Sensors 20 05603
Sensors 20 05603
net/publication/344512886
CITATIONS READS
47 200
2 authors:
All content following this page was uploaded by Nicoleta-Cristina Gaitan on 15 January 2021.
Abstract: The Internet of Things (IoT) is an emerging concept that has revolutionized the use of new
technologies in everyday life. The economic impact of IoT becoming very important, and it began
to be used in the industrial environment under the name of the Industrial Internet of Things (IIoT)
concept, which is a sub-domain of IoT. The IIoT changes the way industrial processes are controlled
and monitored, increasing operating efficiency. This article proposes a software architecture for IIoT
that has a low degree of abstraction compared to the reference architectures presented in the literature.
The architecture is organized on four-layer and it integrates the latest concepts related to fog and
edge computing. These concepts are activated through the use of fog/edge/gateway nodes, where the
processing of data acquired from things is performed and it is the place where things interact with
each other in the virtual environment. The main contributions of this paper are the proposal and
description of a complete IIoT software architecture, the use of a unified address space, and the use of
the computing platform based on SoC (System on Chip) with specialized co-processors in order to be
able to execute in real-time certain time-critical operations specific to the industrial environment.
1. Introduction
The Internet of Things (IoT) [1,2] is an emerging concept that changes the interactions of people
with things in everyday life. IoT [3] allows the connection of ubiquitous objects/things to the Internet
in order to provide innovative services that can lead to time- and money-saving in the daily activity of
the individuals and that can increase the quality of life [4].
The IoT concept is applied in a wide variety of applications such as smart building [5,6] smart
transport [7], smart cities [8], smart healthcare [9,10], and smart living with the aim to provide new
services and an efficiency of the operating costs. In the design and development of IoT applications,
existing technologies can be used to activate the IoT concept, but new technologies can be developed
to help develop the specific applications. Initially, the IoT concept uses only wireless technologies
for connection of the things to the Internet but now it can use any available technologies, wired and
wireless. In fact, IoT can reuse wired or wireless communication technologies that have been used
in other types of application in which various devices can connect to a computing system directly or
through a gateway.
The things/objects form everyday life are brought into the virtual environment through sensors
or other methods of acquiring real-data from their environment, such as human–machine interfaces.
Acquired data or virtual things are transmitted to computing platforms where they are processed,
they interact between them, and decisions are made, decisions that can be transmitted to the execution
elements located in the environment. Basically, the things interact with each other in the virtual
environment, opening the way to a wide variety of applications, from monitoring, identification,
tracking, metering, resource management, etc. [11]. IoT is an evolution of the Internet from the Internet
of People to the Internet of Things and further to the Internet of Everything.
All these things connected to the Internet generate a large volume of data and sending this data
directly to the cloud is costly in terms of bandwidth and time of response to events. It is estimated that
the number of IoT devices will be about 41.6 billion and will generate 79.4 zettabytes in 2025 [12] with
an annual growth rate of 28.7% from 2018 to 2025. For this reason, it is not efficient to transfer this data
directly to the cloud because they would use a considerable bandwidth. In order to address this issue,
the concept of edge/fog computing has been defined, through which these data can be processed much
closer to their source and some cloud services are brought to the edge of the network.
The differences between fog and edge computing concepts are given in the way the data are
processed. For data processing, fog computing uses the interconnection between nodes while edge
computing is performed on isolated nodes, closer to where the data is generated [13].
A sub-domain of IoT is the Industrial Internet of Things (IIoT) [14,15] that includes the industrial
and machine-to-machine (M2M) communication technologies used in a smart factory or in the
automation fields. In addition to IoT, the IIoT [4] has new challenges such as latency constraints,
network bandwidth constrains, resource-constrains devices, reliability, uninterrupted service without
Internet access, and new security challenges that are specific to the industrial field. Information services
provided throughout the IIoT are still in their early stage [16]. Legacy systems in manufacturing with
proprietary data and protocols are seen as one of the major existing challenges in the development
of IIoT solutions [16]. The IIoT consists of sensor networks (industrial fieldbuses), actuators, robots,
machines, appliances, business processes, and personnel [17]. All of these elements are used to achieve
an efficient and intelligent manufacturing process. Industry 4.0 is a sub-domain of IIoT and refers to
the integration of the IoT concept into smart manufacturing. The term of Industry 4.0 was proposed by
the German government to define the fourth industrial revolution [18].
A definition of the IIoT is provided in [19], where IIoT is defined as “the network of intelligent
and highly connected industrial components that are deployed to achieve high production rate with
reduced operational costs through real-time monitoring, efficient management and controlling of
industrial processes, assets and operational time”.
The IIoT market has a high economic potential. It is estimated that the IIoT market will reach the
value of $263.4 billion in 2027 despite the crisis from 2020 with an annual growth of 16.7% from 2019 to
2027 [20]. The IIoT caught the attention of the academic, government, and industrial environment due
to the benefits it can provide.
In the industrial environment, sensors used include thermocouples (TC), resistance temperature
detectors (RTDs), or other types of transducer (for example pressure, flow, liquid level transducers).
Usually, these sensors/transducers are connected to the devices with digital/analog inputs, which in turn
are connected to an industrial communication bus called a fieldbus. Furthermore, the transducers can
be connected directly to the fieldbuses. These devices can have low complexity in the sense that they
can read the values from the inputs and transmit them on the fieldbuses, or devices that can have high
complexity and they can make different decisions based on the inputs, such are the programmable logic
controllers (PLCs). These devices can also have analog/digital outputs and can be used to control different
actuators. There can be actuators connected directly to fieldbuses to receive commands [21]. In the
industrial environment, there is a wide variety of devices that combine the features presented so far.
The industrial environment is a special environment where we can find many sources of interference
in wireless communication systems. Also, wireless communication is not suitable for the development
of control systems with real-time requirements. For this reason, wire communication systems such as
EtherCAT, CANOpen, Profinet, Profibus, Modbus, and AS-I fieldbuses [21] are mainly used, but there
are also wireless fieldbuses such as WirelessHART or the new technologies based on the 5G [22,23],
such as Narrowband IoT or Long-Term Evolution (LTE) Cat-M.
Sensors 2020, 20, 5603 3 of 19
In the design and development of IIoT solutions, the main issues and challenges are:
• The largest number and great diversity of fieldbuses and devices used in the industrial environment;
• The compliance with real-time requirements specific to the industrial applications;
• Interoperability between fieldbuses and devices;
• Interoperability between IIoT systems.
In the specialized literature, several reference architectures for IoT and IIoT are proposed, but these
are abstract models which do not deal with how to integrate things from the industrial environment,
especially as in this environment are used communication systems (fieldbuses) with specific capabilities
such as real-time monitoring and control of time-critical operations. Practical examples are also
presented in the specialized literature, but these solutions are designed and developed for a certain
type of network and a small number of device types.
This paper proposes a software architecture for IIoT that integrates the concepts of fog/edge
computing and fieldbuses specific to the industrial environment. The proposed architecture is organized
in layers and it exploits the performances of the data processing at the edge of the network to reduce the
bandwidth used for the cloud connection but also to obtain a shorter response time when dealing with
time-critical operations. Fog/edge computing can integrate features such as low latency, predictability,
hard real-time that are very important for monitoring and controlling time-critical operations specific
to the industrial environment. Furthermore, the architecture contains a virtual environment used
for interaction and data exchange between the virtual and/or real objects/things. Unlike the IIoT
architectures presented in the specialized literature, the proposed IIoT architecture aims to integrate
many fieldbuses into the system. In addition, by using a device description language, they can be
added to the system through the plug and play method.
The proposal and description of complete IIoT software represents the main contribution of this
paper. The conceptual model for the IIoT system contains some operational and implementation
details that are useful in developing an IIoT solution based on the proposed architecture. The strengths
of the proposed architecture are:
• Versatility—it can be adapted to the requirements and configuration of different industrial environments;
• Real-time capabilities—using System on Chip (SoC) systems with specialized processors for the
design and development of the fog nodes;
• The integration of several fieldbuses at the same time;
• Interoperability between different fieldbuses by building a unified address space;
• Interoperability between IIoT systems by using a standardized middleware system.
This paper is structured as follows: Section 2 presents some IIoT architectures presented in the
specialized literature and some companies, and the motivation of the proposed IIoT architecture.
Section 3 describes the proposed IIoT architecture with some discussions related the implementation.
Section 4 presents some discussions related to the security issues addressed by the proposed IIoT
architecture. Section 5 presents a comparison between proposed architecture and the architectures
analyzed in Section 2. The conclusions are drawn in Section 6.
2. Related Work
An IIoT reference architecture is the abstractization of an IIoT architecture that allows the
identification of general components and implementation challenges. In the specialized literature,
more reference architectures are proposed for IIoT. In June 2019, the Industrial Internet Consortium (IIC)
released version 1.9 of the reference architecture for the IIoT [24]. It is focused on different viewpoints
(business, usage, functional, and implementation viewpoints). The implementation viewpoint presents
the system components and the technologies that can be used to implement the functionalities
described in the functional viewpoint. Furthermore, the implementation viewpoint contains a technical
description of the architecture components, including interfaces, protocols, behaviors, and other
Sensors 2020, 20, 5603 4 of 19
properties [24], but it does not contain information related to the integration of the fieldbuses and
devices from the industrial environment.
Another important IIoT reference architecture is the Reference Architectural Model Industry
4.0 (RAMI 4.0) [25,26]. This is based on a 3-D model where the axes are Live Cycle, Value Stream,
and Hierarchy Levels, and it is service-oriented architecture. The hierarchy level of the architecture
is organized in the following levels: product, field devices, control devices, station, work centers,
enterprise, and connected world. The value stream level of the architecture is related to the different
component functionalities, it includes a communication layer and it is organized the following
layers with a high level of abstraction: asset, integration, communication, information, functional,
and business.
Other IoT reference architectures are organized on layers, such that defined by the International
Telecommunication Union (ITU) that consists of four layers: devices, network, service support and
application support, and application [27]. The device layer includes the device capabilities for interaction
for the communication network and gateway capabilities for supporting multiple communication
networks. The network layer includes networking and transport capabilities, service support, and the
application support layer includes the generic and specific support for the application layer.
In [28], the authors proposed a case study on the growth of big data in IIoT systems, a classification
of key concepts, and a presentation of key frameworks and continued with the presentation of future
technologies, opportunities, and challenges. These researches concluded that augmented reality,
IoT devices, cyber-physical systems and Industry 4.0 Big Data and Analytics (BDA) platforms are
at an early stage in IIoT systems and that solutions should be found in developing new standards
that allow interoperability between various platforms but also processing capability of the end-to-end
applications for concentric computing systems. A solution to improve the blockchain scalability of
IIoT systems by guaranteeing system security, latency but also decentralization, that was proposed in
the article [29] have led to performance optimization with a deep reinforcement learning technique
(DRL). The authors obtained results that demonstrated they can obtain a better efficiency compared to
the basic parameters of the system.
In another research paper [19], the authors concluded based on conducted researches that the
success of IIoT can be hindered for different reasons such as challenging collaboration between various
heterogeneous IIoT systems, efficient data management, large, solid, and flexible data technologies,
IIoT protocols, operating systems, reliable IIoT systems but also the coexistence of wireless technologies.
In addition to a survey of existing definitions of IIoT in [30], the authors also present a proposal
for a new definition of what the IIoT means. The authors also present an analysis of a framework
for IIoT devices based on security-related issues surrounding IIoT but as well as an analysis of the
relationships between cyber-physical systems and Industry 4.0.
A secure fog-based IIoT architecture by suitably plugging a number of security features that
reduce the trust and burden on the cloud and resource-constrained devices, but also that reduce latency
in decision making that improves the performance, is presented in another research paper from the
specialized literature [31]. Also, the authors demonstrated that by offloading several computationally
intensive tasks to the fog nodes, the battery life of the resource-constrained of end devices is greatly
saved. The validation of the architecture was demonstrated through theoretical analyses, practical
experiments, but also through simulation and testbed implementation.
In [32], an IIoT application for a sewage treatment plant is proposed. This IIoT solution uses control
station systems based on the STMicroelectronics STM32 microcontrollers to update the automation
system and to activate the IIoT concept. Basically, the STM32-based control stations act as gateways
between field devices connected to fieldbuses and their connection within the local network and
further to the Internet for remote monitoring and cloud connections. The monitoring operations can
be performed remotely from PCs or mobile devices such as smartphones and tablets. The authors
concluded that this solution provide the real-time performances and reliability required for monitoring
and controlling the sewage treatment plant.
Sensors 2020, 20, 5603 5 of 19
In [33], the authors define an architecture organized on four layers: sensing layer, networking layer,
service layer, and interface layer. In [34] an architecture is proposed that contains the physical layer,
transport layer middleware layer, and application. An architecture with three layers (perception/sensing
layer, network layer, and service/application layer) is proposed in [35,36]. All these reference
architectures have a high level of abstraction and do not provide details related to the development of
the IIoT solutions based on these reference architectures.
A trust framework for automated guided vehicles (AGVs) in smart factories is presented
in [37]. The authors defined a trust measure for AVG, designed the trust framework, and presented
a set of experiments based on this framework, but they did not provide details related to the
communication with the AVGs and how the data are acquired from the AVGs and integrated into the
proposed framework.
A software architecture for IIoT is presented in [38] and updated in [39]. The proposed architecture
is organized on 4 levels: things, data provider, middleware, and applications. The interaction between
things is performed at the application level, the upper level in the architecture. In this paper, we propose
an evolution of the architecture presented in [38,39] by including new technologies such as fog/edge
computing concepts. Furthermore, now things interact with each other at a lower layer, and at the
application/service layer the services necessary for the development of applications are provided,
such as monitoring and control specific to the industrial environment or applications for manufacturing
tracing and monitoring. In addition, the proposed architecture provides implementation details,
not being an abstract architecture as are most of reference architectures from the specialized literature.
Regarding SoC systems that can be used for IoT and IIoT, in [40] the authors present a comparison
between several single-board computers that can be used for IIoT solutions, namely Raspberry Pi 3,
BeagleBone Black, Banana Pi, and ODROID-C1. Of these, the most popular system is the Raspberry
Pi, but in terms of the peripherals provided, the BeagleBone Black is the best. In [41], the authors
propose a SoC architecture for the Industrial Internet of Things. The SoC architecture is implemented
on an Field Programmable Gate Array (FPGA) system with two ARM processors that execute the
Linux operating system. The FPGA gates are used to implement real-time operations specific to the
industrial environment.
A detailed survey related to the security in IIoT is presented in [42], where the authors performed
a systematic review of the literature and identified the security requirements for IIoT. These security
requirements are related to the confidentiality, integrity, availability (CIA) triad, authentication, access
control, maintainability, resilience, data security and data sharing, security monitoring, and network
security. Additionally, the authors included a description of how fog computing can address these
requirements and identify some research opportunity for the use of the fog computing for IIoT
security, namely fog-enabled authentication, fog-enabled access control, fog-enabled maintainability,
fog-enabled resilience, and fog-enabled data security and data sharing.
A survey for the security of the IIoT protocols is presented in [43]. They focused on the main
33 protocols and standards used in IIoT (from middleware systems to fieldbuses) and identify
the security vulnerability with the common vulnerability scoring system (CVSS). They proposed
a vulnerability analysis framework (VAF) that can be used to analyze 1363 vulnerabilities for IIoT
systems. Data security in edge-based IIoT is investigated in [44]. Authors identify four main challenges
reliable data storage, convenient data usage, efficient data search, and secure data deletion, and they
proposed a cloud-fog-edge device storage framework for IIoT that addresses the challenges identified.
Cloud SERVER
SECURITY
INTERNET
2
DATA PROVIDER LAYER DATA PROVIDER LAYER DATA PROVIDER LAYER
1
Sensing/THINGS LAYER Sensing/THINGS LAYER Sensing/THINGS LAYER
1. The
Figure 1. Theproposed
proposedIndustrial
IndustrialInternet of of
Internet Things (IIoT)
Things architecture.
(IIoT) 1 Sensing/things
architecture. layer,layer,
1 Sensing/things 2 Data2
provider layer, 3 Fog/edge computing layer, 4 Applications/services layer.
Data provider layer, 3 Fog/edge computing layer, 4 Applications/services layer.
proposed architecture is presented in Figure 2 (without application/service layer). In the IIoT
architecture, there can be several nodes, each node connects to one or more fieldbuses, and these
nodes implement the fog and data provider layers for these fieldbuses. These layers are software
packages implemented for a specific device based on a microprocessor or a SoC (System on Chip)
that runs
Sensors 2020,on
20, a high-level operating system such as Windows, Linux, or Android. These devices7have
5603 of 19
peripherals such as USB (universal serial bus), CAN (controller area network) bus, UART (universal
asynchronous receiver-transmitter), SPI (serial peripheral interface), and I2C (inter-integrated
An that
circuit) important
allows aspect of the proposed
the interfacing architecture
with fieldbuses used inisthetheindustrial
integration of fog/edgeFor
environment. computing
example,
concepts.
through USB we can connect to CANOpen fieldbus using a USB-CAN interface, the CAN bus canthe
Thus, in the proposed architecture there are fog/edge/gateway nodes that integrate be
fog/edge and data
used to connect to provider
CANOpen layers presented
fieldbus, in Figure
the UART can be 1. used
Theretomay be more
connect such nodes
to Profibus in the
or Modbus
IIoT architecture
fieldbus implementation.
via a UART-RS485 interface,In this
and context
SPI/I2C of canfog/edge/gateway
be used to connect nodes, another perspective
to CANOpen fieldbus via
of the proposed architecture
an SPI-CAN or I2C-CAN interface. is presented in Figure 2 (without application/service layer). In the IIoT
architecture, there can be several
These fog/edge/gateway nodes,
nodes can each node connects
be implemented ontovarious
one or computing
more fieldbuses,
systems and these
such as
nodes implement the fog and data provider layers for these fieldbuses.
BeagleBone AI, Raspberry PI 4, industrial PCs or other types of computing system that allow These layers are software
packages
connection implemented
to industrialfornetworks
a specificand device based on
sufficient a microprocessor
computing power for or data
a SoCprocessing.
(System onFor Chip)
the
that runs on a high-level operating system such as Windows, Linux,
Internet connection, 5G modules can also be used to have a high bandwidth regardless of theor Android. These devices have
peripherals such asofUSB
physical location (universal
the node. The 5Gserial
is abus), CAN (controller
technology area network)
that is beginning bus, UART
to be adopted by (universal
most GSM
asynchronous
(Global System receiver-transmitter),
for Mobile Communications)SPI (serial peripheral interface),
service providers. and
The 5GI2C (inter-integrated
modules circuit)
are the hardware
that allows the interfacing with fieldbuses used in the industrial environment.
support for the Internet connection and, for this reason, we will not insist on this aspect. From the For example, through
USB we can
software connect
point to CANOpen
of view, fieldbus using
how the connection a USB-CAN
to the Internet is interface,
made isthe CAN bus can
transparent. Thebe used to
following
connect
sectionstowill
CANOpen fieldbus,inthe
be described UART
detail forcaneach
be used
layerto of connect to Profibus
the four layers orin Modbus fieldbus
which the via a
proposed
UART-RS485 interface,
architecture is organized. and SPI/I2C can be used to connect to CANOpen fieldbus via an SPI-CAN or
I2C-CAN interface.
Cloud Server
WAN / LAN
n FIELD DEVICES / SENSORS / ACTUATORS n FIELD DEVICES / SENSORS / ACTUATORS n FIELD DEVICES / SENSORS / ACTUATORS
Figure 2.
Figure 2. Other perspective
perspective of
of the
the proposed
proposed IIoT
IIoT architecture
architecturebased
basedon
onfog/edge/gateway
fog/edge/gatewaynodes.
nodes.
FOG/Edge/Gateway NODE
Fog/Edge computing layer
Cloud DDS
Computing Midlleware
DATA Provided layer
Buffer memory
FIELDBUS FIELDBUS
DRIVER 1 DRIVER n
FIELDBUS
Figure 3.
Figure Software architecture
3. Software architecture of a fog/edge/gateway node.
In order
In order to to meet
meet the
the real-time
real-time requirements
requirements specific
specific to the industrial
to the industrial environment,
environment, the fog nodes
the fog nodes
can bebedesigned
can designed and and
developed
developed on SoCon systems
SoC with systemsspecialized
with coprocessors
specialized for the communication
coprocessors for the
communication implementation with fieldbuses. For example, we can use SoC systems that cores
implementation with fieldbuses. For example, we can use SoC systems that have one or more have
basedoronmore
one the ARM coresCortex
based Ax onarchitecture
the ARM Cortex for the execution of the complex
Ax architecture operations of
for the execution and specialized
the complex
processors
operations (e.g.,
and based on ARM
specialized Cortex Mx
processors architectures
(e.g., based onorARM other Cortex
optimized Mxarchitecture
architectures as proposed
or other
in [45]) for the communication in real-time with the fieldbuses. Thus,
optimized architecture as proposed in [45]) for the communication in real-time with the fieldbuses. the tasks with specific real-time
requirements
Thus, the tasks for with
time-critical
specificoperations
real-time specific
requirementsto the industrial environment
for time-critical are executed
operations specific onto the
the
specialized coprocessor where these requirements can be fulfilled
industrial environment are executed on the specialized coprocessor where these requirements can beand guaranteed. The basic idea is
to use multiprocessor SoC systems that have processors on which
fulfilled and guaranteed. The basic idea is to use multiprocessor SoC systems that have processorsLinux Embedded can be executed
for the
on which execution
Linux of non-critical
Embedded canoperations
be executed in the forbest-effort
the execution(soft real-time) manner
of non-critical and specialized
operations in the
coprocessors on which a real-time operating system [46] can be executed
best-effort (soft real-time) manner and specialized coprocessors on which a real-time operating for the implementation of the
protocol stack and the execution of critical time operations. With this
system [46] can be executed for the implementation of the protocol stack and the execution of critical solution, low and predictable
latencies
time can be achieved
operations. With thisatsolution,
the occurrence
low andofpredictable
events or atlatencies
the execution
can beof the critical
achieved operations
at the occurrence by
decoupling the software part with real-time requirements from the software
of events or at the execution of the critical operations by decoupling the software part with real-time part that does not have
strict real-timefrom
requirements requirements.
the software In part
the case
that of these
does notSoChave systems, the drivers
strict real-time have a partInthat
requirements. theruns
case onof
specialized coprocessors (real-time cores) and a part that runs on
these SoC systems, the drivers have a part that runs on specialized coprocessors (real-time cores) the main processors (application
cores).
and The software
a part that runs partonfromthe themain specialized
processors coprocessors
(applicationimplements
cores). Thethesoftware
protocolpart stack,from
and thethe
software partcoprocessors
specialized from the mainimplements
processors works as a wrapper
the protocol stack,thatandsaves
the the unit data
software partin afrom
bufferthe
memory
main
from whereworks
processors it willas beataken
wrapper and that
processed
saves by theother software
unit data in a modules.
buffer memoryIn terms of implementation,
from where it will be
this solution involves the development of software for asymmetric
taken and processed by other software modules. In terms of implementation, this solution multi-processing, and great care
involves
must
the be taken at of
development the implementation
software for asymmetric of the multi-processing,
communication between and greatprocessors
care must in be order
taken not to
at the
introduce performance bottlenecks. Fog nodes can also be developed
implementation of the communication between processors in order not to introduce performance on computing systems without
specialized co-processors,
bottlenecks. Fog nodes can but in alsothisbecase, we can obtain
developed at most softsystems
on computing real-time capabilities
without due to
specialized
the limitations of Windows and Linux operating systems [47] (including
co-processors, but in this case, we can obtain at most soft real-time capabilities due to the limitations real-time extensions such
as RTAI (Real-Time Application Interface) or PREEMPT_RT).
of Windows and Linux operating systems [47] (including real-time extensions such as RTAI The specialized co-processors provide
support forApplication
(Real-Time the development of small
Interface) software modules
or PREEMPT_RT). with strict hard
The specialized real-time provide
co-processors capabilities and
support
predictable latencies.
for the development of small software modules with strict hard real-time capabilities and
Each fieldbus
predictable latencies. will have an associated address space that defines the things connected to the
fieldbus.
EachOne of thewill
fieldbus mainhavegoalsanofassociated
the driversaddress
is to build the address
space spacethe
that defines in athings
unitary way, hiding
connected the
to the
fieldbus. One of the main goals of the drivers is to build the address space in a unitary way, hiding
the specific details of each fieldbus and connected devices, such as the addressing mode or the
Sensors 2020, 20, 5603 10 of 19
Sensors 2020, 20, x FOR PEER REVIEW 10 of 18
specific
messagedetails
format. of Thus,
each fieldbus and connected
it is possible to obtain devices, such as the
the aggregation andaddressing
processingmode of theordata
the message
acquired
format. Thus, it is possible to obtain the aggregation and processing
from different fieldbuses to which the fog node is connected through a unique software interface, of the data acquired from
different
ensuringfieldbuses to whichbetween
interoperability the fog node is connected
different through
fieldbuses. The astructure
unique software
of thisinterface,
address ensuring
space is
interoperability between different fieldbuses. The structure of this address
organized in a tree and it is stored in extensible markup language (XML) files that are loaded space is organized in awhen
tree
and it is stored in extensible markup language (XML) files that are loaded
the software module that implements the data provider layer is instantiated. It is considered that a when the software module
that implements
fieldbus can have theseveral
data provider layer is instantiated. connected,
devices/sensors/actuators It is considered and that
eacha fieldbus
device can can have
have several
several
devices/sensors/actuators connected, and each device can have several things
things such as a temperature, a pressure, a level, and so on. Each thing is characterized by several such as a temperature,
aattributes
pressure, sucha level,
asand
data sotype,
on. Each thingtimestamp,
quality, is characterizedand by several
access attributes
type. The data such as data
type can type, quality,
be numeric,
timestamp, and access type. The data type can be numeric, string, and
string, and logic, and the quality can be good or bad. The timestamp represents the time and date logic, and the quality can be of
good
the last update of the things, and the access type can be read-only, write-only, and read-write.the
or bad. The timestamp represents the time and date of the last update of the things, and A
access type can be read-only, write-only, and read-write. A sensor will
sensor will have the read-only access type and an actuator can have write-only or write-read access have the read-only access
type
type.andAn an actuator
example of can haveaddress
a space write-only
for aordevice
write-read access type.
is presented An example
in Figure 4. Thus,ofwe a space
have aaddress
device
for a device is presented in Figure 4. Thus, we have a device that
that has n analog inputs and n digital outputs. Analog inputs can be connected to sensors has n analog inputs and nsuch
digitalas
outputs. Analog inputs can be connected to sensors such as thermocouples,
thermocouples, a resistance thermometer, pressure transducers, etc. and digital outputs that can be a resistance thermometer,
pressure
connected transducers,
to execution etc. and digital
elements outputsThe
via relays. thataddress
can be connected
space for this to execution elements
device built in theviafogrelays.
node
The address
contains spacefor
n things forthe
this device inputs
n analog built inand
thenfog node
things forcontains n things
the n digital for the
outputs, n analog inputs
as illustrated and4.n
in Figure
things for the n digital outputs, as illustrated in Figure 4.
FIELDBUS 1
FOG NODE
FIELDBUS 1
DEVICE 1
DEVICE 1
Analog Input 1
Analog Input 2
Analog Analog Analog Digital Digital Digital
Input1 Input2 Input n Output1 Output1 Output n
Analog Input n
Digital Output 1
Digital Output 2
Digital Output n
Figure 4.
Figure 4. Example of the address
address space
space for
for aa device
device with
with nn analog
analog inputs
inputs and
and nn digital
digital outputs.
outputs.
The
The data
dataacquired
acquiredfrom fromthethe
fieldbuses are saved
fieldbuses in a buffer
are saved memory,
in a buffer where they
memory, wherewillthey
be retrieved
will be
and transmitted
retrieved to the upperto
and transmitted layer.
the The buffer
upper memory
layer. is allocated
The buffer memoryaccording to the definition
is allocated according found in
to the
the XML configuration
definition found in the files
XMLassociated with each
configuration fieldbus.
files The user
associated withhas thefieldbus.
each possibility to configure
The user has thethe
communication parameters
possibility to configure on the network as
the communication well as the
parameters onintroduction
the networkor aselimination
well as the of new devices.
introduction or
This address of
elimination space
newis devices.
used by the Thisupper layerspace
address to read/transmit
is used by the dataupper
to the layer
thing.toAread/transmit
thing can be accessed
data to
through
the thing.a Apath in the
thing can form of “network
be accessed through name.
a path device
in thename.
form ofthing name”.
“network name.Each device
device will thing
name. have
associated an XML file that defines all the things and attributes of the things
name”. Each device will have associated an XML file that defines all the things and attributes of the it makes available. These
files
thingscontain generic
it makes names These
available. for things
filesthat can be
contain replaced
generic nameswithfor
aliases
thingsin the
thatnetwork
can be setup
replacedprocess.
with
Each
aliasesfieldbus
in the will have setup
network an associated
process.XML Eachfile in which
fieldbus willnetwork-specific
have an associated configurations
XML file in (such
whichas
communication
network-specificspeed) and the list(such
configurations of devices connected to the
as communication fieldbus
speed) and thealonglistwith the associated
of devices connectedXML to
files are stored.
the fieldbus A fog/edge
along with thenode has anXML
associated associated
files areXML file in
stored. A which
fog/edge thenode
list ofhas
fieldbuses to which
an associated XML it
connects withthe
file in which thelist
associated XMLtofiles
of fieldbuses areitstored.
which connects These
withfiles
theare automatically
associated XML files updated during
are stored. the
These
configuration of fieldbuses
files are automatically to whichduring
updated the fogthe
node connects and of
configuration loaded when the
fieldbuses to software
which the module that
fog node
implements
connects and the functionalities
loaded when theof the fog node
software module is executed.
that implements the functionalities of the fog node
is executed.
Sensors 2020, 20, 5603 11 of 19
An important part of the XML file associated with a device is the part that describes how the
value of a thing is read or written. This is translated into messages that can be transmitted and read on
the fieldbuses, depending on the characteristics of each network. This means that the XML file must
also be interpreted by the driver to take over the commands/messages specific to each thing.
Depending on the type of network, an acquisition cycle can be defined by which data in the buffer
are updated periodically and prioritized depending on the criticality of the monitored data and the
user configuration. An example of such an acquisition cycle is presented in [48].
Publish/Subscribe environment
THINGS THINGS
name name
ATRIBUTES ATRIBUTES
THINGS THINGS
name name
ATRIBUTES ATRIBUTES
Thus, a DDS domain is defined for the architecture, which is divided into several DDS partitions,
a DDS partition corresponding to a fog/edge node. DDS defines a unit of information as a topic. Thus,
for each thing defined at the data provider level, a topic will be associated, which will have the unique
name of the access path defined at the previous level. In addition to these things, virtual things are
also defined, things that can subscribe to different DDS topics, and different processing is performed
on the received data. All these things are created by the user in the configuration process based on
predefined things that are instantiated and that subscribe to one or more topics. Perhaps the most
important predefined virtual thing is the expression thing in which certain mathematical operations
and functions can be applied to the data with which it is subscribed. Thus, the user can create virtual
things according to his needs and in accordance with the application of the industrial environment that
is integrated into the IIoT architecture. Due to the solution adopted for the interaction between things,
the architecture is very versatile, being able to be used in a wide range of industrial applications.
In the case of using the DDS middleware system, the publishing-subscription environment from
Figure 5 can be represented as in Figure 6. The connections between things are not made only locally,
but in the DDS domain, which is defined at the level of the IIoT system, things from the DDS domain
can be from the same node or from remote fog/edge nodes in a local network or on the Internet.
As can be seen from Figure 6, in the case of DDS middleware, each topic is associated with
different QoS policies. These policies can be related to data availability, data delivery, data timeliness,
and resources. For data availability, we can control how data is available within a domain through
the DURABILITY, LIFESPAN, and HISTORY policies. For data delivery, we can control how data is
delivered and exclusive rights for data through the PRESENTATION, RELIABILITY, PARTITION,
DESTINATION_ORDER, and OWNERSHIP policies. For data timeliness, we can control the timeliness
for the data through the DEADLINE, LATENCY_BUDGET, and TRANSPORT_PRIORITY policies.
Through the resources policies, we can control the computing and network resources. All of these
policies are described in the DDS specifications and they are included in the implementations of these
specifications [51–53].
Sensors 2020, 20, 5603 13 of 19
Sensors 2020, 20, x FOR PEER REVIEW 13 of 18
QoS
QoS DATA
DATA READER
WRITER
QoS
QoS DATA
DATA READER
WRITER
QoS
QoS DATA
DATA WRITER
WRITER
QoS QoS
Topic A Topic B
NODE 1
NODE 3
DDS DOMAIN
QoS
QoS Topic C QoS QoS
DATA Topic D DATA
READER WRITER
QoS QoS
DATA DATA
READER READER
QoS QoS
DATA DATA
READER WRITER
NODE n NODE 3
Figure
Figure 6. Interactions
6. Interactions betweenthings
between things in
in a
a data
datadistribution
distributionservice (DDS)
service domain.
(DDS) domain.
At higher layers, the security mechanisms must be implemented at the fog node level. Remote
access to fog nodes must be restricted, thus avoiding any security holes that may occur. The operating
system must also be kept up to date with the latest security updates. Configuration XML files can
be encrypted. This does not degrade the performance because they are decrypted when starting the
software modules to implement the data provider and fog/edge computing layers, and they are saved
in encrypted mode following the configuration operations performed by the user.
The biggest security issue can be when publishing data in the publisher-subscriber environment
provided by the DDS domain defined for the current IIoT architecture because those messages can
be intercepted when they are transmitted over the Internet. In 2018, the latest security specifications
for the DDS protocol were published. These specifications are also implemented in the OpenDDS
implementation, an open-source implementation that can be used for the design and development
of fog/edge nodes. The specifications provide the plugins for authentication, access control, logging,
data tagging, cryptography, and certificates [54]. Through these facilities, the data are transmitted
encrypted over the Internet ensuring a high degree of security regarding confidentiality, integrity,
and availability.
5. Discussions
Table 1 presents a comparison between the proposed architecture and those described in the
related work section.
A more detailed quantitative or qualitative analysis between the proposed IIoT architecture
and the existing ones requires more information than those presented in the literature. Moreover,
we propose a conceptual model and the experimental results will be implemented and presented in
future research articles.
For example, we can use BeagleBone Black for implementation. This is based on the Sitara™
AM335x SoC with 2 ARM Cortex A8 processors and two Programmable Real-Time Unit Subsystem and
Industrial Communication SubSystems (PRU-ICSS). The ARM Cortex A8 processors use a Linux-based
operating system. One PRU-ICSS can be used to design and implement a driver for the Modbus
RTU (remote terminal unit) fieldbus and the other PRU-ICSS can be used to design and implement
a driver for the CanOpen fieldbus. The data provider, fog computing, and applications/service
layers can be designed and implemented to be executed on the ARM Cortex A8 processors under
Linux. By using many of BeagleBone Black systems, we can build a complex IIoT system that can be
geographically distributed.
Sensors 2020, 20, 5603 15 of 19
Table 1. A comparison between the proposed architecture and those described in Section 2.
6. Conclusions
This paper proposed a conceptual model software architecture for the IIoT. The proposed
architecture is a conceptual model with a low level of abstraction, being oriented towards the
design and development of real-time applications for the IIoT. Among the strengths of the proposed
architecture, we can mention: the integration in the system of many fieldbuses used in the industrial
environment, addressing the specific requirements of the industrial environment such as real-time
and low-latency capabilities, and the integration in the architecture of the concepts of fog and edge
computing. Also, the use of the SoC-based computing platform with specialized co-processors is
proposed in order to be able to execute in real time certain time-critical operations specific to the
industrial environment. The specialized co-processors provide support for the development of small
software modules with strict hard real-time capabilities and predictable latencies while the main
processors provide support for the development of software modules with soft real-time capabilities.
We can conclude that the conceptual model is feasible for a combination of hard and soft real-time
systems with hard real-time constraints provided by the specialized co-processors. The fog/edge
computing can integrate features such as low latency, predictability, and hard real time that are very
important for monitoring and controlling time-critical operations specific to the industrial environment.
Furthermore, the architecture contains a virtual environment used for the interaction and data exchange
between the virtual and/or real objects/things located on the same fog / edge node or on different
fog/edge nodes. As future work, we intend to implement the proposed architecture on BeagleBone
Black and BeagleBone AI systems.
Author Contributions: Conceptualization, I.U. and N.C.G.; methodology, I.U. and N.C.G.; writing—original
draft preparation, I.U. and N.C.G.; writing—review and editing, I.U. and N.C.G.; visualization, I.U. and N.C.G.
Both the authors have read and agreed to the published version of the manuscript. All authors have read and
agreed to the published version of the manuscript.
Funding: This research received no external funding.
Acknowledgments: The infrastructure used for this work was partially supported by the project “Integrated
Center for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed
Systems for fabrication and control”, Contract No. 671/09.04.2015, Sectoral Operational Program for Increase of
the Economic Competitiveness co-funded from the European Regional Development Fund.
Conflicts of Interest: The authors declare no conflict of interest. The funders had no role in the design of the
study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to
publish the results.
References
1. Cha, S.-C.; Hsu, T.-Y.; Xiang, Y.; Yeh, K.-H. Privacy enhancing technologies in the internet of things:
Perspectives and challenges. IEEE Internet Things J. 2018, 6, 2159–2187. [CrossRef]
2. International Telecommunication Union—“Y.2060: Overview of the Internet of Things”. Available online:
https://www.itu.int/rec/T-REC-Y.2060/en (accessed on 16 July 2020).
3. Yaqoob, I.; Hashem, I.A.T.; Ahmed, A.; Kazmi, S.A.; Hong, C.S. Internet of things forensics: Recent advances,
taxonomy, requirements, and open challenges. Future Gener. Comput. Syst. 2019, 92, 265–275. [CrossRef]
4. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges,
opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [CrossRef]
5. Metallidou, C.K.; Psannis, K.E.; Egyptiadou, E.A. Energy efficiency in smart buildings: IoT approaches.
IEEE Access 2020, 8, 63679–63699. [CrossRef]
6. Ungurean, I.; Gaitan, N.C. Monitoring and control system for smart buildings based on OPC UA specifications.
In Proceedings of the International Conference on Development and Application Systems (DAS), Suceava,
Romania, 19–21 May 2016.
7. Ayoub, W.; Samhat, A.E.; Mroue, M.; Joumaa, H.; Nouvel, F.; Prévotet, J.-C. Technology selection for
iot-based smart transportation systems. In Vehicular Ad-Hoc Networks for Smart Cities; Springer: Singapore,
2020; pp. 19–29.
Sensors 2020, 20, 5603 17 of 19
8. Cirillo, F.; Gomez, D.; Diez, L.; Maestro, I.E.; Gilbert, T.B.J.; Akhavan, R. Smart city IoT services creation
through large-scale collaboration. IEEE Internet Things J. 2020, 7, 5267–5275. [CrossRef]
9. Ungurean, I. An Internet of Things framework for remote monitoring of the healthcare parameters. Adv. Electr.
Comput. Eng. 2017, 17, 11–16. [CrossRef]
10. Ungurean, I.; Gaitan, N.C. Speech analysis for medical predictions based on Cell Broadband Engine.
In Proceedings of the 20th European Signal Processing Conference (EUSIPCO), Bucharest, Romania, 27
August 2012; pp. 1733–1736.
11. Samuel, A.; Sipes, C. Making Internet of Things real. IEEE Internet Things Mag. 2019, 2, 10–12. [CrossRef]
12. The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New
IDC Forecast. Available online: https://www.idc.com/getdoc.jsp?containerId=prUS45213219 (accessed on
16 July 2020).
13. Qi, Q.; Tao, F. A smart manufacturing service system based on edge computing, fog computing, and cloud
computing. IEEE Access 2019, 7, 86769–86777. [CrossRef]
14. Kaur, K.; Garg, S.; Aujla, G.S.; Kumar, N.; Rodrigues, J.J.P.C.; Guizani, M. Edge computing in the Industrial
Internet of Things environment: Software-defined-networks-based edge-cloud interplay. IEEE Commun. Mag.
2018, 56, 44–51. [CrossRef]
15. Bader, S.R.; Maleshkova, M.; Lohmann, S. Structuring Reference Architectures for the Industrial Internet of
Things. Future Internet 2019, 11, 151. [CrossRef]
16. Seetharaman, A.; Patwa, N.; Saravanan, A.; Sharma, A. Customer expectation from Industrial Internet of
Things (IIOT). J. Manuf. Technol. Manag. 2019, 30, 1161–1178. [CrossRef]
17. Aazam, M.; Zeadally, S.; Harras, K.A. Deploying fog computing in Industrial Internet of Things and Industry
4.0. IEEE Trans. Ind. Inform. 2018, 14, 4674–4682. [CrossRef]
18. Oztemel, E.; Gursev, S. Literature review of Industry 4.0 and related technologies. J. Intell. Manuf. 2018,
31, 127–182. [CrossRef]
19. Khan, W.Z.; Rehman, M.H.U.; Zangoti, H.; Afzal, M.; Armi, N.; Salah, K. Industrial internet of things: Recent
advances, enabling technologies and open challenges. Comput. Electr. Eng. 2020, 81, 106522. [CrossRef]
20. Industrial IoT (IIoT) Market Worth $263.4 Billion by 2027—Exclusive Report Covering Pre and Post COVID-19
Market Analysis and Forecasts by Meticulous Research®. Available online: https://www.globenewswire.com/
news-release/2020/06/19/2050758/0/en/Industrial-IoT-IIoT-Market-Worth-263-4-billion-by-2027-Exclusive-
Report-Covering-Pre-and-Post-COVID-19-Market-Analysis-and-Forecasts-by-Meticulous-Research.html
(accessed on 30 June 2020).
21. Zurawski, R. The Industrial Information Technology Handbook; CRC Press: London, UK, 2018.
22. Vitturi, S.; Zunino, C.; Sauter, T. Industrial communication systems and their future challenges:
Next-generation Ethernet, IIoT, and 5G. Proc. IEEE 2019, 106, 944–961. [CrossRef]
23. Rastogia, E.; Saxena, N.; Roy, A.; Shin, D.R. Narrowband Internet of Things: A comprehensive study.
Comput. Netw. 2020, 173, 107209. [CrossRef]
24. Industrial Internet Reference Architecture. 2019. Available online: http://www.iiconsortium.org/IIRA.htm
(accessed on 16 July 2020).
25. Flatt, H.; Schriegel, S.; Jasperneite, J.; Trsek, H.; Adamczyk, H. Analysis of the cyber-security of Industry 4.0
technologies based on RAMI 4.0 and identification of requirements. In Proceedings of the 2016 IEEE 21st
International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 6–9
September 2016; pp. 1–4.
26. Pisching, M.A.; Pessoa, M.A.O.; Junqueira, F.; Filho, D.J.D.S.; Miyagi, P.E. An architecture based on RAMI 4.0
to discover equipment to process operations required by products. Comput. Ind. Eng. 2018, 125, 574–591.
[CrossRef]
27. Telecommunication Standardization Sector of Itu, Recommendation Y.4000/Y.2060, Series Y: Global
Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks, Next Generation
Networks—Frameworks and Functional Architecture Models, Overview of the Internet of Things. Available
online: https://www.itu.int/rec/T-REC-Y.2060-201206-I/en (accessed on 16 July 2020).
28. Rehman, M.H.U.; Yaqoob, I.; Salah, K.; Imran, M.; Jayaraman, P.P.; Perera, C. The role of big data analytics in
Industrial Internet of Things. Future Gener. Comput. Syst. 2019, 99, 247–259. [CrossRef]
Sensors 2020, 20, 5603 18 of 19
29. Liu, M.; Yu, F.R.; Teng, Y.; Leung, V.; Song, M.; Yu, R. Performance optimization for blockchain-enabled
Industrial Internet of Things (IIoT) Systems: A deep reinforcement learning approach. IEEE Trans. Ind. Inform.
2019, 15, 3559–3570. [CrossRef]
30. Boyes, H.; Hallaq, B.; Cunningham, J.; Watson, T. The Industrial Internet of Things (IIoT): An analysis
framework. Comput. Ind. 2018, 101, 1–12. [CrossRef]
31. Sengupta, J.; Ruj, S.; Das Bit, S. A secure fog based architecture for Industrial Internet of Things and Industry
4.0. IEEE Trans. Ind. Inform. 2020, 1. [CrossRef]
32. Zhu, W.; Wang, Z.; Zhang, Z. Renovation of automation system based on Industrial Internet of Things:
A case study of a sewage treatment plant. Sensors 2020, 20, 2175. [CrossRef]
33. Da Xu, L.; He, W.; Li, S. Internet of Things in Industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243.
[CrossRef]
34. Liu, C.H.; Yang, B.; Liu, T. Efficient naming, addressing and profile services in Internet-of-Things sensory
environments. Ad Hoc Netw. 2014, 18, 85–101. [CrossRef]
35. Jia, X.; Feng, Q.; Fan, T.; Lei, Q. RFID technology and its applications in Internet of Things (IoT). In Proceedings
of the 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet),
Yichang, China, 21–23 April 2012; pp. 1282–1285.
36. Domingo, M.C. An overview of the Internet of Things for people with disabilities. J. Netw. Comput. Appl.
2012, 35, 584–596. [CrossRef]
37. Fortino, G.; Messina, F.; Rosaci, D.; Sarne, G.M.; Savaglio, C. A trust-based team formation framework for
mobile intelligence in smart factories. IEEE Trans. Ind. Inform. 2020, 16, 6133–6142. [CrossRef]
38. Ungurean, I.; Gaitan, N.-C.; Gaitan, V.-G. An IoT architecture for things from industrial environment.
In Proceedings of the 2014 10th International Conference on Communications (COMM), Bucharest, Romania,
29–31 May 2014; pp. 1–4.
39. Ungurean, I.; Gaitan, N.C.; Gaitan, V.G. A middleware based architecture for the Industrial Internet of
Things, KSII transactions on internet & information systems. Korean Soc. Internet Inf. 2016, 10, 2874–2891.
40. Galkin, P.; Golovkina, L.; Klyuchnyk, I. Analysis of single-board computers for IoT and IIoT solutions
in embedded control systems. In Proceedings of the 2018 International Scientific-Practical Conference
Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 9–12 October 2018;
pp. 297–302.
41. Urbina, M.; Acosta, T.; Lázaro, J.; Astarloa, A.; Bidarte, U. Smart sensor: SoC architecture for the Industrial
Internet of Things. IEEE Internet Things J. 2019, 6, 6567–6577. [CrossRef]
42. Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A systematic survey of Industrial Internet of Things
Security: Requirements and Fog Computing opportunities. IEEE Commun. Surv. Tutor. 2020, 1. [CrossRef]
43. Figueroa-Lorenzo, S.; Añorga, J.; Arrizabalaga, S. A survey of IIoT protocols. ACM Comput. Surv. 2020,
53, 1–53. [CrossRef]
44. Yu, Y.; Chen, R.; Li, H.; Li, Y.; Tian, A. Toward data security in Edge Intelligent IIoT. IEEE Netw. 2019,
33, 20–26. [CrossRef]
45. Gaitan, N.C.; Gaitan, V.-G.; Moisuc, E.-E.C. Improving interrupt handling in the nMPRA. In Proceedings
of the 2014 International Conference on Development and Application Systems (DAS), Suceava, Romania,
15–17 May 2014; pp. 11–15.
46. Ungurean, I. Timing comparison of the real-time operating systems for small microcontrollers. Symmetry
2020, 12, 592. [CrossRef]
47. Buttazzo, G.C. Hard Real-Time Computing Systems; Springer: Berlin/Heidelberg, Germany, 2011.
48. Gaitan, V.-G.; Gaitan, N.-C.; Ungurean, I. A flexible acquisition cycle for incompletely defined fieldbus
protocols. ISA Trans. 2014, 53, 776–786. [CrossRef] [PubMed]
49. Caiza, G.; Llamuca, E.S.; Garcia, C.A.; Gallardo-Cardenas, F.; Lanas, D.; Garcia, M.V. Industrial shop-floor
integration based on AMQP protocol in an IoT Environment. In Proceedings of the 2019 IEEE Fourth Ecuador
Technical Chapters Meeting (ETCM), Guayaquil, Ecuador, 11–15 November 2019; pp. 1–6.
50. Dinculeană, D.; Cheng, X. Vulnerabilities and limitations of MQTT protocol used between IoT Devices.
Appl. Sci. 2019, 9, 848. [CrossRef]
51. Fang, S.; Huang, L.; Li, Z. DDS-based protocol-compatible communication platform for mining power
system. IET Commun. 2020, 14, 158–164. [CrossRef]
Sensors 2020, 20, 5603 19 of 19
52. Al-Masri, E.; Kalyanam, K.R.; Batts, J.; Kim, J.; Singh, S.; Vo, T.; Yan, C. Investigating messaging protocols for
the Internet of Things (IoT). IEEE Access 2020, 8, 94880–94911. [CrossRef]
53. OpenDDS. Available online: https://opendds.org/ (accessed on 30 June 2020).
54. About the DDS Security Specification Version 1.1. Available online: https://www.omg.org/spec/DDS-
SECURITY/About-DDS-SECURITY/ (accessed on 16 July 2020).
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).