. A., Colgate J. E., Wannasuphoprasit W., Moore C. A., Gillespie R. B., and Akella P., Cobot archi-
tecture, IEEE Transactions on Robotics and Automation, 17(4), 377–390, 2001.
Qi Y., 3D modeling and augmented reality, Proceedings of 4th International Universal Communication
Symposium, 185–192, 2010.
Reddy K. P. K., Venkitesh B., Varghese A., Narendra N., Chandra G., and Balamuralidhar P., Deformable 3D
cad models in mobile augmented reality for tele-assistance, Proceedings of Asia–Pacific Conference
Multimedia Broadcast, 1–5, 2015.
Rodrigues J. J., Segundo D. B. D. R., Junqueira H. A., Sabino M. H., Prince R. M., Al-Muhtadi J., and
De Albuquerque V. H. C., Enabling technologies for the internet of health things, IEEE Access, 6,
13129–13141, 2018. https://www.researchgate.net/publication/322261039_Enabling_Technologies_
for_the_Internet_of_Health_Things.
Saetren G. B., Hogenboom S., and Laumann K., A study of a technological development process: Human
factors—The forgotten factors? Cognition, Technology & Work, 18(3), 595–611, 2016.
Schneider M., Rambach J., and Stricker D., Augmented reality based on edge computing using the example
of remote live support, Proceedings of 18th Annual International Conference Industrial Technology,
1277–1282, 2017.
Shin C., Park B. H., Jung G. M., and Hong S. H., Mobile augmented reality mashup for future IoT environ-
ment, Proceedings of IEEE UIC-ATC-Scalable Computing, 888–891, 2014.
Smparounis K., Mavrikios D., Pappas M., Xanthakis V., Viganò G. P., and Pentenrieder K., A virtual and
augmented reality approach to collaborative product design and demonstration, Proceedings of IEEE
International Technology Management and Conference (ICE), 1–8, 2008.
Sugahara K., Traceability system for agricultural products based on RFID and mobile technology, 2007.
http://www.fftc.agnet.org/library.php?func=view&id=20110721154120&type_id=2.
Techgrown1, Ekso Bionics, 2014. https://suggest10.wordpress.com/2014/10/24/10-most-technically-advanced-
robots-in-the-world/.
Twentyman J., Wearable devices aim to reduce workplace accidents, 2016. https://www.ft.com/content/
d0bfea5c-f820-11e5-96db-fc683b5e52db.
Universal Robots, History os COBOTS, https://www.universal-robots.com/about-universal-robots/news-centre/
the-history-behind-collaborative-robots-cobots/.
OPERATOR 4.0 285
Universal Robots, How cobots are changing quality assurance in manufacturing, 2016. http://en.ict.com.hk/
newsdetails/113.htm.
Vassell M., Apperson O., Calyam P., Gillis J., and Ahmad S., Intelligent dashboard for augmented reality based
incident command response co-ordination, Proceedings 13th IEEE Annual Consumer Communications
Network Conference (CCNC), 976–979, 2016.
Wahlström N., and Gustafsson F., Magnetometer modeling and validation for tracking metallic targets, IEEE
Transactions Signal Processing, 62, 545–556, 2014.
Wang H., Peng D., Wang W., Sharif H., Chen H. H., and Khoynezhad A., Resource-aware secure ECG health-
care monitoring through body sensor networks, IEEE Wireless Communications, 17, 12–19, 2010.
Wang J., Electrochemical biosensors: Towards point-of-care cancer diagnostics, Biosensors and Bioelectronics,
21, 1887–1892, 2006.
What are RFID Applications and Uses in Real Business World? 2016. https://www.ruddersoft.com/blog/
rfid-applications-and-uses-in-real-business-world/6.
Wild G., and Hinckley S., Acousto-ultrasonic optical fiber sensors: Overview and state-of-the-art, IEEE
Sensors Journal, 8, 1184–1193, 2008.
Wireless router connectivity, 2011. http://cromwellitsolutions.com/?attachment_id=72.
Wuest H., Engekle T., Wientapper F., Schmitt F., and Keil J., From cad to 3D tracking: Enhancing scaling
model-based tracking for industrial appliances, Proceedings IEEE International Symposium on Mixed
and Augmented Reality, 346–347, 2016.
Yeo T. L., Sun T., and Grattan K. T. V., Fibre-optic sensor technologies for humidity and moisture measure-
ment. Sensors and Actuators A Physical, 144, 280–295, 2008.
Yin P., Ye M., Lee W. C., and Li Z., Mining GPS data for trajectory recommendation. In Lecture Notes in
Computer Science; Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics, Springer, Cham, Switzerland, Vol. 8444 (LNAI), pp. 50–61, 2014.
Yun X., and Bachmann E. R., Design, implementation, and experimental results of a quaternion-based Kalman
filter for human body motion tracking, IEEE Transactions Robotics, 22, 1216–1227, 2006.
Zheng Y., Zhang L., Xie X., and Ma W.-Y., Mining interesting locations and travel sequences from GPS tra-
jectories, Proceedings of the 18th International Conference on World Wide Web—WWW’09, Madrid,
Spain, 791, 2009.
Zhou H., Stone T., Hu H., and Harris N., Use of multiple wearable inertial sensors in upper limb motion track-
ing, Medical Engineering & Physics, 30, 123–133, 2008.
Zollmann S., Hoppe C., Kluckner S., Poglitsch C., Bischof H., and Reitmayr G., Augmented reality for con-
struction site monitoring and documentation, The Proceedings of the IEEE, 102(2), 137–154, 2014.
8
Cybersecurity and Risk
CONTENTS
8.1 Cybersecurity in OT...................................................................................................................... 290
8.1.1 OT Security Defined.......................................................................................................... 290
8.1.1.1 Challenges to Implementation.............................................................................291
8.1.2 OT Security Challenges..................................................................................................... 292
8.1.2.1 Security Assessments......................................................................................... 293
8.1.2.2 Security Solutions............................................................................................... 293
8.1.3 Why Is OT Security Important?........................................................................................ 294
8.1.3.1 Critical Infrastructure and Key Resources......................................................... 294
8.1.4 Five Security Recommendations....................................................................................... 296
8.2 Cybersecurity on the IT Level....................................................................................................... 298
8.2.1 Network Security or Cybersecurity in IT.......................................................................... 299
8.2.2 IT Cybersecurity Objectives.............................................................................................. 300
8.2.3 Security Engineering......................................................................................................... 301
8.2.4 Vulnerability and Penetration Testing............................................................................... 302
8.2.5 Intrusion Detection System................................................................................................ 304
8.2.5.1 Firewalls............................................................................................................. 306
8.2.6 Internet Security................................................................................................................. 306
8.2.6.1 HTTPS................................................................................................................ 306
8.2.6.2 SSL Certificates.................................................................................................. 307
8.2.6.3 OAuth 2.0............................................................................................................ 308
8.2.7 Cloud Security.................................................................................................................... 309
8.2.7.1 WebSockets......................................................................................................... 309
8.2.8 Wireless Security............................................................................................................... 309
8.2.9 Endpoint Security................................................................................................................310
8.3 IT-OT Cybersecurity Convergence.................................................................................................310
8.4 Risks and Threats of Sharing Data.................................................................................................312
8.4.1 Threats to Cybersecurity and a Methodology to Address Them........................................312
8.4.2 End-to-End Communications Security...............................................................................313
8.4.3 Possible Network Protection Strategies..............................................................................314
8.4.3.1 Closed Loop Policy Management........................................................................315
8.4.3.2 Uniform Access Management.............................................................................315
8.4.4 Variable Depth Security......................................................................................................316
8.4.4.1 Virtual Local Area Networks (VLANs).............................................................316
8.4.4.2 Firewalls..............................................................................................................317
8.4.4.3 Layer 3 Virtual Private Networks.......................................................................317
8.4.5 Securing Management........................................................................................................317
8.4.5.1 Secure Activity Logs...........................................................................................318
8.4.5.2 Authentication......................................................................................................318
8.4.5.3 Access Control.....................................................................................................318
8.4.5.4 Encryption of Network Management Traffic......................................................319
8.4.5.5 Secure Remote Access for Operators..................................................................319
8.4.5.6 Firewalls..............................................................................................................319
287
288 Handbook of Industry 4.0 and SMART Systems
LIST OF FIGURES
LIST OF TABLES
8.1 Cybersecurity in OT
8.1.1 OT Security Defined
Operational technology (OT) is hardware and software that detects or causes a change through the
direct monitoring and/or control of physical devices, processes and events in the enterprise. OT is
common in industrial control systems (ICS), such as distributed control systems (DCSs) and supervi-
sory control and data acquisition (SCADA) systems (see Figure 8.1). In the world of critical infrastruc-
ture, OT may be used to control power stations or public transportation. As this technology advances
and converges with networked technology, the need for OT security is growing exponentially.
Cybersecurity is a major threat to organizations of all kinds. However, until recently, relatively few
companies considered the potential risk of attacks on their production and manufacturing environments.
Yet, there are serious vulnerabilities, for reasons including the expansion of connectivity in these envi-
ronments or the use of legacy operating systems. Organizations need to act now to protect themselves
and gain competitive advantage in their market.
During the last couple of years, the number of cyber-attacks on the production and manufacturing
environments has grown. In particular, shop floor systems, including DCSs and SCADA systems, have
become primary targets for attacks.
Many organizations have introduced new technology to drive improvements such as production and
supply chain efficiency and asset management. This has led to closer and more open integration between
information technology (IT) and shop floor systems—but the increasing connectivity of previously iso-
lated manufacturing systems, together with a reliance on remote supporting services for operational
maintenance, has introduced new vulnerabilities for cyber-attack. Not only is the number of attacks
growing but also their sophistication.
As OT security becomes a widely discussed topic, the awareness of OT operators is rising, but so is
the knowledge and understanding of the hacker community.
OT environments have very different security requirements, priorities and operational conditions
compared with typical corporate IT networks and systems: they are focused on ensuring product quality
and the continuity of manufacturing processes. OT system vendors are more eager to utilize proven, reli-
able technologies than emerging ones, even if they promise improved security. The security aspect alone
is very rarely a driver to replace a vendor who is offering the most effective manufacturing equipment.
Figure 8.2 shows the share of OT incidents by sectors in 2015.
In many organizations, OT systems have been treated as an integral part of production machinery rather
than computerized information systems; thus, the ultimate responsibility of its operation, including issues of
security, is assigned to manufacturing maintenance teams. In some examples, only the “technology” aspect is
taken into consideration (e.g., protection tools), but the “people aspect” is certainly an equally important issue.
Lack of visibility: Lack of visibility is a problem in industrial environments. Most users are simply
not aware of the full scope of industrial assets connected to their networks. While this is a major issue
from an availability perspective—as it takes much longer for OT to root cause machine downtimes caused
by communication issues—the problem takes on a different dimension when it comes to cybersecurity.
Defining security policies based solely on network attributes such as Internet protocol (IP) and media access
control (MAC) addresses as identifiers is challenging. The enterprise IT world has solved this problem by
enabling security platforms to profile enterprise assets such as phones, tablets, laptops, and printers to get
identity attributes such as device type, make, model, and vendor, and integrating with directory and domain
systems to get contextual information that indicates the “who” and “when” aspects of communication flows.
Friction between IT and OT: When it comes to implementing security on the plant floor, the friction
between IT and OT is often mischaracterized as a problem of “control.” In reality, this has less to do with
control and more with interdependency. In most industries, customers have a centralized IT group respon-
sible for supporting widely distributed industrial control system (ICS) networks such as factories, electric
substations, oils and gas fields, mines and so on. Each of those distributed plant networks is supported by
a dedicated onsite cross-function process control or network OT team. As it stands today, most OT teams
are quickly ramping up on IT networking skills, but still lack expertise in cybersecurity. Thus, any attempt
to implement security at the process network level requires the centralized IT team to deploy the security
infrastructure and maintain security policies. In such a situation, the local OT team is dependent on the
remote IT team to modify security policies on the network to accommodate adds, moves and changes to
industrial endpoints and the control system needed for day-to-day operations. This interdepartmental coor-
dination is not achievable in real-time, and changes to the control systems made by the controls team often
cause security policy violations set by IT, leading to downtime and an unacceptable impact to production.
The solution depends on two factors—visibility and automation Figure 8.3 shows a comparison
between OT and IT.
As a result, nearly 90% of organizations with connected OT infrastructures have experienced a security
breach within their SCADA and ICS architectures. Security concerns include viruses (77%), internal
(73%) or external (70%) hackers, the leakage of sensitive or confidential information (72%) and the lack
of device authentication (67%). Over a third are currently concerned with the exploitation of backdoors
built into connected IoT devices (https://www.csoonline.com/article/3283238/security/resolving-the-
challenges-of-it-ot-convergence.html).
• In-depth visibility: Discovery of current security posture via a comprehensive report and work-
book that maps out the potential risks for each system analyzed;
• Actionable results: Immediate security risk remediation and long-term financial planning and
resource justification with analysis based on leading expertise in the OT security field;
• Enhanced security: Best practices methodologies identify key risks and dictate necessary strat-
egies for overall improved security posture.
• Decreasing the use of commercial off-the-shelf systems that are easier to hack (the cost savings
often aren’t worth the risk);
• Forbidding use of personal devices in control rooms;
• Requiring changes to default passwords on equipment;
• Blocking off USB ports;
• Enforcing rules;
• Implementing stricter pre-employment screening requirements;
• Conducting property inventories and audits on desktops, laptops, removable media, security
tokens and access cards;
• Enhancing access controls for privileged users;
• Offering cybersecurity training programs that encourage dialog—between engineers, con-
tractors and so on.—to raise awareness of cybersecurity risks, including the dangers of
setting up unauthorized Internet connections. Risk is everywhere, but can be reduced by
enabling accountability, implementing least privilege access and regulating sensitive control
and data access.
None of these solutions is easy, but it’s worth the time, effort and justified expense to be safe (Special
Report Cybersecurity).
• First, these systems were originally designed to be stand-alone and air-gapped, so that no out-
side protection was needed.
• They are workhorses that produce products continuously, and so downtime even for mainte-
nance or patching can be difficult.
• Because they can last 30+ years in their life cycle, the equipment or operating systems running
them is often out of date or even obsolete.
The CIKR industry has been slow to adopt newer technologies because its OT systems have been able to
consistently produce an end product that is essential for society for years using their current processes.
Cybersecurity and Risk 295
Whether that product is electricity, pharmaceuticals, chemicals, food and so on, these OT systems have
historically been able to work day in and day out without catastrophic failures. This does not mean that
parts in the system don’t fail at times, but such systems are designed with enough resiliency to absorb
such failures and keep producing their product.
Many of these legacy systems were never designed for cyber protection. Layers of cyber defense pro-
tection can be added to them today, but that comes with a cost, in terms of deployment and engineering,
as well as ongoing operations overhead.
Another approach would be to bake protection into the hardware for continuous coverage. This would
be the best long-term answer and is being investigated. However, given the lifespan of much of the equip-
ment in place, it may take decades for a natural transition to more secure systems to occur. Besides the
risk to interrupting essential services, updating these systems comes at the same sort of expense as for
overlaying security technologies.
Cost is always a factor in making decisions for long-term investment in OT systems, because of their
longevity and their incorporation of legacy systems. One proposal for how to fund the evolution needed
is to pass the costs through to the consumers of the services. This might not be a sustainable solution,
however, because the consumers of the products produced by these OT systems and end devices have
the long-term fixed costs of these resources figured into other expenses. The additional expense of new
technologies, combined with their dramatically shorter lifecycles may quickly become cost-prohibitive.
Some of these costs may not also be able to be passed on to consumers due to laws, regulations and so on.
Achieving consensus by vendors and OT system owners on the cost of protecting OT systems, and how
to fund those changes, has been a struggle for decades.
Until recently, there was no real evidence that there was any need for the kind of baked-in solutions
required to protect these systems against cyber threats. However, with the advent of things such as
STUXNET, SHODAN and the Ukrainian Electrical Distribution and Transmission cyber attacks, along
with other incidents targeting OT systems, the need to protect these systems to maintain the viability
of the digital economy is clear. The immediate need is for security products to protect the CIKRs’ OT
systems from end to end, while enabling secure external access to OT systems where required.
The overall concern for all OT or ICS and SCADA systems is to protect them against all forms of OT
cyber manipulation so that the CIKRs can continue to provide us with the goods and services our modern
society depends upon.
Given the interconnection of the CIKRs, what is the best first step to take in building in protection?
And what is the best strategy for managing the cost to upgrade all these CIKRs to be inherently pro-
tected, especially considering the expected size of that cost?
• The first step of cybersecurity defense protection has to be to segment these networks into
individual lines of control. Such segmentation will protect the different OT environments from
each other, so that in the event that one is compromised, the others can continue to operate.
• The next step is to encrypt messaging to prevent others from seeing communications between
the human–machine interface (HMI), the database and the communication switches at the
remote terminal units or programmable logic controllers (PLCs), then onto the end devices.
Without access to these messages, an attacker is unable to script a malicious software (malware)
message that effectively mimics a real message in order to achieve bad consequences.
• Additional layers of defense that need to be applied can be added a little at a time, such as two-
factor wired and wireless authentication, security information and event management systems,
patch management and so on.
The bottom line for CIKR owners is that a product still has to be produced at the end of the process for sale
to the markets, whether electricity, petrochemical products, natural gas, pharmaceuticals, food products,
water or wastewater treatment. Thus, the return on investment for the cost of such cybersecurity defense pro-
tection upgrades has to be weighed against the costs of not producing the end products for sale to the mar-
kets should a catastrophic cyber event occur. In our digital world, this seems to be more an issue of when and
not if such an event will happen (https://www.fortinet.com/blog/business-and-technology/the-importance-
of-operational-technology-ot-systems-for-a-standard-of-living-in-today-s-modern-society.html).
296 Handbook of Industry 4.0 and SMART Systems
FIGURE 8.4 How the Firewall or Router device separates two network segments. (From http://www.ciberseguridadlogitek.
com/5-recomendaciones-para-el-despliegue-de-redes-ot-seguras-parte/.)
Cybersecurity and Risk 297
A DMZ is an intermediate network created between two other networks through two firewalls.
The information or application that wants to be shared by the users of the main networks is
located in the intermediate network, allowing the required access, but avoiding traffic and
direct access between the two main networks.
Figure 8.6 shows how between the network A or IT (192.168.1.X) and the network B or OT
(193.167.1.X) an intermediate network has been created, the DMZ, with its own range of IP
addresses (202.168.1.Y). In this intermediate network are located the applications and/or infor-
mation that is necessary to be shared by the users of the IT and OT networks (the manufacturing
execution system [MES] solutions or a historian-replicated so that the process data are acces-
sible from IT) or the servers that must be accessible from outside (SCADA Web Server).
5. Incorporate deep packet inspection (DPI) industrial firewalls between SCADA servers
and PLCs to guarantee the security of the process against possible threats and malicious
actions (see Figure 8.7).
Deep packet inspection industrial firewalls are located between SCADA systems and PLCs, guarantee-
ing their safety, and therefore that of the process. The fact that they perform DPI implies that they block
malware built on typically IT protocols. That is, most malware is not built on industrial protocols. By
being able to define specific segmentation rules by industrial protocol (Modbus, Profinet, open platform
communications [OPC], Ethernet/IP, DNP3), they eliminate this traffic.
In addition, they allow segmentation of traffic that does not conform to the “standard” of the selected
industrial protocol and even define segmentation rules for specific function codes of protocols such
as Modbus or Ethernet/IP. For example, if the protocol used is Modbus transmission control protocol
(TCP)/IP, it is possible to define a rule that does not allow a master to execute the “function codes” 05
“write code” and 06 “write register” on a slave (Figure 8.7).
The cyber environment includes the software that runs on computing devices, the stored (also trans-
mitted) information on these devices or information generated by these devices. Installations and build-
ings that house the devices are also part of the cyber environment. Cybersecurity needs to take such
elements into consideration.
Cybersecurity aims at securing the cyber environment, a system that may involve stakeholders that
belong to many public and private organizations, using diverse components and different approaches to
security. As such, it is beneficial to think of cybersecurity in the following sense:
• A collection of policies and actions used to protect connected networks (including, computers,
devices, hardware, stored information and information in transit) from unauthorized access,
modification, theft, disruption, interruption or other threats.
• An ongoing evaluation and monitoring of policies and actions to ensure the continued
quality of security in the face of the changing nature of threats (file:https://www.itu.int/
rec/T-REC-X.1205-200804-I/es).
Network security covers a variety of computer networks, both public and private, used in everyday
jobs, such as conducting transactions and communications among businesses, government agencies and
individuals. Networks can be private, such as within a company, and others, which might be open to public
access. Network security is involved in organizations, enterprises and other types of institutions. It does as
its title explains: it secures the network, as well as protecting and overseeing operations being performed.
Authentication: Network security starts with authentication, commonly with a username and a pass-
word. Because this requires just one detail authenticating the user name—i.e., the password—this is
sometimes termed one-factor authentication. With two-factor authentication, something the user “has”
is also used (e.g., a security token or “dongle,” an ATM card or a mobile phone). With three-factor
authentication, something that the user “is” is also used (e.g., a fingerprint or retinal scan) (https://
en.wikipedia.org/wiki/Network_security).
Firewalls: Once authenticated, a firewall enforces access policies, such as what services are allowed
to be accessed by the network users (A Role-Based Trusted Network Provides Pervasive Security and
Compliance—interview with Jayshree Ullal, senior VP of Cisco). Although effective to prevent unauthor-
ized access, this component may fail to check potentially harmful content, such as computer worms or
Trojans being transmitted over the network. Antivirus software or an intrusion prevention system (IPS)
(Dittrich, 2006) helps detect and inhibit the action of such malware. An anomaly-based intrusion detec-
tion system (IDS) may also monitor the network like Wireshark traffic and may be logged for audit
purposes and for later high-level analysis. Newer systems combining unsupervised machine learning
with full network traffic analysis can detect active network attackers from malicious insiders or targeted
external attackers that have compromised a user machine or account (Dark Reading, 2015).
Encryption: Communication between two hosts using a network may be encrypted to maintain privacy.
Honeypots: These are essentially decoy network-accessible resources. Honeypots may be deployed
in a network as surveillance and early warning tools, as they are not normally accessed for legitimate
purposes. Techniques used by attackers that attempt to compromise these decoy resources are studied
during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to
further tighten the security of the actual network being protected by the honeypot. A honeypot can also
direct an attacker’s attention away from legitimate servers. It encourages attackers to spend their time
and energy on the decoy server while distracting their attention from the data on the real server. Similar
to a honeypot, a honeynet is a network setup with intentional vulnerabilities. Its purpose is also to
invite attacks so that the attacker’s methods can be studied and that information can be used to increase
network security. A honeynet typically contains one or more honeypots (“Honeypots, Honeynets”).
Cybersecurity standards: These techniques intended to protect the cyber environment of a user or orga-
nization generally appear in published documents (“Guidelines for Smart Grid Cyber Security”; http://
www.itu.int/ITU-T/recommendations/rec.aspx?rec=9136). This environment includes users themselves,
networks, devices, all software, processes, information in storage or transit, applications, services and sys-
tems that can be connected directly or indirectly to networks. The principal objective is to reduce the risks,
including prevention or mitigation of cyber attacks. These published materials consist of collections of tools,
policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training,
best practices, assurance and technologies (https://en.wikipedia.org/wiki/Cyber_security_standards).
• Availability;
• Integrity, including authenticity and non-repudiation;
• Confidentiality.
Cybersecurity and Risk 301
IT-Security
Layers:
3. Security Models: Bell LaPadula, Biba, Clark Wilson, Chinese Wall, Role-Based, Object-
Oriented, Resource Allocaon Monitor, etc.
4. Basic Security Idenficaon & Authencaon, Access Control (DAC, MAC), Audit, Object
Funcons: Reuse, Reliability of Service, Anonymisaon, Pseudonymisaon,
Communicaon Security Funcons, etc.
Information technology security can be defined by different layers (Fischer-Hübner, 1995): it can be
defined by the perspective or view, by different security and safety aspects, by models that enforce those
different aspects, by basic security functions used by the models and security mechanisms that imple-
ment these security functions (see Figure 8.9). Security mechanisms can be divided into internal mecha-
nisms enforced by the IT system and external mechanisms implemented outside the system (https://
www.springer.com/gp/book/9783540421429).
Vulnerability testing—checklist:
• Verify the strength of the password as it provides some degree of security.
• Verify the access controls with the operating systems or technology adopted.
• Verify how easily the system can be taken over by online attackers.
• Evaluate the safety level of the data of the system.
• Check if the system configuration and/or application configuration files are protected.
• Check if the system allows users to execute malicious script.
Vulnerability testing—methods:
• Active and passive testing;
• Network and distributed testing;
• Verifying file or system access (https://www.tutorialspoint.com/software_testing_dictionary/
vulnerability_testing.htm).
Vulnerability testing—process:
• Black box testing: Testing from an external network with no prior knowledge of the inter-
nal network and systems.
• White box testing: Testing within the internal network with the knowledge of internal net-
work and system, also called internal testing.
• Grey box testing: Testing from either external or internal networks, with the knowledge of
internal network and system; combines black box testing and white box testing.
3. Gather information about the IT environment such as networks, IP addresses, operating system
version and so on.
4. Detect vulnerabilities: Vulnerability scanners scan the IT environment and identify the
vulnerabilities.
5. Analyze the information on vulnerabilities and devise a plan for penetrating into the network
and systems.
To continue, Figure 8.11 shows the steps in vulnerability testing process, and Figure 8.12 shows steps in
vulnerability assessment:
304 Handbook of Industry 4.0 and SMART Systems
Scope
Informaon Detecon
Vulnerability Detecon
Types of IDS:
• A network intrusion detection system (NIDS) is deployed at a strategic point or points within
the network, where it can monitor inbound and outbound traffic to and from all the devices on
the network.
Cybersecurity and Risk 305
• Host intrusion detection systems run on all computers or devices in the network with direct
access to both the Internet and the enterprise internal network. They have an advantage over
NIDS in that they may be able to detect anomalous network packets that originate from inside
the organization or malicious traffic that a NIDS has failed to detect. They may also be able to
identify malicious traffic that originates from the host itself, as when the host has been infected
with malware and is attempting to spread to other systems.
• Signature-based IDS monitor all the packets traversing the network and compare them against
a database of signatures or attributes of known malicious threats, much like antivirus software.
• Anomaly-based IDSs monitor network traffic and compare it against an established baseline
to determine what is considered normal for the network with respect to bandwidth, protocols,
ports and other devices. This type of IDS alerts administrators to potentially malicious activity.
Historically, IDSs were categorized as passive or active; a passive IDS that detected malicious activity
would generate alert or log entries, but would take no actions. An active IDS, sometimes called an intru-
sion detection and prevention system, would generate alerts and log entries, but could also be configured
to take actions, such as blocking IP addresses or shutting down access to restricted resources.
Snort, one of the most widely used IDS, is an open source, freely available and lightweight NIDS used
to detect emerging threats. It can be compiled on most Unix or Linux operating systems, and a version
is available for Windows as well.
Capabilities of IDS:
• Monitoring the operation of routers, firewalls, key management servers and files needed by
other security controls aimed at detecting, preventing or recovering from cyber attacks;
• Providing administrators a way to tune, organize and understand relevant operating system
audit trails and other logs that are often otherwise difficult to track or parse;
• Providing a user-friendly interface so that non-expert staff members can assist with managing
system security;
• Including an extensive attack signature database against which information from the system
can be matched;
• Recognizing and reporting when the IDS detects that data files have been altered;
• Generating an alarm and notifying that security has been breached;
• Reacting to intruders by blocking them or blocking the server.
Benefits of IDS:
8.2.5.1 Firewalls
In computing, a firewall is a software or firmware that enforces a set of rules about what data packets will
be allowed to enter or leave a network. Firewalls are incorporated into a wide variety of networked devices
to filter traffic and lower the risk that malicious packets traveling over the public Internet can impact the
security of a private network. They may also be purchased as stand-alone software applications.
The term firewall is a metaphor that compares a type of physical barrier that’s put in place to limit
the damage a fire can cause, with a virtual barrier that’s put in place to limit damage from an external
or internal cyberattack. When located at the perimeter of a network, firewalls provide low-level network
protection, as well as important logging and auditing functions.
Types of firewalls:
• Host-based firewalls: installed on individual servers and monitors incoming and outgoing signals.
• Network-based firewalls: can be built into the cloud’s infrastructure or a virtual firewall service.
• Packet-filtering firewalls: examine packets in isolation and do not know the packet’s context.
• Stateful inspection firewalls: examine network traffic to determine whether one packet is
related to another packet.
• Proxy firewalls: inspect packets at the application layer of the Open Systems Interconnection
(OSI) reference model.
• Next-generation firewalls: use a multilayered approach to integrate enterprise firewall capabili-
ties with an IPS and application control.
• Static packet-filtering firewalls: examine packet headers and use rules to make decisions about
what traffic to let through.
When organizations began moving from mainframe computers and dumb clients to the client-server
model, the ability to control access to the server became a priority. Before the first firewalls emerged
based on work in the late 1980s, the only real form of network security was enforced through access
control lists residing on routers. Access control lists specified which IP addresses were granted or denied
access to the network.
The exponential growth of the Internet and the resulting increase in the connectivity of networks meant
that filtering network traffic by IP address alone was no longer enough. Static packet-filtering firewalls
arguably became the most important part of every network security initiative by the end of the last century
(https://searchsecurity.techtarget.com/definition/firewall).
8.2.6.1 HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an Internet communication protocol that protects the
integrity and confidentiality of data between the user’s computer and the site. Users expect a secure and
private online experience when using a website. Hypertext Transfer Protocol Secure can protect users’
connections to a website, regardless of the content on the site.
Data sent using HTTPS are secured via Transport Layer Security (TLS) protocol, which provides
three key layers of protection (Figure 8.13):
Cybersecurity and Risk 307
• Encryption: encrypting the exchanged data to keep it secure from eavesdroppers. That means
that while user is browsing a website, nobody can “listen” to their conversations, track their
activities across multiple pages or steal their information.
• Data integrity: data cannot be modified or corrupted during transfer, intentionally or otherwise,
without being detected.
• Authentication: proves that users communicate with the intended website. It protects against
man-in-the-middle attacks and builds user trust, which translates into other business benefits
(https://support.google.com/webmasters/answer/6073543?hl=en).
The Internet has spawned new global business opportunities for enterprises conducting online com-
merce. However, that growth has also attracted fraudsters and cyber criminals who are ready to exploit
any opportunity to steal consumer bank account numbers and card details. Any moderately skilled
hacker can easily intercept and read the traffic unless the connection between a client (e.g., Internet
browser) and a web server is encrypted.
How Does SSL Work?
The process is the following (see Figure 8.14):
• An end-user asks his or her browser to make a secure connection to a website (e.g., https://www.
example.com).
• The browser obtains the IP address of the site from a DNS server and then requests a secure
connection to the website.
• To initiate this secure connection, the browser requests that the server identifies itself by send-
ing a copy of its SSL certificate to the browser.
• The browser checks the certificate to ensure:
• That it is signed by a trusted CA;
• That it is valid—that it has not expired or been revoked;
• That it confirms to required security standards on key lengths and other items;
• That the domain listed on the certificate matches the domain requested by the user.
• When the browser confirms that the website can be trusted, it creates a symmetric session key
which it encrypts with the public key in the website’s certificate. The session key is then sent
to the web server.
• The web server uses its private key to decrypt the symmetric session key.
• The server sends back an acknowledgment that is encrypted with the session key.
• From now on, all data transmitted between the server and the browser are encrypted and secure
(https://www.instantssl.com/ssl.html).
access to their data, such as profile data, photos, and email, without compromising security (https://
oauth2simplified.com/).
In any OAuth 2.0 flow, we can identify the following roles:
• Resource Owner: the entity that can grant access to a protected resource; typically this is the
end-user.
• Resource Server: the server hosting the protected resources; this is the API you want to
access.
• Client: the app requesting access to a protected resource on behalf of the Resource Owner.
• Authorization Server: the server that authenticates the Resource Owner and issues Access
Tokens after getting proper authorization, in this case, Auth0 (https://auth0.com/docs/protocols/
oauth2).
8.2.7.1 WebSockets
Web sockets are defined as two-way communication between servers and clients, which means both
parties communicate and exchange data at the same time (https://www.tutorialspoint.com/websockets/
index.htm).
The WebSocket protocol enables interaction between a web client (such as a browser) and a web server
with lower overheads, facilitating real-time data transfer from and to the server. This is made possible
by providing a standardized way for the server to send content to the client without being first requested
by the client and allowing messages to be passed back and forth while keeping the connection open.
In this way, a two-way ongoing conversation can occur between the client and the server. The commu-
nications are done over TCP port number 80 (or 443 in the case of TLS-encrypted connections), which
is of benefit for those environments that block non-web Internet connections using a firewall. Similar
two-way browser-server communications have been achieved in non-standardized ways using stop-gap
technologies such as Comet.
The WebSocket protocol is supported in most major browsers including Google Chrome, Microsoft
Edge, Internet Explorer, Firefox, Safari and Opera. WebSocket also requires web applications on the
server to support it (https://en.wikipedia.org/wiki/WebSocket).
It’s important to understand the security aspects of a wireless connection and use them properly.
Choosing the right type of wireless security will determine how secure a system really is. The choice is
often dictated by what a router supports, but generally the choice consists of:
• Wired equivalent privacy (WEP)—an older standard that’s generally considered easy to break into.
• Wireless protected access (WPA)—better than WEP, but still considered to be a bit on the not-
so-secure side.
• WPA2—the most secure of the possible choices.
Once wireless security is established on the router, a strong password is required to keep it safe (https://
www.routercheck.com/wireless-security/).
at the right time and in the best format. When IT and OT systems work in harmony, new efficiencies are
discovered, systems can be remotely monitored and managed and organizations can realize the same
security benefits that are used on administrative IT systems (https://www.forcepoint.com/cyber-edu/ot-
operational-technology-security). Figure 8.16 shows the increasing concern for OT cybersecurity.
While necessary, IT-OT cybersecurity convergence will be challenging, the different priorities, prac-
tices and technologies could be hard to reconcile. Cultural issues, such as overcoming the longstanding
distrust between IT and OT groups, can be an even larger hurdle. A convergence plan that anticipates
these roadblocks is essential (https://www.arcweb.com/blog/it-ot-cybersecurity-convergence).
Integrating IT and OT requires more than converging networking resources. It is critical that organiza-
tions avoid the pitfalls created by developing a parallel security team for the OT portion of their network.
FIGURE 8.16 Applied technology and data analytics services. Managing the risks of integrating IT and OT systems. (From
https://www.abs-group.com/Knowledge-Center/Insights/Infographic-Managing-the-Risks-of-Integrating-IT-and-OT-Systems/.)
312 Handbook of Industry 4.0 and SMART Systems
The duplication of staff, training and resources is not only an expense that few organizations can sustain,
but resulting organizational gaps can raise governance, risk management and compliance issues.
Success in the new digital economy requires developing integrated networks to seamlessly leverage
all available resources, even those ICS/SCADA systems deep inside an OT network. While malicious
cyber actors demonstrate their ability to exploit the expanding digital attack surface, organizations
need to respond not by adding new isolated devices to their security wiring closet, but by deploying an
integrated security framework that prioritizes critical functions such as speed, collaboration, advanced
analytics and risk-based decision-making. Such an approach, built around a flexible fabric strategy,
enables comprehensive protection at machine speed and scale, while integrating appropriate solutions
across IT and OT environments into a single, centralized and automated security system (https://www.
csoonline.com/article/3283238/security/resolving-the-challenges-of-it-ot-convergence.html).
Threats can be classified as accidental or intentional and may be active or passive. Accidental threats are
those that exist with no premeditated intent. Examples of realized accidental threats include system mal-
functions, operational blunders and software bugs. Intentional threats may range from casual examina-
tion, using easily available monitoring tools, to sophisticated attacks using special system knowledge. An
intentional threat, if realized, may be considered an “attack.” Passive threats are those which, if realized,
would not result in any modification to any information contained in the system(s), and where neither
the operation nor the state of the system is changed. The use of passive wiretapping to observe informa-
tion being transmitted over a communications line is a realization of a passive threat. Active threats to a
system involve the alteration of information contained in the system or changes to the state or operation
of the system (Recommendation ITU-T X.800, 1991).
Security features usually increase the cost of a system and may make it harder to use. Before design-
ing a secure system, therefore, a recommended practice is to identify the specific threats against which
protection is needed. This is known as threat assessment. A system is vulnerable in many ways, but
only some are exploitable because the attacker lacks the opportunity or because the result does not jus-
tify the effort and risk of detection.
Threats are against assets; thus, the first step is to list the assets that require protection. The next step
of the assessment is a threat analysis, then a vulnerability analysis (including impact assessment), coun-
termeasures and security mechanisms.
Cybersecurity and Risk 313
In some cases, nontechnical measures, such as insurance coverage, may be a cost-effective alterna-
tive to technical security measures. In general, perfect technical security is not possible. The objective,
therefore, should be to make the cost of an attack high enough to reduce the risk to acceptable levels
(Recommendation ITU-T X.800, 1991).
1. Access control;
2. Authentication;
3. Non-repudiation;
4. Data confidentiality;
5. Communication security;
6. Data integrity;
7. Availability;
8. Privacy.
In order to provide an end-to-end security solution, the security dimensions are applied to a hierarchy of
network equipment and facility groupings, called security layers:
The security layers identify where security is addressed in products and solutions by providing a
sequential perspective of network security. For example, security vulnerabilities are first addressed for
the infrastructure layer, then for the services layer and finally the applications layer. Figure 8.17 depicts
how the security dimensions are applied to security layers to reduce vulnerabilities at each layer.
A security plane is a certain type of network activity protected by security dimensions. Three security
planes represent the three types of protected activities that occur on a network (Recommendation ITU-T
X.805, 2003). The security planes are:
1. Management plane;
2. Control plane;
3. End-user plane.
314 Handbook of Industry 4.0 and SMART Systems
FIGURE 8.17 Applying security dimensions to security layers. (From Recommendation ITU-T X.805, Security architec-
ture for systems providing end-to-end communications, 2003.)
These security planes address specific security needs associated with network management activi-
ties, network control or signaling activities and end-user activities correspondingly. Networks should
be designed in such a way that events on one security plane are kept isolated from the other security
planes. For example, a flood of domain name system (DNS) lookups on the end-user plane, initiated by
end-user requests, should not lock out the operations, administration, maintenance and provisioning
(OAM&P) interface in the management plane that would allow an administrator to correct the problem
(Recommendation ITU-T X.805, 2003).
Figure 8.18 illustrates the security architecture with the security planes included. The concept of secu-
rity planes allows the differentiation of the specific security concerns associated with those activities
and the ability to address them independently. For example, in a VoIP service, which is addressed by the
services security layer, the task of securing the management of the service should be independent of the
task of securing the control of the service. The task is independent of the task of securing the end-user
data being transported by the service (e.g., the user’s voice).
FIGURE 8.18 Security planes reflecting different types of network activities. (From Recommendation ITU-T X.805,
Security architecture for systems providing end-to-end communications, 2003.)
Cybersecurity and Risk 315
FIGURE 8.19 Secure authentication and authorization reference model. (From ITU-T X.1205, Overview of cybersecurity,
2008.)
316 Handbook of Industry 4.0 and SMART Systems
assessment, it may be necessary to combine password authentication with other authentication and
authorization processes, such as certificates, lightweight directory access protocol (LDAP), remote
authentication dial-in user service (RADIUS), Kerberos and PKI.
All authentication mechanisms have advantages and drawbacks. UserID or password combinations
are simple, low cost and easy to manage; however, remembering a multitude of complex passwords is
very difficult for users. Two-factor and three-factor authentication systems add additional authentication
strength; however, all are costly, add additional complexity and are difficult to maintain.
A “single password” system with enforced strong passwords can be a good solution for enterprise
authentication and authorization. Such system provides high authentication security, granular authoriza-
tion and is easier to administer. With this system, a user’s strong single password is synchronized with
many applications and systems enterprise wide for authentication and authorization. All enterprise sys-
tems and applications automatically refer authentication and authorization functions to the single pass-
word system. As users only have to remember is one strong password making the system simple to use
and not likely to be bypassed. The advantages to single-password system are:
The open and the extended enterprise face the most challenges when designing their access manage-
ment policy. It is advantageous to consider access management as an integral component of the security
policy. These organizations should design a uniform access management system with fine-grained rules
that properly interfaces with:
The use of unique accounts for each administrator with accountability for actions traceable to individu-
als is recommended (ITU-T X.1205, 2008).
derived from the deployment of VLANs across an organization’s multiple sites. For example, the use
of VLAN “tags” allows the segregation of traffic into specific groups such as finance, human resources
and engineering. Separation of data without “leakage” between the VLANs is an important element
for security.
8.4.4.2 Firewalls
The second layer of security can be achieved through the use of perimeter and distributed firewall filter-
ing capabilities at strategic points within the network. The firewall layer allows the network to be further
segmented into smaller areas and enables secure connections to the public network. Firewalls limit
access to inbound and outbound traffic to those protocols that are explicitly configured within the fire-
wall. An authentication capability for incoming or outgoing users can also be provided. Those firewalls
that support NAT enable optimization of IP addresses within the network (address allocation for private
Internets) [IETF RFC 1918].
The use of firewalls provides an extra layer of protection that is useful for access control. The applica-
tion of policy-based access allows the customization of access based on business needs. The use of a
distributed firewall approach affords the additional benefit of scalability as the enterprise needs evolve.
Personal firewalls can be deployed on end systems to ensure application integrity.
FIGURE 8.20 Reference model for securing management. (From ITU-T X.1205, Overview of cybersecurity, 2008.)
8.4.5.2 Authentication
Network operator authentication should be based on strong centralized authentication of network opera-
tors and administrators. Centralized administration of passwords enables enforcement of password
strength and removes the need for local storage of passwords on the network elements and element
management system (EMS) systems. Remote authentication dial-in user service is the basic mechanism
of choice for automating centralized authentication.
• SSH is an application level security protocol that directly replaces Telnet (IETF RFC 854,
1983) and file transfer protocol (FTP) (IETF RFC 959, 1985), but cannot normally be used to
protect other traffic types.
• IPSec protocol runs just between the network layer (layer 3) and the transport layer (layer 4) and
can be used to protect any type of data traffic independent of applications and protocols used.
It is the preferred method, but SSH can be used if the traffic consists of Telnet and FTP only.
• TLS technology can protect HTTP traffic when used in a network management capacity
between the NOC clients and the EMS and/or network elements.
• External IPSec VPN devices can be used in various parts of the network to secure management
traffic.
8.4.5.6 Firewalls
It is a good practice for the application of variable depth security principles to partition the network man-
agement environment through the use of VLANs and firewalls (see Section 8.4.4). The firewall controls
the type (protocol, port number, source and destination address) of traffic used to transit the boundary
between different security domains. Depending on the type of firewall (application versus packet filter-
ing), this can be extended to include filtering of the application content of the data flow. Firewall place-
ment, type and filtering rules are specific to the particular network implementation.
8.4.5.8 OS Hardening
All operating systems used in a network management capacity should be hardened whether they are gen-
eral purpose operating systems or embedded real-time operating systems. For operating systems without
a specific hardening guide, the operating system manufacturer should be consulted to obtain the latest
hardening patches and procedures.
320 Handbook of Industry 4.0 and SMART Systems
8.4.6 Layered Security across the Application, Network and Network Management
Every organization has a different security threshold and different technology infrastructure. Internet-
enabled applications represent increased risks and threats. They can have built-in security at the application
level. Using the security functionality that could be provided by lower network layers could enhance security.
Enterprises with Internet presence are cautioned to use extreme care in designing their sites.
1.
At the application level, a fine-grained security policy is recommended. Where possible, objects
should be addressable at the uniform resource identifiers level. Unneeded functionality should
be disabled. Where possible, TLS should be used. Application level gateways and a focus on
strong authentication and authorization are also recommended. If the security infrastructure
allows, e-mail services should be secured using secure/multipurpose internet mail extensions
(S/MIME) (IETF RFC 2311, 1998) or techniques such as pretty good privacy (PGP) (IETF
RFC 1991, 1996).
2.
At the network level, security is achieved through the use of layered architecture that can be
customized as per the security requirements of each type of enterprise.
Securing network management traffic is an essential requirement for securing the network:
• This can be achieved by first ensuring that the operating system is hardened against known
threats. The operating system manufacturer should be consulted to obtain the latest OS harden-
ing patches and procedures.
• Steps should be performed to check that all installed software is free from known viruses.
• It is preferable to encrypt all management traffic all the time using IPSec or TLS to protect
HTTP traffic. Encryption is a good and recommended practice if the traffic is traveling outside
the local LAN.
• SNMPv3 and RADIUS are recommended for remote access control for network operators,
with multiple levels of control mechanisms that include the use of strong passwords and the
ability to centrally administer access control system is preferred.
• Secure logs are essential for logging network management traffic.
The design of survivable networks starts by organizing network services into two categories, essential
and nonessential.
During the security policy design phase, it is necessary to determine the essential services that a network
is expected to deliver even under attack. This phase identifies how a network will resist an attack, how the
network will overcome such attacks and the best approach for recovering from such attacks. Management
systems, hosts, applications, routers and switches are all typical elements to consider in the analysis.
The resistance to attacks is increased by the use of access control mechanisms with strong authentication
and encryption. The use of message and packet filtering and network and server segmentation also enhance
network resistance. The use of appropriate intrusion detection techniques can help to identify an attack.
Appropriate back-up techniques can be used for system and network recovery (ITU-T X.1205, 2008).
• Authorization threats
Unauthorized access to network resources is usually the result of improper system configuration
and usage flaws. Attackers can obtain unauthorized access by taking advantage of insufficient
authentication and authorization of users and tasks in corporate systems or sloppy employee
practices (e.g., posting passwords, when the user is forced to remember multiple passwords).
Practices, such as the improper allocation of hidden space and sharing privileges among appli-
cations, represent serious sources of vulnerabilities. Trapdoor attacks can be used to obtain
unauthorized access. For example, attackers can obtain unauthorized access by guessing user
names and passwords using a dictionary of common strings. Attackers can derive passwords by
algorithmic means. Passwords can be captured in transit if they are sent in the clear.
After guessing the user name and the associated password, the attacker will have access to the
organization resources. The level of access is dependent on the privileges that the compromised
account has. The amount of damage that the attacker can inflict on the organization is depen-
dent on his or her intent. In most cases, hackers will use the compromised account to install a
backdoor entry to the enterprise.
Protocols for remote access to e-mail, such as IMAP, POP3 and POP2, use simple username and
password authentication techniques. These protocols can be used to facilitate brute force attacks.
There are published methods that allow attackers to remotely exploit the services of these protocols.
There are even more sophisticated ways of gaining unauthorized access. Worms can be used
to perform system-spoofing attacks whereby one system component masquerades as another.
For example, worms can exploit flows in the debug option of sendmail and in.rhosts (e.g.,
used in UNIX) due to weak authentication. The debug option of sendmail can be turned OFF.
Leaving the option ON is an example of a usage flaw.
• IP spoofing
IP spoofing is a complex attack that exploits trust relationships. Using masquerade techniques,
the attacker hijacks the identifiers of a host to sabotage the security of the target host. As far as
the target host knows, it is carrying on a conversation with a trusted host.
In this assault, the attacker first identifies a trusted host whose identifier will be hijacked. Then
the attacker determines the patterns of trust for the host. This usually involves the determination
322 Handbook of Industry 4.0 and SMART Systems
of the range of IP addresses that the host trusts. The next step involves disabling the host,
because the attacker will hijack its identifiers. This could be achieved by such techniques as
TCP SYN flooding attacks.
IP spoofing attacks can succeed because it is easy to forge IP addresses and network-based address
authentication techniques have limitations. The IP spoofing attack is blind, because the attacker
may not have access to the responses from the target host. However, the attacker can obtain a
two-way communication if the routing tables are manipulated to use the spoofed source IP address.
IP spoofing attacks are often used as a first step for other assaults such as DoS and flooding attacks.
Most (but certainly not all) Internet service providers and many of the more responsible enter-
prise networks are currently doing outgoing address filtering, which precludes straight IP
spoofing attacks. In response to this, attackers have been busy accumulating “botnets” to main-
tain their anonymity (ITU-T X.1205, 2008).
• Network sniffers
Network sniffers were originally designed as an aid tool to network managers to allow them to
diagnose problems, perform analysis or improve the performance of their networks. Network
sniffers work in a network segment that is not switched, such as segments connected through a
hub. In this way, the sniffer can see all traffic on that segment.
Sniffers originally read packet headers of the network traffic and focused on identifying low-
level packet characteristics, such as source and destination address. However, sniffers can
now decode data from packets across all layers of the OSI model.
Attackers can use sniffers to view user information and passwords from packets across public
or private networks. By using sniffers, attackers can obtain valuable information about user
names and passwords, in particular from applications such as FTP, Telnet and others that send
passwords in the clear. Protocols for remote access to e-mail such as IMAP, POP3 and POP2 use
simple username and password authentication techniques and are susceptible to sniffer attacks.
As users tend to reuse passwords across multiple applications and platforms, attackers can use the
acquired information to obtain access to various resources on the network, where their confidenti-
ality could be compromised. These resources could also be used as launch pads for other attacks.
In general, attackers are able to use networks sniffers by compromising the physical security of
the corporation. This is equivalent to someone walking into the enterprise and plugging his or
her laptop to the network. The risks are also applicable to wireless networks, whereby someone
in the parking lot can acquire access to the corporation local network. Gaining access to the
core packet network allows the attacker to determine configurations and modes of operation for
further exploitation (ITU-T X.1205, 2008).
Denial of service attacks exploit weaknesses in the architecture of the system that is under
attack. In some cases, they exploit the weakness of common IPs, such as the Internet control
message protocol (ICMP). For example, some DoS attacks send a large number of ICMP echo
(ping) packets to an IP broadcast address. The packets use a spoofed IP address of a potential
target. The replies coming back to the target can cripple it. These types of attacks are called
smurf attacks. Another form of attack uses user datagram protocol (UDP) packets but works on
the same concept (ITU-T X.1205, 2008).
• Bucket brigade attacks
Bucket brigade attacks are also known as man-in-the-middle attacks. In this kind of assault, the
attacker intercepts messages in a public key exchange between a server and a client. The attacker
retransmits the messages, substituting their public key for the requested one. The original par-
ties will think they are communicating with each other. The attacker may just have access to
the messages or may modify them. Network sniffers can be used to launch such attacks.
• Masquerading
This entails pretending to be valid maintenance or engineering personnel to access the network
and is just the tip of the iceberg of a range of threats that build on physical security holes and
human vulnerabilities. For example, the intruder can modify data relating to configuration
management and signaling layers of network, as well as to billing and usage data.
• Replay attacks
This attack occurs when a message or part of a message is repeated to produce an unauthorized
effect. For example, an entity replies a valid message containing authentication information in
order to authenticate itself.
• Modification of messages
Modification of a message occurs when the content of data transmission is altered without
detection and results in an unauthorized effect.
• Insider attacks
Insider attacks occur when legitimate users of a system behave in unintended or unauthorized
ways. Many known computer crimes involve insiders who compromise the security of the sys-
tem. Careful screening of staff and continued securitization of hardware, software and security
policy can help to reduce risks of insider attacks. Having good audit trails to increase the likeli-
hood of detecting such attacks is also a good practice to follow (ITU-T X.1205, 2008).
Application layer attacks exploit vulnerabilities in the operating system and applications to
gain access to resources. Improper configuration and authorization can lead to security holes.
For example, a host might be a web server and should provide anyone with requested web
pages. Security policy could specify that hosts restrict shell command access to authorized
administrators.
Account harvesting targets the authentication process when an application requests a user logon
ID and a password. Applications that generate different error messages for wrong user logon ID
and wrong password are vulnerable to this type of attack. Based on the type of error message,
an intruder can customize an attack that first determines a valid user logon ID and then uses
other forms of password-cracking techniques to obtain the password.
Application layer attacks can be based on viruses, worms, buffer overflow and password
harvesting, among others. The advent of web services and single sign-on technologies only
aggravate the problem, because they tend to web-enable legacy-based applications. These
applications were not designed with web connectivity and security in mind.
Some application layer attacks are aimed at just dismantling the website. Other attacks poison
a website’s cookies to gain illegitimate information about a particular server. Applications gen-
erally do not check the validity of cookies and can become the victims of executing malicious
code that is hidden in the cookies. There are known vulnerabilities in current browsers that
allow cookies-based attacks.
An attacker may also use cross-site scripting technique to insert malicious code in the form of
a script tag that is added to a URL. The code will be executed when an unsuspected user clicks
on that URL.
To reduce the threats of application layer attacks, the following are recommended:
• The use of TLS can solve some of the problems of the security at the application layer,
but SSL does not fully protect web applications. Attacks, such as account harvesting and
password cracking, can still be launched even if SSL is used.
• Harden all operating systems used in a network management capacity whether they are
general purpose operating systems or embedded real-time operating systems. Specific
and up-to-date hardening guides are available from the manufacturer. For some legacy
systems using older operating systems, no security patches might be available from the
manufacturer.
• Use secure e-mail, application layer firewalls, host intrusion prevention and detection sys-
tems, strong authentication techniques, strong passwords and proper exit control in web-
sites that prevent displaying of unauthorized modifications web content (ITU-T X.1205,
2008).
The following network infrastructure threats and vulnerabilities are typical of IP packet
networks:
Cybersecurity and Risk 325
1. Proliferation of insecure protocols: Some networks still use protocols known to have secu-
rity vulnerabilities. Such protocols include ICMP, Telnet, SNMPv1&2, DHCP, TFTP,
RIPv1, NTP, DNS and HTTP.
2. Use of weak, locally managed, static passwords: Some networks still allow the use of weak
passwords based on short, common dictionary words that are easy to guess. Some adminis-
trators may use one password across network elements, and this may be shared and known
by all administrators.
3. Unprotected security information: In some networks, critical information such as password
files is not encrypted. Other information, such as passwords, is sent in the clear across the
network. Firewall rule sets are improperly set and weak cryptographic keys are used.
4. Unauthenticated software loads and configuration files: Threats to networks can come
from loading incorrect or malicious software, or configuration files can cause loss of ser-
vice and may result in poor performance. This practice may open security holes such as the
installation of Trojan horses or other malicious code by insiders or outsiders. The practice
also leads to incorrect configurations on devices.
5. Non-hardened network elements and operating systems: Threats to networks can arise
from factory default operating system loads that are not hardened against common attacks.
This includes the running of unnecessary services, with default accounts and passwords left
enabled.
6. Management ports and interfaces unnecessarily exposed to the public network: Threats to
networks can arise from in-band management interfaces that are left accessible to the public
Internet. Additional threats can arise from support mechanism abuse, such as access to core
network in a support mode via dial-up, ISDN or other connection.
• Unauthorized access
Unauthorized access is a term that can refer to a number of different kinds of attacks. The ulti-
mate goal of the attacker is to gain access to some resource illegitimately. This is a security
problem for all types of enterprises. Any enterprise that enables Internet access or remote LAN
access capabilities is susceptible to unauthorized access attacks.
Remote access services that enable traveling employees to dial in for e-mail access, remote
offices connected via dial-up lines, intranets and extranets that connect outside parties to the
enterprise network can cause the network to be vulnerable to hackers, viruses and other attack-
ers. Hackers can use the tools of the trade to acquire access to the enterprise network where
sensitive information can be jeopardized, or the network can be used to launch attacks against
other networks (ITU-T X.1205, 2008).
TABLE 8.1
Cybersecurity Technologies
Techniques Category Technology Purpose
Cryptography Certificate and Digital signatures Used to enable the issuance and maintenance of certificates
public key to be used in digital communications
architecture Encryption Used encryption of data during transmission or storage
Key exchange Establish either a session key or a transaction key to be used
to secure a connection
Assurance Encryption Ensures data authenticity
Access Perimeter Firewalls Control access to and from a network
control protection Content Monitors traffic for noncompliant information
management
Authentication Single factor A system that uses user ID or password combinations to
verify an identifier
Two-factor A system that requires two components in order to grant a
user system access, such as the possession of a physical
token plus the knowledge of a secret
Three-factor Adds another identification factor such as a biometric or
measurement of a human body characteristic
Smart tokens Establish trusted identifiers for users through a specific
circuitry in a device, such as a smart card
Authorization Role-based Authorization mechanisms that control user access to
appropriate system resources based on its assigned role
Rule-based Authorization mechanisms that control user access to
appropriate system resources based on specific rules
associated with each user independent of their role within
an organization
System Antivirus Signature Protect against malicious computer code, such as viruses,
integrity methods worms, and Trojan horses using their code signatures
Behavior Checks running programs for unauthorized behavior
methods
Integrity Intrusion Can be used to warn network administrators of the
detection possibility of a security incident, such as files on a server
are compromised
Audit and Detection Intrusion Compare network traffic and host log entries to match data
Monitoring detection signatures that are indicative of hackers
Prevention Intrusion Detect attacks on a network and take actions as specified by
prevention the organization to mitigate the attacks. Suspicious
activities trigger administrator alarms and other
configurable responses
Logging Logging tools Monitor and compare network traffic and host log entries to
match data signatures and host address profiles indicative
of hackers
Management Network Configuration Allows for the control and configuration of networks and
management management fault management
Patch Install latest updates, fixes to network devices
management
Policy Enforcement Allow administrators to monitoring and enforce security
policies
Source: ITU-T X.1205, Overview of cybersecurity, 2008.
Cybersecurity and Risk 327
A fully homomorphic encryption (FHE) mechanism permits a specific algebraic operation based on
ciphertext that yields a still-encrypted result (Gentry, 2009). More specifically, retrieval and compari-
son of the encrypted data produce correct results, but the data are not decrypted throughout the entire
process. The FHE scheme requires very substantial computation, and it is not always easy to implement
with existing technology. Ciphertext retrieval with a view toward data privacy protection is possible in
the cloud (Ananthi et al., 2011; Hu et al., 2011; Cao et al., 2011).
In a new cryptographic access control scheme, attribute-based access control for cloud storage, each
user’s private key is labeled with a set of attributes, and data are encrypted with an attribute condition
restricting the user to be able to decrypt the data only if its attributes satisfy the data’s condition (Hong
et al., 2010). Distributed systems with information flow control (Zeldovich et al., 2008) use a tag to track
data based on a set of simple data tracking rules. They allow untrusted software to use private data but
use trusted code to control whether the private data can be revealed (Dong et al., 2015).
All companies today face a greater demand for wireless access from customers, suppliers, and/or
employees. Unfortunately, hackers also continue to try to gain access within networks. The following
are the main threats:
• Wi-Fi password cracking: Wireless access points that still use old security protocols, such as
WEP, are easy targets because passwords are very easy to crack.
• False hotspots: Nothing physically prevents a cybercriminal from allowing an outside access
point to be close to or coincident with an service set identifier (SSID) access point, inviting
users to identify themselves. Users who are victims of a rogue access point are likely to be
affected by malicious code, which often goes unnoticed.
• Malware placement: Users who join a wireless guest network are susceptible to unknowingly
taking unwanted malware from a neighbor with bad intentions. A common tactic used by hackers
is to place a backdoor in the network, which allows them to return later to steal confidential data.
• Spying: Users run the risk of their private communications being intercepted by cyber-spies
while an unprotected wireless network is connected.
• Data theft: Joining a wireless network exposes users to the loss of private documents that fall
into the hands of cyber thieves, who are listening to the transmissions to intercept the informa-
tion that is being transmitted.
• Inappropriate and illegal use: Companies that offer Wi-Fi to guests face the risk of improper
use by users, whether by accessing adult or extremist content, illegal downloads or attacks
against other companies. The company could face legal demands.
• Bad neighbors: As the number of wireless users in the network grows, so does the risk that a previ-
ously infected device enters the network. Mobile attacks, such as Android’s Stagefright, spread
from one user to another, even without the “victim zero” knowing (https://www.networkworld.
es/seguridad/principales-amenazas-para-la-seguridad-de-las-redes-inalambricas).
This technology became widely known in 2009 with the launch of the Bitcoin network, the first of
many modern cryptocurrencies. In Bitcoin, and similar systems, the transfer of digital information
that represents electronic cash occurs in a distributed system. Bitcoin users can digitally sign and
transfer their rights to that information to another user, and the Bitcoin blockchain records this transfer
publicly, allowing all participants of the network to independently verify the validity of the transac-
tions. The Bitcoin blockchain is independently maintained and managed by a distributed group of
participants. This, along with cryptographic mechanisms, makes the blockchain resilient to attempts
to alter the ledger later (modifying blocks or forging transactions). Blockchain technology has enabled
the development of many cryptocurrency systems such as Bitcoin and Ethereum1. Because of this,
blockchain technology is often viewed as bound to Bitcoin or possibly cryptocurrency solutions in
general. However, the technology is available for a broader variety of applications and is being inves-
tigated for a variety of sectors.
The numerous components of blockchain technology, along with its reliance on cryptographic
primitives and distributed systems, can make it challenging to understand, but each component can be
described simply and used as a building block to understand the larger complex system.
Blockchains can be informally defined as distributed digital ledgers of cryptographically signed
transactions grouped into blocks. Each block is cryptographically linked to the previous one (making it
tamper-evident) after validation and undergoing a consensus decision. As new blocks are added, older
blocks become more difficult to modify (creating tamper resistance). New blocks are replicated across
copies of the ledger within the network, and any conflicts are resolved automatically using established
rules (Yaga et al., 2018).
• Ledger: The technology uses an append-only ledger to provide full transactional history. Unlike
traditional databases, transactions and values in a blockchain are not overridden.
• Secure: Blockchains are cryptographically secure, ensuring that the data contained within the
ledger have not been tampered with and are attestable.
• Shared: The ledger is shared by multiple participants. This provides transparency across the
node participants in the blockchain network.
• Distributed: The blockchain can be distributed. This allows for scaling the number of nodes of a
blockchain network to make it more resilient to attacks by bad actors. By increasing the number of
nodes, the ability for a bad actor to impact the consensus protocol used by the blockchain is reduced.
For blockchain networks that allow anyone to anonymously create accounts and participate (called per-
missionless blockchain networks), these capabilities deliver a level of trust among parties with no prior
knowledge of one another; this trust can enable individuals and organizations to transact directly, which
may result in transactions being delivered faster and at lower costs. For a blockchain network that more
tightly controls access (called permissioned blockchain networks), where some trust may be present
among users, these capabilities help to bolster that trust (Yaga et al., 2018).
8.5.2.1 Permissionless
Permissionless blockchain networks are decentralized ledger platforms open to anyone publishing
blocks, without needing permission from any authority. Permissionless blockchain platforms are often
open source software, freely available to anyone who wishes to download them. As anyone has the right
to publish blocks, this results in the property that anyone can read the blockchain and issue transactions
on the blockchain (by including those transactions within published blocks). Any blockchain network
user within a permissionless blockchain network can read and write to the ledger.
As permissionless blockchain networks are open to all to participate, malicious users may attempt to
publish blocks in a way that subverts the system. To prevent this, permissionless blockchain networks often
utilize a multiparty agreement or “consensus” system that requires users to expend or maintain resources
when attempting to publish blocks. This prevents malicious users from easily subverting the system. Non-
malicious behavior is promoted by rewarding the publishers of protocol-conforming blocks with a native
cryptocurrency.
8.5.2.2 Permissioned
In permissioned blockchain networks, users publishing blocks must be authorized by some authority
(centralized or decentralized). As only authorized users are maintaining the blockchain, it is possible to
restrict read access and to restrict who can issue transactions. Permissioned blockchain networks may
thus allow anyone to read the blockchain or they may restrict read access to authorized individuals.
They may also allow anyone to submit transactions to be included in the blockchain or, again, they may
restrict this access only to authorized individuals. Permissioned blockchain networks may be instantiated
and maintained using opensource or closed source software.
330 Handbook of Industry 4.0 and SMART Systems
Permissioned blockchain networks can have the same traceability of digital assets as they pass through
the blockchain, as well as the same distributed, resilient and redundant data storage system as permis-
sionless blockchain networks. They also use consensus models for publishing blocks, but these methods
often do not require the expense or maintenance of resources (as is the case with current permissionless
blockchain networks) because the establishment of one’s identity is required to participate as a member
of the permissioned blockchain network. Those maintaining the blockchain have a level of trust with
each other, because they were all authorized to publish blocks, and their authorization can be revoked
if they misbehave. Consensus models in permissioned blockchain networks are usually faster and less
computationally expensive.
Permissioned blockchain networks may be used by organizations that need to more tightly control and
protect their blockchain. However, if a single entity controls who can publish blocks, the users of the
blockchain will need to have trust in that entity. Permissioned blockchain networks may also be used by
organizations that wish to work together but may not fully trust one another. They can establish a permis-
sioned blockchain network and invite business partners to record their transactions on a shared distributed
ledger. These organizations can determine the consensus model to be used, based on how much they
trust one another. Beyond trust, permissioned blockchain networks provide transparency and insight that
may help better inform business decisions and hold misbehaving parties accountable. This can explicitly
include auditing and oversight entities making audits a constant occurrence versus a periodic event.
Some permissioned blockchain networks support the ability to selectively reveal transaction informa-
tion based on a blockchain network user’s identity or credentials. With this feature, some degree of pri-
vacy in transactions may be obtained. For example, the blockchain may record that a transaction between
two blockchain network users occurred, but the actual contents of transactions may only be accessible
to the involved parties.
Some permissioned blockchain networks require all users to be authorized to send and receive trans-
actions (they are not anonymous or even pseudo-anonymous). In such systems, parties work together to
achieve a shared business process with natural disincentives to commit fraud or otherwise behave as a
bad actor (because they can be identified). If bad behavior were to occur, when the organizations are
incorporated, they know what legal remedies are available and how to pursue those remedies in the rel-
evant judicial system (Yaga et al., 2018).
TABLE 8.2
Examples of Input Text and Corresponding SHA-256 Digest Values
Input Text SHA-526 Digest Value
1 0x6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb78754b
2 0xd4735e3a265el6eee03f59718b9b5d03019c07d8b6c51f90da3a666eecl3ab35
Hello, World! 0xdffd6021bb2bd5b0af676290809ec3a53191dd81c7f70a4b28688a362182986f
2. They are second preimage resistant. This means no input hashes to a specific output. More
specifically, cryptographic hash functions are designed so that given a specific input, it is com-
putationally infeasible to find a second input that produces the same output (e.g., given x, find
y such that hash(x) = hash(y)). The only approach available is to exhaustively search the input
space, but this is computationally infeasible to do with any chance of success.
3. They are collision resistant. This means no two inputs hash to the same output. More specifi-
cally, it is computationally infeasible to find any two inputs that produce the same digest (e.g.,
find an x and y which hash(x) = hash(y)).
A specific cryptographic hash function used in many blockchain implementations is the Secure
Hash Algorithm (SHA) with an output size of 256 bits (SHA-256). Many computers support this
algorithm in hardware, making it fast to compute. SHA-256 has an output of 32 bytes (1 byte = 8 bits,
32 bytes = 256 bits), generally displayed as a 64-character hexadecimal string (Table 8.2).
This means that there are 2256 ≈ 1077 or 115, 792, 089, 237, 316, 195, 423, 570, 985,008, 687, 907, 853,
269, 984, 665, 640, 564, 039, 457, 584, 007, 913,129, 639, 936 possible digest values. The algorithm for
SHA-256, as well as others, is specified in the US Federal Information Processing Standard (FIPS) 180–4
(National Institute of Standards and Technology, 2015). The NIST Secure Hashing website (National Institute
of Standards and Technology) contains FIPS specifications for all NIST-approved hashing algorithms.
As there are an infinite number of possible input values and a finite number of possible output digest
values, it is possible but highly unlikely to have a collision where hash(x) = hash(y) (i.e., the hash of two
different inputs produces the same digest). SHA-256 is said to be collision resistant, because to find a col-
lision in SHA-256, we would have to execute the algorithm, on average, about 2128 times (which is 340
undecillions, or more precisely 340, 282, 366, 920, 938, 463, 463, 374, 607, 431, 768, 211, 456; roughly
3.402 × 1038).
To put this into perspective, the hash rate (hashes per second) of the entire Bitcoin network in 2015
was 300 quadrillion hashes per second (300,000,000,000,000,000/s) (“Hash per Second”). At that rate,
it would take the entire Bitcoin network roughly 35,942,991,748,521 (roughly 3.6 × 1013) years to manu-
facture a collision (note that the universe is estimated to be 1.37 × 1010 years old). Even if any such input
x and y that produce the same digest, it would be also very unlikely for both inputs to be valid in the
context of the blockchain network (i.e., x and y are both valid transactions).
Within a blockchain network, cryptographic hash functions are used for many tasks, such as:
• Deriving addresses;
• Creating unique identifiers;
• Securing the block data: a publishing node will hash the block data, creating a digest that will
be stored within the block header;
• Securing the block header: a publishing node will hash the block header. If the blockchain
network utilizes a proof of work consensus model, the publishing node will need to hash the
block header with different nonce values until the puzzle requirements have been fulfilled.
The current block header’s hash digest will be included within the next block’s header, where it
will secure the current block header data.
Because the block header includes a hash representation of the block data, the block data itself is also
secured when the block header digest is stored in the next block.
332 Handbook of Industry 4.0 and SMART Systems
There are many families of cryptographic hash functions utilized in blockchain technology (SHA-256 is
not the only one), such as Keccak (selected by NIST as the winner of a competition to create the SHA-3 hashing
standard) and RIPEMD-160 (SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions).
8.5.4 Transactions
A transaction represents an interaction between parties. With cryptocurrencies, for example, a transaction
represents a transfer of the cryptocurrency between blockchain network users. For business-to-business
scenarios, a transaction could be a way of recording activities occurring on digital or physical assets.
Figure 8.21 shows a notional example of a cryptocurrency transaction.
Each block in a blockchain can contain zero or more transactions. For some blockchain implementa-
tions, a constant supply of new blocks (even with zero transactions) is critical to maintain the security
of the blockchain network; having a constant supply of new blocks being published prevents malicious
users from “catching up” and manufacturing a longer, altered blockchain.
The data that comprise a transaction can be different for every blockchain implementation, but the
mechanism for transacting is largely the same. A blockchain network user sends information to the block-
chain network. The information sent may include the sender’s address (or another relevant identifier),
sender’s public key, a digital signature, transaction inputs and transaction outputs.
A single cryptocurrency transaction typically requires at least the following information, but can
contain more:
• Inputs: The inputs are usually a list of digital assets to be transferred. A transaction will
reference the source of the digital asset (providing provenance)—either the previous transaction
where it was given to the sender, or in the case of new digital assets, the origin event. Because
the input to the transaction is a reference to past events, the digital assets do not change. In the
case of cryptocurrencies, this means value cannot be added or removed from existing digital
assets. Instead, a single digital asset can be split into multiple new digital assets (each with
Output0
($17)
Output1
($3) Alice sends herself $3 as “change”
FIGURE 8.21 Example cryptocurrency transaction. (From Yaga, D. et al., Blockchain Technology Overview, National
Institute of Standards and Technology, 2018.)
Cybersecurity and Risk 333
lesser value), or multiple digital assets can be combined to form fewer new digital assets (with
a correspondingly greater value). The splitting or joining of assets will be specified within
the transaction output. The sender must also provide proof that it has access to the referenced
inputs, generally by digitally signing the transaction—proving access to the private key.
• Outputs: The outputs are usually the accounts that will be the recipients of the digital assets along
with how much digital asset they will receive. Each output specifies the number of digital assets
to be transferred to the new owner(s), the identifier of the new owner(s) and a set of conditions the
new owners must meet to spend that value. If the digital assets provided are more than required,
the extra funds must be explicitly sent back to the sender (this is a mechanism to “make change”).
While primarily used to transfer digital assets, transactions can be more generally used to transfer data.
In a simple case, someone may simply want to permanently and publicly post data on the blockchain.
In the case of smart contract systems, transactions can be used to send data, process those data and store
some result on the blockchain. For example, a transaction can be used to change an attribute of a digitized
asset such as the location of a shipment within a blockchain technology-based supply chain system.
Regardless of how the data are formed and transacted, determining the validity and authenticity of
a transaction is important. The validity of a transaction ensures that the transaction meets the protocol
requirements and any formalized data formats or smart contract requirements specific to the blockchain
implementation. The authenticity of a transaction is also important, as it determines that the sender of
digital assets had access to those digital assets. Transactions are typically digitally signed by the sender’s
associated private key and can be verified at any time using the associated public key (Yaga et al., 2018).
Some permissioned blockchain networks can leverage a business’s existing PKI for asymmetric-key cryp-
tography to provide user credentials, rather than having each blockchain network user manage their own
asymmetric-keys. This is done by utilizing existing directory services and using that information within
the blockchain network. Blockchain networks that utilize an existing directory service can access it via
existing protocols, such as the LDAP (LDAP.com.), and utilize the information from the directory natively,
or import it into an internal certificate authority within the blockchain network (Yaga et al., 2018).
Each blockchain implementation may implement a different method to derive an address. For permis-
sionless blockchain networks, which allow anonymous account creation, a blockchain network user can
generate as many asymmetric-key pairs and therefore addresses as desired, allowing for a varying degree
of pseudo-anonymity. Addresses may act as the public-facing identifier in a blockchain network for a user,
and an address will often be converted into a quick response code (a two-dimensional bar code, which can
contain arbitrary data) for easier use with mobile devices (see an example of QR code in Figure 8.22).
Blockchain network users may not be the only source of addresses within blockchain networks. It is
necessary to provide a method of accessing a smart contract once it has been deployed within a block-
chain network. For Ethereum, for example, smart contracts are accessible via a special address called a
contract account. This account address is created when a smart contract is deployed (the address for a
contract account is deterministically computed from the smart contract creator’s address (“How Is the
Address of an Ethereum Contract Computed?”)). This contract account allows for the contract to be
executed whenever it receives a transaction and to create additional smart contracts in turn.
FIGURE 8.22 A QR code example which has encoded the text “NISTIR 8202 – Blockchain Technology Overview QR code
example.” (From Yaga, D. et al., Blockchain Technology Overview, National Institute of Standards and Technology, 2018.)
Cybersecurity and Risk 335
8.5.8 Ledgers
A ledger is a collection of transactions. Throughout history, paper ledgers have been used to keep track
of the exchange of goods and services. In modern times, ledgers have been stored digitally, often in large
databases owned and operated by a centralized trusted third party (i.e., the owner of the ledger) on behalf
of a community of users. These ledgers with centralized ownership can be implemented in a centralized
or distributed manner (i.e., just one server or a coordinating cluster of servers).
There is a growing interest in distributed ownership of the ledger. Blockchain technology enables
such an approach using both distributed ownership and distributed physical architecture. The distributed
physical architecture of blockchain networks often involves a much larger set of computers than is typical
of centrally managed distributed physical architecture. The growing interest in distributed ownership of
ledgers stems from trust, security and reliability concerns related to ledgers with centralized ownership:
• Centrally owned ledgers may be lost or destroyed; a user must trust that the owner is properly
backing up the system.
• A blockchain network is distributed by design, creating many backup copies, all updating
and syncing to the same ledger data between peers. A key benefit to blockchain technol-
ogy is that every user can maintain his or her own copy of the ledger. Whenever new full
nodes join the blockchain network, they reach out to discover other full nodes and request
a full copy of the blockchain network’s ledger, making loss or destruction of the ledger
difficult. It should be noted that certain blockchain implementations provide the capability
to support concepts such as private transactions or private channels. Private transactions
facilitate the delivery of information only to those nodes participating in a transaction,
not the entire network.
• Centrally owned ledgers may be on a homogeneous network, where all software, hardware
and network infrastructure may be the same. Because of this characteristic, the overall
system resiliency may be reduced, as an attack on one part of the network will work on
everywhere.
• A blockchain network is a heterogeneous network, where the software, hardware and
network infrastructure are all different. Because of the many differences between nodes
on the blockchain network, an attack on one node is not guaranteed to work on other
nodes.
336 Handbook of Industry 4.0 and SMART Systems
• The transactions on a centrally owned ledger are not made transparently and may not be valid;
a user must trust that the owner is validating each received transaction.
• A blockchain network must check that all transactions are valid; if a malicious node is
transmitting invalid transactions, others will detect and ignore them, preventing the invalid
transactions from propagating throughout the blockchain network.
• The transaction list on a centrally owned ledger may not be complete; a user must trust that the
owner is including all valid transactions that have been received.
• A blockchain network holds all accepted transactions within its distributed ledger. To
build a new block, a reference must be made to a previous block—thus building on top
of it. If a publishing node does not include a reference to the latest block, other nodes
will reject it.
• The transaction data on a centrally owned ledger may have been altered; a user must trust that
the owner is not altering past transactions.
• A blockchain network utilizes cryptographic mechanisms such as digital signatures
and cryptographic hash functions to provide tamper-evident and tamper-resistant
ledgers.
• The centrally owned system may be insecure; a user must trust that the associated computer
systems and networks are receiving critical security patches and have implemented best prac-
tices for security. The system may be breached and have had personal information stolen
because of insecurities.
• A blockchain network, because of its distributed nature, provides no centralized point of
attack. Information on a blockchain network is usually publicly viewable and offers noth-
ing to steal. To attack blockchain network users, an attacker must individually target them.
Targeting the blockchain itself will be met with the resistance of the honest nodes present
in the system. If an individual node is not patched, it will only affect that node—not the
system overall (Yaga et al., 2018).
8.5.9 Blocks
Blockchain network users submit candidate transactions to the blockchain network via software (desk-
top applications, smartphone applications, digital wallets, web services, etc.). The software sends these
transactions to a node or nodes within the blockchain network. The chosen nodes may be non-publishing
full nodes or publishing nodes. The submitted transactions are then propagated to the other nodes in the
network, but this by itself does not place the transaction in the blockchain. For many blockchain imple-
mentations, once a pending transaction has been distributed to nodes, it must wait in a queue until it is
added to the blockchain by a publishing node.
Transactions are added to the blockchain when a publishing node publishes a block. A block contains a
block header and block data. The block header contains metadata for this block. The block data contain a
list of validated and authentic transactions that have been submitted to the blockchain network. Validity
and authenticity are ensured by checking that the transaction is correctly formatted and the providers of
digital assets in each transaction (listed in the transaction’s “input” values) have each cryptographically
signed the transaction. This verifies that the providers of digital assets for a transaction had access to
the private key, which could sign over the available digital assets. The other full nodes will check the
validity and authenticity of all transactions in a published block and will not accept a block if it contains
invalid transactions.
It should be noted that every blockchain implementation can define its own data fields; however, many
blockchain implementations utilize data fields such as the following:
• Block Header
• The block number, also known as block height in some blockchain networks.
• The previous block header’s hash value.
Cybersecurity and Risk 337
• A hash representation of the block data; different methods can be used to accomplish this,
such as generating a Merkle tree and storing the root hash, or by using a hash of all the
combined block data.
• A timestamp.
• The size of the block.
• The nonce value. For blockchain networks using mining, this is a number, which is
manipulated by the publishing node to solve the hash puzzle. Other blockchain net-
works may or may not include it or use it for another purpose other than solving a hash
puzzle.
• Block Data
• A list of transactions and ledger events included within the block.
• Other data.
8.5.11.1 Immutability
Most publications on blockchain technology describe blockchain ledgers as immutable, but this is
not strictly true. They are tamper-evident and tamper-resistant; for this reason, they are trusted by
FIGURE 8.23 Generic chain of blocks. (From Yaga, D. et al., Blockchain Technology Overview, National Institute of
Standards and Technology, 2018.)
338 Handbook of Industry 4.0 and SMART Systems
financial transactions. However, they cannot be considered completely immutable, because, in some
situations, the blockchain can be modified.
The chain of blocks itself cannot be considered immutable. For some blockchain implementations,
the most recently published or “tail” blocks are subject to being replaced (by a longer, alternative chain
with different “tail” blocks). Most blockchain networks use the strategy of adopting the longest chain
(the one with the most amount of work put into it) as truth when there are multiple competing chains. If
two chains are competing, but each includes its own unique sequence of tail blocks, whichever is longer
will be adopted. However, this does not mean the transactions within the replaced blocks are lost—rather
they may have been included in a different block or returned to the pending transaction pool. This degree
of weak immutability for tail blocks is the reason why most users of the blockchain network wait several
block creations before considering a transaction to be valid.
For permissionless blockchain networks, the adoption of a longer, alternate chain of blocks could be the
result of a form of attack known as a 51% attack (“Majority Attack”). For this, the attacker simply garners
enough resources to outpace the block creation rate of the rest of the blockchain network (holding more
than 51% of the resources applied toward producing new blocks). Depending on the size of the blockchain
network, this could be a very cost-prohibitive attack carried out by state-level actors (Greenspan, 2017a).
The cost of performing this type of attack increases the further back in the blockchain the attacker wishes
to make a change. This attack is not technically difficult (e.g., it just repeats the normal process of the
blockchain implementation, but with selected transactions either included or omitted and at a faster pace),
but it is just expensive.
For permissioned blockchain networks, this attack can be mitigated. There is generally an owner or con-
sortium of blockchain network users who allow publishing nodes to join the blockchain network and remove
publishing nodes from the blockchain network, which gives them a great amount of control. There is less
likely to be competing chains, as the owner or consortium can force publishing nodes to collaborate fairly:
non-cooperating publishing nodes can simply have their privileges removed. There may be additional legal
contracts in place for the blockchain network users, including clauses for misconduct and the ability to take
legal action. While this control is useful to prevent misconduct, it means that any number of blocks can be
replaced through legitimate methods if desired by the owner or consortium (Yaga et al., 2018).
a long discussion and adoption period before an event occurs; all users must switch to the newly updated
blockchain software at some chosen block to continue recording transactions on the new “main” fork.
For permissionless blockchain networks, although the developers maintain a large degree of influence,
users can reject a change by refusing to install updated software. Of the blockchain network users, the pub-
lishing nodes have significant control as they create and publish new blocks. The user base usually adopts
the blocks produced by the publishing nodes but is not required to do so. An interesting side effect of this is
that permissionless blockchain networks are essentially ruled by the publishing nodes and may marginal-
ize a segment of users by forcing them to adopt changes they may disagree with to stay with the main fork.
For permissioned blockchain networks, control and governance are driven by members of the associ-
ated owner or consortium. The consortium can govern who can join the network, when members are
removed from the network, coding guidelines for smart contracts, and so on.
In summary, the software developers, publishing nodes and blockchain network users all play a part
in the blockchain network governance.
8.5.14 Cybersecurity
The use of blockchain technology does not remove inherent cybersecurity risks. Many of these risks
involve a human element. Therefore, a robust cybersecurity program remains vital to protect the network
and participating organizations from cyber threats, particularly as hackers develop more knowledge
about blockchain networks and their vulnerabilities.
Existing cybersecurity standards and guidance remain relevant for ensuring the security of systems
that interface and/or rely on blockchain networks. Subject to certain adjustments to consider specific
attributes of blockchain technology, they provide a strong foundation for protecting blockchain networks
from cyber attacks.
340 Handbook of Industry 4.0 and SMART Systems
In addition to general principles and controls, specific cybersecurity standards relevant to blockchain
technology already exist and are in wide use by many industries. For instance, the NIST Cybersecurity
Framework expressly states that it is “not a one-size-fits-all approach to managing cybersecurity risk”
because “organizations will continue to have unique risks—different threats, vulnerabilities and risk
tolerances—and how they implement the practices in the [Framework] will vary.” With that said, even
though the Framework was not designed for blockchain technology specifically, its standards are broad
enough to cover blockchain technology and to help institutions develop policies and processes that iden-
tify and control risks affecting blockchain technology.
While malicious users can be annoyances and create short-term harm, blockchain networks can perform
hard forks to combat them. Whether damage done (money lost) is reversed will be up to the developers
and users of the blockchain network.
In addition to malicious users of the network, the administrators of the infrastructure for permissioned
blockchain networks may act maliciously. For example, an infrastructure administrator may be able (depend-
ing upon the exact configuration) to take over block production, exclude certain users from performing trans-
actions, rewrite block history, double spend coin, delete resources or re-route or block network connections.
Cybersecurity and Risk 341
8.5.16 No Trust
Another common misinterpretation comes from people hearing that there is no “trusted third party” in
a blockchain and assuming blockchain networks are “trustless” environments. While there is no trusted
third party certifying transactions in permissionless blockchain networks (in permissioned systems it is
less clear, as administrators of those systems act as an administrator of trust by granting users admission
and permissions), a great deal of trust is needed in the following areas:
Cryptocurrencies that are not able to consistently and adequately reward publishing nodes risk delays
in publishing blocks and processing transactions. These delays could reduce confidence in the cryptocur-
rency, reducing its market value further. It could then become increasingly less attractive for publishing
nodes to contribute to that cryptocurrency’s publishing efforts. Even worse, such weakened cryptocur-
rencies open themselves up to being attacked by nodes with large amounts of resources that may mali-
ciously alter the blockchain or deny service to users attempting to submit transactions (Yaga et al., 2018).
• Many participants;
• Distributed participants;
• A want or need for removal of trusted third party;
• Transactional workflow (e.g., transfer of digital assets or information between parties);
• A need for a globally scarce digital identifier (i.e., digital art, digital land, digital property);
• A need for a decentralized naming service or ordered registry;
• A need for a cryptographically secure system of ownership;
• A need to reduce or eliminate manual efforts of reconciliation and dispute resolutions;
• A need to enable real-time monitoring of activity between regulators and regulated entities;
• A need for full provenance of digital assets and full transactional history to be shared among
participants.
Several agencies and organizations have developed guides to help organizations determine whether a
blockchain is suitable for their systems or activities and, if so, which kind of blockchain technology will
be of most benefit.
Cybersecurity and Risk 343
The United States Department of Homeland Security (DHS) Science & Technology Directorate has
been investigating blockchain technology and has created a flowchart to help organizations determine
whether a blockchain would be useful for a development initiative (see Figure 8.24).
The American Council for Technology and Industry Advisory Council is a public or private partnership
that facilitates collaboration and discussion between government and industry experts. It has developed
YES
YES
You should not write sensive informaon to a
Sensive idenfiers WILL NO Blockchain that requires medium to long term
NOT be wrien to the data confidenality, such as PII, even if it is encrypted
store?
CONSIDER: Encrypted Database
YES
Are the enes with write If there are no trust or control issues over who runs the
access having a hard me NO data store, tradional database soluons should suffice
deciding who should be in
control of the data store? CONSIDER: Managed Database
YES
YES
FIGURE 8.24 DHS Science and Technology Directorate flowchart. (From Yaga, D. et al., Blockchain Technology
Overview, National Institute of Standards and Technology, 2018.)
344 Handbook of Industry 4.0 and SMART Systems
a blockchain primer document (ACT-IAC, 2018a) providing an overview of the technology. A second
document, a blockchain playbook (ACT-IAC, 2018b), provides a set of questions with weights to help
organizations in their consideration of the technology.
Two computer scientists at the Eidgenössische Technische Hochschule at Zürich University wrote a
whitepaper “Do you need a Blockchain?” (Wüst and Gervais, 2017). The paper gives the background and
properties of blockchains and discusses several use cases. Although not created by the authors, a website
(“Do You Need a Blockchain?”) implements the paper’s flowchart in an interactive form. Interestingly,
in the flowchart logic, as well as the website code, most paths lead to “no,” with only a few leading to
“maybe.” This critical view on the technology is one that most organizations should take. Can existing
technologies really solve their problems?
The Institute of Electrical and Electronics Engineers (IEEE) published “Do you need a blockchain?”
in its Spectrum magazine (Peck, 2017). The article emphasizes a blockchain’s utility as an anti-censor-
ship tool but notes the tradeoff that must be made by moving away from a traditional system. Removal of
trusted third parties means relying on multiple sources of “unaffiliated participants” acting in coordina-
tion; depending on the type of blockchain platform, this may be difficult. The article says the technology
is changing at a rapid pace, making its future difficult to predict. It includes a flowchart to help readers
decide whether they need a blockchain and ends with the statement: “But you should also consider the
possibility that you don’t need a blockchain at all.”
Others are also asking organizations to look closely at the technology and apply it only when neces-
sary. In “Don’t use a blockchain unless you really need one,” Coindesk, a technology website special-
izing in cryptocurrency and blockchain news, technical matters and editorials, says, “Despite some of
the hype, blockchains are incredibly inefficient” (Hochstein, 2018).
Even software developers are urging organizations to examine the key aspects of the technology
before investing. One such developer published “Do You Need A Blockchain?” on the website C# Corner
(Chand, 2018). The author says trust is the cornerstone of blockchain but cautions those interested in the
technology to take a close look at what it offers.
Most of the advice is: investigate it and use it if it is appropriate—not because it is new.
• Data visibility:
• Permissioned blockchain networks may or may not reveal blockchain data publicly.
The data may only be available to those within the blockchain network. Data may be gov-
erned by policy or regulations (such as personally identifiable information (PII) or General
Data Protection Regulation (GDPR)). These types of data may or may not be appropriate to
store, even within a permissioned blockchain network.
• Permissionless blockchain networks can allow anyone to inspect and contribute to the
blockchain. The data are generally public. This leads to several questions that must be
considered. Do the data for the application need to be available to everyone? Is there any
harm to having public data?
• Full transactional history: Some blockchain networks provide a full public history of a digital
asset, from creation to every transaction in which it is included. This feature may be beneficial
for some solutions, but not for others.
• Fake data input: As multiple users are contributing to a blockchain, some could submit false
data, mimicking data from valid sources (such as sensor data). It is difficult to automate the
verification of data entering a blockchain network. Smart contract implementations may pro-
vide additional checks to help validate data where possible.
Cybersecurity and Risk 345
• Tamper-evident and tamper-resistant data: Many applications follow the “CRUD” (create,
read, update, delete) functions for data. With a blockchain, there is only “CR” (create, read).
There are methods that can be employed to “deprecate” older data if a newer version is
found, but there is no removal process for the original data. By using new transactions to
amend and update previous transactions, data can be updated while providing a full history.
However, even if a new transaction marks an older transaction as “deleted,” the data will
still be present in the blockchain data, even if it is not shown within an application process-
ing the data.
• Transactions per second: Transaction processing speed is highly dependent on the consen-
sus model used. Transactions on many permissionless blockchain networks are not exe-
cuted at the same pace as other information technology solutions because of the slow
publication time for blocks (usually in terms of seconds, but sometimes minutes). Thus,
some slowdown in blockchain-dependent applications may occur while waiting for data to
be posted. Organizations must ask if their application can handle relatively slow transac-
tion processing.
• Compliance: The use of blockchain technology does not exclude a system from following any
applicable laws and regulations. For example, legislation and policies tied to PII or GDPR
identify certain information that should not be placed on the blockchain. In addition, certain
countries may limit the type of data that can be transferred across its geographic boundary.
In other instances, certain legislation may dictate that the “first write” of financial transactions
must be written to a node within their borders. In any of these cases, a public permissionless
chain may be less appropriate, with a permissioned or hybrid approach required to satisfy regu-
latory needs. An additional example of laws and regulations is a blockchain network, which
manages government records. These types of records are subject to many laws and regulations.
Government agencies themselves must follow specific guidelines when utilizing blockchain
technology.
• Permissions: For permissioned blockchain networks, there are considerations related to the
permissions themselves
• Granularity: Do the permissions within the system allow enough granularity for specific
roles that users may need (in a manner like role-based access control methods) to perform
actions within the system?
• Permissioned blockchain networks allow more traditional roles such as administrator, user,
validator, auditor and so on.
• Administration: Who can administer permissions? Once permissions are administered to
a user, can they easily be revoked?
• Node diversity: A blockchain network is only as strong as the aggregate of all the existing nodes
participating in the network. If all the nodes share similar hardware, software, geographic loca-
tion and messaging schema, there is a certain amount of risk associated with the possibility
of undiscovered security vulnerabilities. This risk is mitigated by the decentralization of the
network of heterogeneous devices, defined as “the non-shared characteristics between any one
node and the generalized set.”
blockchain data cannot be altered by making later blocks and transactions act as updates or modifica-
tions to earlier blocks and transactions. This software abstraction allows for modifications to working
data, while providing a full history of changes. For some organizations, these are desirable features.
For others, these may not.
Blockchain technology is still new, and organizations should treat it like they would any other
technological solution at their disposal—use it only in appropriate situations (Yaga et al., 2018).
REFERENCES
A Role-Based Trusted Network Provides Pervasive Security and Compliance—Interview with Jayshree Ullal,
senior VP of Cisco.
ACT-IAC White Paper: Enabling Blockchain Innovation in the U.S. Federal Government, ACT-IAC, 2018a.
https://www.actiac.org/act-iac-white-paper-enabling-blockchain-innovation-us-federal-government.
ACT-IAC White Paper: Blockchain Playbook for the U.S. Federal Government, ACT-IAC, 2018b. https://
www.actiac.org/act-iac-white-paper-blockchain-playbook-us-federal-government.
Ananthi S., Sendil M. S., and Karthik S., Privacy preserving keyword search over encrypted cloud data,
Proceedings 1st Advances in Computing and Communications, Kochi, India, 2011, 480–487.
Bethencourt J., Sahai A., and Waters B., Ciphertext-policy attribute-based encryption, Proceedings IEEE
Symposium on Security and Privacy, Oakland, CA, 2007, 321–334.
Bhatia J., Breaux T. D., Friedberg L., Hibshi H., and Smullen D., Privacy risk in cybersecurity data sharing,
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016.
Blockchain Size, Blockchain.com, www.blockchain.com/charts/blocks-size. Accessed July 19, 2018.
Buck J., Blockchain Oracles, Explained. Cointelegraph, 2017. https://cointelegraph.com/explained/
blockchain-oracles-explained.
Cao N., Wang C., Li M., Ren K., and Lou W., Privacy preserving multi-keyword ranked search over encrypted
cloud data, Proceedings 30th IEEE INFOCOM, Shanghai, China, 829–837, 2011.
Chand M., Do You Need A Blockchain, C# Corner, 2018. https://www.c-sharpcorner.com/article/do-you-
need-a-blockchain2/.
Dark Reading: Automating Breach Detection For The Way Security Professionals Think, 2015.
de Vries A., Bitcoin’s growing energy problem, Joule, 2(5), 801–805, 2018. doi:10.1016/j.joule.2018.04.016.
Deetman S., Bitcoin Could Consume as Much Electricity as Denmark by 2020, Motherboard, 2016. https://
motherboard.vice.com/en_us/article/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020.
Dittrich D., Network monitoring/Intrusion Detection Systems (IDS) Archived 2006–08-27 at the Wayback
Machine, University of Washington.
Dong X., Li R., He H., Zhou W., Xue Z., and Wu H., Secure Sensitive Data Sharing on a Big Data Platform,
Tsinghua Science and Technology, 20(1), 72–80, 2015.
Do You Need a Blockchain? Do You Need a Blockchain? http://doyouneedablockchain.com/.
Fischer-Hübner, “Considering Privacy as a Security—Aspect: A Formal Privacy-Model,” DASY PAPERS
No.5/95, Institute of Computer and System Sciences (DASY), Copenhagen Business School, 1995.
Gentry C., A fully homorphic encryption scheme, PhD dissertation, Stanford University, California, 2009.
Gralla P., How the Internet Works, Que Pub, Indianapolis, IN, 2007.
Greenspan G., The Blockchain Immutability Myth, CoinDesk, 2017a. https://www.coindesk.com/
blockchain-immutability-myth/.
Greenspan G., The Blockchain Immutability Myth, MultiChain, 2017b. https://www.multichain.com/blog/
2017/05/blockchain-immutability-myth/.
Guidelines for Smart Grid Cyber Security. National Institute of Standards and Technology. August 1, 2010.
Retrieved March 30, 2014.
Hash per Second, Bitcoin Wiki, http://en.bitcoin.it/wiki/Hash_per_second.
Hern A., Bitcoin mining consumes more electricity a year than Ireland, The Guardian, 2017. https://www.
theguardian.com/technology/2017/nov/27/bitcoin-mining-consumes-electricity-ireland.
Hochstein M., Don’t Use a Blockchain Unless You Really Need One, CoinDesk, CoinDesk, 2018. https://
www.coindesk.com/dont-use-blockchain-unless-really-need-one/.
Honeypots, Honeynets. Honeypots.net. May 26, 2007. Retrieved September 12, 2011.
Cybersecurity and Risk 347
Hong C., Zhang M., and Feng D., AB-ACCS: A cryptographic access control scheme for cloud storage, (in
Chinese), Journal of Computer Research and Development, 47(1), 259–265, 2010.
How Is the Address of an Ethereum Contract Computed? Ethereum Stack Exchange, 2016. https://ethereum.
stackexchange.com/questions/760/how-is-the-address-of-an-ethereum-contract-computed.
Hu H., Xu J., Ren C., and Choi B., Processing private queries over untrusted data cloud through privacy homo-
morphism, Proceeding 27th IEEE International Conference on Data Engineering, Hannover, Germany,
pp. 601–612, 2011.
https://medium.com/@kleffew/truthpoint-angelhacks-dc-submission-5569252d795a.
IETF RFC 1991, PGP Message Exchange Formats, 1996. http://www.ietf.org/rfc/rfc1991.txt?number=1991.
IETF RFC 2311, S/MIME Version 2 Message Specification, 1998. http://www.ietf.org/rfc/rfc2311.txt?number=2311.
IETF RFC 4252, The Secure Shell (SSH) Authentication Protocol, 2006. http://www.ietf.org/rfc/rfc4252.
txt?number=4252.
IETF RFC 854, TELNET Protocol Specification, 1983. http://www.ietf.org/rfc/rfc0854.txt?number=854.
IETF RFC 959, File Transfer Protocol (FTP), 1985. http://www.ietf.org/rfc/rfc0959.txt?number=959.
ITU-T X.1205, Overview of cybersecurity, 2008.
Landscaping for security. Sunset. 1988. Archived from the original on July 18, 2012.
Lamport L. The part-time parliament. ACM Transactions on Computer Systems, 16(2), 133–169, 1997. https://
dl.acm.org/citation.cfm?doid=279227.279229.
LDAP.com. LDAP.com, https://www.ldap.com.
Li J., Zhao G., Chen X., Xie D., Rong C., Li W., Tang L., and Tang Y., Fine-grained data access control sys-
tems with user accountability in cloud computing, Proceedings 2nd International Conference on Cloud
Computing, Indianapolis, IN, pp. 89–96, 2010.
Loh T., Bitcoin’s Power Needs May Be Overblown, Bloomberg.com, Bloomberg, 2018. https://www.bloomberg.
com/news/articles/2018–01-16/bitcoin-s-power-needs-may-be-overblown-recalling-pot-growing.
Majority Attack, Bitcoin Wiki, https://en.bitcoin.it/wiki/Majority_attack.
Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. https://bitcoin.org/bitcoin.pdf.
Narayanan A., Analyzing the 2013 Bitcoin fork: Centralized decision-making saved the day, MultiChain.
2015. https://freedom-to-tinker.com/2015/07/28/analyzing-the-2013-bitcoin-fork-centralized-decision-
making-saved-the-day.
Narayanan A., Bonneau J., Felten E., Miller A., and Goldfede, S., Bitcoin and Cryptocurrency Technologies:
A Comprehensive Introduction, Princeton University Press, 2016.
National Institute of Standards and Technology (NIST), Secure Hashing website, https://csrc.nist.gov/projects/
hash-functions.
National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information Processing
Standards (FIPS), 2015. doi:10.6028/NIST.FIPS.180–4.
National Institute of Standards and Technology, SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, Federal Information Processing Standards (FIPS), 2015. doi:10.6028/
NIST.FIPS.202.
Peck, M. E., Do You Need a Blockchain? IEEE Spectrum: Technology, Engineering, and Science News, IEEE
Spectrum, 2017. https://spectrum.ieee.org/computing/networks/do-you-need-a-blockchain.
Power Compare, https://powercompare.co.uk/bitcoin/.
Recommendation ITU-T X.800, Security architecture for Open Systems Interconnection for CCITT applica-
tions, 1991.
Recommendation ITU-T X.805, Security architecture for systems providing end-to-end communications,
2003.
Rhee M. Y., Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley, Chichester, UK,
2003.
Special Report Cybersecurity operational technology. Sponsored by Wurldtech a GE Company.
Wang L., Wang L., Mambo M., and Okamoto E., New identity-based proxy re-encryption schemes to prevent
collusion attacks, Proceedings 4th International Conference Pairing-Based Cryptograghy-Pairing,
Ishikawa, Japan, pp. 327–346, 2010.
Wüst K., and Gervais A., Do You Need a Blockchain? IACR ePrint Archive, 2017. https://eprint.iacr.
org/2017/375.pdf.
348 Handbook of Industry 4.0 and SMART Systems
Yaga D., Mell P., Roby N., and Scarfone K., Blockchain technology overview, National Institute of Standards
and Technology, pp. 5–17, 2018.
Yu S., Wang C., Ren K., and Lou W., Attribute based data sharing with attribute revocation, Proceedings5th
ACM Symposium on Information, Computer and Communications Security, Beijing, China,
pp. 261–270, 2010.
Zeldovich N., Boyd-Wickizer S., and Mazieres D., Securing distributed systems with information flow con-
trol, Proceedings 5th USENIX Symposium on Networked Systems Design and Implementation, San
Francisco, CA, pp. 293–308, 2008.
9
Industry 4.0 across the Sectors
CONTENTS
9.1 Introduction................................................................................................................................... 350
9.1.1 Industry 4.0 in an Era of Information Technology and Open Market Operations............351
9.1.2 Industry 4.0 and Innovation...............................................................................................351
9.1.3 Industry 4.0 Initiatives around the World.........................................................................352
9.2 Transportation 4.0: Multimodal Transportation Systems..............................................................353
9.2.1 The Connected Experience...............................................................................................353
9.2.2 Keeping Passengers Connected.........................................................................................353
9.2.3 Laying the Groundwork with Open Data and Application
Programming Interface (API).......................................................................................... 354
9.2.4 Safeguarding the Network................................................................................................ 354
9.2.5 A Glimpse into the Future................................................................................................ 354
9.2.5.1 Transport 4.0: How IoT Will Transform the Future of Travel.......................... 354
9.3 Rail 4.0...........................................................................................................................................355
9.3.1 SmartRail 4.0: The Railway of the Future........................................................................355
9.3.2 Digital Transformation of Railways..................................................................................355
9.3.2.1 Digital Business (DB) 4.0: Investing in Start-Ups............................................ 356
9.4 Manufacturing 4.0: Challenges and Accelerators......................................................................... 356
9.5 Logistics 4.0.................................................................................................................................. 357
9.5.1 Technological Applications.............................................................................................. 358
9.5.1.1 Resource Planning............................................................................................ 358
9.5.1.2 Warehouse Management Systems..................................................................... 358
9.5.1.3 Transportation Management Systems............................................................... 358
9.5.1.4 Intelligent Transportation Systems................................................................... 359
9.5.1.5 Logistics and Information Security.................................................................. 360
9.5.2 Logistics 4.0: Autonomous Decisions and Applications...................................................361
9.5.3 Logistics 4.0 and Supply Chain 4.0: From Data and Autonomous Decisions to
Intelligence and Actions���������������������������������������������������������������������������������������������������361
9.5.4 The Road Ahead for Logistics 4.0 and Supply Chain 4.0.................................................361
References............................................................................................................................................... 362
LIST OF FIGURES
349
350 Handbook of Industry 4.0 and SMART Systems
9.1 Introduction
Great Britain led the first industrial revolution with the invention of the commercial steam engine.
The invention revolutionized communication and transportation and led to many other industrial devel-
opments, not just in Britain but around the world. In the second industrial revolution, the United States
was primarily in the lead, with the telephone revolutionizing communication this time. In the third
industrial revolution, the Internet was the key factor; it succeeded because it was conceived as a public
infrastructure technology, not a proprietary technology (Carr, 2003). The Internet has transformed the
world economic landscape, and this transformation is expected to continue with the development of
Internet of Things (IoT), arguably the driver of the fourth industrial revolution, or Industry 4.0. Rifkin
(2014) emphasizes connectivity in his anticipation of a collaborative economy that will replace the capital
system in its current form—with the IoT as the main driver. In effect, the rapid progress of smart things
is paving the way to a more collaborative world (Kanter and Litow, 2009).
Previous industrial revolutions have resulted in economic growth, increased productivity, and
advanced welfare in those countries that managed to reap most of its positive impact, including from
high-quality goods and services. However, wealth distribution has not been equitable, certainly not at
the global level, and inequality is a key challenge in today’s world, along with climate change and other
sustainability issues. The rapid depletion of Earth’s resources at the expense of the future of society
and the environment has created an epic global challenge. Concepts such as sustainability and social
innovation have surfaced and are a major global concern. The United Nations’ global initiative toward
sustainable development goals has sent a strong message on the need to commit to inclusive social and
economic development (Morrar et al., 2017). Innovative efforts in using, for instance, the sustainable
livelihood approach to link socioeconomic and environmental issues represents a step in this direction
(Brocklesby and Fisher, 2003).
Industry 4.0 is no exception to the previous industrial revolutions, and like its predecessors, it is expected
to bring immense benefits while posing many challenges. Arguably, the main challenge is cybersecurity.
There is an immense risk of cybercrime due to increased connectivity. The IoT is the backbone of Industry
4.0, and it has the potential to increase the level risk dramatically from where we are today. Moreover, the
rate of technological development in Industry 4.0 is exponential; therefore, anticipating the challenges
or even the benefits is much more difficult than in the previous industrial revolutions. This increased dif-
ficulty is due to the high convergence of technologies that could complement or compete with different
possible diffusion scenarios, resulting in frequent and difficult to forecast breakthroughs. With the speed
of progress, policies and regulations may not be able to address unexpected consequences or develop-
ments, especially if they remain non-global and reactive (Morrar et al., 2017).
Job losses are also likely to occur with the automation of large segments of operations in many indus-
tries. Although new opportunities may appear for high-skill categories, as argued by Drucker (2014),
the volume of these new jobs may not meet the supply of labor. In addition to automation, the rapid
development and recent successes of artificial intelligence in business domains are changing the nature of
the workplace. IBM has already developed new system solutions; Watson of IBM is a striking example
(Waters, 2016).
Technological and business-driven innovative solutions are not going to be enough to handle the pos-
sible downside of Industry 4.0. Innovation in its broadest sense is the key solution, in particular, social
innovation. The drive to innovate technologies to increase productivity can be utilized to improve wel-
fare and societal needs of the world population (Morrar et al., 2017).
Industries around the world are facing tremendous pressure to deliver products to match their com-
petitors. In effect, Industry 4.0 is transforming the industry from a manufacturing to a service busi-
ness model (Vijaykumar et al., 2015). In today’s dynamic environment, companies need to monitor and
control things in new ways to retain a competitive edge. For example, Industry 4.0 has a cyber-physical
architecture; sensors permit self-aware and self-predictive behavior. The equipment has the potential to
monitor its own degradation, leading to production efficiency, maximum uptime and predictive health
monitoring. Networked manufacturing systems will be able to provide worry-free productivity because
of their ability to self-configure, self-maintain and self-organize.
Industry 4.0 across the Sectors 351
A problem yet to be addressed is security. Digital ecosystems are pervasive, but they can only function
efficiently if all parties involved can trust in the security of their data and communication, as well as the
protection of their intellectual property.
9.1.1 Industry 4.0 in an Era of Information Technology and Open Market Operations
Schmitt (2013) lists five reasons why Industry 4.0 is revolutionary in an era of information technology
and open market operations:
1. Industry 4.0 mitigates the burden of current challenges for manufacturers to make their compa-
nies more flexible and responsive to business trends. These challenges include increasing mar-
ket volatility, shorter product lifecycles, higher product complexity, and global supply chains.
For example, smart items will bring stronger integration of the top floor and shop floor, adding
intelligence and flexibility to production.
2. Industry 4.0 enables innovation and hence increases productivity. It is expected that the use
of modern technologies such as digital chains, smart systems, and the Industrial Internet will
speed up innovation, as new business models can be implemented much faster.
3. Industry 4.0 highlights the role of consumer as a co-producer and puts the consumer in the center of
all activities. The customization of products is the most important activity in the product value chain,
and digitization will facilitate crowdsourcing, which, in turn, will lead to a faster design process.
4. Industry 4.0 puts humans in the center of production. Workers will be assigned where help is
needed; hence, there will be more demand in the workforce for skills in managing complex
projects, yet more flexible work will also become available.
5. Industry 4.0 will enable sustainable prosperity through the use of modern technologies to find
solutions to the challenges related to energy, resources, environment, and social and economic
impact. Innovative solutions will reduce energy consumption, help companies sustain their
business with existing and new business models and use new technologies to produce all over
the world (even at high-cost locations) close to the markets utilizing the domestic workforce
skills (Morrar et al., 2017).
Acatech (2014) describes Industry 4.0 in terms of IoT; more specifically, the data and services enabled by
the IoT will change future production, logistics and work processes. The IoT has gone beyond Internet-
connected applications in recent years with the integration of various technologies such as machine learn-
ing, embedded systems and wireless connection. The European Research Cluster on the Internet of Things
(IERC) (Vermesan et al., 2009) states that the IoT is “an integrated part of future Internet and could be
defined as a dynamic global network infrastructure with self-configuring capabilities based on standard
and interoperable communication protocols where physical and virtual ‘things’ have identities, physical
attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the
information network.” European Research Cluster on the Internet of Things adds that “things” in the IoT
“are expected to become active participants in business, information and social processes where they are
enabled to interact and communicate among themselves and with the environment by exchanging data
and information ‘sensed’ about the environment, while reacting autonomously to the ‘real/physical world’
events and influencing it by running processes that trigger actions and create services with or without direct
human intervention.” The main goal of the IoT is to “enable things to be connected anytime, anyplace, with
anything and anyone ideally using any path/network and any service” (Vermesan et al., 2014).
Industry 4.0 represents a shift toward an innovation-based economy with knowledge, data, and the
IoT as central concepts. This will change the structures, markets and business processes of the industrial
age and pave the way for a new age of digitization, the “smarter” networking of production systems and
interlinked business processes (Morrar et al., 2017).
In the new industrial revolution, traditional competitive factors such as market share, economies of
scale, and access to resources are now linked or joined with other factors such as innovation, intellec-
tual property rights, smart technology and access to knowledge (Geiger and Sá, 2013). The role of the
consumer is changing as well; the availability of relevant information for both consumers and business
units allows more interactive relationships so that consumer needs can be better fulfilled. The consum-
er’s role in the production process is vital: consumers are now co-producers. They have become more
outcome-oriented (Geiger and Sá, 2013), and the “make-for-me” approach represents a new business
model. Radical process innovation is associated with the technological revolution and the new con-
sumer model; tailored production will replace industrial or mass-manufacturing facilities (Buhr, 2015).
These trends have contributed to the emerging concept of mass customization in manufacturing (Da
Silveira et al., 2001). Many firms have started to introduce new marketing interfaces and manufacturing
processes to meet the customized customers’ requirements. For example, consumers now define exactly
what they need. Companies are expected to modify their business models and insert flexible value
chains to respond to the changes in consumer behavior. A smart factory with smart production systems
will cope with such demand while maintaining high-quality products and services (Morrar et al., 2017).
FIGURE 9.1 Industry 4.0 across the globe—main initiatives, partnerships and influences as of March 2017. (From i-SCOOP,
Industry 4.0: the fourth industrial revolution—guide to Industrie 4.0., 2016, available at: https://www.i-scoop.eu/industry-
4-0/#Industry_40_has_gone_global_Industrie_40_initiatives_and_evolutions_around_the_world, Accessed: October 19, 2018.)
Industry 4.0 across the Sectors 353
However, the global expansion of Industry 4.0 is not just a matter of government initiatives or agree-
ments. It is also a result of an increasing focus among industrial giants and leading consulting firms on
Industry 4.0, with new partnerships driving the Industry 4.0 concept further across the globe. There is
also an increasing adoption of Industry 4.0 principles and technologies across vertical markets beyond
manufacturing (healthcare, utilities, smart cities, oil and gas, etc.) (i-SCOOP, 2016).
9.2.5.1 Transport 4.0: How IoT Will Transform the Future of Travel
• Interconnected travel experience;
• Connected passengers;
• Open data and APIs;
• Network protection (Qulix Systems, 2017).
Industry 4.0 across the Sectors 355
• IoT,
• Cloud computing,
• Big Data analytics, and
• Automation and robotics.
The adaptation to the new conditions of the digital economy is marked by the emergence of the concept
Industry 4.0 and more recently by Railway 4.0 and digital railway. Mobile applications, e-ticketing, digi-
tal train control, signaling and traffic management, and digital platforms for predictive maintenance are
key areas of digitalization in the rail sector.
New products and services are becoming an integral part of the operations of railways, infrastructure
managers and manufacturers for the industry. As such, they contribute to the creation of added value
for multiple stakeholders in public transport initiatives, which facilitates the implementation of new
concepts of mobility.
356 Handbook of Industry 4.0 and SMART Systems
FIGURE 9.2 DB 4.0—Concept of digital transformation. (From Pieriegud, J., Digital Transformation of Railways,
Department of Transport SGH Warsaw School of Economics, Siemens Sp. Z O.O., Poland, 2018.)
Railway companies in different countries have developed digitalization program. Solutions proposed
within such initiatives as the Shift2Rail public-private partnership and UIC Digital Platform promote
digital transformation of railways on a European scale (Pieriegud 2018).
To address these priorities, DB is prepared to continue its investment in the development of start-ups.
Between 2015 and 2016, the implementation of the concept crowdsourcing allowed DB to launch a num-
ber of initiatives to create innovative solutions that monitor and analyze the customers’ expectations and
emotions. These include DB Mindbox, Zukunft Bahn, Skydeck and D-Lab. The coordination of these proj-
ects is a responsibility of the newly created entity DB Digital Ventures GmbH—the start-up ZERO.ONE.
DATA—initiated by DB Systel launched the DataBOX data exchange platform. One of the most recent
initiatives is the Beyond1435 program, a start-up co-launched by the Plug and Play platform. In collabora-
tion with Hyperloop TT, DB is developing a prototype of a train with augmented windows, with the envis-
aged completion year 2018. Finally, DB is looking to introduce autonomous trains into regular scheduled
service by 2021. Consideration is also being given to the feasibility of the development of autonomous
cars to be used by railway passengers to reach the train station or their final destination (Pieriegud 2018).
role in the manufacturing industry, with advanced data analytics, digital twins, industrial robots and col-
laborative robots or cobots (i-SCOOP, 2016 (b)). In addition, the changing expectations of consumers are
impacting the entire supply chain (i-SCOOP, 2016 (b)). Other drivers include enhanced efficiency, cost
reduction and innovation and the development of new revenue sources in an age where data and how they
are leveraged are the currency of automation, optimization and profound transformation.
Just like many other industries, the manufacturing industry is diverse, with different sectors moving at
different speeds. While, in general, digital transformation strategy has been missing and initiatives have
been ad hoc, things are changing but a holistic picture is still missing, and the goals remain relatively
traditional and isolated.
The main drivers or challenges or opportunities for digital transformation and manufacturing are the
following (i-SCOOP, 2016 (b)):
• An uncertain macroeconomic and geopolitical context where risk needs to be managed, and
cost reductions and enhanced efficiencies are a necessity (read: automation).
• A more complex and connected supply chain where data or information and speed are key.
• The need to better understand the possibilities and benefits that can be achieved. While this is a
strategic and information matter, it also requires manufacturing companies to understand tech-
nological enablers of new opportunities, such as digital twins, robotics, artificial intelligence
and 3D printing to name a few—within their benefit, use case and holistic context.
• A changing customer with an increasing need to be not only more customer-centric but also be
more customer-adaptive and innovative.
• A highly competitive landscape in which faster movers are poised to gain advantages and even
become disruptive.
• The need to diversify and tap into new revenue sources, leveraging new ecosystems, and (con-
nected) data, to thrive and in some cases survive.
• A lack of clear vision and of a strategic holistic approach to tap into the revenue growth and new
revenue source potential of Industry 4.0.
• The human talent dimension in an altering reality where technology and innovation play more
profound roles; in many important areas (data, industrial IoT, convergence of IT and OT, new
business models, etc.), neither the talent nor the culture is ready to take the necessary steps.
• Resource planning,
• Warehouse management systems,
• Transportation management systems,
• Intelligent transportation systems, and
• Information security.
these and other capabilities, TMS has become a popular choice for companies of all sizes and across
all industries (Barreto et al., 2017).
With the massive use of IoT, and in the context of Industry 4.0, a TMS is an essential element in the
concept of Logistics 4.0. Logistics 4.0 uses real-time and inline data to achieve more efficiency and
effectiveness in a logistic process. A TMS is important for a company to be able to use GPS technology
to accurately locate its own vehicles while they’re on the road, monitor freight movement, negotiate with
carriers, consolidate shipments and use the platform’s advanced functionalities and interact with intel-
ligent transportation systems (ITSs).
Transportation management system functionalities continue to expand every year. In the near future,
more companies will adopt these systems to improve overall transportation management and customer
service. With the increased offers in cloud services and cloud computing, cloud-based TMS is becoming
the standard. The most important software houses are rapidly moving their TMS solutions to the cloud,
thus drastically reducing the number of on-premise installs (Cunnane 2017).
TMS solutions are redefining companies’ strategies. They offer the following advantages:
IoT and TMS will play an increasingly important role in the transportation and logistics industries
(Atzori et al., 2010). As more and more physical objects are equipped with bar codes, RFID tags or
sensors, transportation and logistics companies can conduct real-time monitoring of the movement of
physical objects from an origin to a destination across the entire supply chain, including manufacturing,
shipping and distribution. IoT is also offering promising solutions to transform transportation systems
and automobile services (Qin et al., 2013). As vehicles have increasingly powerful sensing, networking,
communication and data processing capabilities, IoT technologies can be used to enhance these capabili-
ties and share under-utilized resources among vehicles in the parking space or on the road. For example,
IoT technologies make it possible to track each vehicle’s existing location, monitor its movement and
predict its future location.
A well-defined and configured TMS, interacting with IoT devices, or a “Smart TMS,” will increase
the decision-making quality of management and make the SCM more and more flexible and efficient,
leading to a full Logistics 4.0 operation (Barreto et al., 2017).
• ITSs are important for increasing safety, reliability and traffic flow;
• ITSs are important for reducing risks, accident rates, carbon emissions and air pollution;
• An ITS provides solutions for cooperation and a reliable platform for transport. Electronic toll
collection, highway data collection, traffic management systems (TMS), vehicle data collec-
tion, transit signal priority and emergency vehicle preemption are some applications;
• An ITS can be implemented in navigation systems, air transport systems, water transport sys-
tems and rail systems;
360 Handbook of Industry 4.0 and SMART Systems
• The most recent generation of ITS, generation 4.0, makes use of multimodal systems incorpo-
rating personal mobile devices, vehicles, infrastructure and information networks for system
operations, and personal contextual mobility solutions (Sorensen 2012);
• ITS plays an important role in cooperative systems technologies, to support and enhance the
logistic process and the effectiveness of the fleet to substantially improve the results of the
transportation community, economically and in sustainability;
• An ITS using real-time and in-line data gathered through vehicular ad hoc networks (VANET)
systems (Hartenstein and Laberteaux 2010), sensor networks, drone points and business intelli-
gence systems will increase the decision-making quality of management and become more and
more flexible and efficient in the near future, improving the efficiency of logistics through the
convergence of machine-to-machine communication and cooperative systems technologies.
Thinking in terms of Logistics 4.0, a fully operational ITS environment can be used for:
• Organizations usually start by identifying security controls according to their business needs
and the associated security requirements. The security requirement should be clearly defined in
the information security policy. The security policy dictates the set of controls that will provide
the required protection (Bishop et al., 2004).
Industry 4.0 across the Sectors 361
• Monitoring and evaluating the implemented controls are crucial to determine if they are per-
forming as expected, i.e., controls are in place, are designed appropriately, are operating effec-
tively and are monitored regularly, in an effort to reduce risk exposure (Barreto et al., 2017).
Many companies are seeking to become certified. Certification enables organizations to comply with
increasing demands from financial institutions and insurance companies for security audits. It also
promotes trust in an organization’s capacity to implement appropriate security controls to manage and
protect confidential and sensitive client and business information.
The International Organization for Standardization/International Electrotechnical Commission Joint
Technical Committee (ISO/IEC_JTC1) has published the ISO/IEC 27000 family of standards, while
National Institute of Standards and Technology provides a series of publications, particularly the 800-series,
which include information on computer security (ISO/IEC_JTC1 2009; NIST 1996). These standards are
an important reference in the security information domain. They share many concepts and offer guidance
on security protection; consequently, their adoption enables organizations to demonstrate their commit-
ment to secure information assets and to ensure confidentiality and integrity of customer information.
They also provide their business partners and clients with greater confidence in their capacity to prevent
and rapidly recover from any interruptions to production or service levels (Barreto et al., 2017).
FIGURE 9.3 Smart logistics and supply chain. (From i-SCOOP, Logistics 4.0 and smart supply chain management in
Industry 4.0, 2016(a), Available at: https://www.i-scoop.eu/industry-4-0/supply-chain-management-scm-logistics/, Viewed:
October 19, 2018.)
(semi-)autonomous decisions and logistical assets such as self-driving trucks and so on, the role of people
in SCM is far from over (i-SCOOP 2016 (a)).
In the end, however, the traditional pyramids in SCM and logistics will be disrupted. The road ahead
is one of more autonomy across various logistics components such as supply chain logistics, inbound
logistics, warehouse management, intralogistics or line feeding, outbound logistics and logistics routing.
One of the best images depicting the evolution toward more autonomy across all these areas is the
roadmap image from UNITY Consulting and Innovation shown in Figure 9.3. A highly autonomous,
flexible and predictive picture is painted in later stages, up to the point where there is no warehouse in
the supply chain (i-SCOOP 2016 (a)).
REFERENCES
Acatech, Acatech-Plattform Industrie 4.0. Whitepaper FuE Themen, 2014. https://www.acatech.de/allge-
mein/die-plattform-industrie-4-0-definiert-industrie-4-0-und-die-vordringlichen-forschungsthemen/.
Accessed October 18, 2018.
Atzori L., Iera A., and Morabito G., The Internet of Things: A survey, Computer Networks, 54 (15), 2787–
2805, 2010.
Barreto L., Amaral A., and Pereira T., Industry 4.0 implications in logistics: An overview, Manufacturing
Engineering Society International Conference 2017, MESIC 2017, Vigo (Pontevedra), Spain,
28–30, 2017.
Bishop M., Introduction to Computer Security, 2nd edition, Addison-Wesley Professional, Boston, MA, 2004.
Bosworth S., and Kabay M. E., Computer Security Handbook, 4th edition, Wiley, New York, 2002.
Brocklesby M. A., and Fisher E., Community development in sustainable livelihoods approaches: An intro-
duction, Community Development Journal, 38(3), 185–198, 2003.
Industry 4.0 across the Sectors 363
Buhr D., Social Innovation Policy for Industry 4.0, Eberhard Karls University of Tübingen, Tübingen,
Germany, 2015.
Carr N., It doesn’t matter, Harvard Business Review, 81(5), 41–49, 2003.
Cunnane C., Logistics Viewpoints. Read: Think—Share, 2017. https://logisticsviewpoints.com/author/chris-
cunnane/. Accessed October 19, 2018.
Da Silveira G., Borenstein D., and Fogliatto F. S., Mass customization: Literature review and research direc-
tions, International Journal of Production Economics, 72(1), 1–13, 2001.
DHL Trend Research, Internet of Things in Logistics. A collaborative report by DHL and Cisco on implica-
tions and use cases for the logistics industry, 2015. https://discover.dhl.com/content/dam/dhl/down-
loads/interim/preview/updates/dhl-trend-report-internet-of-things-preview.pdf. Accessed October 19,
2018.
Drucker P., Innovation and Entrepreneurship, Routledge, New York, 2014.
ENISA (The European Network and Information Security Agency), The New User’s Guide: How to Raise
Information Security Awareness, Luxembourg, 2010.
Geiger R., and Sá C., Tapping the Riches of Science: Universities and the Promise of Economic Growth,
Harvard, Cambridge, MA, 2013.
Goodrich M., and Tamassia R., Introduction to Computer Security, 2nd edition, Pearson Education, Harlow,
UK, 2014.
Hartenstein H., Laberteaux K., VANET (Vehicular Applications and Inter-Networking Technologies), 1st
edition, Wiley Publication, London, UK, 2010.
HIMA, Rail 4.0: Digital Transformation in the Rail Sector, 2018. https://www.hima.com/en/rss-news-sucess-
stories/article/rail-40-digital-transformation-in-the-rail-sector/. Accessed October 18, 2018.
i-SCOOP, Digital transformation in the manufacturing industry: challenges and accelerators. 2016b. https://
www.i-scoop.eu/digital-transformation/digital-transformation-manufacturing/. Accessed October 19, 2018.
i-SCOOP, Industry 4.0: the fourth industrial revolution: Guide to Industrie 4.0, 2016. https://www.i-scoop.eu/
industry-4-0/#Industry_40_has_gone_global_Industrie_40_initiatives_and_evolutions_around_the_
world. Accessed October 19, 2018.
i-SCOOP, Logistics 4.0 and smart supply chain management in Industry 4.0., 2016a. https://www.i-scoop.eu/
industry-4-0/supply-chain-management-scm-logistics/. Accessed October 19, 2018.
ISO/IEC_JTC1, ISO/IEC FDIS 27000, Information Technology: Security Techniques: Information Security
Management Systems—Overview and Vocabulary, ISO: Geneva, Switzerland, 2009.
Kanter R. M., and Litow S. S., Informed and Interconnected: A Manifesto for Smarter Cities, Working Paper
09-141, Harvard Business School, 2009.
KPMG, The Factory of the future: Industry 4.0: The challenges of tomorrow, 2016. https://assets.kpmg.com/
content/dam/kpmg/es/pdf/2017/06/the-factory-of-the-future.pdf. Accessed October 19, 2018.
McKinsey Digital, 2015. Industry 4.0 How to navigate digitization of the manufacturing sector, 2015. https://www.
mckinsey.com/~/media/McKinsey/Business%20Functions/Operations/Our%20Insights/Industry%20
40%20How%20to%20navigate%20digitization%20of%20the%20manufacturing%20sector/Industry-40-
How-to-navigate-digitization-of-the-manufacturing-sector.ashx. Accessed October 19, 2018.
Morrar R., Arman H., and Mousa S., 2017. The fourth industrial revolution (Industry 4.0): A social innovation
perspective, Technology Innovation Management Review, 7(11), 12–20, 2017.
Müller J. P., Ketter W., Kaminka G., Wargner G., and Bulling N., A multiagent system perspective on industry
4.0 supply networks, Conference on Multiagent Systems Technologies, 2015.
Muraine R., Transportation 4.0: Multimodal transportation systems. Global Sales Director, Transport, Alcatel
Lucent. 2018. https://www.gigabitmagazine.com/ai/transportation-40-multimodal-transportation-systems.
Accessed October 18, 2018.
NIST, SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology
Systems, 1996. https://csrc.nist.gov/publications/detail/sp/800-14/archive/1996-09-03. Accessed
October 20, 2018.
Pieriegud J., Digital Transformation of Railways, Department of Transport SGH Warsaw School of Economics.
Siemens Sp. Z O.O., Poland, 2018.
Qin E., Long Y., Zhang C., Huang L., International Conference on Human Interface and the Management
of Information- HIMI 2013. Human Interface and the Management of Information. Information and
Interaction for Health, Safety, Mobility and Complex Environments, 173–180, 2013.
364 Handbook of Industry 4.0 and SMART Systems
Qulix Systems, Transport 4.0: How IoT Will Transform the Future of Travel. Based on “Transport 4.0: Providing
door-to-door travel in a multimodal transportation system,” 2017. https://www.qulix.com/about/blog/
transport-4-0-how-iot-will-transform-the-future-of-travel/. Accessed October 19, 2018.
Rifkin J., The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the
Eclipse of Capitalism, St. Martin’s Press, New York, 2014.
SBB (Swiss Federal Railways), SmartRail 4.0: the railway of the future. 2018. September 19, 2018. https://
company.sbb.ch/en/sbb-as-business-partner/innotrans-2018/topics/smartrail.html. Accessed October 19,
2018.
Schmitt K., Top 5 Reasons Why Industry 4.0 Is Real and Important. Digitalist Magazine. October 15, 2013.
https://www.digitalistmag.com/industries/manufacturing-industries/2013/10/15/top-5-reasons-industry-
4-0-real-important-0833970. Accessed October 18, 2018.
Schrauf S., and Berttram P., Industry 4.0: How digitization makes the supply chain more efficient, agile, and
customer-focused. PWC Report, 2016.
Sorensen J., Review of Existing Literature and Deployment Tracking Surveys Decision Factors Influencing
ITS Adoption. U.S. Department of Transportation, 2012.
Uckelmann D., Definition approach to smart logistics, Wireless Advanced Networking, Springer, Berlin,
Germany, 2008.
Vermesan O., Friess P., Guillemin P., and Sundmaeker H., Internet of Things strategic research and innova-
tion agenda. In Internet of Things Applications—From Research and Innovation to Market Deployment
(O. Vermesan, and P. Friess eds., pp. 7–142), Rivers Publishers, Gistrup, Denmark, 2014.
Vermesan O., Friess P., Guilleman P., Gusmeroli S., Sundmaeker H., Bassi A., Jubert I. S. et al., Internet of
Things: Strategic Research Roadmap, European Commission, Information Society and Media DG;
Cluster of the European Research Projects on the Internet of Things (CERP-IoT), Brussels, Belgium,
2009.
Vijaykumar S., Saravanakumar S. G., and Balamurugan M., Unique sense: Smart computing prototype for
industry 4.0 revolution with IOT and bigdata implementation model, Indian Journal of Science and
Technology, 8(35), 2015. doi:10.17485/ijst/2015/v8i35/86698.
Waters R., Artificial Intelligence: Can Watson Save IBM? Financial Times, 2016.
Index
Note: Page numbers in italic and bold refer to figures and tables, respectively.
365
366 Index
platforms, 160–161 X
potential synergies, 166
types, 159, 163–164 XaaS, see Everything as a Service (XaaS)
wireless sensor networks (WSNs), 83 XML, see Extensible Markup Language (XML)
WMSs, see warehouse management systems (WMSs)
WSAN, see wireless sensor and actuator network Y
(WSAN)
Youseff’s five-layer ontology, 132–133