To see the other types of publications on this topic, follow the link: Industrial protocol.

Journal articles on the topic 'Industrial protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Industrial protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Li Xin, and Liang Wang. "Industrial Monitoring Wireless Sensor Network Routing Algorithm and Simulation." Advanced Materials Research 457-458 (January 2012): 1149–54. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.1149.

Full text
Abstract:
Aiming at the routing protocol in an industrial monitoring system, this paper analyzes the demand of the industrial monitoring wireless routing protocol, proposes a region adaptive routing protocol, and provides the algorithm, procedure and data structure of the route protocol in the industrial monitoring system. Simulation results show that the result of quantitative description compared energy consumption with time delay, this protocol is superior to orientation spreading, sensor protocols for information via negotiation(SPIN) and passing more energy protocols in both aspects, this algorithm can replace the all existing route protocols in the field of industrial monitoring area.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.

Full text
Abstract:
This paper focuses on the problem of protocol identification in the industrial internet and proposes an unknown protocol identification method. We first establish an industrial internet protocol detection model to classify known protocols, unknown protocols, and interference signals and then store the unknown protocols for manual analysis. Based on the Eps-neighborhood idea, we further develop an Eps-neighborhood hit algorithm and propose an identification method to identify unknown protocols, where the supervised learning classification of unknown protocol detection is realized. Finally, extensive experimental results are provided to illustrate our theoretical findings. It indicates that the proposed method has an average screening accuracy of 94.675% and 95.159% for unknown protocols encoded in binary and ASCII, respectively, while the average screening accuracy of known protocols in binary and ASCII encoding is 94.242% and 94.075%.
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Chi, Xinyi Du, Xinchun Li, Yachun Tu, Lin Li, Xi Jin, and Changqing Xia. "5G-Based Industrial Wireless Controller: Protocol Adaptation, Prototype Development, and Experimental Evaluation." Actuators 12, no. 2 (January 21, 2023): 49. http://dx.doi.org/10.3390/act12020049.

Full text
Abstract:
As a promising industrial wireless network technology, 5G URLLC is playing a key role in industrial control systems which employ different kinds of industrial control protocols. This leaves a significant challenge in how to adapt 5G URLLC with existing industrial control protocols and develop novel industrial wireless controllers. Motivated by this, this paper investigates the protocol adaptation and experimental evaluations for the development of a 5G-based industrial wireless controller prototype. Specifically, using the globally used industrial protocol Modbus as an example, we first deeply analyze the characteristics of the data packet format and the communication time sequence of Modbus RTU, Modbus TCP, and 5G protocols. Then, we propose a protocol resolution and conversion scheme for the protocol adaptation between Modbus RTU/Modbus TCP and 5G. Furthermore, we develop a wireless programmable logic controller (PLC) prototype system based on 5G. To evaluate the protocol adaptation scheme and the developed prototype, we perform extensive experiments to test the reliability and latency. The results demonstrate that the latency of the protocol adaptation scheme is smaller than that of protocol transparent transmission without resolution and conversion, while the reliability loss is not large. Moreover, the speed and reliability for the protocol adaptation between Modbus TCP and 5G are better than those between Modbus RTU and 5G.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage ensemble reverse analysis method, namely, MSERA, which fully considers the design concept of industrial control protocols. MSERA divides the traditional reverse analysis process into three stages and identifies the fields with different semantic characteristics in different stages and combines with field rectification to effectively improve the results of reverse analysis of industrial control protocols. Through the experimental comparison of some public and proprietary industrial control protocols, it is found that MSERA not only outperforms Netzob in the accuracy of field split but also far exceeds Netzob in semantic recognition accuracy. The experimental results show that MSERA is very practical and suitable for reverse analysis of industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles
5

Pandeeswaran, Chelliah, Natrajan Papa, and Sundar G. Jayesh. "EE-Hybrid MAC Protocol for Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 407–11. http://dx.doi.org/10.4028/www.scientific.net/amm.573.407.

Full text
Abstract:
MAC protocol design in Wireless sensor networks becomes vibrant research field for the past several years. In this paper an EE-Hybrid MAC protocol (Energy efficient hybrid Medium Access Control) has been proposed, which is energy efficient and low latency MAC protocol, which uses interrupt method to assign priority for certain wireless sensor nodes assumed to be present in critical loops of industrial process control domain. EE-Hybrid MAC overcomes some of the limitations in the existing approaches. Industrial wireless sensor network require a suitable MAC protocol which offers energy efficiency and capable of handling emergency situations in industrial automation domain. Time critical and mission critical applications demands not only energy efficiency but strict timeliness and reliability. Harsh environmental condition and dynamic network topologies may cause industrial sensor to malfunction, so the developed protocol must adapt to changing topology and harsh environment. Most of the existing MAC protocols have number of limitations for industrial application domain In industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay. The proposed EE-Hybrid MAC protocol is simulated in NS2 environment, from the result it is observed that proposed protocol provides better performance compared to the conventional MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Peixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (December 23, 2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Full text
Abstract:
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O objetivo deste estudo é caracterizar as funcionalidades dos protocolos MQTT, HTTP e CoAP como uma aplicação de manufatura industrial, com painel de monitoramento nas plataformas Adafruit.IO, Tago.IO e Thinger.IO. É proposto um método para a realização de estudos semelhantes, em sistemas de manufatura interativa, com uso de protocolos e plataformas IIoT. Como forma de conexão da máquina com a internet, é utilizado o módulo ESP8266 NodeMCU. Na aplicação, as plataformas IIoT obtiveram resultados muito semelhantes, podendo ser a elas atribuídas o mesmo grau de importância para o estudo. Os protocolos diferenciaram-se, sendo o protocolo MQTT o que melhor respondeu às funcionalidades do sistema de manufatura proposto, ao oferecer sua comunicação assíncrona, sem necessidade de que os equipamentos estejam constantemente interagindo. Já o protocolo HTTP apresentou melhores recursos em APIs, mas sua conexão síncrona demanda uma boa rede de dados em internet. Por fim, o protocolo CoAP apresentou documentação insuficiente para acesso às plataformas e bibliotecas para uso em módulos microcontroladores. Palavras-chave: Protocolos; IIoT; plataformas; redes; indústria 4.0; programação. Abstract Industrial Internet of Things: a trial of IoT protocols for industrial manufacturing Changes in the goods and consumption market, caused by digital transformation, require manufacturing machines to be more interactive, with each other and with cloud monitoring panels. Connections via the Internet of Things (IoT) promote this desired degree of interaction and mobility, but the industrial environment demands increased reliability and security. The Industrial Internet of Things (IIoT) presents itself with protocols and platforms for this purpose. Knowing the characteristics of protocols and platforms, facing the desired manufacturing, becomes important. The objective of this study is to characterize the functionalities of the MQTT, HTTP and CoAP protocols in an industrial manufacturing application, with a monitoring panel on the Adafruit.IO, Tago.IO and Thinger.IO platforms. A method is proposed for carrying out similar studies in interactive manufacturing systems, using IIoT protocols and platforms. As a way of connecting the machine to the internet, the ESP8266 NodeMCU module is used. In the developed application, the IIoT platforms obtained very similar results, and they can be attributed the same degree of importance for the study. In the evaluation of the protocols, the MQTT protocol was the one that best met the functionalities of the proposed manufacturing system, providing its asynchronous communication, which does not requires the equipment to be constantly interacting. The HTTP protocol has better features in APIs, but its synchronous connection demands a good data network on the internet. The CoAP protocol presented insufficient documentation available for access to platforms and libraries, for use in microcontroller modules. Keywords: Protocols; IIoT; platforms; networks; industry 4.0; programming. Resumen Internet Industrial de las Cosas: un ensayo de protocolos IoT para la fabricación industrial En medio de los cambios en el mercado de bienes y de consumo provocados por la transformación digital, se requiere que las máquinas de fabricación sean más interactivas, tanto entre sí como con los paneles de control en la nube. Las conexiones dela Internet de las Cosas (IoT) promueven este grado deseado de interacción y movilidad, pero el entorno industrial exige una mayor fiabilidad y seguridad. La Internet Industrial de las Cosas (IIoT) se presenta con protocolos y plataformas para este fin. Conocer las características de los protocolos y las plataformas relacionados a la fabricación cobra importancia. El objetivo de este estudio es caracterizar las funcionalidades de los protocolos MQTT, HTTP y CoAP en una aplicación de fabricación industrial, con panel de control en las plataformas Adafruit.IO, Tago.IO y Thinger.IO. Se propone un método para realizar estudios similares, en sistemas de fabricación interactivos, utilizando protocolos y plataformas IIoT. Como forma de conectar la máquina a internet, se utiliza el módulo ESP8266 NodeMCU. En la aplicación, las plataformas IIoT obtuvieron resultados muy similares, pudiendo asignarles el mismo grado de importancia para el estudio. Los protocolos, en cambio, se mostraron diferentes, siendo el MQTT el que mejor respondió a las funcionalidades del sistema de fabricación propuesto, ofreciendo su comunicación asíncrona, no requiriendo que los equipos estén constantemente interactuando. El protocolo HTTP presentaba mejores recursos en las API, pero su conexión sincrónica exige una buena red de datos de internet. Por último, el protocolo CoAP presentó una documentación insuficiente para el acceso a las plataformas y bibliotecas, para su uso en módulos de microcontroladores. Palabras clave: Protocolos; IIoT; plataformas; redes; industria 4.0; programa.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhai, Liang, Qiuhua Zheng, Xu Zhang, Haizhong Hu, Weihao Yin, Yingpei Zeng, and Ting Wu. "Identification of Private ICS Protocols Based on Raw Traffic." Symmetry 13, no. 9 (September 19, 2021): 1743. http://dx.doi.org/10.3390/sym13091743.

Full text
Abstract:
With the development of the Industrial Internet in recent years, security issues have been a hot topic of the industrial control system (ICS) network management. Identifying the protocol traffic in the communication process of the ICS is an important prerequisite to avoid security problems, especially in ICSs that use many private protocols. The private protocols cannot be analyzed due to the unknown internal structure of the protocols, which makes the ICS protocol identification work more difficult. However, the Internet-oriented protocol identification method is not applicable to the scenario of the private ICS protocols network environment. With this problem in mind, this paper proposes a method of ICS protocol identification based on the raw traffic payload. The method firstly performs data preprocessing such as data selection, interception, cleaning conversion, and labeling on the raw traffic of the protocol based on the characteristics of the industrial control protocol. Then it uses an AM-1DCNN + LSTM deep learning model to extract temporal and spatial features of the ICS raw traffic, and performs protocol identification. This method can effectively extract ICS protocol features in scenarios where protocol parsing is impossible compared with existing methods. We constructed a dataset for ICS protocol identification based on open-source data and tested the proposed method for experiments, and the identification accuracy rate reached 93%.
APA, Harvard, Vancouver, ISO, and other styles
8

Du, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (December 31, 2022): 24. http://dx.doi.org/10.3390/fi15010024.

Full text
Abstract:
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protocol using a model detection method combining the Dolev–Yao attack model and the Coloring Petri Net (CPN) theory. Because of the security loopholes in the original protocol, a timestamp was introduced into the original protocol, and the shared key establishment process in the original protocol lacked fairness and consistency. We adopted a new establishment method to establish the shared secret and re-verified its security. The results show that the overall security of the protocol has been improved by 16.7% while effectively preventing current replay attack.
APA, Harvard, Vancouver, ISO, and other styles
9

KOCAMUFTUOGLU, Arda, Okan AKBAY, and Serkan KABA. "A Comparative Study on Industrial Communication Protocols Using IoT Platforms." Eurasia Proceedings of Science Technology Engineering and Mathematics 14 (December 31, 2021): 57–65. http://dx.doi.org/10.55549/epstem.1050178.

Full text
Abstract:
In this study, the industrial communication protocols used in internet of things platforms are explained and compared with respect to pre-defined metrics which are gathered from devices in the industrial area, communication protocol principles, customer feedback and device hardware capabilities. They are explained in detail for end users and systems. Communication protocols in industrial area are given and illustrated with comparative table. The presented information and comparisons provide guidance for industrial internet of things projects. The selection of communication protocol is a critical process for surviving and sustaining of IoT platforms. IoT platforms provide solutions for industrial area for both on premise and cloud based applications compatible with industrial communication protocols. This study is shaped by the IoT platform which is developed by Klemsan, improved by industrial communication protocols which are widely used in industrial area, are explained briefly. There are 13 evaluation metrics which are presented in detail that is necessary to be chosen between industrial communication protocols for IoT platforms.
APA, Harvard, Vancouver, ISO, and other styles
10

Štohl, R., and K. Stibor. "Safety through Common Industrial Protocol." IFAC Proceedings Volumes 45, no. 7 (2012): 362–65. http://dx.doi.org/10.3182/20120523-3-cz-3015.00069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ma, Zhi Yan, Guang You Yang, Jing Jing Zhou, and Xiong Gan. "Energy-Efficient Routing Protocol of Wireless Sensor Network for Industrial Application." Key Engineering Materials 579-580 (September 2013): 732–39. http://dx.doi.org/10.4028/www.scientific.net/kem.579-580.732.

Full text
Abstract:
An energy-efficient wireless sensor routing protocol (Energy-efficient clustering hierarchy routing protocol, EECH) for industrial field is proposed based on LEACH protocol according to the energy inefficiency of existing routing protocols and the characteristics of industrial field applications. The EECH protocol takes full advantages of the node clustering and time slot distribution in LEACH and implements the functions such as clustering, multi hop time slot distribution, node sleeping and data gathering. The cluster heads can be evenly distributed in the area with the geography location information of the wireless nodes, so that the optimal data gathering path can be established. Meanwhile, the EECH protocol can reduce the conflict in data receiving/transmitting and the energy consumption of the nodes, and extend the network lifetime through the multi hop time slot distribution and node sleep mechanism. The simulation results have shown that the death time of the first node in EECH protocol is extended double time than that of LEACH protocol. When most of the nodes dies, the amount of received data of the base station node is more than twice as much as the LEACH protocol, which has verified the energy efficiency characteristic of the EECH protocol.
APA, Harvard, Vancouver, ISO, and other styles
12

Ji, Yukai, Tao Huang, Chunlai Ma, Chao Hu, Zhanfeng Wang, and Anmin Fu. "IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering." Security and Communication Networks 2022 (November 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8026280.

Full text
Abstract:
Nowadays, with the wide application of industrial control facilities, industrial control protocol reverse engineering has significant security implications. The reverse method of industrial protocol based on sequence alignment is the current mainstream method because of its high accuracy. However, this method will incur a huge time overhead due to unnecessary alignments during the sequence alignment process. In this paper, we optimize the traditional sequence alignment method by combining the characteristics of industrial control protocols. We improve the frequent sequence mining algorithm, Apriori, to propose a more efficient Bag-of-Words generation algorithm for finding keywords. Then, we precluster the messages based on the generated Bag-of-Words to improve the similarity of the message within a cluster. Finally, we propose an industrial control protocol message preclustering model for sequence alignment, namely, IMCSA. We evaluate it over five industrial control protocols, and the results show that IMCSA can generate clusters with higher message similarity, which will greatly reduce the invalid alignments existing in the sequence alignment stage and ultimately improve the overall efficiency.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhao, Xingwen, Dexin Li, and Hui Li. "Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things." Sensors 22, no. 19 (October 3, 2022): 7510. http://dx.doi.org/10.3390/s22197510.

Full text
Abstract:
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have designed lightweight authentication protocols that achieve limited security properties. Moreover, these existing protocols are mostly implemented in a single-gateway scenario, whereas the multigateway scenario is not considered. To deal with these problems, this paper presents a novel three-factor authentication and key agreement protocol based on elliptic curve cryptography for IIoT environments. Based on the elliptic curve Diffie–Hellman problem, we present a protocol achieving desirable forward and backward secrecy. The proposed protocol applies to single-gateway and is also extended to multigateway simultaneously. A formal security analysis is described to prove the security of the proposed scheme. Finally, the comparison results demonstrate that our protocol provides more security attributes at a relatively lower computational cost.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Zhaowei, Peng Zeng, Linghe Kong, Dong Li, and Xi Jin. "Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks." Sensors 18, no. 8 (August 18, 2018): 2718. http://dx.doi.org/10.3390/s18082718.

Full text
Abstract:
Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
15

Alimujiang, Yi Ming, and Mai Maiti Reziwan. "A Simple Switched Ethernet Protocol for Hard Real-Time Communication." Advanced Materials Research 677 (March 2013): 490–95. http://dx.doi.org/10.4028/www.scientific.net/amr.677.490.

Full text
Abstract:
This paper presents a simple and efficient switched Ethernet communication protocol for industrial hard real-time LAN applications. The network is set up with end nodes and a switch, in small-size industrial network covering such as factory automation, distributed control systems and embedded systems. Compared to some conventional hard real-time network protocols by performing some experiments, the proposed protocol has better real-time performances and meets the requirements of reliability for hard real-time system applications.
APA, Harvard, Vancouver, ISO, and other styles
16

Kiangala, Kahiomba Sonia, and Zenghui Wang. "An Effective Communication Prototype for Time-Critical IIoT Manufacturing Factories Using Zero-Loss Redundancy Protocols, Time-Sensitive Networking, and Edge-Computing in an Industry 4.0 Environment." Processes 9, no. 11 (November 21, 2021): 2084. http://dx.doi.org/10.3390/pr9112084.

Full text
Abstract:
The Industrial Internet of things (IIoT), the implementation of IoT in the industrial sector, requires a deterministic, real-time, and low-latency communication response for its time-critical applications. A delayed response in such applications could be life-threatening or result in significant losses for manufacturing plants. Although several measures in the likes of predictive maintenance are being put in place to prevent errors and guarantee high network availability, unforeseen failures of physical components are almost inevitable. Our research contribution is to design an efficient communication prototype, entirely based on internet protocol (IP) that combines state-of-the-art communication computing technologies principles to deliver a more stable industrial communication network. We use time-sensitive networking (TSN) and edge computing to increase the determinism of IIoT networks, and we reduce latency with zero-loss redundancy protocols that ensure the sustainability of IIoT networks with smooth recovery in case of unplanned outages. Combining these technologies altogether brings more effectiveness to communication networks than implementing standalone systems. Our study results develop two experimental IP-based industrial network communication prototypes in an intra-domain transmission scenario: the first one is based on the parallel zero-loss redundancy protocol (PRP) and the second one using the high-availability seamless zero-loss redundancy protocol (HSR). We also highlight the benefits of utilizing our communication prototypes to build robust industrial IP communication networks with high network availability and low latency as opposed to conventional communication networks running on seldom redundancy protocols such as Media Redundancy Protocol (MRP) or Rapid Spanning Tree Protocol (RSTP) with single-point of failure and delayed recovery time. While our two network communication prototypes—HSR and PRP—offer zero-loss recovery time in case of a single network failure, our PRP communication prototype goes a step further by providing an effective redundancy scheme against multiple link failures.
APA, Harvard, Vancouver, ISO, and other styles
17

Radek, Stohl, and Stibor Karel. "The Common Industrial Protocol in Machine Safety." Procedia Engineering 100 (2015): 773–81. http://dx.doi.org/10.1016/j.proeng.2015.01.431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Piggin, R. "Control in real time [Common Industrial Protocol]." Computing and Control Engineering 17, no. 6 (December 1, 2006): 28–31. http://dx.doi.org/10.1049/cce:20060603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bednarek, Marcin, Tadeusz Dąbrowski, and Wiktor Olchowik. "Selected Practical Aspects of Communication Diagnosis in the Industrial Network." Journal of KONBiN 49, no. 1 (March 1, 2019): 383–404. http://dx.doi.org/10.2478/jok-2019-0020.

Full text
Abstract:
Abstract Industrial networks combine elements of distributed control systems: process stations, operator stations and engineering stations. DCS stations often communicate using a dedicated, closed communication protocol. The industrial networks can be also used to manage communication between the stations of various systems, separate in terms of configuration. The process station communicates here with an external operator station, that is the SCADA system. For this purpose, the process stations and the SCADA systems can also communicate according to standard communication protocols, e.g. Modbus TCP. The paper examines the selected variants of diagnosing the communication status between the process station and the external operator station conducted according to the Modbus TCP protocol. The practical methods of finding the communication system unfitness causes are discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Jaloudi, Samer. "Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study." Future Internet 11, no. 3 (March 7, 2019): 66. http://dx.doi.org/10.3390/fi11030066.

Full text
Abstract:
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Chan Suet Yan, Sharon, Alice Tang Su Wei, Jie Hui Bong, Quor Ling Teh, Shanmugapiriya Sivalingam, Shi Yee Khoo, and Tahmid Mutashim Nafy. "Authentication of IoT device with the enhancement of One-time Password (OTP)." Journal of IT in Asia 9, no. 1 (November 30, 2021): 29–40. http://dx.doi.org/10.33736/jita.3841.2021.

Full text
Abstract:
The Robust and Energy Efficient Authentication Protocol works for Industrial Internet of Things. The Internet of Things (IoT) is an arising innovation and expected to give answers for different modern fields. The IoT enable connection of physical devices all around the world to the internet by collecting and sharing critical and real-time data among each other. The increment of devices increases the computational cost during data transmission between devices and towards the internet. In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol proposed by Li et al. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome by Li et al. scheme. Our contribution for this project is, we proposed the solution that a multi-factor authentication protocol to enhance the protocol proposed. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome. The idea of adding OTP is inspired by where they scheme correlates to biometric of user as well. Our proposal is lower cost than the three protocols regarding authentication overhead and computational cost perspectives. Challenges and future directions of this paper examined the security shortcomings of a client confirmation convention for WSN, which is as proposed by Chang and Le. To address the normal security shortcomings of past protocols, we proposed a strong and energy effective three-factor authentication protocol for WSN.
APA, Harvard, Vancouver, ISO, and other styles
22

Lai, Yingxu, Huijuan Gao, and Jing Liu. "Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer." Sensors 20, no. 7 (April 5, 2020): 2040. http://dx.doi.org/10.3390/s20072040.

Full text
Abstract:
Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used to express the probability distribution of data values. Next, the random variable threshold and the maximum probability are compared in the algorithm to determine whether to replace the current data value with the minimum probability data value. Finally, the Modbus application protocol (MBAP) header is completed according to the protocol specification. Experiments using the anti-sample fuzzer show that it not only improves the reception rate of test cases and the ability to exploit vulnerabilities, but also detects vulnerabilities of industrial control protocols more quickly.
APA, Harvard, Vancouver, ISO, and other styles
23

Lam, Duc Khai, Yasuhiro Shinozaki, Keishi Yamaguchi, Satoshi Morita, Yuhei Nagao, Masayuki Kurosaki, and Hiroshi Ochi. "A Fast and Safe Industrial WLAN Communication Protocol for Factory Automation Control Systems." Transactions of the Institute of Systems, Control and Information Engineers 29, no. 1 (2016): 29–39. http://dx.doi.org/10.5687/iscie.29.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Surya, P., Asuman Suenbuel, and Arockia Selvakumar Arockia Doss. "Industrial Internet of Things - Control of Industry Simulation Through Different Protocols." Journal of Physics: Conference Series 2115, no. 1 (November 1, 2021): 012011. http://dx.doi.org/10.1088/1742-6596/2115/1/012011.

Full text
Abstract:
Abstract In past few years there is a great demand for internet of things (IoT), It has become an important part of smart technologies. There have been many researches going-on in internet of things in both academics and industries. IoT using in industries is also known as Industrial Internet of Things (IIoT). Where smart sensors are used along with IoT are used. This research work is done to identify the best protocol for high-speed data transmission with no loss of data to prevent command lag between mobile controller and industry. In this research a soda filling Industry simulation with 3 different plants was controlled through a mobile application through different protocols with 4 different features of data transfer. The time of data sending and receiving from application and ESP32 controller are stored in a log. The speed of data transfer of all different protocols is compared. From the final result, ThingSpeak is an optimum protocol for this application which is 36% faster than HTTP in single data transfer and 39% faster than MQTT in continuous data transfer.
APA, Harvard, Vancouver, ISO, and other styles
25

Yi, Fumin, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, and Dawei Zhao. "WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks." Sensors 22, no. 19 (September 29, 2022): 7413. http://dx.doi.org/10.3390/s22197413.

Full text
Abstract:
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge–response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol.
APA, Harvard, Vancouver, ISO, and other styles
26

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
APA, Harvard, Vancouver, ISO, and other styles
27

Mahboub, Aziz, El Mokhtar En-Naimi, Mounir Arioua, Hamid Barkouk, Younes El Assari, and Ahmed El Oualkadi. "An energy-efficient clustering protocol using fuzzy logic and network segmentation for heterogeneous WSN." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4192. http://dx.doi.org/10.11591/ijece.v9i5.pp4192-4203.

Full text
Abstract:
Wireless sensor networks have become an emerging research area due to their importance in the present industrial application. The enlargement of network lifetime is the major limitation in WSN. Several routing protocols study the extension of lifespan in WSN. Routing protocols significantly influence on the global of energy consumption for sensors in WSN. It is essential to correct the energy efficiency performance of routing protocol in order to improve the lifetime. The protocols based on clustering are the most routing protocols in WSN to reduce energy consumption. The protocols dedicate to WSN have demonstrated their limitation in expanding the lifetime of the network. In this paper, we present Hybrid SEP protocol : Multi-zonal Fuzzy logic heterogeneous Clustering based on Stable Election Protocol (FMZ-SEP). The FMZ-SEP characterizes by four parameters: WSN segmentation (splitting the WSN into the triangle zones ), the Subtractive Clustering Method to determine a correct number of clusters, the FCM and the SEP protocol. The FMZ-SEP prolong the stability period and extend the lifetime. The simulation results point out that the stability period of FMZ-SEP. FMZ-SEP protocol outperforms of MZ-SEP, FSEP and SEP protocol by improving the network lifetime and the stability period.
APA, Harvard, Vancouver, ISO, and other styles
28

Yu, Changhong, Ze Zhang, and Ming Gao. "An ICS Traffic Classification Based on Industrial Control Protocol Keyword Feature Extraction Algorithm." Applied Sciences 12, no. 21 (November 4, 2022): 11193. http://dx.doi.org/10.3390/app122111193.

Full text
Abstract:
Industrial control protocol feature extraction is an important way to improve the accuracy and speed of industrial control protocol traffic classification. This paper firstly proposes a keyword feature extraction method for industrial control protocol, and then designs and implements an industrial control system (ICS) traffic classification based on this method. The proposed method utilizes the characteristics of the relatively fixed format of the industrial control protocol and the periodicity of the protocol traffic in ICS. The keyword features of the industrial control protocol can be accurately extracted after data preprocessing, data segmentation, redundant data filtering, and feature byte mining. A feature dataset is then formed. The designed ICS traffic classifier adopts decision tree and is trained with the feature dataset. Experiments are carried out on the open-source dataset. The results show that the proposed method achieves 99.99% classification accuracy, and the classification precision and classification recall rate reach 99.98% and 99.93%, respectively. The training time and predicting time of classifier are 0.34 s and 0.264 s, respectively, which meets the requirements of high precision and low latency of industrial control system.
APA, Harvard, Vancouver, ISO, and other styles
29

PHUA, VALANCE, and AMITAVA DATTA. "A LINK STATE DEPENDENT TDMA PROTOCOL FOR INDUSTRIAL WIRELESS SENSOR NETWORK APPLICATIONS IN PERIODICALLY CHANGING ENVIRONMENTS." Journal of Interconnection Networks 09, no. 03 (September 2008): 231–54. http://dx.doi.org/10.1142/s0219265908002254.

Full text
Abstract:
Existing TDMA-based MAC protocols for wireless sensor networks are not specifically built to consider communication channels that are prone to fading. We describe the impact of periodically changing environment on small-scale fading effects in industrial indoor wireless networks. Using a site-specific ray tracer, we show that the position of nodes and the periodic movements of objects with constant velocities in the environment have significant impact on signal fading. Finding that fading is approximately periodic, we propose a TDMA-based MAC protocol for wireless sensor networks built for industrial applications that uses link state dependent scheduling. In our approach, nodes gather samples of the channel quality and generate prediction sets from the sample sets in independent slots. Using the prediction sets, nodes only wake up to transmit/receive during scheduled slots that are predicted to be clear and sleep during scheduled slots that may potentially cause a transmitted signal to fade. We simulate our proposed protocol and compare its performance with the well published Z-MAC protocol. We found that our protocol significantly improves packet throughput and energy consumption as compared to Z-MAC. We also found that in conditions which are not perfect under our assumptions, the performance of our protocol degrades gracefully.
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Jaikaran, Mukesh Tiwari, and Manish Shrivastava. "Industrial Feedback cum Control System through CAN Protocol." International Journal of Computer Applications 69, no. 21 (May 31, 2013): 8–12. http://dx.doi.org/10.5120/12093-8196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lu, Sheng. "Study on Industrial EIP Protocol and its Application." Advanced Materials Research 171-172 (December 2010): 82–85. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.82.

Full text
Abstract:
EtherNet/IP protocol (EIP) is a new standard of field bus standard. It is an open industrial networking standard that supports real-time I/O messaging, explicit message exchange. This paper has a discussion on the structure of EIP, EIP packet encapsulation and its application in industrial area. And it analyses the working principle of CIP, which includes objects, services, and application data. In addition, it studies how EIP realize Explicit Messaging and Explicit Message. It gives the analysis of application of EIP in industrial area.
APA, Harvard, Vancouver, ISO, and other styles
32

Macho, Tomáš. "IPv6 protocol – Base principles, deployment and industrial applications." IFAC Proceedings Volumes 45, no. 7 (2012): 220–25. http://dx.doi.org/10.3182/20120523-3-cz-3015.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Moazami Farahany, E., and S. Jinap. "Influence of noodle processing (industrial protocol) on deoxynivalenol." Food Control 22, no. 11 (November 2011): 1765–69. http://dx.doi.org/10.1016/j.foodcont.2011.04.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Stój, Jacek, Anne-Lena Kampen, Rafał Cupek, Ireneusz Smołka, and Marek Drewniak. "Industrial Shared Wireless Communication Systems—Use Case of Autonomous Guided Vehicles with Collaborative Robot." Sensors 23, no. 1 (December 23, 2022): 158. http://dx.doi.org/10.3390/s23010158.

Full text
Abstract:
Dedicated fieldbuses were developed to provide temporal determinisms for industrial distributed real-time systems. In the early stages, communication systems were dedicated to a single protocol and generally supported a single service. Industrial Ethernet, which is used today, supports many concurrent services, but usually only one real-time protocol at a time. However, shop-floor communication must support a range of different traffic from messages with strict real-time requirements such as time-driven messages with process data and event-driven security messages to diagnostic messages that have more relaxed temporal requirements. Thus, it is necessary to combine different real-time protocols into one communication network. This raises many challenges, especially when the goal is to use wireless communication. There is no research work on that area and this paper attempts to fill in that gap. It is a result of some experiments that were conducted while connecting a Collaborative Robot CoBotAGV with a production station for which two real-time protocols, Profinet and OPC UA, had to be combined into one wireless network interface. The first protocol was for the exchange of processing data, while the latter integrated the vehicle with Manufacturing Execution System (MES) and Transport Management System (TMS). The paper presents the real-time capabilities of such a combination—an achievable communication cycle and jitter.
APA, Harvard, Vancouver, ISO, and other styles
35

Shang, Wenli, Guanyu Zhang, Tianyu Wang, and Rui Zhang. "A Test Cases Generation Method for Industrial Control Protocol Test." Scientific Programming 2021 (March 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6611732.

Full text
Abstract:
The coverage of test cases is an important indicator for the security and robustness test of industrial control protocols. It is an important research topic to complete the test with less use cases. Taking Modbus protocol as an example, a calculation method of case similarity and population dispersion based on weight division is proposed in this paper. The method can describe the similarity of use cases and the dispersion degree of individuals in the population more accurately. Genetic algorithm is used to generate and optimize test cases, and individual similarity and population dispersion are used as fitness functions of genetic algorithm. Experimental results show that the proposed method can increase the population dispersion by 3.45% compared with the conventional methods and effectively improve the coverage of test cases.
APA, Harvard, Vancouver, ISO, and other styles
36

Olenev, Valentin, Irina Lavrovskaya, Yuriy Sheynin, Ilya Korobkov, Elena Suvorova, Elena Podgornova, Dmitry Dymov, and Sergey Kochura. "STP-ISS Transport Protocol for SpaceWire On-Board Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 45–76. http://dx.doi.org/10.4018/ijertcs.2014100103.

Full text
Abstract:
The paper describes the development of a new transport protocol for the SpaceWire onboard networks. It starts from the overview and analysis of existing SpaceWire-oriented transport protocols. Then the paper considers the general industrial requirements for the Transport protocol, which should operate over the SpaceWire network technology. The main two chapters of the paper present the first and the second revisions of the new STP-ISS transport protocol, which has been developed in accordance with the results of the overview and technical requirements. In addition, the authors describe STP-ISS modeling process, which was very efficient for the STP ISS protocol development, testing, analysis and improvement.
APA, Harvard, Vancouver, ISO, and other styles
37

Figueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.

Full text
Abstract:
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol's resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.
APA, Harvard, Vancouver, ISO, and other styles
38

Azad, Md Abul Kalam, and Hoon Oh. "A Multicast-based MAC Protocol for Improving Data Transmission Efficiency in Industrial WSNs." International Journal of Emerging Technology and Advanced Engineering 12, no. 9 (September 1, 2022): 63–73. http://dx.doi.org/10.46338/ijetae0922_07.

Full text
Abstract:
In industrial WSNs, attaining the desired level of data transmission efficiency is highly challenging not only for a frequently changing network topology but also for a short data acquisition cycle time. A short data acquisition time often restrains a sensor MAC protocol to incorporate an effective data packet salvaging technique. Therefore, we propose a data transmission technique in which a sending node multicasts data packets to all candidate parents including its primary parent. As a result, the necessity of data retransmission attempts is totally avoided, which greatly improves the data transmission efficiency in industrial WSNs. By simulation experiments, we have shown that the proposed multicast-based MAC protocol surpasses all the competing MAC protocols regarding the successful data packet delivery and power saving with a significant margin
APA, Harvard, Vancouver, ISO, and other styles
39

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
40

Meng, Fan Gui, Bao Chen Jiang, and Cheng You Wang. "An Improvement of ZigBee Cluster-Tree Routing Protocol." Advanced Materials Research 588-589 (November 2012): 1214–17. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.1214.

Full text
Abstract:
ZigBee is a wireless standard for Wireless Personal Area Networks (WPANs), and it is widely used in industrial, commercial, medical fields where low energy consumption is needed. ZigBee routing protocols should be stable, reliable and low-power. Cluster-Tree routing protocol is a simple and reliable routing protocol used in ZigBee network, and it only takes into account parent-child relationships of nodes, therefore its routing path is single and inefficient. This paper improves Cluster-Tree algorithm by introducing a neighbor table. The improved routing protocol has better performance in less energy consumption and a longer life cycle of entire ZigBee network.
APA, Harvard, Vancouver, ISO, and other styles
41

Zelensky, A. A. "HIGH-SPEED INDUSTRIAL REAL-TIME NETWORK OF CYBERPHYSICAL SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 185 (November 2019): 46–52. http://dx.doi.org/10.14489/vkit.2019.11.pp.046-052.

Full text
Abstract:
The construction of a high-speed industrial real-time network based on FPGA (Field-Programmable Gate Array) for the control of machines and industrial robots is considered. A brief comparative analysis of the performance of the implemented Ethernet-based Protocol with industrial protocols of other leading manufacturers is made. The aim of the research and development of its own industrial automation Protocol was to reduce the dependence on third-party real-time protocols based on Ethernet for controlling robots, machines and technological equipment. In the course of the study, the requirements for the network of the motion control system of industrial equipment were analyzed. In order to synchronize different network nodes and provide short exchange cycle time, an industrial managed switch was developed, as well as a specialized hardware controller for processing Ethernet packets for end devices, presented as a IP-core. A key feature of the developed industrial network is that the data transmission in it is completely determined, and the exchange cycle time for each of the network devices can be configured individually. High efficiency and performance of implemented network devices became possible due to the use of hardware solutions based on FPGAs. All solutions described in the article as part of a modular digital system have been successfully tested in the control of machines and industrial robot. The results of field tests show that the use of FPGAs and soft processors with specialized peripheral IP-blocks can significantly reduce the tact of managing industrial equipment through the use of hardware computing structures, which indicates the promise of the proposed approach for solving industrial automation tasks.
APA, Harvard, Vancouver, ISO, and other styles
42

Shen, Jiajun, and Dongqin Feng. "Vulnerability Analysis of CSP Based on Stochastic Game Theory." Journal of Control Science and Engineering 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/4147251.

Full text
Abstract:
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
APA, Harvard, Vancouver, ISO, and other styles
43

Martin, K. M., and B. Seetha Ramanjaneyulu. "Priority Based Centralized Scheduling for Time Slotted Channel Hopping Based Multihop IEEE 802.15.4 Networks." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 363–72. http://dx.doi.org/10.1166/jctn.2020.8676.

Full text
Abstract:
To meet the growing demands of low power and determinism in Industrial Wireless applications, IEEE defined IEEE 802.15.4e amendment that includes many channel access methods. Time Slotted Channel Hopping protocol is one of the most popular MAC protocols under IEEE 802.15.4e. However, scheduling of time slots for time slotted channel hopping, was not part of the protocol and so different scheduling algorithms were proposed by researchers. A new time slotted channel hopping scheduling mechanism that considers priorities to meet the time critical industrial applications is proposed in this work. Latency improvements of about 40 percentage are obtained here, for slot allocations to higher priority devices, when compared with the conventional queuing methods.
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar, Manish, Rajeev Tripathi, and Sudarshan Tiwari. "A Weighted Routing Scheme for Industrial Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 4, no. 2 (April 2015): 1–14. http://dx.doi.org/10.4018/ijwnbt.2015040101.

Full text
Abstract:
The WSNs replace the medium of communication from wired to wireless in industrial environment. This offer several advantages that includes easy and fast installation, low-cost maintenance and energy saving. In industrial monitoring and control application, the sensory measures should be delivered to control center in predefined deadline time, so the necessary actions may timely initiated. The geographical routing as reactive routing protocol plays a massive role for real-time packet delivery. The proposed routing protocol follows path discovery on demand basis to reduce the path discovery overhead. Moreover, the routing protocol follows weighted forwarding node selection process. This selects the shorter path over speedy reliable links for smaller deadline time and distributes the traffic over energy efficient node for larger deadline time. Through simulation, the authors demonstrate, compared to existing routing protocol the proposed routing protocol improves the packet delivery ratio along with enhanced network life while maintaining the high energy efficiency and low delivery latency.
APA, Harvard, Vancouver, ISO, and other styles
45

Hu, Zhangxiang, Xiaodan Jiang, Xiajun Ding, Kai Fang, and Xiaolong Zhou. "A High-Performance Energy-Balanced Forwarding Strategy for Wireless Sensor Networks." Mobile Information Systems 2022 (May 5, 2022): 1–10. http://dx.doi.org/10.1155/2022/3058499.

Full text
Abstract:
The wireless sensor network (WSN) is composed of several sensor nodes organized by multi-hop self-organization, which is a typical network for the industrial internet in industrial application. However, the energy using and processing capacity of each node are greatly limited. Therefore, it is of great significance to study energy-saving and efficient communication protocols for WSN. To prolong the lifetime of WSN and improve network throughput, a high throughput routing protocol with balanced energy consumption is proposed. The designed protocol first employs the K-means clustering algorithm to cluster the nodes, then calculates the weights based on the residual energy of and distance between the nodes, and finally selects the best node as the cluster head. Moreover, the optimal size of the package is determined by the parameters of the wireless transceiver and the channel conditions. In the data transmission stage, the Dijkstra algorithm is used to calculate the multi-objective weight function as the link cost. Experimental results demonstrate the superior performance of the proposed protocol over the CERP and TEEN routing protocols in terms of energy saving of network nodes, so as to improve the throughput and survival time of the entire system.
APA, Harvard, Vancouver, ISO, and other styles
46

Ehrlich, Marco, Arne Neumann, Alexander Biendarra, and Jürgen Jasperneite. "Quality-of-Service monitoring of hybrid industrial communication networks." at - Automatisierungstechnik 67, no. 1 (January 28, 2019): 69–78. http://dx.doi.org/10.1515/auto-2018-0057.

Full text
Abstract:
Abstract Today many hybrid (wired & wireless) industrial communication networks with a huge variety of heterogeneous technologies and protocols are present in the manufacturing and automation domain. The increasing requirements regarding e. g., latency, reliability, or determinism create the need for a holistic network management concept in order to assure a network-wide Quality-of-Service (QoS) resource provisioning and the assurance of the admissioned resources. Consequently, a monitoring of the whole network is required to feed the network management system with the needed information about the underlying network processes. Various technical approaches using different methods of extracting the information from network traffic are available for the purpose of QoS parameter observance and measurement at the moment. Therefore, this paper provides a state of the art research about network management and QoS provisioning respectively QoS assurance concepts. In addition, the passive network monitoring approach using the flow export technique based on the Internet Protocol Flow Information Export (IPFIX) is investigated for a utilisation in the nowadays industry domain based on a conceptual case study with a wireless protocol. As a conclusion, an evaluation is performed in order to clarify the limits and the overall usability of IPFIX for the monitoring of industrial networks in order to support future network management systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Ioana, Alexandru, Camelia Burlacu, and Adrian Korodi. "Approaching OPC UA Publish–Subscribe in the Context of UDP-Based Multi-Channel Communication and Image Transmission." Sensors 21, no. 4 (February 11, 2021): 1296. http://dx.doi.org/10.3390/s21041296.

Full text
Abstract:
The Open Platform Communication Unified Architecture (OPC UA) protocol is a key enabler of Industry 4.0 and Industrial Internet of Things (IIoT). OPC UA is already accepted by the industry and its presence is expected to reach more and more fields, applications, and hierarchical levels. Advances within the latest specifications are providing the opportunity to extend the capabilities and the applicability of the protocol, targeting better performances in terms of data volumes, speed, availability, footprint, and security. Continuing previous researches focusing on the publish–subscribe (pub/sub) mechanism and real-time constraints, the current study aims to consider higher data-volumes, approach the multi-channel User Datagram Protocol (UDP)-based communication, and analyze the robustness of the developed mechanism in the context of long-term data transmission. Consequently, the research proposes to extend the applicability of the OPC UA in the context of image transmission. Although highly needed, the image transmission after processing is currently beyond the reach of OPC UA or other legacy industrial protocols, being considered as a separate fraction in the industrial environment. The concept and developments are applied considering both the end-of-line industrial manufacturing process in the automotive sector and the car-to-infrastructure communication. Without special hardware constraints, the obtained results are proven to be appreciable, opening various future perspectives for image transmission using OPC UA.
APA, Harvard, Vancouver, ISO, and other styles
48

Rocha, Murilo Silveira, Guilherme Serpa Sestito, Andre Luis Dias, Alfonso Celso Turcato, Dennis Brandão, and Paolo Ferrari. "On the performance of OPC UA and MQTT for data exchange between industrial plants and cloud servers." ACTA IMEKO 8, no. 2 (June 27, 2019): 80. http://dx.doi.org/10.21014/acta_imeko.v8i2.648.

Full text
Abstract:
The Internet of Things (IoT) is a key technology in the development of Industry 4.0. An increasing number of new industrial devices are expected to communicate with each other by means of local (edge) and cloud computing servers. In this article, two well-known protocols used for IoT and Industrial IoT (IIoT) are compared in terms of their performance when they are used to send/receive data to/from cloud servers. Due to their wide diffusion and suitability, the considered protocols are open platform communication-unified architecture publisher-subscriber (OPC UA PubSub) (purposely developed and maintained by industrial consortia) and message queuing telemetry transport (MQTT), the most well-known message protocol originally developed by IBM. The performance comparison is carried out considering the overall quantity of the data transferred (user payload plus overhead) and the roundtrip time required to send in data and receive a feedback message in return. The experimental results include the evaluation of several cloud computing server and application scenarios, highlighting how each protocol is particularly suitable for certain situations. Finally, conclusions about the best choice for data exchange between devices are given.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Xiaowei, Kezhi Lv, and Bo Li. "IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols." International Journal of Parallel, Emergent and Distributed Systems 35, no. 3 (September 3, 2019): 376–95. http://dx.doi.org/10.1080/17445760.2019.1655740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Luo, Fuyuan, Tao Feng, and Lu Zheng. "Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network." Security and Communication Networks 2021 (November 23, 2021): 1–15. http://dx.doi.org/10.1155/2021/8090547.

Full text
Abstract:
With the rapid development of wireless communication technology in the field of industrial control systems, Wireless HART is an international wireless standard, because of its low cost and strong scalability, as well as its wide range of applications in the industrial control field. However, it is more open communication so that the possibility of increased attacks by external. At present, there are many types of research on wireless protocol security at home and abroad, but they all focus on the realization of the security function of the protocol itself, which has certain limitations for the formal modeling of the protocol security assessment. Taking into account the aforementioned research status, this paper takes the Wireless HART protocol as the research object and adopts the model detection method combining eCK model theory and colored Petri net theory to evaluate and improve the security of the protocol. First, the colored Petri net theory and CPN Tools modeling tool were introduced to verify the consistency of the original model of the protocol. And the eCK model was used to evaluate the security of the original protocol model. It was found that the protocol has two types of man-in-the-middle attack vulnerabilities: tampering and deception. Aiming at the attack loopholes of the protocol, an improvement plan was proposed. After improving the original protocol, CPN Tools modeling tool was used for security verification. It was found that the new scheme improvement can effectively prevent the existing attacks and reasonably improve the security of the protocol.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography