TY - GEN
T1 - Optimum Configuration of Edge Computing Protocols for Industrial Internet-of-Thing Applications
AU - Bakhtiari, Mohammad
AU - Wei, Yang
AU - Nishi, Hiroaki
AU - Fung Tsang, Kim
AU - Aljuhaishi, Nasser
AU - Alahmad, Mahmoud
N1 - Funding Information:
VII. ACKNOWLEDGEMENT Some parts of this paper are based on the results obtained from the following projects: JST CREST Grant Number JPMJCR19K1, MEXT/JSPS KAKENHI Grant (B) Number JP20H02301, the New Energy and Industrial Technology Development Organization (NEDO) Grant Number JPNP14004, the MAFF Commissioned project study (Grant Number JPJ009819) and the National Institute of Information and Communications Technology (NICT, Grant Number 22004).
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Industrial Internet-of-Things (IIoT) technology has been rigorously developed in recent years, moving towards the ambitious goal of industry 4.0, Network Automation. However, there are a few critical challenges regarding the implementation of a reliable IIoT ecosystem for different applications; security, battery life, and bandwidth are controversial challenges. All the challenges regarding IIoT are mainly struggling within the edge computing smaller box of the big picture in which a cloud is an upstream object while sensors and actuators act as downstream devices. Therefore, having a reliable IIoT ecosystem necessitates focusing on the whole IIoT's challenges in the edge computing smaller box; first realizing the vital, practical demands of a specific IIoT application, and then defining the compatible protocols to form the effective edge computing configuration. This paper reviews four IIoT case study applications with their specific requirements and their counterpart sensor/actuator properties to find the appropriate edge computing protocols satisfying their demands.
AB - Industrial Internet-of-Things (IIoT) technology has been rigorously developed in recent years, moving towards the ambitious goal of industry 4.0, Network Automation. However, there are a few critical challenges regarding the implementation of a reliable IIoT ecosystem for different applications; security, battery life, and bandwidth are controversial challenges. All the challenges regarding IIoT are mainly struggling within the edge computing smaller box of the big picture in which a cloud is an upstream object while sensors and actuators act as downstream devices. Therefore, having a reliable IIoT ecosystem necessitates focusing on the whole IIoT's challenges in the edge computing smaller box; first realizing the vital, practical demands of a specific IIoT application, and then defining the compatible protocols to form the effective edge computing configuration. This paper reviews four IIoT case study applications with their specific requirements and their counterpart sensor/actuator properties to find the appropriate edge computing protocols satisfying their demands.
KW - Data Protocol
KW - Edge computing
KW - IoT challenges
KW - Network protocol
UR - http://www.scopus.com/inward/record.url?scp=85143907384&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85143907384&partnerID=8YFLogxK
U2 - 10.1109/IECON49645.2022.9969057
DO - 10.1109/IECON49645.2022.9969057
M3 - Conference contribution
AN - SCOPUS:85143907384
T3 - IECON Proceedings (Industrial Electronics Conference)
BT - IECON 2022 - 48th Annual Conference of the IEEE Industrial Electronics Society
PB - IEEE Computer Society
T2 - 48th Annual Conference of the IEEE Industrial Electronics Society, IECON 2022
Y2 - 17 October 2022 through 20 October 2022
ER -