Professional Documents
Culture Documents
Ebook Cyber Physical Iot and Autonomous Systems in Industry 4 0 1St Edition Vikram Bali Online PDF All Chapter
Ebook Cyber Physical Iot and Autonomous Systems in Industry 4 0 1St Edition Vikram Bali Online PDF All Chapter
https://ebookmeta.com/product/industry-4-0-ai-and-data-science-
research-trends-and-challenges-1st-edition-vikram-bali-editor/
https://ebookmeta.com/product/cyber-physical-systems-and-
industry-4-0-practical-applications-and-security-management-1st-
edition-dinesh-goyal-editor/
https://ebookmeta.com/product/securing-iot-in-
industry-4-0-applications-with-blockchain-1st-edition-p-kaliraj/
https://ebookmeta.com/product/cybersecurity-ambient-technologies-
iot-and-industry-4-0-implications-1st-edition-gautam-kumar-
editor/
System design and implementation principles for
industry 4 0 development of cyber physical production
systems 1st Edition Luis Ribeiro
https://ebookmeta.com/product/system-design-and-implementation-
principles-for-industry-4-0-development-of-cyber-physical-
production-systems-1st-edition-luis-ribeiro/
https://ebookmeta.com/product/security-and-resilience-in-cyber-
physical-systems-detection-estimation-and-control-masoud-
abbaszadeh/
https://ebookmeta.com/product/security-and-resilience-of-cyber-
physical-systems-1st-edition-krishan-kumar/
https://ebookmeta.com/product/cambridge-igcse-and-o-level-
history-workbook-2c-depth-study-the-united-states-1919-41-2nd-
edition-benjamin-harrison/
Edited by
Vikram Bali
Vishal Bhatnagar
Deepti Aggarwal
Shivani Bali
Mario José Diván
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
© 2022 selection and editorial matter, Vikram Bali, Vishal Bhatnagar, Deepti Aggarwal, Shivani Bali,
and Mario José Diván; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The
authors and publishers have attempted to trace the copyright holders of all material reproduced in this
publication and apologize to copyright holders if permission to publish in this form has not been obtained.
If any copyright material has not been acknowledged please write and let us know so we may rectify in
any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com
or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-
750-8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used
only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003146711
Typeset in Times
by SPi Technologies India Pvt Ltd (Straive)
Contents
Preface........................................................................................................................ix
Editors.....................................................................................................................xvii
Contributors.............................................................................................................xix
v
viContents
Chapter 10 Automatic Time and Motion Study Using Deep Learning.............. 147
Jefferson Hernandez, Sofia Lopez, Gabriela Valarezo, and
Andres G. Abad
Index���������������������������������������������������������������������������������������������������������������������� 389
Preface
I ndustry 4.0 is revolutionizing planning and production processes. It originated in a
simple idea: merging an existing physical entity with advanced IT elements such as
the Internet of Things (IoT), cloud-dased data, sensors, automators, and analytics –
creating something that offers a surplus benefit over its original predecessor, Industry
3.0. Machine learning, cloud computing, cyber security, and the IoT are the topics of
contemporary research interest. Cyber-physical systems (CPSs) refer to an Industry
4.0-enabled manufacturing environment that offers real-time data collection, analy-
sis, and transparency across every aspect of a manufacturing operation. The evolu-
tion of Industry 4.0 and advancements in the field of the IoT have significantly
increased the complexity and the level of risk to which all enterprises are subjected
to. Industry 4.0 is a massive shift towards automation and digitization, utilizing the
IoT and CPSs such as sensors to aid in data collection for manufacturing verti-
cals. Industry 4.0 involves a hyperconnected system that includes the smarter use of
robotics to effectively and efficiently move manufacturing to new heights. With the
use of all these technological systems, it is imperative to ensure that cyber security
plays a role during the rise of this digital industrial revolution. Advances in machine
learning are changing the traditional manufacturing era into the smart manufacturing
era of Industry 4.0.
This book addresses the topics related to the IoT, machine learning, CPSs, and
cloud computing for Industry 4.0. It brings together researchers, developers, practi-
tioners, and users who are interested in these areas to explore new ideas, techniques,
and tools and to exchange their experiences. This book intends to encourage research-
ers to develop novel theories to enrich scholars’ and firms’ knowledge to achieve
sustainable development and/or foster sustainability. The book investigates chal-
lenges across multiple sectors and industries and also considers Industry 4.0 for
operations and supply chain management.
In Chapter 1, “Cyber Systems and Security In Industry 4.0,” it is shown that inte-
grating the operations of manufacturing companies in Industry 4.0 means exposing
the company’s IT infrastructure and data, which makes them more susceptible and
vulnerable to cyber threats. Shielding the industrial IoT against cyber threats is cru-
cial in order to control and stimulate the economic engine of the future. Protecting
cyber systems from theft and adversaries is essential, since it includes everything that
is appropriate for securing sensitive data, personal information, cerebral property,
and industrial and governmental information systems. Cyber security refers to the
umbrella of processes, technologies, and tools intended to protect networks, pro-
grams, devices, and data from various cyber attacks, damage, and unauthorized
access. Cyber security ought to become an essential part of design, strategy, and
operations, and should be focused from the start on any new, connected, Industry
4.0-driven approach. This chapter focuses on acquiring a clear understanding of
cyber space, cyber systems, and the security challenges in Industry 4.0.
In Chapter 2, “A Demand Response Program for Social Welfare Maximization in
the Context of the Indian Smart Grid: A Review,” it is shown that the smart grid
ix
xPreface
allows the bi-directional flow of energy and information between energy generation
and the load side. As a demand response program is a key element in the present
smart grid system, so the incentive and price-based demand response programs help
prosumers and consumers to be actively involved in the smart grid system. This
chapter proposes a thematic idea with a gray literature review on building a new busi-
ness model on demand response programs for social welfare maximization in the
context of the Indian smart grid. Moreover, this concise study also helps us to under-
stand the challenges and solutions through pilot projects and case studies at the fore-
front of developing countries like India in smart grid deployments. The chapter deals
with collecting and analyzing the relevant information and presenting it in a logical
flow which provides more information to researchers who are working on smart grid
development.
In Chapter 3, “A Cloud Computing Security Framework Based on Shared
Responsibility Models,” it is shown that in the present scenario, especially in the cur-
rent pandemic situation, cloud computing enables new innovation in the IT industry
and that more than 90% of IT enterprises are migrating their services towards virtu-
alization using cloud computing platforms. In order to gain the maximum outcome
from the advantages of such platforms, cloud users rely on cloud service providers
(CSPs) for managing their data and IT services. So, for the smooth management of
data and services for cloud users, CSPs need a strong cloud security framework.
More than 50% of the market of cloud computing services are occupied by the top
three CSPs: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.
This chapter presents a comprehensive analysis and the findings of a security frame-
work related to these top CSPs and proposes a cloud security shared responsibility
model and its application in various internet computing services like healthcare and
e-governance.
In Chapter 4, “Performance Analysis of a Hypervisor and the Container-based
Migration Technique for Cloud Virtualization,” it is shown that containers emerged
as a lightweight alternative to a virtual machine (VM) and offer better microservice
architecture support. The major limitation of a VM is that it comprises a large image
size due to the fully installed guest OS, binaries, and library files. This disadvantage
hinders its applicability to real-time applications. On the other hand, containers com-
prise only the required files, thus making them lighter in size compared to a VM.
With the development of container technology, the issue of how to facilitate migra-
tion support needs to be addressed. Therefore, in this study an experimental setup is
proposed to facilitate the migration of running containers and evaluate its perfor-
mance compared to the existing hypervisor-based VM migration scheme. To provide
a solution for this, the authors use LXD as a container technology and checkpoint/
restore mechanism (CRIU) to facilitate the migration of running containers.
Experimental results demonstrate that compared to the existing VM migration
scheme, the proposed container-based migration technique shows improvement with
a reduction in downtime by 72.08%, in migration time by 54.94%, and in the number
of pages transferred by 97.54%.
In Chapter 5, “Segmentation of Fine-Grained Iron Ore Using Deep Learning and
the Internet of Things,” it is shown that sieving ore is a critical process in iron ore
production. It reduces the iron ore size, improving the next stage’s performance.
Preface xi
Failing to detect fine-grained ore in the initial steps can lead to a loss in production.
Detecting fine-grained iron ore automatically is an essential task to improve the prod-
uct’s economic value in general. Hence, the chapter shows an automatic process
based on deep learning and an IoT architecture that take decisions in real time. Using
deep learninghas been inspired by the fact that traditional segmentation algorithms
have proven to beslow; therefore, their use is not possible in an ore vibrating screen
in real-time applications. In this context, this research proposes using a deep neural
network calledU-Net for image segmentation. U-Net is a convolutional neural net-
work developedfor biomedical image segmentation; consequently, it yields better
performanceon fast image segmentation than other networks devised specially for
regular objectdetection such as ResNet. In this context, U-Net was trained andtested
in a Jetson TX1 architecture. Preliminary results show that U-Net canproperly seg-
ment around 3.46 fps, suitable for the authors application.
In Chapter 6, “Amalgamation of Blockchain Technology and Cloud Computing
for a Secure and More Adaptable Cloud,” the focus is on an existing cloud computing
model along with an in-depth review of existing cloud computing security measures
and related constraints. Through this chapter the authors also try to incorporate a
systematic understanding of the basics of blockchain technology and how it can be
integrated with cloud computing in order to enhance the latter’s existing security
mechanisms that can lead us towards a more secure and more adaptable cloud.
In Chapter 7, “Cloud, Edge and Fog Computing: Trends,” it is shown that in recent
years the emergence of artificial intelligence and the Internet of Things (IoT) has
enhanced the working capability and digital powers of sectors like healthcare, bank-
ing, and education. The benefits of these technologies are faster transmission, secu-
rity, and integrity of data. These features can be achieved through cloud computing.
Cloud computing is the virtual storage concept for processing and storing data. But
every second the amount of data is increasing, which will affect the analyzing and
processing speed of data and will become more complicated for processing and ana-
lyzing in the coming years. As a solution to these problems, there are two enhance-
ments to cloud computing – edge computing and fog computing. These computing
technologies try to reduce the size of data to be transmitted to the cloud by perform-
ing processing closer to the entry point of the data. The strategy behind these tech-
nologies is to provide an enhancement such that only the necessary and important
data which can be used frequently or which will affect real-time conditions in the
future are stored on the cloud, and all temporary and intermediate data are analyzed
and processed at the data feeding end.
In Chapter 8, “Progression in Cyber Security Concerns for Learning Management
Systems: Analyzing the Role of Participants,” it is shown that the educational sector,
in adopting technologies and online deliveries of sessions, has increased the scope of
discussion and knowledge sharing multifold. It has also opened up new ground for
various opportunities in cyberspace. Educational bodies are facing several challenges
as dependency on cyber-physical systems (CPSs) is increasing. A learning manage-
ment system (LMS) is one of the CPSs used as a platform for online delivery of ses-
sions. Many professional bodies are disseminating online education and are
responsible for the respective assessments. However, a down side is that it tags and is
vulnerable to many cyber threats, with which users or participants are not familiar.
xiiPreface
microsensors has made data communication without an infrastructure not only a real-
ity, but also, pervasive. The evolution of pervasive and ubiquitous computing has
paved the way for the technology of the Internet of things (IoT). In fact, IoT is a
buzzword for both industry and academia today. It is among one of the handful of
innovative technologies which have risen sufficiently to step out of the walls of
research laboratories and enter the realms of our daily lives. In fact, there is hardly
any industry where the IoT has not found any considerable application. Agriculture,
healthcare, and the automobile and oil industries are some of the areas where an
extensive application of the IoT is to be found. In this chapter, the authors discuss
how the IoT can be integrated for industries of different domains. They describe how
a single framework of the IoT can be used in three different industries: agriculture,
healthcare, and the oil industry.
In Chapter 12, “Impact of Deep Learning and Machine Learning in Industry 4.0,”
it is shown that Industry 4.0 provides emergence to what is called the “Smart Factory.”
Industry 4.0 (IR 4.0) is a growing phenomenon for automation and information shar-
ing in industrial technology. Artificial-intelligence-based methods (i.e., deep learning
and machine learning) play a crucial role within IR 4.0. The main component of IR
4.0 includes a sensor, robotics, smart cameras, and software integration to manage
the central system. These sensors generate huge amounts of data. This chapter exam-
ines the effect of numerous machine learning and deep-learning technologies on IR
4.0. The work also proposes a hybrid machine learning and deep learning-based
model (HMDL) for IR4.0. The proposed HMDL model utilizes the features of the
random forest machine learning method and the multilayer perceptron networks of
the deep learning method. The importance of machine and deep learning strategies
for Industry 4.0 is addressed further, as well as their application to problems in indus-
trial production. Finally, the recent state- of-
the-art object-
tracking process is
described, including the possible outcomes and future growth prospects.
In Chapter 13, “IOT Applications and Recent Advances,” it is shown that since
research in IoT applications is the amalgamation of embedded electronics, sensor
technology, networking, cloud computing, artificial intelligence, data analytics, and
other technologies, it will become a good area for interdisciplinary research for both
academics and industrial people. At the outset there are a lot of new methodologies
and findings that have evolved with this IoT research, and these outcomes give better
solutions in the areas of smart environments, IoT services, intelligent systems, smart
health, smart homes, smart agriculture, networking protocols, communication proto-
cols, and autonomous industrial applications. Hence the research direction in IoT
applications is definitely a challenge for academic researchers and industrial devel-
opers. The major challenges are in identification technology, choosing an IoT archi-
tecture technology, and establishing networks and communication technologies for
the specific research problem. In this chapter the authors attempt to depict all such
challenges by focusing on these IoT-enabled topics and throw light on these issues
for new researchers who are entering this domain.
In Chapter 14, “A Spatio-temporal Model for the Analysis and Classification of
Soil using the IoT,” it is shown that the IoT in agriculture transforms entities such as
crops, soils, and livestock in a smart way by utilizing underlying technologies such
as embedded systems, pervasive computing, sensor networks, ubiquitous computing,
xivPreface
Vikram Bali
Vishal Bhatnagar
Deepti Aggarwal
Shivani Bali
Mario José Diván
Editors
Vikram Bali is Professor and Head of the Computer
Science and Engineering Department at the JSS
Academy of Technical Education, Noida, India. He
graduated from REC, Kurukshetra with a B.Tech (CSE),
an M.E. (CSE) from NITTTR, Chandigarh, and a PhD
from Banasthali Vidyapith, Rajasthan. He has more than
20 years of rich academic and administrative experience.
He has published more than 50 research papers in inter-
national journals and at conferences and has edited
books. He has authored five text books. He has registered
six patents. He is on the editorial board and on the review
panel of many international journals. He is the series edi-
tor for three book series with CRC Press (Taylor & Francis Group). He is a lifetime
member of the IEEE, ISTE, CSI, and IE. He won the Green Thinker Z-Distinguished
Educator Award 2018 for a remarkable contribution to the field of Computer Science
and Engineering, presented at the Third International Convention on Interdisciplinary
Research for Sustainable Development (IRSD) at the Confederation of Indian
Industry (CII), Chandigarh. He has attended faculty enablement programs organized
by Infosys and NASSCOM. He is a member of the board of studies of different
Indian universities and is a member of the organizing committee for various national
and international seminars/conferences. He is working on four sponsored research
projects funded by TEQIP-3 and Unnat Bharat Abhiyaan. His research interests
include software engineering, cyber security, and automata theory.
xvii
xviiiEditors
Divya Acharya
Shweta Barge
Bennett University
Cummins College of Engineering for
Greater Noida, Uttar Pradesh, India
Women
Pune, India
Sharifah Sakinah Syed Ahmad
Universiti Teknikal Malaysia Melaka
Aditya Bhardwaj
S. Aishwarya Bennett University (Times of India
Department of Information Science and Group)
Engineering Greater Noida, Uttar Pradesh, India
Jyothy Institute of Technology
Bangalore, India Arpit Bhardwaj
Bennett University
Imam Wahyu Amanullah Greater Noida, Uttar Pradesh, India
Universiti Teknikal Malaysia Melaka
Harshit Bhardwaj
Premchand B. Ambhore USICT
Government College of Engineering Gautam Buddha University
Amravati Greater Noida, Uttar Pradesh, India
xix
xxContributors
CONTENTS
1.1 Introduction to Cyberspace, Cyber Systems, and Cyber Security�������������������� 2
1.1.1 Cyber Threats, Vulnerabilities, and Risks���������������������������������������������� 3
1.2 The Internet of Things and Security Issues������������������������������������������������������� 4
1.2.1 IoT Architecture and Protocol Stacks���������������������������������������������������� 4
1.2.2 Applications of the IoT�������������������������������������������������������������������������� 6
1.2.3 Security of IoT Systems������������������������������������������������������������������������� 7
1.2.4 Securing IoT Devices and Networks����������������������������������������������������� 8
1.3 Industrial Internet of Things (IIoT)����������������������������������������������������������������� 10
1.3.1 Industry 4.0: Overview������������������������������������������������������������������������ 10
1.3.2 IIoT Applications��������������������������������������������������������������������������������� 11
1.3.3 IIoT Architecture���������������������������������������������������������������������������������� 12
1.3.4 Impact of IIoT on the Economy����������������������������������������������������������� 13
1.4 Security Challenges in Industry 4.0���������������������������������������������������������������� 14
1.4.1 How Secure Is IIoT?���������������������������������������������������������������������������� 15
1.4.2 IIoT Security Challenges��������������������������������������������������������������������� 16
1.4.2.1 Device Hijacking������������������������������������������������������������������� 16
1.4.2.2 Data Siphoning���������������������������������������������������������������������� 17
1.4.2.3 Denial of Service Attacks������������������������������������������������������ 17
1.4.2.4 Data Breaches�����������������������������������������������������������������������17
1.4.2.5 Device Theft�������������������������������������������������������������������������� 17
1.4.2.6 Man-in-the-Middle or Device “Spoofing”���������������������������� 18
1.4.3 IIoT Security Solutions������������������������������������������������������������������������ 18
1.4.3.1 Endpoint Security-by-Design������������������������������������������������ 18
1.5 Conclusions and Future Work������������������������������������������������������������������������� 21
1.5.1 Conclusions������������������������������������������������������������������������������������������ 21
1.5.2 Limitations������������������������������������������������������������������������������������������� 21
1.5.3 Future Work����������������������������������������������������������������������������������������� 22
References���������������������������������������������������������������������������������������������������������������� 22
DOI: 10.1201/9781003146711-1 1
2 Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
ensuring that data do not suffer from unauthorized modification. Availability ensures
that systems, applications, and data are accessible to users, particularly when they
need them. Non-repudiation is a term used in law that means one’s intent to accom-
plish one’s obligations in an agreement and that one party cannot refuse to send or
receive a transaction.
need for cyber security management as a part of every business enterprise’s risk pro-
file. Irrespective of an organization’s risk appetite, stakeholders need to include cyber
security as part of a business’s risk management process and regular business
operations.
data to end-user devices. The present architecture models include more views to the
structure of the IoT. As a result, the five-layer framework was instigated which
depends on the performance demand of IoT devices (Sicari et al., 2016), as shown in
Figure 1.1.
Big data generated by “things” in the IoT are analyzed, and this process begins in
the physical layer that contains devices such as sensors that gather and also analyze
and process the data collected. The physical devices or objects include actuators as
well as sensors for submitting queries on weight, location, temperature, acceleration,
motion, humidity, and so on. The object abstraction layer encompasses communica-
tion technologies such as the global system for mobile communication (GSM), 3G,
radio frequency identification (RFID), Wi-Fi, infrared, Bluetooth (Low Energy), and
Zigbee for transferring information which is generated in the object layer to the ser-
vice management layer (Jia et al., 2010). The abstraction layer controls various tasks
such as data management and cloud-computation-related processes. The service
management layer connects together services and requesters depending on names as
well as addresses. The application designers of the IoT deal with a wide variety of
objects that involve hardware platforms. The service management layer processes the
collected data, takes decisions, and brings in obliged services according to network
protocols. The application layer makes available smart quality devices and services
for smart buildings, smart homes, industrial automation, transportation, and smart
healthcare facilities. The business layer’s responsibility is to manage the IoT system
services, activities, graphs, the building of business models, and flow charts of the
6 Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
application layer. It plans, implements, evaluates, develops, and monitors IoT ele-
ments. Based on big data analysis, the business layer also supports decision-making
processes.
The IoT protocol stack is designed as an enhancement of the TCP/IP protocol
model. It consists of the following layers: physical/link layer, network layer, trans-
port layer, application protocol layer, and application services layer. The most com-
mon physical layer protocols used by embedded systems are Ethernet, Bluetooth
Low Energy, Wi- Fi, Wireless HART, Zigbee, Z- wave, RFID, Cellular
(GPRS/2G/3G/4G/5G), and LoRAWAN. The network layer is accountable for the
addressing and routing of information packets in the IoT. There are other network
layer protocols such as 6LoWPAN, IPv6, and IPv4. The transport layer is account-
able for transmitting and routing of data packets over a communication channel. The
most commonly used transport layer protocols are TCP, UDP, and RPL (Routing
Protocol for Low-Power and Lossy Networks). The application layer is accountable
for data presentation and formatting, and is characteristically based on the Hypertext
Transfer (HTTP) protocol. However, HTTP is not appropriate in a resource con-
strained environment since it is a heavy weight protocol and therefore involves a
huge parsing overhead. Hence, there exist many application service protocols which
have been invented for IoT surroundings; these include: MQTT, SMQTT, AMQP,
DDS, CoAP, XMPP, REST, and SOAP.
experience. The IoT is proven to be game changing according to the requirements for
quality control, product flow monitoring, inventory management, factory digitaliza-
tion, packaging optimization, security, logistics, and supply chain optimization
(Wunck & Bauman, 2017).
they are connected to Amazon’s effective virtual assistant software like Alexa.
“Smart coffee machines are lagging in their security and it’s very difficult to
protect them,” Steckler stated in the media.
7. Connected printers: A research firm Quocirca announced that smart printers
that are connected to a company’s set-up are the potential victims of cyber
attacks. He provided a report which emphasized that around 60% of business
industries in France, the USA, the UK, and Germany experienced data infringe-
ment that was printer related, resulting in monetary terms, on average, of more
than US$400,000 in 2019.
8. Smart speakers can be hacked: Wu HuiYu and Qian Wenxiang are security
specialists at Tencent Blade, who disclosed threats to smart speakers at a con-
ference titled “DEFCON” on IoT security. These experts used Amazon Echo
smart and stylish speakers to demonstrate the attacking process. The research-
ers easily compromised these speakers by using a malevolent tool embedded
with a malicious code. They reported their results to Amazon prior to their
presentation; later Amazon used a security patch for preventing the issue.
9. Gas stations on the IoT are vulnerable: Privacy and security are the major deci-
sion factors in the process of developing and designing IoT infrastructure and
devices, and dealing with these concerns should be of the highest priority
(Jindal et al., 2018). A 2019 survey done in Canada, France, Australia, Japan,
the USA, and the UK disclosed that 63% of consumers found their connected
devices were vulnerable. This demonstrates many aspects of IoT security chal-
lenges. Trust is vital to realizing the complete potentiality of the IoT. Therefore,
cyber security must be implemented in IoT devices at all points in the ecosys-
tem to thwart vulnerabilities in one part from jeopardizing the security of the
whole (Vignesh & Samydurai, 2017).
attacks. Most proficient companies and cyber security experts are doing their best to
safeguard things for customers, but there is still more to be done (Ali et al., 2018).
These are some crucial things needed to secure IoT devices and networks:
• Changing the router’s credentials. Never keep basic or default settings. Routers
are usually named according to the identities of their manufacturers or net-
works; these provide hackers with a significant clue to enable them to obtain
access. It’s always recommended to avoid using your own name or address
which may be advantageous and provide helpful traces to opponents who try to
obtain admission into systems.
• Using powerful passwords is always advised, and one should aim at using
random ones that contain a mix of characters, alphabets, and symbols.
• Never use open or public Wi-Fi whenever there is a need to access IoT net-
works through personal computers or smart phones. It is comparatively easier
to crack Wi-Fi networks that are open in public places like cafes and restau-
rants. It is best to use a virtual private network (VPN).
• It is better to employ guest networks. It is a good idea to employ guest net-
works for customers who want to use wireless networks in their home; it never
grants them admission into the network systems or to personal mail and other
types of accounts. The guest network can be used for IoT devices. So even if
an opponent hacks a device, they may get trapped within the guest network and
can’t obtain original Web access.
• Adopt robust encryption schemes like Wi-Fi protected access (WPA).
• Take extraordinary care in securing top-level control of an IoT network. It is a
good suggestion to apply two-factor authentication (2FA) that uses biometrics
like finger prints, a password, or a dongle to ensure that an attacker will not be
able to produce two forms of evidence.
Modern IoT ecosystems are complex. A security risk is present at every step along
the IoT journey, and there is a huge number of hackers who exist to take advantage
of a system’s vulnerabilities. So IoT businesses should undergo a thorough security
risk evaluation that inspects vulnerabilities in devices, networks, and customer back-
end systems.
10 Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
1.3.2 IIoT Applications
The IIoT has obviously proved to the world its own flexibility with operations that
are available across many endeavors and including many case scenarios of IIoT use.
It should be noted that implementation of IIoT needs to develop regarding forthcom-
ing industrial productivity. A study made by analytics professionals proved that 79%
perceive that the analytical maintenance of industrial goods and instruments will
become a fundamental rationale of manufacturing industrial data analytics in forth-
coming product developments and 15% expect industrial analytics to be a major
success factor in today’s businesses; 69% believe it may become even more impor-
tant in the following decade. Typically, IIoT solutions include:
Smart meters have gained tremendous attractiveness in modern years. A smart meter
is more of an Internet proficient tool, as compared to traditional meters, and they are
even capable of reporting the amount of vital sources such as energy, irrigation,
power, and natural gas that is consumed (Molina-Markham et al., 2010). In predic-
tive maintenance, systems analyze the condition of the equipment beforehand and
have an ability to lessen the operational industrial expenditure significantly, which
results in considerable monetary benefits for manufacturers. Fleet management
assists manufacturers to reduce and overcome the risks associated with productivity.
The connected technology of IIoT has given power to the fleet business with
improved efficiencies in managing the fleet and decreasing staff and transportation
costs significantly. Connected vehicles in IIoT are furnished with the Web for auto-
mating normal driving tasks. They employ different network technologies that speak
to the driver. Optimizing industrial robotic systems in manufacturing employ robots
to put them into production: the autonomous machines carry out the same task
repeatedly until they achieve sufficient accuracy. The underpinning training and
learning technology are frequently used to teach robots and independent machinery.
Using these techniques, a robot can moderately or quickly be trained to perform a
task under the direction of a human being. The “brains” of such robots are usually
neural networks.
12 Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
1.3.3 IIoT Architecture
IIoT architecture, as shown in Figure 1.2, involves message queuing telemetry trans-
port (MQTT) protocol for communicating with a huge number of devices. This pro-
tocol is a secure and lightweight one and employs the well-known publish/subscribe
transportation method. The MQTT module is used to gather data from several edge
of network devices. Data accumulated by the MQTT engine will be available to a
client with the reporting module or vision module. IoT edge devices can operate as
gateways, providing a connection between other devices on the network and the IoT
hub. Supervisory control and data acquisition (SCADA) is a system of hardware and
software elements that permits industrial organizations to manage industrial pro-
cesses at remote locations and monitor, gather, and process real-time data to provide
direct interaction with devices such as valves, pumps, sensors, motors, and more by
using human–machine interface (HMI) software and recording incidents in a log file.
Ignition software started off as a SCADA/HMI application designed to become a
platform for industrial automation. Edge gateways play a critical role in IIoT archi-
tecture. The IoT edge hub module acts like an IoT hub, so it can handle connections
from any devices that have an identity with an IoT hub, including other IoT edge
devices. This type of gateway pattern is transparent because messages can pass from
downstream devices to an IoT hub as though there were no gateway between them.
For devices that can’t connect to an IoT hub on their own, IoT edge gateways can
provide that connection. This type of gateway pattern is called a “translation” because
the IoT edge device has to perform processing on incoming downstream device mes-
sages before they can be forwarded to the IoT hub. These scenarios require additional
modules on the IoT edge gateway to handle the processing steps.
Field devices such as Ignition Edge with the MQTT plug-in, Ignition Server with
MQTT Transmitter Module, or Third-party MQTT enabled service can be used to
connect to a programmable logic controller (PLC). PLC is a programmable
microprocessor-based machine that is employed in manufacturing for controlling
lines of assembly and machinery on the floor of the shop as well as many other types
of electrical, mechanical, and electronic equipment in a plant (Schilling et al., 2018).
A PLC is invented for real-time use in rocky industrial environments. PLCs are fixed
to sensors and actuators, and are categorized by many types of I/O ports. This device
should be capable of publishing tag values to an MQTT server. MQTT is a standard
machine-to-machine data transfer protocol. MQTT Broker is a server system that
communicates with field devices through MQTT which is an ignition gateway with
an installed MQTT distributor module, or sometimes a third-party server, such as a
Chariot MQTT Server. A subscriber is nothing but software that subscribes to topics
in the Broker. With respect to ignition, this is the gateway with the MQTT engine
module installed. A programmable ignition gateway is a service which runs in the
environment of our server’s operating system. When running, it is connected to a
Web browser. Any computer connected to the same network can access the gateway,
based on the gateway security settings, by using the host name or IP address of the
computer where ignition is installed. An ignition-based IIoT is an end-to-end IIoT
solution which unites the remarkable effectiveness of the MQTT data-transfer proto-
col with the development power and unrestrained data acquisition of the ignition
industrial application platform. Using ignition, one can simply connect to plant floors
and field devices at the edge of the network, and shove data from many devices
across many places through a central MQTT infrastructure to both business and
industrial purposes. Security and interoperability certainly are the biggest challenges
while designing IIoT architecture. A major problem in designing IIoT architectures
is the interoperability between devices and instruments that use diverged protocols
and different architectures. Ignition is a brilliant resolution for interoperability
because it is built on open-source and benchmark information technologies.
security challenges, as these are divergent threats that affect both entities and organi-
zations, and consequently damage financial growth. As manufacturing business orga-
nizations employ several IIoT solutions, they still need to be acquainted with security
vulnerabilities, a lack of visibility, unknown risks linked with information technol-
ogy/operational technology (IT/OT) convergence, and in-house threats (Tuptuk &
Hailes, 2018). And when security competence is considered as a selection criterion,
then obviously the key challenge is the lack of wide-ranging cyber security solutions.
Adopting IIoT technologies may be resisted in the IT industry until and unless it has
a solid security feature. So, industries are more vigilant with IIoT automation
technologies.
how they collaborate and innovative. Highly interconnected industries are capable of
presenting various improvements to all manufacturing companies and healthcare
utilities. Big data generated in IoT gives practical information concerning decision
making and provides insight into the improvisation of functions. On the other hand,
innovative “things” generally bring unpredicted and unforeseen security risks and
other threats exploited by enemies, as they are vigorously functioning to make sure
that they also acquire the benefits of Industry 4.0. It is also essential to raise the con-
sciousness of people who are engaged in production, starting from instrument and
software developers, and planning and development engineers who work in the plant
engineering side.
• Insecure Web interfaces. The sites where users connect with IoT sensors and
devices suffer from insufficient default secrets, session management issues,
and password vulnerabilities within the scope of the network.
• Insecure network services. If the network is not secure, attackers may succeed
in gaining admission to the communication network from open ports, DoS
attacks, and buffer overflow.
• Weak encryption. Weak encryption can permit interlopers the facility to gain
data in transit among devices.
• Vulnerable portable device interfaces. Many companies offer a field service as
an addition to their industrialized operations for maintenance and repair. So
mobile interfaces experience the same problem of authentication and encryp-
tion. There exist plenty of hazards associated with cyber security vulnerabili-
ties in implementing IIoT. Some of them are described in detail below.
1.4.2.1 Device Hijacking
Device hijacking happens whenever a malevolent actor gains control of endpoint
sensors or devices in IoT, and the owners are ignorant of how the breaches occurred.
Based on how “smart” the endpoint devices are, this assault can vary according to the
severity of the risk it creates. If an IoT sensor is hacked by ransom ware or spyware,
an enemy can take control of the movements of the end-point device itself. This is
especially important if the device has automated functionality and controls the
Cyber Systems and Security in Industry 4.0 17
1.4.2.2 Data Siphoning
Data siphoning concentrates on “eavesdropping” style attacks, which target the data
that is being carried by an IIoT device quicker than the end user. In this situation,
intruders eavesdrop on the communication traffic from the sensors or endpoint
devices to the main network for collecting information to which they shouldn’t have
admission. This type of attack is most concerning when the data sent by an IIoT
device is very sensitive or damage is caused when it gets into the wrong hands, which
is more crucial for highly regulated industries like healthcare, defense, and aero-
space. It is also critical to see whether a device is tapped to send information that
allows a competitor to achieve access to an important IP address. In such a case,
ensuring that all the information being broadcast is appropriately encrypted and pro-
tected is extremely important.
1.4.2.4 Data Breaches
This threat involves attacking the IIoT devices in a centralized network where sensi-
tive and important information is placed. Since the scope of this attack concerns
many devices, owing to the conventional technology alarms stated above, it uses
them as a major target and exploits them as a “doorway” to critical business net-
works. Attackers use them as a way to attain entry point to the enterprise networks
and gain admission to critical data that needs to be protected, including: clients’
sensitive data or partners’ business information, personally identifiable information,
intellectual property or trade secrets, health data, and financial data. As observed
earlier, the better way to save IIoT devices from being exploited as an entry point to
networks is to secure the devices themselves. A hardware-based VPN solution is the
best option to achieve this.
1.4.2.5 Device Theft
Another concern with endpoint equipment in the field is the stealing of physical
devices. This risk is intense when endpoint equipment stores crucial information
which may cause apprehension if that information ends up in the wrong hands. Often,
IoT industries deploy their products protected from this risk by avoiding the storage
18 Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
of any sensitive data on the endpoint devices themselves, and trusting the cloud-
based infrastructure to hold that information.
1.4.3.1 Endpoint Security-by-Design
An initial step in the direction of achieving secured IIoT endpoint “things” or devices
is obviously conducting a vulnerability and risk analysis to decide whether they ful-
fill the relevant industrial standards. The following are associated specific safety and
security measure requirements and descriptions of methods to lessen these
problems.
Cyber Systems and Security in Industry 4.0 19
interpreted, and injected, which may cause device takeover as well as device
damage. The security standards of VPN servers majorly depend on how the
trader integrates them into its device, which is very hard to do properly. While
using VPN servers, good practice commendations and well acknowledged
security supports should be pursued to guarantee that the IIoT services are
perfectly built.
5. Event management and monitoring: IIoT endpoint tools and devices should
always perform real-time as well as continuous monitoring. The most crucial
part in achieving this is employment of embedded runtime agents which are
dedicated and designed for each device depending on the systematic investiga-
tion of its firmware executables. These spotlights on watching the vulnerabili-
ties of devices they are prone to, and ensuring the needs of the agent such as
runtime security, together with processor, memory, and database’ never affect
the device’s functionality. For instance, the log information security require-
ment of auditing insists that these alerts as well as logs are to be produced for
significant security-related incidents. So, it should be mandatory to record the
subsequent features of events such as the component for which the event took
place, the date and time of the event, the type of event, the outcome of the
event, and the subject’s identity.
6. Detection tools: For securing each state of the IT infrastructure, an “automated
risk identification” module is employed by RADAR Cyber Security, which is
a European market leader for proactive IT security monitoring and risk detec-
tion where both are managed services. The following modules are suggested
by RADAR Services.
• Advanced Cyber Intrusion Detection (ACID): Discovering hazardous mali-
cious code or malware, abnormalities, and several types of vulnerability
threats and risks within the traffic of a network by using digital signatures
and behavioral intrusion detection systems.
• Host-based Intrusion Detection System (HIDS): Using analysis, compila-
tion, connecting servers, client log files, and random alerting whenever cer-
tain attacks have happened, or exploitation and errors are detected. The
integrity of data in the local system is verified. Root kits, trojans, other types
of attacks, and viruses are acknowledged.
• Vulnerability Management and Assessment (VAS): An assessment of
impending security errors in the software, operating systems, and monitor-
ing of anomalies of all information is transmitted via the network.
• Advanced Email Threat Detection (AETD): Employment of future genera-
tion sand box techniques in sensing email hacking and malware.
• Software Compliance (SOCO): Automatic examination of the faithfulness
of fulfilling rules and guidelines, and instant description of vulnerabilities to
reduce risks.
7. Analysis and evaluation of experts: Security can be measured by ethical hack-
ers and specialized experts. They measure, examine, and analyze outcomes
using the most up-to-date technical knowledge, and they are also accountable
for the progressive growth of industrial, automated, or computerized
Another random document with
no related content on Scribd:
the Emperor? Did the pagans attribute divine assistance to
Constantine throughout this critical campaign? The answer is
unmistakable. They did so most unequivocally. Nazarius tells us[52]
that all Gaul was talking with awe and wonder of the marvels which
had taken place, how the soldiers of Constantine had seen in the sky
celestial armies marching in battle array and had been dazzled by
their flashing shields and glittering armour. Not only had the dull eyes
of earthly men for once availed to look upon heavenly brightness;
Constantine’s soldiery had also heard the shouts of these armies in
the sky, “We seek Constantine; we are marching to the aid of
Constantine.”[53] Clearly the pagan as well as the Christian world
insisted upon attributing divine assistance to Constantine and had its
own version of how that succour came. Nazarius’s explanation was
simple. According to him, it was Constantius Chlorus, the deified
Emperor, who was leading up the hosts of heaven, and such
miraculous intervention was due to the supreme virtue of the father,
which had descended to the son.
The question at once arises whether this is merely a pagan
version of the Christian legend. Unable to deny the miracle, did the
pagans, in order to rob the Christians of this wonderful testimony to
the truth of their religion, invent the story of Constantius and the
heavenly hosts? Such a theory is absolutely untenable. It leaves out
of sight the all-important fact that public opinion in the fourth century
—as indeed for many centuries both before and after—was not only
willing to believe in supernatural intervention at moments of great
crisis, but actually insisted that there should be such intervention.
The greater the crisis, the more entirely reasonable it was that some
deity or deities should make their influence especially felt and turn
the scale to one side or the other. Every Roman believed that Castor
and Pollux had fought for Rome in the supreme struggle against
Hannibal. Julius believed that the favour of Venus Genetrix, the
special patroness of the Julian House, had helped him to win the
battle of Pharsalus. Augustus was just as certain that Apollo had
fought on his side at Philippi and at Actium. It was easy—and
modest—for the winner to believe in his protecting deity’s strength of
arm.
One curious phrase employed by Nazarius is worth noting. It is
that in which he claims that the special interference of Heaven on
behalf of Constantine was not merely an extraordinary and gratifying
tribute to the Emperor’s virtues, but that it was no more than his due.
In short, the crisis was so tremendous that Heaven would have stood
convicted of a strange failure to see events in their just proportion if it
had not done “some great thing,” and wrought some corresponding
wonder. Such was the idea at the back of Nazarius’s mind; we
suspect that it was not wanting in the mind of Eusebius or of
Constantine. We may put the matter paradoxically and say that a
miracle in those days was not much considered unless it was a very
great one. People who were accustomed to see—or to think that
they saw—statues sweating blood, and to hear words proceeding
from lips of bronze or marble, and were accustomed to treat such
untoward events merely as portents denoting that something
unusual was about to happen, must have been difficult people to
surprise. Naturally, therefore, legends grew more and more
marvellous with repetition after the event. The oftener a man told
such a story the less appeal it would make to his own wonder, unless
he fortified it with some new incident. But to impress one’s auditors it
is above all things necessary to be impressed oneself. Hence the
well-garnished narrative of Nazarius. The idea of armies marching
along the sky was common enough. Any one can imagine he sees
the glint of weapons as the sun strikes the clouds. But this does not
satisfy the professional rhetorician. He bids us see the proud look in
the faces of the heavenly hosts, and distinguish the cries with which
they move to battle. But if Nazarius is suspect, why not Eusebius
and Constantine? Unless, indeed, there is to be one standard for
pagan and another for Christian miracles!
But was there some unusual manifestation in the sky which was
the common basis of the stories of Eusebius and Nazarius? It is not
unreasonable to suppose so. Scientists say that the natural
phenomenon known as the parhelion not infrequently assumes the
shape of a cross, and Dean Stanley, while discussing this possible
explanation in his Lectures on the Eastern Church, instanced the
extraordinary impression made upon the minds of the vulgar by the
aurora borealis of November, 1848. He recalled how, throughout
France, the people thought they saw in the sky the letters L. N.—the
initials of Louis Napoleon—and took them as a clear indication from
Heaven of how they ought to vote at the impending Presidential
election, and as an omen of the result. That was the interpretation in
France. In Rome—where the people knew and cared nothing for
Louis Napoleon—no one saw the Napoleonic initials. The lurid gleam
in the sky was there thought to be the blood of the murdered Rossi,
which had risen to heaven and was calling for vengeance. In Oporto,
on the other hand, the conscience-stricken populace thought the fire
was coming down from heaven to punish them for their profligacy. If
such varying interpretations of a natural if rare phenomenon were
possible in the middle of the nineteenth century, what interpretation
was not possible in the fourth? The world was profoundly
superstitious. When people believe in manifest signs they usually
see them. Some Polonius, gifted either with better vision or livelier
imagination than his fellows, declares that he can distinguish clear
and definite shapes amid the vague outline of the clouds; the report
spreads; the legend grows. And when legends are found to serve a
useful purpose the authorities lend them countenance, guarantee
their accuracy, and even take to themselves the credit of their
authorship. At the outbreak of the Russo-Japanese war a strange
story came from St. Petersburg that the Russian moujiks were
passing on from village to village the legend that St. George had
been seen in the skies leading his hosts to the Far East against the
infidel Japanese. Had Russian victories followed, what better “proof”
of celestial aid could have been desired? But as disaster ensued, it
is to be supposed that St. George remembered midway that he also
had interests in the Anglo-Japanese alliance, and remained strictly
neutral.
But though we may be justly sceptical of the circumstances
attending the conversion of Constantine, there is no room to doubt
the conversion itself. We do not believe that he fought the battle of
the Milvian Bridge as the avowed champion of Christianity, but the
probabilities are that he had made up his mind to become a Christian
when he fought it. The miraculous vision in the heavens, the dream
in the quiet of the night, the appearance of Christ by the bedside of
the Emperor—as to these things we may keep an open mind, but the
fashioning of the Labarum—the sacred standard which was
preserved for so many centuries as the most precious of imperial
heirlooms and was seen and described as late as the ninth century
—this was the outward and visible proof of the change which had
come over the Emperor. He had abandoned Apollo for Christ. The
sun-god had been the favourite deity of his youth and early
manhood, as it had been of Augustus Cæsar, the founder of the
Empire, and the originator of the close association between the
worship of Apollo and the worship of the reigning Cæsar.
Constantine would not fail to note that many of the most gracious
attributes of Apollo belonged also to Christ.
He soon manifested the sincerity of his conversion. After a short
stay in Rome, he went north to Milan, where he gave the hand of his
sister, Constantia, to his ally, Licinius. Diocletian was invited, but
declined to make the journey. The two Emperors, no doubt, desired
to secure the prestige of his moral support in their mutual hostility to
the Emperor of the East, and the benefit of his counsel in their
deliberations upon the state of the Empire. But even if Diocletian had
been tempted to leave his cabbages to join in the marriage festivities
and the political conference at Milan, we imagine that he would still
have declined if he had been given any hint of the intentions of
Constantine and Licinius with respect to the great question of
religious toleration or persecution. He might have been candid
enough to admit the failure of his policy, but he would still have
shrunk from proclaiming it with his own lips. For, before the festivities
at Milan were interrupted by the news that Maximin had thrown down
the gage of battle, Constantine and Licinius issued in their joint
names the famous Edict of Milan, which proclaimed for the first time
in its absolute entirety the noble principle of complete religious
toleration. Despite their length, it will be well to give in full the more
important clauses. They are found in the text which has been happily
preserved by Lactantius[54] in the original Latin, while we also have
the edict in Greek in the Ecclesiastical History of Eusebius (x. 5). It
runs as follows:
Then follow the most explicit instructions for the restoration to the
Christians of the properties of which they had been robbed during
the persecutions, though the robbery had been committed in
accordance with imperial command. Whether a property had been
simply confiscated, or sold, or given away, it was to be handed back
without the slightest cost and without any delays or ambiguities
(Postposita omni frustratione atque ambiguitate). Purchasers who
had bought such properties in good faith were to be indemnified from
the public treasury by grace of the Emperor.
But the abiding interest of this celebrated edict lies in the general
principles there clearly enunciated. Every man, without distinction of
rank or nationality, is to have absolute freedom to choose and
practise the religion which he deems most suited to his needs
(Libera atque absoluta colendæ religionis suæ facultas). The phrase
is repeated with almost wearisome iteration, but the principle was
novel and strange, and one can see the anxiety of the framers of this
edict that there shall be no possible loophole for misunderstanding.
Everybody is to have free choice; all previous anti-Christian
enactments are annulled; not only is no compulsion to be employed
against the Christian, he is not even to be troubled or annoyed (Citra
ullam inquietudinem ac molestiam). The novelty lay not so much in
the toleration of the existence of Christianity,—both Constantine and
Licinius had two years before signed the edict whereby Galerius put
an end to the persecution,—but in its formal official recognition by
the State.
What motives, then, are assigned by the Emperors for this notable
change of policy? Certainly not humanity. Nothing is said of the
terrors of the late persecutions and the horrible sufferings of the
Christians—there is merely a bald reference to previous edicts which
the Emperors consider “unjust and alien from the spirit of our
clemency” (Sinistra et a nostra clementia aliena esse). There is no
appeal to political necessity, such as the exhaustion of the world and
its palpable need of rest. The motives assigned are purely religious.
The Emperors proclaim religious toleration in order that they and
their subjects may continue to receive the blessings of Heaven. One
of them at least had just emerged victoriously from the manifold
hazards of an invasion of Italy. Surely we can trace a reference to
the battle of the Milvian Bridge and the overthrow of Maxentius in the
mention of “the Divine favour towards us, which we have
experienced in affairs of the highest moment” (Divinus juxta nos
favor quem in tantis sumus rebus experti). What Constantine and
Licinius hope to secure is a continuance of the favour and
benevolence of the Supreme Divinity, the patronage of the ruling
powers of the sky. The phraseology is important. The name of God is
not mentioned—only the vague “Summa Divinitas,“ ”Divinus favor,”
and the still more curious and non-committal phrase, “Quicquid est
Divinitatis in sede cœlesti.” In Eusebius the same phrase appears in
a form still more nebulous (ὅτι ποτέ ἐστι θειότης καὶ οὐρανίου
πράγματος). A pagan philosopher, more than half sceptical as to the
existence of a personal God, might well employ such language, but it
reads strangely in an official edict.
But then this edict was to bear the joint names of Constantine and
Licinius. Constantine might be a Christian, but Licinius was still a
pagan, and Licinius was not his vassal, but his equal. He would
certainly not have been prepared to set his name to an edict which
pledged him to personal adherence to the Christian faith.
Constantine, in the flush of triumph, would insist that the persecution
of the Christians should cease, and that the Christian religion should
be officially recognised. Licinius would raise no objection. But they
would speedily find, when it came to drafting a joint edict, that the
only religious ground common to them both was very limited in
extent, and that the only way to preserve a semblance of unity was
to employ the vaguest phraseology which each might interpret in his
own fashion. If we can imagine the Pope and the Caliph drafting a
joint appeal to mankind which necessitated the mention of the Higher
Power, they would find themselves driven to use words as cloudy
and indistinct as the “Whatever Divinity there is and heavenly
substance” of Eusebius. No, it was not that Constantine’s mind was
in the transitional stage; it was rather that he had to find a common
platform for himself and Licinius.
But to have converted Licinius at all to an official recognition of the
Christians and complete toleration was a great achievement, for the
principle, as we have said, was entirely new. M. Gaston Boissier, in
discussing this point, recalls how even the broad-minded Plato had
found no place in his ideal republic for those who disbelieved in the
gods of their fatherland and of the city of their birth. Even if they kept
their opinions to themselves and did not seek to disturb the faith of
others, Plato insisted upon their being placed in a House of
Correction—it is true he calls it a Sophronisterion, or House of
Wisdom—for five years, where they were to listen to a sermon every
day; while, if they were zealous propagandists of their pernicious
doctrines, he proposed to keep them all their lives in horrible
dungeons and deny their bodies after death the right of sepulture.
How, one wonders, would Socrates have fared in such a state? No
better, we fancy, than he fared in his own city of Athens. But,
throughout antiquity, every lawgiver took the same view, that a good
citizen must accept without question the gods of his native place who
had been the gods of his fathers; and it was a simple step from that
position to the stern refusal to allow a man, in the vigorous words of
the Old Testament, to go a-whoring after other gods. “For I, thy God,
am a jealous God.” The God of the Jews was not more jealous than
the gods of the Assyrians, the Egyptians, the Greeks, or the Romans
would like to have been, had they had the same power of concise
expression.
What was the theory of the State religion in Rome? Cicero tells us
in a well-known passage in his treatise On the Laws, where he
quotes the ancient formula, “Let no man have separate gods of his
own: nor let people privately worship new gods or alien gods, unless
they have been publicly admitted.”[55] Nothing could be more explicit.
But theory and practice in Rome had a habit of becoming divorced
from one another. It is a notorious fact that, as Rome’s conquering
eagles flew farther afield, the legions and the merchants who
followed in their track brought all manner of strange gods back to the
city, where every wandering Chaldæan thaumaturgist, magician, or
soothsayer found welcome and profit, and every stray goddess—
especially if her rites had mysteries attached to them—received a
comfortable home. In a word, Rome found new religions just as
fascinating—for a season or two—as do the capitals of the modern
world, and these new religions were certainly not “publicly admitted”
by the Pontifex Maximus and the representatives of the State
religion. Occasionally, usually after some outbreak of pestilence or
because an Emperor was nervous at the presence of so many
swarthy charlatans devoting themselves to the Black Arts, an order
of expulsion would be issued and there would be a fluttering of the
dove-cotes. But they came creeping back one by one, as the storm
blew over. While, therefore, in theory the gods of Rome were
jealous, in practice they were not so. The easy scepticism or
eclecticism of the cultured Roman was conducive to tolerance.
Cicero’s famous sentence in the Pro Flacco, “Each state has its own
religion, Lælius: we have ours,” shews how little of the religious
fanatic there was in the average Roman, who stole the gods of the
people he conquered and made them his own, so that they might
acquiesce in the Roman domination. The Roman was tolerant
enough in private life towards other people’s religious convictions: all
he asked was reciprocity, and that was precisely what the Christian
would not and could not give him. If the Christian would have
sacrificed at the altars of the State gods, the Roman would never
have objected to his worship of Christ for his own private
satisfaction. There lies the secret of the persecutions, and of the
fierce anti-Christian hatreds.
Constantine and Licinius, by their edict of recognition and
toleration, “publicly admitted” into the Roman worship the God of the
Christians.
CHAPTER VII
THE DOWNFALL OF LICINIUS
“God most High, we call upon Thee; Holy God, we call upon Thee.
We commend to Thee all justice; we commend to Thee our safety;
we commend to Thee our sovereignty. Through Thee we live;
through Thee we gain victory and happiness. Most High and Holy
God, hear our prayers. We stretch out our arms to Thee. Hear us,
Most High and Holy God.”