Convergence of Manufacturing and Networking in Future Factories
Authors:
Ilaria Malanchini,
Nicola Michailow,
Patrick Agostini,
Janne Ali-Tolppa,
David Hock,
Martin Kasparick,
Alessandro Lieto,
Nikolaj Marchenko,
Alberto Martinez Alba,
Rastin Pries,
Qiuheng Zhou
Abstract:
The roll out of 5G has been mainly characterized by its distinct support for vertical industries, especially manufacturing. Leveraging synergies among these two worlds, namely production facilities and network systems, is a fundamental aspect to enable flexibility and economic viability in future factories. This work highlights the potential for intelligent networking and advanced machine learning…
▽ More
The roll out of 5G has been mainly characterized by its distinct support for vertical industries, especially manufacturing. Leveraging synergies among these two worlds, namely production facilities and network systems, is a fundamental aspect to enable flexibility and economic viability in future factories. This work highlights the potential for intelligent networking and advanced machine learning-based solutions in 5G-and-beyond systems in the context of Industry 4.0 and flexible manufacturing. The intersection thereof allows to create versatile machines and dynamic communication networks that can adapt to changes in the manufacturing process, factory layout and communication environment, supporting real-time interaction between humans, machines, and systems. We present a vision and corresponding framework by introducing the network-aware and production-aware principles, outlining results achieved in this context and summarizing them into three key use cases. Finally, we discuss a selection of remaining open challenges in private networks as well as give an outlook on future 6G research directions.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
Robust Consensus-Based Network Intrusion Detection in Presence of Byzantine Attacks
Authors:
Michel Toulouse,
Hai Le,
Cao Vien Phung,
Denis Hock
Abstract:
Consensus algorithms provide strategies to solve problems in a distributed system with the added constraint that data can only be shared between adjacent computing nodes. We find these algorithms in applications for wireless and sensor networks, spectrum sensing for cognitive radio, even for some IoT services. However, consensus-based applications are not resilient to compromised nodes sending fal…
▽ More
Consensus algorithms provide strategies to solve problems in a distributed system with the added constraint that data can only be shared between adjacent computing nodes. We find these algorithms in applications for wireless and sensor networks, spectrum sensing for cognitive radio, even for some IoT services. However, consensus-based applications are not resilient to compromised nodes sending falsified data to their neighbors, i.e. they can be the target of Byzantine attacks. Several solutions have been proposed in the literature inspired from reputation based systems, outlier detection or model-based fault detection techniques in process control. We have reviewed some of these solutions, and propose two mitigation techniques to protect the consensus-based Network Intrusion Detection System in \cite{toulouse2015consensus}. We analyze several implementation issues such as computational overhead, fine tuning of the solution parameters, impacts on the convergence of the consensus phase, accuracy of the intrusion detection system.
△ Less
Submitted 13 November, 2016;
originally announced November 2016.