Professional Documents
Culture Documents
Digital Twin Architecture and Standards
Digital Twin Architecture and Standards
net/publication/337673936
CITATIONS READS
0 245
3 authors:
Somayeh Malakuti
ABB
53 PUBLICATIONS 242 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Somayeh Malakuti on 02 December 2019.
Authors:
K. Eric Harper
Senior Principal Scientist Dr. Somayeh Malakuti
ABB Corporate Research, US Senior Scientist
eric.e.harper@us.abb.com ABB Corporate Research, Germany
somayeh.malakuti@de.abb.com
Dr. Christopher Ganz
VP Digital Research and Development
ABB
christopher.ganz@ch.abb.com
Feature Functionality
Document All documents (drawings, instructions, etc.) associated to
management equipment throughout its lifecycle
Digital representation of the equipment that can mimic
Model
properties and behaviors of a physical device
3D Properties of a physical device (measured or simulated)
representation mapped to a 3D digital representation
Representation of a physical device in a simulation
Simulation
environment to study its behavior
Standardized data model for connectivity, analytics, and/or
Data model
visualization
Graphical representation of the object either on a supervisory
Visualization
screen or personal device
Model Alignment of a model with real world parameters (potentially
synchronization in real-time)
Connected Algorithms and computational results based on measured
analytics properties of a physical device
Document Operation
PLM PLM Service record
management instructions
Physical
Model Optimization Diagnostics
properties predict
Virtual
Simulation Design simulation
commissioning
3D Manufacturing Service
Design drawings
representation instructions instructions
Production Operational
Data model Engineering data Service data
data data
New industrial assets can be designed using the production process, optimization re-
simulation tools and physical models to calibration and customization directives for
precisely predict behavior. Physical specific deliverables.
properties (electromagnetic, thermal,
A heterogeneous ecosystem for processing
pressure, stress, etc.) are mapped to the
comes into play in all these phases and data
design model to optimize the device’s
flows. Process measurement is associated
performance. This approach requires
with its equipment type, converted to
knowledge of the environment and its
engineering units and validated for accuracy.
effects.
Data is acquired using many different
Digital twins are composable, where protocols and temporary repositories. Each
components interact with each other in the component vendor has their own (legacy,
physical world. In discrete processes, hosted) platform for historical data and
components are reasonably decoupled applications—for example, analysis that
which allows the combination of separate interprets the measurements without
behavioral simulators to build a larger exposing proprietary algorithms. These
system. Components interact and influence results guide business decisions and
each other in continuous processes. continuous process improvement.
Equipment needs to be modeled in one
The keys to success for Industrial IoT are to
common simulation tool with a standardized
create value for end users and find business
model format.
models that allow various ecosystem players
to co-exist and successfully co-evolve. 2
MOTIVATION FOR DIGITAL TWIN
Distributed data stores and analytics are
Digital twins combine data and processing. essential components that make this
The necessary data capabilities for Industrial ecosystem possible. One example is shown
IoT processing are provided in four in Figure 1, including use of a Distributed
consecutive phases: data generation, data Control System (DCS). Industrial IoT can be
acquisition, data storage and data organized in tiers or layers, with each layer
consumption. 1 Data also flows in the able to operate autonomously based on the
opposite direction for set point control to available data and services.
1 Hu, H., Wen, Y., Chua, T.S. and Li, X. 2014. Toward Scalable Systems for Big Data Analytics: A Technology Tutorial. In Access,
IEEE, vol.2, no., pp.652-687, DOI= http://dx.doi.org/10.1109/ACCESS.2014.2332453.
2Toivanen, T., Mazhelis, O. and Luoma, E. 2015. Network Analysis of Platform Ecosystems: The Case of Internet of Things
Ecosystem. Software Business, DOI= http://dx.doi.org/10.1007/978-3-319-19593-3_3.
3Purdy, M. Davarzani, L. 2015. The Growth Game-Changer: How the Industrial Internet of Things can drive progress and
prosperity. White Paper. Accenture Strategy.
4 Froehlich, A. 2014. IoT: Out of the Cloud & Into the Fog. Blog Post. Information Week / Network Computing.
5Yi, S., Li, C. and Li, Q. 2015. A Survey of Fog Computing: Concepts, Applications and Issues. In Proceedings of the 2015 Workshop
on Mobile Big Data (Hangzhou, China, June 22 – 25, 2015). Mobidata ’15. ACM, New York, NY, 37-42. DOI=
http://dx.doi.org/10.1145/2757384.2757397.
enabling the next generation of industrial surveillance and protection. 6 Industrial IoT
processing and service. Industrial raw providers must convince existing
measurements are created independent of stakeholders that their intellectual property
hosted services, making it challenging to is safe. This requires a holistic cybersecurity
collect and process the inputs. Initial raw solution that addresses the various security
process data ownership is controlled by and privacy risks at all abstraction levels,7
organizations, not individuals.
An industrial process may be orchestrated
This increases the complexity of negotiations by a single control system, but the assets
for who benefits from monetizing the data, performing the work are selected with a best
especially when industrial activity and of breed strategy. Process plant design is
intellectual property can be revealed simply guided in part by requirements for
by the characteristics and timing of the manufacturing precision and the cost of the
measurements. Industrial installations can individual workflow elements, bringing
have multiple vendors each with their own many different vendors into the solution
data representations and legacy technology space. Each asset vendor has unique subject
stacks. Many of these concerns can be matter expertise for their equipment,
addressed by using digital twins in the ways making them the best analyst of the related
we propose. data. Traditionally, analysis is performed
only when there is a process issue where
BROWNFIELD PERSPECTIVE temporary service access to the data is
Traditional industry is characterized by allowed close to the site.
plants where the equipment is installed, Industrial IoT promises to increase scalability
configured and operated for years, even for process plant services by reducing the
decades. These legacies cannot be forgotten need to be on site. This is made possible by
or discarded but instead need to be data collection using access from a remote
integrated with new technologies. Industrial location, potentially transferring the
IoT market growth will accelerate only if relevant measurements to the cloud. The
there is business value for both the dominant approach of aggregating all the
consumers and suppliers of products and data to a single datacenter can significantly
services. Legacy devices may encounter
system security challenges because they are
usually deployed in places without rigorous
6Stojmenovic, I., Wen, S., Huang, X., and Luan, H. 2015. An overview of Fog computing and its security issues. Concurrency
Computat.: Pract. Exper., DOI= http://dx.doi.org/10.1002/cpe.3485.
7Sadeghi, A.R., Wachsmann, C. and Waidner, M. 2015. Security and Privacy Challenges in Industrial Internet of Things. In
Proceedings of the 52nd Annual Design Automation Conference (San Francisco, June 07 – 11, 2015). DAC ‘15. ACM, New York,
NY, Article 54. DOI= http://dx.doi.org/10.1145/2744769.2747942.
8Pu, Q., Ananthanarayanan, G., Bodik, P., Kandula, S., Akella, A., Bahl, P. and Stoica, 2015. Low Latency Geo-Distributed Data
Analytics. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (London, August 17 –
21, 2015). SIGCOMM ‘15. ACM, New York, NY, 421-434. DOI= http://dx.doi.org/10.1145/2785956.2787505.
9Hassen, F. and Touzi, A.G. 2015. Towards a New Architecture for the Description and Manipulation of Large Distributed Data.
Big Data in Complex Systems, DOI= http://dx.doi.org/10.1007/978-3-319-11056-1_17.
10 Industrial Data: https://www.iso.org/committee/54158.html
11 Digital Twin Manufacturing Framework: https://www.iso.org/standard/75066.html
12 JETI: https://jtc1info.org/technology/jeti/
13 Malakuti, S., Ganz, C., Schlake, J., Harper, K.E., Digital Twin: An Enabler of New Business Models, Automation (2019).
The digital twin owner controls the data C1. App store deployment of configuration.
contents and access to functions using Digital twin information model and policy
administrative operations. The properties definitions are deployed independent of
and configuration are declaratively services as first class participants for
specified. Column stores can be created and Industrial IoT. This provides a separation of
deleted. The digital twin contents can be concerns between data and service
encrypted with the owner’s certificate. Each ownership and enables declarative
column store in a digital twin can be integration of applications, services and
connected to an ingest data source, digital twins.
subscribing and automatically creating
C2. Integrated information model. Asset
records as new readings are published by the
types and instances are crucial aspects of the
data source or by polling the ingest source
ecosystem: discoverable, navigable and
periodic basis.
organized independent of naming
Digital twin clients are provisioned and conventions. Classification of types apply to
assigned to roles associated with the related instances and property values.
different interfaces, column stores, ranges Multiple information models can be
of data and policies for access. federated within a tier to provide a broad
Programmatic callbacks are registered for view of the available storage.
fine grained filtering of ingested, exchanged
C3. Flexible classification of types,
and synchronized values. Finally, the
properties and instances. Every digital twin
interoperability API makes it possible for a
can invent its own type system, imposing the
digital twin to register with the ecosystem
constraint on clients to configure and
and expose its characteristics for access to
program accordingly. No different than the
the other APIs.
complexity introduced by microservice APIs,
it is unrealistic that all Industrial IoT
ARCHITECTURAL EVALUATION
applications will agree on a common
CRITERIA information model taxonomy and attributes.
Our vision is that digital twins can be C4. Encrypted data at rest and in transfer.
deployed in any Industrial IoT tier, realized Digital twins can store encrypted data, i.e.
with the available technology choices, and only readable with guaranteed integrity by
synchronization between digital twins is the the provisioned users. Encryption is used for
only communication between tiers. Data sensitive API parameters to protect privacy
replicated into a digital twin looks like ingest and reduce the possibility for malicious
and triggers the associated published control.
notification events. The following
C5. Role-based access control configured
expectations summarize the digital twin
for authenticated users. A digital twin
architectural capabilities and their
imposes a security domain to protect and
motivations.
manage access to data. Digital twin owners
define (select) the EULA (End User License
C1 C2 C3 C4 C5 C6 C7 C8 C9
Interoperability
Information Model
Data Exchange
Administration
Synchronization
Publish / Subscribe
- 10 - November 2019
Digital Twin Architecture and Standards
14Boughton, P. 2015. Blog Post. The challenges of creating the Industrial Internet of Things. ENGINEERLIVE. URL=
http://www.engineerlive.com/content/challenges-creating-industrial-internet-things.
twins only within a single tier, reducing the federated namespaces across the tiers.
cybersecurity attack surface. Digital twins Digital twins could be used to distribute
empower and delegate responsibility to data content between tiers—for example,
owners to protect, manage and monetize application configurations, algorithm
their intellectual property. Finally, given specifications or even the manifests and
potentially unreliable communications content for synchronized app stores. Finally,
between tiers, digital twin integration submitting work requests to digital twins in
adapts to and maximizes opportunities for the local tier could synchronize with other
sharing when synchronization channels are tiers, triggering activities in adjacent tiers
open between tiers. whose results are collected and
synchronized back to the requesting tier.
As ecosystem tiers are increasingly and
continuously connected, the
synchronization-only communication
constraint between tiers could be relaxed to
allow CRUD access to digital twins located in
Return to IIC Journal of Innovation landing page for more articles and past editions
The views expressed in the IIC Journal of Innovation are the contributing authors’ views and do
not necessarily represent the views of their respective employers nor those of the Industrial
Internet Consortium.
© 2019 The Industrial Internet Consortium logo is a registered trademark of Object Management
Group®. Other logos, products and company names referenced in this publication are property
of their respective companies.
- 12 - November 2019