A Reference Architecture For Integrating The Industrial Internet of Things in The Industry 4.0
A Reference Architecture For Integrating The Industrial Internet of Things in The Industry 4.0
1
Oxford e-Research Centre, 7 Keble Rd, Oxford OX1 3QG
2
Department of Computing, Imperial College London, Huxley Building, 180 Queen’s Gate, London, SW7 2AZ
Abstract
There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both business
reports and technical papers. These reports and publications frequently represent a juxtaposition of other related
systems and technologies (e.g. Industrial Internet of Things, Cyber Physical Systems, Industry 4.0 etc). At present, the
literature is missing a design process for integrating these constantly evolving systems and technologies in a clear and
understandable step by step model. This paper contributes with a new reference architecture model for the integration
of these systems and technologies. The reference architecture model is based on grouping of future and present
techniques and presenting the design process through a new hierarchical framework and a new cascading model. With
the application of the grounded theory, the hierarchical framework and the cascading model detail a new process for
creating a taxonomy of categories and grouping of concepts into integration design. The new design process is tested
and versified with an empirical review of Industry 4.0 frameworks and results with a new 5 levels reference architecture
step by step model for the integration of these related systems and technologies (Industrial Internet of Things, Cyber
Physical Systems, and Industry 4.0). We review 118 academic and industry papers published between 2010 and 2019.
Then, we report the results of a qualitative empirical study that correlates academic literature with 14 world leading
Industry 4.0 frameworks and initiatives. We therefore propose an architectural model that offers a better understanding
of the systems integration between the Industrial Internet of Things and Industry 4.0.
Keywords: Industrial Internet of Things; Cyber Physical Systems; Internet of Everything; Industry 4.0; Digital Industry;
Digital Economy.
Funding sources: This work was supported by the UK EPSRC with project [grant number EP/N02334X/1 and
EP/N023013/1] and by the Cisco Research Centre [grant number 2017-169701 (3696)].
1
University of Oxford
1. Introduction
The evolution of the Industrial Internet of Things (IIoT) technology has become of considerable academic, government
and industry interest in recent years. The IIoT can be explained as the use of internet of things technologies to improve
manufacturing and industrial processes. The IIoT term is closely related to the term Industry 4.0 (I4.0), which represents
at the same time: a paradigm shift in industrial production, a generic designation for sets of strategic initiatives to boost
national industries, a technical term to relate to new emerging business assets, processes and services, and a brand
to mark a very particular historical and social period. I4.0 is also referred to as Industrie 4.0 (Wahlster et al., 2013), the
‘New Industrial France’ (NIF, 2017), the ‘Industrial Internet’ (Evans and Annunziata, 2012), the ‘Internet and the
Advanced Manufacturing Partnership’ (AMP, 2013) or The Fourth Industrial Revolution (Carruthers, 2016). This article
discusses major initiatives in this space in relation to the integration of different developments of cyber physical systems
It has been argued that the spectacular advancements in Cyber Physical Systems (CPS) and Internet of Things (IoT)
technology represent the foundation for the I4.0 (Wahlster et al., 2013) The IoT term originated in 1999 (Ashton, 2009)
along with the first view of how an IoT-based environment might look like in the future (Gershenfeld, 1999). On the
other hand, the term CPS encompasses the complex and multi-disciplinary aspects of ‘smart’ systems that are built
and depend on the interaction between physical and computational components (Tan, Goddard, and Pérez, 2008;
Madakam, Ramaswamy, and Tripathi 2015). CPS theory emerges from control theory and control systems engineering
and focuses on interconnection of physical components and use of complex software entities that establish new network
and systems capabilities. CPSs thus link the physical and engineered systems, and bridge the cyber world with the
physical world (Rajkumar et al., 2010; Wahlster et al., 2013; Carruthers, 2016).
In contrast, IoT theory emerges from computer science and internet technologies and focuses mainly on
interconnectivity, interoperability and integration of physical components in the Internet. Integration work that would
lead to developments such as IoT automation of CPS (Dworschak and Zaiser, 2014; Ringert, Rumpe, and Wortmann,
2015), real-time enabled CPS platforms (Tan, Goddard, and Pérez, 2008; Shi et al., 2011; Kang and Kapitanova, 2012;
Kumar et al., 2012; Wahlster et al., 2013; Marwedel and Engel, 2016), and automated CPS to guide skilled workers in
production environment, is anticipated with the full IoT market adoption over the next decade (Gubbi et al., 2013).
In this context, we propose the term CPS-IoT to refer to the integration of cyber physical attributes into IIoT systems.
This integration includes advances in real-time processing, sensing, and actuation between IIoT systems and physical
domains and provides capabilities for system analysis of the cyber and physical structures involved. We therefore focus
here on the emerging Internet of Everything (IoE), defined as the networked connection of people, processes, data,
2
University of Oxford
and things (Cisco, 2013). Therefore, IoE represents a more inclusive and encompassing concept that consolidates the
cyber physical attributes of IIoT with the social aspects of the environment in which this technology is actually deployed,
and reflects the future makeup of IIoT/I4.0. The term IoE in the context of this article is used to discuss effect from the
The research reported here has two research objectives. Firstly, we present an up-to-date overview of existing and
emerging IIoT advancements in the field of I4.0. This combines existing literature in order to derive common basic
terminology and approaches and to incorporate existing standards into a new IIoT reference architecture for I4.0.
Secondly, we capture the best practices in industry and provoke a debate among practitioners and academics by
offering a new theoretical model regarding I4.0. We develop an I4.0 reference architecture to enable the visualisation
of network cyber risk, the minimization of cyber risk, and the integration of IIoT in the I4.0. This reference architecture
for I4.0 can serve as a best practice and inform initial steps taken by organisations in this space.
This article is structured as follows. Our methodology is described in Section 1.1. In Section 2, we discuss the economic
impact of cyber risks associated with IIoT and CPS in general. Section 3 produces a taxonomy for management
techniques and production economies for I4.0. Section 4 offers a vision for integrating IIoT in Industry 4.0. A Discussion
section and a Conclusions section synthesise our findings and end the article.
1.1 Method
The methods applied in this study consist of systematic literature review, taxonomies derived from grounded theory
and conceptual model development, followed by a qualitative empirical study that engages with a variety of secondary
resources. Academic literature and practical studies are consulted intensively to discuss the IoT technologies and their
relation to the I4.0. While the mainstream academic literature offers limited insights regarding existing and emerging
IIoT developments, we use major projects on I4.0 to showcase recent developments in this field. Our rationale is that
– as the landscape of IIoT develops and changes very quickly – merely relying on journal publications provides too
narrow a view of the present situation. We used the analytical target cascading, combined with the grounded theory
approach (Glaser and Strauss, 1967) in order to construct a conceptual cascading model for the integration of IIoT in
the I4.0. These models then inform a qualitative empirical study for the new I4.0 architectural reference model. The
chosen method for conducting systematic literature review represented (1) searching established journal databases
and updating the findings with cross checking with google scholar search engine; (2) creating a table of search terms
and article inclusion criteria such as relevance, peer review, data of publication (less than 10 years), and design of
studies; (3) we also considered ethical issues in relations to how the publications obtained data, was the data reported
3
University of Oxford
The exact economic impact of CPS infrastructure still remains to be determined (Leitão, Colombo and Karnouskos,
2016; Marwedel and Engel, 2016), although CPS systems will represent a large percentage of future ICT application
in industry (Marwedel and Engel, 2016). This situation requires a new theoretical model that integrates the physical
and cyber subsystems of CPS and IIoT (CPS-IIoT) and goes beyond the M2M applications. The new theoretical model
needs to provide an overall understanding of the design, development, and evolution of CPS, and .needs to integrate
theories of IIoT, control of physical systems, as well as their interaction with humans.
Such a theoretical model is especially needed for developing nations that lack an I4.0 strategy, but also for more
developed countries – such as the UK and USA. The UK has been ranked as the overall global cyber superpower
followed by the US (Allen Hamilton, 2013). It is also reported that the UK and US are strongly protected to withstand
digital infrastructure cyber-attacks, which is crucial in developing a resilient digital economy (Marwedel and Engel,
2016). However, in the index quantifying industrial applications in digital infrastructure key sectors, the UK drops down
to the 5th place and the US to the 3rd place. This seems to be partly due to the UK and US lagging behind other
countries in terms of harnessing economic value from the I4.0 (Allen Hamilton, 2013). This could be caused by barriers
imposed to the adoption of smart manufacturing technologies, especially in small or medium enterprises, e.g. significant
cost of computing power and analysis software (Anderson, 2016, Nicolescu 2018a,b).
There is an enormous economic potential for hyper-connected economy as literature recognises that important future
business opportunities lay in the networking potential of digital economy (Bauer, Hämmerle, Schlund and Vocke, 2015).
The infrastructure for smart manufacturing technology could create large cost savings for manufacturers (Anderson,
2016) and enable faster development of economies of scale (Brettel et al., 2016). Industrial Internet, or ‘Industry 4.0,’
supports a finer granularity and control to meet individual customer requirements, creates value opportunities (Brettel
et al., 2016; Hermann, Pentek, and Otto, 2016, Shafiq, Sanin, Szczerbicki, and Toro, 2015; Stock and Seliger, 2016;
Wang et al., 2016), increases resource productivity, and provides flexibility in business processes (Hussain, 2017). The
integration of cyber-physical capabilities into IIoT arguably requires a new process model for integrating physical and
cyber subsystems – including an overall understanding of the design, development, and evolution of CPS and IIoT.
Gaining such understanding may require consolidation of IIoT theories for control of physical systems and the
On the other hand, the US National Institute of Standards and Technology (US NIST) deliberately stays away from
formalising any process model in this space (NIST, 2016). Instead, their recent Framework for Cyber Physical Systems
proposes sets of artefacts and activities that could be considered by organisations in the deployment of CPS. These
4
University of Oxford
proposals are the result of formal ontologies of digital artefacts and their interactions with the exterior world. The US
NIST identifies three main views on CPS that encompass identified responsibilities in the systems engineering process:
conceptualization, realization, and assurance. Each of these three views corresponds to particular fundamental
processes in the life of CPS, respectively: (1) Models of CPS (design), (2) the CPS itself (implementation), and (3) CPS
Assurance (validation). In particular, the tradeoffs between different instantiations of these processes as well as
between critical aspects such as Security, Safety, Business, and Privacy need to be understood. In this context, Risk
Engineering is proposed as an activity embedded in the design, development and lifecycle of the future CPS and IoT
systems (Huth et. al., 2016). This vision assumes that cyber risk is just one particular instantiation of risk for a particular
organization or product and therefore should be subject to the higher processes of compliance and regulation in each
domain (Nurse 2017, 2018). Building on this work, the reference architecture presented in Figure 3 aims to help
industrial and academic research with formalizing compositional ways to reason about cyber risks in an I4.0 context.
There is an inherent risk in integrating the physical with the cyber world. The Cyber risk environment is constantly
changing (DiMase et al., 2015), and estimated loss of cybercrime varies greatly (Biener, Eling and Wirfs, 2014; DiMase
et al., 2015; Shackelford, 2016). The real economic impact of cyber risk remains unknown (Shackelford, 2016), mainly
due to lack of suitable data and lack of a universal, standardised impact assessment framework (Koch and Rodosek,
2016). To develop such a framework, accumulated risk needs to be quantified and shared across technology platforms
(Ruan, 2017). This requires detailed a understanding of the I4.0 network and critical infrastructure cyber risk. In addition,
new risk elements also need to be quantified, such as intellectual property of digital information (Koch and Rodosek,
2016) and the impact of media coverage (Biener, Eling and Wirfs, 2014).
The Cyber Value at Risk (CvaR) model (World Economic Forum, 2015; Delloite, 2016) represents an attempt to
understand the economic impact of cyber risk for individual organisations (Koch and Rodosek, 2016). CVaR provides
cyber risk measurement units (Ruan, 2017), value analysis methods related to the cost of different cyber-attacks type
(Roumani et al., 2016), and proof of concept methods that are based on data assumptions (Koch and Rodosek, 2016).
Given the lack of data needed to validate the CvaR model, these studies calculate the economic impact based on
organisations’ ‘stand-alone’ cyber risk and therefore ignore the correlation effect of sharing infrastructure and
information and the probability of ‘cascading impacts’ (DiMase et al., 2015, Radanliev 2018a,b,c, 2019a-f) which
represents a crucial element of I4.0. These limitations of the CvaR model are of great concern, e.g in sharing cyber risk
in critical infrastructure (Zhu, Rieger, and Basar, 2011; Koch and Rodosek, 2016). Critical infrastructures are vital for
strong digital economies, but issues of synchrony, components failures, and increasing complexity demand
development and elaboration of new rigorous CPS methods (Rajkumar et al., 2010). In the absence of a common
reference point of cyber risks, existing cyber risk assessment methodologies have led to inconsistencies in measuring
5
University of Oxford
risk (Ruan, 2017), which negatively affects the adaptation of I4.0. Assessment of IIoT cyber risk in I4.0 should be based
on a reference architecture that enables visualising and assessing the cyber network risk, not only the stand-alone
In early literature, existing financial models have been proposed to assess information security investment (Anderson
and Moore, 2006; Gordon and Loeb, 2002; Mercuri, 2003; Rodewald, 2005). However, cyber risk covers more elements
than information security financial cost, such as brand reputation or intellectual property (Ruan, 2017; Koch and
Rodosek, 2016). In terms of modelled economic and financial impact of massive cyber-attacks, additional questions
emerge in relation to the impact on public sector, rethinking of business processes, growth in liability risk, and mitigation
options (Ruffle et al., 2014). Such economic evaluations trigger a debate between limited economic lifespans of digital
assets (Ruan, 2017) and value in inheriting ‘out of date’ data (Tan, Goddard, and Pérez, 2008). In an I4.0 context, cyber
risks are not simply associated with machines and products that store their knowledge and create a virtual living
representation in the network (Drath and Horch, 2014) but also to the global flows and markets they are part of.
Our literature review concludes that existing production economics models don’t anticipate risks in sharing infrastructure
and the probability of cascading impacts. We address this by proposing a reference architecture and associated best
3. Taxonomy of management technologies and methodologies for the I4.0 production economy
This section defines 5C architecture and creates a taxonomy representing a list of focal points for visualising and
focusing the IoE-5C direction I4.0. To define the contribution from this study, we first explain the existing 5C architecture
in Figure 1.
6
University of Oxford
The aim of this study is to design a 5C architecture that can be adapted quickly (Niggemann et al., 2015; Brettel et al.,
2016), to create multi-vendor and modular production systems (Weyer et al., 2015). Requiring multi-discipline testing
and verification (Balaji et al., 2015), and understanding of system sociology (Dombrowski and Wagner, 2014), and
should operate in a similar method with social networks (Bauer, Hämmerle, Schlund, and Vocke, 2015; Wan, Cai, and
Zhou, 2015).
3.1 Cyber risk for integration of CPS-IIoT physical, information, and financial flows into I4.0
Industry 4.0 goes beyond machine to machine (M2M) CPS (Wan et al., 2013; Stojmenovic, 2014), and beyond the
proposed 3 level CPS, which are: (1) services, (2) cloud, and (3) physical object layers (Drath and Horch, 2014). I4.0
is based on the 5C architecture - 5 level CPS (as seen in Figure 3, with intelligent manufacturing equipment (Lee,
Bagheri, and Kao, 2015; Leitão, Colombo and Karnouskos, 2016; Marwedel and Engel, 2016; Shafiq, Sanin,
The integration of artificial intelligence (AI), machine learning, the cloud, and IoT creates systems of machines capable
of interacting with humans (Wan et al., 2013; Brettel et al., 2016; Carruthers, 2016; Marwedel and Engel, 2016). The
application of behaviour economics into these systems of machines (Leonard, 2008) already enables market
speculation on human behaviour (Rutter, 2015) and even neuromarketing (Lewis and Brigder, 2004) to determine
consumer purchasing behaviour. We can expect to see autonomous machines adopting the use of these methods in
order to predetermine human behaviour (Carruthers, 2016). Technologies that would enable the integration of IIoT and
CPS include software defined networks (Kirkpatrick, 2013) and software defined storage (Ouyang et al., 2014). The
foundations of IIoT and CPS industrial integration are built upon: protocols and enterprise grade cloud hosting
(Carruthers, 2016); AI, machine learning, and data analytics (Wan et al., 2013; Kambatla et al., 2014; Pan et al., 2015;
Shafiq, Sanin, Szczerbicki, and Toro, 2015); and mesh networks and peer-to-peer connectivity (Wark et al., 2007). IIoT
transforms the embedded control of CPS, creating security and risk management vulnerabilities from integrating less
secured systems, triggering questions regarding risk management and liability for breaches and damages (Carruthers,
2016). Many other technical challenges can be foreseen in the CPS in economically vital domains – especially in the
The academic literature we analysed outlines the evolution of CPS into the more inclusive and encompassing IoE. IoE
brings together people, process, data, and things – making networked connections and transactions more valuable to
individuals, organizations, and things (Cisco, 2013). Hence, the key management technologies require (a) integration
7
University of Oxford
of physical flows, information flows, and financial flows; (b) innovative approaches to managing operational processes;
(c) exploiting the IIoT and industrial digitisation to gain competitiveness; (d) and utilization of Big Data to improve the
efficiency of production and services. These requirements are analysed and categorised in Table 1 as: domain
3.3 IoE-CPS for I4.0 - the changing roles of innovation, production, logistics, and the service
processes
The changing roles of innovation, production, logistics, and the service processes in IoE-CPS-I4.0 integration requires:
(a) domain communities; (b) internet-based system and service platforms; (c) business processes and services; (d)
Domain communities include: Agent-oriented Architecture (Ribeiro, Barata, and Ferreira, 2010), Object-oriented
Architecture (Thramboulidis, 2015), Cloud optimised Virtual Object Architecture (Giordano, Spezzano, and Vinci, 2016),
supported with Virtual Engineering Objects and Virtual Engineering Processes (Shafiq, Sanin, Szczerbicki, and Toro,
2015) with Internet Protocol version 6 (IPv6) connected devices and networks to the IoT (Wahlster et al., 2013);
Internet-based system and service platforms (La and Kim, 2010; Wahlster et al., 2013; Wan, Cai, and Zhou, 2015;
Weyer et al., 2015) are used to model CPS through the Web of Things (Dillon et al., 2011). In particular, cyber risk in
I4.0 requires compiling of data, processes, devices and systems for advanced analytics (Evans and Annunziata, 2012;
Shafiq, Sanin, Szczerbicki, and Toro, 2015) and connection to model-driven (robot-in-the-loop) manufacturing systems
(Jensen, Chang, and Lee, 2011; Shi et al., 2011; Wang et al., 2014). Internet-based system and service platforms are
also used to promote model-based development platforms, such as behaviour modelling of robotic systems
(Stojmenovic, 2014) or Automata (Ringert, Rumpe, and Wortmann, 2015). Internet-based systems and service
platforms can also enable the development of social manufacturing (Bauer, Hämmerle, Schlund, and Vocke, 2015;
Wan, Cai, and Zhou, 2015), nterconnect with the Internet of People (Wahlster et al., 2013) and create CPS collaborative
Business processes and services can be interconnected through IoT systems (Stock and Seliger, 2016; Hussain,
2017) into industrial value chains (Brettel et al., 2016; Hermann, Pentek, and Otto, 2016; Shafiq, Sanin, Szczerbicki,
and Toro, 2015; Wang et al., 2016). Business processes and services can integrate machine information into decision
making (Evans and Annunziata, 2012; Wan et al., 2013; Toro, Barandiaran, and Posada, 2015) and be connected to
the Internet of Services (Wahlster et al., 2013; Shafiq, Sanin, Szczerbicki, and Toro, 2015) for service oriented
architecture (La and Kim, 2010; Wang, Törngren, and Onori, 2015; Weyer et al., 2015) and Cloud distributed process
8
University of Oxford
planning manufacturing (Wang, 2013; Wan, Cai, and Zhou, 2015). Business processes and services can also promote
knowledge development of business areas and applications (Faller and Feldmüller, 2015; Toro, Barandiaran, and
Dynamic intelligent swamps (Giordano, Spezzano, and Vinci, 2016) of modules connected to physical and human
networks (Evans and Annunziata, 2012; Marwedel and Engel, 2016), can operate as systems of systems (Wang,
Törngren, and Onori, 2015, Leitão; Colombo and Karnouskos, 2016) and can act as mechanisms for real-time
distribution (Tan, Goddard, and Pérez, 2008; Shi et al., 2011; Kang and Kapitanova, 2012) and feedback (Marwedel
The key contributors to the integration of cyber physical capabilities into an IoE environment (CPS-IoE) are presented
in Table 1. The relationships of these elements to CPS can be grouped into the following categories: CPS-IoE
communities, CPS-IoE processes, CPS-IoE societies and CPS-IoE platforms. These contributors and the synergies
between them lead to an integrated cyber risk aware process for I4.0 that is discussed further in the section.
Glossary of acronyms 1:
CPS-IoE communities
CPS-IoE processes
9
University of Oxford
CPS-IoE societies
Social manufacturing SM
CPS-IoE platforms
Table 1: Categories of key contributors to integrate CPS in IoE - derived from the taxonomy of literature
From reading the categorisation in Table 1, one point appears as an error in the categorisation. That is the Internet
Protocol v6 is categorised as a platform, while from an engineering perspective IPv6 is a networking protocol. There
are multiple categorisations that appear as errors of this type. The explanation for this categorisation is that to reduce
the categories and themes, the grounded theory approach used the Pugh controlled convergence and in the process,
themes are associated with the ‘best fit’ categories. The rationale for this categorisation is as follows. Protocol (e.g. the
Internet Protocol v6) is the official procedure or system of rules governing the communication or activities of programs
and/or industries. Platform on the other hand refers to the technologies that are used as a base upon which other
applications, processes or technologies are developed. A CPS in the context of this categorisation is a platform, while
the languages it uses to communicate (e.g. IPv6) with software are the protocol. Further clarification as why such
categorisations have been made by applying the Pugh controlled convergence to reduce the number of categories is
that we can consider a platform as a software, while protocol is more like a theory, or theoretical model which a platform
can be based on. The outlined categorisation process (Table 1 and Table 2) has triggered a long debate among the
Pugh controlled convergence participants. Finally, in the interest of keeping the categories and themes to a level that
can easily be understood, the presented categorisations have been accepted for the abbreviated taxonomy in Table 2.
CPS - IoE
10
University of Oxford
communities
VEO, VEP
Table 2: Taxonomy of abbreviations from categories derived in the review of literature shown in Table 1
The taxonomy of abbreviations in Table 2 was derived from the taxonomy of literature in Table 1, which categorises
the emerging concepts into integration structure. The taxonomic integration structure relates the industrial CPS with
IoE, bringing together the IoP and IoS, along with the process and transaction of IoT data. For example, the IoT data
from DIS (see Table 1 and 2 for definitions of abbreviations) connected to IoP and IoS, (representing systems of
systems) enhances the cyber risk avoidance with real-time distribution and feedback directly from users and markets.
Thus, the evolution of IoT in the CPS space adds a new IoE perspective to the existing cyber risk avoidance
mechanisms. The inter-relationships between these elements are crucial for defining a secure-by-default framework
for I4.0. The current approaches taken for I4.0 assume development of IoP and IoS and reliability of IoE. In particular,
a deeper understanding of the relationship between IoE and I4.0, following the categories presented in Table 1 is
Furthermore, Table 2 shows that the next level of integration of CPS capabilities into the IoE is related to the integration
of cyber physical capabilities into the industrial value chains (Hermann, Pentek, and Otto, 2016; Shafiq, Sanin,
Szczerbicki, and Toro, 2015; Stock and Seliger, 2016; Wang et al., 2016). IoE uses principles of IoT and integrates
network intelligence, providing convergence, orchestration and visibility across otherwise disparate systems (Hussain,
2017). The integration of CPS capabilities into IoE also provides a framework for the operation and management of
multiple CPS-related elements in the context of I4.0. Figure 2 shows the inter-relationship between different CPS
communities, processes, societies and platforms. The integration of cyber physical capabilities into the IoE, involves
the integration of IoT, WoT, SM, IoP and IoS into SoS. The categories (derived from Table 1) are correlated in a
hierarchical framework in Figure 2, to correspond with the integration taxonomy (in Table 2).
11
University of Oxford
Figure 2: Hierarchical framework for integrating CPS into IoE, derived from this study
The framework for integrating CPS into IoE represents the starting point for building a new theoretical model for the 5C
architecture in I4.0. The visualisation of system complexity facilitates that theoretical development and its understanding
of interconnected concepts – both being crucial given that there is no direct reference in literature to the integration of
IoE in I4.0.
CPS architectures represent a very broad concept (Madakam, Ramaswamy, and Tripathi 2015, Leitão, Colombo and
Karnouskos, 2016). The most pressing point for CPS is perhaps security (Zhu, Rieger, and Basar, 2011; Hahn et al.,
2013). Risk management strategy for espionage, theft, or terrorist attacks, requires electronic and physical security that
relates physical and engineered systems (Rajkumar et al., 2010; Leitão, Colombo and Karnouskos, 2016) to protect
from insider threats, including interception and analysis of non-communications electromagnetic radiations (USDA,
Security requires information assurance and data security, protection for data in transit from physical and electronic
domains and storage facilities (Longstaff and Haimes, 2002; CoNSS, 2010; Wahlster et al., 2013; DiMase et al., 2015;
Marwedel and Engel, 2016; Toro, Barandiaran, and Posada, 2015). Asset management and access control are required
for granting or denying requests to information and processing services (CoNSS, 2010; Rajkumar et al., 2010; Evans
and Annunziata, 2012; DiMase et al., 2015), especially because CPS will interface with nontechnical users and
influence across administrative boundaries is possible (Rajkumar et al., 2010). A process is needed to address novel
vulnerabilities caused by life cycle issues, diminishing manufacturing sources, and the update of assets (DiMase et
al., 2015), -- including system dynamics across multiple time-scales (Rajkumar et al., 2010; Marwedel and Engel, 2016),
similar to loosely time-triggered architectures (Benveniste, 2010; Benveniste, Bouillard, and Caspi, 2010) and structure
Furthermore, CPS require anti-counterfeit and supply chain risk management to counteract malicious supply-chain
12
University of Oxford
components modified from their original design to enable disruption or unauthorised function (Evans and Annunziata,
2012; DiMase et al., 2015, Radanliev 2014a,b, 2015a,b,c,d 2016a). Standardisation of design and process
(Sangiovanni-Vincentelli, Damm, and Passerone, 2012; Weyer et al., 2015) and hyper-connectivity in the digital supply
chain (Ruan, 2017) also need to be supported. It is also suggested that limiting source code access to crucial and
skilled personnel can provide software assurance and application security and may be necessary for eliminating
deliberate flaws and vulnerabilities in the CPS (CoNSS, 2010; Rajkumar et al., 2010; DiMase et al., 2015). But this
Security should be supported with forensics, prognostics, and recovery plans, for the analysis of cyber-attacks and
coordination with other CPSs and those that identify external cyber-attack vectors (DiMase et al., 2015). An internal
track and trace network process can assist in detecting or preventing the existence of weaknesses in the logistics
security controls (DiMase et al., 2015). To support this, a process for anti-malicious and anti-tamper system engineering
is needed to prevent CPS vulnerabilities identified through reverse engineering attacks (DiMase et al., 2015). The
CPSS-5C architecture areas of focus in Figure 2 will support a robust integration of the 5C architecture (Lee, Bagheri,
and Kao, 2015) and of virtual object architectures (Giordano, Spezzano, and Vinci, 2016) into CPSS for Industry 4.0
(Wahlster et al., 2013), so that cyber and physical components and connectors constitute the entire system at runtime
for I4.0
5C architecture 5C
Table 3: CPSS - areas of focus (AoF) derived from this study for integrating CPS-IoE in 5C cyber security architecture
13
University of Oxford
for I4.0
The CPSS-5C focal areas emphasize the need for security and privacy (Rajkumar et al., 2010; Zhu, Rieger, and Basar,
2011) and lead to the conclusion that in order to prevent continuation of CPS cyber-attacks, fast cyber-attack reporting
and shared databases should be developed (Wahlster et al., 2013; DiMase et al., 2015). The systematic analysis is
applied to each focal area to determine the inter-relationships between emerging cyber security concepts.
Servitization in the context of I4.0 refer to predictive maintenance, forecasting machine failure, and intelligent machine-
learning algorithms that are taking information from the Industrial IoT sensors and platforms to automatically diagnose
failures and provide the remaining useful life of machinery. Here we are applying the grounded theory method to group
This requires real-time data acquisition and storage solutions (Shi et al., 2011; Niggemann et al., 2015; Marwedel and
Engel, 2016; Almeida, Santos and Oliveira, 2016) for fleets of machines (Wan et al., 2013), providing adaptive analysis,
This needs to be supported with autonomous cognitive decisions, machine learning algorithms and high performance
computing or data analysis (Wan et al., 2013; Niggemann et al., 2015; Pan et al., 2015), supported with fast cyber-
attack information sharing and reporting via shared database resources (Wahlster et al., 2013; DiMase et al., 2015).
In I4.0, this requires that machines evolve into Cyber-Physical Production Systems (Weyer et al., 2015).
This needs task-specific human machine interfaces (Wan et al., 2013; Niggemann et al., 2015; Marwedel and Engel,
2016), for self-aware (Weyer et al., 2015) machines and components prognostics and health management (Lee,
Diminishing manufacturing sources, material shortages and supply chain risk management
This is required for prioritising and optimising decisions with self-optimising production systems (Shafiq, Sanin,
Szczerbicki, and Toro, 2015; Wan, Cai, and Zhou, 2015; Brettel et al., 2016), supported with production-planning
computer visualisation, such as SCADA systems integration with Virtual Reality (Posada et al., 2015) for developing
14
University of Oxford
This requires a big data platform (Lee, Kao, and Yang, 2014; Niggemann et al., 2015; Hussain, 2017) for sensors
condition based monitoring (Lee, Bagheri, and Kao, 2015). Such platforms can enable complex models, such as cyber
city designs (Petrolo, Loscri, and Mitton, 2016) using structured communications for mobile CPS (Almeida, Santos and
Oliveira, 2016), cross-domain end-to-end communication among objects, and cloud computing techniques.
This needs to be informed by key performance indicators (Bauer, Hämmerle, Schlund, and Vocke, 2015).
Feedback and control mechanisms (Niggemann et al., 2015) are required for enabling supervisory control of actions,
to avoid or grant required access or to design a resilient control system (Lee, Bagheri, and Kao, 2015).
This would be facilitated with loosely time-triggered architectures (Benveniste, 2010; Benveniste, Bouillard, and Caspi,
of the 5C architecture
Self-maintaining connection
Required:
Self-aware conversion
Required:
15
University of Oxford
Cyber self-compare
Adaptive analysis AA
Required:
Self-predicting cognition
risk management
Required:
Required:
Table 4: Grouping of concepts for individual levels of the 5C architecture - derived from this study
16
University of Oxford
We propose a new 5C architecture in I4.0, which includes: (1) self-maintaining machine connection for acquiring data
and selecting sensors; (2) self-awareness algorithms for conversion of data into information (similar to Lee, Kao, and
Yang, 2014; Toro, Barandiaran, and Posada, 2015; Weyer et al., 2015); (3) connecting machines to create self-
comparing cyber network that can predict future machine behaviour; (4) capacity to generate cognitive knowledge of
the system to self-predict and self-optimise, before transferring knowledge to the user (similar to Brettel et al., 2016);
(5) configuration feedback and supervisory control from cyber space to physical space, allowing machines to self-
solutions) PtPM
HPC, ISR
FPR KPI
Table 5: The applications and technologies related to the IIoT in individual levels of the 5C architecture derived from
this study
The emerging applications and technologies in Table 5 are presented in the form of a hierarchical cascading model in
Figure 3 in order to visualise their relationships in the 5C architecture for I4.0. Figure 3 presents the way machines can
connect to the 5C architecture and exchange information through cyber network (Toro, Barandiaran, and Posada, 2015)
and provide optimised production and inventory management (Lee, Bagheri, and Kao, 2015; Wan, Cai, and Zhou,
2015; Weyer et al., 2015) and CPS lean production (Kolberg and Zühlke, 2015).
The categorisation in Table 5 derived from applying grounded theory to categorise concepts in existing literature. The
principles of grounded theory demand that all prominent themes need to be categorised, hence the emergence of the
‘cyber’ category. However, from a cyber security engineering perspective the 5C model in Section 5 is fundamentally
flawed, referring to the middle layer as ‘cyber’ demonstrates a poor understanding in literature of current developments
in industrial systems and the fact that cyber elements now extend from sensor/actuator through to supervisory control
and advanced analytic solutions. The principles state that we need to report what we observe, not what we think its
17
University of Oxford
correct or incorrect and since cyber is a buzz word, it can refer to many things. It is probably incorrect to use in this
context, but the taxonomy is based on grounded theory and the fundamental principles of grounded theory are applied
Nevertheless, the described new 5C architecture for I4.0 also represents cognitive architecture. The cognitive
architecture allows for learning algorithms and technologies to be changed quickly and re-used on different platforms
(similar to Niggemann et al., 2015; Brettel et al., 2016), which is necessary in usual I4.0 situations, such as, to create
multi-vendor and modular production systems (as recommended by Weyer et al., 2015). Such re-using can be achieved
through VEO and VEP in CPS, which enable the real-time synchronised coexistence of the virtual and physical
dimensions (as recommended by Shafiq, Sanin, Szczerbicki, and Toro, 2015). The emergence of cyber cognition,
confirms that CPS design requires multi-discipline testing and verification, including: system design, system
engineering and policy design (similar to Balaji et al., 2015), and requires understanding of system sociology
(Dombrowski and Wagner, 2014). The proposed 5C architecture operates in a similar method with social networks, in
the sense that individuals can influence the production line (recommended by Bauer, Hämmerle, Schlund, and Vocke,
18
University of Oxford
Figure 3: Cascading model deriving from this study - IoE-5C architecture for I4.0
CPS security is essential for industrial competitiveness and for harnessing economic value of the digital industry
(Rajkumar et al., 2010; Brettel et al., 2016; Leitão, Colombo and Karnouskos, 2016; Stock and Seliger, 2016; Wang et
al., 2016). The future vision of CPS integration in the IoT includes instruments and processes to enable energy-aware
buildings and cities (EABaC) (Balaji et al., 2015; Marwedel and Engel, 2016; Weyer et al., 2015); physical critical
infrastructure with preventive maintenance (CIPM), and self-correcting cyber-physical systems (SCCPS) themselves
(Rajkumar et al., 2010; Zhu, Rieger, and Basar, 2011; Brettel et al., 2016; Leitão, Colombo and Karnouskos, 2016). In
addition, the electric power grid represents one of the largest complex interconnected networks (Hahn et al., 2013).
Under stressed conditions, single failure can trigger complex cascading effect, creating wide-spread failure and
19
University of Oxford
blackouts (Rajkumar et al., 2010). Flexible AC Transmission Systems would enable protection against such cascading
failures (Rajkumar et al., 2010). Distributed energy resource technologies (Ahmed, Kim, and Kim, 2013; Marwedel and
Engel, 2016) such as wind power, create additional stress and vulnerabilities. Advanced power electronics and energy
storage are required for here for coordination and interactions (Rajkumar et al., 2010; Leitão, Colombo and Karnouskos,
For CPS and IoE in I4.0, present industrial techniques are: Robustness, Safety, and Security (Zhu, Rieger, and Basar,
2011; Hahn et al., 2013); Control and Hybrid Systems (Shi et al., 2011; Leitão, Colombo and Karnouskos, 2016);
Computational Abstractions Architecture (Rajkumar et al.,2010; Wahlster et al., 2013; Madakam, Ramaswamy, and
Tripathi 2015); Real-Time Embedded Systems Abstractions (Tan, Goddard, and Pérez, 2008; Shi et al., 2011; Kang
and Kapitanova, 2012; Leitão, Colombo and Karnouskos, 2016; Marwedel and Engel, 2016); Model-based
Development (Rajkumar et al., 2010; Bhave et al., 2011; Jensen, Chang, and Lee, 2011; Shi et al., 2011; Wahlster et
al., 2013); and Education and Training (Rajkumar et al., 2010; Wahlster et al., 2013; Faller and Feldmüller, 2015).
However, as the integration of CPS into I4.0 is an evolutionary process (Wahlster et al., 2013), the techniques within
the topics and techniques above will be changing with time, which requires flexibility management of the complexities
of the CPS. In addition to these techniques, for creating a reliable, secure and economically sustainable power system,
financial planning arrangements should be developed for buyers and sellers in the renewables electricity market
(Rajkumar et al., 2010; Ahmed, Kim, and Kim, 2013). Finally, CPS applications such as Sentinel (Balaji et al., 2015)
Building upon the present techniques, the deployment of self-sustaining networked sensors and actuators (Rajkumar
et al., 2010) should be in symbiotic relations with the physical environment (Pan et al., 2015). Such 5C vision could be
modelled through a user-centric Cloud (Gubbi et al., 2013). There are also important environmental techniques
associated with cloud computing (e.g. Greenpeace International, 2011; Greenpeace International, 2012).
Environmental natural resources are crucial in sustaining economic development (Stock and Seliger, 2016), and CPS
in I4.0 should be focused on creating eco-industrial by-product synergy (Pan et al., 2015).
Another future challenge is the evolution of I4.0 into self-adapting 5C, by moving from centralised-federated to
decentralised-integrated architecture. This process would present a new vision for distributed (Wan, Cai, and Zhou,
2015) and integrated-decentralised (Stojmenovic, 2014) multi-agent swarm intelligence, based on cooperation of large
20
University of Oxford
population of simple agents. The decentralisation of the control function to a multi agent swarm – which implies lack of
central control dictating individual behaviour and interactions among swarm agents – stimulates the emergence of
intelligent global behaviour. Individual agents exploit cloud services to analyse, predict, optimise and mine scalable
capabilities of historical data and enable applications to self-adjust their behaviour to self-optimise their own
performance (Shafiq, Sanin, Szczerbicki, and Toro, 2015; Brettel et al., 2016). In such decentralised systems, individual
agents’ ‘contract-based design’ is applied before ‘platform-based design’ (Sangiovanni-Vincentelli, Damm, and
Passerone, 2012). Contract-based design enables actor-oriented design of multiple models of computation to be
integrated in a single hierarchical system (Bhave et al., 2011), similar to loosely time-triggered architectures
This review presents different groups of things, and a form of dependency or a causal edge relation between them.
Table 4 shows the edges between different nodes representing groups of the influence of future and present techniques
Glossary of acronyms 4:
Present techniques
Financial planning FP
Future techniques
21
University of Oxford
Table 6: Grouping of future and present techniques on the future vision for CPS-IoE-5C in I4.0 derived from this
research
While I4.0 refers to IoP and IoS, it does not include the IoE in the proposed 5C architecture. The groups (in Table 4)
represent a form of conceptual grouping model for building upon 5C architecture in Figure 1 (Lee, Bagheri and Kao,
2014), but separates the future techniques from the present techniques. This separation constitutes the grounding for
the empirical review of the national I4.0 initiatives discussed in Section 4.1 and summarized in the empirical review
(Tables 7-9).
Following the systematic review of academic literature on I4.0, this section represents and empirical review of the world
leading digital industry frameworks in this space. The aim of this section is to relate the academic literature and industry
reports, with what is happening in practice. The first objective of the empirical review is to determine whether the
practical frameworks and initiative globally are implementing the recommendations from the state of the art leading
research in this area. The second objective is to relate the state of the art research with the leading frameworks and
initiatives and to build a reference architecture for the integration of the emerging categories from the taxonomic review,
The empirical review starts with Industrie 4.0 (GTAI, 2014; Industrie 4.0, 2017) as the world leading initiative for I4.0
and follows with a systematic empirical review of (additional 13) I4.0 world leading initiatives. The main elements of
each world leading initiative in Table 3 are separated in: areas of focus, areas of decision and areas of action. The
complete systematic empirical review identifies a number of shortcomings in individual initiatives, which are
complimented by other initiatives. This required building a model that integrates the strengths and reduces the
weaknesses of all initiatives. There are problems, when, for example, some of the areas of focus, decision and action
differ in terms of strategy and propose very different approaches. To resolve this issue, we use two strategies. Firstly,
22
University of Oxford
the individual areas as categorised in the systematic empirical review (Table 3) are used as reference categories.
Secondly, the categories in Table 3 are used for building the I4.0 architecture model in Figure 4 that relates various
areas to each other and eliminates conflicts in different and sometimes contrasting I4.0 approaches.
The main elements of each initiative are separated in: areas of focus, areas of decision and areas of action (Table 7-
9). However, the compelling of data into these categories is quite challenging, as some initiatives, for example,
represent a collection of descriptive explanations and do not provide explicit areas of focus, decision and action. The
systematic analysis of the world leading initiatives (outlined in Table 7), presents some of the complexities in developing
a unifying architecture, with a step-by-step method for I4.0-5C integration of CPS capabilities into IoE. Some world
leading initiatives have explicitly developed strategies for digital architectures; e.g. the Industrial Internet Consortium
(IIC, 2017); Industrie 4.0 (GTAI, 2014; Industrie 4.0, 2017). Other world leading initiatives focus on loosely defined
standards that emerge from forums, such as in the case of Industrial Value Chain Initiative (IVI, 2017); or blogs, in the
case of Made Different (SA, 2017); or surveys, in the case of High Value Manufacturing Catapult (John, 2017); or even
direct electronic open submission of recommendations for changing or editing the strategy, such as the National
Some initiatives promote activities in the format of workgroups (IVI, 2017), while other initiatives promote activities in
the format of testbeds (IIC, 2017) or digital catapults (John, 2017). From the empirical analysis in Table 7, the direction
of the I.40 architecture is geared by activities, such as, workgroups and testbeds in the case of Industrie 4.0 (GTAI,
2014) and are supported by economic and financial digital catapults, (e.g. the UK Catapult programme). Furthermore,
the Fabbrica Intelligente (MIUR, 2014) and Industrie 4.0 (GTAI, 2014) initiatives focus on promoting key project in the
digital industry; the Industrial Internet Consortium (IIC, 2017) focuses on promoting key IIoTindustries; and the New
France Industrial (NIF, 2013), the High Value Manufacturing Catapult (John, 2017) and the National Technology
Initiative (ASI, 2016) focus on promoting the development of key technologies. Made in China 2025 initiative (SCPRC,
2017) promotes key tech sectors, while the Made Different initiative (SA, 2017) promotes key transformations. The
diversity of the approaches in world initiatives grows in magnitude as the systematic empirical analysis advances to the
I4.0 national Category 1: Areas of focus Category 2: Areas of decision Category 3: Areas of action
frameworks
Germany - Workgroups – I4.0 policy: (1) Relationships – I4.0 principles: Priority areas – I4.0 mission/vision -
Industrie 4.0 The Smart Factory; (2) The (1) based on CPS, IoT and Cloud the Smart Service 5 priority areas:
23
University of Oxford
(GTAI, 2014) Real Environment; (3) The Computing. (1) Integrated Production and Service
Economic Environment; (4) 5C imperative element - 6C Innovation; (2) Internet and Service
Human Beings and Work; (5) system: (1) Connection; (2) Cloud; Economy; (3) Technological Enablers;
The Technology Factor. (3) Cyber; (4) Content/context; (5) (4) Business Organisation
Techniques: (1) IT security; (2) Community; (6) Customisation. Requirements; (5) Innovation-oriented
Integrity of production I4.0 - 4 key design principles: (1) 5C key testbeds for I4.0
processes; (4) Avoidance of IT Interoperability; (2) Information technologies - Industrie 4.0 research
snags; (5) Protect industrial transparency; (3) Technical into practice, over 500 projects are
knowhow; (6) Lack of adequate
assistance; (4) Decentralised being carried out in Germany
skill-sets; (7) Reluctance to
decisions. (Industrie 4.0., 2017).
change; (8) Loss of jobs.
USA - 5C key industries for I4.0 - IIC IIC output - principles: (1) 5C key testbeds for I4.0
(1) Industrial industries: (1) Energy; (2) Industrial Internet of Things technologies - IIC testbeds: 22
Internet Healthcare; (3) Manufacturing; Connectivity Framework (IICF); (2) Testbeds to be deployed for the
Consortium (4) Smart Cities; (5) Industrial Internet Reference Industrial Internet;
(2) Advanced AMP focus programmes - 5C design actions for I4.0 - AMP priority technology areas - AMP
Manufacturing AMP policy: (1) NIST goals: (1) Increase the mission/vision: (1) Advanced
(AMP, 2013). USA Programme; (2) National manufacturing; (2) Facilitate the Engineering biology to advance bio-
(3) NIST Advanced (3) Accelerate the development of medicine; (4) Advanced bio-products
24
University of Oxford
Manufacturing Technologies
2015).
UK – (1) Priority area – DC 5C design building blocks for 5C key testbeds for I4.0
Catapults mission/vision: Catalyst for I4.0 - design elements: (1) Open technologies - catapults: (1) 11
(John, 2017); sustainable high value access facilities; (2) Contractual Digital Catapult centres - including
(2) UK Digital manufacturing. agreements; (3) Intellectual HVM network of another seven
Strategy Measured area of impact: property and confidentiality; (4) centres, (5C key technologies for
(DCMS, 2017). Economic impact. State aid compliance; (5) Financial I4.0) (2) 27 Key technologies
5C design actions for I4.0 - support; (6) Publicity. 5C key projects for I4.0 -
areas of focus: (1) Technology I4.0 focus - principles: (1) Manufacturing catapult 7 Key
readiness; (2) UK policy; (3) Survey; (2) Industrial strategy projects: 7 HVM Catapult centres
economy.
Japan - (1) 5C design building blocks for Relationship - IVI IVI Activities - policy: (1) IVI Forum;
Industrial I4.0 - IVI loosely defined strengths/principles: (1) Gathers (2) 25 Business Scenario Workgroups
Value Chain standards: (1) Industrial Value a broader understanding of more (BSWGs); (3) 8 Platform Workgroups
2017); (IVRA); (2) IVI Platform for (reference models); (2) Aims to Priority areas - NRS mission/vision:
(2) New Robot Smart Manufacturing design ‘loosely defined standard’, (1) Robots autonomy; (2) Robot as
Strategy Ecosystem (IVI, 2017); (3) as an adaptable model instead of a information terminals; (3) Robotic
2015) and RRI Scenarios (IVI, 2016). 5C design actions for I4.0 - NRS 5C key technologies for I4.0 - NRS
(METIJ, 2015). NRS pillars - 5C imperative objectives: (1) AI reasoning; (2) AI core technologies: (1) Artificial
element: (1) Robots innovation learning; (3) AI intelligence intelligence; (2) Automated behaviour.
Robotics in IoT.
25
University of Oxford
France - New 5C key markets for I4.0 - key NIF policy: (1) Subsidies or 5C key technologies for I4.0 - key
France Markets - 9 solutions: (1) Data repayable advances; (2) Tax technologies: List of 47 key
Industrial (NFI) economy; (2) Smart objects; (3) incentives; (3) Loans; (4) SME technologies that need to be
– also known Digital trust; (4) Smart food business modelling support; industrialised in the 9 solutions.
as: la Nouvelle production; (5) New resources; Priority areas – Pillars - NIF 5C imperative element: NFI
France (6) Sustainable cities; (7) Eco- mission/vision: (1) Developing economy of data: (1) Digital
Industrielle or mobility; (8) Medicine of the cutting edge technologies; (2) technology, virtualisation and the
Industry of the future; (9) Transport of Helping companies adapt to the Internet of Things; (2) Cobotics,
Future (NIF, tomorrow new paradigm; (3) Training augmented reality; (3) Additive
2013).
I4.0 national Category 1: Areas of focus Category 2: Areas of decision Category 3: Areas of action
frameworks
Nederland - Priority areas - SI mission/vision: Relationship - principles: (1) 5C design building blocks for I4.0 -
Smart (1) Defining strategic objectives; (2) SWAT analysis; (2) Developed a key contribution: (1) Demonstrates
Industry; or Defining activities within the smart ‘dare to share’ data cooperation illustrative projects; (2) Demonstrates
Factories of industry agenda; (3) Defining initiative. data sharing initiatives; (3) Developed
Belgium - Priority areas - Human centred Relationship - principles: (1) 5C design building blocks for I4.0 -
Made Different dynamic production - MD Based on CPS; (2) blog (forum); promotes 7 crucial
(SA, 2017). mission/vision: (1) High value (3) Focused on products and transformations: (1) World Class
market responsive manufacturing; services with high added value. Manufacturing Technologies; (2) End-
26
University of Oxford
(2) New business models and 5C design actions for I4.0 - to-end Engineering; (3) Digital
digitised production; (3) On demand activities: (1) Blog (forum); (2) Factory; (4) Human Centred
resilient production system; (4) CPS; Factory of the future case Production; (5) Production Network;
(5) Circular economy; (6) Reduce studies. (6) Eco Production; (7) Smart
Spain - Priority area - area of focus: IC Principles: (1) Based on CPS; 5C design building blocks for I4.0 -
Industrie mission/vision Linking the physical Policy: (2) Financial support for promotes: (1) Hybridisation between
Conectada 4.0 to the virtual to create intelligent digital transformation; (3) the physical and digital worlds; (2)
(MEICA, industry. Personalised advice for SMEs; Digital transformation for the evolution
Italy - Priority areas - areas of focus - FI 5C design building blocks for 5C key projects for I4.0 - 4 Key
Fabbrica mission/vision: Developing and I4.0 - design activities: (1) projects: (1) Sustainable
Intelligente implementing a strategy for (1) Realisation of research projects; manufacturing; (2) Adaptive
(MIUR, 2014). Transforming towards new product, (2) Technology transfer, sharing Manufacturing; (3) Smart
services, process, and technologies; of knowledge and networking; Manufacturing 2020; (4) High
I4.0 national Category 1: Areas of focus Category 2: Areas of decision Category 3: Areas of action
frameworks
China - Made Priority area - mission: Role of the state - policy: (1) 5C key tech sectors for I4.0 - 10
in China 2025 Comprehensive upgrade of the Provide an overall framework, priority tech sectors: (1) New
(SCPRC, Chinese industry. (2) Utilising financial and fiscal advanced information technology; (2)
2017) Guiding principles - MiC tools, and supporting the Automated machine tools & robotics;
27
University of Oxford
driven manufacturing; (2) Quality innovation centres (15 by 2020 equipment; (4) Maritime equipment
over quantity; (3) Green and 40 by 2025). and high-tech shipping; (5) Modern
development; (4) Optimise the 5C design building blocks for rail transport equipment; (6) New-
Chinese industry infrastructure; (5) I4.0 - role of the industry: (1) energy vehicles and equipment; (7)
Difference - principles: (1) Focus property rights; (2) Protection for equipment; (9) New materials; and
on the entire manufacturing process small and medium-sized (10) Biopharma and advanced
and not just innovation; (2) Promotes enterprises (SMEs); (3) Allowing medical products.
production.
G20 - New Priority area - NIR mission/vision: Policy key point - policy: (1) 5C design actions for I4.0 - actions:
Industrial Promoting joint action by enhancing Trade liberalisation and the (1) Research collaboration; (2) The
Revolution existing communication and elimination of subsidies. role of SMEs; (3) Employment and
Russia - Priority areas – NTI Policy key point - policy: 5C key tech networks for I4.0 - key
National mission/vision: (1) Identifying new Promote market demand, new technologies: 13 key tech examples.
Technology markets; (2) Identifying key technological standards and 5C key tech networks for I4.0 - set
(ASI, 2016). Guiding key principle: Focus is on 5C design building blocks for system (1) AutoNet; (2) AeroNet; (3)
market creation as opposed to I4.0 - strength: Electronic open MariNet - national security
28
University of Oxford
FinNet.
frameworks
The differences in these approaches correspond to the different national and international strengths and aspirations of
the promoters of these strategies. The empirical review (Table 7-9) summarize different and often conflicting
To simplify these confusing differences in areas of focus, some of the different areas of focus, decision and action in
the world leading initiatives can be grouped based on similarities in the key technologies: NIF lists 47 key technologies,
Made in China 2025 prioritizes 10 tech sectors and NTI includes 13 key tech examples. However, some initiatives focus
on areas of decision and action that differ greatly from the main objectives of other initiatives. For example, the focus
on market networks and market creation of the National Technology Initiative (ASI, 2016) is opposed to the mainstream
technology development in NIF that includes policies for subsidies and repayable advances, tax incentives and loans.
These differences call for the development of an I4.0 architecture model for inter-relating the three areas of focus,
decision and action in a meaningful method. The systematic analysis outlined in Table 3 provides detailed explanation
of these areas. We develop the method accounting for this analysis into an I4.0 architecture model that is presented in
Figure 4. This architecture model represents the process of building a coherent I4.0-5C reference architecture that
integrates CPS capabilities into IoE. The proposed I4.0 architecture model enables a step-by-step review and
adaptation of the different elements that emerge from the academic literature analysed and the 14 world leading I4.0
initiatives.
4.4 An I4.0 architecture model for the integration of CPS-IoE-5C into I4.0
The I4.0 architecture model in Figure 4 compensates for shortcomings in each of the individual world leading initiatives.
For example, not all initiatives provide feedback mechanisms for policy development. Rather, the I4.0 architecture
model derives with integrated policy recommendations and policy feedback mechanisms that are directly related to the
5C architecture for I4.0. The I4.0 architecture model in Figure 4 also makes direct recommendations for imperative
29
University of Oxford
elements of action as extracted from Table 3. This is happening in the context in which some of the initiatives, including
Nederlands’ Smart Industry, Belgium’s Made Different, Spain’s Industrie Conectada 4.0, Italy’s Fabbrica Intelligente,
UK’s Manufacturing catapult, China’s Made in China 2025, and Russia’s National Technology Initiative all lack
The architecture model in Figure 4 addresses this issue through integrating best practices from the empirical analysis
in Tables 7-9. Figure 4 represents the first I4.0 architecture model that integrates a state of the art academic literature
(Figure 4:1, 4:2, 4:4) with the state of the art in I4.0 practical initiatives applied globally (Figure 4:3). The integration of
models from academic literature with empirical study of I4.0 national initiatives, leads to a new set of techniques, such
as the different approaches in national initiatives that imply particular national policies and standards and which are not
The model in Figure 4 presents and consolidates these techniques, building on the empirical study to integrate CPS-
IoE into in 5C cyber security architecture for I4.0. The conceptual grouping model of future and present techniques on
the vision for CPS-IoE-5C in the context of I4.0 presented in Table 4 and the I4.0 cascading model derived from
academic literature presented in Figure 3 are then juxtaposed over the empirical study in Table 3.
The I4.0 world visions emerging from the world leading initiatives are aggregated in an attempt to make visible the
potential integration areas. A comprehensive vision for the integration of CPS-IoE into 5C architectures for I4.0 requires
consideration of all mission statements from each initiative presented in Tables 7-9. This holistic approach requires the
formulation of encompassing principles for the integration of I4.0 across all initiatives (Figure 4:3).
The argument of this I4.0 architecture model is that the integration of CPS-IoE-5C into I4.0 is not a selective process.
Rather, it requires the synchronisation and harmonisation between I4.0 architectures, which leads to standardisation
of world leading visions. Such integration requires evaluation principles. The first stage of this study identified the
evaluation principles from academic literature on CPS-IoE in 5C architecture models. Figure 4 consolidates the
framework from Figure 2, with the AoF from Figure 2, the Cascading model from Figure 3 and the grouping model from
Table 6. In the second stage, this process is shaped by the particular I4.0 world leading initiative that acts in each
national context. We suggest that each particular I4.0 world leading initiative should be considered prior to deciding
whether the 5C reference architecture is adequate and corresponds to the individual national strategy.
For example, the German Industrie 4.0 initiative contains 6C architecture model: (1) Connection (sensor and networks);
(2) Cloud (computing and data on demand); (3) Cyber (model & memory); (4) Content/context (meaning and
correlation); (5) Community (sharing and collaboration); (6) Customisation (personalisation and value) (GTAI, 2014;
Industrie 4.0, 2017). The findings from this study show that, in particular, one of the 6Cs – Community (sharing and
30
University of Oxford
collaboration), represents an entirely new SoS network. Hence, in this study the CPS-IoE-5C integration into I4.0
reference architecture refers basically to IoE as opposed to IoT. This means that I4.0 has evolved beyond the CPS-
IoT-6C integration into I4.0. The German I4.0 strategy that includes the Community (sharing and collaboration) layer of
the 6C was designed in 2013. At that time, IoT technology was emerging and tended to dominate the academic and
industry research. However, the German I4.0 initiative goes beyond IoT and refers to IoP and IoS. Hence, despite the
lack of direct reference to IoE, the integration of I4.0 into IoE is indirectly anticipated in the German I4.0 initiative.
Therefore, the I4.0 architecture model proposed in our study represents an updated version of the German I4.0
initiative.
The integration of CPS-IoE-5C into I4.0 while minding the world leading principles requires also the alignment of I4.0
policies. The empirical study presented in Table 3 highlights gaps in some of the world leading policies. To address
these gaps, the architecture model presented in Figure 4 outlines the most important policies that support the
transformation of existing industries towards the integration of CPS-IoE-5C into I4.0. Thus, we propose an overarching
architecture model for policy development that should be supported by clarification of the imperative elements of the
5C integration into the I4.0 as seen in Figure node 4:8 The imperative elements in the I4.0 architecture model (Figure
node 4:8) are for reference purposes only, as they would differ depending on the particular business environment and
the available support for the I4.0 as an infant industry. In economic theory, financial support in the form of direct
subsidies is allowed for the support of infant industries. Hence, the level of support depends on the national government
The arrows in Figure 4, stand for the direction of the logical flow and are representing the integration processes of CPS-
31
University of Oxford
Figure 4: I4.0 architecture model for the integration of IIoT in the I4.0
32
University of Oxford
Through a systematic literature review and empirical study, we developed the I4.0 architecture model and explained
how such integration could be achieved. This model is the result of a holistic method to integrate the world leading I4.0
initiatives into a logical sequence. Most peculiar finding from the empirical study is that apart from the Japanese NRS
and RRI, all other world initiatives have failed to provide clarification on how artificial intelligence (AI) would be integrated
in their I4.0 strategies. The architecture model in this study provides a logical sequence that includes the NRS core
technologies specification for the integration of AI and automated behaviour (METI, 2015; METIJ, 2015) in the NFI key
technologies list.
While with the evolution of I4.0 in IoE, other elements of standardisation architecture will emerge, the current 5C building
blocks for I4.0 (Figure 4:11) are extracted from the requirements of the imperative elements (Figure 4:10) as presented
in the leading initiatives (Figure 4:3) and policies (Figure 4:9) for the harnessing of economic value and reducing the
The 5C imperative elements (Figure node 4:8) for the I4.0 are followed by the 5C design building blocks (Figure node
4:8) for I4.0. The 5C design building blocks represent more specific concepts in terms of I4.0 standardisation
architecture and can serve as guidance and feedback mechanisms for the CPS-IoE-5C integration into I4.0. Building
block concepts, such as: information transparency and open access facilities provide guidance to national regulators
and industry network architects. The I4.0 architecture model provides feedback mechanisms from national strategies
towards standardisation strategy while building blocks. For example, one feedback mechanism could be the NTI’s
initiative (ASI, 2016) to build a block for electronic open submission of recommendations for changing or editing. Some
of the building blocks in Figure 4 seem conflicting, e.g. loosely defined standards vs. standardisation. The reason is
that I4.0 is continuously evolving, and standardisation must accommodate for changes as this evolution occurs. This
situation is very different from the incumbent industries, where standardisation normally refers to a fixed set of rules
and regulations within a well-defined domain. In the cyber world, standardisation needs to be adaptive, hence the
process of standardisations must anticipate constant future changes. This process includes a certain initial degree of
The 5C design building blocks for I4.0 provides more narrowly focused concepts, but they lack the concrete action
objectives that would enable the delivery of the ideas specified in Figure 4:3. The following layer of the I4.0 architecture
model (Figure node 4:8) represents the 5C design actions for I4.0 with more concrete action objectives, such as; the
development of AI reasoning, AI learning, and AI infrastructure in the case of NFIS initiative. This layer also includes
(i) concrete funding sources, such as public funding, business contracts and collaborative projects; (ii) concrete goals
to deliver, such as support sustainable business models; (iii) concrete actions, such as research collaboration; and
concrete activities for feedback mechanisms, such as blog (forum). However, the design action stage of the I4.0
33
University of Oxford
architecture models are still formulated by IVI and NTI deliberately in more general terms in order to provide flexibility
in resolving each design action through different approaches present in the I4.0 initiatives around the world. For
example, some of the 5C key projects for I4.0 identified, such as the HVM catapult, address part of the 5C design
actions for I4.0 (e.g. the design element – Table 3). However, I4.0 involves more than the HVM catapult and, therefore,
a new architecture model for national I4.0 strategy should integrate all the 11 catapults that form the UK I4.0 initiatives.
In a similar process, the 5C key technologies for I4.0 layer should integrate all the 27 key technologies from the HVM
The next layer of the proposed CPS-IoE-5C integration into I4.0 differs from most of the existing I4.0 initiatives. The 5C
key tech sectors for I4.0 layer is based on the NTI guiding principle to focus on market creation as opposed to
technology development. The argument of the Russian NTI initiative is that market development is the solution, rather
than technology development. According to this initiative, in case there is a market for a specific technology, there will
be the specific market mechanisms that will force development of the new technology. This approach seems to be
compliant with the recent UK digital strategy, which promotes digital sectors and relates them to the wider economy,
including data economy (DCMS, 2017). In this context, the 5C architecture for I4.0 aims to revolve the strategy around
specific tech sectors. Therefore, the logical sequence in our architecture model is continued with the 5C key tech
networks for I4.0 layer where technologies can be grouped to generate networks, similar to the NTI initiative (ASI,
2016). The new tech networks require 5C key testbeds for I4.0.
Global sharing of existing innovation testbeds (22 US testbeds from IIC; 11 UK catapults; over 500 projects in
Germany), would reduce cost and enable faster product to marker process. Global sharing is also needed for the 5C
industries and 5C key markets, bringing into focus the G20 initiative policy key point for trade liberalisation (G20, 2016).
The second policy of the G20 initiative (the elimination of subsidies) is somewhat confusing. While there is a compiling
argument for the elimination of subsidies in the traditional industries, the concept of CPS-IoE-5C-I4.0 integration
requires technologies that are still in the infant stage of research and development. Economic policy dictates that infant
industries need state support, hence emerging digital technologies also require state support. In any case, the NTI
guiding principle (ASI, 2016) for focusing on market development is designed to reduce substantially any financial
involvement of the state. The NTI (ASI, 2016) policy approach would address the second G20 policy key point ‘the
5. Discussion
This paper contributed with a new reference architecture model for the integration of the IIoT with existing processes
from CPS and presented a design process for integrating these technologies in the I4.0. The reference architecture
34
University of Oxford
model is based on grouping of future and present techniques and presenting the design process through a new
hierarchical framework and a new cascading model. These are established models for decomposing and reverse
engineering design processes and in this paper, these models are applied following established engineering design
methodologies. This results with a detailed step by step design process that can be applied by companies operating in
this field, companies that are trying to evolve their operations, governments trying to improve their national strategies
and governments trying to build national strategies. The contribution of the process developed in this study (outlined in
Figure 4), for company practitioners is that they can easily check if their existing integration in the Industry 4.0, or
companies that are trying to enter the I4.0, the findings of this study would enable them to build their digital strategies.
The contributions of this study for national governments of the developed nations is that they can check and compare
the existing digital strategies with the national digital strategies applied across the globe. The benefits for developing
countries that have no digital strategies (e.g. most African, Latin American, Eastern European nations), is that they can
review the current developments from around the world, and follow the step by step process to develop their national
The methodologies applied in this study represent time-tested engineering design methods, such as the hierarchical
framework and the cascading model combined with the grounded theory, which is a time-tested method for building
new models. The validity of the new architecture model is validated through the inclusiveness of all existing frameworks
from across the globe. This study reviewed all existing framework, starting from the world leading, less evolved and
elusive frameworks related to the Industrial Internet of Things and Industry 4.0. In terms of CPS, the frameworks
included in this study are selected based on the relevance to our topic, on the quality of the journal peer review and the
number of citations. Considering the large number of frameworks and theories on CPSs, this was considered as the
This resulted with a detailed and repetative process for creating a taxonomy of categories and grouping of concepts
into integration design. The new design process was tested and versified with an empirical review of Industry 4.0
frameworks and results with a new step by step model for the integration of related systems and technologies (Industrial
Internet of Things, Cyber Physical Systems, and Industry 4.0). We have seen that the systematic review of academic
literature derived with a 5C architecture, challenges the established principles of a 6C architecture (GTAI, 2014;
Industrie 4.0, 2017). The main argument of the emerging 5C architecture is that the community layer of the 6C
architecture, is better represented as an SoS in the IoE because it represents multiple systems (not elements) working
together towards a common goal (e.g. IoT, IoP and IoS). This represents a natural evolution of the integration of CPS-
IoT-6C into I4.0 towards integration of the more encompassing CPS-IoE-5C into I4.0. The present and future techniques
associated with the latter vision are outlined and represented in the I4.0 architecture model proposed in Table 4 and
35
University of Oxford
Figure 4. Finally, the findings from academic literature are contrasted with a systematic review of 14 world leading I4.0
initiatives. The process of strategy cascading is applied with grounded theory to build an I4.0 architecture model that is
The architectural model presented in this paper is designed to support the building of new I4.0 national strategies and
the improving and reformulating of existing frameworks and practical initiatives. The architecture model would also
benefit practitioners who aim to improve or evolve their operations in the I4.0 space. Similar model to the one presented
In this paper, case studies of 14 world’s leading I4.0 initiatives have been reviewed. Following the validation
recommendations in other similar models (Toro, Barandiaran, and Posada, 2015), this paper proposed I4.0 reference
architecture based upon the experiences from the empirical study of different ongoing world leading initiatives. Table 3
summarises the main elements of this study and indicates where individual aspects of the presented architecture are
being implemented. However, research on CPS requires development of testbeds to validate the proposed solutions
(Hahn et al., 2013). In scenarios where current testbeds have limited deployment capabilities for complex computation,
the model design should be further validated through case studies (La and Kim, 2010).
The architecture model for the integration of the CPS-IoE-5C into I4.0 requires further validation and delimiting, possibly
through application to real world case studies. The process of implementing I4.0 is an evolutionary process, and as
such, it would require flexibility in adapting the proposed framework to synchronise changes in the system complexities.
Some elements of CPS are still futuristic and require virtual validation in the design stages (Leitão, Colombo and
Karnouskos, 2016). In different types of CPS (ex. autonomous vehicles) the futuristic elements discussed have already
been applied. Examples include virtual evaluation, validation and design platforms (Feth, Bauer, and Kuhn, 2015),
unmanned network navigation (Wan et al., 2010), autonomous navigation (Berger and Rumpe, 2014), context aware
CPS with Cloud Support (Wan et al., 2014a; Weyer et al., 2015), autonomous energy management (Wan et al., 2012)
and integration of CPS in the cloud (Wan et al., 2014b). For validation, verification, optimisation and visualisation,
advanced software tools can be applied (Pan et al., 2015). The next stage of development for the proposed I4.0
architecture model, is constituted by the application of these findings in multi-testbed / multi I4.0 initiatives settings.
However, this process would require refining the findings and applying the reference architecture in a real-world setting,
36
University of Oxford
The verification problem of the architecture model in this study could be attempted for example through fuzzy verification
that involves a sequence of Boolean questions and decisions meant to provide a level of confidence for a correct
implementation of specific elements as in Marwedel and Engel (2016). But this verification would hardly provide a
reasonable level of confidence for various systems of systems let alone for the entire system, also because some of
the technologies discussed are not even invented, such as AI brain (METI, 2015). Alternatively, industrial developers
can test the 5C architecture by applying object oriented layered architecture for the cyber–physical components
(Thramboulidis, 2015). However, to introduce performance measurements, the Thramboulidis (2015) method over-
simplifies the process. Continuous experimentation method can also be applied in automated virtual testing, using
simulations and data recordings from CPS (Giaimo et al., 2016). However this method presents serious weaknesses
This study proposed a new overarching I4.0 architecture model, and the holistic approach in this study can hardly be
verified with the aforementioned methods. Nevertheless, these alternative approaches could be applied to validate
The article does not deal with the emerging literature on harnessing economic value from the I4.0 (Bauer, Hämmerle,
Schlund and Vocke, 2015; Shafiq, Sanin, Szczerbicki, and Toro, 2015; Anderson, 2016; Brettel et al., 2016; Stock and
Seliger, 2016; Wang et al., 2016; Hussain, 2017). Rather, the article points to the ways in which the reference
architecture presented can inform the development of new economic models and future work on the actual assessment
of emerging cyber risks in I4.0. This article is part of a series of articles published by this project and represents the
preparation work for addressing the topic of harnessing economic value. Harnessing economic value is effectively a
fundamental aspect of the approach particularly in relation to the economic risks that are briefly discussed in the paper.
The focus of the article is on the integration of IIoT and I4.0 resulting with the reference architecture. Addressing all the
related topics in a single article would have resulted with a lack of focus. Therefore, the authors had to consider what
In addition, future research should give consideration of system sociology, because the conceptual grouping model
presented does not address the question of skilled job losses (Dworschak and Zaiser, 2014). It is argued that
technological unemployment is already happening in both routine and non-routine manufacturing tasks (e.g.
Brynjolfsson and McAfee. 2011) and that the associated social disruptions will be significant as the technologically-
driven labour market transitions are likely to take considerable time and domains such as in situations when AI
37
University of Oxford
accelerates the pace of automation (Kaplan, 2017). The counter argument is that skilled and educated jobs will be
created to control and maintain machines (Dombrowski and Wagner, 2014) as I4.0 optimises the manufacturing
competitive edge in high-wage countries (Brettel et al., 2016), and enables a better work-life-balance in a high-wage
economy (Wahlster et al., 2013). We believe that elements in this article would also contribute to the ongoing debates
on this topic.
The categorisation in Table 5 from a cyber security engineering perspective the 5C model in Section 5 is fundamentally
flawed, referring to the middle layer as ‘cyber’ while cyber elements now extend from sensor/actuator through to
supervisory control and advanced analytic solutions. The principles of grounded theory state that we need to report
what we observe, not what we think its correct or incorrect. It is probably incorrect to use in this context, but it is used
in this exact context in existing literature reviewed. Since the taxonomy is based on grounded theory, the fundamental
principles of grounded theory are applied to categorise themes from existing literature. Once literature changes the
6. Conclusions
The complexities of the IIoT require a new regulatory framework and standardisation of a reference architecture for
managing collaborative systems safely and securely while using resources efficiently. This paper presents a new model
for the future vision for IIoT integration in a 5C-CPS architecture. The paper also identifies and provides a
methodological design process for some specific grand challenges, such as cognition and AI in I4.0. The paper creates
a taxonomy of common basic terminology, common approaches and existing world leading initiatives into a proposition
of new economics architecture for I4.0. The paper also suggests the need to formulate compositional ways to reason
about the emerging cyber risks in an I4.0 context. The proposed model enables the current efforts to integrate the IIoT
into I4.0, and in a larger perspective the development of specific CPSs for I4.0.
The contribution of this paper is two-fold. Firstly, the paper developed a method for aggregating evidence on the
emerging advancements in the field of IIoT in relation to I4.0. The paper combines approaches to incorporate existing
standards into new design model for I4.0. Secondly, the paper captures some of the best practices in industry and
develops a reference architecture using a step-by-step process design. This analysis includes reflection on how
automation and AI could lower the cyber risk from the IIoT integration into the I4.0 future architectures. The paper
presents the first I4.0 architecture model that integrates the recent academic literature on IIoT integration into I4.0 with
the state-of-the-art practical initiatives that are currently at work in world’s leading I4.0 initiatives.
7. References:
Ahmed, S.H., Kim, G. & Kim, D., 2013. Cyber Physical System: Architecture, applications and research challenges. In
38
University of Oxford
2013 IFIP Wireless Days (WD). IEEE, pp. 1–5. Available at: http://ieeexplore.ieee.org/document/6686528/
Almeida, L., Santos, F. & Oliveira, L., 2016. Structuring Communications for Mobile Cyber-Physical Systems. In
Anderson, G., 2016. The Economic Impact of Technology Infrastructure for Smart Manufacturing. NIST Economic
Anderson, R. & Moore, T., 2006. The Economics of Information Security. Science, 314(5799). Available at:
Anon, 2013. AMP, Advanced Manufacturing Partnership. Available at: https://www.nist.gov/amo/programs [Accessed
May 4, 2017].
Ashton, K., In the real world, things matter more than ideas. Available at: http://www.rfidjournal.com/articles/pdf?4986
ASI, A. for strategic initiatives, 2016. National Technology initiative, Agency for Strategic Initiatives. Government of
Balaji, B. et al., 2015. Models, abstractions, and architectures. In Proceedings of the 52nd Annual Design Automation
Conference on - DAC ’15. New York, New York, USA: ACM Press, pp. 1–6. Available at:
Bauer, W. et al., 2015. Transforming to a Hyper-connected Society and Economy – Towards an ‘Industry 4.0.’
Benveniste, A., 2010. Loosely Time-Triggered Architectures for Cyber-Physical Systems. 2010 Design, Automation &
Benveniste, A., Bouillard, A. & Caspi, P., 2010. A unifying view of loosely time-triggered architectures. In Proceedings
of the tenth ACM international conference on Embedded software - EMSOFT ’10. New York, New York, USA:
39
University of Oxford
2017].
Berger, C. & Rumpe, B., 2014. Autonomous Driving - 5 Years after the Urban Challenge: The Anticipatory Vehicle as
Bhave, A. et al., 2010. Multi-domain Modeling of Cyber-Physical Systems Using Architectural Views. Proceedings of
Bhave, A. et al., 2011. View Consistency in Architectures for Cyber-Physical Systems. In 2011 IEEE/ACM Second
Biener, C., Eling, M. & Wirfs, J.H., Insurability of Cyber Risk 1. Available at:
Bouws, T. et al., 2015. Smart Industry: Dutch Industry Fit for the Future, Delft. Available at:
Brettel, M. et al., 2016. Enablers for Self-optimizing Production Systems in the Context of Industrie 4.0. Procedia
Brynjolfsson, E. and McAfee, A. 2011. Race against the machine: How the digital revolution is accelerating
innovation, driving productivity, and irreversibly transforming employment and the economy. Lexington (MA):
Buith, J., 2016. Cyber Value at Risk in the Netherlands, Available at:
https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/financial-services/deloitte-nl-fsi-cyber-value-at-
Carruthers, K., 2016. Internet of Things and Beyond: Cyber-Physical Systems - IEEE Internet of Things. IEEE
Catapult, 2017. The Catapult Programme - Catapult. Available at: https://catapult.org.uk/ [Accessed May 13, 2017].
Cisco, 2013. The Internet of Everything Global Public Sector Economic Analysis. , pp.1–13. Available at:
http://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-
40
University of Oxford
CoNSS, C. on N.S.S., 2010. National Information Assurance (IA) Glossary, Fort George G. Meade, MD.
Cook, G., 2012. Greenpeace International: How Clean is Your Cloud?, Amsterdam. Available at:
http://www.greenpeace.org/international/Global/international/publications/climate/2012/iCoal/HowCleanisYourCl
Cook, Gary and Van Horn, J., 2011. How Dirty is your Data? A Look at the Energy Choices that Power Cloud
http://www.greenpeace.org/international/Global/international/publications/climate/2011/Cool IT/dirty-data-report-
DCMS, Department for Culture, Media and Sport, 2017. UK Digital Strategy 2017 - GOV.UK, London. Available at:
Dillon, T.S. et al., 2011. Web-of-things framework for cyber-physical systems. Concurrency and Computation:
DiMase, D. et al., 2015. Systems engineering framework for cyber physical security and resilience. Environment
Dombrowski, U. & Wagner, T., 2014. Mental Strain as Field of Action in the 4th Industrial Revolution. Procedia CIRP,
18, 2017].
Drath, R. & Horch, A., 2014. Industrie 4.0: Hit or Hype? [Industry Forum]. IEEE Industrial Electronics Magazine, 8(2),
Dworschak, B. & Zaiser, H., 2014. Competences for Cyber-physical Systems in Manufacturing – First Findings and
Edgar, T. & Davis, J., 2015. NSF Workshop on Research needs in Advanced Sensors, Controls, Platforms, and
2017].
41
University of Oxford
Evans, P.C. & Annunziata, M., 2012. Industrial Internet: Pushing the Boundaries of Minds and Machines. Available at:
Faller, C. & Feldmüller, D., 2015. Industry 4.0 Learning Factory for regional SMEs. Procedia CIRP, 32, pp.88–91.
Feth, P., Bauer, T. & Kuhn, T., 2015. Virtual Validation of Cyber Physical Systems. Software Engineering &
2017].
G20, 2016. G20 New Industrial Revolution Action Plan, Available at:
Gershenfeld, N.A., 1999. When things start to think, Henry Holt. Available at:
https://books.google.com/books?hl=en&lr=&id=J8GLAwAAQBAJ&oi=fnd&pg=PP2&dq=When+Things+Start+to
Giaimo, F. et al., 2016. Continuous Experimentation on Cyber-Physical Systems. In Proceedings of the Scientific
Workshop Proceedings of XP2016 on - XP ’16 Workshops. New York, New York, USA: ACM Press, pp. 1–2.
Giordano, A., Spezzano, G. & Vinci, A., 2016. A Smart Platform for Large-Scale Cyber-Physical Systems. In Springer
Glaser, B.G. & Strauss, A.L., 1967. The discovery of grounded theory : strategies for qualitative research, Aldine Pub.
Co.
Gordon, L.A. & Loeb, M.P., 2002. The economics of information security investment. ACM Transactions on
GTAI, G.T. and I., 2014. Industrie 4.0 Smart Manufacturing for the Future, Berlin. Available at:
https://www.gtai.de/GTAI/Content/EN/Invest/_SharedDocs/Downloads/GTAI/Brochures/Industries/industrie4.0-
Gubbi, J. et al., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future
42
University of Oxford
Guerrieri, A. et al., 2016. Management of cyber physical objects in the future internet of things : methods,
Hahn, A. et al., 2013. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid.
Hamilton, B.A., 2014. Cyber Power Index. , pp.1–36. Available at: https://www.sbs.ox.ac.uk/cybersecurity-
capacity/system/files/EIU - Cyber Power Index Findings and Methodology.pdf [Accessed April 3, 2017].
Hermann, M., Pentek, T. & Otto, B., 2016. Design Principles for Industrie 4.0 Scenarios. In 2016 49th Hawaii
International Conference on System Sciences (HICSS). IEEE, pp. 3928–3937. Available at:
Hussain, F., 2017. Internet of Everything. In Internet of Things: Building Blocks and Business Models. Springer
Huth, M, Vishik, C., and Masucci, R. 2016. ‘From Risk Management to Risk Engineering: Challenges in Future ICT
Systems.’ In Griffor, E., ed., Handbook of System Safety and Security, p. 131-174.
IIC, I.I.C., 2017. The Industrial Internet of Things Volume G5: Connectivity Framework, Available at:
Industrie 4.0, 2017. Plattform Industrie 4.0 - Testbeds. Available at: http://www.plattform-
IVI, I.V.C.I., 2017. Industrial Value Chain Reference Architecture, Hannover, Germany. Available at: https://iv-
IVI. Industrial Value Chain Initiative, 2016. An Outline of Smart Manufacturing Scenarios 2016. In Monozukuri Nippon
Jazdi, N., 2014. Cyber physical systems in the context of Industry 4.0. In 2014 IEEE International Conference on
Automation, Quality and Testing, Robotics. IEEE, pp. 1–4. Available at:
43
University of Oxford
Jensen, J.C., Chang, D.H. & Lee, E.A., 2011. A model-based design methodology for cyber-physical systems. In
2011 7th International Wireless Communications and Mobile Computing Conference. IEEE, pp. 1666–1671.
John, P., 2017. High Value Manufacturing Catapult, Solihull. Available at: https://ec.europa.eu/growth/tools-
Kambatla, K. et al., 2014. Trends in big data analytics. J. Parallel Distrib. Comput, 74, pp.2561–2573. Available at:
Kang, W., Kapitanova, K. & Son, S.H., 2012. RDDS: A Real-Time Data Distribution Service for Cyber-Physical
Kaplan, J. 2017. ‘Artificial Intelligence: Think Again.’ In Communications of the ACM, 60(1): 36-38.
Kirkpatrick, K., 2013. Software-defined networking. Communications of the ACM, 56(9), p.16. Available at:
Koch, R. & Rodosek, G., Proceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS
2016 : hosted by Universität der Bundeswehr, Munich, Germany 7-8 July 2016, Available at:
https://books.google.co.uk/books?hl=en&lr=&id=ijaeDAAAQBAJ&oi=fnd&pg=PA145&dq=economic+impact+of+
cyber+risk&ots=50mTo8TVSV&sig=sD4V76yG5tG6IZIglmnGz3L1qqw&redir_esc=y#v=onepage&q=economic
Kolberg, D. & Zühlke, D., 2015. Lean Automation enabled by Industry 4.0 Technologies. IFAC-PapersOnLine, 48(3),
2017].
Kumar, P. et al., 2012. A hybrid approach to cyber-physical systems verification. In Proceedings of the 49th Annual
Design Automation Conference on - DAC ’12. New York, New York, USA: ACM Press, pp. 688–696. Available
La, H.J. & Kim, S.D., 2010. A Service-Based Approach to Designing Cyber Physical Systems. In 2010 IEEE/ACIS 9th
International Conference on Computer and Information Science. IEEE, pp. 895–900. Available at:
44
University of Oxford
Lee, J., Bagheri, B. & Kao, H.A., 2015. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing
14, 2017].
Lee, J., Kao, H.-A. & Yang, S., 2014. Service Innovation and Smart Analytics for Industry 4.0 and Big Data
Leitão, P., Colombo, A.W. & Karnouskos, S., 2016. Industrial automation based on cyber-physical systems
technologies: Prototype implementations and challenges. Computers in Industry, 81, pp.11–25. Available at:
Lewis, D. & Brigder, D., 2004. Market Researchers make Increasing use of Brain Imaging. Advances in clinical
Longstaff, T.A. & Haimes, Y.Y., 2002. A holistic roadmap for survivable infrastructure systems. IEEE Transactions on
Systems, Man, and Cybernetics - Part A: Systems and Humans, 32(2), pp.260–268. Available at:
Madakam, S., Ramaswamy, R. & Tripathi, S., 2015. Internet of Things (IoT): A Literature Review. Journal of
Computer and Communications, 3(3), pp.164–173. Available at: http://www.scirp.org/journal/jcc [Accessed April
13, 2017].
Marwedel, P. & Engel, M., 2016. Cyber-Physical Systems: Opportunities, Challenges and (Some) Solutions. In
MEICA, M. of E.I. and C.A., 2015. Industria Conectada 4.0: La transformación digital de la industria española Dossier
METI, M. of E.T. and I. of J., 2015. NRS, New Robot Strategy - Vision Strategy and Action Plan, Available at:
METI, M. of E.T. and I. of J., 2015. NRS, New Robot Strategy - Vision Strategy and Action Plan, Available at:
45
University of Oxford
MIUR, M. of E.U. and R., 2014. Italian Technology Cluster: Intelligent Factories. Cluster Tecnologico Nazionale
Fabbrica Intelligente | Imprese, università, organismi di ricerca, associazioni e enti territoriali: insieme per la
Nicolescu, R. et al., 2018a. Mapping the values of IoT. Journal of Information Technology, pp.1–16. Available at:
Nicolescu, R. et al., 2018b. State of The Art in IoT - Beyond Economic Value, London. Available at:
https://iotuk.org.uk/wp-content/uploads/2018/08/State-of-the-Art-in-IoT-–-Beyond-Economic-Value2.pdf
Niggemann, O. et al., 2015. Data-Driven Monitoring of Cyber-Physical Systems Leveraging on Big Data and the
Internet-of-Things for Diagnosis and Control. In International Workshop on the Principles of Diagnosis (DX).
NIST, National Institute of Standards and Technology, 2016. Framework for Cyber-Physical Systems. Release 1.0.
Nurse, J., S. Creese, and D. De Roure, 2017 “Security Risk Assessment in Internet of Things Systems,” IT Prof., vol.
Nurse, J.R.C. et al., 2018. Realities of Risk: ‘If you can’t understand it, you can’t properly assess it!’: The reality of
assessing security risks in Internet of Things systems. In Living in the Internet of Things: Cybersecurity of the
IoT - 2018. 28 - 29 March 2018 | IET London: Savoy Place: The Institution of Engineering and Technology, pp.
Olzak, T., 2013. Insider threats: Implementing the right controls - TechRepublic. TechRepublic. Available at:
2017].
Ouyang, J. et al., 2014. SDF. In Proceedings of the 19th international conference on Architectural support for
programming languages and operating systems - ASPLOS ’14. New York, New York, USA: ACM Press, pp.
Pan, M. et al., 2015. Applying Industry 4.0 to the Jurong Island Eco-industrial Park. Energy Procedia, 75, pp.1536–
46
University of Oxford
Petrolo, R., Loscri, V. & Mitton, N., 2016. Cyber-Physical Objects as Key Elements for a Smart Cyber-City. In
Posada, J. et al., 2015. Visual Computing as a Key Enabling Technology for Industrie 4.0 and Industrial Internet.
Radanliev, P. (2014) A conceptual framework for supply chain systems architecture and integration design based on
practice and theory in the North Wales slate mining industry. British Library. doi: ISNI: 0000 0004 5352 6866.
Radanliev, P. (2015a) ‘Architectures for Green-Field Supply Chain Integration’, Journal of Supply Chain and
Radanliev, P. (2015b) ‘Engineering Design Methodology for Green-Field Supply Chain Architectures Taxonomic
Scheme’, Journal of Operations and Supply Chain Management. GB, 8(2), pp. 52–66. doi:
10.12660/joscmv8n2p52-66.
Radanliev, P. (2015c) ‘Green-field Architecture for Sustainable Supply Chain Strategy Formulation’, International
Journal of Supply Chain Management. GB, 4(2), pp. 62–67. Available at:
Radanliev, P. (2016) ‘Supply Chain Systems Architecture and Engineering Design: Green-field Supply Chain
Integration’, Operations and Supply Chain Management: An International Journal, 9(1). Available at:
http://www.journal.oscm-forum.org/journal/abstract/oscm-volume-9-issue-1-2016/supply-chain-systems-
Radanliev, P., Charles De Roure, D., Maple, C., Nurse, J. R. C., Nicolescu, R. and Ani, U. (2019a) Cyber Risk in IoT
Radanliev, P., Charles De Roure, D., Nurse, J. R. C., Burnap, P. and Montalvo, R. M. (2019) Methodology for
designing decision support supply chain systems for visualising and mitigating cyber risk from IoT technologies,
47
University of Oxford
Radanliev, P., De Roure, C. D., Nurse, .R.C., Nicolescu, R., Huth, M., Cannady, C. and Montalvo, R. M. (2018)
‘Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the
Internet-of-things in Industry 4.0’, in Living in the Internet of Things: Cybersecurity of the IoT - 2018. London:
Radanliev, P., Roure, D. C. De, Nurse, J. R. C., Burnap, P., Anthi, E., Ani, U., Maddox, L., Santos, O. and Montalvo,
R. M. (2019b) Cyber risk from IoT technologies in the supply chain – decision support system for the Industry
Radanliev, P., Roure, D. C. De, Nurse, J. R. C., Burnap, P., Anthi, E., Ani, U., Maddox, L., Santos, O. and Montalvo,
R. M. (2019c) Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for
Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment. 201903.0080.v1.
Radanliev, P., De Roure, D. C., Nurse, J. R. C., Burnap, P., Anthi, E., Ani, U., Santos, O. and Montalvo, R. M.
(2019d) Definition of Cyber Strategy Transformation Roadmap for Standardisation of IoT Risk Impact
Assessment with a Goal-Oriented Approach and the Internet of Things Micro Mart, Working paper. University of
Oxford.
Radanliev, P., De Roure, D. C., Nurse, J. R. C. C., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R. M. (2019e)
New developments in Cyber Physical Systems, the Internet of Things and the Digital Economy – future
developments in the Industrial Internet of Things and Industry 4.0. University of Oxford. doi:
10.13140/RG.2.2.14133.93921.
Radanliev, P., De Roure, D. C., Nurse, J. R. C., Montalvo, R. M. and Burnap, P. (2019f) Standardisation of cyber risk
Radanliev, P., De Roure, D. C., Nurse, J. R. C., Montalvo, R. M. and Burnap, P. (2019g) The Industrial Internet-of-
Things in the Industry 4.0 supply chains of small and medium sized enterprises, Working paper. University of
Oxford.
Radanliev, P., De Roure, D. C., Nurse, J. R. C., Montalvo, R. M., Burnap, P., Roure, D. C. De, Nurse, J. R. C.,
48
University of Oxford
Montalvo, R. M. and Stacy Cannady (2019h) Design principles for cyber risk impact assessment from Internet
Radanliev, P., Roure, D. C. De, Nurse, J. R. C., Montalvo, R. M. and Stacy Cannady (2018) ‘Design principles for
cyber risk impact assessment from Internet of Things (IoT)’, Wokring paper.
Radanliev, P., De Roure, D. C., Nurse, J. R. C., Rafael, M. M. and Burnap, P. (2019i) Supply Chain Design for the
Industrial Internet of Things and the Industry 4.0. University of Oxford. doi: 10.13140/RG.2.2.36311.32160.
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R. and Huth, M. (2018) ‘Economic impact of
IoT cyber risk - analysing past and present to predict the future developments in IoT risk analysis and IoT cyber
insurance’, in Living in the Internet of Things: Cybersecurity of the IoT - 2018. London: Institution of Engineering
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R. and Huth, M. (2019j) Analysing IoT cyber
Radanliev, P., De Roure, D., Nicolescu, R. and Huth, M. (2019k) A reference architecture for integrating the Industrial
Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S. and Burnap, P. (2018) ‘Future
developments in cyber risk assessment for the internet of things’, Computers in Industry. Elsevier, 102, pp. 14–
Radanliev, P., De Roure, D., Nurse, J. R. C. C., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R. M. (2019l)
Cyber risk impact assessment – assessing the risk from the IoT to the digital economy. University of Oxford.
doi: 10.13140/RG.2.2.11145.49768.
Radanliev, P., De Roure, D., Nurse, J. R. C., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R. M. (2019m)
Cyber Security Framework for the Internet-of-Things in Industry 4.0. Available at: www.preprints.org.
Taylor, P., Allpress, S., Carr, M., Lupu, E., Norton, J., Smith, L., Blackstock, J., Boyes, H., Hudson-Smith, A., Brass,
I., Chizari, H., Cooper, R., Coulton, P., Craggs, B.,Davies, N., De Roure, D., Elsden, M., Huth, M., Lindley, J.,
Maple, C., Mittelstadt, B., Nicolescu, R., Nurse, J., Procter, R., Radanliev, P., Rashid, A., Sgandurra, D.,
49
University of Oxford
Skatova, A., Taddeo, M., Tanczer, L., Vieira-Steiner, R., Watson, J.D.M., Wachter, S., Wakenshaw, S.,
Carvalho, G., T. and R.J., Westbury, P. S. (2018) Internet of Things realising the potential of a trusted smart
Rajkumar, R. (Raj), Lee, I., Sha, L., & Stankovic, J. 2010. Cyber-Physical Systems: The Next Computing Revolution.
In Proceedings of the 47th Design Automation Conference on - DAC ’10. New York, New York, USA: ACM
Ribeiro, L., Barata, J. & Ferreira, J., 2010. An agent-based interaction-oriented shop floor to support emergent
diagnosis. In 2010 8th IEEE International Conference on Industrial Informatics. IEEE, pp. 189–194. Available
Ringert, J.O., Rumpe, B. & Wortmann, A., 2014. From Software Architecture Structure and Behavior Modeling to
2017].
Ringert, J.O., Rumpe, B. & Wortmann, A., 2015. Architecture and Behavior Modeling of Cyber-Physical Systems with
Rodewald, G. & Gus, 2005. Aligning information security investments with a firm’s risk tolerance. In Proceedings of
the 2nd annual conference on Information security curriculum development - InfoSecCD ’05. New York, New
Roumani, M.A. et al., 2016. Value Analysis of Cyber Security Based on Attack Types. ITMSOC Transactions on
Innovation & Business Engineering, 1, pp.34–39. Available at: http://www.itmsoc.org [Accessed April 4, 2017].
Ruan, K., 2017. Introducing cybernomics: A unifying economic framework for measuring cyber risk. Computers &
Ruffle, S.J.; Bowman, G.; Caccioli, F.; Coburn, A.W.; Kelly, S.; Leslie, B.; Ralph, D., 2014. Stress Test Scenario: Sybil
Logic Bomb Cyber Catastrophe. Cambridge Risk Framework series; Centre for Risk Studies, University of
https://www.jbs.cam.ac.uk/fileadmin/user_upload/research/centres/risk/downloads/ccrs_cyber_catastrophe_sce
50
University of Oxford
Sirris and Agoria, 2017. Made Different: Factory of the Future 4.0. Available at: http://www.madedifferent.be/en/what-
Sangiovanni-Vincentelli, A., Damm, W. & Passerone, R., 2012. Taming Dr. Frankenstein: Contract-Based Design for
Cyber-Physical Systems * g. European Journal of Control, 18, pp.217–238. Available at: http://ac.els-
cdn.com/S0947358012709433/1-s2.0-S0947358012709433-main.pdf?_tid=83e4d7ce-22f9-11e7-860b-
SCPRC, T.S.C.P.R. of C., 2017. Made in China 2025. www.english.gov.cn. Available at:
Shackelford, S.J., 2016. Protecting Intellectual Property and Privacy in the Digital Age: The Use of National
Cybersecurity Strategies to Mitigate Cyber Risk. Chapman Law Review, 19. Available at:
http://heinonline.org/HOL/Page?handle=hein.journals/chlr19&id=469&div=26&collection=journals [Accessed
April 3, 2017].
Shafiq, S.I. et al., 2015. Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber
Physical System for Industrie 4.0. Procedia Computer Science, 60, pp.1146–1155. Available at:
Shi, J. et al., 2011. A survey of Cyber-Physical Systems. In 2011 International Conference on Wireless
Communications and Signal Processing (WCSP). IEEE, pp. 1–6. Available at:
Sokolov, B. & Ivanov, D., 2015. Integrated scheduling of material flows and information services in industry 4.0 supply
Stock, T. & Seliger, G., 2016. Opportunities of Sustainable Manufacturing in Industry 4.0. Procedia CIRP, 40, pp.536–
Stojmenovic, I., 2014. Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and
Actuation for Large-Scale Cyber-Physical Systems. IEEE Internet of Things Journal, 1(2), pp.122–128.
Taylor, L., P., Allpress, S., Carr, M., Lupu, E., Norton, J., Smith, H. Blackstock, J., Boyes, H., Hudson-Smith, A.,
Brass, I., Chizari, D. Cooper, R., Coulton, P., Craggs, B.,Davies, N., De Roure, B. Elsden, M., Huth, M.,
51
University of Oxford
Lindley, J., Maple, C., Mittelstadt, A. Nicolescu, R., Nurse, J., Procter, R., Radanliev, P., Rashid, R. Sgandurra,
D., Skatova, A., Taddeo, M., Tanczer, L., Vieira-Steiner, T. Watson, J.D.M., Wachter, S., Wakenshaw, S.,
Carvalho, G., and P. S. R.J., Westbury, “Internet of Things realising the potential of a trusted smart world,”
London, 2018.
Tan, Y., Goddard, S. & Pérez, L.C., 2008. A Prototype Architecture for Cyber-Physical Systems. ACM SIGBED
Review - Special issue on the RTSS forum on deeply embedded real-time computing, 5(1). Available at:
http://delivery.acm.org/10.1145/1370000/1366309/p26-tan.pdf?ip=129.67.116.155&id=1366309&acc=ACTIVE
SERVICE&key=BF07A2EE685417C5.F2FAECDC86A918EB.4D4702B0C3E38B35.4D4702B0C3E38B35&CFI
Thramboulidis, K., 2015. A cyber–physical system-based approach for industrial automation systems. Computers in
Toro, C., Barandiaran, I. & Posada, J., 2015. A Perspective on Knowledge Based and Intelligent Systems
Implementation in Industrie 4.0. Procedia Computer Science, 60, pp.362–370. Available at:
Wahlster, W. et al., 2013. Recommendations for implementing the strategic initiative INDUSTRIE 4.0, Available at:
http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Material_fuer_Sond
Wan, J. et al., 2011. A General Test Platform for Cyber-Physical Systems: Unmanned Vehicle with Wireless Sensor
Wan, J. et al., 2013. Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric
Wan, J. et al., 2013. From machine-to-machine communications towards cyber-physical systems. Computer Science
52
University of Oxford
Wan, J. et al., 2014. Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges,
Wan, J. et al., 2014. VCMIA: A Novel Architecture for Integrating Vehicular Cyber-Physical Systems and Mobile
Cloud Computing. Mobile Networks and Applications, 19(2), pp.153–160. Available at:
Wan, J., Cai, H. & Zhou, K., 2015. Industrie 4.0: Enabling technologies. In Proceedings of 2015 International
Conference on Intelligent Computing and Internet of Things. IEEE, pp. 135–140. Available at:
Wang, L. et al., 2014. A cloud-based approach for WEEE remanufacturing. CIRP Annals - Manufacturing
Wang, L., 2013. Machine availability monitoring and machining process planning towards Cloud manufacturing. CIRP
Wang, L., Törngren, M. & Onori, M., 2015. Current status and advancement of cyber-physical systems in
Wang, S. et al., 2016. Implementing Smart Factory of Industrie 4.0: An Outlook. International Journal of Distributed
Wark, T. et al., 2007. Transforming Agriculture through Pervasive Wireless Sensor Networks. IEEE Pervasive
2017].
Weyer, S. et al., 2015. Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-
Zhu, Q., Rieger, C. & Basar, T., 2011. A hierarchical security architecture for cyber-physical systems. In 2011 4th
International Symposium on Resilient Control Systems. IEEE, pp. 15–20. Available at:
53
University of Oxford
54