Intelligent Analytics For Industry 4.0 Applications
Intelligent Analytics For Industry 4.0 Applications
Edited By
Avinash Chandra Pandey, Abhishek Verma,
Vijaypal Singh Rathor, Munesh Singh, and
Ashutosh Kumar Singh
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
© 2023 selection and editorial matter, Avinash Chandra Pandey, Abhishek Verma, Vijaypal Singh
Rathor, Munesh Singh, and Ashutosh Kumar Singh; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of their
use. The authors and publishers have attempted to trace the copyright holders of all material repro-
duced in this publication and apologize to copyright holders if permission to publish in this form has
not been obtained. If any copyright material has not been acknowledged please write and let us know
so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known
or hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact m
pkbookspermissions@
tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003321149
Typeset in Times
by codeMantra
Contents
Acknowledgments......................................................................................................ix
Editors........................................................................................................................xi
Contributors............................................................................................................ xiii
v
vi Contents
Index....................................................................................................................... 293
Acknowledgments
We express our heartfelt gratitude to CRC Press (Taylor & Francis Group) and the
editorial team for their guidance and support during completion of this book. We are
sincerely grateful to reviewers for their suggestions and illuminating views for each
book chapter presented here in Intelligent Analytics for Industry 4.0 Applications.
ix
Editors
Dr. Avinash Chandra Pandey (Member, IEEE) is
currently an Assistant Professor in the Discipline of
Computer Science & Engineering at PDPM Indian
Institute of Information Technology Design and
Manufacturing, Jabalpur. He has more than 8 years
of teaching and research experience. He has guided
many M.Tech. dissertations and B.Tech. projects.
He has published more than 20 journal and confer-
ence papers in the area of text mining, NLP, and
soft computing. His research areas include data
analytics, NLP, social network analysis, IoT, cyber-
physical systems, and soft computing.
xi
xii Editors
also received a grant as a Principal Investigator for the Project entitled “HT-Pred: A
complete defensive machine learning tool for Hardware Trojan Detection” from the
Data Security Council of India (DSCI). His research interests include hardware secu-
rity, trustworthy circuit design, hardware Trojan, machine learning, IoT, and cloud
computing.
xiii
xiv Contributors
Simon T. Apeh
University of Benin
CONTENTS
1.1 Introduction.......................................................................................................2
1.1.1 Cyber-Physical System (CPS)................................................................3
1.1.2 Industrial Internet of Things (IIoT)/Industry 4.0..................................3
1.1.2.1 Advantages of Industry 4.0 Technology.................................4
1.1.2.2 Challenges of Industry 4.0......................................................4
1.1.3 Research Motivation..............................................................................5
1.2 Intelligent Cyber-Physical System Design Consideration................................. 6
1.2.1 Fault Tolerance and Reliability..............................................................6
1.2.2 Scalability µ (S).....................................................................................7
1.2.3 Hardware System Design......................................................................7
1.2.4 Network Topology.................................................................................7
1.2.5 Data Model Design................................................................................8
1.2.6 Operating Environment.........................................................................8
1.2.7 Communication and Transmission Technology.................................... 9
1.2.8 Energy Consumption........................................................................... 10
1.2.9 Routing Protocols................................................................................ 11
1.2.10 Security Challenges............................................................................. 12
1.3 The Industrial Internet of Things Architecture Design and
Industry 4.0...................................................................................................... 13
1.4 The Communication Model of ICPS in Industry 4.0...................................... 15
1.5 Simulation Results of Cyber-Physical Communication Model in IIoT
Environment.................................................................................................... 16
DOI: 10.1201/9781003321149-1 1
2 Intelligent Analytics for Industry 4.0 Applications
1.6 Conclusion....................................................................................................... 19
References.................................................................................................................20
1.1 INTRODUCTION
Internet of Things (IoT) is a worldwide network facility that is capable of connecting
billions of devices remotely for interaction and information exchanges over Internet
protocol version 6 (IPv6) for low wireless personal area network (6LoWPAN) [1].
The IoT architecture is flourished with resource-constrained devices that may include
embedded sensors, wireless connectivity, communication protocols, and information
technology (IT) [2]. The communication of these devices depends on the restraint
protocols used for the data packet forwarding and routing information through the
6LoWPAN adaptation layer [3]. These protocols include IPv6, 6LoWPAN, and rout-
ing protocol for low power and lossy network (RPL). The 6LoWPAN adaptation layer
is utilized to overcome the challenges of end-to-end connectivity, and interoperabil-
ity between both physical and virtual things identities through IEEE 802.15.4 in the
network [4]. IoT is a promising emergent technology that provides conveniences,
comforts, and quality of life for domestic users, industries, research institutes, and
many others through the procuring of smart technology devices in Industry 4.0 [5]. It
also helps to create more opportunities in the physical world, better economic prac-
tices, and computational ecosystems. While the interaction of things with a human is
possible through the IoT communication layers which can be classified into physical/
data link, network, application layer, and cloud computing layer [6].
The physical and data link layer utilized Bluetooth low energy (BLE), ZigBee
(IEEE 802.11.15), Wi-Fi (IEEE 802.11b/n/g), and many others for communica-
tion and routing of big data. The IPv6, 6LoWPAN, RPL, CARPL, or CORPL was
adopted over the network adaptation layer for seamless end-to-end connection, com-
munication between the physical environment and logical layers [7]. The routing
protocol for low power and lossy network (RPL) was adopted at the lower link net-
work layer, route optimization, and energy management. Thus, the channel-aware
protocol (CARP) was used for underwater acoustic communication or in a hazard-
ous environment. The cognitive routing protocol for low power and lossy network
(CORPL) was used for cognitive radio or terrestrial communication [8]. However, the
application layer functions on the existing constrained application protocols (CoAP)
and representational state transfer (REST) for the application program interface
(API). This cap is popularly used to conform with constrained devices and for the
seamless interaction between the application layer and cloud computing in the IoT
networks [9].
The term smart technology in the IoT refers to the physical and logical connectiv-
ity adopted for the system conditioning to provide some functions such as remote
monitoring, surveillance, and tracking using various sensing technologies (sensors),
actuators, robotics, and artificial intelligence [10,11]. The roles of the smart system
in the emergent IIoT are varied like passenger trackers, car geolocation monitoring
using GPS [12], door access control [13], and security measures using RFID cards
[14]. So, smart technology is for green information that connects different indus-
trial technology (IT) products with things related over the network through wireless
Analytics Approach for Intelligent Cyber-Physical System Integration 3
Cyber Components
Embedded Microchip
Unit for Computaon
Cyber-Physical System
Computaonal Network Human-Machine
Interface (HMI)
Embedded
Actuator Sensor
System
Physical Components
Computer System
Environment
devices [15]. Some of these industrial products are cyber-physical systems (CPSs),
sensors, artificial intelligence (AI), robotics, and so on.
Internet of
Cyber- Things (IoT)
Physical
system (CPS) Industry 4.0
/IIoT
Technology Digitization
Cloud
Computing
Big data
Machine
Artificial
Learning
Intelligence
(ML )
(AI)
automation, big data, CPS, machine learning for enterprise resource planning, and
timely analytics in customer satisfaction. The illustration of components merger in
Industry 4.0 is presented in Figure 1.2.
The aim of this emerging fourth industrial revolution (Industry 4.0) was not only
to focus on the interconnectivity of smart systems but also to emphasize holistically
manufacturing approaches that will provide linkages between physical and digital
technology. It will also provide better collaboration between the business vendors,
partners, products, and people belonging to Industry 4.0. Meanwhile, interoperability
among the smart products is crucial to boost instant data productivity and enhance
processes for fast growth.
Smart
Poor IT Poor Supply Manufacturing/
Infrastructure Chain Discrepancy
Management
automation, and real-time big data acquired through the use of machine learning,
robotics, and AI with a vision of business strategy that involved people, partners,
and products [26]. Figure 1.4 illustrates some of the Industry 4.0 challenges over the
emergent IIoT networks.
1.1.3 Research Motivation
The IIoT platform is an explosive technology that enhances the evolution and avail-
ability of smart systems in recent times. But the cooperation of this CPS component
6 Intelligent Analytics for Industry 4.0 Applications
brings a lot of concerns during the operation and design phase, such as security
vulnerability, power consumption, interoperability, communication delay, quality of
services (QoS) deterioration, and many others. However, the researchers have not
discussed these issues holistically but rather focus on one pertinent issue like security
attacks in the CPS based on IIoT, and optimization of power prediction. These evolv-
ing challenges will continue to disturb the existence of the IIoT network, and its future
focuses on the emerging Industry 4.0 revolution. This research work is organized by
introducing the Internet of Things, smart technology, CPS, IIoT, and Industry 4.0 in
Section 1.1. It also includes research motivation and organization of research. Section
1.2 presents a CPS design consideration. IIoT architecture design and Industry 4.0
are discussed in Section 1.3. Section 1.4 presents the CPS communication model in it
using Markov Chain Model (MCM). Section 1.5 shows the simulation results of the
communication model and performance analysis. Section 1.6 concludes the research
with recommendations for future research.
R ( t ) = P ( X > t ) = 1 − F ( t ) (1.1)
F ( t ) = 1 − R ( t ) (1.2)
R j (t ) = e − λ jt (1.3)
1.2.2 Scalability μ (S)
Scalability is the ability to extend or increase the size of a network node without
collapsing the network structure and services. It is a process of adding more sensor
nodes to a network and still maintaining its efficiency even when several numbers of
nodes were added to it. Therefore, a scalable network is a network model that grows
with increasing in-network loads as many of these Industry 4.0 products are welcome
and integrated into the platform, such as robotic systems, machine learning, AI, big
data, techno-preneureship, and many others. The scalability of a network system can
be calculated as expressed in equation (1.4):
µ( S ) = MπT 2 ⁄E (1.4)
where M is the number of scattered sensor nodes in the network environment (E), T
is a transmission radio range, and E is the network environment.
1.2.4 Network Topology
Network topology is a model or structural linkage designed for the controllability of
both internal and external sensor nodes, which are interconnected to capture or share
empirical properties in a network. Therefore, these topological properties in relating
information and profile control between source and sink nodes are constraints when
integrated within an embedded wireless system. This constraint is a result of the
complexity of the system (density of nodes) and interaction between pairs of nodes
8 Intelligent Analytics for Industry 4.0 Applications
Memory
(Storage Unit)
1.2.6 Operating Environment
The wireless sensor node is expected to be effectively designed when they are
densely deployed directly in contact with the phenomenon or closer to the object for
efficient operations and adaptation to the environmental condition. As in robotic sys-
tem design for a specific application using AI techniques or machine learning for the
TABLE 1.1
Network Topology Analysis
Topology Range Power Period
Mesh Long Higher Not at all
Star Short Low Not at all
Tree Long Low Yes
Hybrid Long Very low Depending on the sensor pattern
Analytics Approach for Intelligent Cyber-Physical System Integration 9
Service
Virtual
Entity Knowledge
City
Health (geographical)
AccessRights
User
big data acquisition and analysis. In addition, other applications such as underwater
acoustic monitoring, surveillance on battlefields, harsh conditions like the nozzle of
an aircraft engine, and so on also require effective design of wireless sensor node.
The formation of wireless connections and network services in erratic environ-
mental conditions, such as atmosphere/weather, rain, and icing conditions, requires
improvement to meet the standard of Industry 4.0 products.
C = i 2 + ij 2 + j 2 (1.6)
where C = 1, 3, 4, 7, 9, … as imaginable cluster size or single-cell size, and i and j are
integers that determine a relative location of coexisting channel cells. Therefore, the
equation can be rewritten as follows:
The effective power transmission between the antenna transmitters to the receiver
(Pr, Pt) through the antenna area and their directivity (Dt, Dr) is expressed as in
equations (1.8–1.10):
where Ar and At are the effective radio antenna areas for receiving and transmitting
the signal, d is the distance between radio antennas, and λ is an RF antenna.
1.2.8 Energy Consumption
The battery life of ICPS can be significantly extended if sensor nodes are configured
to coordinate or dictate when the entire circuit should be ON or OFF or by using a
meta-heuristic algorithm. A sensor node in the ICPS can be configured to determine
when the entire circuit should begin monitoring an event, by activating the circuit or
else should be put into deep sleep mode for energy savings. The lifetime of WSN is
highly dependent on the power available at each node in the network called active
power (ActiveP). Without providing any reverse energy, this power is draining off
during operation. It means energy constraint in an embedded wireless system [29,
30]. The average power (AvP) consumption of a sensor node and the sensor node duty
cycle (Dnode), which is the fraction of time (t) when the node is active and the period
is T, can be expressed as in equations (1.11–1.13):
DN = Activet /T (1.12)
However, one of the most challenges of this ICPS component is a power constraint
because each node or component in the architecture will be loaded and expended
energy of the information flow. The energy expended by each node of ICPS in the
network will be dependent on the functions (loads) which can be affected by location
(topology) and material properties (operating characteristics). The power consump-
tion of the node and the entire network can be estimated. Let us consider a single
ICPS Ψ𝑝𝑠 = (𝜙𝑛, 𝜉𝑠) with components (nodes) integrated and determine the load 𝜁, but
explicit service classifications are disregarded, and faulty physical node (component)
is not considered. The total load of the ICPS per unit time is given as equation (1.14),
and the structural load of ICPS node j up-to-the-minute time step n is expressed as in
equation (1.15). However, the constraint of this system occurs when there is an excess
flow of information transmission that causes a node buffer overflow and packet loss
[31] as given in equation (1.16):
Analytics Approach for Intelligent Cyber-Physical System Integration 11
ζΨ ps = ∑ j∈∧ p − normal
α .K njδ (1.14)
ζΨ ps .d njδ
ζ njc = (1.15)
∑ j ∧ p − normal
d njδ
where Ψ𝑝𝑠 is the CPS, 𝜙𝑛 is predictable of nodes, 𝜉𝑠 is the established node edge,
Λ𝑝−𝑛𝑜𝑟𝑚𝑎𝑙 is the standard process in the physical network environment, 𝜅𝛿 is the sen-
sor node degree, and j is the number of nodes in the network up-to-the-minute time
step n, while 𝜅 and 𝛿 are arbitrary variables in the control of the CPS. 𝜎𝑐 is the node
tolerance coefficient and 𝜁𝑐 is the load that is added to the sensor node j for the system
faulty identification.
1.2.9 Routing Protocols
A wireless sensor packet routing is relying on the network layers of the IIoT stack
model, while a routing algorithm is adopted to discover the best routes for packet
transmission and to ensure the safe delivery of data packets to the destinations in
the networks. The transport control protocol/Internet protocol (TCP/IP) is mostly
responsible to guarantee packet delivery and establishing a reliable communication
connection between two hosts in the network. It also repairs and maintains the routes
disruption when radio links (or hops) along established routes are broken. This prob-
lem can ensue due to sensor node relocation or node failure, server RF interference,
and congestion.
Also, the routing processes in the network are very challenging due to several
characteristics that distinguish them from contemporary communication and wire-
less ad-hoc networks as in Table 1.2. These include the building of global addressing
and routing algorithms for classical IP-based protocols. The application of sensor
nodes in the network is to sense data from multiple regions (sources) and route to
a particular sink or gateway (destination), which consumes energy and bandwidth
utilization. Therefore, the nodes that are tightly deployed in a constrained network
environment will have limited or constrained resources like power consumption,
processing capacity, and data storage [32]. The HEED and LEACH energy-aware
routing protocols that function as a multihop routing network algorithm using trans-
mission power of intercluster communication to select cluster head (CH) among the
sensor nodes in a network are expressed as in equation (1.17) [33]:
where ƕprob is the probability of selecting a sensor node as a CH, ∁prob is the maxi-
mum number of clusters probability in the network, ε ri is the residual energy of an ith
node, and εT is the total energy of the network. However, routing is a critical concern
in the distributed sensor network when considering the homogeneity in the way pack-
ets are routed between source and destination across varying network topologies.
12 Intelligent Analytics for Industry 4.0 Applications
TABLE 1.2
Routing Algorithm and Its Functions
Protocols BSN Mobility Functions
LEACH 1 Stable BS The distributed cluster node is formed to extend
the node’s lifetime.
EWC 1 Stable BS Distributed cluster is formed to guarantee data
delivery and life improvement.
SPIN 1 Movable Exchange metadata to reduce the number of
messages and lifetime.
REAR >1 Restricted Lifetime extended and data delivery insured.
Energy aware >1 Restricted Lifetime extended.
Direct diffusion >1 Restricted It establishes efficient n-way communication paths
for fault tolerance.
Information driven 1 Restricted It saves more energy using optimization of direct
diffusion techniques.
Gradient 1 Restricted It delivers data through the minimal number of
hops.
PEGASIS 1 Stable base station It is lifetime with bandwidth optimization.
Energy-aware based 1 Not at all It is lifetime and operates in a real time.
cluster head
Self-organized 1 Movable It improves fault tolerance.
Minimum energy 1 Not at all It is lifetime and self-reconfiguration.
communication
Geographic adaptive >1 Restricted It increases the network lifetime as the number of
fidelity nodes increases.
But, the security mechanism for this activity (routing process) is reflected as more
problematic and interesting compared to others.
1.2.10 Security Challenges
The significant function of a secure mechanism in the IIoT network requires the
urgent attention of the experts due to billions of things and smart manufacturing
components that are expected to be flourishing in the universal network shortly. This
IIoT provides many conveniences and benefits to humans in the wide areas of smart
technologies. But the security challenge and resource constraint devices will make it
unsafe, and it may become an untrustworthy network [34]. The integration of ICPS
into the IIoT model is susceptible to different attacks due to weak security counter-
measures at each layer of the network, and it has become a serious challenge to the
existence of networks. Any provision to counter these security challenges with a
robust cryptographic method or advanced encryption algorithm may result in net-
work overhead. Other challenges include energy inefficiency, latency (delay), and
packet loss with throughput degradation because of their computation power, which
is not suitable for such constraint devices. So, any nodes that are compromised by
Analytics Approach for Intelligent Cyber-Physical System Integration 13
Memory corruption
9%
Overflow
13%
Restriction Bypass
EXTENT OF ATTACKS (%) 11%
Information hijacking 13%
malicious actors, hackers, or social networks intruder can affect the performance of
the ICPSs in the network. The consequence of these malicious nodes in the network
is the misleading routing of sensor node traffic, generating false alarm reports, mes-
sage modification, false route identification, masquerading, and breaching the trust,
privacy, and confidentiality of the network information [35].
This significant security flaw in IIoT networks threatens the existence of ICPS
functionality, and it requires the urgent attention of experts due to billions of things
and machines that are expected to be flourishing in the Industry 4.0 network shortly.
Also, it is noted that smart devices are increasing in the market with several threats
that are replicated to destroy the existence of industrial revolution worldwide net-
works. These include bonnets, data spoofing, eavesdropping, ransomware, social
engineering, denial of service (DoS), and distributed denial of service (DDoS). The
extent of the cyber threat effect on smart technology devices is analyzed as shown
in Figure 1.7. This IIoT network threat is established in a distributed network during
the routing protocol initialization through an identified route from one ICPS node to
another until the destination is discovered.
Cloud
Web App
Server
Industry 4.0
Remote Users
6LoWPAN
Adaptation
Smart TV
industrial products [37, 38]. The implementation of Industry 4.0 architecture in the
IIoT network illustrated in Figure 1.8 is based on the following technologies:
Subscribes/
Invoke Digital
Object Human
Interact
with
Active Passive Contains
0.* Digital Digital 0.*
Service Object Object 0..*
0.* Augmented
XOR
Entity 1.*
Contains
1 Contains
0.* 1.*
Exposes
0.1
0..* 0.1
Virtual
1. 0..*
Entity 1.*Contains Physical
0.* Attached 0.*
0.* 0.* to
0.* Entity
0.* 0.*
0.1 0.*
Resources Associated 0.*
with Device
0.*
Hosts 1
Network Connected
Resources Device Actuator Tag Sensor
Resources
FIGURE 1.9 The UML illustration of the cyber-physical system communication model in
Industry 4.0.
using java native language (JNL), Micro-C, MySQL, and many protocols like CoAPs,
MQQT, and HTTP. The UML of the CPS communication model in Industry 4.0 is
given in Figure 1.9.
using the Contiki-tunslip utility. The communication of these wireless sensor nodes
simulation results shows the accuracy and efficiency of the packet transmitted from
the field (physical layer) to the cloud database system. The results of packet genera-
tion (packet/sec) and packet loss against throughput during packet transmission are
presented in Tables 1.3 and 1.4, respectively. Figures 1.10 and 1.11 depict graphs of
TABLE 1.3
Simulation Results of Packet Rate Generation Against Throughput
Network Throughput (kb/s)
Sensor Sensor Sensor Sensor
PGR (packet/s) Node1 Node2 Node3 Node4
1 0.915 0.8757 0.7254 0.6505
5 1.2714 0.9932 0.7792 0.6566
10 1.9454 1.3552 1.1732 1.8463
15 2.122 1.4545 1.1921 1.2571
20 2.2748 1.9837 1.3534 1.5462
TABLE 1.4
Simulation Results of Packet Rate Generation Against Packet Loss
Packet Loss (%)
Sensor Sensor Sensor Sensor
PGR (packet/s) Node1 Node2 Node3 Node4
1 1.20 2.70 4.55 5.50
5 3.90 5.71 8.55 11.61
10 5.25 7.02 12.25 21.77
15 6.42 7.05 13.45 14.55
20 7.51 9.21 14.6 17.05
1.5
0.5
0
1 2 3 4 5
PACKET GENERATION RATE (PER SEC)
60
50
40
30
20
10
0
1 2 3 4 5
PACKET LOSS (%)
packet generation and packet loss against throughput, respectively. Figures 1.12 and
1.13 show the average packet delay and the average period of packet transmission
during end-to-end communication nodes in the simulation environment.
1.6 CONCLUSION
This research analyzed the selected operational factors that affect the design of the
CPS and constraints of the IIoT model. The research survey exposed that energy
consumption, fault tolerance, reliability, and scalability affect the optimal perfor-
mance of the CPS-based IIoT. It also gives a clear and cohesive description of the
proposed design model together with the pertinent systemic components of the CPS.
The design requirements and technical procedures for integrating embedded devices,
sensors, actuators, and wireless connectivity for the enhancement of the IoT architec-
tural model are also elucidated in this work. The efficient design of a CPS depends
on hardware design, software coding, and control theory with the holistic approach
of computation to suit physical environmental constraints. The simulation of ICPS
20 Intelligent Analytics for Industry 4.0 Applications
communication performance was measured using packet generation rate, packet loss
rate, throughput, and packet delay. The future works will be focused on the devel-
opment of a lightweight secure framework for the CPS in Industry 4.0. Also, a big
data storage vulnerability to cyber attacks demanded an optimized approach for the
detection and mitigation of attacks in the IIoT environments.
REFERENCES
1. Ajao, L. A., Agajo, J., Kolo, J. G., Maliki, D., & Adegboye, M. A. (2017). Wireless
sensor networks based-internet of thing for agro-climatic parameters monitoring and
real-time data acquisition. Journal of Asian Scientific Research, 7(6), 240–252.
2. Ai, Y., Peng, M., & Zhang, K. (2018). Edge computing technologies for Internet of
Things: a primer. Digital Communications and Networks, 4(2), 77–86.
3. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the
Internet of Things: A review. IEEE Sensors Journal, 20(11), 5666–5690.
4. Pasikhani, A. M., Clark, J. A., Gope, P., & Alshahrani, A. (2021). Intrusion detec-
tion systems in RPL-based 6LoWPAN: A systematic literature review. IEEE Sensors
Journal, 21(11), 12940–12968.
5. Manavalan, E., & Jayakrishna, K. (2019). A review of Internet of Things (IoT) embed-
ded sustainable supply chain for industry 4.0 requirements. Computers & Industrial
Engineering, 127, 925–953.
6. Kumar, N. M., & Mallick, P. K. (2018). The Internet of Things: Insights into the building
blocks, component interactions, and architecture layers. Procedia Computer Science,
132, 109–117.
7. Cirani, S., Ferrari, G., Picone, M., & Veltri, L. (2018). Internet of Things: Architectures,
Protocols and Standards. John Wiley & Sons: Hoboken, NJ.
8. Yang, Z., Ping, S., Sun, H., & Aghvami, A. H. (2016). CRB-RPL: A receiver-based
routing protocol for communications in cognitive radio enabled smart grid. IEEE
Transactions on Vehicular Technology, 66(7), 5985–5994.
9. Tariq, M. A., Khan, M., Raza Khan, M. T., & Kim, D. (2020). Enhancements and chal-
lenges in coap—A survey. Sensors, 20(21), 6391.
10. Darby, S. J. (2018). Smart technology in the home: time for more clarity. Building
Research & Information, 46(1), 140–147.
11. Brougham, D., & Haar, J. (2018). Smart technology, artificial intelligence, robotics,
and algorithms (STARA): Employees’ perceptions of our future workplace. Journal of
Management & Organization, 24(2), 239–257.
12. Aliyu, S., Yusuf, A., Abdullahi, U., & Hafiz, M. (2017). Development of a low-cost
GSM-bluetooth home automation system. International Journal of Artificial Intelligent
and Application, 8(8), 41–50.
13. Jimoh, O. D., Ajao, L. A., Adeleke, O. O., & Kolo, S. S. (2020). A vehicle tracking
system using greedy forwarding algorithms for public transportation in urban arterial.
IEEE Access, 8, 191706–191725.
14. Cheng, J., Chen, W., Tao, F., & Lin, C. L. (2018). Industrial IoT in 5G environ-
ment towards smart manufacturing. Journal of Industrial Information Integration, 10,
10–19.
15. Goddard, N. D. R., Kemp, R. M. J., & Lane, R. (1997). An overview of smart t echnology.
Packaging Technology and Science: An International Journal, 10(3), 129–143.
16. Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-physical systems security–A sur-
vey. IEEE Internet of Things Journal, 4(6), 1802–1831.
17. Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The industrial internet of
things (IIoT): An analysis framework. Computers in Industry, 101, 1–12.
Analytics Approach for Intelligent Cyber-Physical System Integration 21
18. Malik, P. K., Sharma, R., Singh, R., Gehlot, A., Satapathy, S. C., Alnumay, W. S., … &
Nayak, J. (2021). Industrial Internet of Things and its applications in industry 4.0: State
of the art. Computer Communications, 166, 125–139.
19. Bai, C., Dallasega, P., Orzes, G., & Sarkis, J. (2020). Industry 4.0 technologies assess-
ment: A sustainability perspective. International Journal of Production Economics,
229, 107776.
20. Serpanos, D., & Wolf, M. (2018). Industrial Internet of Things. In Internet-of-Things
(IoT) Systems (pp. 37–54). Springer: Cham.
21. Ghobakhloo, M. (2020). Industry 4.0, digitization, and opportunities for sustainability.
Journal of Cleaner Production, 252, 119869.
22. Dalenogare, L. S., Benitez, G. B., Ayala, N. F., & Frank, A. G. (2018). The expected
contribution of Industry 4.0 technologies for industrial performance. International
Journal of Production Economics, 204, 383–394.
23. Vaidya, S., Ambad, P., & Bhosle, S. (2018). Industry 4.0–A glimpse. Procedia
Manufacturing, 20, 233–238.
24. Xu, L. D., & Duan, L. (2019). Big data for cyber physical systems in industry 4.0: A
survey. Enterprise Information Systems, 13(2), 148–169.
25. Enrique, D. V., Druczkoski, J. C. M., Lima, T. M., & Charrua-Santos, F. (2021).
Advantages and difficulties of implementing Industry 4.0 technologies for labor flex-
ibility. Procedia Computer Science, 181, 347–352.
26. Castelo-Branco, I., Cruz-Jesus, F., & Oliveira, T. (2019). Assessing Industry 4.0 readiness
in manufacturing: Evidence for the European Union. Computers in Industry, 107, 22–32.
27. Lozano, C. V., & Vijayan, K. K. (2020). Literature review on cyber physical systems
design. Procedia Manufacturing, 45, 295–300.
28. Stavroulaki, V., Kelaidonis, D., Petsas, K., Moustakos, A., Vlacheas, P., Demestichas,
P., & Hashimoto, K. (2016). D2. 1 Foundations of Semantic Data Models and Tools, IoT
and Big Data Integration in Multi-Cloud Environments, University of Surrey, 1–115.
29. Ajao, L. A. Agajo, J., Mua’zu, M. B., & Schueller, J. (2020). A scheduling-based algo-
rithm for low energy consumption in smart agriculture precision monitoring system.
Agricultural Engineering International: CIGR Journal, 22(3), 103–117.
30. Ajao, L. A., Agajo, J., Gana, K. J., Ogbole, I. C., & Ataimo, E. E. (2017). Development
of a low power consumption smart embedded wireless sensor network for the ubiq-
uitous environmental monitoring using ZigBee module. ATBU Journal of Science,
Technology and Education, 5(1), 94–108.
31. Qu, Z., Xie, Q., Liu, Y., Li, Y., Wang, L., Xu, P., Zhou, Y., Sun, J., Xu, K., & Cui, M.
(2020). Power cyber-physical system risk area prediction using dependent Markov chain
and improved grey wolf optimization. IEEE Access, 8, 82844–82854.
32. Manzoor, B., Javaid, N., Rehman, O., Akbar, M., Nadeem, Q., Iqbal, A., & Ishfaq, M.
(2013). Q- LEACH: A new routing protocol for WSNs. Procedia Computer Science, 19,
926–931.
33. Touati, Y., Ali-Chérif, A., & Daachi, B. (2017). Routing Information for Energy
Management in WSNs. In Touati, Y., Ali-Cherif, A., & Daachi, B. (Eds), Energy
Management in Wireless Sensor Networks (pp. 23–51). Elsevier: Amsterdam, The
Netherlands.
34. Nigam, G. K., & Dabas, C. (2021). ESO-LEACH: PSO based energy efficient cluster-
ing in LEACH. Journal of King Saud University-Computer and Information Sciences,
33(8), 947–954.
35. Yu, X., & Guo, H. (2019, August). A survey on IIoT security. In 2019 IEEE VTS Asia
Pacific Wireless Communications Symposium (APWCS) (pp. 1–5). IEEE.
36. Jhanjhi, N. Z., Humayun, M., & Almuayqil, S. N. (2021). Cyber security and privacy
issues in industrial Internet of Things. Computer Systems Science and Engineering,
37(3), 361–380.
22 Intelligent Analytics for Industry 4.0 Applications
37. Ngabo, D., Wang, D., Iwendi, C., Anajemba, J. H., Ajao, L. A., & Biamba, C. (2021).
Blockchain-based security mechanism for the medical data at fog computing architec-
ture of internet of things. Electronics, 10(17), 2110.
38. Frank, A. G., Dalenogare, L. S., & Ayala, N. F. (2019). Industry 4.0 technologies:
Implementation patterns in manufacturing companies. International Journal of
Production Economics, 210, 15–26.
2 Digital Twins A State of
the Art from Industry 4.0
Perspective
Ganesh A. Deiva and P. Kalpana
Indian Institute of Information Technology
CONTENTS
2.1 Introduction..................................................................................................... 23
2.2 Recent Studies on Digital Twin.......................................................................24
2.3 Components of Digital Twin........................................................................... 27
2.4 Applications of Digital Twin........................................................................... 29
2.4.1 Smart Manufacturing.......................................................................... 29
2.4.2 Supply Chain Management.................................................................. 29
2.4.3 Sustainability....................................................................................... 30
2.4.4 Intelligent Risk Management............................................................... 30
2.5 Challenges and Implementation Issues............................................................ 31
2.6 Future Research Avenues................................................................................ 32
2.7 Conclusion....................................................................................................... 33
References................................................................................................................. 33
2.1 INTRODUCTION
In the present data-centric environment, organizations are focusing on the transfor-
mation toward digitalization. It is leading to numerous modifications in production
processes, enhancing communication and cooperation. This kind of transformation
for creating responsive, flexible, and visible networks is known as digital transfor-
mation. This is the basis of the present industrial revolution that brings a paradigm
shift to manufacturing. For instance, Industry 4.0 builds on the foundation of the
Internet of Things (IoT) to enable monitoring the real-time systems, develop cyber-
physical frameworks, and offer the integration between the real and virtual world
[1]. It is more about intelligent, real-time communication, and self-adapting that
integrates all areas of manufacturing systems such as engineering, manufacturing,
logistics, and sales [2]. It aims to facilitate more efficient, higher quality, and faster
production. Given this, digital twin (DT) is a virtual model of a real-time system
based on a simulation, which optimizes the system for enhanced efficiency. This DT
theory has evolved from a conceptual model for product life cycle management to
an important tool for decision-making in this digital environment [3]. These models
offer opportunities for researchers and industry experts to achieve smart, sustainable
DOI: 10.1201/9781003321149-2 23
24 Intelligent Analytics for Industry 4.0 Applications
• The optimization of the product design outcome (gap between design and
manufacturing).
• The improvement of the production processes concerning the dynamic
environment.
• The prediction of unprecedented events across the various echelons of the
supply chain (SC).
• Real-time monitoring of the quality, performance, transportation, and the
information sharing.
These observations highlight the necessity to transform the internal structure in the
organizations to improve product quality, enhance process monitoring, and mitigate
uncertainty. In industries, DTs can be introduced at any stage in the production pro-
cess. They are capable of predicting and optimizing the product and product lines in
addition to the preproduction planning and design. Nowadays, they are exploited in
the modeling of the advanced SC that can assess strategies supporting SC optimiza-
tion. Recent studies highlighted the significance of developing digital SC models
that represent the actual SC digitally. The potential of DTs and the recently emerging
technologies demand further investigations to understand the challenges, applica-
tions, and under-explored avenues in Industry 4.0.
The residual part of this chapter provides the structure as follows: we present the
bibliometric analysis of the extant literature in the next section. Then, we illustrate
the significant components of DT architecture. Some notable applications are dis-
cussed in Section 2.4. The last section concludes the study.
Figure 2.1 illustrates the treemap chart according to the keywords of the recent
articles. This chart contains the frequency of the essential terms and keywords that
have been mentioned in the selected articles, such as Industry 4.0, DT, smart manu-
facturing, AI, sustainability, digitalization, predictive maintenance, IoT, blockchain,
Machine Learning (ML), simulation, and augmented reality. All major significant
terms related to DT components and applications have been covered in the selected
articles. The co-occurrence of the keywords network is shown in Figure 2.2. It can
be understood from the diagram that the majority of the DT and Industry 4.0 applica-
tions have been linked with ‘smart manufacturing’, ‘sustainability’, ‘predictive main-
tenance’, and ‘circular economy’. Based on the selected articles, clusters form in the
network of keywords. It indicates that the study has focused on investigating DT and
Industry 4.0. Similarly, the major components involved in DT technologies such as
IoT, AI, ML, blockchain, cyber-physical systems (CPSs), simulation, and big data
analytics have been highlighted in the network diagram.
Among the collection, the articles that are discussing concepts like digitalization,
sustainability, DT, and Industry 4.0 have been published more in number. The size
of the circle represents the density of the publications with respect to the key terms
(Figure 2.3).
The key terms that are associated with the selected studies are categorized into
several clusters to comprehend the significant avenues that influence DT in Industry
4.0. The conceptual structure map shown in Figure 2.4 is developed by multiple cor-
respondence analysis (MCA) using Biblioshiny software. The chart illustrates the
distribution of the key terms according to their position on the map. The terms with
the same dimension seem nearer on the map. Based on these, the authors consoli-
date the studies into two notable clusters such as DT applications and visualization
technologies.
As a result of the bibliometric analysis, the components and applications involved
in DT architecture are discussed in the following sections:
• IoT: The IoT for interconnected systems drives the significant interest in
adopting DT frameworks in organizations. Conventional manufacturing
systems are incapable of getting/accessing crucial data and dealing with
the large volume of data. Presently, the advancements in IoT allow indus-
tries to access, organize, and assess complex unstructured data technically
and economically. It drives DT in numerous industries by providing mass
production efficiency, mass customization, and mass personalization [5].
The extant studies defined the industrial Internet of things (IIoT) as a smart
infrastructure that integrates physical and virtual environments to fur-
nish advanced operations. For example, Zhao et al. developed a DT-based
architecture for tracking real-time information using IoT [6]. Most manu-
facturing industries have automated their processes using these IoT-based
2.4.1 Smart Manufacturing
In this data-centric world, the manufacturing process is transforming toward data-
centric and perception-enabled smart manufacturing. This involves the creation and
exploitation of data that addresses the integration of information technology and data
analytics. DT helps to achieve on-demand manufacturing services such as smart fac-
tory layout, scheduling, smart manufacturing, and human–robot collaboration by
acting as an enabler or direct assistance [17]. The literature describes how a DT can
be exploited to achieve the collaboration of humans and robots at a higher level [18].
Because of DTs, it is now possible to analyze human thinking and behavior in real
time using theoretical aspects [19]. Zhuang et al. presented a four-layer smart man-
ufacturing architecture for complex assembly lines [20]. It includes managing the
synchronization of real-time data, building an assembly floor DT, big data-enabled
predictive analysis, and exploiting DTs to assess services. It has been discovered
that adopting a DT in production processes can help save energy and resource [21].
Despite its impressive advances, the current DT model is still inadequate to satisfy
the demands of the accurate interconnection of the virtual model/data and physical
systems [22]. The development of feasible standards and proven architecture is a
critical step toward the success of DT-smart manufacturing.
2.4.3 Sustainability
The steady escalation of environmental problems, including carbon emissions and
nuclear pollution, has necessitated a transition in industries from traditional broad
economic growth to sustainable development in recent years. To assist product
design, manufacturing, efficient service, and sustainability enhancement, DTs incor-
porate physical, virtual, and connected product data. Given this, a simulation-based
DT framework contributes to sustainable development and circularity by assessing
the resource efficiency and recovery of high-quality secondary resources [25]. In
general, the role of DTs is important in delivering a data-rich runtime for achieving
sustainability. Also, concerning the evaluation of sustainable ideas, DTs based on
data fusion concepts can aid in reducing ambiguity and uncertainty. With the support
of ML algorithms, sustainability for a better life cycle can be addressed. For instance,
concerning smart city infrastructure, we can explore the noise levels in industries and
residential areas [26]. Similarly, the integration of ML and IoT has potential benefits
in building environmental monitoring systems [27]. The extant literature highlights
that the DTs are becoming the critical component of a product, liabilities, and indus-
trial operations in order to accomplish long-term goals.
• Similar to AI, blockchain, and IoT, the next primary challenge is infrastruc-
ture development. Since data analytics, virtual reality tools, and IoT facilitate
the successful framework of a DT, it requires infrastructure that permits the
success of the aforementioned technologies. The absence of well-connected
smart networks, information sharing, and monitoring devices hampered the
implementation of these frameworks in most industries.
• The current level of data standards and structures is the next important
challenge. DT requires quality data with constant, and continuous data
availability. Therefore, inspecting, handling, and storing such a huge vol-
ume of data need efficient data management technologies. Inconsistent and
noisy data may lead to the failure or poor performance of DTs in attaining
their objectives. Given this, an extensive analysis is needed for the right data
collection and its exploitation for achieving an effective outcome.
• In continuation, the data processing requirements will increase due to the
exponential growth of information growth. Hence, to provide a greater level
of processing speed, the data analytics algorithms like ML and deep learn-
ing need high-end processors. The lack of advanced technology adoption
can hinder the progress of introducing DTs in organizations.
• Concerning Industry 4.0, privacy and security issues are the important
threats with DT adoption. Because of the large volume of data, they are
vulnerable to cyber and hacker attack issues. The annual risk report (2021)
32 Intelligent Analytics for Industry 4.0 Applications
reported that the global pandemic increased the trust issues related to cyber
risks like data breaches to 73%. Therefore, emerging technologies like data
analytics and IoT for DT implementation should follow the standard, secu-
rity policies, updating practices, and ethical guidelines to overcome the
trust issues.
• Further investigation on DT technology is required to overcome the trust
issues from both industries and users’ perceptions. Verifying and validat-
ing the performance is crucial for reducing trust-related issues. Hence, this
enabling technology will provide valuable insights with more understand-
ing into the security and ethical-related steps.
• Despite the infrastructure, data processing, and privacy challenges, some
notable specific issues relating to the design and modeling of DT frame-
works also should be addressed. The current practices are lacking in stan-
dardized modeling and domain-specific modeling approaches. Following
standardized approaches in modeling can improve user understanding
while providing information flow across the different stages and implemen-
tation of a DT.
2.7 CONCLUSION
In Industry 4.0, smart manufacturing has become an emerging direction for the global
manufacturing industry. This chapter surveys how the DTs are integrated into the
applications such as smart manufacturing, SCM, sustainable designs, and intelligent
risk management mechanisms. In addition, critical components such as IoT, CPSs,
virtual reality, data analytics, AI, blockchains, and cloud computing for supporting
the DT are analyzed. With ready access to them, most sectors have begun to exploit
DTs to manage their key assets. In addition, industry practitioners can use DTs to
anticipate operational issues, enhance product quality, and minimize downtime.
Currently, DT applications are primarily directed toward achieving manufacturing
excellence. Expanding the reach of DTs to cover all the things and SC practitioners
will enable them to make more proactive decisions. With increased awareness of the
economic benefits of adopting this technology in the next few years, it is expected to
serve as the backbone in the Industry 4.0 era in accelerating industrial transforma-
tion. Future work could include an assessment of DT technologies in the sectors of
renewable energy, smart cities and mobility, and healthcare.
REFERENCES
1. Kamble, S. S., Gunasekaran, A., Parekh, H., Mani, V., Belhadi, A., & Sharma, R.
(2022). Digital twin for sustainable manufacturing supply chains: Current trends, future
perspectives, and an implementation framework. Technological Forecasting and Social
Change, 176, 121448.
2. Zambrano, V., Mueller-Roemer, J., Sandberg, M., Talasila, P., Zanin, D., Larsen, P. G.,
… Stork, A. (2022). Industrial digitalization in the industry 4.0 era: Classification, reuse
and authoring of digital models on Digital Twin platforms. Array, 14, 100176.
3. Cinar, Z. M., Nuhu, A. A., Zeeshan, Q., & Korhan, O. (2019, September). Digital twins
for Industry 4.0: A review. In Global Joint Conference on Industrial Engineering and
Its Application Areas (pp. 193–203). Springer, Cham.
4. Jiang, Y., Yin, S., Li, K., Luo, H., & Kaynak, O. (2021). Industrial applications of digital
twins. Philosophical Transactions of the Royal Society A, 379(2207), 20200360.
5. Stavropoulos, P., & Mourtzis, D. (2022). Digital twins in industry 4.0. In Design and
Operation of Production Networks for Mass Personalization in the Era of Cloud
Technology (pp. 277–316). Elsevier, Amsterdam, The Netherlands.
6. Zhao, Z., Shen, L., Yang, C., Wu, W., Zhang, M., & Huang, G. Q. (2021). IoT and
digital twin enabled smart tracking for safety management. Computers & Operations
Research, 128, 105183.
7. Costantini, A., Di Modica, G., Ahouangonou, J. C., Duma, D. C., Martelli, B., Galletti,
M., … Cesini, D. (2022). IoTwins: Toward implementation of distributed digital twins
in Industry 4.0 settings. Computers, 11(5), 67.
8. Li, X., Cao, J., Liu, Z., & Luo, X. (2020). Sustainable business model based on digital
twin platform network: The inspiration from haier’s case study in China. Sustainability,
12(3), 936.
34 Intelligent Analytics for Industry 4.0 Applications
9. Cavalcante, I. M., Frazzon, E. M., Forcellini, F. A., & Ivanov, D. (2019). A supervised
machine learning approach to data-driven simulation of resilient supplier selection in
digital manufacturing. International Journal of Information Management, 49, 86–97.
10. Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., & Santos, O. (2022). Digital twins:
Artificial intelligence and the IoT cyber-physical systems in industry 4.0. International
Journal of Intelligent Robotics and Applications, 6(1), 171–185.
11. Lu, Y., & Xu, X. (2019). Cloud-based manufacturing equipment and big data analyt-
ics to enable on-demand manufacturing services. Robotics and Computer-Integrated
Manufacturing, 57, 92–102.
12. Liu, C., Jiang, P., & Jiang, W. (2020). Web-based digital twin modeling and remote
control of cyber-physical production systems. Robotics and Computer-Integrated
Manufacturing, 64, 101956.
13. Reddy, K. R. K., Gunasekaran, A., Kalpana, P., Sreedharan, V. R., & Kumar, S. A.
(2021). Developing a blockchain framework for the automotive supply chain: A system-
atic review. Computers & Industrial Engineering, 157, 107334.
14. Mohapatra, D., Bhoi, S. K., Jena, K. K., Nayak, S. R., & Singh, A. (2022). A block-
chain security scheme to support fog-based internet of things. Microprocessors and
Microsystems, 89, 104455.
15. Leng, J., Wang, D., Shen, W., Li, X., Liu, Q., & Chen, X. (2021). Digital twins-based
smart manufacturing system design in Industry 4.0: A review. Journal of Manufacturing
Systems, 60, 119–137.
16. Kamble, S. S., Gunasekaran, A., & Gawankar, S. A. (2018). Sustainable Industry 4.0
framework: A systematic literature review identifying the current trends and future
perspectives. Process Safety and Environmental Protection, 117, 408–425.
17. Cimino, C., Negri, E., & Fumagalli, L. (2019). Review of digital twin applications in
manufacturing. Computers in Industry, 113, 103130.
18. Malik, A. A., Masood, T., & Bilberg, A. (2020). Virtual reality in manufacturing:
Immersive and collaborative artificial-reality in design of human-robot workspace.
International Journal of Computer Integrated Manufacturing, 33(1), 22–37.
19. Ardanza, A., Moreno, A., Segura, Á., de la Cruz, M., & Aguinaga, D. (2019). Sustainable
and flexible industrial human machine interfaces to support adaptable applications
in the Industry 4.0 paradigm. International Journal of Production Research, 57(12),
4045–4059.
20. Zhuang, C., Liu, J., & Xiong, H. (2018). Digital twin-based smart production man-
agement and control framework for the complex product assembly shop-floor. The
International Journal of Advanced Manufacturing Technology, 96(1), 1149–1163.
21. Kannan, K., & Arunachalam, N. (2019). A digital twin for grinding wheel: An infor-
mation sharing platform for sustainable grinding process. Journal of Manufacturing
Science and Engineering, 141(2), 1–14.
22. Cheng, J., Zhang, H., Tao, F., & Juang, C. F. (2020). DT-II: Digital twin enhanced
Industrial Internet reference framework towards smart manufacturing. Robotics and
Computer-Integrated Manufacturing, 62, 101881.
23. Simchenko, N. A., Tsohla, S. Y., & Chuvatkin, P. P. (2020). Effects of supply chain digi-
tal twins in the development of digital industry. International Journal of Supply Chain
Management, 9(3), 799–805.
24. Kaiblinger, A., & Woschank, M. (2022). State of the art and future directions of
digital twins for production logistics: A systematic literature review. Applied Sciences,
12(2), 669.
25. Bartie, N. J., Cobos-Becerra, Y. L., Fröhling, M., Schlatmann, R., & Reuter, M. A.
(2021). The resources, exergetic and environmental footprint of the silicon photovol-
taic circular economy: Assessment and opportunities. Resources, Conservation &
Recycling, 169, 105516.
Digital Twins 35
26. Bhoi, S. K., Mallick, C., Mohanty, C. R., & Nayak, R. S. (2022). Analysis of noise
pollution during Dussehra festival in Bhubaneswar smart city in India: A study using
machine intelligence models. Applied Computational Intelligence and Soft Computing,
2022, Article ID 6095265.
27. Bhoi, S. K., Panda, S. K., Jena, K. K., Sahoo, K. S., Jhanjhi, N. Z., Masud, M., &
Aljahdali, S. (2022). IoT-EMS: An Internet of Things based environment monitor-
ing system in volunteer computing environment. Intelligent Automation and Soft
Computing, 32(3), 1493–1507.
28. Ivanov, D., Dolgui, A., Das, A., & Sokolov, B. (2019). Digital supply chain twins:
Managing the ripple effect, resilience, and disruption risks by data-driven optimiza-
tion, simulation, and visibility. In Handbook of Ripple Effects in the Supply Chain
(pp. 309–332). Springer, Cham.
29. Ivanov, D., & Dolgui, A. (2021). A digital supply chain twin for managing the disrup-
tion risks and resilience in the era of Industry 4.0. Production Planning & Control,
32(9), 775.
30. Deiva Ganesh, A., & Kalpana, P. (2022). Future of artificial intelligence and its influ-
ence on supply chain risk management–A systematic review. Computers & Industrial
Engineering, 2022, 108206.
31. Liu, J., Zhao, P., Zhou, H., Liu, X., & Feng, F. (2019). Digital twin-driven machin-
ing process evaluation method. Computer Integrated Manufacturing Systems, 25,
1600–1610.
32. Fuller, A., Fan, Z., Day, C., & Barlow, C. (2020). Digital Twin: Enabling technologies,
challenges and open research. IEEE Access, 8, 108952–108971.
3 Human-Centered
Approach to Intelligent
Analytics in Industry 4.0
Varad Vishwarupe
Amazon, University of Oxford, MIT Pune
Prachi Joshi
VIIT Pune
Nicole Mathias
Georgetown University
CONTENTS
3.1 Introduction...................................................................................................... 37
3.2 Related Work.................................................................................................... 38
3.3 Research Questions.......................................................................................... 41
3.4 Research Solutions...........................................................................................44
3.5 Discussion and Recommendations..................................................................46
3.6 Conclusion and Future Work........................................................................... 50
References................................................................................................................. 51
3.1 INTRODUCTION
Transformation of industrial machines, brought about by the collaboration of
automation technology, machine learning, and communication abilities for the inde-
pendent running of an industry, is the concrete objective of the Industry 4.0 frame-
work. Industry 4.0 plays an important role in the manufacturing industry by ensuring
security, flexibility, customization, time efficiency, and a dynamic environment as
well as increased productivity and quality [1,2]. Through connecting smart devices
and machinery, employing self-learning solutions, and enhancing self-direction
DOI: 10.1201/9781003321149-3 37
38 Intelligent Analytics for Industry 4.0 Applications
There has also been a huge upheaval in the way HCI is used in the m anufacturing
industry to optimize for quality and not cost. The work of Uzor et al. [25] is particu-
larly intriguing in this regard wherein they have tweaked a very important facet of
Bayesian optimization, the activation function, and a particularly important statisti-
cal machine learning method to improve user interface design using crowdsourcing.
The use of virtual reality (VR) and mixed reality (MR) as a driving force for the
domain of HCI has been on the rise too [5,6]. Using intuitive user interfaces (IUIs),
VR and MR gadgets, and head-mounted displays has also made it possible to inter-
act with the physical medium in a way that is more immersive. Simulation of touch
displays for people with motor disabilities, gesture typing, 3D-based VR models, and
gaze-based motion tracking gadgets are also some of the advancements that have
helped in fusing the two realms of AI and HCI, by developing smart and interactive
systems [7–11].
The use of AI-based HCI systems and HCI-oriented AI systems has also been
observed, especially in the medicine sector. AI-based diagnosis of difficult-to-
identify diseases and in areas where human intervention seems to have stuck at a
dead end enables clinicians to find out ways which are improving healthcare such as
Sio and Hoven [14], Weichhart et al. [15] works on gender classification in task func-
tional brain networks. Use of AI–HCI conjunct systems in improving language mod-
els for natural languages also depicts the pervasive nature of the said field. Isen [16]
Islam et al. [17] have done some remarkable work in this regard. Inferring web page
relevance, using HCI models in certain Internet of Things (IoT) tasks, generating
personalized recommendations for certain users in the browser, and also using few
facets of HCI in the development of smart set-top box TV recommendation systems
have enabled the development of smart AI-based systems [12,18–22,26,27].
While there has been a substantial work at the crossroads of AI and HCI, it is still
not extensive enough to be able to use HCI and AI in scenarios wherein it becomes
difficult to have experts from both fields working together such as cyber-physical
systems [24,28–30]. Thus, it is important that the stakeholders from respective fields
are shown what, when, why, and how they can contribute, what the major roles of
each discipline and its experts are and how can AI be used as a catalyst for develop-
ing HCI systems and vice versa [26,27]. In the context of this paper, we try to gather
insights from the previous works in the aforementioned and present our research that
shall help develop this exciting field of knowledge.
When it comes to HCI in Industry 4.0, we need to understand the prior work in
the context of a plethora of subfields, viz. human–machine interaction (HMI), vir-
tual, augmented, and MR applications in the context of cyber-physical systems, and
surveys which have been conducted keeping HCI and HMI under the purview on
Industry 4.0 as a research topic [31,32]. A large number of surveys covering peculiar
aspects of HMI or human factors in Industry 4.0 has been identified in the endeavor
of collecting relevant literature for this paper. The vast majority of these studies are
specifically oriented toward either VR or augmented reality (AR) applications, or
both, within Industry 4.0 operations and, thus, cover only a subset of this paper’s
scope [33,34]. Büttner et al. [35] conduct a survey on AR and VR applications in
Industry 4.0 manufacturing activities, more precisely on the available platform
40 Intelligent Analytics for Industry 4.0 Applications
technologies and application areas, creating a small-scale design space for such MR
applications in manufacturing. This design space differentiates among four general
application scenarios and four types of MR technology platforms available for appli-
cation, respectively.
The application scenarios are manufacturing, logistics, maintenance, or training
while the available platforms comprise mobile devices (AR), projection (AR), and
head-mounted displays (HMDs) (AR or VR). Dini and Dalle Mura [36] present sur-
veys on AR applications, however not restricted to Industry 4.0-related application
scenarios. They investigated general commercial AR applications including indus-
trial scenarios also, among others, civil engineering. The specific AR application sce-
narios which they examine based on related scientific literature are maintenance and
repairing, inspection and diagnostics, training, safety, and machine setup. Nahavandi
[8], in turn, examine scientific research on AR applications for assembly purposes
from a time span of 26 years starting as early as 1990 and concentrating mainly on
the period from 2005 until 2015. Thus, they extend the scope to many years before
the advent of Industry 4.0-related initiatives and ideas. The major application pur-
poses of AR in assembly tasks that they investigate are assembly guidance, assembly
design and planning, and assembly training [37,38].
Choi et al. [39] provide a literature review on AR applications with an even less
specific focus on industrial deployment by examining the state of the art at the time
in research on collaboration in AR considering a wide range of possible application
fields, the industrial sector being only one of those. As a result, they identify remain-
ing research challenges relating to collaboration in AR which are the identification of
suitable application scenarios and interaction paradigms as well as an enhancement
of the perceived presence and situational awareness of remote users.
Palmarini et al. [40], in turn, conduct a structured literature review on different
software development platforms and types of data visualization and hardware avail-
able for AR applications in various maintenance scenarios The aim and purpose of
their study is to derive a generic guideline facilitating a firm’s selection process of
the appropriate type and design of AR application, tailored to the specific type of
maintenance activity at hand which the firm is planning to enhance utilizing AR
technology. Lastly, Choi et al. [39] provide surveys on VR technology in an industrial
environment, the latter group of authors concentrating on a potential combination
of VR technology with discrete event simulation for scenario testing in Industry 4.0
activities. Hermann et al. [41] on the other hand, present a survey on VR applications
in manufacturing, concentrating on potential contributions of VR deployment in the
development process for new products and deriving a mapping of different types
of VR technology toward the different steps of the product development process.
Therefore, Dini and Mura [36] consider the applicability of various VR technologies
for the phases of concept development, system-level design, design of details, test-
ing and refinement, and launch of production. Besides those surveys on AR and VR
applications, a literature review by Hecklau et al. [42] exists on the major challenges
as well as skills and competencies needed for future employees under an Industry
4.0 scenario. The authors utilize the insights from the literature analysis to struc-
ture the required skills according to different categories, based on which a com-
petence model is created analyzing employees’ levels of skills and competencies,
Human-Centered Approach to Intelligent Analytics in Industry 4.0 41
and the output generated by the user can be a vital factor in deciding the end goal
of an efficient cyber-physical system. Thus, we pose the following important three
aspects and five questions and try to answer them with our study on the principles of
HCI under the context of intelligent analytics for Industry 4.0:
Gamificaon
Synergy in
Head Mounted
Systems of Sub-
Displays
Systems
Human-Machine
Explainable AI
Failure
Dashboards
Intervenon
User Feedback
Network
separated from the main hub, to accommodate the passage and relay of c ommands
and messages in a brisk and seamless manner. Whenever a certain subsystem
malfunctions, there should be immediate relaying of the same to the interconnected
nodes with a modality to quickly intimate the nearest operator, wherein the other
systems should come to a stop and avoid dire consequences such as fire and loss of
property. Having these six components in an industrial HCI system would enable
that there are low downtimes for machinery and would establish a cohesive synergy
between humans and machines, through an actionable intuitive mechanism.
FIGURE 3.3 Industry 4.0–HCI confluence framework for fostering intelligent analytics.
from the traditional HCI design process to fit the characteristics and operational
mechanism of the Industry 4.0. Our recommendation is to personalize the process
of gathering and understanding requirements, designing solutions based on require-
ments, testing, and evaluating, in the context of Industry 4.0. The below personal-
ization will cater to the efficient growth of Industry 4.0, all the while maintaining a
strong relationship and codependency between humans and machines. To do this we
suggest involving domain experts and stakeholders in the user requirement part of
the cycle. This will enable the stakeholder groups to minutely specify requirements
at the outset, thereby honing the process.
Thereafter, using Explainable Artificial Intelligence (XAI)-based modeling using
SHapley Additive exPlanations (SHAP) and Local Interpretable Model-Agnostic
Explanations (LIME) model-agnostic frameworks shall help eliminate the black box
nature of AI-based solutions and help in bringing fairness and accountability to the
process. In the next step, we believe that it is important to not only evaluate the
solutions with initial user requirements but also perform usability testing involving
stakeholder requirements. This shall help in developing a synergy between users and
stakeholders, which shall benefit in the long run by removing the actual constraints
faced by users and alleviating them by involving the knowledge of stakeholders.
In the last leg of the Industry 4.0–HCI design process cycle, it is important to incor-
porate user feedback and not only explain them the mechanisms of how the system
works but also why it arrived at a certain decision. If there is a large gap between
the user-expected output, the stakeholder-predicted output, and the actual output,
it is important to reiterate the process by removing critical bottlenecks. This can
48 Intelligent Analytics for Industry 4.0 Applications
range from increasing the data set size by conducting more expansive user surveys
and user behavior studies, or it can involve changing the train–validate–test dataset
sample sizes and percentages, to counter for overfitting, especially when deep learn-
ing models are involved, which are inherently more black boxed in nature. Thus,
there needs to be a consensus between AI and HCI practitioners on when to draw
and derive from their respective fields and when to pause and introspect. The itera-
tive nature of both HCI design processes and AI–ML models make it easier to duly
bifurcate and then combine certain tasks with each another. Using the Industry 4.0–
HCI confluence framework along with the modifications in the HCI user-centered
design process, can help in making the merger of AI and HCI systems transparent,
seamless, and cohesive. Thus, after developing the above framework and recom-
mendations for tweaking the user-centered HCI design process, we believe that we
can answer the questions posed above. For the sake of reading convenience, we have
included the questions before the respective answers using bullet points. They are as
follows:
Users can work in tandem with AI in the initial design and evaluation
phase of the Industry 4.0–HCI confluence and possibly cannot work in
certain situations where there is a considerable gap between the respective
operational capacities.
• How much, is too much, when it comes to the Industry 4.0–HCI confluence?
AI and HCI systems need to be regularized, made transparent, and
trusted with sensitive data that should be kept safe and away from potential
attacks. They should also work in tandem with, and for humans, by not
overpowering them (Figure 3.4).
In the five-step process represented above, the first and crucial step of designing
and setting up Industry 4.0 is to study and analyze the industrial manpower. This
is important to keep their experience and concerns in mind while designing intel-
ligent systems and their interfaces around them. The next step involves stating
the user requirements analyzed from the qualitative and quantitative study of the
concerned manpower and involving every stakeholder to ensure full acceptance of
user requirements. Although the above representation only lists stakeholder buy in
FIGURE 3.4 Intelligent analytical HCI design process for Industry 4.0.
50 Intelligent Analytics for Industry 4.0 Applications
the second stage, it is a practice that should be carried out at each stage. Once the
requirements are zeroed upon, prototyping with respect to the complexity of Industry
4.0 machinery and ease of use for manpower should be done. From an Industry 4.0
perspective, it becomes important to make use of a good information architecture
and easy-to-use interfaces to operate complex machines. Usability testing on such
prototypes reveals inconsistencies and confusion with respect to the usage of inter-
faces, on the realization of which, iterations of the prototypes are constructed, and
the process is repeated until a good HCI interface is made.
REFERENCES
1. C. Krupitzer et al. A Survey on Human Machine Interaction in Industry 4.0, Vol. 1,
No. 1, Article. Association for Computing Machinery (ACM), February 2020. https://
doi.org/10.1145/1122445.1122456
2. I. Islam, K. M. Munim, M. N. Islam, and M. M. Karim. “A proposed secure mobile
money transfer system for SME in Bangladesh: An industry 4.0 perspective,” in 2019
International Conference on Sustainable Technologies for Industry 4.0 (STI). IEEE,
2019.
3. J. Lee, B. Bagheri, and H.-A. Kao. “A cyber-physical systems architecture for industry
4.0-based manufacturing systems,” Manufacturing Letters, vol. 3, pp. 18–23, 2015.
4. H. Gruber. Innovation, Skills and Investment: A Digital Industrial Policy for Europe,
Economia e Politica Industriale. Springer, 2017, pp. 1–17.
5. C. J. Bartodziej. The Concept Industry 4+.0: An Empirical Analysis of Technologies
and Applications in Production Logistics. Springer, 2017.
6. J. A. Saucedo-Martínez, et al. “Industry 4.0 framework for management and opera-
tions: A review,” Journal of Ambient Intelligence and Humanized Computing, vol. 6,
pp. 1–13, 2017.
7. F. Ansari, S. Erol, and W. Sihn. Rethinking Human-Machine Learning in Industry 4.0:
How Does the Paradigm Shift Treat the Role of Human Learning? Science Direct,
2018.
8. S. Nahavandi. “Trusted autonomy between humans and robots: Toward human- on-
the-loop in robotics and autonomous systems,” IEEE Systems, Man, and Cybernetics
Magazine, vol. 3(1), pp. 10–17, 2017.
9. D. Bauer, S. Schumacher, A. Gust, J. Seidelmann, and T. Bauernhansl. “Characterization
of autonomous production by a stage model,” Procedia CIRP, vol. 81, pp. 192–197,
2019.
10. F. J. Campbell. Human factors: The impact on industry and the environment. In E. R.
Rhodes, and H. Naser (Eds.), Natural Resources Management and Biological Sciences
(pp. 1–14). IntechOpen, 2021.
11. T. Zhang, Q. Li, C. Zhang, H. Liang, P. Li, T. Wang, S. Li, Y. Zhu, and C. Wu. “Current
trends in the development of intelligent unmanned autonomous systems,” Frontiers of
Information Technology & Electronic Engineering, vol. 18, no. 1, pp. 68–85, 2017.
12. E. Fosch-Villaronga, C. Lutz, and A. Tamò-Larrieux. “Gathering expert opinions for
social robots’ ethical, legal, and societal concerns: Findings from four international
workshops,” International Journal of Social Robotics, vol. 12, no. 2, pp. 441–458,
2020.
13. M. Gil, M. Albert, J. Fons, and V. Pelechano. “Designing human-in-the-loop autono-
mous cyber-physical systems,” International Journal of Human-Computer Studies, vol.
130, pp. 21–39, 2019.
14. F. Santoni de Sio and J. van den Hoven. “Meaningful human control over autonomous
systems: A philosophical account,” Frontiers in Robotics and AI, vol. 5, pp. 15, 2018.
15. G. Weichhart, A. Ferscha, B. Mutlu, M. Brillinger, K. Diwold, S. Lindstaedt, T. Schreck,
and C. Mayr-Dorn. “Human/machine/roboter: Technologies for cognitive processes.”
Elektrotechnik Und Informationstechnik, vol. 136, no. 7, pp. 313–317, 2019.
16. A. M. Isen. “An influence of positive affect on decision making in complex situations:
Theoretical issues with practical implications,” Journal of Consumer Psychology,
vol. 11, no. 2, pp. 75–85, 2001.
17. M. N. Islam, S. J. Oishwee, S. Z. Mayem, A. N. Mokarrom, M. A. Razzak, and
A. H. Kabir, “Developing a multi-channel military application using interactive dia-
logue model (IDM),” in 2017 3rd International Conference on Electrical Information
and Communication Technology (EICT). IEEE, 2017, pp. 1–6.
52 Intelligent Analytics for Industry 4.0 Applications
18. T. Zaki, Z. Sultana, S. A. Rahman, and M. N. Islam, “Exploring and comparing the
performance of design methods used for information intensive websites,” MIST
International Journal of Science and Technology, vol. 8, pp. 49–60, 2020.
19. H. Thimbleby and I. H. Witten. “User modeling as machine identification: New design
methods for HCI.” In H. R. Hartson et al. (Eds.) Advances in Human-Computer
Interaction. Ablex (vol. 4, pp. 58–86), 1991.
20. A. Beard-Gunter, G. Ellis, C. Dando, and P. Found, Designing industrial user
experiences for industry 4.0. 2018.
21. M. A. Razzak and M. N. Islam. “Exploring and evaluating the usability factors for
military application: A road map for HCI in military applications,” Human Factors and
Mechanical Engineering for Defense and Safety, vol. 4, no. 1, p. 4, 2020.
22. J. Nielsen. Usability Engineering. Elsevier, 1994.
23. S. Deterding, R. Khaled, L. E. Nacke, and D. Dixon. “Gamification: Toward a
Definition,” in CHI 2011 Gamification Workshop Proceedings, vol. 12. Vancouver, BC,
Canada, 2011.
24. B. Shneiderman, C. Plaisant, M.S. Cohen, S. Jacobs, N. Elmqvist, and N. Diakopoulos.
Designing the User Interface: Strategies for Effective Human-Computer Interaction.
Pearson, 2016.
25. S. Uzor, J.T. Jacques, J.J. Dudley, and P.O. Kristensson. “Investigating the accessibility
of crowdwork tasks on mechanical turk,” in Proceedings of the 2021 CHI Conference
on Human Factors in Computing 2021, https://doi.org/10.1145/3411764.3445291
26. Sebastian Büttner, Henrik Mucha, Markus Funk, Thomas Kosch, Mario Aehnelt,
Sebastian Robert, and Carsten Röcker. “The design space of augmented and virtual
reality applications for assistive environments in manufacturing: A visual approach,”
ResearchGate Conference Paper, June 2017.
27. Markus Funk, Albrecht Schmidt, Tilman Dingler, and Jennifer Cooper. “Stop Helping
Me - I’m Bored! Why Assembly Assistance needs to be Adaptive,” ResearchGate,
September 2015.
28. D. Gorecky, M. Schmitt, M. Loskyll, and D. Zuhlke, “Human-Machine- ¨ Interaction
in the Industry 4.0 era,” in 2014 12th IEEE International Conference on Industrial
Informatics (INDIN). 2014, pp. 289–294.
29. E. Aranburu, G. S. Mondragon, G. Lasa, J. K. Gerrikagoitia, I. S. Coop, and G. S.
Elgoibar. “Evaluating the human machine interface experience in industrial work-
places,” in Proceedings of the 32nd International BCS Human Computer Interaction
Conference. BCS Learning & Development Ltd., 2018, p. 93.
30. Peter Papcun, Erik Kajáti, and Jií Koziorek. Human Machine Interface in Concept of
Industry 4.0. IEEE, October 2018.
31. R. Tulloch. Reconceptualising gamification: Play and pedagogy. Online.Available:
http://www.digitalcultureandeducation.com/cms/wpcontent/uploads/2014/12/tulloch.
pdf.
32. T. Schmidt, I. Schmidt, and P. R. Schmidt. “Digitales Spielen und Lernen – A Perfect
Match?: Pädagogische Betrachtungen vom kindlichen Spiel zum digitalen Lernspiel,”
In K. Dadaczynski, S. Schiemann, and P. Paulus, (Eds.) Gesundheit spielend fördern:
Potenziale und Herausforderungen von digitalen Spieleanwendungen für die
Gesundheitsförderung und Prävention, 2016, pp. 18–49.
33. Jacqueline Schuldt, and Susanne Friedemann. “The challenges of gamification in the
age of Industry 4.0.” in IEEE Global Engineering Education Conference, April 2017.
34. T. Schmidt. MALL meets Gamification: Möglichkeiten und Grenzen neuer (digitaler)
Zugänge zum Fremdsprachenlernen. http://www.uni- potsdam.de/fileadmin01/projects/
tefl/
35. Sebastian Büttner, Henrik Mucha, Markus Funk, Thomas Kosch, Mario Aehnelt,
Sebastian Robert, and Carsten Röcker. “The design space of augmented and virtual
reality applications for assistive environments in manufacturing: A visual approach,” in
Human-Centered Approach to Intelligent Analytics in Industry 4.0 53
CONTENTS
4.1 Introduction...................................................................................................... 55
4.2 Overview of Industry 4.0................................................................................. 58
4.3 Opportunities of Industry 4.0........................................................................... 59
4.4 Challenges in Industrial Robotics 4.0..............................................................60
4.5 Properties of Robotics Industry 4.0................................................................. 61
4.6 Conclusion....................................................................................................... 62
References................................................................................................................. 63
4.1 INTRODUCTION
Due to the advent and prominence of Industry 4.0, robotic technology, which provided
an essential contribution to modern industry, has undergone significant development
in recent years. In the era of Industry 4.0 and the Industrial Internet of Things (IIoT),
it is anticipated that the next age of robotics and its related technologies will play a
major role in meeting the flexible needs of cooperative and smarter production [1].
Industrial robots are embedded with artificial intelligence (AI), which are capable
of replacing the human workers in the manufacturing industries. Human labor is
ineffective in factories for a variety of reasons, including physical limitations that
affect the production performance, manufacturing costs, etc. In the current competi-
tive business, firms have turned away from using human labor and toward industrial
robots in order to accomplish more accurate production in shorter amounts of time
without even any risks [2].
However, for effective and reliable manufacturing, human and robot collaboration
is necessary. Industrial robots are necessary for companies in the modern, tough
marketplace not just for safety reasons to prevent worker injuries while production as
well as for the most need faster, more precise manufacturing when taking financial
prosperity into account. Real-time result and effectiveness predictability in manufac-
turing do not aid in the unsupervised management and optimization of the subsystem
cost and duration. The phrase “Industry 4.0” refers to a new industrialization that is
DOI: 10.1201/9781003321149-4 55
56 Intelligent Analytics for Industry 4.0 Applications
built on smart technology and intends to integrate data science into the manufacturing
and production processes to create smart factories. The robots can also indepen-
dently spot a decline in product performance and apply optimization to fix it [3].
Industrial robots are created extremely effectively and cooperatively with people
and other robots through networking in the Industrial revolution 4.0, enabling them
to be self-adaptable and self-aware on new goods and production techniques. As
a result, smart factories with many of these robots will be provided in the future
of industry thanks to recent technologies utilizing IoT, such as for controlling and
wirelessly monitoring on robots, cloud platforms analyzing big data has enhanced
information insights. The robots may also detect product performance degradation
on their own and apply modifications to fix it [1].
About 373,000 industrial robots had been based on these factors in 2019, accord-
ing to the International Federation of Robotics (IRF). Globally, there were 2.7 million
industrial robots in use in factories in 2020. The effective use of industrial robots,
their dependability and affordability, and the effective adoption of the Industry 4.0
concept have sparked an increase in interest in robot enhancement and the investiga-
tion of latest advancements in a variety of fields, especially in typical and nontypi-
cal application domains. Using the term “Industrial robot” as a keyword, more than
4,500 scientific papers had been published in 2019, and 5,300 papers with a similar
interest and study focus had been published in 2020, according to Science Direct,
one of the largest research journals. Regardless of the legislative, socioeconomic, and
sociological forces influencing the market for new robots, scientific interest in this
topic is based on a continual increase in publications [4].
This scholarly research is primarily concerned with the industrial robot appli-
cations in 2018–2021 in industries, where there has historically been little support
for robotization. It also covers core topics including feature extraction, route plan-
ning, and optimizations, as well as human contact. Although the field of regular
automation and general societal widespread usage of smart gadgets, semi uses of
58 Intelligent Analytics for Industry 4.0 Applications
robotics are still frequently viewed with significant suspicion. The most pervasive
misconception regarding robots is that they will take over human jobs, depriving
human employees without the need for a means of support [5].
Figure 4.1 indicates the yearly ratio of implemented robot publications in
industries. Here, the number of installations of industrial robots is increasing year by
year. The idea was first introduced in 2012, and still, this process is going on with the
addition of new features and with new technologies.
However, the research presented in, which evaluated the huge backlash about
robots replacing humans in Japan’s fabric and electronics industries, disproved this
notion. Based on an analysis of the number of robots used and the actual cost of
implementation, it was found that the employment of robots increases productivity,
which benefits the much more vulnerable individuals in society, including women,
part-time or full-time workers, college grads, and elderly people. Every robotization
task is distinctive in some manner. In order to increase the functionality or enhance
the qualities of standard automatons, these tasks frequently call for the use of specific
tools, the development of an appropriate working environment, the addition of new
sensors or measurement systems, and the application of sophisticated control algo-
rithms. Industrial robots typically work in larger groups called robotic units or inde-
pendent production lines. As a consequence, especially seemingly simple tasks that
are robotized require a complicated response and a structured method. Figure 4.2
depicts the market of industrial robots.
forces behind the expanded use of industrial robots. Despite the fact that robots pri-
marily intended to do repetitive tasks, technologies create robots extremely adapt-
able as well as enable them to come up with clever responsive alternatives. Internal
structures of robots have improved as a result of the development of robot control
systems. These improvements frequently involve the use of new computational mod-
els enabling the control of robots [7].
while maintaining flexibility and productivity. People and robots will be able to
work more closely together while maintaining flexibility and productivity, says
Microsoft’s artificial intelligence boss, Satya Nadella in an interview with BBC
World News.
A new type of cobot is also forming. Chatbots are computer programs that are
designed to assist knowledge workers by gathering data from backend systems, such
as current inventory levels or shipment arrival times. They will work with a range of
interfaces, including the web, smartphone apps, and augmented reality glasses.
(a) Cell (b) Coexistence (c) Synchronised (d) Co-operation (e) Synergy
between humans and robots, this capability also prevents robots from doing
their duties autonomously.
iii. Technologies for Such IIoT and Wireless Transmission Potential
The most notable technology in today’s industrial generation is arguably
the IoT. IoT investment is anticipated to reach its peak in 2023 at $450 bil-
lion [14]. In 2017, ABB Robotics debuted its own “ability” technology. Such
technologies were created to achieve huge manufacturing with something
like a high level of real-time customization adaptability [15].
Further researches revealed how cloud computing and robots may work
together for commercial applications and how robots improved performance
that encourages the implementation of industry 4.0.
iv. Fundamental Robotization Techniques
In industrial robotics, there are five standard degrees of human–robot
interaction, including (i) no collaboration, (ii) coexistence, (iii) synchroni-
zation, (iv) cooperation, and (v) collaboration.
The basic level of collaboration is covered by the classical strategy as shown in Figure
4.3. It is based on the strategies that robots use to keep people out of their workspace,
such as creating sealed robotic compartments where human activity is forbidden; if
a person was to enter the robotic work area, the robot would need to be halted. The
above method denotes the employment of multiple security measures to identify and
prohibit human access to the robotic work area. The final four collaboration degrees
make up the modern strategy. This is mostly based on an alternative viewpoint that
contends that humans and robots may coexist and operate together in the same work-
place. Such strategies generate new requirements for the architecture, management,
and detection systems of robots. Machines and robots are often known as cobots,
which are designed to operate alongside the human workforce [16].
4.6 CONCLUSION
To help companies fulfill expanding customer demand and maintain their com-
petitiveness in the global market, industrial manufacturing is continually changing.
Advance in Robotics Industry 4.0 63
REFERENCES
1. L. S. Dalenogare, G. B. Benitez, N. F. Ayala, and A. G. Frank, “The expected contribu-
tion of Industry 4.0 technologies for industrial performance,” Int. J. Prod. Econ., vol.
204, pp. 383–394, 2018.
2. G. Adamson, L. Wang, and P. Moore, “Feature-based control and information frame-
work for adaptive and distributed manufacturing in cyber physical systems,” J. Manuf.
Syst., vol. 43, pp. 305–315, 2017.
3. R. Dekle, “Robots and industrial labor: Evidence from Japan,” J. Jpn. Int. Econ., vol.
58, p. 101108, 2020.
4. K. Aggarwal, S. K. Singh, M. Chopra, S. Kumar, and F. Colace, “Deep learning in
robotics for strengthening Industry 4.0.: Opportunities, challenges and future direc-
tions,” in N. Nedjah, A. A. Abd El-Latif, B. B. Gupta, and L. M. Mourelle (eds) Robotics
and AI for Cybersecurity and Critical Infrastructure in Smart Cities, Springer Cham,
2022, pp. 1–19.
5. E. Erős, M. Dahl, A. Hanna, P.-L. Götvall, P. Falkman, and K. Bengtsson, “Development
of an industry 4.0 demonstrator using sequence planner and ROS2,” in Anis Koubaa
(ed) Robot Operating System (ROS), Springer, 2021, pp. 3–29.
6. B. Kehoe, S. Patil, P. Abbeel, and K. Goldberg, “A survey of research on cloud robotics
and automation,” IEEE Trans. Autom. Sci. Eng., vol. 12, no. 2, pp. 398–409, 2015.
7. I. Zambon, M. Cecchini, G. Egidi, M. G. Saporito, and A. Colantoni, “Revolution 4.0:
Industry vs. agriculture in a future development for SMEs,” Processes, vol. 7, no. 1,
p. 36, 2019.
8. A. Olivares-Alarcos, S. Foix, and G. Alenya, “On inferring intentions in shared tasks
for industrial collaborative robots,” Electronics, vol. 8, no. 11, p. 1306, 2019.
9. A. M. Ghouri, V. Mani, Z. Jiao, V. G. Venkatesh, Y. Shi, and S. S. Kamble, “An
empirical study of real-time information-receiving using industry 4.0 technologies in
downstream operations,” Technol. Forecast. Soc. Change, vol. 165, p. 120551, 2021.
10. T. Brogårdh, “Present and future robot control development—An industrial perspec-
tive,” Annu. Rev. Control, vol. 31, no. 1, pp. 69–79, 2007.
11. V. Villani, F. Pini, F. Leali, and C. Secchi, “Survey on human–robot collaboration in
industrial settings: Safety, intuitive interfaces and applications,” Mechatronics, vol. 55,
pp. 248–266, 2018.
64 Intelligent Analytics for Industry 4.0 Applications
CONTENTS
5.1 Introduction..................................................................................................... 65
5.2 Related Works..................................................................................................66
5.3 Preliminary Work............................................................................................ 67
5.4 Methodology.................................................................................................... 67
5.4.1 Data Acquisition.................................................................................. 68
5.4.2 Data Preprocessing.............................................................................. 68
5.4.3 ML Models.......................................................................................... 70
5.5 Performance Analysis...................................................................................... 70
5.6 Application...................................................................................................... 71
5.7 Conclusion....................................................................................................... 71
References................................................................................................................. 71
5.1 INTRODUCTION
Quality healthcare is a need of this century. Chronic diseases such as heart dis-
ease, cancer, and diabetes have risen dramatically due to economic, environmental,
and social development and lifestyle changes. Quality in health care is essential and
refers to ensuring that the patient receives the proper care at the right time. Delays
in monitoring a patient might lead to adverse effects and can even be fatal some-
times. An inefficient healthcare system adds up to poor safety, poor care coordina-
tion, and inefficiencies, costing millions of lives. The healthcare system in India is
not well regulated. Rural areas suffer the most from unattended health checkups.
According to a report published by Novartis, Arogya Parivar: Health for the Poor,
about 72% of the elderly population live in villages [1]. This is often an alarming
number considering that the population of rural areas does not seem to be attended
to too well by health officials. Therefore, it is important to encourage reforms that
result in health systems that are more resilient, better centered on the needs of people,
and sustainable over time. Thus, the idea is to implement systems that make it easier
DOI: 10.1201/9781003321149-5 65
66 Intelligent Analytics for Industry 4.0 Applications
for doctors to understand the areas of abnormality and attend to the sick in their
homes. If the health condition passes a specific threshold, and with the assistance of
machine learning (ML) analysis, it becomes easier to investigate the world as a whole
and deploy any resources if necessary. We use artificial intelligence (AI) due to its
significant impact on recognizing and predicting patient health status based on physi-
ological indications. These readings can be acquired using a variety of biological
signal-measuring instruments. We introduced a brand-new cloud-based, real-time
health monitoring system in this chapter that makes use of Internet of Things (IoT)
and AI. The proposed system can analyze real-time biological data and predict the
health condition of the user. The proposed system also recommends possible treat-
ments for the users.
The rest of the chapter is arranged as follows: Section 5.2 discusses the state-of-
the-art approaches for real-time health monitoring, while in Section 5.3, machine
learning classifiers have been discussed. The proposed model has been discussed
in Section 5.4, and Section 5.5 assesses the efficiency of the proposed method. In
Section 5.5, the application areas of the proposed model have been discussed, and
Section 5.7 concludes the chapter.
5.4 METHODOLOGY
This chapter introduces a novel real-time health monitoring system using IoT and
various ML approaches. The flow of the proposed approach has been presented in
Figure 5.1. The proposed IoT-based remote monitoring combines the capabilities of
IoT and ML to predict areas that are more susceptible to any rise in diseases. The
proposed ML model is first trained with ground truth and then it can be used for ana-
lyzing the real-time data. The real-time data are collected by biological sensors and
68 Intelligent Analytics for Industry 4.0 Applications
hosted on the cloud to keep track of the records of patients, which in turn improves
the model. Moreover, a notification system has also been implemented, which will
trigger an alert in critical conditions to medical professionals and caretakers of the
patient.
Further, the overall architecture that shows the tools used for developing the com-
plete arrangement is depicted in Figure 5.2. The overall architecture is based on
healthcare IoT, which administers the physiological factors via the vital signs affect-
ing a patient’s health. All the sensors are interfaced with the Raspberry Pi, which is
a microprocessor. The developed hardware enables the system to collect and transfer
vital sign data to cloud storage. The vital signs to be measured with this design are
heart rate, blood pressure, oxygen saturation (SpO2), and body temperature. These
sensed parameters are sent to the edge computing device (Raspberry Pi). Besides, the
detailed description of each phase to monitor the health condition of elderly people
has been discussed in the following section.
First, the data acquisition phase is used to collect real-time data of the target user
using a biological sensor, and then collected data are preprocessed to make it ready
for the analysis. After that, ML models are used to detect any abnormality in real
time and possible treatments are also recommended.
5.4.1 Data Acquisition
The first step is to create a dataset that will hold the training data for the model. Here,
we have used a cardiovascular disease dataset from Kaggle, which includes param-
eters such as age, height, weight, gender, systolic blood pressure, diastolic blood pres-
sure, cholesterol, glucose, smoking, alcohol intake, and physical activity to predict
the presence or absence of cardiovascular disease.
5.4.2 Data Preprocessing
The collected data are cleaned and prepared for model training. If any parameters
contain null values or outliers, those values are dropped from the dataset. Highly
Cloud-Based Real-Time Healthcare Monitoring System 69
correlated features are used to create new features, like weight and height are used
to create BMI. All features are quantized into bins and further encoded using label
encoding techniques. As gender has an enormous impact on the presence of car-
diovascular disease, the dataset is divided into two, and then clustering analysis
(KModes clustering) is performed. The predicted clusters are added as features to
the new combined dataset on which feature selection is performed. The prepared
dataset is divided into three parts for training, validating, and testing.
70 Intelligent Analytics for Industry 4.0 Applications
5.4.3 ML Models
A modified ensemble learning bagging approach is used where a total of four differ-
ent models, namely, Gaussian Naive Bayes, decision tree, random forest, and logistic
regression, run in parallel to predict the class simultaneously. The most suitable class
is selected using a voting classifier. The model allows us to take advantage of all four
classifiers and prevents the system from overfitting.
TABLE 5.1
Performance Metrics
Measure Value
Sensitivity 0.9222
Specificity 0.93
Precision 0.83
Negative predictive value 0.0778
False positive rate 0.07
False discovery rate 0.1545
False negative rate 0.88
F1 score 0.8857
Matthews correlation coefficient 0.7638
5.6 APPLICATION
Early diagnosis of chronic diseases is one of the applications of health monitoring
utilizing machine learning, which can help physicians, nurses, patients, and other
caregivers make better decisions. Similar to how doctors use this system, regular
people can use it to evaluate whether they have serious health issues and, if so, seek
care at nearby hospitals. The suggested IoT-based intelligent health monitoring sys-
tem is beneficial, particularly for people living alone or elderly patients who require
regular monitoring.
5.7 CONCLUSION
This chapter proposes a method to prevent the disease with early intervention rather
than treatment after diagnosis. It is possible to anticipate diseases more accurately
using the proposed system. This proposed system will help medical professionals
decide more wisely, spot trends and developments, and boost the effectiveness of
studies and clinical trials. It enhances the way healthcare services are delivered,
reduces expenses, and handles patient data with extreme precision.
REFERENCES
1. Novartis, “Arogya Parivar-Improving access to healthcare.” https://www.novartis.com/
in-en/about/arogya-parivar (Accessed on May 5, 2022).
2. Li, J., Y. Meng, L. Ma, S. Du, H. Zhu, Q. Pei, and X. Shen. “A federated learning
based privacy-preserving smart healthcare system.” IEEE Transactions on Industrial
Informatics 18, 2021, 2022.
3. Bhanuteja, G., Kaustubh Anand Kandi, K. Srinidhi, R. Dikshitha, and Anil Kumar.
“CAMISA: An AI solution for COVID-19.” In 2021 International Conference on
Design Innovations for 3Cs Compute Communicate Control (ICDI3C), pp. 216–222.
IEEE, 2021.
72 Intelligent Analytics for Industry 4.0 Applications
4. Ahmad, Muhammad, Saima Sadiq, Ala Saleh Alluhaidan, Muhammad Umer, Saleem
Ullah, and Michele Nappi. “Industry 4.0 technologies and their applications in fight-
ing COVID-19 pandemic using deep learning techniques.” Computers in Biology and
Medicine 145, 105418, 2022.
5. Palwe, Sushila, and Sumedha Sirsikar. “Industry 4.0 Technologies and Their
Applications in Fighting COVID-19.” In Sustainability Measures for COVID-19
Pandemic, pp. 237–251. Springer, Singapore, 2021.
6. Habib, Al-Zadid Sultan Bin, and Tanpia Tasnim. “An ensemble hard voting model for
cardiovascular disease prediction.” In 2020 2nd International Conference on Sustainable
Technologies for Industry 4.0 (STI), pp. 1–6. IEEE, 2020.
7. Chern, Ching-Chin, Weng-U. Lei, Kwei-Long Huang, and Shu-Yi Chen. “A decision
tree classifier for credit assessment problems in big data environments.” Information
Systems and e-Business Management 19, 363–386, 2021.
8. Belgiu, Mariana, and Lucian Drăguţ. “Random forest in remote sensing: A review of
applications and future directions.” ISPRS Journal of Photogrammetry and Remote
Sensing 114, 24–31, 2016.
9. Menard, Scott. Applied Logistic Regression Analysis. No. 106. SAGE, New York, 2002.
10. Ontivero-Ortega, Marlis, Agustin Lage-Castellanos, Giancarlo Valente, Rainer Goebel,
and Mitchell Valdes-Sosa. “Fast Gaussian Naïve Bayes for searchlight classification
analysis.” Neuroimage 163, 471–479, 2017.
11. Dong, Xibin, Zhiwen Yu, Wenming Cao, Yifan Shi, and Qianli Ma. “A survey on
ensemble learning.” Frontiers of Computer Science 14, 241–258, 2020.
12. Breiman, Leo. “Bagging predictors.” Machine Learning 24 (2), 123–140, 1996.
6 Assessment of Fuzzy
Logic Assessed
Recommender System
A Critical Critique
S. Gopal Krishna Patro
GIET University
Koneru Lakshmaiah Education Foundation
CONTENTS
6.1 Introduction..................................................................................................... 73
6.2 Recommendation System Approaches............................................................ 74
6.2.1 Collaborative Filtering Method........................................................... 75
6.2.1.1 Cold-Start Problem............................................................... 75
6.2.2 Content-Based Methods....................................................................... 77
6.3 Various Recommendation System Based on E-Commerce............................ 79
6.3.1 Personalized Recommendation System of E-Commerce Based
on Big Data Analysis�������������������������������������������������������������������������� 79
6.3.2 Hybrid Ontology-Dependent RS for E-Commerce.............................80
6.3.3 Trust-Dependent CF Algorithm for E-Commerce RS.........................80
6.3.4 Enhanced Slope One Algorithm.......................................................... 81
6.3.5 Similarity Measures............................................................................. 81
6.4 Conclusions...................................................................................................... 82
References................................................................................................................. 82
6.1 INTRODUCTION
Recommendation systems are referred as information filtering which exhibits the
social elements such as users or groups and the products such as movies, music,
books based on the user interest [1]. It is otherwise stated as based on the user’s
recent behavior such as watching a movie, purchasing a book, or listening to music,
DOI: 10.1201/9781003321149-6 73
74 Intelligent Analytics for Industry 4.0 Applications
each item or each user had some ratings so that similar user ratings are derived even
if the ratings are unavailable. It happens when the system does not know the data
about new user with respect to new items [12].
Figure 6.3, represents the CSP, and it happens when new user enters the system
without preference data for that user. In this figure, rows represent the customers or
users and columns represents the products. It had new user problem and new item
problem. CF provides the solution for this CSP [13]. It predicts the ratings to tar-
get user. CF extracts the patterns of similarities and relationships among users and
utilized learn predictive model to generate recommendations. Some predictions are
Assessment of Fuzzy Logic Assessed Recommender System 77
calculated for pair of user items and for every unknown rating by using rating matrix.
The collaborating system filters the items based on highly predicted ratings and it
recommends to user. The CSP is also called as new user problem. The data sparsity
is considered to rectify the issues of cold start. The deep learning and CF are used
for CSP [14]. CF is suffered from “CSP” as for recommendations, it considers past
interactions. To the new users, any kind of recommendation is impossible or to any
user recommending a new item and few interactions corresponding to users or items
to be handled efficiently. This limitation is handled by random strategy – random
items recommendation to new users or to random users with new items, maximum
expectation strategy – recommending the most popular items to new users or to most
active users with new items, exploration strategy – to new users recommending a set
of different items or to set of different users with new item. For the early user life or
the item, the noncollaborative method is used.
TABLE 6.1
Comparative Analysis of Existing Recommendation Studies
Reference Technique Description Benefits Limitation
[17] Ontology- Ontology takes different structures in light of the Enhance quality of personalized Need for domain knowledge.
dependent unique situation. Utilizing the Web Ontology recommendation. Distinguishing the right suggestion
recommendation language contrasted and different dialects the Time-consuming approach mix and assessing the
philosophy addressing the XML plot in data set Better performance in hybrid presentation is troublesome in the
setting. recommender system. event of hybrid recommendation-
based ontology.
[18] Context-aware This system comprised of recommendation Recommendations can be adjusted based Integrate contextual information
recommendation provider for gathering the contextual data and on context
feedback data from sensor and learner
application module.
[19] Hybrid filtering This study zeroed in on book proposal No cold-start issue is seen. Combined Time complexity issue is seen.
frameworks in light of crossover approach the Spark big data platform and obtains
contained cooperative and content-based the personalized book recommendation
expectations and compelling mix came about. and further utilization rate is enhanced.
[20] Demographic This study zeroed in on monetary preparation and It does not need rating history of Learner must retrieve personal
recommendation for that proposal cycle needs to change and particular learner. attributes.
worked on in better manner. For various online and offline
applications, this system has used.
[21] Collaborative Different algorithmic techniques featured which is Domain knowledge is not required. Effective utilization of recommender
filtering used to upgrade data recovery to give student a Effectiveness obtained by improved system is not seen in case of
recommendation proficient suggestion by fulfillment level and information retrieval. comparisons with other domains.
execution improvement. Over specification
[22] Fuzzy-based A legitimate watchword extraction method is Efficient classification accuracy resulted. Multimodal data is yet to be
recommendation created in this review for suggesting the items in considered to improve the similar
system a sure and negative way to clients. products search. In an organizational
Intelligent Analytics for Industry 4.0 Applications
regions that overwhelms the chances in the framework [15]. This stated chance from
the returning of the items which are more similar to the existing user rates. This
method possesses a very serious drawback of minimized scope. Due to that, it may
recommend the similar items with the original seed in accordance with the user
altering preference and apart from that it does not recommend the very popular prod-
ucts to the users. Further the naive user issue could not be suggested unless adequate
items were rated by the user for understanding the user preference [16] (Table 6.1).
vminimum ≤ 1 (6.1)
cnt ≤ 1 (6.2)
Here, cnt represents the similarity of goods. If n and t were similar in M charac-
teristics, then membership of every feature is the same “−” or same “+”, and the
corresponding product is “+”.
Generally, the cnt is larger. Suppose if n and t are not same, then it represents that
they are alternate in some characteristics, and membership of them was an alternate
sign, then the corresponding product was “−”, then ntc was smaller. When member-
ship n and keyword t equal to 1 only in characteristic, where other was 0, then cnt =1,
and n and t were entirely the same; where membership of n and t is 1 and −1 in
characteristic, other was 0, then cnt = −1, and n and t were not entirely same. So, for
keyword t, it could recommend suitable PRA by choosing larger items of cnt. This
technique provides a good result for a small range but with a variety of goods the
80 Intelligent Analytics for Industry 4.0 Applications
• Because of on-sale activity, users would receive some cashback if they pro-
vide high ratings to items.
• Purposely hiring someone to rate products.
For resolving second type of fake rating, trust-dependent recommenda-
tion design with CF takes the following features such as first, the design
integrates relationship among trusted users, and degree of trust for purpose
of rating. User similarity was a trust relationship among users. On the other
hand, the degree of trust for rating was stated from two features: one was
to spot fraudulent users and eliminate their rating. Second was to give met-
ric for every rating’s trust-dependent strength depending on votes given by
other users. Later, enhanced slope one algorithm was presented depending
on the trust-dependent model.
Assessment of Fuzzy Logic Assessed Recommender System 81
6.3.5 Similarity Measures
Similarity measures were utilized to predict the likeliness of two users. Generally,
similarity measures are utilized only when users have rated both items considered.
This creates a bottleneck for new users.
In CF, detection for user j in the nonpersonalized and personalized state is given
as follows:
s ( v, j )
m
Q ( b, j ) = ∑
v =1
m
(6.4)
Here Q is a detection for user b for the item j and detection is made for user b depend-
ing on other users m, s(v, j) is a rating by user v in item j.
Now, there are two considerations, first, if j is not liked by everyone and has vari-
ous opinions about j; second, if the rating utilized for j is not on the same scale. These
cases must be managed differently.
In first case, for detection j to b, if the item was not drawn equally from entire
users, then personalized weight was utilized for each user and finally, it is added.
This is expressed as follows:
∑
m
s ( v, j ) * o ( b, v )
Q ( b, j ) = v =1
(6.5)
∑
m
o ( b, v )
v =1
Here, s(v, j) is rating done by v for j and o(b, v) is weighted arrangement among users
b and v. It is provided by similarity among users b and v.
In second case, where rating is not on the same scale, the difference of rating of
user v for j item and the average rating for user v is to consider as follows:
m
Q ( b, j ) = ∑s ( v, j ) − s (mv ) + s ( b) (6.6)
v =1
Here, (v, j) denotes user–item pair, and s(b) provides deviation which was added to
the average rating of user b.
82 Intelligent Analytics for Industry 4.0 Applications
CF states that user’s previous agreements are utilized to detect their further
a greements. Every user remains stable and cannot modify over time and is also syn-
chronized with one another. So, in CF, the system must work carefully in the area of
agreement. Despite this, there are also cases, where people agree on one domain and
not on other domains [33]. For example, few peoples feel good to discuss politics but
are not interested to have technical discussions. In such a situation, detection for j
was provided by equations 6.2 and 6.3.
6.4 CONCLUSIONS
The evolution of websites results in the data overloading and hence RS offers a com-
prehensive solution for filtering the required information and promotes its usage.
In this chapter, the recommendation system approaches, similarity measures, evalu-
ations, and substantially, the fuzzy logic-based recommendation system are analyzed
and reviewed. The study also discussed the merits and demerits of several RS tech-
niques to offer a panorama by which the researchers, educators, practitioners, and
industrialists could able to quickly understand and learn the scheme behind the RS
to ease the processing. This chapter is then attempted to discuss every key aspect of
the recommendation system for its improvement. This current study is considered as
starting point for the improvement of more recent contributions in the emerging field
of the recommended systems supported by fuzzy tools.
REFERENCES
1 H. Y. Jeong, K. M. Park, M. J. Lee, D. H. Yang, S. H. Kim, and S. Y. Lee, “Vitamin D
and hypertension,” Electrolyte Blood Press., vol. 15, no. 1, pp. 1–11, 2017, doi: 10.5049/
EBP.2017.15.1.1
2. M. Scholz, V. Dorner, G. Schryen, and A. Benlian, “A configuration-based recom-
mender system for supporting e-commerce decisions,” Eur. J. Oper. Res., vol. 259, no.
1, pp. 205–215, 2017, doi: 10.1016/j.ejor.2016.09.057
3. Y. Guo, Y. Liu, A. Oerlemans, S. Lao, S. Wu, and M. S. Lew, “Deep learning for visual
understanding: A review,” Neurocomputing, vol. 187, pp. 27–48, 2016, doi: 10.1016/j.
neucom.2015.09.116
4. C. J. Carmona, S. Ramírez-Gallego, F. Torres, E. Bernal, M. J. Del Jesus, and S. García,
“Web usage mining to improve the design of an e-commerce website: OrOliveSur.
com,” Expert Syst. Appl., vol. 39, no. 12, pp. 11243–11249, 2012, doi: 10.1016/j.
eswa.2012.03.046
5. T. K. Paradarami, N. D. Bastian, and J. L. Wightman, “A hybrid recommender system
using artificial neural networks,” Expert Syst. Appl., vol. 83, pp. 300–313, 2017, doi:
10.1016/j.eswa.2017.04.046
6. J. Lv, B. Song, J. Guo, X. Du, and M. Guizani, “Interest-related item similarity model
based on multimodal data for top-N recommendation,” IEEE Access, vol. 7, no. c,
pp. 12809–12821, 2019, doi: 10.1109/ACCESS.2019.2893355
7. X. Li and J. She, “Collaborative variational autoencoder for recommender systems,”
Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., vol. Part F1296, pp. 305–
314, 2017, doi: 10.1145/3097983.3098077
8. G. Shani, D. Heckerman, and R. I. Brafman, “An MDP-based recommender system,” J.
Mach. Learn. Res., vol. 6, pp. 1265–1295, 2005.
Assessment of Fuzzy Logic Assessed Recommender System 83
CONTENTS
7.1 Introduction..................................................................................................... 86
7.2 Cloud-Based “Big Data” Devices.................................................................... 91
7.2.1 “Amazon Web Services (AWS)”.......................................................... 91
7.2.2 Amazon Elastic Search Service (Big Data Analytics Framework)..... 91
7.2.3 “Amazon S3” (Big Data Storage Framework)..................................... 91
7.2.4 Amazon Redshift (Data Warehousing Framework)............................ 91
7.2.5 “AWS Identity and Access Management (IAM)”................................ 91
7.2.6 Google Cloud Platform (GCP).............................................................92
7.2.7 “Google Cloud Storage” (Big Data Storage Framework)....................92
7.2.8 “Google BigQuery” (Big Data Warehousing Framework)..................92
7.2.9 “IBM Cloud”.......................................................................................92
7.2.10 “Analytics Engine” (Big Data Analytics Framework).........................92
7.2.11 “IBM Cloud Object Storage” (Big Data Storage Framework)............ 93
7.2.12 “IBM Db2 Warehouse” on Cloud (Big Data
Warehouse Framework)���������������������������������������������������������������������� 93
7.3 Microsoft Azure.............................................................................................. 93
7.3.1 “Azure HDInsight (Big Data Analytics Solution)”.............................. 93
7.3.2 “Azure Blob Storage (Big Data Storage Solution)”............................. 93
7.3.3 “Azure SQL Data Warehouse (Big Data Warehouse Solution)”.........97
7.4 Assessment of Cloud-Centered “Big Data” Business Solutions Designs........97
7.5 Real-World Case Studies in Big Data and Cloud-Based Analytics.................97
7.5.1 Big Data Case Study-1 – “Walmart”...................................................97
7.5.2 Big Data Case Study 2 – “Uber”.........................................................97
7.5.3 Big Data Case Study 3 – “Netflix”...................................................... 98
7.5.4 Big Data Case Study 4 – “eBay”......................................................... 98
7.5.5 Big Data Case Study 5 – “Procter & Gamble”.................................... 98
7.5.6 Case Study 6: Big Data Predicting the Uncertainties..........................99
7.5.7 Deployment of “Big Data” for Ad Network Assessment in more
Than Ten Regions of the World���������������������������������������������������������� 99
7.5.8 Case Study 8: Design of an IoT Pet Monitor Using Big Data
Strategy����������������������������������������������������������������������������������������������101
DOI: 10.1201/9781003321149-7 85
86 Intelligent Analytics for Industry 4.0 Applications
7.1 INTRODUCTION
The volume of information produced, processed, and exchanged has increased since
the dawn of the digital revolution. Large amounts of information can be found in a
variety of places, including spreadsheets, sites, and forums, including acoustic feeds.
As a consequence of increased data collection, vast volumes of widespread and com-
plicated data are generated, that must be effectively generated, saved, distributed,
and evaluated in order to mine meaningful knowledge. Such information has enor-
mous promise, but it is becoming increasingly sophisticated, insecure, and risky, as
well as becoming irrelevant. Given that this research may encompass accessibility
and study of clinical records, engagements, financial documents, and public records,
including genomic patterns, the advantages, and constraints of accessing this infor-
mation are debatable. The notion of big data processing and analytics was born out
of the need for efficient and effective analytics services, apps, development environ-
ments, and platforms [1].
Big data analytics (BDA) is being used in a variety of sectors and areas. Health
research, transportation systems, and worldwide safety, as well as the modeling of
challenges in the cultural and ecological sectors, are just a few of the uses. Aside
from standard applications in industry, commerce, and societal management, current
research is focusing on the potential uses of “big data” in practice [2]. Among them
most important potential uses of “big data analytics” and “cloud computing” is in the
biological sciences [3]. Among the high-impact fields defined are tissue engineering,
structural and posttranslational modification predictions, tailored therapy, and meta-
transcriptomics. Aside from that, among the major uses of “big data analytics” is to
enhance the client satisfaction levels of prevailing business models.
By design, “big data” refers to a variety of information types, including formatted,
quasi, and unstructured information, resulting in a complicated data architecture [4].
Such infrastructure’s complexities necessitate sophisticated administration and tech-
nological solutions. The multi-V paradigm forms one of the most widely used frame-
works for interpreting huge datasets. The multi-V model is depicted in Figure 7.1.
“Variety”, “volume”, “velocity”, “veracity”, “value”, “viability”, “validity”, and
“volatility” are the Vs utilized to describe “big data” [5]. “Variety” is determined
by the many types of information present in a database, whereas “velocity” is
determined by the frequency with which information is produced. The quantity of
Intelligent Analytics in Big Data and Cloud 87
information is referred to as volume. Veracity and value are two more attributes that
reflect accuracy of information and usefulness in relation to big data mining, corre-
spondingly. “Viability” is the ability of the model to signify reality. “Validity” refers
to the accuracy and correctness of the data. “Volatility” refers to the time duration
for which the data is useful or relevant. Furthermore, the researchers [6] provided
additional characterization known as the “HACE” theorem. Big data includes two
key properties, as per this hypothesis. To begin with, it has a significant quantity
of complex information from various diverse sources. Secondly, the information is
decentralized and dispersed.
On the Internet, with all the apps created on it, information is the most impor-
tant component of cooperation and interaction. The enormous growing importance
of information-centric services like “Facebook”, “LinkedIn”, “Twitter”, “Amazon”,
“eBay”, and “Google+” is contributing to an increase in the demand for data process-
ing and storage on the cloud. Schouten [7] cites Gartner’s prediction that by 2016,
one-half of all information will be stored in the “cloud”.
Furthermore, the big data analytics data mining methods have powerful compu-
tational demands. As a result, high-performance CPUs are required to complete the
task. The cloud is an excellent platform for storing, analyzing, and interpreting large
amounts of information, since it meets two of the most important needs of “big data
88 Intelligent Analytics for Industry 4.0 Applications
analytics”: high capacity and high-performance computation. Software and data apps
are written, installed, and implemented “as a service” in the “cloud computing” envi-
ronment. “Platform as a service” (PaaS), “software as a service” (SaaS), and “infra-
structure as a service” (IaaS) are three cross-layered architectures. IaaS is a strategy
for renting virtualized resources. Likewise, “PaaS” and “SaaS” represent the “cloud
services” that give “software” platforms or “software as a service” to their customers.
With the introduction of cloud-based solutions, the cost of storage has dropped
dramatically. Furthermore, the pay-as-you-go approach as well as the notion of com-
modities technology enables the effectual handling of enormous amounts of infor-
mation, resulting in the notion of “big data as a service”. “Google BigQuery” is an
illustration of such a platform, that gives real-time observations via huge amounts
of information in the cloud [8]. The authors [9] show how the cloud may be used to
handle “big data” in educational systems, with a specific emphasis on information at
the campus level.
Nonetheless, there were not many effective “cloud-based big data analytics” apps
yet. As a result, researchers are increasingly focusing on cloud-based “big data ana-
lytics”. Information protection and data confidentiality are two issues that are vis-
ible in this setup. Information trustworthiness is also characterized as a service as
part of the cloud solutions. There will be a major drop in credibility as the potential
for security vulnerabilities and privacy violations increases dramatically if big data
methods are implemented in the cloud. There will be a major problem of control
and ownership. The promise of “cloud-based big data analytics”, on the other hand,
has prompted researchers to examine prevailing difficulties and look for solutions.
The numerous angles and characteristics of data mining methodologies’ usage in the
cloud infrastructure for “big data analytics” are discussed in this paper. In addition,
it investigates ongoing studies and vulnerabilities associated with them, including
study instructions prospects in “cloud-based big data analytics”.
Due to the high general amount and intricacy of the information involved, conven-
tional database technologies, including computation or statistical methods, could not
be employed for “big data analytics”. Classic business intelligence solutions involve
“OLAP”, “BPM”, “mining”, and repository systems, including “Relational Data
Base Management System (RDBMS)”, that are associated with traditional statistical
approaches and methods.
“MapReduce” is one of the most prominent models for information processing
on a network of machines. An overview of modeling techniques that facilitate large
data analytics is provided [10]. Although “MapReduce/Hadoop” is identified as one
of the most productive models for “big data analytics”, it also adds other dialects and
modules such as “HiveQL”, “Latin”, and “Pig” that suggest substantial improvements
for this task. “Hadoop” is merely a transparent version of the “MapReduce” context,
which was designed as a shared file system in the first place. As per the work [11],
“Hadoop” has progressed into a whole environment or architecture that operates
with “MapReduce” components and comprises a variety of technological tools such
as the “Hive” and “Pig” languages, a synchronization service known as “Zookeeper”,
and a networked database store known as HBase. “Google MapReduce”, “Spark”,
“Hadoop”, “Twister”, “Hadoop Reduce”, and “Hadoop++” are certain frameworks
available for cloud-based big data analytics [12]. The application of cloud technology
in “big data analytics” is illustrated in Figure 7.2.
Intelligent Analytics in Big Data and Cloud 89
TABLE 7.1
Gap between Big Data and Cloud Computing
Big Data Cloud Computing
Huge data increasing rapidly with time On-demand availability of computing resources
Includes structured, unstructured, and semi- Includes IaaS, PaaS, and SaaS
structured data
Purpose is organization of large data Purpose is to store and process data in cloud
Intelligent Analytics in Big Data and Cloud 91
demonstrate how big data and cloud-based intelligence could be used. The chapter’s
synopsis appears at the end.
permissions, secure access to AWS resources for applications that run on Amazon
EC2, multifactor authentication (MFA), and identity federation, to name a few [52].
TABLE 7.2
Frameworks for “Cloud-Based Big Data” Enterprise Solutions [25]
Architecture and
Sl. No. Operations “AWS” “GCP” “IBM Cloud” “MS Azure”
[-5ex]1 “Big Data Analytics” “Amazon Elastic Search “Google Cloud Dataproc” “IBM Analytics Engine” “Azure HDInsight”
Service”
Mode of Application Publicly available Publicly available Publicly available Publicly available
Information types Organized, quasi, and Organized, quasi, and unsupervised unsupervised
unsupervised information unsupervised information
Origins of information “Amazon S3”, “Amazon “Google Bigtable”, IBM “Cloud Object Storage” “Blob Storage”
Kinesis Firehose”, and “Google Cloud Storage”,
“Amazon DynamoDB” and “Google Big Query
“Operating System” “CentOS”, “Ubuntu”, and “Debian 8” “CentOS 7” “Ubuntu 14”, “Ubuntu
“Amazon Linux” 16”, and “Windows
Server 2012 R2”
“Functionality” Web browsing analysis and Machine learning (ML), Advanced analytics, vendor support Information technology in
continuous integration flow analysis, information for several Big data concerns, and streams and batches
tracking extraction, and streaming the creation and implementation of
data mining apps
Unification of services Yes Yes Yes Yes
Location of “Deployment” “Zonal” “Zonal” “Regional” “Regional”
Component of Operation “EC2 cluster” “Cluster” “Cluster” “Cluster”
Scalability of Computing “Manual” “Manual” “Manual” “Manual”
operations
Pricing Structure for Hourly basis payment Payments per second Hourly basis payment Minute based payments
Compute Nodes
(Continued)
Intelligent Analytics for Industry 4.0 Applications
TABLE 7.2 (Continued)
Frameworks for “Cloud-Based Big Data” Enterprise Solutions [25]
Architecture and
Sl. No. Operations “AWS” “GCP” “IBM Cloud” “MS Azure”
[-5ex]2 “Big Data Storage” “Amazon S3” “Google Cloud Storage” “IBM Cloud Object Storage” “Azure Blob Storage”
Form of Memory Archiving of Distributed Archiving of Distributed Archiving of Distributed Entities Archiving of Distributed
Entities Entities Entities
Kinds of entities “Object” “Object” “Object” Blobs can be appended or
blocked
Component for Deployment “Bucket” “Bucket” “Bucket” “Container”
Identity for Deployment Code that is globally unique Code that is globally Unique identifier for everyone Distinctive Identifier at
unique the Account Level
Intelligent Analytics in Big Data and Cloud
Scalability of Storage Automatic scaling Automatic scaling Manual scaling Manual scaling
Location of “Deployment” “Regional” “Regional and “Regional and multiregional” “Zonal” and “Regional”
multiregional”
Metadata for Entities “Yes” “Yes” “Yes” “Yes”
Layout for Information “Any” “CSV, JSON (Newline “Any” “XML”
Storage Delimited Only), Google
Cloud Datastore Backups,
Avro”
Information Storage Capacity Unrestricted Restricted Unrestricted Restricted
Configuration Management Yes Yes Yes No
of Entities
Memory Types “Amazon Glacier”, “Nearline”, “Coldline”, “Standard”, Crypt, as well as Cold Duplicate Categories:
“Standard”, Irregular “Regional”, Crypt Connectivity, Flex Category “LRS”, “GRS”, “ZRS”,
Connectivity “Multiregional” (Varying information) “RA-GRS” Tiers: Hot,
Cool
95
(Continued)
96
which parts of the business are most frequently used, analyze usage statistics, and
identify areas in which the products would also be targeted more. “Uber” focuses on
the market forces of goods that cause the cost of services to fluctuate. As a result,
dynamic pricing is among Uber’s most essential information applications. For exam-
ple, if you are late for an appointment and reserve a vehicle in a congested area,
you should consider paying double as much. For instance, the traveling expense of
1 mile to a festival could have a high range. Dynamic pricing and economic circum-
stances in the near future could be the difference between preserving and retaining
consumers. Machine learning (ML) methods are used to assess where there is a large
market [41].
As a result, despite numerous new firms, P&G, as the oldest, continues to have a large
market share [41].
In this case study, the client was a well-known market research firm. The main issue
was that, although possessing a reliable statistical platform, the client feared this
would not be able to meet the firm’s expected demand. Recognizing the predicament,
the client had been on the lookout for a forward-thinking, inventive remedy. The aim
of this system was to deal with the ever-increasing volumes of information, analyze
large information quickly, and provide full marketing network analytics. The client
was looking for a professional and experienced group to execute the change after
settling on the platform’s design. After a lengthy relationship with “ScienceSoft”,
the client asked the specialists to handle the whole transfer from the legacy to the
new analytical model. The solution for the above is summarized as follows. The cli-
ent’s predictive analytics designers teamed up with “ScienceSoft’s big data” group
throughout the work. The client team created an idea, while the “ScienceSoft” team
was in charge of putting it into action. The client’s designers chose the ensuing com-
ponents for the new analytical mechanism:
At the client’s request, the old system and the newer one ran in tandem during the
transition. The following important components were incorporated into the actual
approach:
• Compilation of information.
• taging”.
• ata warehouse-1”.
100 Intelligent Analytics for Industry 4.0 Applications
• ata warehouse-2”.
• esktop application”.
Collected information was sent to the platform from a multitude of different sources,
including television viewing, portable phone browser habits, and Internet traffic
statistics, as well as questionnaires. Information gathering included the following
Python-coded phases to allow the technology to handle over 1,000 distinct categories
of original information (cache, Excel, Text, and so forth):
• Information transition.
• Processing of information.
• Information fusion.
• Information uploaded into the database.
• taging”: the foundation of such a component was “Apache Hive”. The infor-
mation format was comparable to raw database schema at the time, and
there were no documented links among participants from various channels,
such as television and the Internet.
• ata warehouse-1”: this block is built on “Apache Hive”, the same as the
preceding one. Information mapping occurred here. As per the modeling
guidelines, the computer analyzed the responders’ information for audio,
television, web, and paper resources, and connected consumers’ IDs
across multiple data sources. “Python” was used to write the ETL for that
component.
• ata warehouse-2”: utilizing “Apache Hive” and “Spark” at its foundation,
the module ensured real-time data analytics based on business rationale:
summation, averaging, likelihood, and so on. The desktop app’s SQL state-
ments were processed using “Spark’s” Data Frames. “Scala” was used to
create ETL. “Spark” also enabled exhaustive data to be filtered based on the
program’s customers’ authorized access.
• esktop application”: the new approach allowed for cross-analysis of nearly
half a million features and the creation of intersecting vectors that allowed
for cross business intelligence from multiple sectors. The client could pro-
duce informal results in combination with conventional statistics. The plat-
form provided a speedy reply of convenient graphs once the client picked
numerous factors of relevance (for instance, a specific television network, a
class of consumers, or a specific time of day). The prediction may also assist
the consumer. The program, for instance, might anticipate sales compared
to projected reach and anticipated advertising expenditure.
• Findings: the proposed program could handle some requests approximately
100 times quicker than the previous approach at the program’s conclusion.
The client was enabled to do complete promotional campaign research for
several marketplaces using the insightful information gained from the study
of around 1 million parameters.
• Systems and Applications: “Apache Hadoop”, “Apache Hive”, “Apache
Spark”, “Python (ETL)”, “Scala (Spark, ETL)”, “SQL (ETL)”, “Amazon
Web Services (cloud storage)”, “Microsoft Azure (cloud storage)”, “.NET
(desktop application)”.
Intelligent Analytics in Big Data and Cloud 101
Because the client anticipated the number of customers to continue to rise, the s ystem
needed to be highly adaptable to collect and organize more content [43]. To make
sure that the system is easily customizable, “ScienceSoft’s” big data team deployed
it on the web and built it around “Apache Kafka”, “Apache Spark”, and “MongoDB”
(Figure 7.3).
Utilizing the “MQTT” protocol, many global positioning send actual informa-
tion on pet whereabouts as well as occurrences (for example, low power and exiting
a secure zone) toward the mail server. The standard was selected since it ensures
a gadget-friendly interface while also saving battery capacity on cell devices. An
“Apache Kafka”-based dynamic data synthesizer pulls information from several
“MQTT” components, analyzes it instantaneously, and verifies the quality of con-
tent. The “Kafka Streams” module enables push alerts and assures secure informa-
tion transport.
An information integrator built on “Apache Spark” analyzes stored informa-
tion, then combines it by hourly, daily, weekly, and monthly before sending it to an
information store. The “ScienceSoft’s” team recommended “MongoDB” knowledge
for the latter since it enables time-series data occurrences to be stored as a single
document on a daily, hourly, and monthly basis. Furthermore, the report-oriented
design permitted in-place modifications, resulting in significant efficiency gains.
Customers’ identities, credentials, and administrative information were stored in the
existing repository on “PostgreSQL RDS”. “RESTful” services decouple the user
interface from the information storage and also ensure dependability, adaptability,
and system or coding environment independence.
The client got a robust big data solution, which could manage 30,000+ transac-
tions every moment across 1 million sensors. Therefore, users could monitor their
pets’ whereabouts instantaneously as well as transmit and receive images, movies,
and voicemail messages. The consumer gets text alerts if a significant incident occurs
(for example, a pet breached a geographical boundary created by the animal parent or
the animal’s wearable tracker went “out of communication”). Animal holders could
likewise view hourly, quarterly, or periodic statements that are generated routinely,
or adjust the recording phase individually if necessary. The technology devices used
in the project were: “Amazon Web Services”, “MQTT”, “Apache Kafka” (stream
data processor), “Apache Spark” (data aggregator), “MongoDB” (data warehouse),
“PostgreSQL RDS” (operational database), and “RESTful” web services.
Actual data (including user views and buttons, pricing packages, screen sizes,
and applications loaded) were collected across 10+ providers by the data analytics
solution. The “MQTT” protocol was proposed by “ScienceSoft’s” team to capture
the sensor information as well as transfer it into “Apache Kafka”. To save money
on AWS computational power, the team recommended adopting “Amazon” Spot
Instances. Researchers deployed AWS Application Proxy Balancers to guarantee the
analytic game’s adaptability.
“Apache Kafka” served as a medium for streaming data. The gathered informa-
tion was sorted there before being offloaded onto the “Amazon Simple Storage”
Service landing zone. “Amazon Redshift” was selected for information warehousing
and distribution, wherein telemetry information from Android smartphones, as well
as statistics from “Enterprise Resource Planning” and the “Home Location Register”
(HLR), were sent.
The “Science Soft” created ROLAP modules with 30+ measurements and 10+
statistics to facilitate periodic and ad-hoc analysis. For example, the analytic system
provided an overview of the loyalty points gained by measuring a user’s advertise-
ment exposures as well as click-throughs. The client might infer that the client was
unsatisfied with the product centered on the enhanced total of requests to assist.
Without action, this might result in client attrition.
The system was made available not only to the clients but also to their renters
(including telecommunication firms with their own clients and HLRs). A renter,
for example, could view the portion of statistics that pertains to their business. The
“ScienceSoft’s” team devised two methods to do this: public entry (managed at the
data storage tier) and exclusive accessibility using a dedicated AWS account. The client
was able to demonstrate the ability with “ScienceSoft’s” big data solutions as follows:
The tools used in this case study were “Amazon Web Services (Amazon cloud)”,
“Apache Kafka” for streaming live information, the “Message Queuing Telemetry
Transport” Protocol, “Amazon Simple Storage Service” for continuous storage,
“Amazon Redshift” as a “data warehouse”, “Airbnb Airflow”, and “Python (ETL)”.
The client in this case study was an American-based firm operating a multichannel
commerce, lodging, cafe, and other enterprises. The client’s key goal was to increase
104 Intelligent Analytics for Industry 4.0 Applications
• The most/least frequented sites, sites with really no traffic, and pages with
traffic jams and low conversions are all examples of traffic and conversion
percentages.
• Participation of Internet shopping consumers.
• Merchandise wish lists, revenues, as well as basket dumping.
Rather than relying on a data repository to show the inventory levels and the need
for continual corrections over the telephone, the client was able to monitor the real
stock position at both the facility and the stores in real time. Such inventory stock
visibility has had a favorable impact on the purchasing and logistical operations. The
client was able to define the overall quality of the workers’ activity using KPIs and
goal management reports. “Microsoft SQL Server”, “Microsoft SQL Analysis” and
“Integration Services”, “Python”, and “Microsoft Power BI” were used.
meteorological, temperature, and ecological survey data. To meet the deadline, the
client hired a contractor ahead of time to develop the structure of the future solution
and select the software system. Because the program is designed to last three decades
and having the right design is critical, the client opted to hire other firms to review
the documents that have been acquired and selected “ScienceSoft” for the job. Those
who also asked “ScienceSoft” to develop and execute training courses on the big
data environment in general and the recommended solutions in specific, as the work-
around depends on big data.
“ScienceSoft’s” big data consultancy group starts by visiting the client on website
to know about their company and the product they were considering. They also held
group discussions with client’s staff. Our specialists then dug into the offered infor-
mation on the recommended design and computing environment. In much less than
a week, our crew had to consider carefully 1,000+ pages, highlight the good aspects,
and, if necessary, bring out whatever omissions or flaws.
The staff at “ScienceSoft” has created educational materials that will be provided
over the next initial appointment. The experts provide a summary of current big
data technologies to expose the client to the big data ecosystem going far beyond
those recommended by the third-party contractor. The presentation also includes
application scenarios, with an emphasis on those that would be relevant to the cli-
ent’s industry. The experts designed entirely different sets of learning resources for
every potential customer because “ScienceSoft’s” team was really to conduct train-
ing courses both for senior knowledge and professional staff.
The “ScienceSoft’s” team was prepared not only to lead seminars but also to cre-
ate experience and understanding resources and offer advice on how to evaluate test
takers. Nevertheless, the client preferred a conference approach with Q&A sessions.
Besides that, “ScienceSoft” offered technical workers with on-the-job assistance,
with the experts conducting coding workshops during the second onsite visit.
The client gets an assessment report detailing the optimizer’s strengths and weak-
nesses. The study also included suggestions for how to enhance the system. For
instance, substituting one of the recommended technologies with the other resulted
in improved quality and durability for the system. “ScienceSoft” has created over
300+ slides of training manuals that present the big data idea, technology, and real-
world experiences. NoSQL technology, and broadcasting and queuing analysis, were
one of the subjects addressed. Seminars with panel discussions and on-the-job help
were used to practice regularly. After the session, the client gets all of the documents,
which became their intangible asset.
Q&A meetings, quantitative performance evaluations (accessibility, integration,
expandability, serviceability, ease of maintenance, vendor support, and achieve-
ment), and remedy evaluations related to technological features (consumer experi-
ence, technology maturity, digital innovation, and supplier assistance) were some of
the methodologies used in this case study.
of their services to make informed decisions, the client gathers, saves, and analyzes
IoT data from 1 million automobiles linked to their platforms. The client sought to
enhance their big data analytics abilities after implementing a comprehensive IoT
information gathering and storage system. “Apache Cassandra” is used in their main
approach. “Apache Cassandra”, described as the key, does not build sustainable large
amounts of data analytics very well. To download information for 70,000 vehicles,
for instance, the client must dynamic responses 70,000 distinct queries, each of
which will receive 70,000 unique reports, necessitating more attempts to obtain a
comprehensive picture.
The big data specialists visited the client for a 3-day onsite visit, where they
thoroughly analyzed the existing schema, including its design, relevant documen-
tation, current evidence streams, and existing data standard operating procedures.
Following that, we organized a workshop devoted to the future solution, wherein they
addressed the optimizer’s estimated launch date, current and chosen technology, and
accessible licenses. They additionally established structurally required specifications
for the optimizer’s reliability, speed, privacy, and adaptability during the session.
Next, they classified every demand as crucial, moderate, mid, or minor in terms of its
influence on the firm’s success.
The experts created the design concept for the future solution based on the conclu-
sions of the session. They discussed the responsibilities of high-level design modules
such as continuous integration as well as a cloud service. Following the presentation
of the design approach, the experts conducted a Conversation during which they
offered definitive solutions to any questions the client had. For example, they dis-
cussed the benefits and drawbacks of a datastore vs a centralized data warehouse.
They further contrasted on-premises deployment with cloud-based solutions, cover-
ing several public scenarios – including “Amazon Web Services” and “Microsoft
Azure” at the forefront. Furthermore, the “Apache Cassandra” consultants gave the
client ideas about how to increase “Apache Cassandra’s” performance, including
table layout, partitioning variables, and the type of information that can be stored.
The following information was included in the client’s visit document:
Ongoing problems, such as acceptance and application of quality big data solutions
employing cloud infrastructure, as well as addressing vulnerabilities, arise in the
context of virtualized “big data analytics”. One of the most pressing challenges
when combining big data analytics with cloud technology is security. This is why
cloud-based big data analytics, as well as its application in practice and execution,
has gotten so much interest.
The researchers summarized, assessed, and compared authenticator-based infor-
mation integrity testing strategies for “cloud” and “Internet-of-things” data [48]. Any
further advancements in this field, according to this article, should consider three
major facets: effectiveness, reliability, and expandability. On “cloud” and “Internet-
of-things” information, the authors [48] give an overview, evaluation, and com-
parison of authenticator-based file integrity verification methodologies. Any future
advancements in this field, according to this article, should consider three primary
aspects: efficiency, reliability, and expandability.
The authors [49] advise that the following topics must be investigated further:
7.7 CONCLUSION
The advent of this subject of study has grabbed the attention of several profession-
als and scholars in this age of big data. Big data analytics and analysis have grown
increasingly important as the pace at which information is generated in the virtual
environment has increased. Furthermore, most of this information is already on the
Intelligent Analytics in Big Data and Cloud 109
cloud. As a result, relocating “big data analytics” to the “cloud” is a feasible choice.
Furthermore, the cloud structure meets the data analytics techniques’ storing and
processing needs. On the other hand, there are conflicts such as safety, confidential-
ity, and a loss of ownership and control. This chapter surveyed some of the important
aspects of intelligent analytics in big data and cloud. Several significant tools in “big
data” and “cloud” are compared based on their performance. Numerous real-world
case studies (12 in particular) on intelligent analytics in big data and cloud are dis-
cussed in detail. The challenges and issues faced while developing big data analytics
in cloud along with future research directions are summarized in this chapter.
The study possibilities, however, really are not confined to the aforementioned points.
The primary objective would be to shift the cloud from an information management
and infrastructure base to a flexible and scalable analytics solution.
REFERENCES
1. Khan, S., Shakil, K. A., and Alam, M. (2008). Cloud-Based Big Data Analytics-A
Survey of Current Research and Future Directions. Advances in Intelligent Systems
and Computing, 654. https://doi.org/10.1007/978-981-10-6620-7-57
2. Chen, C. L. P. and Zhang, C. Y. (2014). Data-Intensive Applications, Challenges,
Techniques, and Technologies: A Survey on Big Data. Information Sciences. Advances
in Intelligent Systems and Computing, 275, 314–347. https://doi.org/10.1016/j.
ins.2014.01.015
3. Driscoll, A., Daugelaite, J., and Sleator, R. D. (2013). ‘Big Data’, Hadoop and Cloud
Computing in Genomics. Journal of Biomedical Informatics, 46(5), 774–781. https://
doi.org/10.1016/j.jbi.2013.07.001
4. Manekar, A. and Pradeepini, G. (2015). A Review on Cloud-based Big Data Analytics.
ICSES Journal on Computer Networks and Communication, 1(1), 1–4.
110 Intelligent Analytics for Industry 4.0 Applications
5. Assuncao, M. D., Calheiros, R. N., Bianchi, S., and Netto, M. A. S. (2015). Big
Data Computing and Clouds: Trends and Future Directions. Journal of Parallel and
Distributed Computing, 79, 3–15. https://doi.org/10.1016/j.jpdc.2014.08.003
6. Wu, X., Zhu, X., Wu, G.-Q., and Ding, W. (2014). Data Mining with Big Data.
IEEE Transactions on Knowledge and Data Engineering, 26(1), 97–107. https://doi.
org/10.1109/TKDE.2013.109
7. Pashazadeh, A. and Jafari Navimipour, N. (2018). Big Data Handling Mechanisms
in the Healthcare Applications: A Comprehensive and Systematic Literature Review.
Journal of Biomedical Informatics, 82, 47–62. https://doi.org/10.1016/j.jbi.2018.03.014
8. Challita, S., Zalila, F., Gourdin, C., and Merle, P. (2018). A Precise Model for Google
Cloud Platform. IEEE International Conference on Cloud Engineering, 177–183.
https://doi.org/10.1109/IC2E.2018.00041
9. Shakil, K. A., Sethi, S., and Alam, M. (2015). An Effective Framework for Managing
University Data Using a Cloud Based Environment. 2nd International Conference on
Computing for Sustainable Global Development (INDIACom), 1262–1266.
10. Jackson, J. C., Vijayakumar, V., Quadir, M. A., and Bharathi, C. (2015). Survey on
Programming Models and Environments for Cluster, Cloud and Grid Computing That
Defends Big Data. 2nd International Symposium on Big Data and Cloud Computing,
517–523.
11. Neaga, I. and Hao, Y. (2014). A Holistic Analysis of Cloud Based Big Data Mining.
International Journal of Knowledge, Innovation and Entrepreneurship, 2(2), 56–64.
12. Borthakur, D., Gray, J., Sarma, J. S., Muthukkaruppan, K., Spiegelberg, N., Kuang,
H., Ranganathan, K., Molkov, D., Menon, A., Rash, S., Schmidt, R., and Aiyer, A.
(2011). Apache Hadoop Goes Real-Time at Facebook. ACM SIGMOD International
Conference on Management of Data, 1071–1080.
13. Strambei, C. (2012). OLAP Services on Cloud Architecture. Journal of Software and
Systems Development. https://doi.org/10.5171/2012.840273
14. Khan, I., Naqvi, S. K., Alam, M., and Rizvi, S. N. A. (2015). Data Model for Big Data
in Cloud Environment. Computing for Sustainable Global Development (INDIACom),
582–585.
15. Ortiz, J. L. R., Oneto, L., and Anguita, D. (2015). Big Data Analytics in the Cloud:
Spark on Hadoop vs MPI/OpenMP. INNS Conference on Big Data, 53, 121–130.
16. Baker, T., Al-Dawsari, B., Tawfik, H., Reid, D., and Nyogo, Y. (2015). GreeDi:
An Energy Efficient Routing Algorithm for Big Data on Cloud. Ad Hoc Networks, 35,
1–14.
17. Li, X., Calheiros, R. N., Lu, S., Wang, L., Palit, H., Zheng, Q., and Buyya, R. (2012).
Design and Development of an Adaptive Workflow-Enabled Spatial-Temporal Analytics
Framework. 18th International Conference on Parallel and Distributed Systems,
862–867.
18. Calheiros, R. N., Vecchiola, C., Karunamoorthy, D., and Buyya, R. (2012). The Aneka
Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid
Clouds. Future Generation Computer Systems, 28(6), 861–870.
19. Kim, H., Abdelbaky, M., and Parashar, M. (2009). CometPortal: A Portal for Online
Risk Analytics Using CometCloud. 17th International Conference on Computer Theory
and Applications.
20. Chen, Q., Hsu, M., and Zeller, H. (2011). Experience in Continuous analytics as a
Service (CaaaS). 14th International Conference on Extending Database Technology,
509–514.
21. Srivastava, M. and Yadav, P. (2021). Build a Log Analytic Solution on AWS. 5th
International Conference on Information Systems and Computer Networks, 1–5.
https://doi.org/10.1109/ISCON52037.2021.9702374
Intelligent Analytics in Big Data and Cloud 111
22. Neumeyer, L., Robbins, B., Nair, A., and Kesari, A. (2010). S4: Distributed Stream
Computing Platform. IEEE International Conference on Data Mining, ICDM, 170–177.
https://doi.org/10.1109/ICDMW.2010.172
23. Biem, A., Bouillet, E., Feng, H., Ranganathan, A., Riabov, A., Verscheure, O.,
Koutsopoulos, H., and Moran, C. (2010). IBM InfoSphere Streams for Scalable, Real-
Time, Intelligent Transportation Services. ACM SIGMOD International Conference on
Management of Data, 1093–1104. https://doi.org/10.1145/1807167.1807291
24. Zhang, Z., Liu, Z., Jiang, Q., Chen, J., and An, H. (2021). RDMA-Based Apache Storm
for High-Performance Stream Data Processing. International Journal of Parallel
Programming, 49, 671–684. https://doi.org/10.1007/s10766-021-00696–0.
25. Saif, S. and Wazir, S. (2018). Performance Analysis of Big Data and Cloud Computing
Techniques: A Survey. Procedia Computer Science, 132, 118–127. https://doi.
org/10.1016/j.procs.2018.05.172
26. Kumar, V. D. A., Divakar, H., and Gokul, R. (2017). Cloud Enabled Media Streaming
Using Amazon Web Services. IEEE International Conference on Smart Technologies
and Management for Computing, Communication, Controls, Energy and Materials
(ICSTM), 132, 118–127. https://doi.org/10.1016/j.procs.2018.05.172
27. Gulabani, S. (2017). Practical Amazon EC2, SQS, Kinesis, and S3 A Hands-On
Approach to AWS. eBook: Springer. https://doi.org/10.1007/978-1-4842-2841-8
28. Pradhananga, Y., Karande, S., and Karande, C. (2016). High Performance Analytics
of Bigdata with Dynamic and Optimized Hadoop Cluster. International Conference
on Advanced Communication Control and Computing Technologies (ICACCCT), 715–
720. https://doi.org/10.1109/ICACCCT.2016.7831733
29. Dawelbeit, O. and McCrindle, R. (2014). A Novel Cloud Based Elastic Framework for
Big Data Preprocessing. 6th Computer Science and Electronic Engineering Conference
(CEEC), 23–28. https://doi.org/10.1109/CEEC.2014.6958549
30. Ugia Gonzalez, J., and Krishnan, S. P. T (2015). Building Your Next Big Thing with
Google Cloud Platform: A Guide for Developers and Enterprise Architects. eBook:
Springer. https://doi.org/10.1007/978-1-4842-1004-8
31. Ramesh, B. (2015). Big Data Architecture. In: Mohanty, H., Bhuyan, P., and Chenthati,
D. (eds) Big Data. Studies in Big Data, 11. https://doi.org/10.1007/978-81-322-2494-5_2
32. Patil, A., Rangarao, D., Seipp, H., Lasota, M., Marcelo dos Santos, R., Markovic, R.,
Casey, S., Bollers, S., Gucer, V., Lin, A., Richardson, C., Rios, R., Van Alstine, R., and
Medlin, T. (2020). Cloud Object Storage as a Service: IBM Cloud Object Storage from
Theory to Practice - For developers, IT architects and IT specialists. IBM Redbooks.
ISBN: 9780738442457
33. Das, N. S., Usmani, M., and Jain, S. (2015). Implementation and Performance Evaluation
of Sentiment Analysis Web Application in Cloud Computing Using IBM Blue mix.
International Conference on Computing, Communication & Automation, 668–673.
https://doi.org/10.1109/CCAA.2015.7148458
34. Nakhimovsky, A. and Myers, T. (2004). Google, Amazon, and Beyond: Creating and
Consuming Web Services. eBook: Springer. https://doi.org/10.1109/CCAA.2015.7148458
35. Krishnan, S. P. T. and Ugia Gonzalez, J. L. (2015). Building Your Next Big Thing
with Google Cloud Platform: A Guide for Developers and Enterprise Architects eBook:
Springer. https://doi.org/10.1007/978-1-4842-1004-8_10
36. Serrano, N., Gallardo, G., and Hernantes, J. (2015). Infrastructure as a Service and
Cloud Technologies. IEEE Software, 32,2, 30–36. https://doi.org/10.1109/MS.2015.43
37. Shovic, J. C. (2021). Connecting an IoT Device to a Cloud Server: IoTPulse. Raspberry
Pi IoT Projects. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6911-4_5
38. Soh, J., Copeland, M., Puca, A., and Harris, M. (2020). Microsoft Azure. Apress
Berkeley, https://doi.org/10.1007/978-1-4842-5958-0
112 Intelligent Analytics for Industry 4.0 Applications
39. Moemeka, E. (2019). Azure in the Enterprise: Cloud Architecture, Patterns, and
Microservices with Azure PaaS and IaaS. Springer.
40. Reagan (2018). Web Applications on Azure: Developing for Global Scale. Springer.
https://doi.org/10.1007/978-1-4842-2976-7
41. 5 Big Data Case Studies – How big companies use Big Data. Retrieved from https://
data-flair.training/blogs/big-data-case-studies/ on May 2, 2022.
42. Big Data Implementation for Advertising Channel Analysis in 10+ Countries. Retrieved
from https://www.scnsoft.com/case-studies/big-data-implementation-for-advertising-
channel-analysis on May 3, 2022.
43. Development of a Big Data Solution for IoT Pet Trackers. Retrieved from https://www.
scnsoft.com/case-studies/big-data-solution-for-iot-pet-trackers on May 3, 2022
44. Implementation of a Data Analytics Platform for a Telecom Company. Retrieved
from https://www.scnsoft.com/case-studies/data-analytics-platform-for-a-us-telecom-
company-operating-in-18-states on May 4, 2022.
45. Data Analytics Implementation for a Multi-business Corporation. Retrieved from https://
www.scnsoft.com/case-studies/data-analytics-implementation-for-a-multibusiness-
corporation on May 5, 2022.
46. Big Data Consulting and Training for a Satellite Agency. Retrieved from https://www.
scnsoft.com/case-studies/big-data-consulting-and-training-for-a-satellite-agency on
May 5, 2022.
47. Liu, C., Yang, C., Zhang, X., and Chen, J. (2015). External Integrity Verification for
Outsourced Big Data in cloud and IoT: A Big Picture. Future Generation Computer
System, 49, 58–67.
48. Talia, D. (2013). Clouds for Scalable Big Data Analytics. IEEE Computer Society,
46(5), 58–67. https://doi.org/10.1109/MC.2013.162
49. Neaga, I. and Hao, Y. (2014). A Holistic Analysis of Cloud Based Big Data Mining.
International Journal of Knowledge, Innovation and Entrepreneurship, 2(2), 56–64.
50. Saha, M., Panda, S.K., and Panigrahi, S (2021). A Hybrid Multi-Criteria Decision
Making Algorithm for Cloud Service Selection. International Journal of Information
Technology, 13, 1417–1422. https://doi.org/10.1007/s41870-021-00716-9
51. Saha, M., Kumar Panda, S., and Panigrahi, S. (2022). A Survey on Applications of
Multi-Attribute Decision Making Algorithms in Cloud Computing. ECS Transactions,
107(1), 12887–12900.
52. Pandit, P. (2021). Case Study on AWS Identity and User Management. https://doi.
org/10.13140/RG.2.2.18227.55844.
53. Behura, A. and Kumar Panda, S. (2022). Role of Machine Learning in Big Data
Peregrination. Handbook of Research for Big Data, pages 42.
8 Various Audio
Classification Models
for Automatic Speaker
Verification System
in Industry 4.0
Sanil Joshi, Mohit Dua, and Shelza Dua
National Institute of Technology
CONTENTS
8.1 Introduction................................................................................................... 113
8.2 Back-End Classification Models.................................................................... 115
8.2.1 Machine Learning Models................................................................ 116
8.2.2 Deep Learning Models...................................................................... 118
8.3 Validation....................................................................................................... 121
8.3.1 Hold Out Validation........................................................................... 122
8.3.2 k-Fold Cross Validation..................................................................... 122
8.3.3 Stratified k-Fold Cross Validation..................................................... 123
8.3.4 Monte Carlo Cross Validation........................................................... 123
8.4 Evaluation Metrics......................................................................................... 123
8.4.1 Equal Error Rate (EER)..................................................................... 123
8.4.2 Accuracy............................................................................................ 124
8.4.3 Precision (Pre)................................................................................... 124
8.4.4 Recall (Re)......................................................................................... 124
8.4.5 Area Under Curve (AUC).................................................................. 124
8.4.6 F1 Score............................................................................................. 125
8.4.7 Mean Average Precision (AP)........................................................... 125
8.5 Analysis of Different Classification Models.................................................. 125
8.6 Conclusion..................................................................................................... 126
References............................................................................................................... 128
8.1 INTRODUCTION
Automatic speaker verification (ASV) technologies have advanced to the point that
many industries and businesses such as banks are attracted in using them in actual
security systems. However, the susceptibility of these systems to a variety of direct
DOI: 10.1201/9781003321149-8 113
114 Intelligent Analytics for Industry 4.0 Applications
and indirect access threats reduces the effectiveness of the ASV authentication
mechanism. ASV system provides the verification and the authorization to the
original users of the system [1].
Like other security systems, these ASV systems are also prone to various spoof-
ing threats. With respect to ASV system, spoofing is the security attack in which
imposter gain access to the original user’s private information by creating the audio
sample similar to the voice of the original user. In spoofing, different types of spoof-
ing threats like replay attacks, voice conversion (VC), speech synthesis (SS), and
mimicry attacks are very popular. Speech synthesis [2] and voice conversion [3] are
the types of logical access attacks and are performed using advanced algorithms and
functions. These attacks are performed by skilled person with deep knowledge in
speech processing.
The replay attacks [4] are the simplest form of spoofing attacks. In order to per-
form these attacks, we just require the recording and replay devices. With the help of
recording device, the attacker records the voice of the original user, and with the help
of replay device, the attacker gets access to the user’s private system after performing
verification. These replay attacks can be performed by any person because no techni-
cal expertise is required to perform these attacks. Another important spoofing attack
is mimicry attacks [5], and these attacks can be performed by skilled voice mimicry
artists. Mimicry artist mimics the voice of the original user and then performs spoof-
ing attack using mimic audio. Figure 8.1 shows the important components of ASV
system.
The ASV systems comprise three main phases. First important phase is front
end feature extraction phase. In feature extraction phase, the important and useful
information is extracted from the input audio signal to produce the audio feature vec-
tor. Second important phase is back-end classification model. The extracted feature
vector is then fed to classification model to classify the audio samples into bonafide
(original) or the spoofed (cloned) audio sample. Another important phase of ASV
system is the dataset because for speaker verification tasks, various speech datasets
such as ASVspoof 2015 [6], ASVspoof 2017 [7], ASVspoof 2019 [8], and voice spoof-
ing detection corpus (VSDC) [9] datasets are available.
and deep learning classification models such as RF, NB, KNN, LSTM, CNN, and
bidirectional LSTM [19,20] are widely used for classification of the audio samples
into spoofed and original audio samples. The fundamentals related to different clas-
sification models are as follows.
P ( N | M )* P ( M )
P(M | N ) = (8.1)
P(N )
words, it generally lowers the size of the feature vector. Bias and weights
associated with different neurons are considered in a fully connected layer.
First, input flattening is performed and then passed to the fully connected
layer for the classification task [23,24]. When the data are fed to the fully
connected layer, there might be overfitting. So, to prevent the effect of over-
fitting, drop-out layers are used. The drop-out layer randomly drops out
some neurons to avoid overfitting. Figure 8.4 shows the different layers of
the CNN. Different activation functions such as reLU, tanh, SoftMax, and
sigmoid are widely used in classification.
• Recurrent Neural Network (RNN)
RNN is the type of neural network in which the output of one layer is
fed as the input to another layer. RNN is very useful in the cases where
the prediction of the subsequent work of any given sentence needs to be
performed. Nowadays, researchers are also using RNN in speech process-
ing tasks. RNN consists of an input layer, hidden layer, and output layer. It
provides the same bias and weights to all the layers. Hence, it reduces the
increasing parameter complexity and delivers the output of the previously
hidden layer to the next layer as input to improve the memorization of the
output of each layer. Figure 8.5 shows the block diagram of the RNN.
• Long Short-Term Memory (LSTM)
LSTM model was developed to overcome the disadvantage of RNN.
RNN mainly suffers from vanishing gradient problems, i.e., when training
the neural network on backpropagation, there is no updating in the value
of the weights. The layer of LSTM consists of the connection of memory
block in the recurrent fashion. Hence it becomes suitable for sequence pre-
diction tasks and also for speech processing. In LSTM network, there are
three gates. First is input gate, and other two are output gate and forget
gate, respectively. The input gate’s job is to evaluate the new information
carried by the input and determine its significance. The forget gate is used
to determine whether the data from the preceding time stamp should be
kept or dismissed. The value of the next hidden state is determined by the
output gate.
The output of each gate is represented by the following equations [25,26]:
ft = ∅(Wt fg * ht −1 * it + b f (8.3)
Vi = tanh(Wc * ht −1 * it + bc (8.5)
Vt = ft * Vt −1 + it * Vi (8.6)
where t is the time stamp, ft is the forget gate at t, it is the input, ht-1 is the
prior hidden state, Wtfg is the weights matrix, and bf is the bias in equa-
tion (8.3). In equations (8.4–8.6), Wtig represents the weight matrix between
Various Audio Classification Models for Automatic Speaker 121
the output gate and the input gate, Vi is the result generated after applying
the tanh activation function, Wc is the weight matrix between cell state
information and the previous output of the network, and Vt is cell state
information.
ot = ∅(WO * ht −1 * it + bo (8.7)
where ot is the output gate at t, Wo and bo denote the weight and bias of ot,
respectively, and Opt denotes the final output of LSTM.
• Gated Recurrent Unit (GRU)
The complexity of GRU model is less as compared to LSTM model. It
provides faster and better results as compared to LSTM and is widely used
when training samples are small in amount [27]. GRU consists of two gates
one is reset gate and other one is update gate. The role of update gate is
to determine how much past information is to be retained for making the
predictions for future. The reset gate helps to determine how much previous
information need to forget. The equation for output of update and reset gates
is as follows:
U ( t ) = ∂(Wu xt + Uu ht −1 ) (8.9)
R ( t ) = ∂(Wr xt + Ur ht −1 ) (8.10)
where U(t) and R(t) represent the output of update gate and reset gates,
respectively, Wu, Uu, Wr, and Ur show the weights, and xt is the input, and ht-1
is the output of previous t−1 states.
8.3 VALIDATION
In artificial intelligence, validation [28] often entails testing the system on the testing
dataset. This testing dataset is not a fresh dataset, but rather a subset of the training
dataset. Some of the training dataset is put aside for training, while others are placed
aside for testing [29]. In order to classify the audio samples into bonafide or spoofed
audios, the classification model is trained with different hyper parameters. With the
help of validation, the best hyperparameters are selected for the particular model
that gives high validation accuracy. Validation testing helps to select the best hyper
parameters for the model. The validation techniques also determine the underfit-
ting and overfitting of the classification model. Underfitting is the situation in which
the model is neither providing good accuracy on training data nor on testing data.
Overfitting occurs when the model generalizes good on the training data but does
not show good performance on the testing data. Different validation techniques that
are popular to improve the performance of the machine learning and deep learning
models are as follows:
122 Intelligent Analytics for Industry 4.0 Applications
FIGURE 8.6 k-fold cross validation when the number of folds is set to 5.
Various Audio Classification Models for Automatic Speaker 123
be used for training of the system. And this process will get repeated till the fifth
iteration. It is important to note that only one subset will be reserved for testing at a
time, and the remaining subsets all together will be used for training.
Number of False Acceptance possibilties
FAR = (8.9)
Total number of the utterances
Number of False Rejection possibilties
FRR = (8.10)
Total number of the utterances
8.4.2 Accuracy
Accuracy is another evaluation criterion that is used to measure the performance of
classification model. Accuracy is the measure of number of the samples that model
correctly predicts out of the total number of the samples [34]:
Number of correctly predicted samples
Accuracy = (8.11)
Total number of the samples
TPos+TNeg
Accuracy = (8.12)
TPos+ FPos+TNeg+FNeg
TPos
Precision = (8.13)
TPos + FPos
8.4.4 Recall (Re)
Recall basically defines out of all the predicted samples of one class how many of the
samples are correctly predicted by our classification model. Recall is the fraction of
number of TPos to TPos and FNeg [34].
TPos
Recall = (8.14)
TPos + FNeg
FPos
False Positive Rate = (8.15)
TNeg + FPos
8.4.6 F1 Score
F1 score is the evaluation criterion widely used in the binary classification problem.
It is the harmonic mean between the precision and recall values. In order words, we
can say it is the weighted average between recall value and precision value. It has
actual application when our dataset contains the irregular distribution of the classes
[34]. The formula for the calculation of F1 score is as follows:
2* Pre * Re
F1 Score = (8.16)
Pre + Re
∑
n
Precision of given class
AP = i =1
(8.17)
Total number of samples of particular class
The authors conclude that hybrid deep learning models improve the c lassification
performance of ASV system.
Malik et al. [13] proposed ATP+GTCC-based feature extraction technique.
The extracted feature vectors are fed to different classification models such as
Error-Correcting Output Coding-Support Vector Machine (ECOC-SVM), bagged
trees, decision trees, Naïve Bayes, KNN, and bidirectional LSTM. The authors con-
clude that hybrid feature extraction at front end and machine learning model at back
end improves the efficiency of ASV system. The proposed system by them provides
0.6% EER against 1PR and 2PR attacks and 1% EER value under PA attacks.
Li et al. [38] proposed attention-based LSTM to classify the audio samples into
bonafide or cloned audio samples. The authors conclude that the attention-based
LSTM provides nearly 13.81% improvement in EER value as compared to LSTM.
Faisal et al. [39] used MFCC feature extraction to extract the important features
from the audio samples. After that, the extracted feature vectors are given to DNN
and GMM classifiers individually. The authors conclude that the DNN-based classi-
fier provides better results (18.1% EER) as compared to GMM-based classifier (19%
EER).
Dua et al. [40] have proposed a hybrid of deep neural networks such as LSTM
with time-distributed dense layers, and spatial convolution (SC) and temporal con-
volution (TC)-based DNN to perform the classification of the audio samples into
bonafide or spoofed audios. The hybrid deep neural network model provides 0.6%
EER against both LA and physical access (PA) (ASVspoof 2019 dataset) attacks.
Kumar and Bharathi [41] proposed FBCC feature extraction technique to extract
the useful information from the audio samples. The extracted audio feature vector
is fed to GMM-based classifier. The proposed system provides 0.16 min t-DCF value
against LA attacks and 0.25 min t-DCF value against PA attacks. Table 8.1 provides
the performance analysis of ASV systems that use different feature extraction and
classifiers to classify the audio samples into original human audio or spoofed audio.
Further, from the performance analysis of different classifiers, it can be concluded
that the classification model that performs the validation of the obtained results using
different validation techniques, that classifier provides better performance as com-
pared to others.
8.6 CONCLUSION
For industry automation, voice technologies are very helpful to automate the produc-
tion process. Speaker verification performs the classification of voice samples into
bonafide or spoofed audios. The back-end classification model plays a significant role
to improve the accuracy of ASV system. Traditionally, machine learning-based mod-
els were popular for spoofing detection task in speaker verification system. However,
today deep learning models and hybrid of various deep learning models are get-
ting researchers’ attention. Although the hybrid deep learning models at back end
improve the performance of ASV system, it also increases the overall complexity of
the system. Further to increase the performance of classification model to classify the
audio samples into bonafide or spoofed, the validation procedure can be applied. For
evaluating the ASV system, along with EER value different performance evaluation
TABLE 8.1
Analysis of Different Classification Models Used at Back End of ASV System
Work Front End Back End Validation Results Remarks
Sadhu et al. [34] Mel LSTM, CNN K-fold cross 3.6% EER (1PR) Hybrid deep learning model of LSTM+CNN at
spectrograms, validation 2.96% EER (2PR) back end improves the performance of overall
CQCC 97.6% Accuracy (1PR) system as compared to system that uses
97.78% Accuracy (2PR) standalone CNN and LSTM models.
Mittal and Dua Static dynamic LSTM with time-distributed Validation using 0.9% EER Hybrid deep learning models improve the
[12] CQCC features wrappers, CNN, Voting development set performance of ASV system.
protocol
Dua et al. [40] MFCC, IMFCC, LSTM with time-distributed — 0.6% EER using ensemble CQCC features with ensemble deep neural
CQCC dense layers, SC and model network provide better EER as compared to
TC-based DNN, Ensemble other models and existing systems.
model of all these models
Mittal and Dua 30 static + 30 first 2D CNN — 5.5% EER and 0.101 t-DCF Combination of 2D CNN with CQCC features
[37] order + 30 for LA attacks increases the efficiency of ASV system.
second order 6.2% EER and 0.122 t-DCF
CQCC features for PA attacks
Malik et al. [13] Hybrid ECOC-SVM, Decision K-fold Cross 0.6% EER (VSDC) When hybrid feature extraction technique is used
ATP+GTCC Trees, KNN, NB, Bagged Validation 1% EER (PA) at front end, machine learning algorithms show
features Trees, Bidirectional LSTM great performance as compared to deep learning
techniques.
Various Audio Classification Models for Automatic Speaker
Li et al. [38] CQCC features Attention-based Long — 20.32% EER (Traditional Attention-based LSTM provides better results as
Short-Term Memory LSTM) compared to other models.
16.86% EER (Attention-
based LSTM)
Mittal and Dua CQCC LSTM classification model — 0.42% EER (LA attacks) LSTM model outshines other baseline models
[15] 0.51% EER (PA attacks) when CQCC features are fed to it.
Faisal et al. [39] MFCC DNN, GMM — 18.1% EER (DNN) Deep neural networks provide good results as
19.0% EER (GMM) compared to GMM.
127
Kumar and FBCC GMM classifier 0.16 t-DCF (LA attacks) GMM-based classifier improves the min t-DCF
Bharathi [41] 0.25 t-DCF (PA attacks) value when FBCC features are fed to it.
128 Intelligent Analytics for Industry 4.0 Applications
criteria such as F1 score, precision, recall, and accuracy can be used. Further in
future scope to increase the performance and to decrease the overall complexity of
ASV system, the ASV system with hybrid feature extraction at front end and less
complex classification model such as light convolutional neural network (LCNN)
can be used.
REFERENCES
1. Z. Wu, N. Evans, T. Kinnunen, J. Yamagishi, F. Alegre, and H. Li, “Spoofing and coun-
termeasures for speaker verification: A survey,” Speech Commun., vol. 66, pp. 130–153,
2015.
2. A. Indumathi and E. Chandra, “Survey on speech synthesis,” Signal Process. An Int. J.,
vol. 6, no. 5, p. 140, 2012.
3. A. Kain and M. W. Macon, “Design and evaluation of a voice conversion algo-
rithm based on spectral envelope mapping and residual prediction,” in 2001 IEEE
International Conference on Acoustics, Speech, and Signal Processing. Proceedings
(Cat. No. 01CH37221), 2001, vol. 2, pp. 813–816.
4. M. Liu, L. Wang, Z. Oo, J. Dang, D. Li, and S. Nakagawa, “Replay attacks detection
using phase and magnitude features with various frequency resolutions,” in 2018 11th
International Symposium on Chinese Spoken Language Processing (ISCSLP), 2018,
pp. 329–333.
5. V. Vestman, T. Kinnunen, R. G. Hautamäki, and M. Sahidullah, “Voice mimicry attacks
assisted by automatic speaker verification,” Comput. Speech Lang., vol. 59, pp. 36–54,
2020.
6. Z. Wu et al., “ASVspoof 2015: the first automatic speaker verification spoofing and
countermeasures challenge,” 2015.
7. H. Delgado et al., “ASVspoof 2017 Version 2.0: meta-data analysis and baseline
enhancements,” 2018.
8. Y. Yang et al., “The SJTU robust anti-spoofing system for the ASVspoof 2019 chal-
lenge,” in Interspeech, 2019, pp. 1038–1042.
9. R. Baumann, K. M. Malik, A. Javed, A. Ball, B. Kujawa, and H. Malik, “Voice spoof-
ing detection corpus for single and multi-order audio replays,” Comput. Speech Lang.,
vol. 65, p. 101132, 2021.
10. S. Nakagawa, L. Wang, and S. Ohtsuka, “Speaker identification and verification by com-
bining MFCC and phase information,” IEEE Trans. Audio. Speech. Lang. Processing,
vol. 20, no. 4, pp. 1085–1095, 2011.
11. M. Dua, R. K. Aggarwal, and M. Biswas, “GFCC based discriminatively trained
noise robust continuous ASR system for Hindi language,” J. Ambient Intell. Humaniz.
Comput., vol. 10, no. 6, pp. 2301–2314, 2019.
12. A. Mittal and M. Dua, “Static–dynamic features and hybrid deep learning models
based spoof detection system for ASV,” Complex Intell. Syst., vol. 8, pp. 1–14, 2021.
13. K. M. Malik, A. Javed, H. Malik, and A. Irtaza, “A light-weight replay detection frame-
work for voice controlled IoT devices,” IEEE J. Sel. Top. Signal Process., vol. 14, no. 5,
pp. 982–996, 2020.
14. A. Kuamr, M. Dua, and T. Choudhary, “Continuous Hindi speech recognition
using Gaussian mixture HMM,” in 2014 IEEE Students’ Conference on Electrical,
Electronics and Computer Science, 2014, pp. 1–5.
15. A. Mittal and M. Dua, “Constant Q cepstral coefficients and long short-term memory
model-based automatic speaker verification system,” in Proceedings of International
Conference on Intelligent Computing, Information and Control Systems, 2021,
pp. 895–904.
Various Audio Classification Models for Automatic Speaker 129
36. S. Ding, Q. Wang, S. Chang, L. Wan, and I. L. Moreno, “Personal VAD: Speaker-
conditioned voice activity detection,” arXiv Prepr. arXiv1908.04284, 2019.
37. A. Mittal and M. Dua, “Automatic speaker verification system using three dimensional
static and contextual variation-based features with two dimensional convolutional
neural network,” Int. J. Swarm Intell., vol. 6, no. 2, pp. 143–153, 2021.
38. J. Li, X. Zhang, M. Sun, X. Zou, and C. Zheng, “Attention-based LSTM algorithm for
audio replay detection in noisy environments,” Appl. Sci., vol. 9, no. 8, p. 1539, 2019.
39. M. Y. Faisal and S. Suyanto, “SpecAugment impact on automatic speaker verification
system,” in 2019 International Seminar on Research of Information Technology and
Intelligent Systems (ISRITI), 2019, pp. 305–308.
40. M. Dua, C. Jain, and S. Kumar, “LSTM and CNN based ensemble approach for spoof
detection task in automatic speaker verification systems,” J. Ambient Intell. Humaniz.
Comput., vol. 13, pp. 1–16, 2021.
41. S. Rupesh Kumar and B. Bharathi, “A novel approach towards generalization of
countermeasure for spoofing attack on ASV systems,” Circuits, Syst. Signal Process.,
vol. 40, no. 2, pp. 872–889, 2021.
9 Trending IoT Platforms
on Middleware Layer
Neha Katiyar and Priti Kumari
Noida Institute of Engineering & Technology
Surabhi Sakhshi
Indian Institute of Management
Jyoti Srivastava
Madan Mohan Malviya University of Technology
CONTENTS
9.1 Introduction................................................................................................... 131
9.2 Related Work................................................................................................. 132
9.3 IoT Platforms................................................................................................. 135
9.3.1 Functional Requirements................................................................... 137
9.3.2 Nonfunctional Requirements of IoT Platforms................................. 137
9.4 Categories of IoT Management Platform for Industries................................ 138
9.4.1 Device Management Platforms.......................................................... 138
9.4.2 IoT Application Management Platforms............................................ 139
9.4.3 Application Development Platforms.................................................. 139
9.5 Trending IoT Platform for Industry Revolution 4.0....................................... 139
9.6 Connectivity of IoT Platforms Middleware Layer Using 6G Technology..... 144
9.7 Conclusion..................................................................................................... 146
References............................................................................................................... 146
9.1 INTRODUCTION
Internet of Things (IoT) is the word that was first introduced to this world by Kevin
Mshton in 1999. IoT means ‘Internet’ is the network of networks, and connectivity
is needed to connect the things autonomously. It is expected that by 2020 around 60
million devices may be connected to the Internet. The IoT architecture consists of
different layers in it. The sensors and actuators layers, transit and communication
layer, middleware layer, and application layer. Middleware act as a bridge between
the network and applications. It is linked between the different software and is hid-
den between the OS and application layers. The application layer includes different
types of applications that can run on various IoT platforms. The basic principle IoT
follows is as we give commands by speaking, the device performs the same task as
unsafe level of the IoT system is the perception layer due to the physical disclosure
of the IoT. The IoT middleware layer platforms are also used in the healthcare sys-
tems for sending and detecting data of patients to forensics. Macro Conti et al. [12]
introduced the significant security and forensics issues in IoT with their potentially
promising solutions. They introduced special security, privacy, and protection chal-
lenges in IoT environments. In 2021, Jang et al. [16] focused on nonintrusive load
monitoring techniques. These techniques are beneficial and efficient for intelligent
energy systems. In this technique, they designed IoT system architecture that consists
of an application layer, perception layer, appliances layer, communication layer, and
middleware layer. They compare this generation technique with ILM (intrusive load
monitoring technique) because the energy consumption is more than the NILM (non-
intrusive load monitoring) technique. Moreover, the IoT middleware layer provides a
sustainable, innovative system that consumes low power. The computational require-
ment of the middleware layer is very high. In 2020, Swamy et al. [18] focused on
cloud, fog, and edge computing connectivity with IoT platforms. In this paper, they
summarized the IoT platform and IoT application architecture. They also focused on
real-time-based IoT systems. It uses various computing techniques. The middleware
layer is the abstract layer between the user interface and deployed devices.
9.3 IoT PLATFORMS
At a high level, an IoT platform supports software that interconnects each hardware,
access point, and data network to additional quality of the value chain. An IoT plat-
form is often referred to as a middleware solution, which is the plumbing of the IoT.
These platforms are a package that integrates devices and applications, as shown in
Figure 9.1. Middleware is the link between different software and applications. The
middleware system integrates the distributed application system with heterogeneous
network environments. The middleware layer connectivity with hardware and appli-
cations is shown in Figure 9.2. The layer is hidden between the OS and application
layers. It is connected to all types of devices. The kinds of middleware layer plat-
forms are formed, and their specifications given are as follows:
The platform hides the complex infrastructure and supports the enabled IoT solutions.
IoT platform increases the market value rate of the IoT sector. These platforms are
also called players of the market. The IoT platform market continues to provide
strong marketing businesses for IoT data-driven companies. The IoT platform mar-
ket period from 2015 to 2021. The Club and Group Activity Report (CGAR)’s annual
revenue was reaching $1.6 billion in 2021. IoT platform has some functional as well
as non-functional requirements in various industries. Functional requirements in the
industry such as healthcare and cloud storage.
Trending IoT Platforms on Middleware Layer 137
9.3.1 Functional Requirements
Functional requirement is the declaration of the intended operations of a system
and its parts. A plan should be designed in the form of functional requirements.
Functional requirements can be an instruction set for a device that gives you an idea
about assembling a device, which are explained as follows:
and monitoring and diagnostics in various industries. IoT creates management func-
tions consisting of enrollment or provisioning association, configuration software
updates, and overall management and control in industries. The device management
platform provides class-leading lifecycle management for industry development.
Cisco IoT Connect Cloud: Cisco IoT products provide various solutions to
3.
the IoT platforms users. This platform increased the production efficiency
of the commerce sector. This platform secures the commerce sector with
edge intelligence. This platform modernized the edge infrastructure. This
platform also reduces network congestion for a safer transport system.
Website: cisco.com.
Amazon AWS IoT Core Platforms: AWS core IoT will help device con-
4.
nectivity to the cloud. It manages all the cloud services AWS IoT connects
with the cloud and interacts with the other devices and cloud applications. It
provides a lightweight protocol such as MQTT and HTTP. It processes vast
amounts of data and messages. It is a secure and reliable platform for trans-
mitting messages to AWS endpoints and other services. These platforms
help users to communicate and track when not connected. Users can use the
different AWS services such as AWS Lambda and Amazon quick sight.
Website: Amazon AWS IoT core.
Salesforce IoT Cloud: this platform will help to set the targeted customers,
5.
partners, devices, and sensors with relevant actions. This platform is mainly
designed for digital marketing, automation, and market analytics. It allows
users to test ideas for business without any programming skills. It can easily
interpret the data from any device. It can give real-time traffic.
Website: Salesforce.com.
IBM Waston IoT: this platform will provide the facility to capture and
6.
interrogate data and devices, machines, and equipment and find out the
understanding for better decisions. IBM platform will work on optimiza-
tion processes and resources. It can provide a bidirectional communication
facility. It can have features of AI or analytics. It is the expertise of domains.
It offers better security solutions and captures real-time data access.
Website: ibm.com/Internet-of-things IBM WastonIoT.
Microsoft Azure IoT Suite: the platform is mainly designed according to
7.
industrial requirements. This platform is primarily used by manufactur-
ing to transportation to retail. It provides solutions for intelligent spaces,
remote monitoring, and connected products. This platform is very much
compatible. Skilled and unskilled people can use this platform. This
platform provides two solutions to open as an IoT or Sass and open-source
IoT templates.
Website: Microsoft Azure IoT suite, azure.microsoft.com.
Voracity Platforms Manage IRI Voracity: the massive, large databases. It
8.
is a fast, the adaptable platform for data searching, navigation, and reporting
device data. It is a small imprint for data manipulation in rapid aggregation
on the edges, it connects and integrates sensors, logs, and many more data
sources. It is used for data filtering, modification, mining, and reporting.
It runs on various platforms such as Linux, UNIX, and windows, from a
Raspberry Pi to a Z/Linux mainframe. Universal forwarder option for agile
composition and direct indexing techniques on Splunk for cloud analytics
and actions on the cloud IoT data.
Website: iri.com.
Trending IoT Platforms on Middleware Layer 141
9. Samsung Artik Cloud: this platform has the distinct feature of interoper-
ability. This platform dependency is based on hardware as a service. This
platform depends upon cloud Monetization with IoT devices. It can have
in-built security features for devices, applications, and a user-friendly envi-
ronment. It keeps the connectivity data with all the devices of the cloud. In
the future, it will be used in smart homes and IIoT.
Website: Samsung Artik.
10. ThingWorx: it maintains the management cycle of IoT applications. It can
provide features for quickly accessing data on IoT from off-premises and
off-premises from the hybrid environment. ThingWorx is compatible in
various aspects such as costs, visibility control, and improved connectivity
IIoTs. It can be used in IIoTs and cloud applications and can access the web
server’s data on-premises.
Website: ptc.com, ThingWorx.
11. Altair Smart Works: Altair brilliant works till the end of a process. It pro-
vides an end-to-end platform. It provides the forum as a service. It can have
an open architecture. Using this platform or intelligent networks, we con-
nect the devices such as sensors, features detection, and gateways machines.
It can provide good features and functionalities.
Website: altairsmartworks.com.
12. Oracle IoT: this is a much-preferred middleware platform used more effi-
ciently. Oracle IoT platform is more important for innovation as well as
animation of devices with IoT. It is simple and easy to access. Cloud systems
provide a two-way connection between the device and the cloud developed
with IoT technology. This platform architecture is designed to connect vari-
ous devices at the same time. This platform provides a very high-security
level.
Website: Oracle İoT.
13. SAP: SAP IoT platforms make business technology smarter. This IoT plat-
form uses power-driven business tools with a large volume of data and is
easily managed. SAP runs intelligent business processes autonomously at
the edge and orchestrates from the cloud. This platform also performs flex-
ible and reliable message processing. SAP has included features such as IoT
devices and integration services and provides scalable data for integration.
Website: www.cloud4c.com.
14. Itron: Itron platform uses the products and purpose of making energy-
efficient intelligent devices. This platform provides power-safe, reliable, and
resilient energy and water systems. This platform offers services to the cus-
tomer at a meager cost. This platform effectively manages all the resources.
Website: www.itron.com.
15. Predix: Predix is an intelligent IIoT platform used in the industries for
cloud formation and digital applications. This platform is used to secure
and scalable IoT. This platform is used for asset and operations performance
management in IIoT. This platform provides edge-to-edge connectivity,
data analytics, and data processing to many IoT initiatives.
Website: www.ge.com.
142 Intelligent Analytics for Industry 4.0 Applications
16. Deutsche Telecom: Deutsche telecom is the most versatile IoT platform.
This platform works on the SAAS; it is dependent upon the software as
a service solution. This platform is used for the transformation of classic
companies into digital service providers and enables them into new business
models in the easiest way. This platform is rapidly used by the automotive,
manufacturing, retail, and logistics industries.
Website: www.telekom.com.
17. Kaa IoT Platforms: Kaa is an open-source middleware platform. This
platform has the feature to complete at the end IoT solutions, interacting
application, and intelligent digital devices. The Kaa IoT platform comprises
a Kaa cluster control service, bootstrap service, operation service, and third-
party components such as zookeeper, SQL database, and No SQL database.
Kaa IoT platforms are also called next-generation platforms because of
internode communication methods.
Website: www.kaaiot.com.
In Table 9.1, the IoT platform is taken from 2008 to 2021. Their working procedure
and websites and the development procedure. Reference model for IoT middleware –
IoT is done with the makeover of beautiful scenarios and presented where gadgets
are used to study user requirement and act accordingly to improve experience and
quality of life. Middleware platform that integrates data from several devices and acts
accordingly. Due to this reason, the IoT middleware layer is present in IoT scenarios.
The middleware platform is the most intelligent and responsible part of IoT. The
requirements of IoT platforms should be represented by IoT architecture. Some prob-
lems that are faced by the middleware layer on IoT are as follows:
17. Kaa IoT Platform 2021 Kaa IoT platform provides better speed in the case of IoT implementation. It provides www.kaaiot.com
a comprehensive set of IoT Features. It includes onboard IoT analytics.
144 Intelligent Analytics for Industry 4.0 Applications
satellites. The continuous connectivity required a high bandwidth network. The high
bandwidth network is coming with the advancement of many features, so this net-
work is called the future network. In this era, the future network is 6G and 5G. The
6G network connectivity maintains the connectivity of the IoT platform in the proper
way. IoT platform connectivity with this network makes it more efficient, relevant,
and accurate. The connectivity of a 6G network with IoT platforms speeds up the
process and provides the best services to the user. This chapter presents a proposed
structure of 6G network connectivity with the IoT platform’s middleware layer. This
proposed structure helps to perform more experiments with IoT platforms, their net-
work connectivity, bandwidth, and changes in the venue. This model allows you to
accomplish the performance objective, which are little packets of network and faster
channel access for low latency and multidimensional links involving multiple access
channel reliability and connectivity. The 6G networks have subnetworks, hyper-spe-
cialized slicing, and rancor coverage. This network has advanced paradigms regard-
ing new security, protection, privacy, and policy. The 6G network blindly supports
long-tailored solutions and mobile network features as a platform. The 6G network
is compatible with IoT platforms using future state prediction, correlation recovery,
proactive exploration, and self-learning. The proposed model shows the 6G net-
work’s extensive connectivity, consisting of satellites, towers, fiber optic, telecom-
munication orders, and IoT platforms connectivity with the network and end users
with the middleware layer in Figure 9.3. This model consists of IoT platforms used
by smart cars.
FIGURE 9.3 IoT middleware layer connectivity with 6G network Internet access procedure.
146 Intelligent Analytics for Industry 4.0 Applications
9.7 CONCLUSION
This chapter examined the main issues faced by the IoT middleware. Thus, we high-
light the middleware approach depends on their functional and nonfunctional tech-
niques and discuss the different platform approaches. This research provides an idea
about the pros and cons of the existing middleware approaches. It highlights the main
problem to deal with yet not well explored, such as security, privacy bootstrapping,
and reliability. The middleware platform developers provide extra time to make them
more user-friendly without compromising safety, as usability with a certain degree of
quality might be the key to prosperity in the crowded market. In the future, the con-
nectivity of IoT platforms is increased with the latest networks such as 7G or 8G to
make the ecosystem and society smarter. In future, the industry become fully auto-
mated these fully automated industries gave the birth to Industry 4.0. In automated
industries, the advanced network is required such as 6G, 7G, and 8G. These networks
are installed in the industries by applying routers at different locations, RFID tags,
sensors, etc. In this chapter, we have only given the idea of network connectivity, but
many more experiments are performed in this regard.
REFERENCES
1. da Cruz, M.A., Rodrigues, J.J.P., Al-Muhtadi, J., Korotaev, V.V., and de Albuquerque,
V.H.C., 2018. A reference model for internet of things middleware. IEEE Internet of
Things Journal, 5(2), pp. 871–883.
2. Fersi, G., 2015 June. Middleware for the internet of things: A study. In 2015 International
Conference on Distributed Computing in Sensor Systems (pp. 230–235). IEEE.
3. Pallavi, K.N., Kumar, R., and Kulal, P., 2019. Study of security algorithms to secure
IOT data in middleware. In Proceedings of the 2nd International Conference on Green
Computing and Internet of Things, ICGCIoT 2018. VVCE.
4. Kokkonis, G., Chatzimparmpas, A., and Kontogiannis, S., 2018 September. Middleware
IoT protocols performance evaluation for carrying out clustered data. In 2018 South-
Eastern European Design Automation, Computer Engineering, Computer Networks
and Society Media Conference (SEEDA_CECNSM) (pp. 1–5). IEEE.
5. Silva, J.D.C., Rodrigues, J.J.P., Saleem, K., Kozlov, S.A., and Rabêlo, R.A., 2019.
M4DN. IoT-A networks and devices management platform for internet of things. IEEE
Access, 7, pp. 53305–53313.
6. Sandor, H., Genge, B., Haller, P., and Bica, A., 2019 June. A security-enhanced interop-
erability middleware for the internet of things. In 2019 7th International Symposium on
Digital Forensics and Security (ISDFS) (pp. 1–6). IEEE.
7. Bakhshi, Z., Balador, A., and Mustafa, J., 2018 April. Industrial IoT security threats
and concerns by considering Cisco and Microsoft IoT reference models. In 2018
IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
(pp. 173–178). IEEE.
8. Hoffmann, J.B., Heimes, P., and Senel, S., 2018. IoT platforms for the Internet of pro-
duction. IEEE Internet of Things Journal, 6(3), pp. 4098–4105.
9. Yadav, E.P., Mittal, E.A., and Yadav, H., 2018 February. IoT: Challenges and issues in
Indian perspective. In 2018 3rd International Conference on Internet of Things: Smart
Innovation and Usages (IoT-SIU) (pp. 1–5). IEEE.
10. Yu, J.Y. and Kim, Y.G., 2019 January. Analysis of IoT platform security: A survey.
In 2019 International Conference on Platform Technology and Service (PlatCon)
(pp. 1–5). IEEE.
Trending IoT Platforms on Middleware Layer 147
11. Frustaci, M., Pace, P., Aloi, G., and Fortino, G., 2017. Evaluating critical security issues
of the IoT world: Present and future challenges. IEEE Internet of Things Journal, 5(4),
pp. 2483–2495.
12. Conti, M., Dehghantanha, A., Franke, K., and Watson, S., 2018. Internet of Things
Security and Forensics: Challenges and Opportunities.
13. Viswanathan, H. and Mogensen, P.E. (2020). Communications in the 6G era. IEEE
Access, 8, pp. 57063–57074. https://doi.org/10.1109/ACCESS.2020.2981745
14. Barakat, B., Taha, A., Samson, R., Steponenaite, A., Ansari, S., Langdon, P. M., Wassell,
I. J., Abbasi, Q. H., Imran, M. A., and Keates, S. (2021). 6G Opportunities Arising from
the Internet of Things Use Cases: A Review Paper, 1–29.
15. Nawaz, S.J. and Member, S. (2021). Non-coherent and backscatter communications:
Enabling ultra-massive connectivity in 6G wireless networks. IEEE Access. https://doi.
org/10.1109/ACCESS.2021.3061499
16. Jang, H. S., Jung, B. C., and Member, S. (2021). Resource-hopping based grant-free
multiple access for 6G-enabled massive IoT networks. IEEE Internet of Things Journal,
8(20), pp. 15349–15360. https://doi.org/10.1109/JIOT.2021.3064872
17. Nkenyereye, L. and Hwang, J. (2021). Virtual IoT service slice functions for multi-
access edge computing platform. IEEE Internet of Things Journal, 8(14), pp. 11233–
11248. https://doi.org/10.1109/JIOT.2021.3051652
18. Swamy, S. N. and Kota, S. R. (2020). An empirical study on system level aspects of
internet of things (IoT). IEEE Access, 8, pp. 188082–188134. https://doi.org/10.1109/
access.2020.3029847
10 A Factual and Feasible
Healthcare IoT
Munesh Singh
PDPM IIITDM
CONTENTS
10.1 Introduction................................................................................................... 150
10.2 Applications................................................................................................... 151
10.2.1 Smart Grids........................................................................................ 151
10.2.2 Smart Flights..................................................................................... 151
10.2.3 Smart Agriculture and Farming........................................................ 151
10.2.4 Smart Manufacturing........................................................................ 151
10.2.5 Smart Cities....................................................................................... 151
10.2.6 Shopping and Retail........................................................................... 153
10.2.7 Smart Healthcare............................................................................... 153
10.2.8 Smart Vehicles................................................................................... 154
10.3 Related Works................................................................................................ 154
10.4 Healthcare IoT............................................................................................... 154
10.5 IoT Analytics in Healthcare........................................................................... 156
10.6 Benefits.......................................................................................................... 158
10.6.1 Real-Time Reporting and Monitoring............................................... 158
10.6.2 End-to-End Connectivity and Affordability...................................... 158
10.6.3 Data Assortment and Analysis.......................................................... 158
10.6.4 Tracking and Alerts........................................................................... 158
10.6.5 Remote Medical Assistance.............................................................. 158
10.7 Challenges..................................................................................................... 158
10.7.1 Data Security and Privacy................................................................. 158
10.7.2 Integration of Multiple Devices and Protocols.................................. 159
10.7.3 Data Overload and Accuracy............................................................. 159
10.7.4 Cost.................................................................................................... 159
10.8 Suggested Framework.................................................................................... 159
10.9 Conclusion..................................................................................................... 162
References............................................................................................................... 162
10.1 INTRODUCTION
Modern social and economic trends, such as the Sustainable Agenda 2030 granted
by the United States [1], aim to boost the nature of well-being conditions to increase
life expectancy. Real-time implementation of this agenda has been made possible by
recent technological breakthroughs. To do this, several focused technological efforts
have been implemented. For instance, one such program is “Healthcare 4.0,” which
is being created in response to the advent of maintaining the digital well-being stan-
dard for healthcare services [2]. Additionally, recent technological advancements
have made it possible to remotely and automatically monitor healthcare services
using medical equipment that are designed to keep track of a patient’s numerous
health issues. It is important to note that these gadgets operate independently and
are devoted to particular health issues. Industry 4.0, which over the previous decades
had made the healthcare industry increasingly digital, gave rise to “Healthcare 4.0.”
For instance, X-rays, MRI, and ultrasound scans have all evolved into computer
tomography and electronic medical records, respectively [3]. Caretakers and medical
professionals utilize these user-centered gadgets to monitor and treat patients’ medi-
cal issues as well as provide preventative care and wellness solutions. The usage of
things in the Internet of Things (IoT) technology and their respective applications
are expanding rapidly. As a result of recent technological advancements, such as
industrial Internet of Things (IIoT) and industrial cyber-physical systems (ICPSs) [4]
predicted that by the end of 2021, there will be 212 billion IoT devices and apps, with
healthcare accounting for around 41% of their total usage. In addition, Grand View
Research [5] estimates that by 2025, the healthcare IoT industry would be valued at
USD 534.3 billion. The major motive behind this technology-driven application in
healthcare is to provide better and reliable assistance along with dynamic healthcare
operations by remotely and continuously regulating the patients’ varied health prob-
lems [6–8].
This study has provided the essential components of HIoT (Healthcare IoT) to
enable medical personalization of the traditional healthcare system as opposed to
the current ones that merely support any technical assistance. Thus it offers various
contributions; to promote clinical personalization, the authors contextualized HIoT
(Healthcare 4.0) to define unique complete customized healthcare services (CPHS).
Various measuring parameters of the HIoT are determined. As an illustration of con-
temporary HIoT, a use-case scenario has been provided. To establish the identified
HIoT requirements in every layer of the suggested architecture, proper investigation
and analysis points have been noted. Finally, dependable, robust, real-time, com-
plete, individualized healthcare services, which solve the stated shortcomings of the
current methodologies, are discussed in the framework section.
The remaining sections are structured as follows: various applications of the IIoT
are discussed in Section 10.2. Section 10.3 derives some of the related works. The
introduction to the personalization of healthcare IoT depicted is in Section 10.4. The
analytics for the IoT-based healthcare systems, their many levels, and current ini-
tiatives to define criteria for contemporary customized services are all described
in Section 10.5. Major advantages and disadvantages are derived in Section 10.6.
Similarly, Section 10.7 elaborates on the suggested framework. Finally, Section 10.8
brings our chapter to a close with the conclusion and some of the future aspects.
Healthcare IoT 151
10.2 APPLICATIONS
It is the height of automation. Every tangible item that exists becomes empowered
and linked in an enterprise setting. A new generation of appealing automation is
coming. The IT landscape with cloud technology has taken an important place
thanks to its unstoppable ability to rapidly and simply accomplish the long-standing
aim of infrastructure optimization. The integration of diverse systems and sensors is
the main challenge. In order to make decisions, it is also critical to draw conclusions
from streaming data from all sources. IoT applications are not constrained to a single
category since they may be implemented in any type of equipment depending on the
situation [9]. Electrical, mechanical, physical, and electronic components with smart
labels, barcodes, LED lights, beacons, and pads are the main elements present in any
IoT ecosystem. The sections that follow explain the most well-known and significant
business, consumer, and individual use cases that have emerged from all the many
IoT-related innovations (Figure 10.1).
10.2.1 Smart Grids
It is a networked gadget that measures a building or home’s use of energy, water, or
natural gas. Due to the effectiveness of smart grids, power providers began using
them instead of traditional meters to measure overall usage.
10.2.2 Smart Flights
The fusion of artificial intelligence (AI) and IoT works together to maximize advan-
tages while minimizing expenses for the passengers. Adding AI to jet engines,
the new C-series airliner featured the geared turbofan (GTF) engine from Pratt &
Whitney with 5,000 sensors that could generate up to 10 GB of data per second.
10.2.4 Smart Manufacturing
Supply chain management and intelligent logistics are both used by the IIoT.
10.2.5 Smart Cities
Smart cities, which are described as municipalities that employ data and communi-
cation technology to improve operational efficiency, exchange information, and the
standard of public services, are made possible by the IoT. The IoT can be used for
the several problems such as long wait times to find parking; exceeding emissions
152 Intelligent Analytics for Industry 4.0 Applications
Smart Grids
Smart Flights
Real-time
Monitoring
Smart Farming
Real-time
Maintenance
Efficient
Monitoring
Traffics and
Smart Cities
Pollution Control
Real-time
Smart Home
Monitoring
Tracking Staff,
Patients and
Inventory
Smart Healthcare
Remote Health
Monitoring
Auto Insurance
Transports and
Logistics
thresholds; and unauthorized parking. To save needless emissions and traffic, one
must choose to park straight away in a nearby garage rather than driving about
the city center looking for an on-street spot. Better monitoring cities can automate
Healthcare IoT 153
10.2.7 Smart Healthcare
IoT improves supply chain management and rationalizes asset tracking. The use of an
inventory management system allows individuals to locate necessary tools quickly.
Patients may be able to receive remote health monitoring instead of going to the
emergency department in some circumstances. The most common use in healthcare
is remote health monitoring.
10.2.8 Smart Vehicles
Making driving safer by using sensors, businesses created technology that incorpo-
rates sensors into smartphones to analyze driving habits. Data collection allows the
app to provide training for safer driving (Figure 10.2).
Embedded
to body
devices
Components
External
smart of Solutions
for health
medical
appliances Healthcare monitoring
IoT
Stationary
smart
medical
devices
healthcare. The IoT components in healthcare are shown in Figure 10.4. According
to current customized healthcare is a service that adapts medical care to specific
people by identifying common traits as such genetics, heredity, and lifestyle [13]. The
patient’s total health, which necessitates an awareness of the biological relationships
156 Intelligent Analytics for Industry 4.0 Applications
Home-
Mobile
based
Devices
devices
Health Web
Records Resources
among many health disorders, cannot be personalized using this approach, which
only assistances to personal specific health issues. Additionally, the specifics of
personalized healthcare vary depending on the patient because every person has
a different set of health condition determinants and traits, which are essential for
maintaining a person’s personalized health. By minimizing the negative impacts of
the patient’s many medical problems (such as heart disease, high blood pressure,
or insulin resistance), element-based optimization seeks to enhance the patient’s
overall long-term health. Establishing a comprehensive customized healthcare ser-
vice for patients and enhancing their enduring health may be made feasible through
Healthcare 4.0 (Figures 10.5 and 10.6).
state. It must first be treated before it can be used. There are sensor, network, and
decision layers in a typical IoT design. Data from the environment are collected by
the sensor layer and sent to the processing layer across the network [14]. Data analysis
is carried out in this instance to assist the decision layer in drawing judgments. Data
analytics is hence the IoT’s foundation. IoT researchers have always found the health-
care industry to be an attractive business. Additionally, the global lack of medical
experts has fueled the expansion of such studies.
The following reasons for the numerous healthcare procedures that may be
optimized as a result of a strong and rapid data analysis of an IoT system:
Disease diagnosis: the physiological data, including blood pressure, body tem-
perature, and others, acquired by wearable IoT devices can be utilized to diagnose
diseases faster, in addition to other test results (urine tests, blood tests, magnetic
resonance imaging [MRI] scans, etc.).
Health prevention and lifestyle management: the treatment of a chronic patient’s
lifestyle is aided by routine analysis of data about behavioral elements of a person,
such as sleep patterns, eating habits, and daily physical activity. A healthy person
may be informed of the diseases they may be at risk for owing to their present life-
style by such an examination.
Medical emergency: if an abnormality in the physiological data is quickly identi-
fied, an emergency (such as an old person falling and fainting in his or her home) can
be effectively managed. The elderly and those with terminal illnesses will benefit the
most from this (Figure 10.7).
Remote real-time health monitoring: real-time health monitoring is one of the
main analysis applications in the healthcare industry. IoT sensors gather and transmit
the patients’ physiological data. The data are then immediately examined. Every
time a deviation from the usual pattern is found, a thorough report is sent to the
patient’s healthcare provider for additional investigation.
To enable IoT systems and applications to behave adaptively, these collected
and aggregated insights may be looped back into them. In other words, data-driven
insights enable hardware and software to act intelligently. IoT data must be meticu-
lously collected since it conceals a range of useful patterns, correlations, recommen-
dations, information, knowledge, etc.
10.6 BENEFITS
10.6.1 Real-Time Reporting and Monitoring
In the case of a medical emergency, real-time monitoring via associated devices can
save a million lives. Connected devices can gather important medical and health-
related data when real-time condition monitoring is implemented using a smart
medical device connected to a smartphone app. The IoT-connected gadget gathers
and transmits health data, including measurements of various body parameters. The
information is kept in the cloud and can be sent to a person who has been permitted
to view it which is made available ubiquitously.
10.7 CHALLENGES
10.7.1 Data Security and Privacy
This is a major issue that IoT is now facing. Real-time data collection is not possible
unless it is complying with data standards with protocols. Regarding ownership and
control of data, there is a lot of confusion. False health claims and the fabrication of
Healthcare IoT 159
phony IDs for prescription purchases and sales are two instances of how IoT device
data have been misused.
10.7.4 Cost
IoT app development for healthcare mobility solutions, costs are one of the bigger
difficulties. However, if the IoT solution addresses a real problem, the expenses are
justified. Even though the investment of a lot of resources and money into develop-
ing an IoT application, the benefits will be enormous when a company uses IoT to
improve business processes, generate more income streams, and open up new busi-
ness options while also saving time and labor costs.
• Things Layer: This stage in the HIoT refers to sensing systems and appa-
ratus that, depending on the application, record the different values seen
from various sources (for example, apparatus monitoring patients’ various
body parts or health issues). These sensors are designed to gather data from
a patient’s body related to their ailment. The devices and sensors mentioned
above collect information from the patient’s body and, in some cases, send
it to the data center. Some responsive sensors have devices that keep track
of the relevant body parameters.
• Communication Layer: The communication layer is viewed as the founda-
tion of IoT systems. IoT devices generate a substantial amount of continu-
ous data that are challenging to transmit and store. All of the data are sent
from the things layer to the application layer through the communication
layer. An appropriate communication medium is required to convey data
from all of the Things layer nodes to the other layers of the system. The
communication medium may be wireless (WiFi, Bluetooth, RFID, 5G, etc.)
or wired, depending on the communication protocol developed (Ethernet,
USB, etc.).
• Application Layer: The application layer focuses on delivering top-notch
healthcare services and directly connects the end user to the cloud-based
IoT platform. HIoT is a network of interconnected hardware, software,
devices, and services. Their use is expanding tremendously as a result
of network improvements. These are employed by healthcare workers to
process and analyze data to make decisions and treat patients. The IoMT
in hospitals often focuses on enhancing patient safety and/or streamlin-
ing procedures. It makes it possible for practitioners to collaborate across
disciplinary lines to provide tailored patient care. The application layer
serves two purposes by offering: On the one hand, monitoring the body
parameters and aiding in the supervisory decisive outcome; on the other,
support applications serve as user interfaces for a variety of health moni-
toring equipment. To enable tailored healthcare services, many methodolo-
gies have been created.
To achieve the objective of the overall system there is a fusion made between wear-
able and mobile technology. When needed, the system provides both residents with
cognitive difficulties with immediate help through their wearable gadgets. Automatic
alerts are sent to carers in potentially dangerous circumstances. The discussed meth-
odology consists of different elements to guarantee the operational dependability of
correlated healthcare IoT services and applications to provide individual services.
Figure 10.8 depicts the workflow of the personalized HIoT system for all-encom-
passing personalized healthcare. Data are gathered at the IoT cloud and delivered to
the concerned predictive model, where it is stored, from various monitoring devices
used by patients, such as heart rate, temperature, blood pressure monitor, etc. Data
Healthcare IoT 161
that have been stored are processed using various predictive methods and disease
models. To create the personalized HIoT system for all-encompassing personalized
healthcare, there are several obstacles to overcome.
Additionally, the monitor offers clinical reasoning to precisely pinpoint the ori-
gin of the disparity. Once the disparity has been located, the monitor may treat it
appropriately, and the treatment’s results can then be observed. The monitor remotely
and automatically manages an individual’s numerous physical conditions based on
clinical features. The clinical medication enables the monitoring process to be self-
conscious, which promotes the provision of healthcare services free from incorrect
diagnoses.
Modeling health problems is a difficult undertaking since it calls for deter-
mining the many clinical relationships between the various patient health states.
However, these dependencies are frequently complex and rely on knowledge of the
circumstances’ underlying variable-level biological processes, which are mostly
unknowable. To focus the various healthcare services based on their clinical fea-
tures, a library of distinct health problems (models) will be created that may sub-
sequently be employed in any computerized healthcare system. The library will
also aid in discovering further connections between multiple fitness disorders
which are normally outside the scope of concerned professionals. Additionally,
based on the models, it will be possible to describe the newly discovered depen-
dencies in a way that both practitioners and machines can comprehend. Similarly,
predictive approaches can be used to compare the data of many patients with
comparable illnesses to better comprehend health issues, leading to the recom-
mendation of a more individualized prognosis and therapy that will efficiently
enhance patients’ health. In several facets of healthcare, AI is essential. AI is
now employed for data gathering, communication, and monitoring at the things,
communication, and navigation levels, respectively. Due to its expandability and
trust concerns, machine-based prediction is not yet totally safe for diagnostic and
treatment purposes. As a result, essential healthcare fields do not yet completely
trust smart diagnosis systems.
162 Intelligent Analytics for Industry 4.0 Applications
10.9 CONCLUSION
Numerous industrial segments are seeing advancements because of the Internet of
Things. Healthcare is one of the sectors that has embraced this prospect the quickest,
opening up a new market-centered on HIoT. This fact inspired the authors to create
a thorough survey to evaluate the condition of the field. The most recent HIoT arti-
cles and products were found, explained, and examined to achieve this aim. Several
HIoT services and apps address societal demands but are becoming more isolated.
Based on the collected sensor data, healthcare IoT is a collection of various IoT tech-
nologies and devices used to support individual health. Healthcare IoT offers indi-
vidualized services using a single person’s gadgets. Users require a comprehensive
system to fulfill the strict requirements of health monitoring. Since the integration
of diagnostic and therapeutic processes is crucial, information should be maintained
in a manner that is simple to access and convey. An effective IoT framework for the
healthcare environment describes how to combine patient information for caregivers
and report patient progress using the technologies now employed in the healthcare
system. Patients’ physical and mental health may improve as a result of less expense
and in less time.
Additionally, healthcare professionals, experts, and the general public with an
interest in HIoT can use this document as a resource for information. However, this
analysis does not offer a thorough grasp of several essential subjects, such as HIoT
topologies, architectures, and platforms, as well as the requirements, difficulties, and
suggested security models. Other technologies, such as big data, augmented reality,
and cognitive systems, which are not included in this analysis but might be investi-
gated further, exist.
REFERENCES
1. Lee, B. X., Kjaerulf, F., Turner, S., Cohen, L., Donnelly, P. D., Muggah, R., & Gilligan,
J. (2016). Transforming our world: implementing the 2030 agenda through sustainable
development goal indicators. Journal of Public Health Policy, 37(1), 13–31.
2. Gupta, R., Bhattacharya, P., Tanwar, S., Kumar, N., & Zeadally, S. (2021). GaRuDa: a
blockchain-based delivery scheme using drones for healthcare 5.0 applications. IEEE
Internet of Things Magazine, 4(4), 60–66.
3. Bercovich, E., & Javitt, M. C. (2018). Medical imaging: from roentgen to the digital
revolution, and beyond. Rambam Maimonides Medical Journal, 9(4), e0034.
4. Giri, A., Dutta, S., Neogy, S., Dahal, K., & Pervez, Z. (2017, October). Internet of
Things (IoT) a survey on architecture, enabling technologies, applications and chal-
lenges. In Proceedings of the 1st International Conference on Internet of Things and
Machine Learning (pp. 1–12).
5. Hanson, K., & Goodman, C. (2017). Testing times: trends in availability, price, and
market share of malaria diagnostics in the public and private healthcare sector across
eight sub-Saharan African countries from 2009 to 2015. Malaria Journal, 16(1), 1–16.
6. Ramson, S. J., Vishnu, S., & Shanmugam, M. (2020, March). Applications of Internet of
Things (IoT)–an overview. In 2020 5th International Conference on Devices, Circuits
and Systems (ICDCS) (pp. 92–95). IEEE.
7. Zhan, K. (2021). Sports and health big data system based on 5G network and Internet of
Things system. Microprocessors and Microsystems, 80, 103363.
Healthcare IoT 163
8. AlShorman, O., AlShorman, B., Alkhassaweneh, M., & Alkahtani, F. (2020). A review
of internet of medical things (IoMT)-based remote health monitoring through wearable
sensors: a case study for diabetic patients. Indonesian Journal of Electrical Engineering
and Computer Science, 20(1), 414–422.
9. Vyas, S., Gupta, M., & Yadav, R. (2019, February). Converging blockchain and
machine learning for healthcare. In 2019 Amity International Conference on Artificial
Intelligence (AICAI) (pp. 709–711). IEEE.
10. Vergutz, A., Noubir, G., & Nogueira, M. (2020). Reliability for smart healthcare: a
network slicing perspective. IEEE Network, 34(4), 91–97.
11. Zhang, J., Li, L., Lin, G., Fang, D., Tai, Y., & Huang, J. (2020). Cyber resilience in
healthcare digital twin on lung cancer. IEEE Access, 8, 201900–201913.
12. Yan, C., Duan, G., Zhang, Y., Wu, F. X., Pan, Y., & Wang, J. (2020). Predicting drug-
drug interactions based on integrated similarity and semi-supervised learning. IEEE/
ACM Transactions on Computational Biology and Bioinformatics.
13. Singh, D., Mishra, P. M., Lamba, A., & Swagatika, S. (2020). Security issues in dif-
ferent layers of IoT and their possible mitigation. International Journal of Scientific &
Technology Research, 9(4), 2762–2771.
14. Qadri, Y. A., Nauman, A., Zikria, Y. B., Vasilakos, A. V., & Kim, S. W. (2020). The
future of healthcare internet of things: a survey of emerging technologies. IEEE
Communications Surveys & Tutorials, 22(2), 1121–1167.
15. Fani, M., Rezayi, M., Meshkat, Z., Rezaee, S. A., Makvandi, M., & Angali, K. A.
(2020). A novel electrochemical DNA biosensor based on a gold nanoparticles-reduced
graphene oxide-polypyrrole nanocomposite to detect human T-lymphotropic virus-1.
IEEE Sensors Journal, 20(18), 10625–10632.
11 IoT-Based Spacecraft
Anti-Collision HUD
Design Formulation
Bibhorr
IUBH International University
CONTENTS
11.1 Introduction................................................................................................... 165
11.2 Related Work................................................................................................. 166
11.3 Cyber-Physical Networks in Space................................................................ 166
11.4 Spacecraft Anti-Collision System Design..................................................... 167
11.4.1 Traffic Identification Design.............................................................. 168
11.4.2 Density Evaluation Model................................................................. 169
11.4.3 Risk Assessment Model..................................................................... 170
11.4.4 Safe Trajectory Planning Model........................................................ 171
11.4.5 Heads-Up Display System................................................................. 173
11.5 Conclusion and Future Scope........................................................................ 173
References............................................................................................................... 174
11.1 INTRODUCTION
The Earth’s orbit is becoming increasingly congested. Reusable rockets and
increasingly powerful smallsats are decreasing the obstacles to accessing and using
space. In the previous decade, the cost of commercial launches has decreased by a
factor of 20 [1]. Increased space activity has resulted in a significant increase in the
number of objects in space and this is only expected to grow exponentially in the
future. As the number of objects in Earth’s orbit grows, the chances of a satellite col-
liding with space junk or another satellite are increasing [2]. The distribution of space
objects whether vehicles, satellites, debris, etc. is also varied with some areas in the
space with a high density of these space objects while others with moderate to low
density. The density of space traffic elements is therefore a crucial factor in determin-
ing the traffic scenario and subsequent maneuvering of vehicles. In practical applica-
tions of AI-controlled spacecrafts and trajectory planning integrated autonomous
systems, maneuvering these in an area with obstructions in the path is challenging
and requires advanced capability in these systems other than the very basic feature
of ability to avoid collisions with other space elements, viz., other spacecrafts, debris,
or space devices orbiting for any other experimental purposes. Increased space activ-
ity can significantly aggravate the space debris situation [3]. After 60 years of space
DOI: 10.1201/9781003321149-11 165
166 Intelligent Analytics for Industry 4.0 Applications
activities, the orbital population appears to be unevenly distributed, with more than
90% of the recorded objects being nonfunctional i.e., orbital garbage. Furthermore, a
large number of active spacecrafts lack a propulsion engine and hence are unable to
maneuver to prevent accidents [4].
Due to technological and political concerns, the space traffic control model has
historically been presented in a vague, confusing, and imprecise way [5]. The notion
of space traffic management is complicated. It is critical to design a model capable
of successfully and efficiently regulating flightpath for collision prevention before
constructing a comprehensive space traffic management system [6].
With an increased number of space objects, the collision probability has increased
manifold. Because of the growing quantity of space objects, space is becom-
ing increasingly congested. It is a given fact that the number of objects in space
surrounding the Earth will continue to grow in the near future, increasing the like-
lihood of a collision, communication failure, or other undesired occurrences [7].
To mitigate the collision risk, it is therefore crucial to assess the collision probability
and associated collision risk with high precision and much before the elements come
close enough to appropriately maneuver and change the trajectories of the involved
controllable elements.
computing, running applications remotely in the cloud, etc., founded upon satellite-
based futuristic models.
The work takes into consideration this model where a heavy server-mounted satel-
lite is theoretically hypothesized to interact with other satellites to gather and ana-
lyze their data and conduct overhead edge computing. This model guarantees the
Earth Observation (EO) satellite data to be distributed, stored, and processed into
instantly useable images and then sent directly to grass root users. Figure 11.1 depicts
such a cyber-physical network that comprises the integration of IoT-integrated satel-
lites, AI-enabled high-altitude platforms, terrestrial network communication, ground
communication, remote-sensing satellite networks, communication, and astronomi-
cal satellite networks.
FIGURE 11.2 An illustration depicting traffic identification design where the image is first
scanned, and the visual elements are recognized postcomputing.
IoT-Based Spacecraft Anti-Collision HUD Design Formulation 169
FIGURE 11.3 Progression at various layers in computing processes over a time period (t).
amount of processing resources to compute. When there is a huge data collection and
it is needed to decrease the amount of physiognomy without accommodating any loss
of critical or relevant information, extracting the features is a handy strategy. Most
of the information in the original set of features is summarized through a new and
smaller collection of features, which are further classified.
Figure 11.3 shows the progression at various layers in the computing process,
which initiates from the point of image scanning and results in the identification of
the image. Meanwhile, the features are extracted and the data obtained are matched
with predefined elements and parameters.
FIGURE 11.4 Plot for dynamic density; the region zoomed in the figure depicts three-time
frames with reduced traffic elements at each point.
dT = f ( t , a, n ) (11.1)
n + ∆n
dT = (11.2)
a3
where Δn is the change in traffic elements observed over a period of time t.
The dynamic density dT is visualized, to the pilot, in HUD screen in the form of a
continuously varying graphical plot whose Y-axis denotes the density variations and
X-axis denotes the time. This graphical plot is depicted in Figure 11.4.
na
P(C ) = (11.3)
nt
where na implies the number of traffic elements tested for collision and nt indicates
the total number of traffic elements present in the rendered frame.
IoT-Based Spacecraft Anti-Collision HUD Design Formulation 171
All na elements account for maximum collision risk since they confirm their
p resence in the congested zone. The total array of elements present in the congested
zone is given as follows:
while the total of all the elements present in the frame is indicated as follows:
n!
Cr = (11.6)
r ! ( n − r )!
n
Z = { x , y, z } (11.7)
As shown in Figure 11.6, four FFT vertices are identified, two along dt and two
along Dt. An imaginary quadrilateral simulation is then established by extending
lines through vertices and aligning the rest dimensions. Post the establishment of the
empty zone ze, safe zone zs is computed using the following formula:
zs = ( ze ) (11.8)
where f ( ze ) = k ze (11.9).
S = { x n , yn , zn } (11.10)
The safe trajectory ts is confined in the safe flight zone zs. The safe trajectory is a
function of time period T0+J where T0+J signifies the time period that guarantees that
the spacecraft would maneuver uninterruptedly through the safe flight zone path
until the clearance of all the associated risks.
effective management of space traffic. The model focuses on safe trajectory planning
by computing a safe zone from the previously constructed empty zone present inside
the three-dimensionally distended frame. The model also presented a risk assess-
ment technique for maximum risk evaluation and for computing risk probability
based on spacecraft combinations. The model proves trustworthy for assessing risks
and planning trajectories with multiple possibilities of integration with IoT-based
equipment and systems without engineering conditionalities. Work is underway to
upgrade the performance scenario of the anti-collision system design and to also
incorporate additional mathematical models under a laboratory test environment.
The model incepted in this research could be used for modeling and simulations
of space traffic management in real-world scenarios. The research delves into the
AI-rested mathematical models for assessing the dangers and risks of space traf-
fic crashes and extends the research into the field of aerospace engineering. The
research would serve as a foundation for future research on preventing and con-
trolling space traffic collisions and accidents. This research also provides new and
futuristic insights into space traffic management highlighting the all-inclusive model.
REFERENCES
1. Jones, H. (2018). The recent large reduction in space launch cost. In 48th International
Conference on Environmental Systems, pp. 1–10, 8–12 July 2018, Albuquerque, New
Mexico.
2. Patera, R. P. (2001). General method for calculating satellite collision probability.
Journal of Guidance, Control, and Dynamics, 24(4), 716–722.
3. Muelhaupt, T. J., Sorge, M. E., Morin, J., & Wilson, R. S. (2019). Space traffic manage-
ment in the new space era. Journal of Space Safety Engineering, 6(2), 80–87.
4. Bonnal, C., Francillout, L., Moury, M., Aniakou, U., Dolado Perez, J.-C., Mariez, J., &
Michel, S. (2020). CNES technical considerations on space traffic management. Acta
Astronautica, 167, 296–301.
5. Johnson, N. L. (2004). Airspace complexity and its application in air traffic manage-
ment. Space traffic management concepts and practices. Acta Astronautica, 55(3–9),
803–809.
6. Ailor, W. H. (2006). Space traffic management: Implementations and implications. Acta
Astronautica, 58(5), 279–286.
7. Cukurtepe, H., & Akgun, I. (2009). Towards space traffic management system. Acta
Astronautica, 65(5–6), 870–878.
8. Min, H., Guoqiang, Z., & Junling, S. (2010). Collision avoidance control for formation
flying satellites. In AIAA Guidance, Navigation, and Control Conference, 8–11 August
2011, Portland, Oregon.
9. Omar, S. R., & Bevilacqua, R. (2019). Spacecraft collision avoidance using aerody-
namic drag. Journal of Guidance, Control, and Dynamics, 43, 1–7.
10. Lee, K., Park, C., & Park, S.-Y. (2014). Near-optimal guidance and control for spacecraft
collision avoidance maneuvers. In AIAA/AAS Astrodynamics Specialist Conference,
4–7 August 2014, San Diego, CA.
11. Wang, S., & Schaub, H. (2008). Spacecraft collision avoidance using coulomb forces
with separation distance and rate feedback. Journal of Guidance, Control, and
Dynamics, 31(3), 740–750.
12. Hobbs, K. L., & Feron, E. M. (2020). A taxonomy for aerospace collision avoidance
with implications for automation in space traffic management. In AIAA Scitech 2020
Forum. https://doi.org/10.2514/6.2020-0877
12 Coverage of LoRaWAN
in Vijayawada
A Practical Approach
P. Saleem Akram and M. Lakshmana
Koneru Lakshmaiah Education Foundation
CONTENTS
12.1 Introduction................................................................................................... 175
12.1.1 Hardware Setup................................................................................. 176
12.1.1.1 LoRaWAN Architecture...................................................... 177
12.2 LoRaWAN Coverage in Real-Time Test Scenarios....................................... 177
12.2.1 Test Scenario 1: Setting of LoRaWAN in the Center of
Vijayawada (India) City..................................................................... 177
12.2.1.1 Assessment of Findings, Practical Observations, and
Suggested Optimization Approaches.................................. 179
12.2.2 Scenario 2: Setting of LoRaWAN in the Suburban Region............... 179
12.2.2.1 Test Results – Observations................................................ 180
12.2.3 Scenario 3: In a Basement, LoRaWAN Is Used to Read the
Water Meter, Gas Meter, and Electricity Meter................................. 180
12.2.3.1 Comprehensive Model 1: Indoor Coverage of
LoRaWAN........................................................................... 180
12.2.3.2 Building Losses via the Exterior Walls............................... 182
12.2.3.3 Losses Via Constructing Interior Walls............................... 182
12.2.3.4 Power Boost Received........................................................ 182
12.3 Conclusions.................................................................................................... 183
References............................................................................................................... 183
Notes���������������������������������������������������������������������������������������������������������������������� 184
12.1 INTRODUCTION
LoRaWAN is a low-power, broad-area network standard (LPWAN). Concerning the
OSI levels, level 2 will be preferred as the MAC (media access control) layer. In other
words, LoRaWAN is responsible for combining the channels and connection settings
of many LORA devices with respect to channel, bandwidth, encryption of data, etc.
(Bourennane et al., 2020). This technology enables point-to-point information to be
sent and received. A LoRa device is characterized by a long range with a minimal
component. It employs the spread spectrum approach, which enables many signals to
be received at the same time while at the same time having varying speeds.
12.1.1 Hardware Setup
Here, we took the help of hardware setup of SX1272 chipset, which has been
developed by Semtech company through which SX1272 module was developed. Its
transmission power is 14 dBm and sensitivity −134 dBm.1 In our practical approach,
we have taken help of the SX1272 LoRa module with 4.5 dBi Antenna.2 This module
relates to Socket 0, which is placed in SX1272 Waspmote board.
This chart, which was in Table 12.1 (see note 1), illustrates the comparison
between LoRa and many other commonly used wireless network technologies to
TABLE 12.1
LoRa Comparison to Other Wireless Technology
Wireless
Network Energy Communication Construction
Technology Velocity Distance Consumption Application Cost Cost
LoRa Slowest Longest Low Outdoor Free Median
sensors
NB-IoT Median Short High Indoor Data flow charge Low
sensors
3G/4G Fastest Long High Call and Data flow charge High
internet
WiFi Fast Short Highest Home Free Low
network
Bluetooth Median Shortest Low Phone Free Low
accessories
ZigBee Slow Shorter Low Indoor Free Low
equipment
Coverage of LoRaWAN in Vijayawada 177
build a straight and basic overview of the LoRa. It has a key role in establishing and
maintaining costs. In comparison to other comparable technologies, the cost of com-
munication is very negligible. Therefore, the cost from LoRa nodes to the gateway
and the nube may be called free of charge.
Only a few experimental range tests are adequately recorded in the literature in
general.
In the following list, we have explain the features of the control points and the
measurement series results:
Test Point 1: the signal passes across four buildings. A line of sight is not attain-
able along this path due to three high-rise structures and one low-rise structure.
However, a direct channel to the receiver is also accessible. The distance between
the two sites is 830 m. Ninety-six percent of the packets transmitted were received
(Gopal and Akram, 2019).
Test Point 2: the signal passes across 14 buildings. Test Point 2 in this scenario is
home to a massive concentration of low-rise residential complexes. There is also a
block of apartments on the path to the receiver. The range is 960 m. Ninety-two per-
cent of the data packets sent were received (Komalapati and Yarra, 2021).
Test Point 3: the signal passes across six buildings. This point is in the neighbor-
hood on the side of a large plaza. The path passes through a large residential com-
plex, followed by various industrial structures. The maximum range is 1,070 m. Once
again, 98% of the packets sent were received.
Test Point 4: the signal passes through 14 buildings. It is the most significant way.
This spans the apartment’s four high-rise buildings. Then an open area with no obsta-
cles follows until a grouping of high-rise skyscrapers reaches again. Finally, several
industrial structures are located before the road to the recipient is built. The distance
between us is 1,530 m. Ninety-eight percent of the packets transmitted were received.
Test point 5: the signal passes across six buildings. This test spot is divided into
several industrial buildings that do not have open space between them. It is 863 m
high. Received 100% of the transmission of data packets.
TABLE 12.2
Comparison of Various Test Points and Their Success Rates
The Number of
Buildings between
Source to Distance to the
Test Point Destination Gateway (Rx) (m) Success Rate (%)
1 4 830 96
2 14 960 92
3 6 1,070 98
4 14 1,530 98
5 6 863 100
Coverage of LoRaWAN in Vijayawada 179
Table 12.2 provides the (see note 1) locations of the test sites for the results of the
successful tests in real time. All probable scenarios, such as overcrowded buildings
at different distances, are covered by test points. The word “success rate” refers to
the rate at which the data from a LoRa node to a gate and vice versa are successfully
transmitted/received.
• Three basic solutions for reach and coverage optimization are available.
• In typical LoRaWAN applications, broad coverage and ranges may be
accomplished by allowing lower success rates, meaning accepting single
failed signals and then retransmitting the ranges in the test might have been
expanded.
• Redundant network topologies from several directions enable additional
network coverage while preserving or enhancing success rates.
• The lighting on the surface might be substantially improved with a higher
location of the doorway. Unfortunately, the door was only installed at 12 m
in this test.
• The Hata-propagation model (Hata-propagation model) is a basic radio
propagation model for calculating the loss of paths of radio waves outside.
The initial range roughly doubles when the gateway’s position is extended
from 12 to 30 m, say.
1 2 3 4 5
Distance Success Distance Success Distance Success Distance Success Distance Success
(m) rate (%) (m) Rate (%) (m) Rate (%) (m) Rate (%) (m) rate (%)
Gateway 1: 5 m 3,500 0 2,600 0 1,500 0 5,200 0 1,200 0
Gateway 2: 10 m 4,100 0 3,500 0 3,700 2 2,700 0 4,200 26
Gateway 3: 45 m 700 81 1,700 5 2,000 87 2,500 78 3,800 56
181
182 Intelligent Analytics for Industry 4.0 Applications
The following formula may be used to determine route losses through buildings
using this model:
Gate 1 = Wi – p (12.1)
where Wi is distributed in the [3, 10] dB range evenly and p is the internal wall count
splitting the receiver from the transmitter.
It is assumed that 15% of the units are evenly distributed among the values of
p = {0, 1, 2} with a value of p = 3 for those units.
The second variable required to describe the loss of trajectory through inner bar-
riers is calculated as follows:
Tor3 = α d (12.2)
where
TABLE 12.4
A Probable Energy Signal Value Range and Likelihood
Probability Ranger
0.24 [3, 10] dB
0.64 [10, 18] dB
0.1 [18, 22] dB
Coverage of LoRaWAN in Vijayawada 183
where
The three elements describe the overall indoor building loss are provided by the
following equation:
In the virtual environment, certain tests with different scenarios suggest. However,
no penetration could be ensured theoretically, calculating the complete loss on the
direct route over multiple levels and walls. A gateway to the multistorey structure
on the same roof with the basement or cellar to be connected may also have a sense.
There is rarely any importance to the straight passage through the building and
reflection on nearby structures. The attenuation is inadequate to one to two walls,
whereas the pathway is longer, and the structure reflexes.
12.3 CONCLUSIONS
This article presented the real-time test scenarios of the LoRaWAN nodes covered
with different distances and various line-of-sight cases with practical demonstra-
tion and comparison of results in suburban and urban areas. Three types of cases
are demonstrated as follows: (i) five various test cases – urban environment,
(ii) LoRaWAN – suburban area, and (iii) the penetration of the basement rooms for
reading data of the meter. Finally, we conclude that LoRaWAN nodes have a better
coverage capacity with fewer losses, and the same is proven with test results and sim-
ulation plots. This is a practical demonstration verified in Vijayawada city in India.
REFERENCES
Akram, P.S., Ramesha, M., Ramana, T.V, Simulation and analysis of smart home architecture,
ARPN Journal of Engineering and Applied Sciences, 2021, vol. 16, issue 6, pp. 280–286.
Ashok, G.L.P., Saleem Akram, P., Implementation of smart home by using packet tracer,
International Journal of Scientific and Technology Research, 2020, vol. 9, issue 2, pp.
678–685.
Bourennane, E.-B., Boucherkha, S., Chikhi, S., A study of LoRaWAN protocol performance
for IoT applications in smart agriculture, Computer Communications, 2020, vol. 164,
pp. 148–157.
Butun, I., Pereira, N., Gidlund, M., Analysis of LoRaWAN v1.1 Security: Research Paper. 1–6,
2018. doi: 10.1145/3213299.3213304
de Carvalho Silva, J., Rodrigues, J.J.P.C., LoRaWAN —A low power WAN protocol for
Internet of Things: A review and opportunities, 2017 2nd International Multidisciplinary
Conference on Computer and Energy Science (SpliTech), 2017, pp. 1–6.
Gopal, S.R., Akram, P.S., Design, and analysis of heterogeneous hybrid topology for VLAN
configuration, International Journal of Emerging Trends in Engineering Research, 2019,
vol. 7, issue 11, pp. 487–491.
184 Intelligent Analytics for Industry 4.0 Applications
Kanakaraja, P., Kotamraju, S.K., IoT enabled ble and lora based indoor localization w
ithout
GPS, Turkish Journal of Physiotherapy and Rehabilitation, 2021, vol. 32, issue 2,
pp.642–653.
Komalapati, N., Yarra, V.C., Smart Fire Detection and Surveillance System Using IOT,
Proceedings - International Conference on Artificial Intelligence and Smart Systems,
ICAIS 2021, 2021, pp. 1386–1390.
Mekki, K., Bajic, E., Chaxel, F., Meyer, F., A comparative study of LPWAN technologies
for large-scale IoT deployment, ICT Express, 2019, vol. 5, pp. 1–7. doi: 10.1016/j.
icte.2017.12.005
Butun, I., Nuno Pereira, Mikael Gidlund. “Analysis of LoRaWAN v1. 1 security.” In
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and
Implementation of Smart Objects, pp. 1–6, 2018.
Sharan Sinha, R., Wei, Y., Hwang, S.-H., A survey on LPWA technology: LoRa and NB-IoT,
ICT Express, 2017, vol. 3, issue 1, pp. 14–21.
NOTES
1 LoRa end nodes are not linked to a particular gateway, unlike cellular technology.
Instead, data are delivered to numerous gateways through a node. Then each gateway
passes the packet to a cloud-based LoRa network server (LNS) from the end node (cel-
lular, ethernet, satellite, and WiFi). LNS is complicated and intelligent for network
managing, filtering redundant packages, doing security checks, and allowing adaptive
data rates (de Carvalho Silva and Rodrigues, 2017). Consequently, there is no transfer
for a mobile LoRaWAN device from one gateway to another.
2 Proportional length to the gateway and the corresponding percentage of success. There
have been thousands of tests of transmission spanning several hours or days at every
site. Even at enormous distances, subterranean rooms with their impediments (rein-
forced cement, 2nd cellar, steel cellar doors, etc.). In this scenario, the height of the door
is critical. In addition, this is based on situations requiring the retransmission of value if
the success rate does not always guarantee direct transfer.
13 Intelligent Health
Care Industry for
Disease Detection
Ishaan Deep, Payaswini Singh, Aditi Trishna,
Sanskar, Biswa Ranjan Senapati,
and Rakesh Ranjan Swain
Siksha ‘O’ Anusandhan University
CONTENTS
13.1 Introduction................................................................................................... 185
13.2 Literature Study............................................................................................. 188
13.3 Proposed Work.............................................................................................. 188
13.4 Simulation Results......................................................................................... 189
13.5 Confusion Matrix.......................................................................................... 190
13.6 Conclusion and Future Scope........................................................................ 192
References............................................................................................................... 192
13.1 INTRODUCTION
The state of one’s health is crucial. “Health is Wealth,” as the saying goes, because a
healthy individual is eligible for a variety of benefits, including a decent job life and
personal food habits. However, an ill individual is bound by numerous limitations.
People’s lifestyles are rapidly changing nowadays. This has an impact on their health.
Life expectancy is dwindling, and health problems are on the rise.
Researchers are still looking into how to detect these diseases at an early age so
that they can be cured easily. One of the research methods is the machine learn-
ing (ML) approach [1]. ML is a type of artificial learning (AL) in which various
algorithms are used to determine the accuracy and precision values of an algorithm
in order to determine whether it is producing the desired output [2]. ML is widely
used in many fields to enhance performance. Various application domains in which
ML models are widely used are healthcare [3–5], vehicular networking [6–11], cyber
security [12], industry sector [13], etc. Figure 13.1 represents different types of ML.
This chapter focuses on the detection of diseases by means of ML algorithms, and
so the authors have used supervised ML (support vector machine (SVM) and linear
regression).
Supervised learning has one of the most popular algorithms known as SVM,
which is used for classification as well as regression problems. In the SVM algorithm,
the data records are plotted as a position in a multidimensional space where every
dimension has some features being the value of a particular coordinate. The SVM
kernel is a functional approach for processing and converting low-dimensional input
into high-dimensional space [14]. Figure 13.2 shows how SVM divides the dataset
into two groups.
Intelligent Health Care Industry for Disease Detection 187
One of the most often used ML methods is logistic regression (LR), which is used
to predict a categorical dependent variable using a set of independent variables. One
of the most common models is a binary outcome. It is a useful method for analyz-
ing problems and to fit the data into the best category [15]. The logistic function is
depicted in Figure 13.3.
In this chapter, the authors have used datasets of three common diseases that the
people are suffering from such as obesity, heart problem, and cancer. Nowadays,
most of the people are suffering from these diseases at an early age, and thus the life
span is decreasing. Using the ML algorithms, these diseases can be rectified at an
early age and people can take the required precautions to live a healthy and happy
life.
Death rates are also rising, with obesity, heart attacks, and cancer accounting for
the majority of deaths. Because these diseases are hazardous, they should be rec-
ognized at a young age so that necessary safeguards can be taken and a happy and
healthy life can be lived. The goal of this model is to figure out how to detect these
diseases at a young age.
The major contribution of this chapter is presented as follows:
The following is the chapter’s structure. The second section covers the literature
study. The third section examines the proposed work. The fourth section presents
the simulation results. The conclusion and future scope are discussed in the fifth
section.
188 Intelligent Analytics for Industry 4.0 Applications
TABLE 13.1
Details of Baseline Methods of Machine Learning
State Abbreviation
Artificial Learning Al
Machine Learning Ml
Support Vector Machine SVM
Logistic Regression LR
Cardiovascular Disease CVD
Body Mass Index BMI
K-Nearest Neighbor KNN
Artificial Neural Network ANN
Single Nucleotide Polymorphism SNPs
Multilayer Perceptron MLP
properly by using LR and SVM algorithms, where 90% of the dataset has been
trained and 10% of the dataset has been tested to find its accuracy. The recall value,
precision value, and the F1 score were also calculated. For three datasets, the confu-
sion matrix has also been calculated using LR and SVM algorithms.
Figure 13.4 shows the working information of ML algorithms. The considered
algorithm use for analysis is tabulated in Table 13.1
The abbreviation used here are given below:
TABLE 13.2
Performance Analysis of SVM with Different Values of the Hyperparameters
SVM LR
C Gamma Accuracy Accuracy
Obesity 2 0.001 0.92 0.82
Heart attack 2 0.001 0.82 0.82
Cancer 2 0.0001 0.96 1
TABLE 13.3
The Comparative Analysis of Considered Performance Parameters
SVM/LR
Recall Precision F1 Score
Obesity 0.9218/0.8224 0.9262/0.8252 0.9242/0.8228
Heart attack 0.8285/0.8280 0.8473/0.8218 0.8239/0.8244
Cancer 0.9588/1 0.9621/1 0.9597/1
True positive
Precision =
True positive + False Negative
Recall: it is the proportion of true positives to the sum of true positives and
c.
false negatives [24].
True positive
Precision =
True positive + False negative
F1 Score: it refers to how many correct hits were also discovered, or how
d.
many true positives were recalled [24].
2*Recall*Precision
F1Score =
Recall*Precision
FIGURE 13.5 Confusion matrix for obesity using SVM and logistic regression.
FIGURE 13.6 Confusion matrix for heart attack using SVM and logistic regression.
FIGURE 13.7 Confusion matrix for cancer using SVM and logistic regression.
192 Intelligent Analytics for Industry 4.0 Applications
Similar information has also been tabulated in Table 13.2. Further, the performance
metrics returned by the SVM have been tabulated in Table 13.2. The same is also
presented in Figure 13.7. The accuracy results of the three datasets using SVM and
LR algorithms are shown in Figure 13.8. The same is also tabulated in Table 13.3.
REFERENCES
1. M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and pros-
pects,” Science, vol. 349, no. 6245, pp. 255–260, 2015.
2. P. Prajapati and A. Thakkar, “Extreme multi-label learning: A large scale classification
approach in machine learning,” Journal of Information and Optimization Sciences, vol.
40, no. 4, pp. 983–1001, 2019.
Intelligent Health Care Industry for Disease Detection 193
21. https://www.kaggle.com/datasets/johnsmith88/heart-disease-dataset
22. https://www.kaggle.com/datasets/rishidamarla/cancer-patients-data
23. https://developers.google.com /machine-learning/crash-course/classification/
accuracy#:~:text=Accuracy%20is%20one%20metric%20for, predictions%20Total%20
number%20of%20predictions
24. https://towardsdatascience.com/essential-things-you-need-to-know-about-f1-score-
dbd973bf1a3#:~:text=1.-, Introduction, competing%20metrics%20%E2%80%94%20
precision%20and%20recall
14 Challenges with
Industry 4.0 Security
Mohit Sajwan and Simranjit Singh
Bennett University Greater Noida
CONTENTS
14.1 Introduction................................................................................................... 195
14.2 Security Threats and Vulnerabilities............................................................. 197
14.2.1 Cyber-Physical Systems..................................................................... 197
14.2.1.1 Cyber-Physical System Security Threats............................ 197
14.2.1.2 Cyber Threats..................................................................... 197
14.2.1.3 Physical Threats.................................................................. 198
14.2.1.4 Vulnerabilities..................................................................... 199
14.2.2 Internet of Things.............................................................................. 199
14.2.2.1 Threats................................................................................ 199
14.2.2.2 Vulnerabilities.....................................................................200
14.2.3 Cloud Computing............................................................................... 201
14.2.3.1 Threats................................................................................ 201
14.2.3.2 Vulnerabilities.....................................................................202
14.3 Security Challenges of the Industry 4.0........................................................ 203
14.3.1 Inadequate IT/OT Security Expertise, Knowledge, or
Understanding����������������������������������������������������������������������������������� 203
14.3.2 Inadequate Security Policies and Funds............................................ 203
14.3.3 The Legal Obligation Regarding Products........................................204
14.3.4 Uneven and Insufficient Standardization...........................................204
14.3.5 The Devices’ Capabilities and Limitations from a Technical
Perspective���������������������������������������������������������������������������������������� 204
14.4 Conclusion..................................................................................................... 205
References...............................................................................................................205
14.1 INTRODUCTION
The most significant turning points in human history have been the industrial revolu-
tions. Many researchers believe the industrial revolution has greatly impacted peo-
ple’s daily lives more than the scientific revolutions. A substantial shift has occurred
in the sector over the past few decades as new developments have been integrated
into the system. Industry 4.0 (also known as the “fourth industrial revolution”) is
a significant outcome of the digitalization of a sector characterized by inflexible
standards and outdated fashions [1]. Manufacturing facilities have made significant
Some thoughts on the problems of Industry 4.0, focusing on security, are presented
in this paper in order to increase awareness of the need for security in Industry 4.0.
The following is the outline for this document: After providing an introduction of
manufacturing industry procedures in Section 14.1, Section 14.2 provides an over-
view of the security and vulnerability concerns over industry 4.0, after which Section
14.3 provides security challenges of the industry 4.0, and Section 14.4 concludes with
conclusions and future developments.
a blackout that lasts for a number of hours. The People’s Liberation Army (PLA), a
Chinese organization with political motivations, was responsible for the cascading
blackout that occurred in the United States on August 14, 2003 [14]. This incident is
an example of a real-life worst-case scenario.
Repair: if a problem is detected, it may either be isolated and fixed manually, or
an alarm may be sent to the associated control system to automatically rearrange the
backup resources so that the service can be provided at all times. The self-healing
method, which relies on the system’s ability to recognize and isolate errors and inter-
ruptions, can be used to cure the problem, or it can be sent to a professional for repair.
The goal here is to expedite the patient’s recuperation in the shortest amount of time
possible. However, critical components sometimes have no backup capacity at all, or
only a limited amount of it. Therefore, self-healing is better able to deal with more
serious injuries in a shorter period of time [15].
14.2.1.4 Vulnerabilities
There are three major categories of CPS vulnerabilities [16], as follows:
14.2.2 Internet of Things
14.2.2.1 Threats
An assault that is also known as a man-in-the-middle attack occurs when an adver-
sary completely or partially modifies the data stream of an IoT device in order to
impersonate the device or system from which the data originated. They are able to
see data that is being transmitted, manipulate equipment, and intercept shared sensi-
tive information [19].
Dangers associated with the sharing of information in order to gain information
without proper authority, attackers, may listen in on broadcasts and eavesdrop, jam
the signal to prevent information from being distributed, or partly override the broad-
cast in order to substitute it with fraudulent information [20]. They then threaten to
make the information public or sell it.
Attackers have the ability to obtain access to the firmware or operating system of
a device that is running an IoT application and subsequently changes it, either par-
tially or entirely, on the device. Then, in order to access the network and any other
200 Intelligent Analytics for Industry 4.0 Applications
associated services, they will utilize the authentic IDs of the device and a pplication.
Assaults such as SQL or XML injection, as well as distributed denial-of-service
attacks, are examples of tampering concerns for the IoT applications [21].
Threats posed by the elevation of privilege attackers create damage by modifying
the access control rules of an application by using unprotected IoT applications. For
instance, in a manufacturing or industrial setting, an attacker may do harm to the
production system or personnel by forcing a valve to open all the way when it should
only open halfway. This would be contrary to the intended behavior of the valve.
Malware is still capable of infecting the majority of devices that are connected to
the IoT [22], despite the fact that these devices have little processing capability. In the
most recent few years, fraudsters have been very successful when making use of this
tactic. IoT botnet malware is one of the most common types since it is both adapt-
able and profitable for cybercriminals. It is also one of the most often encountered
forms. The most prominent cyberattack occurred in 2016 when Mirai brought major
websites and online services to a halt by enlisting the help of a legion of common
IoT devices. Malware that mines cryptocurrencies and ransomware are two more
categories of malicious software.
An increase in the number of cyberattacks. DDoS attacks, often known as DDoS
assaults, frequently make use of infected devices [23]. Devices that have been com-
promised can also be used as an attack base to infect further machines and dis-
guise malicious behavior. They can also serve as an entry point for lateral movement
within a corporate network. Even while businesses would appear to be the more
lucrative targets, even smart homes are subject to a startling amount of cyberattacks
that were not anticipated.
Theft of information and possible disclosure to third parties. Connected gadgets,
like anything else that has to do with the internet, enhance the likelihood of exposure
to threats on the internet. Important information, both technical and personal, might
be mistakenly kept in these devices and used to target individuals [22].
Poor management and incorrect setting of the device. Inadequate management of
devices, carelessness with passwords, and other security oversights can all contribute
to the success of these assaults. There is also the possibility that users just lack the
knowledge and competence to adopt appropriate security measures, in which case
service providers and manufacturers may need to assist their clients in achieving
greater protection.
14.2.2.2 Vulnerabilities
IoT applications suffer from various vulnerabilities that put them at risk of being
compromised [24] are as follows:
1. Passwords that are easy to guess or are hard coded. There are a lot of pass-
words that are easy to guess, exposed to the public, or cannot be changed.
Some members of the IT team do not bother changing the device’s or soft-
ware’s factory-default password once they install it.
2. The absence of a system or procedure for updating. Many IoT applications
and devices do not receive updates because the administrators of IT systems
cannot see them on the network. Additionally, IoT devices may not even
Challenges with Industry 4.0 Security 201
have an update mechanism built into them owing to their age or function, so
administrators cannot frequently update the software on these devices.
3. Network services and ecosystem interfaces that are not properly s afeguarded.
Every connection made by an IoT app has the potential to be hacked, either
as a result of a flaw that is built into the components themselves or as a result
of the fact that they are not protected from intrusion. This encompasses
any gateway, router, modem, external web app, application programming
interface (API), or cloud service connected to an IoT app.
4. IoT app components are either obsolete or not secure. When being
constructed, many applications for the IoT make use of frameworks and
libraries provided by third parties. They may be a threat to network security
if they are out of date, have been found to be vulnerable in the past, and their
installation in a network is not confirmed [23, 24].
5. Storing and transmitting data in an unsecured environment. Between the
IoT apps and other connected devices and systems, it is possible to store and
transfer many different sorts of data. Everything needs to be encrypted and
securely protected using transport layer security or one of the other proto-
cols, depending on the situation.
14.2.3.2 Vulnerabilities
1. Cloud storage with incorrect configuration: data theft is made easier
because of the widespread use of cloud storage. Businesses continue to con-
figure cloud storage inappropriately despite the severe dangers, resulting
in huge financial losses for many [24]. Inadequate constraints or protec-
tions: unauthorized access to your cloud infrastructure might put your orga-
nization at risk if you do not have enough controls or protections in place.
Insecure cloud storage buckets can lead to attackers gaining access to your
company’s secret data and downloading it, which can have serious conse-
quences. The default setup of Amazon Web Services (AWS) led to a huge
number of data breaches since the S3 buckets were accessible by default
[25].
2. Theft or loss of an organization’s intellectual property: intellectual prop-
erty (IP) is unquestionably one of the most precious assets that a business
possesses; but it is also extremely susceptible to security risks, particularly
when the data in question is kept online [26]. Cloud-based file-sharing sys-
tems have been found to include sensitive information such as intellectual
property in roughly 21% of the files uploaded. When cloud services are
breached, attackers may be able to access sensitive information stored in
them.
Changes made to the data: if the data are changed in a way that pre-
vents them from being returned to their original condition, this might lead
to a loss of the data’s entire integrity and could render the data unusable.
Deletion of Data: An adversary’s ability to remove critical data from a
cloud service, which constitutes a clear and present danger to an organiza-
tion’s operations, is a major concern when it comes to data security.
Loss of Access: attackers can lock up information and demand a pay-
ment in order to release it (this is known as a ransomware attack), or they
can encrypt data using robust encryption keys until they carry out their
nefarious operations. As a result, operating in the cloud necessitates putting
in place precautionary measures to secure your intellectual property and
data [17].
3. Unsatisfactory Management of Access: incorrect management of user
access is perhaps the most prevalent security concern associated with cloud
computing. In security breaches involving online applications, credentials
that have been stolen or lost have been the instrument that has been utilized
by attackers the most frequently for the past many years.
Access management guarantees that persons are only able to carry out
the activities for which they are responsible. Authorization refers to the pro-
cess of determining what a person is permitted to access and validating
that permission. In addition to the standard access management issues that
plague organizations in the modern day, such as user password fatigue and
Challenges with Industry 4.0 Security 203
security. No matter how much we stress it, the industry has not embraced privacy and
security. Most operators consider it an add-on or luxury function, which leads to our
following argument [28].
For the same reason that industries and operators fail to prioritize security, they
have cut back on money and are reluctant to engage in R&D for current security
concerns. This creates problems.
A corporation that migrates its information systems to the cloud instead of storing
them locally isn’t spending enough on security. Now, when a corporation discovers
how much it is wasting on saving money by migrating to cloud services is a major
motivator for storing data locally. How much would a corporation spend on cloud
security if it only wanted to save money [29]? Cybersecurity will not improve as it
should.
equipment was intended for one major operation, yet their protection was ignored.
Many new devices lack this basic protection, too [6, 18].
14.4 CONCLUSION
In today’s manufacturing industry, moving toward Industry 4.0 presents a wide range
of technological difficulties, many of which have a significant impact on the security
domain. An incident that has substantial and dramatic ramifications for the organization
is normally handled after the development process is complete. Organizational security
is commonly defined as a financial investment with no return on investment, which is
why this is the case Return on Investment (ROI). Although this procedure is expensive, it
often does not provide a long-term solution to the problem at hand. This may also impair
the source of differentiation among rivals and diminish the competitive advantages and
organizational trust in their commercial activities. Prior to beginning the implementa-
tion of Industry 4.0’s technological problems, it is vital to design a strategy that includes
all stakeholders and to agree on security issues as well as the appropriate architecture.
Security concerns are already being brought up. Concerns about security and putting
in place suitable organizational safeguards to protect processing activities have been
reinforced by European Union (EU) directive 2016/679. Considering how important it is
to secure the IT systems in industrial equipment, these talks will make the next stage of
industrial development safer and more secure for everyone.
The experts in the working groups will play a crucial role in highlighting the vari-
ous options that organizations will have in the near future. Even so, it is important to
find and compare solutions that have worked well in the past and can help all stake-
holders in the different business sectors.
REFERENCES
1. Mohamed Abomhara and Geir M. Køien. Cyber security and the internet of things:
Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility,
4: 65–88, 2015.
2. Nilufer Tuptuk and Stephen Hailes. Security of smart manufacturing systems. Journal
of Manufacturing Systems, 47: 93–106, 2018.
3. Beyzanur Cayir Ervural and Bilal Ervural. Overview of cyber security in the indus-
try 4.0 era. In Industry 4.0: Managing the Digital Transformation, pages 267–284.
Springer, 2018.
4. T. Pereira, L. Barreto, and A. Amaral. Network and information security challenges
within industry 4.0 paradigm. Procedia Manufacturing, 13: 1253–1260, 2017.
5. Katalin Ferencz, József Domokos, and Levente Kovács. Review of industry 4.0 security
challenges. In 2021 IEEE 15th International Symposium on Applied Computational
Intelligence and Informatics (SACI), pages 245–248. IEEE, 2021.
6. Mohammed M. Alani and Mohamed Alloghani. Security challenges in the industry 4.0
era. In Industry 4.0 and Engineering for a Sustainable Future, pages 117–136. Springer,
2019.
7. Capgemini (2015). Securing the internet of things opportunity: Putting cybersecurity
at the heart of the IoT. Capgemini Worldwide. Retrieved March 10, 2021, from https://
www.capgemini.com/resources/securing-the-internet-of-things-opportunity-putting-
cybersecurity-at-the-heart-of-the-iot/.
206 Intelligent Analytics for Industry 4.0 Applications
8. Rolf H. Weber and Evelyne Studer. Cybersecurity in the internet of things: Legal
aspects. Computer Law & Security Review, 32(5): 715–728, 2016.
9. Abid Haleem, Mohd Javaid, Ravi Pratap Singh, Shanay Rab, and Rajiv Suman.
Perspectives of cybersecurity for ameliorative industry 4.0 era: A review-based
framework. Industrial Robot: The International Journal of Robotics Research and
Application, 49: 582–597, 2022.
10. Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab,
and Mohamad Malli. Cyber-physical systems security: Limitations, issues and future
trends. Microprocessors and Microsystems, 77: 103201, 2020.
11. Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, and Colleen M. Swanson. Sok:
Security and privacy in implantable medical devices and body area networks. In 2014
IEEE Symposium on Security and Privacy, pages 524–539. IEEE, 2014.
12. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham,
Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno.
Comprehensive experimental analyses of automotive attack surfaces. In 20th USENIX
Security Symposium (USENIX Security 11), 2011.
13. Hossein Zeynal, Mostafa Eidiani, and Dariush Yazdanpanah. Intelligent substation
automation systems for robust operation of smart grids. 2014 IEEE Innovative Smart
Grid Technologies-Asia (ISGT ASIA), pages 786–790, 2014.
14. Thomas M. Chen, Juan Carlos Sanchez-Aarnoutse, and John Buford. Petri net model-
ing of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4):
741–749, 2011.
15. A. Muir and J. Lopatto. Final report on the August 14, 2003 blackout in the United
States and Canada: Causes and recommendations. 2004.
16. Hang Zhang, Bo Liu, and Hongyu Wu. Smart grid cyber-physical attack and defense: A
review. IEEE Access, 9: 29641–29659, 2021.
17. Narendra Mishra, R.K. Singh, and Sumit Kumar Yadav. Design a new protocol for
vulnerability detection in cloud computing security improvement. In Proceedings of the
International Conference on Innovative Computing & Communication (ICICC), 2021.
18. Jacob Morgan. A simple explanation of the internet of things. Retrieved November, 20:
2015, 2014.
19. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, and Xian-Ming Zhang. A
survey on security control and attack detection for industrial cyber-physical systems.
Neurocomputing, 275: 1674–1683, 2018.
20. Naser Hossein Motlagh, Mahsa Mohammadrezaei, Julian Hunt, and Behnam Zakeri.
Internet of things (IoT) and the energy sector. Energies, 13(2): 494, 2020.
21. Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah,
and Petar Djukic. Machine learning-enabled IoT security: Open issues and challenges
under advanced persistent threats. ACM Computing Surveys (CSUR), 55(5): 1–37, 2022.
22. Arup Barua, Md Abdullah Al Alamin, Md Shohrab Hossain, and Ekram Hossain.
Security and privacy threats for bluetooth low energy in IoT and wearable devices: A
comprehensive survey. IEEE Open Journal of the Communications Society, 3: 251–281,
2022.
23. Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani,
Avireni Srinivasulu, and Nicu Bizon. State-of-the-art review on IoT threats and attacks:
Taxonomy, challenges and solutions. Sustainability, 13(16): 9463, 2021.
24. Omar Alrawi, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, Manos
Antonakakis, et al. The circle of life: A {Large-Scale} study of the {IoT} malware life-
cycle. In 30th USENIX Security Symposium (USENIX Security 21), pages 3505–3522,
2021.
Challenges with Industry 4.0 Security 207
25. Manish Snehi and Abhinav Bhandari. Vulnerability retrospection of security solutions
for software-defined cyber–physical system against DDoS and IoT-DDoS attacks.
Computer Science Review, 40: 100371, 2021.
26. Kurdistan Ali and Shavan Askar. Security issues and vulnerability of IoT devices.
International Journal of Science and Business, 5(3): 101–115, 2021.
27. Jan Svacina, Jackson Raffety, Connor Woodahl, Brooklynn Stone, Tomas Cerny,
Miroslav Bures, Dongwan Shin, Karel Frajtak, and Pavel Tisnovsky. On vulner-
ability and security log analysis: A systematic literature review on recent trends. In
Proceedings of the International Conference on Research in Adaptive and Convergent
Systems, pages 175–180, 2020.
28. David Talbot. Vulnerability seen in amazon’s cloud computing. Technology Review.
Retrieved from http://www.cs.sunysb.edu/˜sion/research/sion, 2009.
29. Sarvesh Kumar, Himanshu Gautam, Shivendra Singh, and Mohammad Shafeeq. Top
vulnerabilities in cloud computing. ECS Transactions, 107(1): 16887, 2022.
30. Nnamdi Johnson Ogbuke, Yahaya Y. Yusuf, Kovvuri Dharma, and Burcu A. Mercangoz.
Big data supply chain analytics: Ethical, privacy and security challenges posed to busi-
ness, industries and society. Production Planning & Control, 33(2–3): 123–137, 2022.
31. Adrien Bécue, Isabel Praça, and João Gama. Artificial intelligence, cyber-threats and
industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5): 3849–
3886, 2021.
15 Dodging Security Attacks
and Data Leakage
Prevention for Cloud
and IoT Environments
Ishu Gupta
National Sun Yat-Sen University
Ankit Tiwari
TechMatrix IT Consulting Pvt. Ltd.
Priya Agarwal
Amdocs Development Center India LLP
Sloni Mittal
Hewlett-Packard (HP)
CONTENTS
15.1 Introduction................................................................................................... 210
15.2 Literature Survey........................................................................................... 211
15.2.1 Historical Notes................................................................................. 211
15.2.2 State of Art........................................................................................ 213
15.2.3 Research Gaps and Contributions..................................................... 214
15.3 Proposed Method........................................................................................... 215
15.3.1 Operational Flow............................................................................... 215
15.3.1.1 Message Encryption............................................................ 216
15.3.1.2 Message Authentication Code............................................ 217
15.3.1.3 Hash Function..................................................................... 218
15.3.1.4 Textual Documents Clustering........................................... 219
15.3.1.5 Textual Documents Graph Representation......................... 220
15.3.1.6 Depletion of Redundant Information.................................. 220
15.3.2 Data Leakage Prevention Model....................................................... 220
15.3.3 Architecture of Secure Data Transmission........................................ 221
15.4 Performance Evaluation................................................................................. 223
15.1 INTRODUCTION
Cloud computing acts as a backbone for the emerging techniques such as the Internet
of Things, big data, cyber-physical system (CPS) in the computer science field Wei
et al. (2016) where the interconnection links between workstations are formed either
by means of wired network connections or remote connections Gupta et al. (2022).
With its rapid advancement, there is a need for data security as well as maintain-
ability over the network in the cloud and IoT environments Gupta et al. (2020). The
confidential data which is being revealed to malicious users can outcome in a major
setback in organizations as well as for an individual Zaghloul et al. (2019). The ille-
gitimate users carry out the attack with the help of unlicensed tools in the system
to endanger system privacy and integrity Zhang et al. (2019). Protecting the system
from undesired hostilities, illegitimate activities, and loss is called Security Gupta et
al. (2019). Data security within wireless networks is provided with the help of cryp-
tographic techniques and tools. Security over data ensures confidentiality, authentic-
ity, and integrity for the documents sent across the network which further raises the
availability and classification issues for the documents that compromise the security
to a further extent Gupta and Singh (2019). This can further lead to trade secrets,
bank details, privacy of patients, health records, and security of accounts, and the list
goes on due to inappropriate classification of documents in categories different from
the one they belong which violates the confidentiality of the users. These breaches
grow in accordance with their size along with action Gupta and Singh (2018). For
instance, eBay, an eminent online shopping website experienced one of the major
setback leaks in history when more than 145 million customers’ personal details such
as phone numbers, names, and email IDs were theft. As an outcome, a massive reset
account password was carried out from the customer’s end Singh and Gupta (2020).
To eliminate these problems executants and scholars have illuminated techniques
and methodology to safeguard the confidential data which is mainly acknowledged
by the term data leakage prevention systems (DLPSs) Kaur et al. (2017a). DLPSs
mark the continuous investigation of confidential data which lacked standard secu-
rity mechanisms such as intrusion detection and firewalls. The confidential data is
endlessly supervised by DLPSs irrespective of data “in transit” or “in use”. The sub-
ject matter and context of the private data are mainly analyzed by the DLPSs for such
kind of detection. Studying components such as sender, receiver, format, time, and
data size fall under context analysis Kaur et al. (2017b). The regular expression, fin-
gerprinting, and statistical analysis of content fall under content analysis. Thus, the
use of DLPSs is increasing for curative actions such as caution, chunks, encryptions,
and audits for safeguarding these tasks.
Dodging Security Attacks and Data Leakage Prevention 211
three sections by Wu Kehe – network system security, data security, and network
business security. Flauzac has represented a similar proposal for the execution of
dispersed security solutions in a supervised collective way, often known by the
name grid of security, ensured by section of device, which is reliable and inter-
connections among workstations may be executed under system guidelines power
Shabtai et al. (2012). It is also accepted as a speculative basis for enterprise auto-
matic production systems as security defense. Wuzheng has established a scheme
over security for mobile networks on the basis of public key infrastructure (PKI).
Cryptographic tools and network security tools have also been established mode
(counter with cipher block chaining message authentication code (CBC-MAC)),
Advanced Encryption Standard (AES), and cipher-based message authentication
code (CMAC) are the various feasible applications for the hurdle related to network
security Chandra et al. (2014).
The crucial challenge for an organization is to transfer the message and docu-
ments over the network in a confidential and protected manner. According to a
survey, internal data leakage is the major reason for the threats to information
security which consist of an estimated 29% confidential or responsive accidental
data leakage, an estimated 16% theft of intellectual property, and an estimated 15%
other thefts consisting of financial data, and customer information. Boley et al.
(1999) estimated that internal threats cause more destruction than external threats,
with an overall estimate of 67%. The other major challenge in an organization is
the classification of data outcomes. An article entitled “Automatic Indexing: An
Experimental Inquiry” was published which suggested a “technique for classifi-
cation of documents automatically in accordance with their index/contents”. The
report was broadcasted by Gartner, in 2013 on “Enterprise content-aware DLP”
in contrast to the report broadcasted by Forrester Wave in 2008. Many machine
learning approaches like support vector machine (SVM) in which data belonging
to a major amount is categorized. The high FPR was achieved by the Naive-based
approach of data classifier Lewis (1998).
The security and data leakage threats are increasing due to the following
reasons:
(a) Tremendous increase in the wireless area network and rapid growth for the
in-motion device network usage. (b) Enterprise networking and security are being
transformed by mobile and cloud devices. (c) Tremendous growth in the malware prac-
tice is adversely affecting the security. (d) There is a vital role in active attacks such
as modification, fabrication, and interruption of the messages. (e) The documents con-
taining sensitive data are difficult to identify. (f) Data are distributed throughout the
networks.
(g) The contribution is toward the digital data across the network. The significance
and importance of security and leakage prevention are as follows: (a) it gradually
increases the digital transactions over the network. (b) Confidentiality, authentic-
ity, and integrity of the message are maintained. (c) Unauthorized users are unable
to access the message sent across the network. (d) Sensitive data movement and
usage can be monitored. (e) The exfiltration of data by the outsider hackers can be
identified.
Dodging Security Attacks and Data Leakage Prevention 213
15.2.2 State of Art
Network security is something that tends to become a new social circumstance in
today’s world. It can often lead to message leaks, message alteration, confidentiality,
and authenticity issues over the network. The crime recently committed by Kevin
Mitnick is one of the biggest crimes in the history of the world. Losses were source
code from different companies and 80 million dollars in US intellectual property.
This is the reason network security has taken a great spot in the world. To embrace
the central idea and focus behind network security, Komal Gandhi has conducted a
survey related to network security attacks Gandhi (2016). A slow internet connec-
tion can cause various attacks on networks. The attacks are classified mainly into
two classes active attacks and passive attacks. Former are caused by manipulating
the documents or information sent over the network. The attacks classified under
active attacks are Denial-of-Service (DOS) attacks, Domain Name Service (DNS)
spoofing, smurf attacks, etc. Passive attacks are the attacks in which the third party
tries to gain access to confidential documents sent over the network. The attacks
classified under the passive attacks are wiretapping port scanner and isle scan.
Security protocols were not accomplished within the Transmission Control Protocol/
Internet Protocol (TCP/IP) communication profusion. Communication is required
to make it more secure due to the expansion in the internet architecture Singh et al.
(2011); Uchnár and Hurtuk (2017). Yan et al. performed an exploration of network
security and stated some of the network security technologies based on authentica-
tion and data encryption technologies Yan et al. (2015). Some of the authentication
technology is categorized as message authentication, identity authentication, etc.
Data encryption technology in the paper included cryptography using symmetric
and asymmetric keys individually. The former case makes use of a similar key for
encrypting and decrypting the data at both sender’s as well as receiver’s sides. The
problem identified in this symmetric key encryption is the secure transfer of the
private key to both parties. While the latter used both public and private keys for
securing the data. The message encrypted using a public key can be decrypted with
the use of a private key conversely. Asymmetric key encryption is demonstrated as
more secured and intricate. Unconventional feature linked to message authentication
has been presented by Meena et al. in Meena and Jha (2016). The basic lookout of
message authentication and requirements has been discussed. It is interpreted that
data integrity and source authentication are the foremost presumptions of message
authentication. Additionally, the different inferences and methodologies that exist
for message authentication have been discussed. Afterward, the differences between
public and private key-based message authentication have been depicted. Various
problems related to lack of compatibility and key sharing are also described. Bellare
et al. have presented two related schemes named hash-based message authentication
code (HMAC) and nested construction-based message authentication code (NMAC).
The security and efficiency are provisioned by using the cryptographic hash function
Bellare et al. (1996). Their analysis consists of the consideration of generic Message
Authentication Code (MAC) schemes. However, the studies show that if notable
weaknesses are found in the MAC then the hash function needs to be relinquished
214 Intelligent Analytics for Industry 4.0 Applications
TABLE 15.1
Comparison of Network Security Outlooks
Various Outlooks
Metrics Basics Emphasis On Definition
Security attack Degrade information Influencing available An attack which endangers
system data, replaying the security over
message, analyzing information
data traffic, etc.
Process for security Formulated Data consistency, Techniques to find, restore
implementation to digital signature, or avoid any attacks over
safeguard security access control etc. security
Security service Includes confidentiality, Security endangered, The services that upgrade
authenticity, integrity processing data, and the transfer process of
and other security transmission of information and data
parameters information processing system. One or
more security techniques
can be employed
TABLE 15.2
Major Algorithms and Their Operations
Algorithms
Operations Hashing Algorithm Symmetric Asymmetric
Electronic signature SHA family RC4 DSA
Encryption – DES RSA
Key exchange MD5 AES DH
from significant as well as a huge range of other standards and known usage. The
detailed examination is done on various cryptography techniques (security algo-
rithms) such as hash function, symmetric and asymmetric technique, and different
approaches used for detecting data semantics. Table 15.1 summarizes the compari-
son of network security outlooks, and Table 15.2 lists the state-of-the-art algorithms
along with their operations that are used for securing the data.
TABLE 15.3
Drawbacks of Existing Techniques
Operations Technique Limitations
Message Symmetric key The key can be accessed by any intruder.
encryption Asymmetric key Public key of sender which is used for decryption on
receiver’s site is vulnerable to access by another
person on the network.
Message Authentication without No encryption technique performed over the message.
authentication cryptography
code Authentication tied to a Encryption of data is not conducted. The identical keys
plain text are used for both the purposes, enciphering and
deciphering the data.
Authentication tied to Enciphering and deciphering the data is done using
cipher text symmetric key.
Hash function Authentication with Plain data is in unencrypted form.
plain text
Authentication with Message is decrypted by employing public key and that
encrypted text is accessible to any intruder on network.
to revealing of the personal information to the outside source other than the intended
user. The main goal of this work is to ensure the secure transmission of confidential
messages or information over the network, without any alteration or modification, while
maintaining confidentiality, authenticity, and integrity throughout the transmission and
use. Only authorized parties should have access to the information, and the classification
should align with predefined classes for the documents. Moreover, the documents that
are newly generated in which confidential data might be contained can be recognized if
they are classified as a confined category. Based on the semantic approach, a statistical
data leakage prevention (DLP) model is presented to classify the data. It uses neighbor-
ing context and content of personal/private data to identify malicious access and secure
the confidential data despite the data being used by the intended users or while data are
transferred internally or externally between communication channels.
15.3.1 Operational Flow
The proposed work achieves confidentiality, authenticity, integrity, reliability, and
availability by applying the following techniques Kumari (2017); Michail et al.
(2007).
216 Intelligent Analytics for Industry 4.0 Applications
Authentication link associated with plain data: the main issue associated with
this technique is the identical key is used for both operations enciphering and deci-
phering the data. Therefore, this technique is not safe to use. If any illegitimate party
gets access to the key, then they can easily encipher and decipher the data. Figure
15.5 presents the entire scenario.
Authentication link to the cipher text: the identical symmetric key is used for
both enciphering and deciphering data due to which confidentiality is not actualized
completely. Figure 15.6 presents the entire scenario.
Authentication of hash code without ciphered plain data: the plain data are not
in encrypted form; therefore, confidentiality is endangered and when this plain data
is adjoined with hash code as shown in Figure 15.9, it is vulnerable to access by an
intruder on the network. Also, the public key used for the decryption of data is acces-
sible to everyone on the network, therefore, authenticity is also endangered and we
cannot ensure the decryption of data by only the supposed receivers or anyone else.
Authentication with encrypted plain text: as decryption is done by employing a
public key, authenticity is not realized as depicted in Figure 15.10. The sent informa-
tion is accessible to everyone on the network and it is difficult to ensure if it is the
supposed recipient or anyone else.
no longer be used and makes the enforcement of security policies difficult Van and
Thuc (2015).
with the use of the sender’s public key on the obtained decrypted data to generate
the final data. At the end of the receiver, a hash code is generated from the message
which is produced after decryption with the use of a hash function. The generated
hash code is cross-checked with the decrypted hash code to validate the authenticity
of the received message. Figure 15.12 shows the workflow and functioning of the pro-
posed solution that achieves authenticity and confidentiality simultaneously unlike
the existing schemes.
Further, the documents are classified by utilizing the centroid-based classifier. For
this purpose, the documents are showcased with the help of vector space. Searching
is performed with the aim of finding some suitable documents for the query. In the
proposed centroid-based model, every text in the document is assumed to be the
vector in term space where every document is presented by the TF. TF is used in
finding connections with information retrieval and display. It determines how fre-
quently a term is occurring in a document. TF shows the count of a particular word
within the whole document. This value is often mentioned in inverse document fre-
quency (IDF). IDF is defined as a number of documents in the corpus divided by
the document frequency of a term. It is basically used for data mining and informa-
tion retrieval Cohen and Hirsh (1998). IDF plays an important role in measuring
how important a term is. Since TF considers all the terms equally important, that’s
why TF only is not sufficient to calculate the weight of a term in a document. It is
known that the common words appear more and multiple times in the document but
they have less importance. Due to this reason, the proposed models weigh down the
important terms while considering the rare ones, and to solve this purpose, both TF
and IDF are combined together and named TF–IDF in the proposed solution to get
an ultimate score of term t in a document d. Further, the stop list is utilized to remove
similar words.
by using Britania public key for the stronger protection where the encrypted secret
key is portrayed in Figure 15.19. (iv) Parle transfers both the attained encrypted key
and encrypted message to Britania that are portrayed in Figures 15.19 and 15.20,
respectively.
Britania obtains two files and performs the decryption over these files to generate
the original message. The following steps are performed by Britania for decryption:
Dodging Security Attacks and Data Leakage Prevention 225
1. It performs the decryption with the help of its own private key over the
obtained encrypted secret key and generates the decrypted secret key as
shown in Figure 15.21.
2. The attained encrypted message is decrypted using the secret key obtained
in step 1 and the plain text is obtained as depicted in Figure 15.22.
226 Intelligent Analytics for Industry 4.0 Applications
Furthermore, Table 15.4 lists the comparison of the proposed scheme with the state-
of-the-art techniques. It can be seen that no other models except the proposed solution
provide both authentication and confidentiality simultaneously.
TABLE 15.4
Comparison of Proposed and Other Considered Methods
Technique Key Mode Authentication Confidentiality
Message Symmetric key – Yes No
encryption Asymmetric key Public key No Yes
encryption
Private key Yes No
encryption
Message Symmetric key Authentication link Yes No
authentication to plain text
code Authentication link Yes No
to ciphertext
Hash function Asymmetric key Hash function No No
without encrypted
text
Hash function with No Yes
encrypted text
Proposed solution Asymmetric key – Yes Yes
15.23 and 15.24 and Table 15.5, respectively where all the three schemes are imple-
mented at the same platform. It can be seen that the centroid-based proposed scheme
categorizes the data correctly unlike the existing classifiers because of maintaining
the resemblance between the specific class and a test document. Furthermore, these
outcomes are used to compute the accuracy for measuring the performance of the
model, which is presented in Table 15.6.
The categorization of data from various algorithms on multiple data sets is per-
formed. Table 15.6 depicts the accuracy of data categorization achieved by the pro-
posed scheme and comparison with the existing classifiers KNN and NB. It can be
seen that the proposed scheme which is based on a centroid
classifier outperforms both the Naive Bayes and KNN for all the data sets,
i.e., Cricket (Crick), Tennis (Tenn), and Soccer (Socc) except Badminton (Badm).
Centroid-based classifier outperforms various algorithms and performs well in all
the cases due to regulating the resemblance between the specific class and a test
document.
Differentiation between various classification algorithms using some sample
pairs tested values is listed in Table 15.6. Here, the analytical notable results are
228 Intelligent Analytics for Industry 4.0 Applications
summarized using the sample paired test in which various classification algorithms
are taken. It compares the performance of the two classifiers. It is shown whether a
classifier is performing best or worse than another classifier. It shows that a better
performance is given by the row classifier than the classifier represented in the col-
umn. It is found that the centroid-based proposed scheme is three times better than
NB and worse in one data set. Alike, the centroid-based proposed scheme is three
times better than C4.5 and one time worse in all four data sets. Overall, the cen-
troid classifier-based proposed scheme is unpredictably good than the other existing
Dodging Security Attacks and Data Leakage Prevention 229
TABLE 15.5
Comparison of Actual and Predicted Labels
Sr. No. Original Predicted Sr. No. Original Predicted
0 Badminton Badminton 18 Soccer Soccer
1 Badminton Badminton 19 Soccer Soccer
2 Badminton Badminton 20 Soccer Soccer
3 Badminton Badminton 21 Soccer Soccer
4 Badminton Badminton 22 Soccer Soccer
5 Badminton Badminton 23 Soccer Soccer
6 Badminton Badminton 24 Soccer Soccer
7 Badminton Badminton 25 Soccer Soccer
8 Badminton Badminton 26 Soccer Soccer
9 Cricket data Cricket data 27 Soccer Soccer
10 Cricket data Cricket data 28 Tennis Tennis
11 Cricket data Cricket data 29 Tennis Tennis
12 Cricket data Cricket data 30 Tennis Tennis
13 Cricket data Cricket data 31 Tennis Tennis
14 Cricket data Cricket data 32 Tennis Tennis
15 Cricket data Cricket data 33 Tennis Tennis
16 Cricket data Cricket data 34 Tennis Tennis
17 Soccer Soccer 35 Tennis Tennis
TABLE 15.6
Comparative Analysis of the Proposed and Other Considered Methods
Categories
Algorithms Cricket Tennis Badminton Soccer
Naive Bayesian 89.3 91.2 84.3 72.3
KNN 85.8 87.5 77.5 84.6
Proposed scheme 91.8 93.9 82.7 94.2
classifiers such as KNN, NB, and C4.5 since it regulates the resemblance between the
specific class and a test document. The mean resemblance is calculated between the
test document and all the additional documents in the current class. If the magnifica-
tion is higher, it corresponds to a small level of resemblance between the documents,
whereas if the magnification is lower, it corresponds to a high level of resemblance
among the documents.
For this, authenticity and confidentiality must be maintained to forward the mes-
sages from sender to receiver in the most consistent and safe form. This chapter has
reviewed some of the common existing techniques, highlighted the limitations, and
provided an integrated solution to overcome the existing problems. The proposed
solution achieved both confidentiality and authenticity simultaneously unlike the
existing scheme with the use of asymmetric key and applying double encryption and
decryption to secure the message from intruder’s undesirable access. Now, the data
can be securely transferred; however, still, data leakage can take place. Data leakage
can happen because of using bad clustering approaches. To prevent data leakage,
an approach based on a centroid document classifier is proposed in which the data
is clustered appropriately which helps in DLP. Centroid-based document classifica-
tion is steady and maintainable, and it outperforms other classification algorithms on
various datasets that prove the validity of the proposed model.
In the future, the emerging quantum machine learning algorithms could be incor-
porated with the work for improved accuracy in identifying and preventing data leak-
age incidents. Furthermore, the malicious entity could be predicted in advance using
a quantum computing mechanism to strongly protect the data against data leakage
occurrences.
ACKNOWLEDGMENT
This work is supported by the University Grants Commission (UGC), Ministry of
Human Resource Development (MHRD), and Government of India under the scheme
of National Eligibility Test-Junior Research Fellowship (NET-JRF) with grant no.
F.15-9(JUNE 2015)/2015(NET).
REFERENCES
Alkandari, A. A., Al-Shaikhli, I. F., & Alahmad, M. A. (2013, September). Cryptographic
hash function: A high level view. In 2013 International Conference on Informatics and
Creative Multimedia (pp. 128–134). IEEE.
Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage
prevention systems. Journal of Network and Computer Applications, 62, 137–152.
Badminton (2022). Badminton Dataset. https:badminton-information.com
Baker, L. D., & McCallum, A. K. (1998, August). Distributional clustering of words for text
classification. In Proceedings of the 21st Annual International ACM SIGIR Conference
on Research and Development in Information Retrieval (pp. 96–103). ACM.
Bellare, M., Canetti, R., & Krawczyk, H. (1996, August). Keying hash functions for message
authentication. In Annual International Cryptology Conference (pp. 1–15). Springer.
Boley, D., Gini, M., Gross, R., Han, E. H. S., Hastings, K., Karypis, G., … & Moore, J. (1999).
Document categorization and query generation on the world wide web using webace.
Artificial Intelligence Review, 13(5), 365–391.
Chandra, S., Paira, S., Alam, S. S., & Sanyal, G. (2014, November). A comparative survey
of symmetric and asymmetric key cryptography. In 2014 International Conference on
Electronics, Communication and Computational Engineering (ICECCE) (pp. 83–93).
IEEE.
Cohen, W. W., & Hirsh, H. (1998, August). Joins that generalize: Text classification using
WHIRL. In KDD (pp. 169–173). AAAI Press.
Dodging Security Attacks and Data Leakage Prevention 231
Van, D. H., & Thuc, N. D. (2015, August). A privacy preserving message authentication
code. In 2015 5th International Conference on IT Convergence and Security (ICITCS)
(pp. 1–4). IEEE.
Wei, J., Liu, W., & Hu, X. (2016). Secure data sharing in cloud computing using revoca-
ble- storage identity-based encryption. IEEE Transactions on Cloud Computing, 6(4),
1136–1148.
Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer network security and technology
research. In 2015 Seventh International Conference on Measuring Technology and
Mechatronics Automation (pp. 293–296). IEEE.
Zaghloul, E., Zhou, K., & Ren, J. (2019). P-mod: Secure privilege-based multilevel organiza-
tional data-sharing in cloud computing. IEEE Transactions on Big Data, 6(4), 804–815.
Zhang, L., Cui, Y., & Mu, Y. (2019). Improving security and privacy attribute based data
sharing in cloud computing. IEEE Systems Journal, 14(1), 387–397.
16 Role of Blockchain
in Industry 4.0
Keshav Kaushik and Bhavana Kaushik
University of Petroleum & Energy Studies
CONTENTS
16.1 Introduction to Blockchain Technology: Characteristics and Protocols....... 233
16.2 Challenges and Solutions of Blockchain Technology in Industry 4.0........... 236
16.3 Future Research Scope of Blockchain in Industry 4.0.................................. 238
16.4 Conclusion..................................................................................................... 238
References............................................................................................................... 239
a hacker may interrupt the network and take your money. The victim in both situa-
tions is the client. Blockchain is useful in this situation. If we utilize a blockchain in
these situations rather than a bank to transfer money, the procedure is significantly
simpler and more reliable. As the money is processed directly by you, there is no
additional cost as a third party is not required. Additionally (Gamage et al., 2020),
the blockchain system is decentralized and not restricted to a particular place, mak-
ing all the data and records maintained to be public and decentralized. No danger of
data tampering by a hacker exists since the data is not kept in a single location. There
are several characteristics of blockchain that makes it a promising technology. The
blockchain’s characteristics are shown in Figure 16.1.
• Immutable: any data that have been added to a blockchain cannot be modi-
fied after it has been done so, which is known as the immutability feature
of a blockchain. Attempt sending an email as an illustration to better grasp
immutability. An email that has been sent to a large group of recipients
cannot be canceled. You will have to ask each receiver of your email to
erase it, which is a laborious workaround. This is the operation of immu-
tability. Data cannot be modified or amended once it has been processed.
Because each block in a blockchain retains the hash of the one before it, if
you try to modify the data of one block, you will have to update the whole
blockchain that follows it. Any changes to one hash will affect the remain-
ing hashes as well. Since it takes a lot of processing power to modify all the
hashes, it is quite difficult for somebody to do so. Data stored in a block-
chain is unaffected by modifications or hacker attacks due to irreversibility.
• Peer to Peer: the usage of blockchain makes it simple to engage between
two parties using a peer-to-peer architecture without the need for a mid-
dleman. Blockchain (Kaushik et al., 2020) is a peer-to-peer protocol that
enables each member of the network to have an exact copy of each trans-
action, allowing machine consensus for authorization. For instance, with
blockchain, you may complete any transactions from one region of the
world to the other in a matter of seconds. Any additional costs or delays
won’t be deducted from the transaction either.
• Tamper Proof: because blockchains have the immutability characteristic
built in, it is simpler to spot data manipulation. Because any alteration to
even a single block can be easily discovered and corrected, blockchains are
thought to be tamper proof. Hashes and blocks are the two main methods
for spotting tampering. Each block-related hash function is distinct, as was
previously mentioned. It is comparable to the fingerprint of a block. Any
alteration to the information will cause the hashing algorithm to change as
well. A hacker would have to modify the hashes of all the blocks following
that one in addition to making any modifications because the hash function
of one block is connected to the next, which is a challenging task.
• Decentralized: Since blockchains are decentralized, no one individual or
organization has control over the whole network. The distributed ledger is
accessible to everybody on the internet, but nobody is able to independently
edit it. This particular aspect of blockchain technology provides safety and
transparency while offering people control.
• Consensus: Each blockchain has an agreement to assist the network in
reaching choices quickly and impartially. Consensus (Dhar Dwivedi et
al., 2021) is a decision-making technique that helps the network’s active
nodes swiftly come to a consensus and ensures the system runs smoothly.
Although nodes might not have much confidence in one another, they might
have confidence in the network’s central algorithm. There are numerous
accessible consensus techniques, each having advantages and disadvan-
tages. A consensus method is necessary for any blockchain or else it will
start to lose value.
It is crucial to realize that there are hundreds of procedures in use, making it impos-
sible to research all of the available possibilities in a reasonable length of time. The
most crucial protocols, nevertheless, are the following four: a summary of the most
common protocols used in blockchain development solutions is provided below.
236 Intelligent Analytics for Industry 4.0 Applications
These technologies give the industrial and supply chain sectors a wide choice of
possibilities. Blockchain is a digital ledger that has attracted a lot of attention and
can improve the environment for manufacturing and supply chains. The benefits
of blockchain now are fascinatingly understood in a variety of areas. The signifi-
cant potential of blockchain in Industry 4.0 is discussed in this article (Javaid et al.,
2021). For perspectives, a number of blockchain technology’s drivers, facilitators,
and related capabilities are examined.
Blockchain is a tamper-proof solution with several uses. The secret of block-
chain (BC) is its tamper-proof design, which gives data authentication reliability.
The principles of blockchain and how it functions in numerous different applica-
tions and technology are the main topics of this paper (Kaushik & Dahiya, 2022).
The readership will also learn more about problems with blockchain technology
integration in this study. The paper will outline the role that blockchain technol-
ogy plays in solving problems related to cutting-edge technologies. This analysis
finds peer-reviewed material that attempts to leverage blockchain for cybersecu-
rity goals and provides a rigorous study of the most often used blockchain security
features. IoT, security, wireless communications, 5G, and even beyond networks
are just a few of the industries where the revolutionary blockchain has a wide
range of applications. This article discusses how blockchain technology will
be used in 5G and other future networks. The many difficulties that arise when
using the blockchain in 5G and future networks are also highlighted in this article
(Kaushik, 2022). The report also covers how blockchain will be used in 5G net-
works in the future.
To increase the levels of security of the smart applications, numerous security
benchmarks and remedies have been suggested over the years; however, the current
solutions are either based on centralized architectures with single points of failure
or have high communication and computation costs. Additionally, the majority of
the security solutions now available have a narrow focus and do not address scal-
ability, resilience, storage systems, network latency, traceability, data integrity, and
provenance. Blockchain technology may provide a remedy for the aforementioned
problems. These facts served as the impetus for the rigorous assessment of various
blockchain-based technologies and their suitability for various Industry 4.0-based
applications that we offer in this article (Bodkhe et al., 2020).
The fourth industrial revolution, also referred as Industry 4.0, is on the horizon,
and as a result, new disruptive innovations are being taken into account for integra-
tion in the manufacturing setting. A few of these options is the blockchain, which
attempts to handle business transactions, connect disparate systems, and promote
asset traceability. As a result, this innovation helps to build an efficient supply chain
that might have an influence on the worldwide market. The intersection between
blockchain and Industry 4.0 is revealed in this article (Silva et al., 2020). In order to
provide instances of what is now being suggested, promoted, and produced, scien-
tific, corporate, and governmental efforts are investigated in this manner.
Innovative upcoming technologies like the 5G mobile network and blockchain
can fill these demands. In contrast to blockchain’s novel data-sharing method of
operation, which improves the high degree of security, visibility, and trustworthiness
238 Intelligent Analytics for Industry 4.0 Applications
of stored data, 5G will enable extraordinarily large channel capacity and lower data
latency. As a result (Jovović et al., 2019), this study provides a broad overview of
the prospective use cases for the 5G network and blockchain technology in Industry
4.0. The findings might help early adopter businesses acquire market technical
dominance.
The growth (Lypnytskyi, 2019) of blockchain’s decentralized versions is most
consistent with the idea of Industry 4.0, according to research on the technology’s
progress. Nevertheless, as demonstrated in the article, internal conflicts caused by
the blockchain “trilemma” and ineffective energy utilization make it difficult to
apply such variants in the industrial setting. There are ways to break the “blockchain
trilemma” deadlock, along with some cutting-edge, contemporary alternatives like
the Level-2 standard. Blockchain technology (BCT) can significantly contribute to
industrial sustainability by safeguarding resources, protecting the environment, and
improving citizen quality of life. In this paper, a four-class taxonomy of the most
significant cyberattacks in Industry 4.0 during the past ten years is offered. Industry
4.0’s most significant BCT-based works are compared in terms of their secrecy,
integrity, scalability, security, and multifactor identification capabilities. Our analy-
sis demonstrates that BCT integration in the industry can guarantee integrity and
confidentiality and should be mandated to maintain data availability and confiden-
tiality. Prospective (ElMamy et al., 2020) research topics are outlined with a focus
on implementing BCT in the industrial setting while taking into account machine
learning, 5G systems, and other evolving technologies.
Distribution and decentralization are seen as common architectural elements.
Aoun et al. (2021) aim to broaden people’s perspectives on blockchain technology’s
potential as a liberating instrument for the fourth industrial revolution. We are first
examining the foundations of Industry 4.0, its difficulties, constraints, and opportu-
nities, and then we are looking at ways that blockchain technology might offer new
capabilities and worth to the implementation of Industry 4.0.
16.4 CONCLUSION
The book chapter highlights the protocols and characteristics of blockchain technol-
ogy. The chapter will also enlighten the readers about the challenges and solutions
of blockchain technology in Industry 4.0. Moreover, the chapter also discusses the
future research scope of blockchain technology in Industry 4.0. The chapter will be
helpful for blockchain enthusiasts, blockchain developers, financial market experts,
Ph.D. scholars, researchers, and students.
Role of Blockchain in Industry 4.0 239
TABLE 16.1
Major Findings of Scope of Blockchain in Industry 4.0
Authors Year Major Findings
Alladi et al. 2019 In addition to major commercial blockchain networks in various pertinent
(2019) industries, this report offered the most recent research findings in each of
the connected industrial sectors. The writers talked about the difficulties
that each sector will face in using blockchain.
Swami et al. 2021 The authors of this study made an effort to analyze some of the most recent
(2021) IoT applications in a variety of industries, including sports, smart gadgets,
location monitoring, and blockchain-based security. IoT is still a subject
that is fast expanding and has a lot of room for multidisciplinary study
and research. IoT will continue to grow as sensors are integrated into
more systems.
Hassan Onik 2018 Both a blockchain-based human resource management system algorithm
et al. (2018) and a recruitment system management have been presented. It is clear
from the examination of the case study data that the suggested
methodology has distinct benefits over the current recruitment methods.
Zuo (2020) 2020 In-depth information about blockchain systems, structures, methodologies,
and research problems is presented in this study. Our talks on utilizing
blockchain technology for different implementations of the smart factory
and smart supply chain are guided by the authors’ suggested blockchain
architecture for smart manufacturing.
Leng et al. 2021 This research shows how the literature has investigated various
(2021) cybersecurity-related challenges. Future research paths for blockchain-
secured smart factory are offered based on the insights gleaned from this
analysis, which may serve as a roadmap for research on pressing
cybersecurity issues for reaching intelligence in Industry 4.0.
REFERENCES
Alladi, T., Chamola, V., Parizi, R. M., & Choo, K. K. R. (2019). Blockchain applications for
Industry 4.0 and industrial IoT: A review. IEEE Access, 7, 176935–176951. https://doi.
org/10.1109/ACCESS.2019.2956748
Aoun, A., Ilinca, A., Ghandour, M., & Ibrahim, H. (2021). A review of Industry 4.0 char-
acteristics and challenges, with potential improvements using blockchain technol-
ogy. Computers & Industrial Engineering, 162, 107746. https://doi.org/10.1016/J.
CIE.2021.107746
Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., & Alazab, M. (2020).
Blockchain for Industry 4.0: A comprehensive review. IEEE Access, 8, 79764–79800.
https://doi.org/10.1109/ACCESS.2020.2988579
DharDwivedi, A., Singh, R., Kaushik, K., Rao Mukkamala, R., & Alnumay, W. S. (2021).
Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges,
opportunities, and solutions. Transactions on Emerging Telecommunications
Technologies, e4329. https://doi.org/10.1002/ETT.4329
ElMamy, S. B., Mrabet, H., Gharbi, H., Jemai, A., & Trentesaux, D. (2020). A survey on
the usage of blockchain technology for cyber-threats in the context of Industry 4.0.
Sustainability 2020, 12(21), 9179. https://doi.org/10.3390/SU12219179
240 Intelligent Analytics for Industry 4.0 Applications
CONTENTS
17.1 Introduction................................................................................................... 241
17.2 Blockchain Architecture................................................................................ 243
17.3 How Bitcoin Works?......................................................................................244
17.4 Challenges in the Bitcoin Implementation: Security Threats........................244
17.4.1 Bitcoin Protocol................................................................................. 245
17.4.2 Bitcoin Services................................................................................. 245
17.4.3 Other Factors..................................................................................... 245
17.5 Rise of Bitcoin Value..................................................................................... 245
17.6 Consensus Algorithms in Blockchain............................................................246
17.6.1 Proof of Work (PoW).........................................................................246
17.6.2 Proof of Stake (PoS).......................................................................... 247
17.6.3 Pure Stake-Based Consensus............................................................. 247
17.6.4 Proof of Elapsed Time (PoET)..........................................................248
17.6.5 Proof of Activity (PoA)......................................................................248
17.6.6 Proof of Burn (PoB)...........................................................................248
17.7 Various Social Blockchain Applications....................................................... 249
17.8 Conclusion..................................................................................................... 250
References............................................................................................................... 250
17.1 INTRODUCTION
Blockchain, which Satoshi Nakamoto created to serve as Bitcoin’s public transaction
log, has gained much attention [1]. Blockchain technology allows for decentralized
transaction processing. It is currently employed in a number of industries, including
financial services, Internet of things (IoT) applications, reputation management, and
others. The security and scalability of blockchain are just two of the problems that
still need to be resolved.
Cryptocurrency is the buzzword in business and academia these days. Bitcoin, a
very popular cryptocurrency, has a market value of over $10 billion [2]. Bitcoin has
a distinctive data storage structure, and transactions are carried out alone. Bitcoin’s
core technology is blockchain. In 2008, the concept of blockchain was developed,
and in 2009, it was realized [1]. Blocks are used to store all transactions on the block-
chain. It is referred to as the public ledger. With the addition of new blocks, the chain
Transactions and the transaction counter are found in the block’s body. The size of
each transaction and the size of the block determine the number of transactions in
a block. Asymmetric cryptography is used to validate the transaction authenticity
[14]. Asymmetric cryptography-based digital signatures are employed in unreliable
With all these noticeable points, the challenges in the Bitcoin implementation are
discussed in the next section.
are two more nontechnical elements that influence Bitcoin’s value. This chapter aims
to figure out which of the causes described above will produce s ignificant variations
in the Bitcoin currency value.
In 2017, Fraser and Bouridane compiled a list of potential security concerns about
Bitcoin [16] and an analysis of the factors that contributed to the price drop. The
following are the details:
17.4.1 Bitcoin Protocol
There are always risks as Bitcoin is purely an online commodity. More than 50% of
the Bitcoin network can be taken over by a single person or group of users, thanks to
a security flaw that Bradbury nicknamed the “51 percent attack” [17]. According to
Bonneau et al. [18], the problem of the size of the Bitcoin network (millions of nodes)
is extremely challenging to handle. Even if it is not a major threat, Bitcoin is nonethe-
less subject to it. Moreover, the value of Bitcoin is impacted by public apprehension.
17.4.2 Bitcoin Services
The number of services using Bitcoin increased in tandem with its popularity.
B¨ohme et al. [19] suggested the two public sectors that hold and trade Bitcoins:
digital wallet services and currency exchanges. A digital wallet, according to their
definition, is a computerized representation of the accounts, transactions, and private
keys needed to send or use Bitcoins. In addition, rather than going through the time-
consuming process of mining, people can buy Bitcoin through a Bitcoin exchange
[20]. The Bitcoin system is less susceptible to cyberattacks of any kind than the
aforementioned Bitcoin services.
17.4.3 Other Factors
Other factors that influence the value of Bitcoin include financial decisions and
government regulations, in addition to security breaches. Because Bitcoin is a form
of currency, any issues with traditional currencies will also apply to Bitcoin. It is
noted that the most influential element was security threats to the Bitcoin protocol
and their research was regarded to be the most effective method for determining the
most important element influencing Bitcoin’s value.
compensate for the loss. Primecoin [22], for example, is used in mathematical studies
to find a particular chain of prime integers.
According to the analysis, one of PoW’s drawbacks is that there may be some security
or usage difficulties. As a result, many remedies to these limits are proposed. The speed
at which the blocks are added to the puzzles is increasing daily, raising the difficulty of
the riddles even more. As a result, miners must spend on the gear to be the first to solve
the mystery. Miners with lesser investment levels are unable to meet market demands.
Tromp [23] presented a way for replacing puzzle labor with the Cuckoo Hash Function,
which requires less effort from miners and allows for more accessible block adding.
to the miner out of total “n” number of coins, then miner has a/n chance of mining.
Another way for locating the miner based on pure stake is proposed. A “follow-the-
satoshi” rule is also implemented. The lowest unit of Bitcoin, the Satoshi value, is
taken into account. The Satoshi index is used as a parameter in the Satoshi method.
The Satoshi index is a number that ranges from zero to the total number of Satoshi.
The Satoshi block has been discovered. These are the incentives for the block’s
creators, the miners. The last owner of Satoshi is the one who adds the block to the
chain. Satoshi is based on the hash function. The inputs are chosen based on the
chain’s current state. The first input comes in the form of bits from the comb func-
tion. The second input is provided by the current blocks in the chain, and the third
input is a random integer.
Bentov et al. [28] presented another solution to the problem. The block is not
formed by Satoshi during his opportunity in this case. There are three possibilities
to choose Satoshi. If these opportunities are not taken, the owner will be blacklisted
and will not be able to add to the block. The Bentov principle is applied to the PoS
consensus [29] through the follow-the-satoshi approach. It specifies that the leader
is selected at random using the entropy value. This determined value must be safe-
guarded because it would be difficult to replicate the protocol and forecast the value
in order to influence the leader’s election. On the basis of the Bentov election [30], the
entropy value is determined. Epoch is taken, which is a picture of each stakeholder.
Each epoch determines the amount of stake holders who will participate in the coin-
flipping procedure.
unspendable. Although there is a loss when coins are burned, the damage is just tem-
porary because the currencies are protected against hackers in the long run. It also
raises the stakes for other coins. This raises the likelihood of mining the upcoming
blocks and the payments [34].
17.8 CONCLUSION
One of the most important aspects of Industry 4.0 is digitization, which allows
businesses to benefit from effectiveness in all areas, from technology and manage-
ment consulting to supply business model and strategies. According to the findings,
security vulnerabilities in Bitcoin services have the greatest impact on Bitcoin’s
value. Bitcoin’s benefits have exceeded its drawbacks. As a result, Bitcoin has gained
acceptance throughout the world, and many countries are now interested in its tech-
nology. According to a Nasdaq estimate, the stock’s predicted value by the end of
the year will be $23,499. Bitcoin is off to a strong start. People would be able to use
their blockchain identities for a variety of tasks, ranging from basic actions to apps,
software, and digital signatures. Blockchain may be the alternative to facilitating
this step by providing a reliable source for high-quality interactional experience and
understanding to smaller businesses. The volatility of Bitcoin value will be reduced
if security breaches consequently weaken the Bitcoin services, hence the protocols
need to be carefully designed.
REFERENCES
1. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized
Business Review, page 21260, 2008.
2. Garrick Hileman. State of blockchain q1 2016: Blockchain funding overtakes bitcoin.
CoinDesk, New York, NY, May, 11, 2016.
Blockchain and Bitcoin Security in Industry 4.0 251
22. Christopher Burks. Bitcoin: Breaking bad or breaking barriers? North Carolina Journal
of Law & Technology, 18(5):244, 2017.
23. John Tromp. Cuckoo cycle: A memory-hard proof-of-work system. IACR Cryptology
ePrint Arch., 2014: 59, 2014.
24. Sunny King. Primecoin: Cryptocurrency with prime number proof-of-work. July 7th,
1(6), 2013.
25. Gavin Wood et al. Ethereum: A secure decentralised generalised transaction ledger.
Ethereum Project Yellow Paper, 151(2014): 1–32, 2014.
26. V. Zamfir. Introducing Casper the friendly ghost, Ethereum blog, 2015.
27. Renato P. dos Santos et al. Consensus algorithms: A matter of complexity. In Melanie
Swan, Jason Potts, Soichiro Takagi, Frank Witte and Paolo Tasca (eds) Between Science
and Economics, pages 147–170. World Scientific, 2019.
28. Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. Cryptocurrencies without proof of
work. In International Conference on Financial Cryptography and Data Security,
pages 142–157. Springer, 2016.
29. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov.
Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual
International Cryptology Conference, pages 357–388. Springer, 2017.
30. Anamika Chauhan, Om Prakash Malviya, Madhav Verma, and Tejinder Singh Mor.
Blockchain and scalability. In 2018 IEEE International Conference on Software
Quality, Reliability and Security Companion (QRS-C), pages 122–128. IEEE, 2018.
31. Mitar Milutinovic, Warren He, Howard Wu, and Maxinder Kanwal. Proof of luck: An
efficient blockchain consensus protocol. In Proceedings of the 1st Workshop on System
Software for Trusted Execution, pages 1–6. 2016.
32. Marko Vukolić. The quest for scalable blockchain fabric: Proof-of-work vs. BFT
replication. In International Workshop on Open Problems in Network Security, pages
112–125. Springer, 2015.
33. Fahad Saleh. Blockchain without waste: Proof-of-stake. The Review of Financial
Studies, 34(3): 1156–1190, 2021.
34. Maher Alharby and Aad Van Moorsel. Blockchain-based smart contracts: A systematic
mapping study. arXiv preprint arXiv:1710.06372, 2017.
35. Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, and Andy
Rindos. Performance modeling of PBFT consensus process for permissioned blockchain
network (hyperledger fabric). In 2017 IEEE 36th Symposium on Reliable Distributed
Systems (SRDS), pages 253–255. IEEE, 2017.
36. Du Mingxiao, Ma Xiaofeng, Zhang Zhe, Wang Xiangwei, and Chen Qijun. A review
on consensus algorithm of blockchain. In 2017 IEEE International Conference on
Systems, Man, and Cybernetics (SMC), pages 2567–2572. IEEE, 2017.
37. Imran Bashir. Mastering Blockchain: Deeper Insights into Decentralization,
Cryptography, Bitcoin, and Popular Blockchain Frameworks. Packt Publishing
Limited, 2017.
38. Aleksey Novikov, Evgeny Gavrikov, Aleksandr Oleynik, Yuriy Zhirnov, and Nikolay
Pestov. Blockchain technologies in managing socioeconomic systems: A study of legal
practice. Revista Inclusiones, pages 452–461, 2020.
39. Tiana Laurence. Blockchain for Dummies. John Wiley & Sons, 2019.
18 Technology in
Industry 4.0
Rashmy Moray and Amar Patnaik
Symbiosis Institute of Management Studies (SIMS),
Symbiosis International (Deemed) University
CONTENTS
18.1 Introduction................................................................................................... 253
18.2 Evolution of the Industrial Revolutions-from 1st to the 4th.......................... 254
18.2.1 Industry 1.0 | Mechanization.......................................................... 254
18.2.2 Industry 2.0 | Electrification........................................................... 255
18.2.3 Industry 3.0 | Automation............................................................... 255
18.2.4 Industry 4.0 | Cyber-Physical Systems............................................ 256
18.3 Key Technologies in Industry 4.0.................................................................. 257
18.3.1 Robotics.......................................................................................... 257
18.3.2 Industrial-IoT (IIoT)........................................................................ 258
18.3.3 Artificial Intelligence (AI).............................................................. 258
18.3.4 5G Network (5G)............................................................................. 259
18.3.5 Cloud............................................................................................... 259
18.3.6 Cybersecurity..................................................................................260
18.3.7 Big Data Analytics..........................................................................260
18.3.8 Additive Manufacturing.................................................................. 261
18.3.9 Augmented Reality (AR)................................................................ 262
18.3.10 Digital Twin (DT)............................................................................ 262
18.3.11 Blockchain....................................................................................... 263
18.4 Contemporary Scenario................................................................................. 263
18.5 Need and Significance...................................................................................264
18.6 Conclusion.....................................................................................................264
References............................................................................................................... 265
18.1 INTRODUCTION
From the first to the fourth industrial revolution (IR), we have witnessed a substantial
radical renaissance of technological evolution, from steam power-driven locomo-
tives to electrical and digital mechanized output, making the production processes
increasingly complex, automatic, challenging, and sustainable [1]. However, the
aging population and intereconomic competition are some of the driving factors for
the development of efficient technologies such as industrial Internet of things (IIoT)
and the cyber-physical systems (CPSs) to cater to the needs of effective systems and
for improved industrial productivity [2].
Historians who studied the magnitude of radical transformations in the 18th and
19th centuries believed that industrial revolution should comprise and be reflected in
the growth of macroeconomic aspects such as gross national product (GNP), gross
domestic product (GDP), manufacturing produce, wealth creation, and production
efficiency.
The manufacturing sector has been the driver of productivity growth by contribut-
ing 16% to the global GDP and playing a significant role in global economic devel-
opment. The history of manufacturing has transformed dramatically, witnessing
immense growth fueled by four big industrial revolutions.
garbage, agricultural and forest waste, small hydro, ocean tides, and waves [11].
In the year 1960, the IR3 commenced with the usage of computers and paved the way
through the expansion and conjunction of information and communications technol-
ogy (ICT). For the first time, industrial robots were introduced by General Motors
in 1961, and the first personal computers were seen during the 1980s. This period
witnessed the “dotcom” boom fueled by investments in cyber-tech companies from
around the globe [12].
Driven by technological advancement and the development of IT and automa-
tion, it transformed the manufacturing industries. Recognized as an era of high-level
automation, PLCs (programmable logic controllers) and Industrial Robots, played
an important role in the manufacturing of increasingly complex products, from
automobiles with onboard computers to handphones. China, South Korea, Taiwan,
Hong Kong, and Singapore—with their growing industrialization and being fueled
by exports—were able to achieve higher economic growth during the IR3. One of
the biggest inventions in this era was “3D printing,” a technology that revolutionized
the way the products were made and reduced the manufacturing time of complex
parts. Thus, robotics and 3D printing are important transformational drivers in the
IR3 [12].
Jeremy Rifkin, the architect of “The Third Industrial Revolution,” described the
five energy pillars as (i) shift to renewable energy, (ii) transformation of the building
stock into green micropower plants to collect renewable energies onsite, (iii) distri-
bution of hydrogen and supplementary storage technologies across infrastructures
to store intermittent energies, (iv) the use of Internet technology to transform the
power grid of every continent into an energy Internet that acts just like the Internet,
and (v) transition of the transport fleet to electric plug-in and fuel-cell vehicles.
Digitalization was set to mark the disruption of small, medium, and large manufac-
turers in this IR3 [13].
However, despite the technological innovation during these three IRs, emerging
and advanced economies alike have experienced a decline in their manufacturing
sectors, which became insignificant for national incomes and growth for the last
couple of decades [14].
Apparently, the fourth industrial revolution (IR4.0) is the current mechanization
of conventional engineering and industrial practices using contemporary smart tech-
nologies to bring the economy back to the growth trajectory [15]. The contemporary
wave of I4.0 is characterized by “CPSs,” which combines the power of ubiquitous
ICT and physical manufacturing systems together to create a positive impact on pro-
ductivity improvement.5
The key concepts of I4.0 were issued in the public domain for the first time as a
part of a strategic initiative by the German government in the year 2011 and were
incorporated in the “High-Tech Strategy 2020 Action Plan.” The first three IRs rep-
resent Mechanization, Electrification, and Automation, respectively, followed by the
I4.0 with the introduction of the IIoT, where the machineries, warehousing systems,
and production facilities are poised to connect seamlessly through a cloud network,
forming CPSs [18]. Thus, CPSs are the basis of IR4.0, with socio-technical interac-
tions between the actors and the manufacturing resources [19].
While physical systems in manufacturing generate massive amounts of data, their
connectivity to the digital world enables data collection and analysis to obtain mean-
ingful insights for better visibility and faster decision-making. Thus, analytics is the
key to manufacturers in the I4.0 [20].
The next level of automation and data exchange in manufacturing technologies,
including CPSs, the IIoT, cloud computing, and cognitive computing, are some of the
few key elements that define the “smart factories” in I4.0. Custom-based modular-
ized production with personalized products, a service-oriented approach, a supply
chain with near-real-time visibility, and a connected-ecosystem enabling customer-
to-consumer interaction are some of the goals of I4.0 for providing value (quality
and cost) and speed to the end customers.6 Apparently, Industry 4.0 is evolving at an
exponential rather than at a linear pace, disrupting each and every industry world-
wide and heralding the transition of entire structures of production, management,
and governance [16].
18.3.1 Robotics
Developments in mechatronics, computing, and ICT have given birth to the contem-
porary field of robotics and autonomous systems (RAS) [21]. Known as collaborative
robots (COBOTs), these smart robots interact with the environment through mod-
els and perform various tasks autonomously to optimize production efficiency and
maximize industrial gains/profits [22]. Robots possess clear advantages in terms of
speed, quality, and strength over manual labor. Industrial robots are used for material
handling, which automates tedious, dull, repetitive, and often unsafe tasks at produc-
tion lines. Enriching industrial robots with technologies like artificial intelligence
(AI) and computer vision enables the completion of complex tasks.6 With the help
of AI, computer vision, and haptic-sensing, industrial robots will have capabilities
similar to those of humans to interact, manipulate, train, and identify objects that are
required to separately tailor the products. Thus, the new generation COBOTs would
enhance the impact of intelligent automation by maximizing the abilities of both
humans and machines together [21].
258 Intelligent Analytics for Industry 4.0 Applications
18.3.2 Industrial-IoT (IIoT)
IIoT refers to the technology and application of connecting devices and systems to
exchange data and collaboratively implement services. It has been estimated that
by 2030, over 50 billion IoT devices will be connected to the Internet.7 In IIoT, sen-
sors embedded in the machines continuously generate real-time data that provides
manufacturing companies useful insights about the machines such as condition-
monitoring, efficiency-analysis, and machine-utilization. Using appropriate services,
networking technologies, applications, sensors, software, middleware, and storage
systems, IIoT offers solutions and functions that develop insights to improve the
capability of monitoring and controlling organizations’ procedures and assets [23].
Additionally, through various interconnected devices and more centralized control-
lers, it provides scope for decentralized analytics and decision-making process to
make real-time responses and reactions much faster [24]. This results in better avail-
ability and maintainability of enterprise assets, improved operational efficiency,
faster time-to-market with reduced unplanned downtime, improved production effi-
ciency, and exceptional levels of economic growth [25].
comes from these layers with built-in forward and backward propagation functions,
which train the model to perform specific tasks as per the requirement [29]. One area
of research in DNN is in the field of natural language processing (NLP), which uses
two main types of architectures: convolutional neural network (CNN) and recur-
rent neural network (RNN) [30]. DL uses manufacturing data for product quality
inspection, fault diagnosis, anomaly detection, etc. and offers insightful information
to various stakeholders in manufacturing organizations, for making better decisions
and manufacturing more productive [31].
Today, AI is considered to be the driving force behind I4.0 across both discrete
and continuous manufacturing industries, thus giving rise to the intelligent factories
where humans and CPSs interact in the cloud9 with telecom technologies such as 2G,
3G, 4G, and the evolving 5G, as the basis for network communication.
18.3.5 Cloud
Cloud is an infrastructure-as-a-service (IaaS) platform with computational capa-
bilities such as storage, databases, servers, networking, software, analytics, and
intelligence, which are offered as-a-service over-the-Internet or “the cloud.” Cloud
allows companies to tap into computing resources and services as a utility instead
of building and maintaining them in-house [33]. It offers rapid innovation, flexi-
ble resources, and economies-of-scale for various business entities and individuals
involved in the ecosystem of I4.0.12 Today, multinational companies have globally
distributed manufacturing setups and an increased requirement for data sharing for
more production-related undertakings. As cloud technologies evolve over time, they
will provide more opportunities to manufacturers for production system-related data-
driven services by leveraging the functionality and machine data deployed on the
cloud [34].
Cloud-based design and manufacturing (CBDM) is a term used to represent the
process of product realization, which includes design and manufacturing resources
260 Intelligent Analytics for Industry 4.0 Applications
18.3.6 Cybersecurity
In the interconnected I4.0 realm, ensuring privacy and data security is the key to
prevent cyber crime and cyber terrorism, which could disrupt the system and take it
down when everyone is connected. This is no exception for manufacturing as it gets
more digitized and adopts automation.14 Thus, the existence of IIoT and the demand
for the integration of information technology (IT) and operational technology (OT),
has dramatically changed the entrance of cyber threats. Security threats and vulner-
abilities of IIoT challenges are the vital reasons for cyber attacks [36]. Cybersecurity
ensures to prevent such threats.
Vulnerabilities, threats, and attacks are the three vital concepts that form the
core of cybersecurity problems. Vulnerability refers to any weakness that can be
easily exploited within computing or networking systems that can lead to possible
threats. A threat refers to any such process that can potentially infringe system’s
security policies that lead to an attack [37]. An attack is essentially contemplated to
be an active process that intentionally pursues to breach a system’s security policies.
With the help of cybersecurity, organizations minimize the effect of attacks that
potentially exploit vulnerabilities and reduce threats within systems to the extent
possible [38].
According to the security software provider McAfee, cyber attacks targeting
manufacturers increased sevenfold in 2020 between January and April, with finan-
cial losses caused by data breaches increasing 270% to $8.4 billion from January to
March year on year.15 This is the reason why cybersecurity in most recent times is
considered to be one of the most popular and demanding technologies of research
interest in the I4.0 world.
characterized by three Vs, viz., volume, velocity, and variety, which differentiate it
from traditional data [39]. It entails the process of the collection, transfer, storage,
and analysis of data, for example, in predictive modeling, which supports decision-
making.16 Big data is essential in manufacturing to achieve efficiency gains and to
uncover novel acumens to drive innovation. With the help of big data-based analyt-
ics, manufacturers can discover new data and identify patterns that allow them to
enhance procedures, improve effectiveness of the supply chain, and identify vari-
ables that disturb manufacturing.17
Big data analytics are presently used for many industrial applications. This
includes product lifecycle management [40], process redesigning [41], supply-chain
management, and data analysis of the production systems for monitoring, detection
of anomalies, root cause analysis, and additional knowledge [42].
Improved factory operations and production, product quality, supply chain effi-
ciency, customer experience, and reduced machine downtime are some of the exam-
ples of use cases of big data analytics in manufacturing [43].
18.3.8 Additive Manufacturing
Additive manufacturing, in contrast to subtractive manufacturing, describes the pro-
cess of building physical objects by adding materials rather than removing materials.
It works by using 3D computer-aided design (CAD) models to create 3D-printed
parts by depositing materials layer-by-layer with the help of a 3D printing machine
onto a surface. Materials to make these parts can be of a wide variety of types,
including metallic, ceramic, and polymeric materials, along with combinations in the
form of composites, hybrid, or functionally graded materials. 3D printing is emerg-
ing as a valuable digital manufacturing technology of I4.0 [44]. Initially, it was only a
rapid prototyping technology (RPT) that evolved over a period to advanced additive
manufacturing technology, which fundamentally proposes an enormous opportunity
for manufacturing, from tooling to mass customization across virtually all industries
[45]. Additive manufacturing allows components to be stored in virtual inventories
as 3D design files so that they can be manufactured on demand, a model known as
distributed manufacturing. Such a decentralized approach reduces the cost of trans-
port and simplifies inventory management by storing digital files instead of physical
components.18
Some of the potential benefits associated with additive manufacturing are as fol-
lows: (i) direct translation of design to components, (ii) part generation with greater
customization, (iii) ability to produce complex internal features, (iv) reduced weight
of the parts, (v) substantial reduction in overall product development and manufac-
turing lead time, (vi) involvement of smaller manufacturing operations, (vii) high
scalability, (viii) maximum material utilization with minimal waste, and (ix) capabil-
ity to produce fully functional parts [46].
Although the complete adoption of this technology in an industrial setting requires
reaching a certain level of design maturity, additive manufacturing has the potential
to have a constructive impact on the industrial segment by minimizing production
costs, logistics costs, inventory costs, and costs involved in the advancement and
automation of new products [47].
262 Intelligent Analytics for Industry 4.0 Applications
18.3.11 Blockchain
Blockchain in manufacturing is a distributed digital record of transactions of indi-
vidual records structured as “blocks”, which are linked into a single list, or “chain”,
hence the name blockchain. It is also known as distributed ledger technology [54].
Each transaction added to a blockchain is validated with consensus from the stake-
holders before being added to the blockchain [55].
Through a peer-to-peer network, blockchain enables manufacturers to streamline
operations, gain greater visibility into supply chains, and track assets with a higher
level of precision [56]. Blockchain serves the purpose of tackling the issue of possible
inaccurate and tampered data, which poses the risk of huge threats to the intercon-
nected networks of systems [57].
Government and the Indian Automotive Industry, India is poised to create enabling
ecosystem which will help India become a world-class manufacturing hub in the
years to come [61]. With an investment from the Boeing Company and with a part-
nership with the Indian Institute of Science’s (IISc) Centre for Product Design and
Manufacturing, India’s first smart factory in Bengaluru, equipped with data exchange
in manufacturing and the Internet of Things (IoT) is being developed in line with the
I4.0 standard framework [62].
However, the overall current scenario of I4.0 adoption readiness challenges in
India can be due to (i) lack of understanding of the technologies, (ii) lack of an
organized approach toward digital transformation, (iii) lack of interest to adopt I4.0
technologies, (iv) consideration of cheap labor in lieu of adopting automation, (v)
a small volume of products making it not lucrative for investment, and (vi) skillset
unavailability to adopt automation [59].
18.6 CONCLUSION
I4.0 is the convergence of the physical and digital worlds. Intelligent factories of
I4.0 will have machines and products communicating with each other cooperatively,
Technology in Industry 4.0 265
REFERENCES
1. D. Rodrik, “Premature deindustrialization,” Journal of Economic Growth, vol. 21, no.
1, pp. 1–33, 2015.
2. J. Qin, Y. Liu, and R. Grosvenor, “A categorical framework of manufacturing for
Industry 4.0 and beyond: changeable, agile, reconfigurable & virtual production,” in
Procedia CIRP, 2016.
3. N. Crafts, “The first industrial revolution: A Guided Tour for Growth Economists, The
American Economic Review,” in Papers and Proceedings of the Hundredth and Eighth
Annual Meeting of the American Economic Association, San Francisco, CA, 1996.
4. N. F. R. Crafts and C. K. Harley, “Output growth and the British industrial revolu-
tion: a restatement of the Crafts-Harley,” Economic History Review, vol. 45, no. 4,
pp. 703–730, 1992.
5. N. F. R. Crafts, “Exogenous or endogenous growth? The industrial revolution reconsid-
ered,” Journal of Economic History, vol. 54, no. 4, pp. 745–772, 1995.
6. G. Nelson, “Rise and fall of American technological leadership: The postwar era in
historical perspective,” Journal of Economic Literature, vol. 34, no. 4, pp. 1931–1964,
1992.
7. M. Jacob, “Mechanical science of the factory floor,” History of Science, vol. 45, no. 148,
pp. 197–221, 2007.
8. H. K. Mohajan, “The second industrial revolution has brought modern social and eco-
nomic developments,” American Institute of Science, vol. 6, no. 1, pp. 1–14, 2020.
9. S. Kim, “Immigration, industrial revolution and urban growth in the United States,”
1820 1920: Factor Endowments, Technology and Geography, Working Paper 12900,
2007.
10. J. Rifkin, “Ecological, Ushering in a Smart Green Digital Global Economy to Address
Climate Change and Create a More,” WordPress, 2015.
11. T. Waghorn, “http://www.siaf.ch/files/130410-rifkin-2.pdf,” 12 December 2011.
[Online]. Available: http://www.siaf.ch/files/130410-rifkin-2.pdf
12. B. Roberts, “The third industrial revolution: Implications for planning cities and
regions,” 2015.
13. J. Rifkin, “The Third Industrial Revolution,” Spring, pp. 32–34, 15 November 2012.
14. IMF, “https:// www.imf.org/B/media/Files/Publications/WEO/2019/October/English/
text.ashx,” 2019. [Online].
15. J. Taalbi, “Origins and pathways of innovation in the third industrial revolution,”
Industrial and Corporate Change, vol. 28, no. 5, pp. 1125–1148, 2019.
16. Schwab, “https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-
what-it-means- and-how-to-respond/#,” 14 January 2016. [Online]. Available: https://
www.weforum.org.
17. J. M. Xu, “The fourth industrial revolution: opportunities and challenges,” International
Journal of Financial Research, vol. 9, no. 2, pp. 90–95, 2018.
266 Intelligent Analytics for Industry 4.0 Applications
18. H. Drath, “Industrie 4.0: hit or hype?,” IEEE Industrial Electronics Magazine, vol. 8,
no. 2, pp. 56–58, 2014.
19. W. Kagermann, “Securing the future of German manufacturing industry: recommenda-
tions for implementing the strategic initiative,” Final report of the Industry 4.0, Working
Group, European Commission, DG Employment, Social Affairs and Inclusion, 2013.
20. Y. M. Omar, M. Minoufekr, and P. Plapper, “Business analytics in manufacturing:
Current trends, challenges and pathway to market leadership,” Operations Research
Perspectives, vol. 6, no. 1, pp. 100127, 2019.
21. L. Pawar, “https://www.ukras.org/wp-content/uploads/2018/10/UK_RAS_wp_
manufacturing_web.pdf” 2016. [Online]. Available: https://www.ukras.org.
22. H. P. Karabegovic, “The role of service robots in Industry 4.0—smart automation of
transport,” International Scientific Journal “Industry 4.0”, vol. 4, no. 6, pp. 290–292,
2019.
23. S. Lampropoulos, “Internet of Things in the context of Industry 4.0: An overview,”
International Journal of Entrepreneurial Knowledge, vol. 7, no. 1, pp. 4–19, 2019.
24. D. B. Sen, “Smart factories: a review of situation, and recommendations to accelerate
the evolution process,” in Proceedings of the International Symposium for Production
Research, 2018.
25. A. Gilchrist, “Designing Industrial Internet Systems,” in Industry 4.0: The Industrial
Internet of Things, Apress, pp. 87–118, 2016.
26. Z. Mosterman, “Industry 4.0 as a cyber-physical system study,” Software and Systems
Modeling, vol. 15, no. 1, pp. 17–29, 2015.
27. D. Lee, “Industrial artificial intelligence for industry 4.0-based manufacturing sys-
tems,” Manufacturing Letters, vol. 18, pp. 20–23, 2018.
28. H. D. Wehle, “Machine learning, deep learning, and AI: What’s the difference?,” in
International Conference on Data Scientist Innovation Day, Bruxelles, Belgium, 2017.
29. K. Atkeson, “The Transition to a New Economy after the Second Industrial Revolution,”
Working Paper 606, 2001.
30. W. Yin, K. Kann, M. Yu, and H. Schütze, “Comparative study of CNN and RNN for
natural language processing,” arXiv preprint arXiv:1702.01923, pp. 1–7, 2017.
31. Y. Wang, “Deep learning for smart manufacturing: methods and applications,” Journal
of Manufacturing Systems, vol. 48, pp. 144–156, 2018.
32. D. M. T. N. O’Connell, “Challenges associated with implementing 5G in manufactur-
ing,” Telecom, vol. 1, no. 1, pp. 48–67, 2020.
33. A. Fernández, S. del Río, V. López, A. Bawakid, M. J. del Jesus, J. M. Benítez, and F.
Herrera, “Big Data with Cloud Computing: An insight on the computing environment,
MapReduce, and programming frameworks,” WIRES Data Mining and Knowledge
Discovery, vol. 4, no. 5, pp. 380–409, August 2014.
34. M. Rüßmann, M. Lorenz, P. Gerbert, M. Waldner, P. Engel, M. Harnisch, and J. Justus,
“https://www.bcg.com/publications/2015/ engineered_products_project_business_
industry_4_future_productivity_growth_manufacturing_industries,” 9 April 2015.
[Online]. Available: https://www.bcg.com/.
35. D. Thames, “Software-defined cloud manufacturing for Industry 4.0,” in Procedia
CIRP, 2016.
36. B. Ervural, “Overview of cyber security in the Industry 4.0 Era,” in Managing the
Digital Transformation, 2018, pp. 267–284.
37. Hongmei He et al., “The security challenges in the IoT enabled cyber-physical systems
and opportunities for evolutionary computing & other computational intelligence,” in
IEEE Congress on Evolutionary Computation (CEC), 2016.
38. J. Lane Thames, “Distributed, collaborative and automated cybersecurity infrastruc-
tures for cloud-based design and manufacturing systems,” Cloud-Based Design and
Manufacturing (CBDM), pp. 207–229, 2014.
Technology in Industry 4.0 267
39. B. Purcell, “Big data using cloud computing,” Journal of Technology Research, vol. 5,
no. 8, pp. 1–8, 2014.
40. F. Li, “Big Data in product lifecycle management,” The International Journal of
Advanced Manufacturing Technology, vol. 81, no. 14, p. 667 684, 2015.
41. K. N. Palma-Mendoza, “A business process re-design methodology to support supply
chain integration: application in an airline MRO supply chain,” International Journal
of Information Management, vol. 35, pp. 620–631, 2015.
42. H. T. W. K. Ismail, “Manufacturing process data analysis pipelines: a requirements
analysis and survey,” Journal of Big Data, vol. 6, no. 1, pp. 1–26, 2015.
43. H.-N. Dai, H. Wang, G. Xu, J. Wan, and M. Imran, “Big Data analytics for manufactur-
ing internet of things: opportunities, challenges and enabling technologies,” Enterprise
Information Systems, vol. 14, pp. 1–25, 2015.
44. U. M. Dilberoglu, B. Gharehpapagha, U. Yamana, and M. Dolen, “The role of additive
manufacturing in the era of Industry 4.0,” in 27th International Conference on Flexible
Automation and Intelligent Manufacturing, FAIM2017, Modena, Italy, 2015.
45. J. Butt, “Exploring the Interrelationship between Additive Manufacturing and Industry
4.0,” Designs, vol. 4, no. 13, pp. 1–33, 2020.
46. S. A. M. Tofail, E. P. Koumoulos, A. Bandyopadhyay, S. Bose, L. O’Donoghue, and
C. Charitidis, “Additive manufacturing: scientific and technological challenges, market
uptake and opportunities.,” Materials Today, vol. 21, no. 1, pp. 22–37., 2018.
47. R. Godina, I. Ribeiro, F. Matos, Bruna T. Ferreira, H. Carvalho, and P. Peças, “Impact
assessment of additive manufacturing on sustainable business models in industry 4.0
context,”. Sustainability, vol. 12, no. 17, p. 7066, 2020.
48. F. DePace, “Augmented reality in industry 4.0,” American Journal of Computer Science
and Information Technology, vol. 6, no. 01, pp. 1–7, 2018.
49. P. Fraga-Lamas, T. M. FernáNdez-CaraméS, Ó. Blanco-Novoa, and M. A. Vilar-
Montesinos, “A review on industrial augmented reality systems for the industry 4.0
shipyard,” 2018. doi: 10.1109/ACCESS.2018.2808326
50. V. Paelke, “Augmented reality in the smart factory: Supporting workers in an industry
4.0. environment.,” in Proceedings of the 2014 IEEE emerging technology and factory
automation (ETFA), 2014.
51. C. Narcisa Deac, G. Calin Deac, C. Laurentiu Popa, M. Ghinea and C. Emil Cotet,
“Using augmented reality in smart manufacturing,” in Annals of DAAAM &
Proceedings, 2017.
52. T. H.-J. Uhlemann, C. Lehmann, and R. Steinhilper, “The digital twin: Realizing the
cyber-physical production system for industry 4.0,” Procedia Cirp, vol. 61, pp. 335–340,
2017.
53. Z. Wang, “Digital twin technology, in Industry 4.0—Impact on Intelligent Logistics
and Manufacturing,” pp. 7–21, 2020.
54. T. Ko, J. Lee, and D. Ryu, “Blockchain technology and manufacturing industry: Real-
time transparency and cost savings,” Sustainability 1, vol. 10, no. 11, p. 4274, 2018.
55. S. Zhang and J.-H. Lee, “Analysis of the main consensus protocols of blockchain,” ICT
Express, vol. 6, pp. 93–97, 2019.
56. A. Vatankhah Barenji, Z. Li, W. M. Wang, G. Q. Huang, and D. A. Guerra-Zubiaga,
“Blockchain-based ubiquitous manufacturing: A secure and reliable cyber-physical
system,” International Journal of Production Research, vol. 58, no. 7, pp. 2200–2221,
2020.
57. T. Kobzan, A. Biendarra, S. Schriegel, T. Herbst, T. Müller, and J. Jasperneite, “Utilizing
blockchain technology in industrial manufacturing with the help of network simula-
tion,” in 2018 IEEE 16th International Conference on Industrial Inf, 2018.
58. A. Schumacher, S. Erol, and W. Sihn, “A maturity model for assessing Industry 4.0
readiness and maturity of manufacturing enterprises,” in Procedia Cirp, 2016.
268 Intelligent Analytics for Industry 4.0 Applications
59. K. Pundir, “The role of Industry 4.0 of small and medium enterprises in Uttar Pradesh,”
ABS International Journal of Management, vol. 6, no. 2, pp. 68–74, 2018.
60. V. V. Jadhav, R. Mahadeokar, and S. D. Bhoite, “The Fourth Industrial Revolution (I4.
0) in India: Challenges & Opportunities,” International Journal of Trend in Scientific
Research and Development, pp. 105–109, 2019. https://doi.org/10.31142/ijtsrd23076
61. S. Chouhan, P. Mehra, and A. Dasot, “India’s readiness for Industry 4.0–A focus on
automotive sector,” Confederation of Indian Industry (CII), Grant Thornton-An
Instinct for Growth, 2017.
62. A. Gautam, “Industry 4.0: The Industrial Revolution and New Concepts for the Factory
of Future,” International Journal for Research in Applied Science and Engineering
Technology (IJRASET), vol. 8, no. 6, pp. 1718–1722, 2020.
63. M. Wang, “Industry 4.0: a way from mass customization to mass personalization pro-
duction,” Advances in Manufacturing, vol. 5, no. 4, pp. 311–320, 2017.
64. J. Greenwood, “The IT revolution and the stock market,” Economic Review, vol. 35, no.
2, pp. 2–13, 1999.
65. J. Greenwood, “The third industrial revolution: technology, productivity, and income
equality,” Economic Review, vol. 35, pp. 2–12, 2001.
66. G. Sarma, “Identities in the future Internet of Things,” Wireless Personal
Communications, vol. 49, no. 3, pp. 353–363, 2009.
67. L. R. D. D. Schaefer, “Distributed collaborative design and manufacture in the cloud—
motivation, infrastructure, and education,” in American Society for Engineering
Education Annual Conference Paper# AC2012–3017, San Antonio, 2012.
68. H. Tuptuk, “Security of smart manufacturing systems,” Journal of Manufacturing
Systems, vol. 47, pp. 93–106, 2018.
NOTES
1 https://history.state.gov/milestones/17761783
2 https://en.wikipedia.org/wiki/American_Revolutionary_War
3 https://en.wikipedia.org/wiki/Second_Industrial_Revolution
4 https://www.pbs.org/wgbh/theymadeamerica/whomade/slater_hi.html8
5 https://www.i-scoop.eu/industry-4-0/
6 h t t p s: // w w w. m a n u f a c t u r i n g t o m o r r ow. c o m /a r t i c l e / 2 016 / 0 7/ r o b o t s - i n -
manufacturing-applications/8333
7 https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-
technology/
8 https://rapidminer.com/blog/6-ways-machine-learning-revolutionizing-manufacturing/
9 https://nexusintegra.io/artificial-intelligence-the-driving-force-behind-industry-4-0/
10 ht t ps://www.gsma.com /iot /wp - content /uploads/2020/0 4/2020 0 4_GSM A _
SmartManufacturing_Insights_On_How_5G_IoT_Can_Transform_Industry.pdf
11 https://www.information-age.com/5g-is-the-heart-of-industry-4-0-123483152/
12 https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/
13 https://www.loadspring.com/post/is-your-industry-fast-tracking-cloud-adoption/
14 https://www.euroscientist.com/modern-manufacturing-needs-cybersecurity
15 https://asia.nikkei.com/Business/Technology/Honda-and-other-smart-factories-fall-
prey-to-hackers
16 https://www.sas.com/en_in/insights/big-data/what-is-big-data.html
17 https://www.manufacturing.net/operations/article/13228439/using-big-data-
analytics-to-improve-production
18 https://am fg.ai /2019/03/28/industr y- 4 - 0 -7-real-world-examples-of-digital-
manufacturing-in-action/
Technology in Industry 4.0 269
19 https://iot-analytics.com/industry-4-0-adoption-2020-who-is-ahead/
20 ht t p s://w w w.m ck i n s ey.c om / bu si ne ss -f u nct ion s /op e r a t ion s /ou r-i n sig ht s /
industry-40-reimagining-manufacturing-operations-after-covid-19
21 https://zinnov.com/covid19-and-the-automotive-industry-shifting-gears-on-the-other-
side-of-coronavirus/
19 Intelligent Analytics in
Cyber-Physical Systems
Manjushree Nayak, Priyanka P. Pratihari,
Sanjana Mahapatra, and Shyam Sundar Pradhan
NIST Institute of Science and Technology (Autonomous),
CONTENTS
19.1 Introduction................................................................................................... 271
19.2 Cyber-Physical System.................................................................................. 272
19.2.1 Smart Connection.............................................................................. 272
19.2.2 Data-To-Information Conversion....................................................... 272
19.2.3 Cyber................................................................................................. 272
19.2.4 Cognition........................................................................................... 273
19.2.5 Configuration..................................................................................... 273
19.3 Internet of Things with the Advancement of Industries................................ 273
19.4 Methodology for Designing CPS-Based Industry 4.0 Systems..................... 274
19.5 Case Study..................................................................................................... 275
19.5.1 Industrial Robot................................................................................. 275
19.5.2 Virtual Battery................................................................................... 275
19.6 Conclusion..................................................................................................... 278
References............................................................................................................... 278
19.1 INTRODUCTION
In past decades, companies focus on the quality products and improvement of their
products. But now in today’s world, enterprises are enforced to maintain competency
and their position in the marketplace [1]. Recent technological advancements in com-
puter science and technology have provided solutions to obtain and transfer colossal
amounts of data from their fast-moving environment. Correspondingly, to handle
such a vast amount of data “big data” came into account. Methods and terms such as
the Internet of Things and interconnected systems are introduced to apply a solution
to the “big data” environment [2].
The concept of total productive maintenance [3] evolved from an organization-
centric focus on quality to a customer-centric focus on value creation and smart
services. The evolution led to the development of prognostics and health management
(PHM). PHM policies are designed to predict component failures, thus minimizing
unexpected system downtimes. The underlying patterns are helping to avoid the
costly failures and downtime of machinery. Near-zero breakdown can be obtained
19.2.1 Smart Connection
Connecting machines and their components to obtain accurate data is the first step to
develop CPS for modern industries. Various devices or sensors are used to acquire a
variety of data and store and transfer it to a central server. At this level, the workflow
has a significant impact on the performance of CPS in the next levels, and it is pos-
sible to discover quality and accuracy through the system.
19.2.2 Data-To-Information Conversion
Analyzing and converting data into information is the core of the architecture. In
recent years, algorithms and techniques for data mining have been developed. A
variety of data sources, from machinery to business management data, will be used
to implement such algorithms.
19.2.3 Cyber
The cyber level plays the role of a central information hub, which collects massive
information from machines in machinery work. To extract additional data, specific
Intelligent Analytics in Cyber-Physical Systems 273
analytics are used that provide a better understanding of individual machines within
a fleet.
19.2.4 Cognition
At this level, users decide by information provided to them through the presentation.
Comparative information and individual machine status can make it easier to deter-
mine the priority of maintenance tasks.
19.2.5 Configuration
This level gives feedback from cyberspace to physical space. A supervisory level
performs the self-configuration and self-adaptation of machines. By applying correc-
tive and preventive decisions, it serves as a resilience control system.
19.5.2 Virtual Battery
An electric or hybrid vehicle is not complete without a battery pack. In addition to
concerns about battery safety, uncertainty about driving range, and reliability and
276 Intelligent Analytics for Industry 4.0 Applications
19.6 CONCLUSION
This paper examined current trends regarding the implementation of CPSs
in manufacturing industry. A generic architecture for implementing CPS in
manufacturing is necessary since industrial big data has become a challenge for
factories. In this article, we discuss the 5C architecture for automating and centralizing
data processing, health assessment, and prognostics. This architecture covers all the
steps involved in generating and analyzing data, presenting it to users, and supporting
decisions. It is possible to use the health information generating by a system to
perform higher-level functions such as maintenance scheduling and improve control
to enhance overall system productivity. Using a case study of CNS saw machines, a
brief look at the capabilities of the 5C architecture is demonstrated. The case study
shows the application of the 5C architecture in a manufacturing environment for the
processing and management of a fleet of CNC saw machines. In the current state of
integration, the 5C CPS architecture is in its infancy. Advancements in all five levels
of the architecture are therefore realistic. A distributed data management system
with new algorithms for fleet-level analysis of machine performance has significant
potential for advancement at the cyber level.
REFERENCES
1. L. Da Xu (2011) “Enterprise Systems: State-of-the-Art and Future Trends.” Industrial
Informatics.
2. E. Dumbill (2013) “Big Data Is Rocket Fuel.” Big Data.
3. Big Data in Cyber-Physical Systems, Digital Manufacturing and Industry 4.0 Lidong
Wang, Guanghui Wang.
4. Industrial Big Data Analytics and Cyber-Physical Systems for Future Maintenance &
Service Innovation Jay Lee, Hossein Davari Ardakani, Shanhu Yang, Behrad Bagheri.
Intelligent Analytics in Cyber-Physical Systems 279
5. Research on IoT Based Cyber Physical System for Industrial Big Data Analytics C.K.M.
Lee, C.L. Yeung, M.N. Cheng.
6. A. Stork (2015) Visual Computing Challenges of Advanced Manufacturing and
Industrie 4.0. IEEE Computer Graphics and Applications, March/April 21–25.
7. M. Anne and M. Gobble (2014) News and Analysis of the Global Innovation Scene.
Research Technology Management, November/December, 2–3.
8. Audio-Tech Business Book Summaries, Inc. (2015) Industry 4.0 and the U.S.
Manufacturing Renaissance. Trends E-Magazine, June, 4–10.
9. I. R. Anderl (2014) Industrie 4.0- Advanced Engineering of Smart Products and Smart
Production, Technological Innovations in the Product Development. 19th International
Seminar on High Technology, Piracicaba, Brasil, October 9th, 2014, 1–14.
10. I. Singh, N. Al-Mutawaly, and T. Wanyama (2015) Teaching Network Technologies
That Support Industry 4.0. Proc. 2015 Canadian Engineering Education Association
(CEEA15) Conf., CEEA15; Paper 119, McMaster University; May 31–June 3, 1–5.
11. J. Bechtold, C. Lauenstein, A. Kern, and L. Bernhofer (2014) Industry 4.0-The
Capgemini Consulting View. Technical Report, Capgemini Consulting.
12. R. Davies (2015). Industry 4.0 Digitalization for Productivity and Growth, European
Parliamentary Research Service (EPRS), Briefing, 1–10.
13. J. Lee, B. Bagheri, and H. A. Kao. (2015) “A Cyber-Physical Systems Architecture for
Industry 4.0-Based Manufacturing Systems.” Manufacturing Letters, 3: 18–23.
14. F. T. S. Chan, H. C. W. Lau, R. W. L. Ip, H. K. Chan, and S. Kong. (2005) “Implementation
of Total Productive Maintenance: A Case Study.” International Journal of Production
Economics, 95(1): 71–94.
15. F. Ju, J. Wang, J. Li, and G. Xiao. (15 January 2013) “Virtual Battery: A Battery
Simulation Framework for Electric Vehicles.” IEEE Transactions on Automation
Science and Engineering, 10(1): 5.
16. Y. He, W. Liu, and B. J. Koch. (2010) “Battery Algorithm Verification and Development
Using Hardware-in-the-Loop Testing.” Journal of Power Sources, 195: 2969–2974.
20 An Overlook on
Security Challenges
in Industry 4.0
R. Ramya, S. Sharmila Devi, and Y. Adline Jancy
Sri Ramakrishna Engineering College
CONTENTS
20.1 Introduction to Industrial Internet of Things................................................. 281
20.1.1 Security Troubles and Issues in Enforcing the IIoT.......................... 282
20.2 Security Attacks in Field Devices..................................................................284
20.2.1 Securing an IIoT Device.................................................................... 285
20.2.2 A Step-by-Step Security Strategy for IIoT Devices........................... 286
20.3 Security Breaches in Industrial Control Systems........................................... 286
20.3.1 Attacks in ICS Systems...................................................................... 287
20.4 Security Challenges in Communication Networks........................................ 287
20.5 Necessity of Data Protection.......................................................................... 288
20.5.1 Industry 4.0 Cybersecurity................................................................. 288
20.5.2 IIoT and Big Data Analytics (BDA).................................................. 288
20.5.3 IoT Data Privacy Leaking.................................................................. 289
20.5.4 Standard Security Solutions............................................................... 289
20.5.5 Opportunities to Overcome BDA Challenges....................................290
20.6 Conclusion.....................................................................................................290
References...............................................................................................................290
suggests, IIoT deployment groups should construct modules that outline all of the
virtual and bodily belongings that want protection. They additionally want to higher
accumulate records on capacity threats.
The configuration of hardware additives is a hugely unregulated sphere that calls
for near interest while constructing an IIoT system. It all comes right all the way
down to endpoint safety, namely, stopping unauthorized get admission to customers
who make out-of-control modifications to the hardware. The major work for an IIoT
deployment group is assembly encryption standards. Every interplay with the system
(from any device) should undergo usually regularly occurring cryptography proto-
cols. The extent of private statistics being shared each day throughout the community
will most effective upward thrust withinside the years to come – making encryption
one of the maximum essential measures from a privacy perspective.
• Eavesdropping assault
By tracking the community, an adversary can benefit from touchy
statistics approximately the behavior of the community to perpetrate similar
assaults. Network site visitors’ analysis, even of encrypted packets, can
screen statistics and compromise privates.
• Man-in-the-center assault
In this assault, the adversary sits among speaking gadgets and relays
conversation among them.
• False statistics injection assault
A fake injection assault is a deception assault, wherein the adversary
injects fake statistics into the community; for example, via way of means of
sending malicious instructions on a subject bus.
• Time postpone assault
An attacker injects more time delays into measurements and manages
values of the structures, which could disturb balance of the machine and
reason system to crash.
• Replay assault
In a replay assault, valid packets may be retransmitted via way of means
of an adversary. This can appear in numerous ways: a true however compro-
mised node may want to ship the statistics.
• Spoofing assault
Spoofing assaults are in which an attacker’s node impersonates a
machine entity. A loss of good enough authentication management mecha-
nisms method that entities can masquerade as each other via way of means
of falsifying their identification to benefit illegitimate get entry to.
• Side channel assaults
Side channel assaults are done the usage of numerous strategies that
examine statistics leakage from hardware and software program along with
analyzing strength consumption, mild emissions, optical signal, site visitors
flow, timings, electromagnetic, acoustic, and thermal emission from hard-
ware additives and faults that arise with inside the machine [6].
• Covert-channel assaults
This is an assault that uses a compromised tool and valid conversation
channels to leak touchy statistics out of a stable environment, bypassing
security features.
c. Many IoT networks have several points of entry for cybersecurity threats,
allowing them to overcome existing security measures. Laptops brought
into and out of facilities, as well as USB sticks used by several PCs without
being properly scanned for malware, are common examples.
d. Many IoT networks are still built as a single, big, flat network with no physi-
cal or virtual protection between networks. This aids in the rapid spread of
malware, even to remote locations devices.
designers, clientele, and consumers for BDA. Despite its unrivaled significance in
furthering Industry 4.0, big data’s distributed structure poses a number of issues.
Data security, privacy, and access control, as well as data storage, are among the most
important concerns.
Manufacturers can use BDA in manufacturing to discover the most up-to-date
information and recognize patterns, allowing them to improve processes, regulate
supply chain, and identify variables that influence production. According to reports,
BDA in the manufacturing industry would approach $4.55 billion by 2025 [15].
Intelligent manufacturing ship floors are constructed using BDA, which represents
tangible Internet-based logistics data. To collect data, they used radio-frequency
identification readers, tags, and wireless communication networks on the factory
floors. They used this information to create a visualization of the logistics chain and
to assess the efficiency of logistics operators and operations [16].
option. Patching methods could be useful for keeping industrial systems current and
secure. Regular system audits and penetration testing are also important safeguards.
20.6 CONCLUSION
In this chapter, the primary aim was to explore the current state of the art of security
challenges in Industry 4.0 relating technologies in the manufacturing and automation
industry. In Industry 4.0, industrial revolution is happening and it is accomplished
with smart in production, logistics, storage, maintenance, and control system. On
the other hand, there these smarter things are data hungry and prone to security
attacks. As IIoT is a combination of field devices, control devices, and communica-
tion networks, attackers can target on any of the mentioned areas. Hackers targeting
the field devices like sensors or industrial machines leads to hindrance in receiving
data from the field. Different ICS system attacks are discussed in this chapter. Usage
of dynamic IP for SCADA gives a better solution for ICS attack. In networks attack,
wireless media are more prone compared to wired as the hacker can falsely route
or trap data packets. The final chapter concludes the necessity of data protection, as
IIoT are used in data-driven applications. Industry 4.0 extends its wings to BDA and
cloud storage, and this tells the security breaches in data storage and analysis. UBA
is implemented in leading industries as internal data leakage overcomes the external
data hack.
REFERENCES
1. Matthew N. O. Sadiku, Yonghui Wang, Suxia Cui, and Sarhan M. Musa, “The indus-
trial internet of things,” IJASRE, vol. 3, no. 11, pp. 1–5, Dec. 2017.
2. A. Gilchrist, Industry 4.0: The Industrial Internet of Things. Springer, 2016.
3. Adam Mentsiev, Elina Guzueva, and Tamirlan Magomaev, “Security challenges of the
Industry 4.0,” Journal of Physics: Conference Series, vol. 1515, 032074, 2020.
4. S. R. Chhetri, N. Rashid, S. Faezi, and M. A. Al Faruque, “Security trends and advances
in manufacturing systems in the era of industry 4.0,” 2017 IEEE/ACM International
Conference on Computer-Aided Design (ICCAD), 2017, pp. 1039–1046.
5. Nilufer Tuptuk, and Stephen Hailes, “Security of smart manufacturing systems,”
Journal of Manufacturing Systems, vol. 47, pp. 93–106, 2018.
6. M. A. Al Faruque, S. R. Chhetri, A. Canedo, and J. Wan, “Acoustic side-channel attacks
on additive manufacturing systems,” 2016 ACM/IEEE 7th International Conference on
Cyber-Physical Systems (ICCPS), 2016, pp. 1–10.
An Overlook on Security Challenges in Industry 4.0 291
293
294 Index