You are on page 1of 15

Ad Hoc Networks 91 (2019) 101869

Contents lists available at ScienceDirect

Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc

Towards socially enabled internet of industrial things: Architecture,


semantic model and relationship management
Nancy Gulati∗, Pankaj Deep Kaur
Department of Computer Science and Engineering, Guru Nanak Dev University, RC, Jalandhar, India

a r t i c l e i n f o a b s t r a c t

Article history: The progression of Internet of Things (IoT) has culminated from merely communicating objects towards
Received 6 May 2018 smart objects. Furthermore, the widespread adoption of social networking is leading us into a new era of
Revised 19 October 2018
social objects. Under this vision, the idea of Social Internet of Things (SIoT) involving integration of so-
Accepted 16 April 2019
cial networking concepts into IoT was carved. Also, in the past few years application of IoT technologies
Available online 18 April 2019
into industry termed as Industrial Internet of Things (IIoT) has gained significant attention worldwide.
Keywords: This paper examines the major opportunities emerging from the introduction of novel concept of SIoT
Internet of things into manufacturing industry along with proposing reference architecture for the same. The proposed ar-
Social internet of things chitecture is explored from a semantic point of view and an ontological model is designed. In addition,
Industrial internet of things a novel approach for relationship management among manufacturing resources (assets) has been intro-
Social asset duced. Further, to support the theoretical framework, a use case scenario and a simulation model for the
Relationship management
performance management of an automated bottle filling industrial plant has been designed. The proposed
Asset performance management
model is certain to serve as a solid foundation for the future development of industrial IoT applications
by researchers and developers.
© 2019 Elsevier B.V. All rights reserved.

1. Introduction technologies such as IoT to ensure prolonged market survival in the


world of competition. It is believed that IoT is the next big thing
The IoT technology is on a growing curve and has a bright fu- which can transform the face of this industry [4]. Keeping in mind,
ture in IT industry. It has been widely adopted by researchers and the ongoing drift towards SIoT from the prevailing IoT, the vision
developers throughout the world. The current research trend in IoT of employing SIoT in Industry was conceptualized, designated as
is being shifted from prevailing object to human interaction to- Social Internet of Industrial Things (SIoIT). SIoIT envisions the use
wards object to object interaction where objects rely on each other of intelligent assets (machines or machine parts) possessing social
for services. In the contest of emulating their human counterparts, behavior equipped with sensors, actuators and some identification
the machines are adapting to social behavior (M2M communica- technology. However, our area of interest primarily lies in manu-
tion). To realize this paradigm shift, the notion of Social Internet facturing industry. In the domain of manufacturing, machines or
of Things (SIoT) [1] was burgeoned. Briefly, SIoT can be designated resources are also termed as assets. Therefore, the term machine
as an IoT where things or objects can build their own social asso- and asset is being used interchangeably throughout the course of
ciation autonomously without the intervention of human. On the the paper. Li et. al. in [5] first investigated the opportunities and
other hand, the use of IoT in industry has been a matter of concern challenges arising from integrating Social IoT in industrial domain.
for various business organizations lately and is gaining momen- Also, a theoretic foundation for the development of smart manu-
tum with the development of the concept of Industrial Internet facturing systems was established which allows assets to interact
of Things (IIoT) [2]. Industrial IoT has widespread applications in and share information with each other thereby enabling efficient
multiple domains such as healthcare, transportation and logistics, performance monitoring, analysis and management of the system.
disaster management etc [3]. Another noteworthy application of We performed a meticulous study of the use of IoT in industry
IIoT is in the domain of automated manufacturing industry. Manu- and its potentials as well as the benefits of deploying socially ac-
facturing industries these days tend to incorporate with prevailing tive objects in an IoT system. The investigation revealed that some
of the principal obstacles occurring in the path of smart industry

implementation are lack of standardized overall architecture de-
Corresponding author.
E-mail address: nancygulati91@gmail.com (N. Gulati).
sign, inefficient management of resources (assets) as well as their

https://doi.org/10.1016/j.adhoc.2019.101869
1570-8705/© 2019 Elsevier B.V. All rights reserved.
2 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

interactions and non availability of up to the mark performance 1. The presented article begins with illustrating state of the art in
management techniques. Thus, it is crucial for existing industry the domain of Industrial and Social IoT. Further, a generic three
standards to adopt smart manufacturing practices such as SIoIT layered architecture for socially enabled IIoT systems is devel-
and Industry 4.0 [6] in order to develop a highly efficient produc- oped and the functionality of each layer and its components is
tion system. This paper attempts to resolve the addressed issues examined. Also, the interaction between different components
by proposing a framework for advanced manufacturing industry is analyzed with the help of semantic technologies. In addition,
assimilating the best of Social IoT into smart industry techniques. an ontological model to explicitly illustrate the relationship be-
The incorporation of these intelligent technologies into existing in- tween components is built.
dustrial routines will contribute towards the construction of a high 2. The concept of Social Asset and its lifecycle from the In-
level, real time and accurately performing manufacturing industry. dustrial IoT perspective is explored. A novel approach for
The prophecy of espousing these high end technologies to effort- friendship management and service discovery in industrial ma-
lessly cope with the impending technologies provided us the mo- chines/assets is developed.
tivation for conducting this research. 3. To ascertain the validity of the suggested approach, the pro-
The primitive goal of the paper is to build a platform for posed architecture is deployed on a simulated industrial envi-
co-operative industrial environment by establishing friendship re- ronment (Automated Bottle Filling Plant) with the help of an
lationships between machines (assets). The notion of friendship IoT simulation tool (NODERED) and its performance is evalu-
among peers will result in the collective participation of various ated.
assets to bring about the realization of one common objective of
any industry setup which is performance enhancement. In order Rest of the paper is organized as follows. Section 2 provides the
to achieve the aspired objectives, a novel architecture for SIoIT sys- current state of research in the domains of Social and Industrial
tems is developed and its implementation details with the help of IoT. Section 3 brings forward the architecture design for SIoIT. In
an industrial use case environment (Automated Bottle Packaging) Section 4, a semantic model for SIoIT systems is proposed. Further,
are discussed. Previous research work in Industrial IoT primarily Section 5 outlines the lifecycle of a social asset and service discov-
concentrated on integration of IoT into industrial environment. Lit- ery among assets. Section 6 puts forward an approach for manag-
tle or no attention was paid towards building a socially enabled ing relationship among these assets.While in Section 7, an algorith-
IoT technology for industries. Keeping in mind the potential ben- mic approach for friendship discovery among assets is proposed.
efits of Social IoT, the presented architecture strengthen the smart Finally, Section 8 emphasizes on implementation of the proposed
manufacturing systems by adding up the additional power of So- architecture with the help of a use case scenario and a simulation
cial IoT technologies. The main aim is to develop a system capable model.
of providing real time performance monitoring, analysis and con-
trol of industrial manufacturing systems. In the proposed system, 2. State of the art
the industrial assets are embedded with smart sensors and actua-
tors, capable of socially interacting with each other to facilitate the IoT has come a long way since its introduction in 1999 by
performance optimization of manufacturing systems. Therefore, the Kevin Ashton who phrased the term Internet of Things to repre-
proposed architecture can act as a foundation for future develop- sent a network connecting physical day to day objects with inter-
ment of socially active Industrial IoT systems. In view of the fact net. However, research work in the field of IoT has advanced to
that IoT based industrial systems has not been entirely put into ac- a great level in the past decade. Due to the widespread attention
tion so far, implementing the recommended platform in real indus- IoT has gained in the recent years, a huge amount of data is being
trial environment was undeniably a challenge for us. Nevertheless, exchanged over numerous IoT networks existing worldwide. Thus,
an industrial setup was simulated in order to perform the testing IoT is all set to become a ubiquitous technology in the near future.
of the proposed system. Simulation results divulged that the de- Also, the notion of integrating social components into IoT has been
veloped platform is able to effortlessly monitor the activities of an there for past few years, resulting in development of the Social IoT.
industrial setup as well as efficiently utilize and manage the social The SIoT possess some potential benefits over the traditional IoT
interactions between the industrial assets. networks which contribute to the primary reasons for envisioning
The state of the art in SIoIT systems has theoretically estab- the deployment of SIoT in industry. The significant ones are im-
lished the basis for integrating IoT technologies to industrial do- proved communication, flexibility, scalability and network naviga-
main so far. This article contributes by building a solid architecture bility [7,8]. One of the major driving forces behind the use of SIoT
and framework based on the groundwork laid by the researchers in over IoT is enhanced resource discovery in network. Researchers
the domain to completely overhaul the existing system. It further are working on improvising the search efficiency of a Social IoT
contributes by bringing forward a proposal supporting the amal- network without increasing the overall system overhead [9]. An-
gamation of SIoT to manufacturing industry through the formation other advantage of Social IoT lies in its resemblance with a human
of social relationship between machines; supported by an ontolog- social network which makes it easier to model and implement. The
ical architecture and a use case scenario. It also attempts to extend objects in a SIoT network try to mimic human behavior while es-
the concept of Industrial Internet of Things by advancing the ma- tablishing relationships in order to build their own social network.
chines with social behavior and encouraging the M2M communica- Therefore, the prototypes built to analyze human social behavior
tions along with human-machine interactions. The major purpose and social networks can be implemented on SIoT as well. Various
of developing friendship relationships among assets is to establish projects have been proposed and developed in past few years fo-
a cooperative network. Interaction between machines (assets) will cusing on social perspective of IoT. For instance, several SIoT plat-
increase with increase in the number of relationships. Need of one forms such as Toyota Friend Network, Nike+, Xively, Paraimpu, So-
friend could be served by another friend or some common friend cial Web of Things, Evrythng has been developed in past years [10].
(friend of a friend). For example, if an asset needs a resource which Recently, SIoT has been used in combination with other technolo-
cant be accessed directly, it can take the help of a friend asset i.e. gies to extend its existing capabilities. One such example is the
accessing the required resource via a trusted friend just like a hu- idea of integrating Social Cloud in SIoT [11] which exhibit a great
man friendship network. potential to facilitate resource sharing.
The major findings of this research work can be partitioned into The IT industry today is on the verge of another industrial revo-
following three aspects: lution (Industry 4.0) in terms of building more and more intelligent
N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 3

automation systems. Industry 4.0 involves the use of cyber in Industrial IoT domain in recent years and a comparison of exist-
physical systems to completely transform the face of existing ing work with the proposed approach.
manufacturing paradigms enabling the deployment of smart fac-
3. SIoIT architecture design
tory solutions [12]. In [3], Li Da Xu et. al. presented an extensive
survey of the research performed in the area of industrial IoT in-
Even though various frameworks have already been designed in
cluding various industries such as healthcare [13], transportation
the past by researchers for Social IoT and Industrial IoT systems but
and logistics [14], disaster management [15,16] etc. The use of IoT
little or no work has been focused on designing a specialized ar-
in these industries has opened up the doors to new possibilities for
chitecture for socially enabled Industrial IoT systems. This section
building more innovative solutions in order to enhance the over-
portrays the major design goals to be considered for designing ar-
all performance. However, with the increase in number of devices
chitecture of such systems. Further, a novel architecture for SIoIT
connected to an IoT network which is expected to be huge in
systems in manufacturing based upon the integration of existing
case of Industrial IoT, it becomes complicated to handle the avail-
Social IoT architectures with the essential components of an IIoT
able resources efficiently. A lot of research is ongoing in the area
[18] and SIoIT network [5] is proposed.
of resource and service discovery. One such example is fog com-
puting based indexing model proposed by authors in [17] for ef- 3.1. Design goals
fective service discovery in Industrial IoT. Persistent research and
development of increasingly efficient Industrial IoT models is set- Although the applications of Social and Industrial IoT are still
ting a path for the successful application of smart manufacturing in its infancy yet has gained considerable attention in the past few
methods. years. Thus, the emphasis is on the applications emerging out of
Industry 4.0 has a significant role to play in remodeling the fu- the integration of the two technologies (SIoT and IIoT) resulting in
ture of manufacturing industry. Since the current trend is to use the development of socially enabled Industrial IoT i.e. SIoIT appli-
smart and intelligent machines (assets) and, it becomes necessary cations. The major design goals one must consider prior to design-
to effectively manage the manufacturing resources and assets. It is ing the system framework are delineated in Fig. 1.
generally believed that well maintained assets form the basis of The first important consideration is resource management. Re-
an effective industrial process. The emergence of IoT technologies sources here mainly refer to the machines or their sub parts
has significantly influenced the evolution of modern manufactur- termed as industrial assets. Asset management includes everything
ing systems. Also, IoT could be deployed to augment APM (Asset from the design of sensors integrated into the assets to the choice
Performance Management) in industrial environment. In [18], ref- of communication protocols and networking technologies. The next
erence architecture for IoT enabled factories is proposed that in- important issue is the strategy adopted for managing social rela-
volves the integration of smart manufacturing devices, machine, tionships between the assets. Although, Nitti et. al. in [8] presented
processes and products. It also encourages the use of smart logis- different friendship models for objects in an IoT network but these
tics with incessant monitoring and analysis of data. The authors friendship models cannot be completely adapted in an industrial
in [19] studied the evolution of manufacturing techniques and dis- environment. Therefore, we have designed a novel friendship man-
cussed the potential of integrating prevailing technologies such as agement algorithm (Section 7) to manage relationships among as-
IoT to the modern manufacturing techniques in enterprises. Fur- sets. Another major concern is of data management, which in-
ther, Zhang et. al. [20] designed architecture for IoT enabled manu- cludes the selection of the database to maintain data generated
facturing termed as Internet of Manufacturing Things for real time by the system. Further, we must consider some significant de-
performance analysis of the production process. Wang et. al. in sign issues such as system interface modeling, middleware design
[21], made use of RFID for Asset Monitoring and inventory man- and interoperability issues. It is possible that system is built up
agement.While, Wan et.al. [22] proposed a software defined Indus- from heterogeneous components. Design of an appropriate inter-
trial IoT architecture to enable interaction and exchange of impor- face and middleware makes it possible for such a system to work
tant information between industrial assets. Availability of timely efficiently. Trustworthiness is another major concern to maintain
and accurate information will lead to effective decision making in the integrity of the system. An evaluation system that works by as-
the context of Asset Performance Management (APM). Zhang et. signing trust score to each node (asset) might help differentiating
al. in [23] designed an IoT based framework for manufacturing in- trustworthy and malicious assets. Finally, one must focus on imple-
dustry for real time performance monitoring and optimization of menting appropriate schemes to ensure the security and privacy
manufacturing things (assets). Since we have already discussed the of the system. Section 3.2 throws light on some of the candidate
potential benefits of Social IoT over IoT networks, it will be pru- technologies for design of the proposed system as well as the tech-
dent to deploy Social IoT in industrial domain. Li et. al. in [5] first nologies selected for implementation.
proposed the idea of incorporating Social IoT in manufacturing
claiming that the addition of a social dimension to the Indus- 3.2. Proposed SIoIT architecture
trial IoT will lead to the effective management of industrial assets.
Moving along these lines, this paper attempts to design and de- In this section we present reference architecture for Social In-
velop a Social IoT based performance monitoring system for smart ternet of Industrial Things in manufacturing. Different researchers
manufacturing. Table 1 elicits some significant research performed have proposed different architectures for IoT. However, the basic

Table 1
Comparison between existing research and proposed approach in Industrial IoT domain.

Reference Application Domain IoT Based Framework Social Asset Performance


Proposed Dimension Management (APM)

[19] Bi et. al. (2014) Impact of IoT on Enterprise Systems in Modern Manufacturing Yes Yes No No
[20] Zhang et. al. (2014) Real Time Performance Analysis of Manufacturing Enterprises using IoT Yes Yes No Yes
[21] Wang et. al. (2015) IoT Based Enterprise Asset Management Yes Yes No Yes
[22] Wan et. al. (2016) Software Defined Network for Industrial Internet of Things Yes Yes No No
[5] Li et. al. (2016) Social IoT Based System for Industrial and Manufacturing Assets Yes No Yes No
[23] Zhang et. al. (2017) IoT enabled Advanced Manufacturing System Yes Yes No Yes
Proposed Approach Social IoT Based System for Asset Performance Monitoring and Yes Yes Yes Yes
Management in Manufacturing Industry
4 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

Fig. 1. Design Considerations for SIoIT architecture.

Fig. 2. SIoIT reference architecture.

three layered framework [24] (consisting of physical, network and interfacing of manufacturing resources (assets) with IoT compo-
application layer) is widely accepted as reference architecture for nents. It is specially designed for modern manufacturing systems
IoT. Further, researchers focused on developing a standard architec- incorporating prevailing technologies like IIoT and SIoT and is the
ture for Social IoT by introducing an additional layer comprising of first ever designed architecture for SIoIT systems so far to the
Social IoT components [10]. On the other hand, various frameworks best of our knowledge. Thus, the proposed system architecture is
in the context of Industrial IoT have also been proposed in last few unique and different from the existing architectures in the domain
years as discussed in Section 2 (Table 1). These layered architec- of Industrial IoT and Social IoT. It intends to enable interaction
tures provide a general idea on Social IoT and Industrial IoT net- between different services and modules with the help of a mid-
works. However, for research purpose context oriented specialized dleware component. The essential building blocks of a SIoIT sys-
architecture is needed to be designed. The proposed three layered tem [5] have been deployed as the basic components for design-
architecture design focuses on building a model to abstract the ing of the proposed model (Fig. 2). Table 2 highlights the analogy
N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 5

Table 2
Analogy of SIoIT and SIoT layered architecture.

SIoIT Layer SIoT Analogy

Base Layer (Infrastructure Sub Layer, Communication Sub Layer) Sensing Layer, Network Layer
SIoIT Middleware SIoT Components Sub Layer, Base Sub Layer
Application Layer Application Layer, Interface Sub Layer

Table 3
SIoIT Framework Implementation Technologies.

S.No. Framework Component Description Potential Technology Candidates IoT Technology Used
(Proposed Approach)

1 Asset ID A method to uniquely identify an asset RFID, EPIC, NFC, Barcode EPIC
in a given network
2 IoT Network Technology used to connect objects Bluetooth, Low Power WiFi, Cellular, IEEE 802.11 (WiFi)
(assets) in the network Zigbee
3 IoT Communication Protocols Standard set of protocols built to MQTT, CoAP, AMQP MQTT (Restful)
enable communication among assets
in the network
4 Social Networking Platform A common platform to post and Specially Designed Platform or Existing Twitter
retrieve periodic system updates Platforms (Twitter, Facebook etc.)
5 Semantics and Ontology Semantic Web technologies to build an RDF, OWL OWL
abstract model for the system
6 Data Management A Database System required to store, MySQL, SQLite DB, MongoDB SQLite
retrieve and analyze the system
generated data
7 Context Management To filter contextual information (of a Observer, Pub/Sub Pattern Topic Based
particular topic) from system Subscription
generated updates (Pub/Sub Pattern)
8 Performance Monitoring To continuously monitor the Manual or Automated, Periodic or Real Automated, Real Time
performance of industrial process Time
9 Security and Access Control To ensure the security and privacy of Data Encryption (Bcrypt Algorithm), Password Based
the IoT network Password Based Authentication
Schemes

between the layers present in existing SIoT architecture [10] and Industrial IoT components and acts as an interface between
the proposed SIoIT architecture. the assets and user applications. In the proposed architecture,
The presence of each component grouped into layers con- a separate SIoIT layer outlines the essential components that
tributes to some specific functionality to the system. Further, we comprise the specially designed SIoIT middleware for modern
briefly avert the functionality of the three architectural layers manufacturing systems. The detailed analysis of various sec-
stated in the proposed architecture. Table 3 delineates implemen- tions present in the proposed middleware is depicted further.
tation details for different architectural components and potential • Social Network Platform: The social network platform en-

technology candidates. ables the socially enabled machines/assets to share infor-


mation on social media. Any existing social networking
A Base Layer: The base layer is the basic component of the pro- mediums can be used for the purpose. For some applica-
posed architecture and is functionally analogous to the physical tions, application specific platforms are specially designed
layer in a layered IoT architecture. It comprises of two sub lay- fulfilling basic requirements of a social network such as
ers: infrastructure and communication. The infrastructure layer creating and managing profiles, building relationships and
supports the necessary foundations at the ground level to build posting status messages etc. For implementation purposes,
a SIoIT system. It includes no. of manufacturing assets, identity we have proposed a new approach for relationship manage-
tags, sensors and actuators. Each of these assets has a unique ment (Section 7). However, twitter is used as a social media
identity and is equipped with sensors and actuators. Technolo- platform to simulate real time updates and notifications.
gies like RFID, EPIC Code or NFC [25] can be deployed for iden- • Semantic and Ontology: Semantic technologies provide a

tifying the assets uniquely. These assets are interconnected to standard way to store, define and inter-relate data with the
each other via some communication network. The communica- help of semantic web languages such as RDF (Resource De-
tion layer is responsible for any sort of interaction among the scription Framework), OWL (Web Ontology Language) etc.
assets. It includes all the communication devices, technologies The ontological structures are used to define relationships
and protocols essential to enable communication among assets. between major classes/entities existing in a domain. In
The infrastructure layer is more or less similar to the sensing Section 4, an ontological architecture for socially enabled In-
layer while the communication layer is nearly equivalent to the dustrial IoT systems is presented which is to the best of our
network layer in SIoT architecture. knowledge is the only SIoIT ontology stated up until now.
B SIoIT Middleware: The SIoIT middleware not only acts as a • Data Management: Data management includes deploying

communication medium between the hardware and applica- suitable methods and techniques for storage, retrieval and
tion layer but also responsible for the communication and in- analysis of data generated by the system. For IoT networks,
teraction among various components present in the SIoIT layer. cloud based or lightweight database management systems
Its chief role is to provide abstraction between the hardware such as SQLite DB [26] are preferred.
and application thereby facilitating the use of all the services • Context Management: IIoT networks may generate huge

and functionalities provided by the system. It provides a com- amount of data as sensors produce continuous readings.
mon standard for exchange of information between diverse Contextual filters need to be applied to discrete relevant
6 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

data from irrelevant which is accomplished with the help of enabling the developers to utilize available APIs to build exten-
contextual management. RESTful APIs [27] can be deployed sive industrial applications. In a socially enabled manufacturing
to filter topic based information in the given context. environment, the proposed SIoIT architecture can provide ser-
• Security and Access Control: To maintain integrity of the vices such as the assets performance tracking, monitoring and
system, secure communication is desirable. Various secu- management.
rity models exist for IoT systems that enable the sensors to In the following sections, implementation of the proposed ar-
transmit data in encrypted form or in a highly secured man- chitecture is discussed with the help of semantic technologies.
ner without the fear of being eavesdropped. On the other A novel approach for relationship management between indus-
hand, it is evenly essential to set up strong access control trial assets is presented. Finally, the proposed framework is imple-
policies to ensure the safety of system resources and autho- mented with the help of a use case scenario. The system prototype
rize the access to all the valuable resources in the system. is built and simulated on an IoT platform. The proposed system
Only trustworthy machines or users should be provided ac- is likely to face some challenges and issues when implemented
cess to sensitive resources. Thus, building an effective access as an Industrial IoT application in a real time environment. One
control policy plays an integral part when it comes to build- of the significant challenges is power constraint. Since IoT appli-
ing security model for IoT systems [28]. cations are implemented with light weight devices and protocols,
• Performance Management: Performance management is an-
CPU power availability is limited. Thus, it is difficult to impart the
other crucial utility desirable in an IIoT system. It includes system with complex functionality without depleting the power in
performance monitoring and control. Performance is con- a comparatively shorter period of time. Other potential limitations
stantly being monitored while the system is in working of the proposed approach are reliability and scalability. The system
mode i.e. industrial manufacturing or production process is continuously monitors the performance of the industrial process in
going on. Periodic reports and status messages are updated real time without any human involvement. Therefore, we cannot
on the social network platform. Alert notifications are gen- afford the system to go down at any cost. Hence, it is required to
erated by the system in case of any discrepancy. An auto- be built as reliable as possible. Due to lack of availability of stan-
mated action could be initiated by the system depending dard IoT protocols and development platforms, system is expected
on the decision taken by the system as per the urgency of to face scalability issues. With growing number of IoT devices, it is
the situation. Since, the system needs to take decisions it requisite to develop some standard IoT protocols and frameworks.
must possess reasoning abilities. The proposed system im- Another important concern about the proposed approach is secu-
plements real time performance tracking and management rity. Building a highly secure system within the power constraints
by generating system alerts. is a challenging task. The researchers are working towards over-
C Application Layer: The purpose and components of application coming these limitations in the future and building highly reliable,
layer remain same for different IoT architectures and systems. scalable and secure systems.
Therefore, it is discussed here briefly. The major role of appli-
cation layer is to provide access to specific applications and ser- 4. SIoIT ontology
vices to the application users. There are multiple ways in which
Industrial IoT applications can be accessed such as mobile apps, In SIoIT environment, assets need to interact with each other
web portals and API Gateways etc. The application layer enables constantly. To prompt this interaction semantically, a component
various applications to access the system making sure its wide based ontological structure is defined for a SIoIT system with the
accessibility. In the proposed architecture, the components ap- help of standard web ontology language (OWL) and tool Protege
plication layer include are different APIs (Application Program- (Version 5.1.0) [29]. Various classes required to build the SIoIT on-
ming Interfaces), industrial applications as well as integration tology (SIoIT-Ont) are depicted in Fig. 3.
to other ERP applications. It also provides interfacing between SIoIT-Ont comprises of three major classes: Assets, Human Op-
application user and industrial objects (manufacturing assets) erator and SIoIT server. Assets can build relationships with other

Fig. 3. Class diagram for SIoIT ontology.


N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 7

Fig. 4. Ontology of a SIoIT network (SIoIT-Ont).

assets according to the rules defined by the Human Operator. Also, lifecycle of a social asset begins when it is first created by the
Human Operator may suggest actions to be performed to enhance manufacturer. Each asset is assigned with a unique EPC number
the performance of the manufacturing resources (assets). A SIoIT depending upon the technology requirements. In addition to the
server consists of the following essential SIoIT components: unique identity, there is a file associated to each asset containing
detailed information about its specifications. This information is re-
• SN Platform: This is the social network platform which man- quired later in the deployment and installation of the asset. Also,
ages the social relationship and communication among the it provides information about the services it will need and pro-
assets. It manages the IDs (ID Manager) and profiles (Profile vide in the form of ListofNeeds and ListofServices. Assets from the
Manager) of assets and enable communication among these as- same production batch share a Parental Object Relationship (POR)
sets (Communication Manager). The Posts Manager manages with each other. At this stage, POR is the only kind of relationship
the status messages and recommended actions posted by the that exists among the assets. However, at some point in time the
assets. asset will be procured by some person in industry and will be in-
• Data Manager: It is accountable for management of data gener- stalled in the factory as a whole or part of a machine. Once the
ated from SN Platform. machine in installed in an industry the unique id of the opera-
• Decision Support System: It monitors (Performance Monitor), tor will be attached with the asset. A software agent called social
optimizes (Performance Optimizer) and suggests recommended agent will be associated with each asset that will augment the as-
action to enhance performance (Performance Manager). Finally set with intelligent and social behavior. A common broker will be
these actions are posted in social network (SN Platform) by the used to publish/subscribe [30] information which will keep a track
posts manager (Posts Manager). of the topics and availability of information. The social agent will
• Action Controller: It controls the suggested actions to be per- provide the asset with the following necessary functionality:
formed by the assets.
• Security Controller: It is culpable for security and access control • Self monitoring, diagnostics and prognostics: evaluating ma-
for assets in SN Platform. chine performance in order to control or predict future failure.
• Relationship Analysis: finding and acknowledging the relation-
The relationship between different entities of a SIoIT system
ship among various assets.
can be easily understood from the graph (Fig. 4).
• Subscription and Publishing of data of interest: Subscribing and
publishing on the topic of interest on social media platform or
5. Social assets’ life cycle to a common broker.

The concept of social asset was firstly introduced by Li et. al.


[5]. In the multi agent approach, each IoT device (asset) has a soft- 5.1. Service discovery
ware agent associated to it known as device agent. This software
agent is needed to fulfill various computing needs of the device, Since in SIoIT interaction between the assets occur without
to manage relationships and also helps in decision making. The as- any human intervention, the devices and the users make use of
sociated software agent which enables the assets to build social publish-subscribe pattern to offer services and fulfill their needs.
relationship with each other is termed as Social Agent. The cor- The devices declare their needs and offer their services to the
responding assets are known as Social Assets. Asset is the ma- broker which in turn keeps the devices informed about the up-
jor building block for a SIoIT system. In the proposed scenario, dated needs and services. Thus, the process of service discovery
8 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

is smoothly carried out with the help of social agent and bro- 7. Friend discovery
ker. The agent publishes to the broker the services that an as-
set has to offer and begin to search friends that has needs cor- In the proposed approach, friend discovery is performed ini-
responding to those services and subscribes them to the formers tially when the asset is registered to the system for the very first
services. time. The friend list of each asset is updated when it is first regis-
Here is an example that elucidates the concept of social assets tered to the system according to the conditions defined in Table 4.
service discovery. After installing the asset on the given machine We have developed an algorithm to accomplish the friend discov-
(by creating a new profile), the software agent corresponding to ery process in an Industrial IoT environment. Further, we present
the asset learns from the ListOfNeeds that it needs to monitor the some required presumptions for the friend discovery algorithm.
current temperature conditions to work. The corresponding soft-
ware agent will subscribe the asset to the services published by 7.1. Assumptions
HVAC agent in order to access the temperature data or data re-
lated to other environmental conditions. Another example of friend Some significant assumptions considered in the algorithm are
discovery could be, if a new device is registered to the machine discussed here. We have n no. of Industrial assets denoted by Ai
the software agent of the machine updates its ListofNeeds, Listof- where the value of i varies from 1 to n. Each asset have a friend
Services and FriendList according to its initial needs and relation- list attached to it which is a two dimensional array (Friend_List).
ships it shares with its peers. Humans (MachineOperator) need to Friend_Listij , stores the friend assets of asset i at jth position where
interact with software agents in order to interact with the corre- j reaches up to maximum limit of friends denoted by Friend_Limit.
sponding device. The interactions between humans, machines and Each asset has the following six attributes associated with it:
agents must be carried out with the help of smart interfaces and • Ai .Code: Stores the ID (EPC Code) required to uniquely identify
lightweight IoT protocols such as MQTT (Message Queuing Teleme-
the asset
try Transport) [31]. • Ai .Parent: Stores the parent machine’s ID (EPC Code) of the as-
set
6. Relationship management approach • Ai .Type: Identifies the type of asset whether it is deployed in
a machine or kept as a replacement in case the former fails. It
In [8], the authors deploy a heuristic approach to manage rela- holds either of the two values: Original and Replacement
tionships in a SIoT network. However, we have proposed an agent • Ai .Function: Depicts the functionality of the asset in the system
based approach to manage relationships among the assets. A social • Ai .Needs: Includes the list of needs of the asset
agent gets attached to the asset as soon as it is registered to the • Ai .Services: Includes the list of services that an asset can pro-
system. It updates the Friend List of the asset according to some vide
pre defined conditions. It sends a request of friendship to those
matching the criteria or accepts/rejects the pending requests ac- 7.2. Friend discovery algorithm
cording to the same criteria. Since, the maximum no. of friends
that can be added to the list are finite therefore it keeps track of In this section a novel approach for friendship management
the least important friend in the list which could be replaced to (Friend Discovery Algorithm) in an SIOIT network is proposed. The
add a new one if the list is already full. The different kinds of rela- proposed algorithm (Algorithm 1) takes a set of assets as well as
tionships that we presume to exist among the assets are depicted their attributes as input and produces an updated friend list as
in Table 4. output. In the initial friend discovery process, each asset checks
Priority value is assigned to each type of friendship. A higher the attributes of every other asset to determine if any type of li-
priority value refers to high priority relationship. A social agent up- aison can be established in the form of friendship. Each type of
dates the list of needs (ListofNeeds) and services (ListofSevices) of friendship is concluded by some specific conditions which if met
the given asset. The services it can provide in given context will leads to a new addition to the friend list.
be published under the related topic. While it subscribes the as-
set to the topic related to the needed services. For example, if 7.3. Friendship management
a machine works in controlled environmental conditions it will
subscribe to the HVAC (Humidity Ventilation and Air Conditioning The social agent holds the responsibility of the task of manag-
Control) to monitor the current room conditions. The concept of ing friendships. After the initial friend discovery process is com-
building friendships between the assets was introduced to encour- pleted, a dynamic friendship management approach is needed to
age communication and efficient use of resources. If an asset needs enable socialization among assets. Out of the four kinds of rela-
some functionality or a specific resource possessed by another as- tionships defined, TYPE 4 is the only one dynamic in nature. As the
set, mutual cooperation between them will lead to a more efficient needs and services of the assets do not remain static through the
utilization of available resources. For example if one asset has tem- manufacturing process, different kind of cooperation is desired at
perature sensor to measure heat and other has pressure sensor to different levels of the process. Also, at any time new assets can be
evaluate atmospheric pressure. They both can entrust each other registered to the system. Therefore, it becomes substantial to use
and in turn share their set of sensor readings with each other. a friendship management approach. We propose a priority based
This is the sort of mutual cooperation that exists between TYPE approach to manage friendship between the assets. Each of the
4 friends. friendship type is assigned a priority as illustrated in Table 4. At

Table 4
Types of Asset Relationships.

Relationship Type Condition Priority Authority Mode

Parental Machine Asset Relationship (PMAR) TYPE 1 Established when the assets are subparts of the same parent machine 1 LOW Static
Same Functionality Asset Relationship (SFAR) TYPE 2 Establishes when the assets share common functionality 2 MEDIUM Static
Replacement Asset Relationship (RAR) TYPE 3 Established when one asset can be used as a replacement for the other 3 HIGH Static
Cooperation Asset Relationship (CAR) TYPE 4 Established when mutual cooperation is desirable among the assets 4 VERY HIGH Dynamic
N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 9

Algorithm 1 Friend Discovery Algorithm.


1: Begin
2: for i = 1 : n do
3: for j = 1 : n do
4: while k ≤ F riend_Limit do  Type 1 friendship condition
5: if Ai .Parent = A j .Parent then
6: F riend_Listik ← A j .Code
7: F riend_Listik .T ype ← T Y P E1
8: K ←K+1
 Type 2 friendship condition
9: if Ai .F unction = A j .F unction then
10: F riend_Listik ← A j .Code
11: F riend_Listik .T ype ← T Y P E2
12: K ←K+1
 Type 3 friendship condition
13: if Ai .F unction = A j .F unction then
14: if Ai .F unction = RE P LACE ME NT then
15: F riend_Listik ← A j .Code
16: F riend_Listik .T ype ← T Y P E3
17: K ←K+1
 Type 4 friendship condition
18: if Ai .Needs = A j .Services then
19: F riend_Listik ← A j .Code
20: F riend_Listik .T ype ← T Y P E4
21: K ←K+1
22: End

first, the asset adds all the other assets requesting for friendship to In order to support the proposed architectural model and pre-
the list of friends. If the limit of friends (Friend_Limit) is reached sented relationship management approach, a use case scenario for
and a new friendship request arrives, the following strategy drawn socially enabled Industrial IoT has been built using Node Red v
out in the form of three ordered steps is adopted to handle the 0.16.2. Further, an IoT based integrated approach for modelling and
newly arrived friendship proposal. simulation of bottle packaging industry is presented. In addition,
a simulation model for an automated bottle filling plant is devel-
1. Firstly, the node determines the type of friendship relationship oped. The solution is meant to be deployed on the factory floor and
that will be built with the sender of the new request on accep- its major purpose is to continuously monitor and ultimately en-
tance of request based on proposed approach (Algorithm 1) and hance the performance of bottle packaging process. It plays a cru-
retrieve its priority value. cial role in the maintenance of the system by suggesting as well as
2. If the priority of the potential friendship is equal to or lower taking appropriate actions as and when necessary. To have a clear
than the least prior friendship, friend request is rejected. understanding of the scenario, it is important to first understand
3. If the priority of the potential friendship is greater than the the underlying automated bottle filling process. The next subsec-
least prior friendship, friend request is accepted. The social tion clarifies the actual bottle filling process and briefly explains
agent removes the latest added friend with least prior friend- the necessary sub processes involved. It also provides a detailed
ship and replaces it with the sender of the request. description of the proposed systems scenario with the help of se-
mantics (ontology) and a simulation model.

8. SIoIT implementation: A Use case scenario


8.1. Proposed system scenario

This section exhibits an overview of potential implementation


On the basis of the design principles illustrated in Section 3, the
of the proposed architecture. Since IoT based Industrial environ-
proposed system scenario is being developed. To understand the
ment has not been completely implemented up till now, testing
automation of bottling plant one must go through the actual bot-
of such an environment is usually carried out with the help of a
tle filling process which occurs at a factory floor in an automated
simulation tool. The authors in [32] discuss and compare some of
bottle packaging industry [34]. The sub processes that constitute
the existing middleware platforms for IoT based applications im-
the bottle filling process are delineated below:
plementation. However, we have deployed the scenario on Node-
Red [33] which is a software platform developed by IBM for sim- • Bottle Transportation using Conveyors: Bottles are kept in posi-
ulation and modelling of an IoT environment. It is available as an tion in their respective holders which are fixed to the conveyor
open source platform for prototyping IoT applications. The reason at the input side. The process begins with loading of bottles
for selecting Node Red over other IoT platforms lies in its ability to into their respective holders attached to conveyors at the input
quickly prototype IoT applications and ease of integration with so- side. In some systems, Infrared sensors detect the presence of
cial networks and real time interaction with sensing devices. It is bottles in the holder. On the basis of results from these sen-
a browser based tool that uses MQTT protocol for communication sors, further cleansing, filling, capping and labeling operations
among devices. Building a prototype model is simple dragging and get started.
dropping the IoT nodes and connecting them to each other. It uses • Filling Operation: If the sensor indicates the presence of the
node as an abstraction for a JavaScript code module designed to bottle under the filling head, the conveyor stops. The fillers are
execute some specific functionality. It is built over node.js which is turned on and the corresponding bottles are filled with liquid
an event driven platform in a distributed environment. up to a desired level. That level is usually pre-defined by the
10 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

Fig. 5. Proposed system scenario for a bottle-filling plant.

machine operator i.e. fed into the system. After the filling oper- machines to communicate over a network thereby making it an
ation is completed, conveyor starts again. IoT enabled system (Fig. 5).
• Capping Operation: When the bottles reach to the cap-
ping/labeling system, conveyor belt stops moving again. Bottles
are capped and labeled while taking care of their proper posi- 8.2. Semantic description
tioning and orientation. After the capping and labeling process,
conveyor starts moving again. At last, bottles are unloaded from To describe proposed approach semantically, ABSS-Ont (Auto-
the ending point of the conveyor belt. The filling and capping mated Bottle-Filling Smart Solution Ontology) (Fig. 6) is designed.
process can occur simultaneously on two different lot of bottles It describes the three assets (Conveyor, Filler and Capper) used in
for efficient utilization of the system. the proposed system along with the deployed sensors.
The sensors make use of three MQTT brokers namely
We have taken into account an automated bottle filling plant MQTT_Broker1, MQTT_Broker2 and MQTT_Broker3 to publish in-
equipped with socially enabled intelligent machines/assets. The formation in the form of topics to which Asset Monitoring Sys-
machines/assets used in this context are a conveyor machine to tems are subscribed to. Each asset is uniquely identified by unique
carry and move forward the bottles, an automatic filling machine ID (EPC_Code) and has its own profile (Profile) managed by the
to fill liquid into bottles and an automatic capping machine to cap components ID_Manager and Profile_Manager respectively. A no-
and seal the bottles. The basic processes occurring in this scenario tification system (Notification_Manager) is also associated with
are loading, filling, capping and unloading of bottles respectively. the system to generate notifications or alerts (Social_Media_Alert
Some systems may include cleansing and rinsing of bottles before and System_Alert) for the user or operator of the machine (Ma-
filling but we have not included the cleaning process in current chine_Operator). Four sensors are attached to each of the Con-
scenario to reduce complexity and facilitate easier understanding. veyor (Conveyor_Sensor: CS1, CS2, CS3 and CS4) and Filling system
A number of sensors are deployed to each of these industrial units (Filler_Sensor: FS1, FS2, FS3 and FS4) and two sensors are attached
(Conveyor, Filling Machine and Capping Machine) that enable the to the Capping/Labeling system (Capper_Sensor: LS1 and LS2). The

Fig. 6. Schematic diagram of ABSS-Ont.


N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 11

Fig. 7. The registration tab.

detailed description of these sensors is provided in further sub- The probable output range values indicate the set of possi-
sections. The needs and services of the assets are fulfilled using ble values that a sensor can generate while the acceptable out-
publish-subscribe (pub/sub) pattern. Each asset has a social agent put range represent the set of permissible values. In case of any
(Social_Agent) associated with it which enable the assets to build deviation of results from the permissible, the system generates
friendship relationships with each other and maintains their friend alerts/notifications. The GUI of the proposed system is represented
list (Friend_List). Semantic rules are applied to the system for ser- with the help of node red dashboard on the local host system
vice discovery and relationship management process as discussed (http://127.0.0.1:1880/ui/#/0). The system can work in two modes:
in previous sections above.
• Monitoring Mode: In this mode, the operator can passively
monitor the performance of the system. Operator has no con-
8.3. Simulation setup trol over the functioning of the system.
• Operator Control: In this mode, the operator can actively con-
The simulation of the proposed system is setup in an automated trol the system to improve its performance.
bottle filling plant. There exist multiple bottle filling machines and
Largely, the user interface consists of three main pages/tabs de-
each machine consists of three major subparts (termed as assets):
scribed below:
Conveyor Belt, Filling Machine and Capping/Labeling Machine re-
spectively. The working of these machines has already been dis- 1. Registration Tab: It facilitates the registration of new ma-
cussed. Each of these subparts (assets) is equipped with appropri- chines/assets. Whenever a new machine/asset is installed to the
ate sensors for performance monitoring and control. The detailed system, the operator registers the device to new device registra-
description of the types of the sensors deployed along with as- tion interface (Fig. 7). Table 8 provides a brief description of the
sumptions taken for each of the asset is presented in Tables 5, attributes required to be entered into database for registration.
6 and 7 respectively. The new device information will be stored in the database and

Table 5
Sensors description for conveyor system.

S.No Sensor Description Unit of Measurement Probable Output Range Acceptable Output Range

1 CS1 Temperature Value C, Celsius 0–60 20–40
2 CS2 Humidity Level %, Percentage 0-85 37–53
3 CS3 Speed Monitor ips, Inches per second 1–10 5–7
4 CS4 Lubrication Level μ, Coefficient of friction 0.3–0.6 0.30–0.45

Table 6
Sensors Description for Filling System.

S.No Sensor Description Unit of Measurement Probable Output Range Acceptable Output Range

1 FS1 Water Level %, Percentage 0–100 40–100


2 FS2 Bottle Counter NUMBER 0–4 4
3 FS3 Leakage Detector BOOLEAN Present, Absent Absent
4 FS4 Water Purity Level LEVEL 0–10 7–10

Table 7
Sensors Description for Capping/Labeling System.

S.No Sensor Description Unit of Measurement Probable Output Range Acceptable Output Range

1 LS1 Bottle Orientation , Radians 0–360 0–180
2 LS2 Distance Sensor Inches 0–1 ± 0–0.2
12 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

Table 8
Machine/Asset Registration Attributes.

S.No Attribute Description TYPE

1 MODEL NO Provides the model no. associated with the machine assigned to it at the time of manufacturing ALPHA NUMERIC
2 EPC CODE A unique ID used to identify the intelligent machine/asset in a network of machines/assets ALPHA NUMERIC
3 FUNCTION To identify the role or function of the machine/asset in the system. It could be a part of the parent machine TEXT
(ORIGINAL) or simply available as a replacement to the actual machine part (REPLACEMENT)
4 PARENTAL CODE To identify the parent machine to which an original asset belongs to or is a part of. It is NULL for a ALPHA NUMERIC
replacement machine part

Fig. 8. Sensors output monitoring tab.

Fig. 9. The Operator-Control Tab.

list of registered assets can be retrieved by clicking on the View 8.4. Friend discovery process
Records button.
2. Performance Monitoring: It is used for continuous monitoring The system initiates the friend discovery process as soon as a
of the system and provides a display of outputs from various new asset is registered to the system. It retrieves the attributes of
sensors (Fig. 8). the asset from the database and starts looking for friends on the
3. Operator Control: This tab is required when the system is work- basis of predefined rules. The database used for the proposed sys-
ing in operator control mode. It includes various controls en- tem is SQLite which is a light weight database suitable for Node
abling the user to take appropriate action for proper function- Red.
ing of the system as depicted in Fig. 9. Unlike automatic mode, A preliminary friend list will be created based on the available
in operator control mode the system does not perform any assetś profile involving only Parental Asset Friendship (TYPE 1)
action but may recommend the operator with a suitable ac- and Same Functionality Friendship (TYPE 2).Consider an instance
tion/solution to the problem. in which six assets are registered to the system as shown in Fig. 10.
N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 13

Fig. 10. Display Friend List.

a part of the same PARENT MACHINE (B001) and the relationship is


known as TYPE 1 friendship, b) CONVEYOR (C1100) is friends with
CONVEYOR (C2200) because the latter can be used as a replace-
ment for former and the relationship is known as TYPE 2 friend-
ship.

8.5. Notifications/alerts

The system performance is continuously monitored and


in case of any discrepancy or error the system generates
alerts/notifications intended to alert the machine operator about
the urgent requirement of an action. Along with generating alerts
in case of any exceptional behavior, the system also periodically
reports the performance of the system to the operator. The peri-
odic reports are sent as a social media notification. While a system
alert is generated in case an urgent response is required. Thus, the
proposed system generates two types of messages:

• Social Media Posts: The system automatically posts the system


Fig. 11. Social media notifications. performance parameters values on twitter periodically (Fig. 11).
• System Generated Alerts: In case of an urgent response to a
The system can perform a static search from the database to iden- problem is needed, system alerts are generated. These can be
tify assets which are a part of the same machine i.e. Type 1 friend- blocking or non-blocking. A blocking system alert stops the nor-
ship or those sharing same functionality and/or one could be used mal functioning of the system while a non blocking alert does
as a replacement for another i.e. TYPE 2 friendship. For example: a) not hinder the normal functioning of the system. An example
CONVEYOR (C1100) with is friends with FILLER (F1100) as they are of system generated alerts is represented in Fig. 12.

Fig. 12. System generated alert.


14 N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869

Fig. 13. CPU performance evaluation.

berry Pi system with Raspbian OS [35]. The implementation de-


tails have already been discussed in previous sections. The sys-
tem flow was deployed on the Node Red platform and monitored
with the help of Node Red dashboard several hours continuously
for 30 days. The system performance was evaluated using differ-
ent metrics which turned out to be uniform in terms of CPU and
memory usage. Fig. 13 depicts the systems CPU usage in running
mode.
The maximum CPU usage occurred during peak intervals when
highest no. of I/O messages were exchanged by the system. It
reached a maximum of 25% while an average of 20% which is quite
reasonable. Further, Fig. 14 represents the speed of alerts and noti-
fications generated by the system i.e. no. of alert/notification mes-
sage generated per unit time. Systems accuracy is calculated by
Fig. 14. Rate of system generated alerts/notifications. comparing the no. of faults occurred with the no. of alerts gen-
erated per unit time which is found to be nearly 0.8 (80%).
8.6. Performance evaluation Since the system is implemented on local host web server us-
ing HTTP, any message to the system is transferred with the help
This section presents an investigation and performance evalu- of HTTP incoming requests. Therefore, other performance evalua-
ation of the proposed framework in given scenario. The system tion metrics include no. of HTTP Input requests (Fig. 15) and HTTP
prototype is implemented using Node Red middleware on a Rasp- throughput (Fig. 16). The HTTP throughput is estimated in terms of

Fig. 15. Rate of HTTP incoming requests.

Fig. 16. HTTP Throughput.


N. Gulati and P.D. Kaur / Ad Hoc Networks 91 (2019) 101869 15

no. of message (packet) round trips per unit time which increases [14] L. Atzori, A. Iera, G. Morabito, The internet of things: a survey, Comput. Netw.
with increase in no. of messages exchanged at a given time. 54 (15) (2010) 2787–2805.
[15] Y. cong Zhang, J. Yu, A study on the fire iot development strategy, Procedia
Eng. 52 (2013) 314–319. 2012 International Conference on Performance-based
9. Conclusion Fire and Fire Protection Engineering
[16] Z. Ji, Q. Anwen, The application of internet of things(iot) in emergency man-
In this paper, an incorporation of Social IoT into industry is con- agement system in china, in: 2010 IEEE International Conference on Technolo-
gies for Homeland Security (HST), 2010, pp. 139–142.
templated and a novel architecture for SIoIT systems is proposed. It [17] D. Miao, L. Liu, R. Xu, J. Panneerselvam, Y. Wu, W. Xu, An efficient indexing
also puts forward algorithmic and heuristic approaches to manage model for the fog layer of industrial internet of things, IEEE Trans. Ind. Inform.
relationships between industrial assets accompanied by a proposal 14 (10) (2018) 4487–4496.
[18] S. Jeschke, C. Brecher, T. Meisen, D. Özdemir, T. Eschert, Industrial Internet of
on practical implementation. An ontology (SIoIT-Ont) is developed Things and Cyber Manufacturing Systems, Springer International Publishing,
with the purpose of providing a semantic meaning to the pro- Cham, 2017. 3–19
posed strategies. To provide a basis for the deployment of proposed [19] Z. Bi, L. Da Xu, C. Wang, Internet of things for enterprise systems of modern
manufacturing, IEEE Trans. Ind. Inform. 10 (2014) 1537–1546.
architecture, an example industrial scenario for automated bottle [20] Y. Zhang, W. Wang, S. Liu, G. Xie, Real-time shop-floor production performance
packaging plant is discussed. We developed a simulation model for analysis method for the internet of manufacturing things, Adv. Mech. Eng. 6
performance monitoring and control of an automated bottle filling (2014) 270749.
[21] M. Wang, J. Tan, M. Wang, Y. Li, Design and implementation of enterprise asset
plant in collaboration with the proposed architecture to establish
management system based on iot technology, in: 2015 IEEE International Con-
its viability in real industrial scenarios. ference on Communication Software and Networks (ICCSN), 2015, pp. 384–388.
In future, we aim to implement and test the proposed system [22] J. Wan, S. Tang, Z. Shu, D. Li, S. Wang, M. Imran, A.V. Vasilakos, Software-de-
fined industrial internet of things in the context of industry 4.0, IEEE Sens. J.
in real industrial environments. The feasibility of the proposed ap-
16 (20) (2016) 7373–7380.
proach in practical is one of the major concerns. We considered [23] Y. Zhang, F. Tao, Chapter 2 - overview of iot-enabled manufacturing system,
relationship management strategies pertaining to a static approach. in: Y. Zhang, F. Tao (Eds.), Optimization of Manufacturing Systems Using the
However, actual asset socializing scenario appears to be more dy- Internet of Things, Academic Press, 2017, pp. 21–41.
[24] M. Weyrich, C. Ebert, Reference architectures for the internet of things, IEEE
namic than static in nature. Thus, in future we intend to work on Software 1 (2016) 112–116.
augmenting the current approach with dynamic clauses. In addi- [25] X. Jia, Q. Feng, T. Fan, Q. Lei, Rfid technology and its applications in internet
tion to performance monitoring and control of the industrial IoT of things (iot), in: 2012 2nd International Conference on Consumer Electronics,
Communications and Networks (CECNet), 2012, pp. 1282–1285.
systems, the future emphasis will be on performance enhance- [26] L. Junyan, X. Shiguo, L. Yijie, Application research of embedded database sqlite,
ment. Different machine learning strategies can be employed to in: 2009 International Forum on Information Technology and Applications, 2,
encourage automatic friend selection by learning from experience. 2009, pp. 539–543.
[27] A. Elmangoush, T. Magedanz, A. Blotny, N. Blum, Design of restful apis for m2m
It is supposed to add to the more effective relationship manage- services, in: 2012 16th International Conference on Intelligence in Next Gener-
ment strategies. ation Networks, 2012, pp. 50–56.
[28] C.M. Medaglia, A. Serbanati, An overview of privacy and security issues in the
Conflict of interest internet of things, The Internet of Things, Springer New York, New York, NY,
2010. 389–395
[29] H. Zhao, S. Zhang, J. Zhao, Research of using protege to build ontology, in: 2012
None. IEEE/ACIS 11th International Conference on Computer and Information Science,
2012, pp. 697–700.
References [30] P.B. Monday, Implementing the Publish/Subscribe Pattern, Apress, Berkeley, CA,
2003, pp. 205–223.
[1] L. Atzori, A. Iera, G. Morabito, Siot: giving a social structure to the internet of [31] V. Karagiannis, P. Chatzimisios, F. Vzquez-Gallego, J. Alonso-Zarate, A Survey on
things, IEEE Commun. Lett. 15 (11) (2011) 1193–1195. Application Layer Protocols for the Internet of Things, 3, 2015, pp. 11–17.
[2] S. Jeschke, C. Brecher, T. Meisen, D. Özdemir, T. Eschert, Industrial Internet of [32] A.H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, Q.Z. Sheng, Iot middleware: a sur-
Things and Cyber Manufacturing Systems, Springer International Publishing, vey on issues and enabling technologies, IEEE Internet Things J. 4 (1) (2017)
Cham, 2017. 3–19 1–20.
[3] L.D. Xu, W. He, S. Li, Internet of things in industries: a survey, IEEE Trans. Ind. [33] A. Javed, Complex Flows: Node-RED, Apress, Berkeley, CA, 2016, pp. 51–73.
Inf. 10 (4) (2014) 2233–2243. [34] M.J. Hastings, Packaging Machinery, Springer US, Boston, MA, 1993, pp. 41–62.
[4] C. Yang, W. Shen, X. Wang, Applications of internet of things in manufacturing, [35] D. Guinard, V. Trifa, Building the Web of Things: With Examples in
in: 2016 IEEE 20th International Conference on Computer Supported Coopera- Node. Js and Raspberry Pi, first ed., Manning Publications Co., Greenwich, CT,
tive Work in Design (CSCWD), 2016, pp. 670–675. USA, 2016.
[5] H. Li, A. Parlikad, Social internet of industrial things for industrial and man-
ufacturing assets, IFAC-PapersOnLine 49 (28) (2016) 208–213. 3rd IFAC Work- Ms. Nancy Gulati is working as a Research Scholar in
shop on Advanced Maintenance Engineering, Services and Technology AMEST the Department of Computer Science and Engineering,
2016 Guru Nanak Dev University, RC, Jalandhar. She received
[6] R. Schmidt, M. Möhring, R.-C. Härting, C. Reichstein, P. Neumaier, P. Jozinović, her Master’s degree in Computer Science and Engineer-
Industry 4.0 - Potentials for Creating Smart Products: Empirical Research Re- ing from National Institute of Technology, Jalandhar, India
sults, in: W. Abramowicz (Ed.), Business Information Systems, Springer Inter- working on Resource Constraints in Wireless Sensor Net-
national Publishing, Cham, 2015, pp. 16–27. works. She is currently pursuing Ph.D and her research
[7] B.K. Tripathy, D. Dutta, C. Tazivazvino, On the Research and Development interests include applications of Internet of Things (IoT)
of Social Internet of Things, Springer International Publishing, Cham, 2016, and its enabling technologies.
pp. 153–173.
[8] M. Nitti, L. Atzori, I.P. Cvijikj, Friendship selection in the social internet of
things: challenges and possible strategies, IEEE Internet Things J. 2 (3) (2015)
240–247.
[9] Z. Li, R. Chen, L. Liu, G. Min, Dynamic resource discovery based on preference
and movement pattern similarity for large-scale social internet of things, IEEE
Dr. Pankaj Deep Kaur is working as an Assistant
Internet Things J. 3 (4) (2016) 581–589.
Professor in the Department of Computer Science and
[10] L. Atzori, A. Iera, G. Morabito, M. Nitti, The social internet of things (siot) when
Engineering, Guru Nanak Dev University, RC, Jalandhar,
social networks meet the internet of things: concept, architecture and network
India. She received her Bachelor’s Degree in Computer
characterization, Computer networks 56 (2012).
Applications (20 0 0) and Master’s Degree in Informa-
[11] W. Zhang, Q. Jin, D.E. Baz, Enabling the social internet of things and social
tion Technology (2003) from Guru Nanak Dev Univer-
cloud, IEEE Cloud Comput. 2 (6) (2015) 6–9.
sity, Amritsar, India. She completed her Ph.D. in Resource
[12] Y. Lu, Industry 4.0: a survey on technologies, applications and open research
Scheduling in Cloud Computing from Thapar University,
issues, J. Ind. Inf. Integr. 6 (2017) 1–10.
Patiala (2014) and has over ten years of teaching and re-
[13] Z. Pang, Q. Chen, J. Tian, L. Zheng, E. Dubrova, Ecosystem analysis in the de-
search experience. Her research interests include Cloud
sign of open platform-based in-home healthcare terminals towards the inter-
Computing and Big data.
net-of-things, in: 2013 15th International Conference on Advanced Communi-
cations Technology (ICACT), 2013, pp. 529–534.

You might also like