IndexContextRelated worksSecurity and privacy challengesQuality of servicePurposeApproach and methodologyContext In recent years, the Industrial Internet of Things (Industrial IoT) has become the most popular method industrial technical paradigms and business concepts. With the continued integration of emerging information and communication technologies (ICT), the sector is expected to experience a revolution in the way it operates towards autonomy (Meng Z. et al, 2017). The envisaged industrial systems have the potential to enhance collaborative practices, which promise greater manufacturing flexibility and product variability with minimized human interventions. For example, new services such as real-time event processing or 24/7 access to tracking information will be introduced in the supply chain (Sanchez-Iborra, R. Cano, M. 2016) . Having an in-depth monitoring system distributed throughout the production and supply chain allows you to enrich the entire value chain with valuable information, minimizing losses against unexpected events and therefore improving both business processes and information exchange between stakeholders (Business-to-Business (B2B) networks) (Stock, T. Seliger, G. 2016). Industrial IoT incorporates machine learning and big data technology, leveraging machine-2-machine (M2M) sensor data communication and automation technologies that have existed in industrial environments for years. What is changing is that the concept of industrial IoT is pushing the automation sector to ensure greater interoperability of its products. This means that it is time to find standards to apply to these technologies and their applications. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get Original EssayRelated Work Analyzing industrial IoT through modeling should be considered the best way of study for a better understanding of the challenges imposed by such systems. Since industrial IoT modeling is related to a broad context, we classify the related work into the following categories from i to iv i. Research trends in industrial IoT Gubbi et al. present a cloud-centric vision to deploy industrial IoT worldwide. They discuss key technologies and application areas that can define the future direction of IoT research. While Jara et al. Consider the challenges and opportunities of extending the public IPv4 address space for the Internet of Everything through IPv6 to support IoT capabilities. Sallai, G. first summarizes the challenges of the current Internet and outlines the visions and recent capabilities of the Future Internet, then Sallai, G. identifies clusters of relevant research topics defining them as chapters of Internet research activities of the future in a layered model. It includes basic research on Internet science, Internet engineering to future Internet applications and experiments. While wireless sensor networks (WSNs) provide a virtual layer where data about the physical world can be retrieved by any computing system. Alcaraz et al. highlight that WSNs are an invaluable resource for realizing the IoT vision in terms of integration, security and other issues. Collecting, modeling, reasoning, and distributing context over sensor data, as well as context-aware processing, play a critical role in IoT applications. Security and privacy challenges Babar et al. provide IoT analytics in the context ofsecurity, privacy and confidentiality issues and propose the security model for IoT (Babar et al. perform analysis of the Internet of Things regarding security, privacy and confidentiality and propose the security model for Internet of Things.). Weber considers the new security and privacy challenges posed by international legislation relating to the right to freedom of information, provisions that prohibit or otherwise limit the rules of use on cybersecurity legislation, in support of the mechanisms of use of the IoT (Weber considers new security and data protection challenges arising from international law in relation to the right to information, provisions that prohibit or otherwise limit the application of cybersecurity laws, to support the mechanisms for using the IoT.). Skarmeta et al. propose an access control mechanism based on distributed capabilities. The latter relies on public key cryptography to address some security and privacy challenges in IoT. Their solution uses the optimized elliptic curve digital signature algorithm within the smart object. Slavin et al. introduce security requirement templates that represent reusable security practices that software engineers can apply to improve security in their systems. The paper proposes a new method that combines a loop-based approach with feature diagram notation to review only the relevant patterns and quickly select the most appropriate patterns for the situation(1 Skarmeta et al. propose a feature checking mechanism distributed and capacity-based access. The latter relies on public key cryptography to address certain security and privacy issues on the Internet of Things et al. provide security requirements models that represent reusable security practices that software engineers can apply to improve the security of their systems with feature diagram scoring to examine only the relevant models and quickly select the most appropriate ones for situation.)(2 Skarmeta et al. propose a distributed and capacity-based access control mechanism. It relies on public key cryptography to address some security and privacy issues on the Internet of Things. Your solution uses the optimized elliptic curve digital signature algorithm in the Smart object. Slavin et al. provide security requirement templates that represent reusable security practices that software engineers can apply to improve the security of their systems. The paper proposes a new method that combines a review cycle approach with characteristic diagram notation to examine only relevant models and quickly select those that are best suited to the situation.) . Heer et al. discuss the problems and possibilities of application of well-known Internet protocols and security solutions in the IoT. The authors also describe the implementation model and key security requirements and highlight the specific technical restrictions of standard IP security protocols. (Heer et al. discuss the problems and possibilities of applying well-known Internet protocols and security solutions in IdOT. The authors also describe the implementation model and basic security requirements and focus on the technical limitations of IP security protocols standard.) Security and Privacy Energy Issues within IoT Energy consumption (EC) is the key issue of IoT. Zhou etal. describe the energy models (EM) of the core parts of the WSN node, such as processors, radio frequency modules, and sensors. The basis of EM is the mechanism of triggering events. The authors first simulate the node components and then estimate the EC of the network protocols using this EM. The model presented here is suitable for WSN EC analysis, evaluation of network protocols, and development of WSN applications. Schmidt et al. describes a method for building models for sensor nodes based on a few simple measurements. They provide an example where models are integrated into a simulation environment within the proposed runtime framework to support the model-driven design process. Measurements show that the proposed model significantly reduces the EC. Lanzisera et al. propose a 'communicating power supply' (CPS) to enable the communication of energy and control information between the device and a building management system. Friedman and Krivolapov describe a study dealing with a combined power and throughput performance effect of using Bluetooth and Wi-Fi in smartphones. The study reveals some interesting effects and trade-offs. Notably, the paper identifies many situations where Wi-Fi is superior to Bluetooth, countering previous reports. The study also identifies a couple of scenarios that can be better handled by Bluetooth. The findings of this study provide preferred usage patterns that may be of interest to smartphone researchers and developers. Venckauskas et al. present the configurable IoT unit prototype that allows you to perform various experiments in order to determine the relationship between energy and security in various modes of the IoT unit. The paper also presents a methodology for measuring the energy of the IoT unit. During application, the methodology provides results in two different modes: ideal (without the effect of noises within a communication environment in which the IoT unit operates) and real (with the effect of noises). ( Energy consumption (EC) is a big problem for IoT. Zhou et al. a description of the energy models (EM) of the core parts of the WSN node such as processors, radio frequency modules and sensors. EM is based on an event activation mechanism.The authors first simulate the node components and then evaluate the EC network protocol using this EM model presented here is suitable for WSN EC analysis, network protocol evaluation and sensor WSN applications development node models based on some simple measurements show that the proposed model allows a significant reduction of EC al. offer a "communication power supply" (CPS) to enable communication of power and control information between the device and the building management system.... Friedman and Krivolapov describe a study addressing the combined effect of energy and bandwidth of using Bluetooth and Wi-Fi connection in smartphones. The study reveals some interesting effects and trade-offs. In particular, they identified many situations where Wi-Fi is a better solution than Bluetooth, which contrasts with previous reports. The study also identified several scenarios that can be better handled by Bluetooth. The findings of this study provide insight into preferred usage patterns that may be of interest to scientists, researchers, and smartphone developers. Venckauskas et al. present a configurable prototype of the IoT, which allows various experiments to be carried out to determine the relationship between energy and security in different.
tags