• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • 1
  • Tagged with
  • 10
  • 10
  • 10
  • 10
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Investigating Security Issues in Industrial IoT: A Systematic Literature Review

Milinic, Vasilije January 2021 (has links)
The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) and Operational Technology (OT) into a completely new system. This convergence is often known as Industrial IoT (IIoT). IIoT brings a lot of benefits to industrial assets, such as improved efficiency and productivity, reduced cost, and depletion of human error. However, the high inter-connectivity opens new possibilities for cyber incidents. These incidents can cause major damage like halting of production on the manufacturing line, or catastrophic havoc to companies, communities, and countries causing power outages, floods, and fuel shortages. Such incidents are important to be predicted, stopped, or alleviated at no cost. Moreover, these incidents are a great motive for researchers and practitioners to investigate known security problems and find potential moderation strategies.  In this thesis work, we try to identify what types of IIoT systems have been investigated in the literature. We seek out to find if software-related issues can yield security problems. Also, we make an effort to perceive what are the proposed methods to mitigate the security threats.We employ the systematic literature review (SLR) methodology to collect this information. The results are gathered from papers published in the last five years and they show an increased interest in research in this domain. We find out software vulnerabilities are a concern for IIoT systems, mainly firmware vulnerabilities and buffer overflows, and there are a lot of likely attacks that can cause damage, mostly injection and DDoS attacks. There are a lot of different solutions which offer the possibility to stop the identified problems and we summarize them. Furthermore, the research gap considering the update process in these systems and devices, as well as a problem with the unsupervised software supply chain is identified.
2

A Hybrid, Distributed Condition Monitoring System using MEMS Microphones, Artificial Neural Networks, and Cloud Computing

Frithjof Benjamin Dorka (13163043) 27 July 2022 (has links)
<p>Condition monitoring supported with artificial intelligence, cloud computing, and industrial internet of things (IIoT) technologies increases the feasibility of predictive maintenance (PdM). However, the cost of traditional sensors, data acquisition systems, and the information technology expert knowledge required to inform and implement PdM challenge the industry. This thesis proposes a hybrid condition monitoring system (CMS) architecture consisting of a distributed, low-cost IIoT-sensor solution. The CMS uses micro-electro-mechanical system (MEMS) microphones for data acquisition, edge computing for signal preprocessing, and cloud computing, including artificial neural networks (ANN) for higher-level information processing. The higher-level information processing includes condition detection and time-based prediction capabilities to inform PdM strategies. The system’s feasibility is validated using a testbed for reciprocating linear-motion axes.</p>
3

Internet das coisas aplicada à indústria: dispositivo para interoperabilidade de redes industriais

Keller, Armando Leopoldo 13 January 2017 (has links)
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2017-04-20T13:56:57Z No. of bitstreams: 1 Armando Leopoldo Keller_.pdf: 2124143 bytes, checksum: ba23113da63873463958e38c05ddbd88 (MD5) / Made available in DSpace on 2017-04-20T13:56:57Z (GMT). No. of bitstreams: 1 Armando Leopoldo Keller_.pdf: 2124143 bytes, checksum: ba23113da63873463958e38c05ddbd88 (MD5) Previous issue date: 2017-01-13 / Nenhuma / O objetivo deste trabalho, é realizar um estudo de forma mais abrangente sobre o conceito de Internet das Coisas e seus principais protocolos. Explora-se especificamente o conceito de IoT (Internet of Things) aplicado em sistemas de automação. Para tanto é apresentada uma revisão bibliográfica sobre o assunto, explorando os diversos protocolos desenvolvidos para aplicações de IoT, caracterizando-os quanto a taxa de transmissão, eficiência, segurança e confiabilidade. Também é realizado um levantamento do cenário atual, quanto a aplicação de protocolos de IoT em sistemas de automação, sempre tendo em mente a confiabilidade do sistema. Percebe-se que um grande dificultador do uso destes tipos de protocolo em ambientes industriais é justamente a heterogeneidade das redes existentes. Diante deste problema, a proposta do trabalho é desenvolver um dispositivo que atue como middleware para a interligação de redes de automação distribuídas, no caso especificamente a rede Modbus RTU, fazendo com que esta interligação seja de forma transparente utilizando o protocolo de Internet das Coisas MQTT (Message Queuing Telemetry Transport). Este dispositivo é testado com equipamentos em um cenário real através de um estudo de caso, onde duas redes Modbus RTU de um sistema geograficamente distribuído de geração de energia solar fotovoltaica, são interligadas, permitindo a criação de uma planta virtual de geração de energia do inglês virtual power plant (VPP). Com isso é possível tratar e gerenciar os sistemas distribuídos de geração como sendo uma única unidade geradora, facilitando o despacho. Para comprovar a eficiência e a confiabilidade do sistema, foram realizados testes onde o tempo entre as requisições e respostas foi medido, e através da sua distribuição foi obtido um tempo de 2,5 segundos para obter uma comunicação com baixa taxa de perda de mensagens. Estes testes comprovam o correto funcionamento do sistema proposto. / The objective of this work is to develop a more comprehensive study on the concept of Internet of Things (IoT) and its main protocols, specifically exploring the concept of IoT applied in automation systems. A bibliographic review explores the diverse protocols developed for IoT applications, characterizing them as transmission rate, efficiency, safety and confiability. A survey of the current scenario about the application of IoT protocols in automation systems is presented, always having the system confiability in mind. The heterogenity of the existent networks makes the use of this protocols a harder task. The proposal of this work is develop a device that acts as middleware for interlink distributed automation networks, in this case the Modbus RTU networks, in a transparent way using the internet of things procol MQTT (Message Queuing Telemetry Transport). This device is tested with equipments in a real scenario trough a case study, where two Modbus RTU networks of a geographically distributed solar photovoltaic power plant, is interlinked, allowing the criation of a VPP (Virtual Power Plant). This makes possible to manage the distributed power generator systems as a single generator unit, improving the electric energy dispatch. To prove the efficiency and confiability of the system, tests were made where the time between request and response was mensured, and based on his distribution the time of 2.5 seconds was determined to have a low message loss communication. Those tests validate the proposed system and the achievement of the goals of the present work.
4

Design and Implementation of Energy Usage Monitoring and Control Systems Using Modular IIOT Framework

Chheta, Monil Vallabhbhai 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This project aims to develop a cloud-based platform that integrates sensors with business intelligence for real-time energy management at the plant level. It provides facility managers, an energy management platform that allows them to monitor equipment and plant-level energy consumption remotely, receive a warning, identify energy loss due to malfunction, present options with quantifiable effects for decision-making, and take actions, and assess the outcomes. The objectives consist of: 1. Developing a generic platform for the monitoring energy consumption of industrial equipment using sensors 2. Control the connected equipment using an actuator 3. Integrating hardware, cloud, and application algorithms into the platform 4. Validating the system using an Energy Consumption Forecast scenario A Demo station was created for testing the system. The demo station consists of equip- ment such as air compressor, motor and light bulb. The current usage of these equipment is measured using current sensors. Apart from current sensors, temperature sensor, pres- sure sensor and CO2 sensor were also used. Current consumption of these equipment was measured over a couple of days. The control system was tested randomly by turning on equipment at random times. Turning on the equipment resulted in current consumption which ensured that the system is running. Thus, the system worked as expected and user could monitor and control the connected equipment remotely.
5

Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review

Basem, Mumthas January 2022 (has links)
Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). PLCs have been referred as the "brain" of production systems because they provide the capacity to meet interoperability, reconfigurability, and portability criteria. Today's industrial automation systems rely heavily on control software to ensure that the automation process runs smoothly and efficiently. Furthermore, requirements like flexibility, adaptability, and robustness add to the control software's complexity. As a result, new approaches to building control software are required. The International Electrotechnical Commission attempted to meet these new and impending demands with the new IEC 61499 family of standards for distributed automation systems. The IEC 61499 standard specifies a high-level system design language for distributed data and control. With the advancement of these technologies like edge/fog computing and IIoT, how the control software in future smart factory managed is discussed here. This study aims to do a systematic literature review on PLC, software containers, edge/fog computing and IIoT for future industrial use. The objective is to identify the correspondence between the functional block (IEC 61499) and the container technology such as Docker. The impact of edge computing and the internet of things in industrial automation is also analysed. Since the aim is to do a comparative study, a qualitative explorative study is done, with the purpose to gather rich insight about the field. The analysis of the study mainly focused on four major areas such as deployment, run time, performance and security of these technologies. The result shows that containerisation or container based solutions is the basis for future automation as it outperforms virtual machines in terms of deployment, run time, performance and security.
6

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPC UA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.
7

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPCUA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed. / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.
8

DESIGN AND IMPLEMENTATION OF ENERGY USAGE MONITORING AND CONTROL SYSTEMS USING MODULAR IIOT FRAMEWORK

Monil Vallabhbh Chheta (10063480) 01 March 2021 (has links)
<div><div><div><p>This project aims to develop a cloud-based platform that integrates sensors with business intelligence for real-time energy management at the plant level. It provides facility managers, an energy management platform that allows them to monitor equipment and plant-level energy consumption remotely, receive a warning, identify energy loss due to malfunction, present options with quantifiable effects for decision-making, and take actions, and assess the outcomes. The objectives consist of:</p><ol><li><p>Developing a generic platform for the monitoring energy consumption of industrial equipment using sensors</p></li><li><p>Control the connected equipment using an actuator</p></li><li><p>Integrating hardware, cloud, and application algorithms into the platform</p></li><li><p>Validating the system using an Energy Consumption Forecast scenario</p></li></ol><p>A Demo station was created for testing the system. The demo station consists of equipment such as air compressor, motor and light bulb. The current usage of these equipment is measured using current sensors. Apart from current sensors, temperature sensor, pres- sure sensor and CO2 sensor were also used. Current consumption of these equipment was measured over a couple of days. The control system was tested randomly by turning on equipment at random times. Turning on the equipment resulted in current consumption which ensured that the system is running. Thus, the system worked as expected and user could monitor and control the connected equipment remotely.</p></div></div></div>
9

Implementation of Industrial Internet of Things to improve Overall Equipment Effectiveness

Björklöf, Christoffer, Castro, Daniela Andrea January 2022 (has links)
The manufacturing industry is competitive and is constantly striving to improve OEE. In the transition to smart production, digital technologies such as IIoT are highlighted as important. IIoT platforms enable real-time monitoring. In this sense, digital technologies such as IIoT are expected to improve OEE by enabling the analysis of real-time data and production availability.  A qualitative study with an abductive approach has been conducted. The empirical material has been collected through a case study of a heavy-duty vehicle industry and the theoretical framework is based on a literature study. Lastly, a thematic analysis has been used for the derivation of appropriate themes for analysis. The study concluded that challenges and enablers related to the implementation of IIoT to improve OEE can be divided into technical and cultural factors. Technical challenges and enablers mainly consider the achievement of interoperability, compatibility, and cyber security, while cultural factors revolve around digital acceptance, competence, encouragement of digital curiosity, and creating knowledge and understanding towards OEE. Lastly, conclusions can be drawn that implementation of IIoT has a positive effect on OEE since it ensures consistent and accurate data, which lies a solid foundation for production decisions. Also, digitalization of production enhances lean practices which are considered a key element for improving OEE.
10

Instructing workers through a head-worn Augmented Reality display and through a stationary screen on manual industrial assembly tasks : A comparison study

Kenklies, Kai Malte January 2020 (has links)
It was analyzed if instructions on a head-worn Augmented Reality display (AR-HWD) are better for manual industrial assembly tasks than instructions on a stationary screen. A prototype was built which consisted of virtual instruction screens for two example assembly tasks. In a comparison study participants performed the tasks with instructions through an AR-HWD and alternatively through a stationary screen. Questionnaires, interviews and observation notes were used to evaluate the task performances and the user experience. The study revealed that the users were excited and enjoyed trying the technology. The perceived usefulness at the current state was diverse, but the users saw a huge potential in AR-HWDs for the future. The task accuracy with instructions on the AR-HWD was equally good as with instructions on the screen. AR-HWDs are found to be a better approach than a stationary screen, but technological limitations need to be overcome and workers need to train using the new technology to make its application efficient.

Page generated in 0.5603 seconds