| Literature DB >> 32033076 |
Pal Varga1, Jozsef Peto1, Attila Franko1, David Balla1, David Haja1, Ferenc Janky1, Gabor Soos1, Daniel Ficzere1, Markosz Maliosz1, Laszlo Toka1.
Abstract
Industrial IoT has special communication requirements, including high reliability, low latency, flexibility, and security. These are instinctively provided by the 5G mobile technology, making it a successful candidate for supporting Industrial IoT (IIoT) scenarios. The aim of this paper is to identify current research challenges and solutions in relation to 5G-enabled Industrial IoT, based on the initial requirements and promises of both domains. The methodology of the paper follows the steps of surveying state-of-the art, comparing results to identify further challenges, and drawing conclusions as lessons learned for each research domain. These areas include IIoT applications and their requirements; mobile edge cloud; back-end performance tuning; network function virtualization; and security, blockchains for IIoT, Artificial Intelligence support for 5G, and private campus networks. Beside surveying the current challenges and solutions, the paper aims to provide meaningful comparisons for each of these areas (in relation to 5G-enabled IIoT) to draw conclusions on current research gaps.Entities:
Keywords: 5G; Industry 4.0; IoT; artificial intelligence; blockchain; mobile edge cloud; private campus network; survey; ultra-reliable low latency communications; virtualization
Year: 2020 PMID: 32033076 PMCID: PMC7038716 DOI: 10.3390/s20030828
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The importance of key capabilities in different usage scenarios [2].
Data rate and density requirements for various broadband scenarios [3].
| Scenario | Experienced Data Rate (UL and DL) | Area Traffic Capacity (UL and DL) | Overall User Density | UE Speed |
|---|---|---|---|---|
| Urban macro | 25 Mbps | 50 Gbps/km2
| 10,000/km2 | Pedestrians and users in vehicles (up to 120 km/h) |
| Indoor hotspot | 500 Mpbs | 2 Tbps/km2
| 250,000/km2 | Pedestrians |
| Broadband access in a crowd | 50 Mbps | 7.5 Tbps/km2
| 500,000/km2 | Pedestrians |
| High-speed train | 25 Mbps | 7.5 Gbps/train | 1000/train | Users in trains (up to 500 km/h) |
| High-speed vehicle | 25 Mbps | 50 Gbps/km2
| 4000/km2 | Users in vehicles (up to 250 km/h) |
| Airplanes connectivity | 7.5 Mbps | 600 Mbps/plane | 400/plane | Users in airplanes (up to 1000 km/h) |
Figure 2The reference architecture for 5G—non-roaming case [11].
Figure 3An architectural view of the 5G network slicing [13].
Figure 4Benchmarking infrastructure for measuring heterogeneous local automation cloud communications capabilities [26].
Use cases of 5G technologies and their realization.
| Number of Use Cases | ||||||
|---|---|---|---|---|---|---|
|
|
|
|
|
|
| |
| [ | 1 | 1 | 1 | mobility, reliability | – none – | High level overview of 5G and Industry 4.0 |
| [ | 1 | 1 | reliability | real-world demonstration | 5G in a real-world industrial application | |
| [ | 1 | 2 | 2 | reliability | system architecture | 5G communication system architecture for manufacturing |
| [ | 1 | reliability | real-world demonstration, measurements | URLLC for a distributed control system of a robot | ||
| [ | 2 | 3 | 2 | MEC | architecture | 5G for IIoT in smart manufacturing |
| [ | 1 | 1 | – none – | – none – | IoT in Construction Management | |
| [ | mmWave, MIMO, beamforming | – none – | Positioning using 5G | |||
| [ | 1 | reliability | system architecture | 5G system architecture for tactile internet | ||
| [ | 1 | Edge-cloud, network slice | architecture | 5G for telesurgery | ||
| [ | NFV | architecture, emulated prototype | NFV in smart manufacturing prototype | |||
| [ | NFV | real-world demonstration, prototyping framework | NFV in smart manufacturing demonstration | |||
| [ | network slicing | system architecture | 5G network slicing framework for Industry 4.0 | |||
| [ | NFV, network slicing | framework, simulation | Framework and simulation for 5G autonomous vehicles | |||
| [ | MEC | real-world demonstration | Control of a robot arm in MEC | |||
Figure 5The OpenFog reference architecture: N-tier fog deployment [42].
5G Use-Case Requirements in Edge Computing.
| Delay | Bandwidth | User Mobility | Energy Consumption | Research Efforts | |
|---|---|---|---|---|---|
| Tactile internet | <=5 ms | ∼1 Gbps | ✓ | ✓ | [ |
| Data/video analytics | ∼10 ms | 100 kbps–10 Mbps | ✓ | - | [ |
| XR and Industry 4.0 | ∼20 ms | ∼50 Mbps | - | ✓ | [ |
| Caching in the edge | - | 20 Mbps | - | ✓ | [ |
| Smart vehicles | <=100 ms | ∼20 Mbps | ✓ | ✓ | [ |
Figure 6Kernel networking vs. Kernel bypassing.
Figure 7Local GPUs vs rCUDA architecture.
Figure 8Components of GSaaS [72].
Comparison of network solutions.
| Kernel socket | RDMA | DPDK | ||||
|---|---|---|---|---|---|---|
| Event mode latency (128 / 8192 bytes) (μs) | ∼20 | ∼53 | ∼15 | ∼23 | ∼17 | ∼28 |
| Poll mode latency (128 / 8192 bytes) (μs) | ∼16 | ∼37 | ∼5 | ∼15 | ∼5 | ∼15 |
| Hardware capabilities | Commodity | RDMA capable | Supported but not by all | |||
| GPU virtualization compatibility | Yes | Yes | ||||
| Physical network capability | Yes | Yes | Yes | |||
| Virtualized underlay network capability | Yes | Yes | Yes | |||
Capabilites of Smart NICs and FPGAs.
| SmartNIC | FPGA | |
|---|---|---|
| Stateless task offloading | Yes | Yes |
| Offloading general tasks | Yes | No |
Comparison of virtual technologies.
| Virtual Machines | Containers | Unikernels | |
|---|---|---|---|
| Startup time | High | Low | Low |
| Size | Large | Small | Small |
| Secure | Yes | No | Yes |
| Used for FaaS | No | Yes | Yes |
Security threats in automation IoT and their possible mitigation [83].
| Layer | Threat type | Mitigation |
|---|---|---|
| Physical | Tampering | tamper-resistant packaging |
| Denial of Service | spread-spectrum techniques | |
| Networking | Denial of Service | active firewalls, passive monitoring (probing), traffic admission control, bi-directional link authentication |
| Eavesdropping | encryption, authorization | |
| Data processing | Back door attack | properly configured firewalls on all system entry point |
| Social Engineering | educating employees to security awareness | |
| Exhaustion | traffic monitoring | |
| Malware | malware detection | |
| Application | Client app. | anti-virus filtering |
| Comm. channel | proper authentication, authorization, integrity verification | |
| Integrity | testing | |
| Modifications | validation | |
| Multi-user access | process planning and design | |
| Data access | Traceability |
Security challenges in 5G technologies [89].
| Security Threats | Target Point/Network Element | Effected Technology | Privacy | |||
|---|---|---|---|---|---|---|
| SDN | NFV | Channels | Cloud | |||
| DoS attack | Centralized control elements | ✓ | ✓ | ✓ | ||
| Hijacking attacks | SDN controller, hypervisor | ✓ | ✓ | |||
| Signaling storms | 5G core network elements | ✓ | ✓ | |||
| Resource (slice) theft | Hypervisor, shared cloud resources | ✓ | ✓ | |||
| Configuration attacks | SDN (virtual) switches, routers | ✓ | ✓ | |||
| Saturation attacks | SDN controller and switches | ✓ | ||||
| Penetration attacks | Virtual resources, clouds | ✓ | ✓ | |||
| User identity theft | User information data bases | ✓ | ✓ | |||
| TCP level attack | SDN controller-switch communication | ✓ | ✓ | |||
| Man-in-the-middle attack | SDN controller-communication | ✓ | ✓ | ✓ | ||
| Reset and IP spoofing | Control channels | ✓ | ||||
| Scanning attacks | Open air interfaces | ✓ | ✓ | |||
| Security keys exposure | Unencrypted channels | ✓ | ||||
| Semantic information attacks | Subscriber location | ✓ | ✓ | |||
| Timing attacks | Subscriber location | ✓ | ✓ | |||
| Boundary attacks | Subscriber location | ✓ | ||||
| IMSI catching attacks | Subscriber identity | ✓ | ✓ | |||
Figure 9Security concerns (left) and solutions (right) in 5G-based IoT networks.
Figure 10Decision support on considering the use of blockchains in the given IIoT scenario.
Some advantages and drawbacks of blockchain usage when compared to traditional data handling.
| Area to Consider | Advantage | Drawback |
|---|---|---|
| Ledgers | Ledgers as distributed and trusted databases | Mixed usage of private and public blockchains |
| are not clearly solved in practice | ||
| Transaction speed | Accelerated transactions when compared | Number of transactions |
| to industrial bulk commissioning | are still less than 100 per second | |
| Transaction as event logging | Possibility of micropayments | Limitations for resource constrained devices |
| Security | Advanced, inherited security | Security vulnerabilities, such as |
| Trust | 51% attack | |
| Data Privacy | race attack, finney attack, | |
| Confidentiality, Integrity, Availability | bugs in Smart Contracts are not patchable | |
| Leaving out third parties | Anonymity | Legal issues |
| Cost reductions by removing middlemen | are not easy to solve |
Deep Learning application examples of FCAPS Management tasks in the mobile telecommunications domain [120].
| Management Area | Prediction | Anomaly Detection | Clustering or Classification |
|---|---|---|---|
|
| Fault Prediction; | Fault Detection; | Alarm Correlation |
| Automated Mitigation | Root Cause Analysis | ||
|
| Resource Optimization | Configuration | Realizing similarities |
| (SDN, Base Station power adj., | pattern | or differences | |
| Cloud resource allocation) | recognition | in node configs | |
|
| Churn prediction; | Misuse or Fraud | Traffic characterization; |
| Service utilization prediction | Usage profiling | ||
|
| Utilization prediction | Detecting under- or | Resource Planning |
| (feeding Config. mgmt.) | over-utilization of segments | QoS and QoE correlation | |
|
| Intrusion Prevention | Detection of suspicious activities | Intrusion Detection |
| DDoS Detection |
AI technologies in various layers of 5G systems.
| Area | Use Case | Related Work |
|---|---|---|
| Service management | operations support systems | [ |
| resource provisioning | [ | |
| fault localization, failure root cause analysis | [ | |
| security | [ | |
| Network and cloud resource management | flexible function deployment | [ |
| network elasticity | [ | |
| Radio management | radio channel | [ |
| user mobility | [ | |
| air interface coordination | [ |