دانلود رایگان مقالات IEEEدانلود رایگان مقالات بیس مهندسی فناوری اطلاعات ITدانلود رایگان مقالات سال 2018دانلود رایگان مقاله ISI اینترنت اشیا به زبان انگلیسیدانلود رایگان مقاله ISI اینترنت و شبکه های گسترده به زبان انگلیسیدانلود رایگان مقاله ISI مهندسی فناوری اطلاعات به زبان انگلیسی سال 2022 و 2023سال انتشار

مقاله انگلیسی رایگان در مورد الگوهای طراحی برای اینترنت اشیای صنعتی – ۲۰۱۸ IEEE

 

مشخصات مقاله
ترجمه عنوان مقاله الگوهای طراحی برای اینترنت اشیای صنعتی
عنوان انگلیسی مقاله Design Patterns for the Industrial Internet of Things
انتشار مقاله سال ۲۰۱۸
تعداد صفحات مقاله انگلیسی ۱۰صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
مقاله بیس این مقاله بیس میباشد
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده
مجله کارگاه بین المللی IEEE در سیستم های ارتباطی کارخانه – IEEE International Workshop on Factory Communication Systems
دانشگاه  Electrical Engineering and Computer Science – Howard University – Washington – USA
کلمات کلیدی اینترنت اشیا صنعتی، IIoT، الگوهای طراحی، صنعت ۴٫۰
کلمات کلیدی انگلیسی  Internet of Things، Sensors، Cloud computing، Security، Wireless sensor networks، Industries
شناسه دیجیتال – doi
https://doi.org/10.1109/WFCS.2018.8402353
کد محصول  E10531
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

I- INTRODUCTION

II- INTERNET OF THINGS (IOT) BACKGROUND

III- APPLICATIONS OF THE INDUSTRIAL IOT (IIOT)

IV- DESIGN PATTERNS IN THE INDUSTRIAL IOT

V- CORRELATION WITH THE IIOT REFERENCE ARCHITECTURE

VI-  RELATED WORK

VII- CONCLUSION AND FUTURE WORK

REFERENCES

 

بخشی از متن مقاله:

Abstract

The Internet of Things (IoT) is a vast collection of interconnected sensors, devices, and services that share data and information over the Internet with the objective of leveraging multiple information sources to optimize related systems. The technologies associated with the IoT have significantly improved the quality of many existing applications by reducing costs, improving functionality, increasing access to resources, and enhancing automation. The adoption of IoT by industries has led to the next industrial revolution: Industry 4.0. The rise of the Industrial IoT (IIoT) promises to enhance factory management, process optimization, worker safety, and more. However, the rollout of the IIoT is not without significant issues, and many of these act as major barriers that prevent fully achieving the vision of Industry 4.0. One major area of concern is the security and privacy of the massive datasets that are captured and stored, which may leak information about intellectual property, trade secrets, and other competitive knowledge. As a way forward toward solving security and privacy concerns, we aim in this paper to identify common input-output (I/O) design patterns that exist in applications of the IIoT. These design patterns enable constructing an abstract model representation of data flow semantics used by such applications, and therefore better understand how to secure the information related to IIoT operations. In this paper, we describe communication protocols and identify common I/O design patterns for IIoT applications with an emphasis on data flow in edge devices, which, in the industrial control system (ICS) setting, are most often involved in process control or monitoring.

Introduction

Kevin Ashton (1999) first coined the phrase IoT for a system of linked devices. IoT has taken the initial advances of Internet technology to a new level, whereby every object in our environment will ultimately have its own unique identifier and be connected to all the other objects around us. Everyday goods, such as TV sets, fridge freezers, automobiles, and even clothing, will amass data regarding the ways in which they are being used; this data will be passed around the IoT, and devices will be instructed to behave in the most efficient and user-friendly fashion as determined by the analysis of that data [1]. Progress on the IoT has been rapid and is growing exponentially. By the year 2020, Gartner predicts that there will be 25 billion unique devices attached to the global IT infrastructure [2]. The fundamental basis of IoT is that many different devices have been set up so that they can be interrogated and manipulated via the Internet by human users themselves or by programs that mirror the aims and desires of those users. The IoT is already having a transformative effect on the way human beings interact, not only with their environment but also with each other. The ways in which we work, with our houses, vehicles, civil services, shops, factories, even weapons, will be changed dramatically. Healthcare, education, and resources will be offered in a swifter, more efficient fashion that is personalized to the consumer [1]. Companies like Walmart are already using radio-frequency identification (RFID) tags to manage their stock; this is an example of very basic IoT implementation [3]. As the number and complexity of connected devices grows, so does the chance of security vulnerabilities that can be exploited by hackers who attempt to manipulate connected devices to their own advantage. As with traditional computing systems, the majority of IoT security attacks will be launched through software; the fact that many different appliances will operate using very similar software makes it ripe for malicious actions to propagate and become widespread [4]. As such, making the IoT secure will be of fundamental concern.

نوشته های مشابه

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا