The Internet of Things—and Machines: Linking Machines to Machines


Reading time ( words)

Linking industrial machinery, robots, and systems together holds considerable potential. However, it also requires a high level of security to avoid both breakdowns and break-ins.

The ‘Internet of Things’ has been a hot topic for a long time. The concept basically describes the phenomenon whereby more and more things are interconnected via the internet. It is happening while technologies such as sensors, GPS systems, and antennas are being integrated in products such as mobile phones, clothes, cars, thermostats, and burglar alarms. The technologies collect data that we can access via the internet, and enable us to control, for example, the temperature in our holiday home using our mobile phone.

However, at the heart of Industry 4.0 is the ‘Industrial Internet of Things’. Here, it is not only products, people, and technology that are being interconnected, but also robots, machines, and systems, which are connected to each other out in the companies.

Professor Paul Pop heads a new research centre for the Internet of Things (IoT) at DTU. He is also responsible for the centre’s work with Industrial IoT, and explains how it can help businesses increase productivity:

“Businesses can optimize processes which perhaps they had no idea could be optimized. It might be something as simple as discovering when a particular machine is available. When machines are interconnected and exchange data, it can also be used to detect defects or changes in production at an early stage, and before any damage is caused. Big data and machine learning can also be used to predict when a machine needs new spare parts, to reduce the risk of machine stoppages,” says Paul Pop.

There is a broad consensus that the Industrial Internet of Things holds huge potential. According to General Electric, the phenomenon can increase global GDP by USD 15 billion over the next 20 years.

The pace of development is accelerating rapidly. In 2011, 13 billion devices globally were connected to the internet, while it is estimated that this number will have grown to 50 billion by 2020.

Requires reliable technology

 

The more we connect to the internet, the higher the security requirements as regards breakdowns and break-ins. An internet connection obviously increases the degree of vulnerability to cyberattacks. Therefore, security is paramount if Industrial IoT is to be fully exploited, and it is a high-priority research area in DTU’s new IoT centre.

In addition, the technologies must be highly reliable, so that transferring data between two machines or robots takes place in absolute real time. In an industrial context, it is futile if there is a slightly weak internet connection, as the processes at many companies are extremely time-critical, and any errors or delays in the communication between the machines can have serious consequences.

“Systems must be able to react very quickly if, for example, an unexpected change occurs somewhere in production. If the systems are unable to correct themselves in real time, the company risks losing production with a consequent loss of profit. In extreme cases, certain businesses risk major incidents occurring such as explosions, meltdowns, or leakages that would cause serious pollution,” says Paul Pop.

From the cloud to the fog

To ensure the highest level of security while maintaining the highest possible communication speed between the machines, it is important that communication and data are not exchanged via cloud-based systems. Instead, there is talk of bringing ‘the cloud’ down to earth—and when clouds are at ground level, it is, as we know, foggy. Therefore, we call this new technological development ‘fog computing’. In other circles, it has been dubbed ‘real-time edge computing’, says Paul Pop. With fog computing, the communication between the machines takes place locally within the company.

“It’s not the same as having local servers on the premises, as they are far too slow and unstable. A server can break down, and it can be hacked. Companies need a technology which is more specialized and reliable. At the moment, we have fieldbuses, which are the hardware that provide another kind of network for connecting a company’s machines. With fog computing, companies have the opportunity to exploit digitization without compromising security, reliability and speed,” says Paul Pop.

Share


Suggested Items

OFFSET 'Sprinters' Encouraged to Share Innovative Ideas for Swarm Systems

10/16/2017 | DARPA
DARPA’s OFFensive Swarm-Enabled Tactics (OFFSET) program envisions future small-unit infantry forces using small unmanned aircraft systems (UASs) and/or small unmanned ground systems (UGSs) in swarms of 250 robots or more to accomplish diverse missions in complex urban environments.

DARPA’s Drive to Keep the Microelectronics Revolution at Full Speed Builds Its Own Momentum

08/28/2017 | DARPA
To perpetuate the pace of innovation and progress in microelectronics technology over the past half-century, it will take an enormous village rife with innovators. This week, about 100 of those innovators throughout the broader technology ecosystem, including participants from the military, commercial, and academic sectors, gathered at DARPA headquarters at the kickoff meeting for the Agency’s new CHIPS program, known in long form as the Common Heterogeneous Integration and Intellectual Property (IP) Reuse Strategies program.

DARPA's Assured Autonomy Program Seeks to Guarantee Safety of Learning-enabled Autonomous Systems

08/17/2017 | DARPA
Building on recent breakthroughs in autonomous cyber systems and formal methods, DARPA today announced a new research program called Assured Autonomy that aims to advance the ways computing systems can learn and evolve to better manage variations in the environment and enhance the predictability of autonomous systems like driverless vehicles and unmanned aerial vehicles (UAVs).



Copyright © 2017 I-Connect007. All rights reserved.