• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 49
  • 49
  • 23
  • 22
  • 21
  • 18
  • 16
  • 15
  • 12
  • 10
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Scalable Predictive Maintenance through the Eclipse Arrowhead Framework

Johansson, Anton January 2022 (has links)
With the rise of Industry 4.0 and the 4:th industrial revolution withthe Internet of Things, infrastructures have become more prevalent to connect and monitor many different systems within an industrial set-ting. With many candidates for this IoT infrastructure, there is a need to evaluate the different candidates to determine the different strengthsand weaknesses of the infrastructure.This thesis investigates the use of the Eclipse Arrowhead framework in the application of scalable infrastructure used for predictive mainte-nance. This investigation is conducted by converting an existing pre-dictive maintenance implementation that is using Amazon Web Services as the IoT infrastructure into a predictive maintenance implementationusing the Eclipse Arrowhead framework as the infrastructure.This design science artifact which results from this thesis shows that the Eclipse Arrowhead framework is suitable for a scalable infrastruc-ture though some shortcomings of the framework were found during the implementation. And though it is a suitable infrastructure, the usage ofthe framework should depend on the specific needs of the infrastructureand should not be used as a “one size fits all” solution.
32

Disruptive business model transitioning in B2B : A subscription-based approach for Industry 4.0

Fjellström, William, Snitko, Vladislav January 2021 (has links)
Industry 4.0 has introduced technologies such as machine learning, Internet of Things (IoT), and cloud computing, which has disrupted markets across different industries. These technologies are prime examples of what has come to be known as disruptive innovations. With the advancement of disruptive innovations, organizations are constantly looking for new ways to satisfy customer needs. Therefore, organizations have begun to investigate alternative business models that differ from the conventional way of selling products/services. Within B2C-markets, the rise of subscription-based services has not gone unnoticed and has turned into a prominent business model among Fortune-500 organizations. Within B2B-practices however, subscription-based business models are mostly unheard of. Therefore, the purpose of this study was to examine how IndustryInternet of Things (IIoT) solution providers successfully can transition to a subscription-based business model when launching IoT-based disruptive innovations in industry 4.0 B2B-markets. This purpose was investigated in a quantitative study by constructing a questionnaire based on an adjusted six-factor Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model. The model was used to stipulate factors influencing buying intention for IoT-technologies. The study was further complemented by qualitative interviews, which aimed to shed more light on buyer's perception of subscription-based business models for IoT-technologies. The respondents consisted of purchasing function employees within the chemical-, food and beverage-, and life sciences industries in Scandinavia and the US. The quantitative results showed that performance expectancy had the most significant impact on buying intention. The qualitative results stipulated themes based on each UTAUT2 factor while also enlightening how interviewees emphasize the importance of not hiding costs and raised concerns regarding the transfer of data ownership when purchasing IoT-technologies. To conclude, the authors stipulated a conceptual framework for the implementation of subscription-based business models when introducing of IoT-technologies within B2B-markets.
33

Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review

Basem, Mumthas January 2022 (has links)
Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). PLCs have been referred as the "brain" of production systems because they provide the capacity to meet interoperability, reconfigurability, and portability criteria. Today's industrial automation systems rely heavily on control software to ensure that the automation process runs smoothly and efficiently. Furthermore, requirements like flexibility, adaptability, and robustness add to the control software's complexity. As a result, new approaches to building control software are required. The International Electrotechnical Commission attempted to meet these new and impending demands with the new IEC 61499 family of standards for distributed automation systems. The IEC 61499 standard specifies a high-level system design language for distributed data and control. With the advancement of these technologies like edge/fog computing and IIoT, how the control software in future smart factory managed is discussed here. This study aims to do a systematic literature review on PLC, software containers, edge/fog computing and IIoT for future industrial use. The objective is to identify the correspondence between the functional block (IEC 61499) and the container technology such as Docker. The impact of edge computing and the internet of things in industrial automation is also analysed. Since the aim is to do a comparative study, a qualitative explorative study is done, with the purpose to gather rich insight about the field. The analysis of the study mainly focused on four major areas such as deployment, run time, performance and security of these technologies. The result shows that containerisation or container based solutions is the basis for future automation as it outperforms virtual machines in terms of deployment, run time, performance and security.
34

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPC UA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.
35

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPCUA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed. / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.
36

Reliable Information Exchange in IIoT : Investigation into the Role of Data and Data-Driven Modelling

Lavassani, Mehrzad January 2018 (has links)
The concept of Industrial Internet of Things (IIoT) is the tangible building block for the realisation of the fourth industrial revolution. It should improve productivity, efficiency and reliability of industrial automation systems, leading to revenue growth in industrial scenarios. IIoT needs to encompass various disciplines and technologies to constitute an operable and harmonious system. One essential requirement for a system to exhibit such behaviour is reliable exchange of information. In industrial automation, the information life-cycle starts at the field level, with data collected by sensors, and ends at the enterprise level, where that data is processed into knowledge for business decision making. In IIoT, the process of knowledge discovery is expected to start in the lower layers of the automation hierarchy, and to cover the data exchange between the connected smart objects to perform collaborative tasks. This thesis aims to assist the comprehension of the processes for information exchange in IIoT-enabled industrial automation- in particular, how reliable exchange of information can be performed by communication systems at field level given an underlying wireless sensor technology, and how data analytics can complement the processes of various levels of the automation hierarchy. Furthermore, this work explores how an IIoT monitoring system can be designed and developed. The communication reliability is addressed by proposing a redundancy-based medium access control protocol for mission-critical applications, and analysing its performance regarding real-time and deterministic delivery. The importance of the data and the benefits of data analytics for various levels of the automation hierarchy are examined by suggesting data-driven methods for visualisation, centralised system modelling and distributed data streams modelling. The design and development of an IIoT monitoring system are addressed by proposing a novel three-layer framework that incorporates wireless sensor, fog, and cloud technologies. Moreover, an IIoT testbed system is developed to realise the proposed framework. The outcome of this study suggests that redundancy-based mechanisms improve communication reliability. However, they can also introduce drawbacks, such as poor link utilisation and limited scalability, in the context of IIoT. Data-driven methods result in enhanced readability of visualisation, and reduced necessity of the ground truth in system modelling. The results illustrate that distributed modelling can lower the negative effect of the redundancy-based mechanisms on link utilisation, by reducing the up-link traffic. Mathematical analysis reveals that introducing fog layer in the IIoT framework removes the single point of failure and enhances scalability, while meeting the latency requirements of the monitoring application. Finally, the experiment results show that the IIoT testbed works adequately and can serve for the future development and deployment of IIoT applications. / SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
37

Digitale Geschäftsmodelle in der Industrie 4.0

Lange, Hergen Eilert 22 March 2017 (has links)
Die Industrie 4.0 führt aktuell zu revolutionären Veränderungen und Herausforderungen im Industriesektor, auf die Unternehmen mit neuen Geschäftsmodellen reagieren müssen. Die Masterarbeit gibt mit Hilfe einer Status-Quo Analyse eine Bestandsaufnahme über die aktuellen digitalen Geschäftsmodelle deutscher Industrieunternehmen. Die Erkenntnisse wurden auf Basis von 71 \'Mini-Cases\' erhoben. Dabei wurden Anbieter, sowie Anwender von Industrie 4.0 Technologien untersucht und in neun Muster kategorisiert. Auf Grundlage dieser Ergebnisse wurde ein inkrementeller Transformationsprozess konzipiert, der zur Entwicklung von digitalen Geschäftsmodellen in der Industrie 4.0 genutzt werden kann.
38

DESIGN AND IMPLEMENTATION OF ENERGY USAGE MONITORING AND CONTROL SYSTEMS USING MODULAR IIOT FRAMEWORK

Monil Vallabhbh Chheta (10063480) 01 March 2021 (has links)
<div><div><div><p>This project aims to develop a cloud-based platform that integrates sensors with business intelligence for real-time energy management at the plant level. It provides facility managers, an energy management platform that allows them to monitor equipment and plant-level energy consumption remotely, receive a warning, identify energy loss due to malfunction, present options with quantifiable effects for decision-making, and take actions, and assess the outcomes. The objectives consist of:</p><ol><li><p>Developing a generic platform for the monitoring energy consumption of industrial equipment using sensors</p></li><li><p>Control the connected equipment using an actuator</p></li><li><p>Integrating hardware, cloud, and application algorithms into the platform</p></li><li><p>Validating the system using an Energy Consumption Forecast scenario</p></li></ol><p>A Demo station was created for testing the system. The demo station consists of equipment such as air compressor, motor and light bulb. The current usage of these equipment is measured using current sensors. Apart from current sensors, temperature sensor, pres- sure sensor and CO2 sensor were also used. Current consumption of these equipment was measured over a couple of days. The control system was tested randomly by turning on equipment at random times. Turning on the equipment resulted in current consumption which ensured that the system is running. Thus, the system worked as expected and user could monitor and control the connected equipment remotely.</p></div></div></div>
39

Digitale Geschäftsmodelle in der Industrie 4.0

Lange, Hergen Eilert 29 August 2018 (has links)
Die Industrie 4.0 führt aktuell zu revolutionären Veränderungen und Herausforderungen im Industriesektor, auf die Unternehmen mit neuen Geschäftsmodellen reagieren müssen. Die Masterarbeit gibt mit Hilfe einer Status-Quo Analyse eine Bestandsaufnahme über die aktuellen digitalen Geschäftsmodelle deutscher Industrieunternehmen. Die Erkenntnisse wurden auf Basis von 71 \'Mini-Cases\' erhoben. Dabei wurden Anbieter, sowie Anwender von Industrie 4.0 Technologien untersucht und in neun Muster kategorisiert. Auf Grundlage dieser Ergebnisse wurde ein inkrementeller Transformationsprozess konzipiert, der zur Entwicklung von digitalen Geschäftsmodellen in der Industrie 4.0 genutzt werden kann.
40

Semantic Driven Approach for Rapid Application Development in Industrial Internet of Things

Thuluva, Aparna Saisree 13 May 2022 (has links)
The evolution of IoT has revolutionized industrial automation. Industrial devices at every level such as field devices, control devices, enterprise level devices etc., are connected to the Internet, where they can be accessed easily. It has significantly changed the way applications are developed on the industrial automation systems. It led to the paradigm shift where novel IoT application development tools such as Node-RED can be used to develop complex industrial applications as IoT orchestrations. However, in the current state, these applications are bound strictly to devices from specific vendors and ecosystems. They cannot be re-used with devices from other vendors and platforms, since the applications are not semantically interoperable. For this purpose, it is desirable to use platform-independent, vendor-neutral application templates for common automation tasks. However, in the current state in Node-RED such reusable and interoperable application templates cannot be developed. The interoperability problem at the data level can be addressed in IoT, using Semantic Web (SW) technologies. However, for an industrial engineer or an IoT application developer, SW technologies are not very easy to use. In order to enable efficient use of SW technologies to create interoperable IoT applications, novel IoT tools are required. For this purpose, in this paper we propose a novel semantic extension to the widely used Node-RED tool by introducing semantic definitions such as iot.schema.org semantic models into Node-RED. The tool guides a non-expert in semantic technologies such as a device vendor, a machine builder to configure the semantics of a device consistently. Moreover, it also enables an engineer, IoT application developer to design and develop semantically interoperable IoT applications with minimal effort. Our approach accelerates the application development process by introducing novel semantic application templates called Recipes in Node-RED. Using Recipes, complex application development tasks such as skill matching between Recipes and existing things can be automated.We will present the approach to perform automated skill matching on the Cloud or on the Edge of an automation system. We performed quantitative and qualitative evaluation of our approach to test the feasibility and scalability of the approach in real world scenarios. The results of the evaluation are presented and discussed in the paper. / Die Entwicklung des Internet der Dinge (IoT) hat die industrielle Automatisierung revolutioniert. Industrielle Geräte auf allen Ebenen wie Feldgeräte, Steuergeräte, Geräte auf Unternehmensebene usw. sind mit dem Internet verbunden, wodurch problemlos auf sie zugegriffen werden kann. Es hat die Art und Weise, wie Anwendungen auf industriellen Automatisierungssystemen entwickelt werden, deutlich verändert. Es führte zum Paradigmenwechsel, wo neuartige IoT Anwendungsentwicklungstools, wie Node-RED, verwendet werden können, um komplexe industrielle Anwendungen als IoT-Orchestrierungen zu entwickeln. Aktuell sind diese Anwendungen jedoch ausschließlich an Geräte bestimmter Anbieter und Ökosysteme gebunden. Sie können nicht mit Geräten anderer Anbieter und Plattformen verbunden werden, da die Anwendungen nicht semantisch interoperabel sind. Daher ist es wünschenswert, plattformunabhängige, herstellerneutrale Anwendungsvorlagen für allgemeine Automatisierungsaufgaben zu verwenden. Im aktuellen Status von Node-RED können solche wiederverwendbaren und interoperablen Anwendungsvorlagen jedoch nicht entwickelt werden. Diese Interoperabilitätsprobleme auf Datenebene können im IoT mithilfe von Semantic Web (SW) -Technologien behoben werden. Für Ingenieure oder Entwickler von IoT-Anwendungen sind SW-Technologien nicht sehr einfach zu verwenden. Zur Erstellung interoperabler IoT-Anwendungen sind daher neuartige IoT-Tools erforderlich. Zu diesem Zweck schlagen wir eine neuartige semantische Erweiterung des weit verbreiteten Node-RED-Tools vor, indem wir semantische Definitionen wie iot.schema.org in die semantischen Modelle von NODE-Red einführen. Das Tool leitet einen Gerätehersteller oder Maschinebauer, die keine Experten in semantische Technologien sind, an um die Semantik eines Geräts konsistent zu konfigurieren. Darüber hinaus ermöglicht es auch einem Ingenieur oder IoT-Anwendungsentwickler, semantische, interoperable IoT-Anwendungen mit minimalem Aufwand zu entwerfen und entwicklen Unser Ansatz beschleunigt die Anwendungsentwicklungsprozesse durch Einführung neuartiger semantischer Anwendungsvorlagen namens Rezepte für Node-RED. Durch die Verwendung von Rezepten können komplexe Anwendungsentwicklungsaufgaben wie das Abgleichen von Funktionen zwischen Rezepten und vorhandenen Strukturen automatisiert werden. Wir demonstrieren Skill-Matching in der Cloud oder am Industrial Edge eines Automatisierungssystems. Wir haben dafür quantitative und qualitative Bewertung unseres Ansatzes durchgeführt, um die Machbarkeit und Skalierbarkeit des Ansatzes in realen Szenarien zu testen. Die Ergebnisse der Bewertung werden in dieser Arbeit vorgestellt und diskutiert.

Page generated in 0.1203 seconds