You are on page 1of 8

IoT@Work Automation Middleware System Design and Architecture

S. Gusmeroli S. Piccione D. Rotondi


TXT e-solutions S.p.A. TXT e-solutions S.p.A. TXT e-solutions S.p.A.
Via Frigia, 27 c/o Tecnopolis N.O. c/o Tecnopolis N.O.
20126 Milan, IT Strada Prov. Casamassima Km 3 Strada Prov. Casamassima Km 3
sergio.gusmeroli@txtgroup.com 70010 Valenzano (BA), IT 70010 Valenzano (BA), IT
salvatore.piccione@network.txtgroup.com domenico.rotondi@txtgroup.com

Abstract driven processes for manufacturing applications have


strived to work out systems for holistic event-driven
The industrial sector is being impacted by the Internet manufacturing monitoring and control, which includes
of Things due to the increasing availability of computing work towards unified management of events across all
and communication capabilities in a wide range of levels of the automation pyramid [5].
devices and equipment deployed in the shop floor. This Event-driven architectures normally adopt a
requires substantial architectural and functional publish/subscribe model that pushes events to interested
improvements in order to actually manage and exploit listeners as compared to the pull model of more
the potential of such smart components. The EU FP7 traditional SOA approaches, therefore providing more
IoT@Work project aims at addressing the issues of scalability and flexibility. Push models have normally
Plug&Work configuration and self-management features unidirectional, asynchronous and fire-and-forget
in automation systems. This paper focuses on presenting communication patterns, promoting the use of highly
the architecture and the main features of the IoT@Work decoupled systems in which the only relevant issues are
Event Notification Service (ENS) middleware that is related to well-defined message semantics [6].
used to support an event-driven communication The IoT@Work1 project (https://www.iot-at-
paradigm among devices and services, both inside and work.eu) is focusing on a holistic approach towards a
outside the factory plant. Plug&Play IoT solution for manufacturing through
the development of self-configuration mechanisms,
1. Introduction enabling what we call secure, Plug&Work IoT, whereby
devices are auto-configured and ready to cooperate with
Modern factory automation systems are becoming each other as soon as they are plugged into the factory
complex distributed computing systems thank to the network, self-adapting to changes in response to
increasingly wide availability of computing and communication demands, faults, etc..
features in sensors, actuators and production devices. This is The IoT@Work architecture, among other functional
recently promoting Internet-of-Things (IoT) concepts [1] components, envisages a specific middleware (the Event
and technologies in factory automation to manage a n d Notification Service – ENS) devoted to collect, organise
orchestrate this wide variety of smart devices. and provide, in a controlled way, production data coming
Service Oriented Architecture (SOA) has been a from the shop floor.
major step towards loosely coupled distributed In the following we present the IoT@Work ENS
computing, opening new horizons in the interoperability middleware and its provided publish/subscribe event
of systems, processes and services. Event-Driven based communication model to support both one-to-
Architecture (EDA) [35] is the next evolutionary step to many and many-to-many communication patterns, as
advanced decoupling, enabling event based mediation well as dynamic coupling of devices, processes and
between systems that can be totally unaware of each services.
other and dynamically rearranged as needed [2]. EDA The paper is organised as follows:
enables composite applications to react to events and  in Section 2 we provide a brief overview of the
improve system responsiveness and scalability. As a State of the Art in the management of
result, EDA blended with SOA provides a versatile way manufacturing data flow;
for implementing interoperability on a both synchronous  in Section 3 we shortly present the IoT@Work
and asynchronous basis. project and the ENS structure and
Manufacturing systems have early on embraced functionalities describing, in order of reporting:
the IoT@Work Plug&Work concept, the
event-driven techniques (see [3], [4]) as events are
integral elements of supervision and control software 1 This work was financially partially supported by the European FP7
used in production applications. Recent efforts on event- EU Project IoT@Work under grant number ICT-257367

978-1-4673-4737-2/12/$31.00 ©2012 IEEE


motivation underlying the definition of the providing other techno-economic benefits (see [8], [9]). This
ENS, its functionalities and architecture, the has further increased the relevance and the deployment
structure of the ENS namespaces, the access of event-driven techniques in manufacturing, which have
control mechanisms used to secure the ENS also produced results associated with the specification of
and, finally, a summary of the used manufacturing/control events, including complex events that
technologies; are based on logical or temporal combinations of primitive
 in Section 4 we report the conclusions and the events (see [5], [10]). In these and other works, EDA is
future work. used as a vehicle for the application of complex event
processing, as a means to derive complex/composite
2. Related work events [11].
All these innovations are fostering, on the one hand,
Plant data collection and acquisition is an integral the design and development of more flexible middleware
component of Manufacturing Execution Systems (MES), as is in the shop floor able to provide events to an, even
also reflected within the ISA S95 standards. In general, plant dynamically, evolving set of monitoring and control
data collection refers to monitoring, gathering and organizing applications and, on the other hand, the need to deploy
data and information concerning processes, materials and Knowledge-Management t e c h n o l o g i e s applied to
production operations that are associated with people, automation and control systems. This is additionally
machine and controls. Figure 1 depicts the usual data increasing the need to develop and more extensively use
flow in manufacturing. ontologies to semantically represent manufacturing
processes’ information in order to support enhanced
communication among intelligent components of control
systems, to add flexibility and to facilitate automatic
reconfiguration of manufacturing systems [12].
The application of EDA-based solutions in industry,
although not consolidated and systematic, has gained a
considerable attraction, motivated by technological and
research achievements in recent years. In [13] a thorough
revision of the concept, use, design and application of
agents in manufacturing is held while in [14] and [15]
some successful research and application cases are
reported.
On the middleware side, attempts to specify, develop and
implement a SOA-based distributed embedded control and
automation systems were performed in the past years for
example by the CAMX framework [36], or by the EU FP6
SOCRADES project (http://www.socrades.eu) that designed
a cross-layer SOA-Infrastructure, covering the major levels
of the ISA´95 Enterprise Architecture. The results of those
projects were backed up by major European Automation
technology providers, which showed the importance of the
application of the SOA-paradigm in their core business (see
[16], [17]).
A similar approach is being pursued by the EU FP7
IMCAESOP project (http://www.imc-aesop.eu), which is
developing a new generation of SCADA systems based on a
set of SOA-based SCADA functionalities exposed and used
in a distributed IT Infrastructure along the Enterprise
Architecture, as well as by the EU FP7 FoFdation project
(http://www.fofdation-project.eu) which is designing a data
Figure 1. Manufacturing traditional data flow integration standard that allows individual entities and their
The importance of collecting data from production associated devices to share data in a common format.
systems has risen the deployment of technologies for Additional research approaches and activities are
automated data acquisition and processing, including bar- described in [18], [19] and [20].
code and RFID. The benefits of RFID technology for
manufacturing have been acknowledged since over a decade
(see [7]) for reducing labour and inventory costs, as well as
3. IoT@Work ENS hierarchy that governs the data and control flows, has to
be revised giving more relevance to the events, to their
enrichment with meta-information and to more dynamic
3.1. IoT@Work Plug&Work and horizontal communication patterns (therefore more
Plug&Work, at the core of the IoT@Work design and in line with the Data Pyramid, as is usual for sensor
specification, is the ability of devices and network networks [25]).
components to auto-configure themselves according to The Data Pyramid [26] represents the process of
the needs of the automation applications. Plug&Work, adding meta-information (context information) to move
therefore, aims at heavily reducing the required manual from raw data to wisdom, adding first ontology
activities, the overall system downtime, and the metadata, and then insights (i.e. reasoning capabilities).
configuration errors. As compared to current automation environment,
Plug&Work requires not only self-configuration therefore, the meta-information, currently embedded
features in production and network devices, but also a within each applications and communication patterns,
consistent, semantically enriched naming and addressing has to be factored out, formalised and provided in
scheme, as well as specific middleware services and addition to the data, so that each application can have
components. Further information and details are reported full opportunity to acquire and meaningfully process
in [21], [22], and [23]. data.
In the following we focus on the IoT@Work ENS The responsibility to manage and provide both the
middleware components. basic data (events in our environment) and the required
meta-information has to be awarded to a specific
3.2. ENS Motivation middleware: this is exactly the role and objective of the
The IoT scenario presents the following substantial IoT@Work ENS middleware. Indeed, it addresses the
differences as compared to previous scenarios: following IoT@Work specific requirements: smooth
 objects (sensors, PLCs, etc.) have more scaling out; auditability and accountability;
computing and communication capabilities; interoperability; explicit representation of system set-up;
 objects have a more central role and are more process-data provision/dissemination; event processing;
autonomous; provision of semantically enriched events’ information;
 communication patterns are more dynamic and run-time verification of system state.
less statically defined.
In addition, the manufacturing environments are: 3.3. ENS functionalities
 becoming richer of intelligent devices and more The ENS is the IoT@Work middleware component
dependent on automation; that acts as a common collector of events acquired from
 becoming, from an ICT point of view, complex disparate sources (called Event Publishers or simply
distributed applications [24]; Publishers) and dispatched, in a controlled way, to a set
 moving toward an event-driven architecture in of listeners (called Event Subscribers/Consumers or
which “… information can be propagated in simply Subscribers/Consumers) as depicted in Figure 2.
near-real-time throughout a highly distributed The ENS functionalities can be summarised as
environment, and enable the organization to follows:
proactively respond to business activities”2 [6];  asynchronous, fire-and-forget communication
 subject not only to a substantial increase of the patterns (publish/subscribe model);
number and nature of systems (e.g. monitoring  for manageability reasons, events are arranged
applications) interested to object's events, but in distinct namespaces;
also to their dynamic changes for example to  event filtering capabilities;
support agile manufacturing;  horizontal scalability and reconfiguration
 revising the management of data knowledge flexibility;
(data meta-information) moving from a scenario  advanced namespaces access control features;
in which this knowledge is embedded in the  events semantic;
automation applications to a scenario in which  complete decoupling of publishers and
it is formalised and made available on request to subscribers.
applications and services. The ENS provides near-real-time3, one-to-many or
The above differences imply that the traditional many-to-many communication facilities among
Automation Pyramid, in which there is a strict and static
3 Real-time communication is normally used at production cells’
level (e.g. among PLCs and sensors/actuators) only. A full real-
2 Near-real-time here means that there are no significant delays time service providing the ENS features would put too many
between the occurrence of an event and the availability of the constraints at network and system levels. PLCs, or equivalent
event related data for processing purposes. The delays, anyway, devices, can act as proxy systems between the real-time islands and
have no predefined and fixed constraints the other production systems and networks (as they currently do)
publishers and subscribers independently from their with no need to define ad-hoc extensions as it provides
location: the ENS middleware has to be normally an out-of-the-box flexibility.
deployed within a production plant and acts as a kind of AMQP provides more features (e.g.: interoperability
software bus connecting devices within the production of AMQP-based products, scalability) and functionalities
plant and both internal and external applications. Indeed, (e.g. event filtering capability) as compared to a JMS-
as depicted in Figure 2, even external applications, like based4 architecture solutions (e.g. ActiveMQ5). The
maintainers monitoring and supervising services, can AMQP envisages the concept of virtual host that is a
have controlled access to events’ subsets. fully functional AMQP broker hosted on a physical
AMQP server, which can host many distinct,
independent virtual hosts.
The ENS architecture, depicted in Figure 3, exploits
Maintainer Remote the AMQP features to provide scalability, asynchronous
Monitoring Service publish/subscribe communication, and clients
MES
Suppliers
partitioning.
Maintainer
SCADA
Adminitrative Domain Border

ENS

Events Str

Even

Eve
ts

n
n
ts

ts Str
Eve

ts S
en

s
Ev

t re
en

ea

eam
Ev

am
m
Network
Devices Energy Meters
PLCs CEP Engines
Energy Units
Production Devices
Reasoners

Figure 2. ENS middleware


The ENS, therefore, brings the data to the interested
parties, instead of bringing the parties to the data. This
reversed approach in data provision has significant
impacts both on the system’s security and on actually
controlling what data are provided to whom. Indeed,
applications and services (internal or external) have well
defined and controllable endpoints through which data
are provided; at the same time the data owner, as
reported in the following, can customize both the kinds Figure 3. ENS Architecture
and the granularity of the data provided to each
applications and services. To improve access control without affecting ENS
operability, the ENS authentication and access control
3.4. ENS architecture checks are managed via a specific virtual host (Access
The ENS uses the AMQP (Advanced Message Request Broker Service in Figure 3), while actual events
Queuing Protocol) protocol and architecture [27], which processing and dispatching are managed by one or more
recently has been taken in charge by the OASIS additional virtual hosts (ENS Broker Service in Figure
standardization organization (http://www.oasis- 3). In this way the authentication and access control
open.org/committees/amqp), to provide some of its overhead does not affect the events handling and ENS
features. AMQP is an open standard application layer can benefit of the AMQP scalability features for all its
protocol for message-oriented middleware that defines functional elements.
both: All ENS clients (i.e. publishers or subscribers)
 a model that introduces a general-purpose initially must submit their ENS access request via the
modular framework that consists of components Access Request Broker Service to the ENS Authorization
that route and store messages and a set of rules Service that checks if the access request can be granted
for connecting these components together; and, in case, sets up the proper temporary configuration
 a network wire-level protocol that allows clients (e.g. client’s specific AMQP Message Queue and
to connect to servers to exchange messages. Binding for a subscriber client) on the appropriate virtual
By defining a model and a network-level protocol,
AMQP enables full functional interoperability between
4
complaint clients and messaging middleware servers. JMS (Java Message Service) is described by the JSR914
specification and defines an API for Java Message Oriented
Furthermore, AMQP general-purpose model and
Middleware
protocol enables its usage in a large variety of scenarios 5 See https://activemq.apache.org/
host and then returns to the client the information on the 3.5. ENS namespaces
operative virtual host to which to connect for publishing As stated above, events are arranged in specific,
or receiving events. Afterwards, the ENS client disjoint, hierarchical namespaces. The structure of each
communicates only with the indicated virtual host. namespace is independent from other namespaces and its
When the ENS client closes, regularly or irregularly, objective is to organize related events according to
its connection to the indicated virtual host, the temporary production needs (for example creating a namespace
configuration set up by the ENS Authorization Service is devoted to collect and manage all energy consumption
automatically removed, therefore an ENS Client has to measures in a way that is functional to the energy
redo its authorization process to connect again to the monitoring applications).
ENS, therefore avoiding unauthorised access to the Each hierarchical namespace has a tree structure with
production events. a Root Node, a set of Intermediate Nodes and Leaf
The ENS Authorization Service checks the validity of Nodes. Events are published under specific leaf nodes
the submitted access request consulting the Policy that normally would a one-to-one relationship with a
Decision Point which, on its turn, checks not only the publishing entity (e.g. energy monitored device), while
validity of the presented capability – the authorization intermediate nodes can represent meaningful, from a
token specified in the presented access request and production point of view, collection of leaf nodes (e.g. a
described in Section 3.6 ENS access control – but also production cell, a production line). Figure 4 provides an
that it has not been revoked querying the Capability example of a possible arrangement of an ENS
Revocation Service (for further details see Section 3.6 namespace devoted to the energy monitoring of a
ENS access control below). production plant.
As already indicated, all published events are EnMonRoot

arranged in specific and distinct namespaces (see


Section 3.5 ENS namespaces below) in order to keep Production Line P1 ... Production Line Pn

together related events, simplify the authorization


mechanism (see Section 3.6 ENS access control below), Cell P1C1 ... Cell P1Cm ... ... ... Cell PnC1 ... Cell PnCs

and maximize the scalability and management of the Robots ... Conveyors ... ... ... ... ... ... Robots ... Conveyors

system (thanks to the possibility to assign/reassign


namespaces to different virtual hosts). Model NG-X1 ... Model NG-Xp ... ... ... Model NG-X1 ... Model NG-Xp ... ... ...

Therefore a virtual host can manage one or more P1C1Rob1 P1C1Rob2 P1C1Rob3 PnCsRob1 PnCsRob2 PnCsRob3

namespaces, while a namespace can be reassigned to a


different virtual host to balance the load on a virtual host Figure 4. Energy Monitoring Namespace
or physical server.
Each event managed by the ENS has a set of Each node in an ENS namespace has a set of
attributes: attributes like:
 Event Source ID: this attribute identifies the  Node Name: the identifier of the node;
publisher that has submitted the event to the  Node Description: a free-text describing the
ENS; entity represented by the node;
 Event Timestamp: it reports when the event has  EntityURI: a URI that points to a semantically
occurred (which can, in general, be different enriched description of the entity represented by
from the publishing time); the node (for example for a Leaf Node
 Event Semantic: this is an URI that points to the representing a sensor this URI can point to a
meta-information (i.e. ontology) regarding that semantically enriched information regarding the
kind of events; sensor);
 Event Data: this attribute carries the specific  a URI that points to meta-data useful for
value(s) of the event; subscribing applications to properly manage
 Additional Event Specific Attributes: these are and process the published events (for example
attributes a publisher can add (for example an for an energy monitoring namespace these
energy meter, acting as publisher of energy meta-information can detail the unit of measure,
consumptions related events, can specify the ID accuracy, etc. of the published measured data).
of the device to which the energy measures Each source publishes its events under a specific leaf
refer). of the hierarchical namespace. For example, with
Apart from the first three attributes, which are of reference to Figure 4, a SENTRON PAC3100 power
predefined types, the other elements can be of any type. monitoring device that measures the energy
All elements anyway are completely transparent to the consumptions of robot P1C1Rob1 will publish its
ENS, therefore assuring that any kind of data can be measures under the “EnMonRoot.Production Line P1.
transferred. Cell P1C1.Robots.Model NG-X1.P1C1Rob1” leaf node.
A subscriber application during the authentication object, executing the data in the object as a process, and
phase to the ENS must specify the namespace it wants to other conceivable access rights. The capability logically
connect to, as well as a node or a filter to identify a consists of a reference that uniquely identifies a
subset of events it is interested to in that namespace. The particular object and a set of one or more […] rights”.
ENS will provide to the subscriber all events that belong Capability based security is not a new concept and
to the sub-tree identified by the specified node or has been used in many contexts ([31], [32], [33]). In
matching the provided filter. traditional access control systems, like ACL (Access
A subscriber, therefore, can subscribe to a specific Control List) based ones (RBAC/ABAC6), the
node (e.g.: the Root Node, receiving all events in the requesting subject has to assert his/her identity and
identified namespace, an Intermediate Node, receiving specify what he/she wants to do on what resource, while
all events published under the leaf nodes of that the service provider has to check the ACLs to ascertain if
intermediate node, or a Leaf Node), but also to filtered the subject has the right to perform the requested
subsets of the collected events. operation on the specified resource. Figure 5 shortly
For example, suppose an external supplier is depicts the main differences between ACL- and
interested, and authorized, to monitor all energy related capability-based authorization systems.
events of all Model NG-X1 robots. In this case the R

external supplier can be authorized to subscribe to the


R
Alice R /etc/passwd Alice /etc/passwd
W
R
energy monitoring namespace using the filtering
specification (see Figure 4): Bob
W
/u/markm/foo Bob
R
/u/markm/foo
W R
EnMonRoot.*.Model NG-X1.*
A different subscriber interested in monitoring the Carol
R
/etc/motd Carol
R
W /etc/motd

energy measures of all robots in “Production Line P1”


R
R

can subscribe to the energy monitoring namespace Access Control List Capability List

specifying:
Figure 5. Capability vs ACL access control
EnMonRoot.Production Line P1.*.Robots.*
The namespace concept and its subscription features In capability based access control, therefore, the
provide high flexibility and dynamicity to the ENS, subject has to include in his/her service request the
marking a big difference on other solutions for example capability that asserts his/her rights on the resource and
based on the JMS standard (e.g. solutions using demonstrate he/she is the owner of the presented
ActiveMQ). capability. The service provider has only to check that
Adding a new device to a manufacturing plant does the presented capability is valid and compatible with the
not impact the ENS or monitoring applications: it is request, and that the granted subject, as stated in the
sufficient to provide, on the new added device side, the presented capability, is the subject that has submitted the
information related to the topic under which it has to request. This solution is therefore more scalable, secure
publish the events and how to connect to the ENS, while, and flexible and does not require complex federated
on the monitoring applications side, the changes could identity and access management systems.
even not be required at all if the subscribing The ENS capability based authorization approach is
applications/services have performed a namespace based on ideas and approaches in the mentioned papers,
subscription that already embraces the new device. as well as in the “SPKI Certificate Theory” [34], with
extensions and adjustments to adapt the approach to the
3.6. ENS access control mechanisms IoT context and specifically to the IoT@Work ones.
The ENS access control is based on a Capability As compared to the previous approaches, the
Based Access Control mechanism (see [28], [29]) that is capability based authorization used in IoT@Work
being specifically developed in the IoT@Work project. provides the following additional features:
Capability Access Control, sometimes referred to as  delegation support: a subject can grant access
capability based security, [30] “is […] one of the existing rights to another subject, as well as grant the
security models. A capability (known in some systems as right to further delegate all or part of the
a key) is a communicable, unforgeable token of granted rights to a third subject;
authority. It refers to a value that references an object  capability revocation: capabilities can be
along with an associated set of access rights. […] A revoked by properly authorized subjects,
capability is defined to be a protected object […] which, therefore solving one of the issues of capability
by virtue of its possession by a user process, grants that based approaches in distributed environments;
process the capability (hence the name) to interact with and is able to meet the following requirements:
an object in certain ways. Those ways might include
reading data associated with an object, modifying the 6 RBAC (Role-Based Access Control) and ABAC (Attribute-Based
Access Control) are widely used access control approaches
 easy support of the authorization needs of many The ENS is pursuing the last research trends in
subjects (manufacturers, maintainers, etc.); solutions for data collection in production systems (see
 easy control of the nature and characteristics of Section 2 Related work) proposing a solution able to
the information made available through the provide the following benefits:
ENS;  decoupling event collection and dispatching
 assurance that all subjects access ENS data with from business-logic;
the least privileges;  improved security and data access control – as
 high security and full auditability of resource stated, the IoT@Work approach brings the data
access even when rights have been delegated; to the interested parties, instead of bringing the
 offloading of access control management to parties to the data. This reversed approach
face external subjects dynamics. together with the capability based access
control mechanism, has significant impacts both
3.7. Technologies and additional features on the system’s security and on controlling
The ENS architecture eases the deployment of new what data are provided to whom;
services and features simply connecting new applications  scalability: the ENS, thanks to the use of
to it and instructing the ENS to provide only the AMQP solutions, can be tuned in order to
requested set of events. efficiently support the increase of the event
A relevant example is predictive maintenance that can producers (i.e. devices in the factory) and
be achieved connecting CEP (Complex Event consumers (i.e. monitoring applications);
Processing) or semantic engines to the ENS middleware  complex event processing and reasoning: the
and deploying specific programs (e.g. pattern-search events can be used to feed a Complex Event
specifications on CEP engines) on these engines. Processing (CEP) engine which can be
On the technological side, the IoT@Work ENS is programmed in order to support predictive
based on the RabbitMQ broker maintenance or other monitoring services.
(http://www.rabbitmq.com), which is one the most The ENS is currently under development and will
accredited AMQP implementation and is being used, for soon be tested within specific validation scenarios the
example, in cloud solutions like: OpenStack IoT@Work consortium is setting up.
(http://openstack.org), Heroku cloud application After completing the ENS development, it will be
platform (http://www.heroku.com), NASA Nebula extended via the integration of specific CEP engines for
Cloud Computing Platform (http://nebula.nasa.gov). implementing specific monitoring applications (for
RabbitMQ is written in the Erlang example, energy consumption monitoring).
(http://www.erlang.org) programming language which
has built-in support for concurrency, distribution and References
fault tolerance.
The ENS authorization service is being developed as [1] H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé
an OSGi7 application, while the ENS client library is (editors), Vision and Challenges for Realising the
being developed both as a traditional Java and OSGi Internet of Things, ISBN 978-92-79-15088-3,
libraries. doi:10.2759/26127, March 2010.
[2] B. Kowalewski, M. Bubak, B. Balis, “An Event-Based
Approach to Reducing Coupling in Large- Scale
4. Conclusions and future work Applications”, Lecture Notes in Computer Science,
Springer, vol. 5103, pp. 358-367, June 2008.
The previous sections have described the [3] Z. A. Banaszak, B. H. Krogh, “Deadlock avoidance in
functionalities and architecture of the IoT@Work ENS flexible manufacturing systems with concurrently
middleware that act as a flexible and scalable connector competing process flows”, IEEE Trans. on Robotics and
Automation, vol. 6, no. 6, pp. 724-734, December 1990.
among events’ sources and events’ consumers. The ENS
[4] J. Park, S. A. Reveliotis, D. A. Bodner, L. F. Mcginnis,
is not only an asynchronous message-oriented server but
“A distributed, event- driven control architecture for
can be considered an active component of an Event- flexibly automated manufacturing systems”,
Driven Architecture as it fully supports the key features International Journal of Computer Integrated
of that paradigm (e.g.: Broadcast communication, Manufacturing, vol. 15, no. 2, 2002.
Timeliness, Asynchrony, etc.). [5] K. Walzer, J. Rode, D. Wunsch, M. Groch, “Event-
driven manufacturing: Unified management of primitive
and complex events for manufacturing monitoring and
7 The OSGi (Open Services Gateway initiative) framework provides control”, IEEE International Workshop on Factory
functionalities to create Java applications from small, reusable and Communication Systems, WFCS 2008, May 2008, pp.
collaborative components, as well as to dynamically deploy and 383-391.
manage, even remotely, them. The OSGi (http://www.osgi.org) [6] D. Chou, “Using Events in Highly Distributed
specifications are so widely applicable because the platform allows
Architectures”, The Architecture Journal, Microsoft
multiple Java components to efficiently execute in a single Java
Virtual Machine Corporation, no. 17, October 2008.
[7] Rockwell Automation - Global Manufacturing Solutions, automation”, EU FP7 IoT@Work, public project
“RFID in Manufacturing: A practical guide on extracting deliverable, Dec. 2011 (revised).
measurable value from RFID implementations in plant [22] A. M. Houyou et al., “Project Deliverable D2.1 – IoT
and warehousing operations”, October 2004. addressing schemes applied to manufacturing”, EU FP7
[8] Y. M. Lee, F. Cheng, Y. T. Leung, “Exploring the IoT@Work, public project deliverable, Dec. 2011
Impact of RFID Supply Chain Dynamics”, in Proc. 2004 (revised).
Simulation Conference, vol. 2, pp.1145-1152, Dec. 2004. [23] A. M. Houyou et al., “Project Deliverable D2.2 –
[9] S. Toffaletti, J. Soldatos, “RFID-ROI-SME Project General bootstrapping architecture”, EU FP7
Promises Big Help for Small Business”, RFID Journal, IoT@Work, public project deliverable, May 2011.
June 14th, 2010. [24] P. Koen, C. Strömsdörfer, “Distributed Applications in
[10] S. Karadgi, D. Metz, M. Grauer, W. Schäfer, “An Event Manufacturing Environments”, The Architecture
Driven Software Framework for Enabling Enterprise Journal, Microsoft Corporation, no. 17, October 2008.
integration and Control of Enterprise Processes”, in [25] A. Sheth, C. Henson, S. Sahoo, “Semantic Sensor Web”,
Proc. 10th International IEEE Conference on Intelligent IEEE Internet Computing, pp. 78-83, July/August 2008.
System Design and Applications, Nov.-Dec. 2010, pp. [26] R. Akerkar, P. Sajja, Knowledge-Based Systems, Jones &
24-30. Bartlett Learning, ISBN 978-0-7637-7647-3, August
[11] Y.H. Zhang, Q.Y. Dai, R.Y. Zhong, “An Extensible 2009.
Event-Driven Manufacturing Management with [27] AMQP Working Group, “Advanced Message Queuing
Complex Event Processing Approach”, International Protocol – Protocol Specification”. Available:
Journal of Control and Automation, vol. 2, no. 4, pp. 13- http://www.amqp.org/confluence/download/attachments/
24, Dec. 2009. 720900/amqp.pdf?version=1&modificationDate=131801
[12] J. L. Martinez Lastra, I. M. Delamer, “Semantic Web 1006000
Services in Factory Automation: Fundamental Insights [28] S. Gusmeroli, S. Piccione, D. Rotondi, “IoT Access
and Research Roadmap”, IEEE Transactions on Control Issues: a Capability Based Approach”, to be
Industrial Informatics, vol. 2, no.1., pp. 1-11, Feb. 2006. published in Proc. 6th International Conference on
[13] L. Monostori, J. Váncza, S. R. T. Kumara, “Agent-Based Innovative Mobile and Internet Services in Ubiquitous
Systems for Manufacturing”, CIRP Annals – Computing (IMIS 2012), International Workshop on
Manufacturing Technology, vol. 55, pp. 697-720, 2006. Extending Seamlessly to the Internet of Things
[14] V. Marik, J. Lazansky, “Industrial applications of agent (esIoT2012)
technologies”, Control Engineering Practice, Special [29] D. Rotondi, C. Seccia, S. Piccione, “Access Control &
Issue on Manufacturing Plant Control: Challenges and IoT: Capability Based Authorization Access Control
Issues, vol. 15, pp. 1364-1380, 2007. System” 1st IoT International Forum, position paper,
[15] V. Marik, P. Vrba, K. H. Hall, F. P. Maturana, Nov. 2011.
“Rockwell automation agents for manufacturing”, in [30] Wikipedia contributors, “Capability-based security”,
Proc. 4th International Joint Conference on Autonomous Wikipedia, The Free Encyclopedia.
Agents and Multiagent Systems, pp. 107-113, July 2005. [31] A. Lackorzynski, A. Warg, “Taming subsystems:
[16] C. Popescu, “Approach to Incremental Modelling of capabilities as universal resource access control in L4”,
Web Services Orchestration - An Application to in Proc. 2nd Workshop on Isolation and Integration in
Deadlock-free Scheduling in Automated Systems”, Embedded Systems (IIES 2009), pp. 25-30, April 2009.
Tampere University of Technology, Publication 832, [32] G. D. Skinner, “Cyber Security Management of Access
2009. Controls in Digital Ecosystems and Distributed
[17] A. W. Colombo, “SOCRADES: Steps Towards the Environments”, in Proc. 6th International Conference on
Factory of the Future”, Projects Magazine EU, edition Information Technology and Applications (ICITA 2009),
12, pp. 20-23. British Publishers Inc. 2009. pp. 77-82, Nov. 2009.
[18] J. Kaiser, C. Mitidieri, C. Brudna, C. E. Pereira, [33] L. Fang, D. Gannon, F. Siebenlist, “XPOLA – An
“COSMIC: A middleware for event-based interaction”, Extensible Capability-based Authorization Infrastructure
in Proc. 9th IEEE International Conference on Emerging for Grids”, 4th Annual PKI R&D Workshop, April 2005.
Technologies and Factory Automation (ETFA 2003), [34] C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas,
vol. 2, pp. 669-676, Sept. 2003. T. Ylonen, “IETF RFC 2693 - SPKI Certificate Theory”,
[19] T. Kirkham, D. Savio, H. Smit, R. Harrison, R. P. Sept. 1999.
Monfared, P. Phaithoonbuathong, "SOA middleware and [35] G. Hohpe, “Programming Without a Call Stack – Event-
automation: Services, applications and architectures", in driven Architectures”, 2006.
Proc. 6th IEEE International Conference on Industrial [36] I. M. Delamer, J. L. M. Lastra, “Service-Oriented
Informatics (INDIN 2008), pp. 1419-1424, July 2008. Architecture for Distributed Publish/Subscribe
[20] M. Marinov, N. Magaletti, T. Pavlov, F. Gaus, D. Middleware in Electronics Production”, IEEE
Rotondi, P. Vitliemov, S. Ivanova, “An Approach to Transactions on Industrial Informatics, vol.2, no.4,
Designing Distributed Knowledge-based Software pp.281-294, Nov. 2006
Platform for Injection Mould Industry”, WSEAS
TRANSACTIONS on INFORMATION SCIENCE and
APPLICATIONS, issue 11, vol. 7, Nov. 2010.
[21] D. Rotondi et al., “Project Deliverable D1.1 – State of
the art and functional requirements in manufacturing and

You might also like