Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 119
Filtrar
Más filtros

Banco de datos
Tipo del documento
Intervalo de año de publicación
1.
Sensors (Basel) ; 24(8)2024 Apr 18.
Artículo en Inglés | MEDLINE | ID: mdl-38676204

RESUMEN

The aim of this paper is to discuss the usability of vibrations as energy sources, for the implementation of energy self-sufficient wireless sensing platforms within the Industrial Internet of Things (IIoT) framework. In this context, this paper proposes to equip vibrating assets like machinery with piezoelectric sensors, used to set up energy self-sufficient sensing platforms for hard-to-reach positions. Preliminary measurements as well as extended laboratory tests are proposed to understand the behavior of commercial piezoelectric sensors when employed as energy harvesters. First, a general architecture for a vibration-powered LoRaWAN-based sensor node is proposed. Final tests are then performed to identify an ideal trade-off between sensor sampling rates and energy availability. The target is to ensure continuous operation of the device while guaranteeing a charging trend of the storage component connected to the system. In this context, an Ultra-Low-Power Energy-Harvesting Integrated Circuit plays a crucial role by ensuring the correct regulation of the output with very high efficiency.

2.
Sensors (Basel) ; 24(4)2024 Feb 15.
Artículo en Inglés | MEDLINE | ID: mdl-38400400

RESUMEN

With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the IIoT assumes a vital role. It encompasses many devices such as sensing devices, application servers, users, and authentication servers within workshop settings. The security of the IIoT is a critical issue due to wireless networks' open and dynamic nature. Therefore, designing secure protocols among those devices is an essential aspect of IIoT security functionality and poses a significant challenge to the IIoT systems. In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication. The protocol has been validated to demonstrate its comprehensive ability to overcome various vulnerabilities and prevent malicious attacks. Finally, the performance evaluation confirms that the proposed protocol is more effective and efficient than the existing alternatives.

3.
Sensors (Basel) ; 24(7)2024 Mar 29.
Artículo en Inglés | MEDLINE | ID: mdl-38610421

RESUMEN

Classifying the flow subsequences of sensor networks is an effective way for fault detection in the Industrial Internet of Things (IIoT). Traditional fault detection algorithms identify exceptions by a single abnormal dataset and do not pay attention to the factors such as electromagnetic interference, network delay, sensor sample delay, and so on. This paper focuses on fault detection by continuous abnormal points. We proposed a fault detection algorithm within the module of sequence state generated by unsupervised learning (SSGBUL) and the module of integrated encoding sequence classification (IESC). Firstly, we built a network module based on unsupervised learning to encode the flow sequence of the different network cards in the IIoT gateway, and then combined the multiple code sequences into one integrated sequence. Next, we classified the integrated sequence by comparing the integrated sequence with the encoding fault type. The results obtained from the three IIoT datasets of a sewage treatment plant show that the accuracy of the SSGBUL-IESC algorithm exceeds 90% with subsequence length 10, which is significantly higher than the accuracies of the dynamic time warping (DTW) algorithm and the time series forest (TSF) algorithm. The proposed algorithm reaches the classification requirements for fault detection for the IIoT.

4.
Sensors (Basel) ; 24(11)2024 May 21.
Artículo en Inglés | MEDLINE | ID: mdl-38894057

RESUMEN

In this article, a novel cross-domain knowledge transfer method is implemented to optimize the tradeoff between energy consumption and information freshness for all pieces of equipment powered by heterogeneous energy sources within smart factory. Three distinct groups of use cases are considered, each utilizing a different energy source: grid power, green energy source, and mixed energy sources. Differing from mainstream algorithms that require consistency among groups, the proposed method enables knowledge transfer even across varying state and/or action spaces. With the advantage of multiple layers of knowledge extraction, a lightweight knowledge transfer is achieved without the need for neural networks. This facilitates broader applications in self-sustainable wireless networks. Simulation results reveal a notable improvement in the 'warm start' policy for each equipment, manifesting as a 51.32% increase in initial reward compared to a random policy approach.

5.
Sensors (Basel) ; 24(12)2024 Jun 20.
Artículo en Inglés | MEDLINE | ID: mdl-38931786

RESUMEN

The security of the Industrial Internet of Things (IIoT) is of vital importance, and the Network Intrusion Detection System (NIDS) plays an indispensable role in this. Although there is an increasing number of studies on the use of deep learning technology to achieve network intrusion detection, the limited local data of the device may lead to poor model performance because deep learning requires large-scale datasets for training. Some solutions propose to centralize the local datasets of devices for deep learning training, but this may involve user privacy issues. To address these challenges, this study proposes a novel federated learning (FL)-based approach aimed at improving the accuracy of network intrusion detection while ensuring data privacy protection. This research combines convolutional neural networks with attention mechanisms to develop a new deep learning intrusion detection model specifically designed for the IIoT. Additionally, variational autoencoders are incorporated to enhance data privacy protection. Furthermore, an FL framework enables multiple IIoT clients to jointly train a shared intrusion detection model without sharing their raw data. This strategy significantly improves the model's detection capability while effectively addressing data privacy and security issues. To validate the effectiveness of the proposed method, a series of experiments were conducted on a real-world Internet of Things (IoT) network intrusion dataset. The experimental results demonstrate that our model and FL approach significantly improve key performance metrics such as detection accuracy, precision, and false-positive rate (FPR) compared to traditional local training methods and existing models.

6.
Sensors (Basel) ; 24(2)2024 Jan 22.
Artículo en Inglés | MEDLINE | ID: mdl-38276403

RESUMEN

Nowadays, the Industry 4.0 concept and the Industrial Internet of Things (IIoT) are considered essential for the implementation of automated manufacturing processes across various industrial settings. In this regard, wireless sensor networks (WSN) are crucial due to their inherent mobility, easy deployment and maintenance, scalability, and low power consumption, among other benefits. In this context, the presented paper proposes an optimized and low-cost WSN based on ZigBee communication technology for the monitoring of a real manufacturing facility. The company designs and manufactures solar protection curtains and aims to integrate the deployed WSN into the Enterprise Resource Planning (ERP) system in order to optimize their production processes and enhance production efficiency and cost estimation capabilities. To achieve this, radio propagation measurements and 3D ray launching simulations were conducted to characterize the wireless channel behavior and facilitate the development of an optimized WSN system that can operate in the complex industrial environment presented and validated through on-site wireless channel measurements, as well as interference analysis. Then, a low-cost WSN was implemented and deployed to acquire real-time data from different machinery and workstations, which will be integrated into the ERP system. Multiple data streams have been collected and processed from the shop floor of the factory by means of the prototype wireless nodes implemented. This integration will enable the company to optimize its production processes, fabricate products more efficiently, and enhance its cost estimation capabilities. Moreover, the proposed system provides a scalable platform, enabling the integration of new sensors as well as information processing capabilities.

7.
Sensors (Basel) ; 24(5)2024 Feb 22.
Artículo en Inglés | MEDLINE | ID: mdl-38474941

RESUMEN

This study presents a theoretical framework for defining the performance level of wireless safety functions within industrial environments. While acknowledging the simplifications inherent in our approach-primarily based on packet loss rates as a measure of system performance-the study underscores the dynamic challenges posed by real-world warehouses. Through an in situ measurement study of a forklift truck safety system, we validate the proposed method and emphasize the need for a more nuanced examination of wireless communication in complex settings. The study advocates for an expanded theoretical framework that considers fluctuations in warehouse dynamics, accounting for their impact on packet loss rates and, consequently, the precision of performance-level assessments. Furthermore, the research highlights the complexity introduced by wireless system characteristics not addressed in the simplified model, urging future investigations to incorporate these factors for a comprehensive understanding of wireless safety systems. The absence of specific criteria for wireless systems within existing standards emphasizes the necessity for a specialized framework in addressing safety aspects unique to wireless applications.

8.
Entropy (Basel) ; 26(2)2024 Jan 30.
Artículo en Inglés | MEDLINE | ID: mdl-38392377

RESUMEN

Remote control over communication networks with bandwidth-constrained channels has attracted considerable recent attention because it holds the promise of enabling a large number of real-time applications, such as autonomous driving, smart grids, and the industrial internet of things (IIoT). However, due to the limited bandwidth, the sub-packets or even bits have to be transmitted successively, thereby experiencing non-negligible latency and inducing serious performance loss in remote control. To overcome this, we introduce an incremental coding method, in which the actuator acts in real time based on a partially received packet instead of waiting until the entire packet is decoded. On this basis, we applied incremental coding to a linear control system to obtain a remote-control scheme. Both its stability conditions and average linear-quadratic-Gaussian-(LQG) cost are presented. Then, we further investigated a multi-user remote-control method, with a particular focus on its applications in the demand response of smart grids over bandwidth-constrained communication networks. The utility loss due to the bandwidth constraint and communication latency are minimized by jointly optimizing the source coding and real-time demand response. The numerical results show that the incremental-coding-aided remote control performed well in both single-user and multi-user scenarios and outperformed the conventional zero-hold control scheme significantly under the LQG metric.

9.
Sensors (Basel) ; 23(16)2023 Aug 09.
Artículo en Inglés | MEDLINE | ID: mdl-37631576

RESUMEN

Existing fault prediction algorithms based on deep learning have achieved good prediction performance. These algorithms treat all features fairly and assume that the progression of the equipment faults is stationary throughout the entire lifecycle. In fact, each feature has a different contribution to the accuracy of fault prediction, and the progress of equipment faults is non-stationary. More specifically, capturing the time point at which a fault first appears is more important for improving the accuracy of fault prediction. Moreover, the progress of the different faults of equipment varies significantly. Therefore, taking feature differences and time information into consideration, we propose a Causal-Factors-Aware Attention Network, CaFANet, for equipment fault prediction in the Internet of Things. Experimental results and performance analysis confirm the superiority of the proposed algorithm over traditional machine learning methods with prediction accuracy improved by up to 15.3%.

10.
Sensors (Basel) ; 23(10)2023 May 22.
Artículo en Inglés | MEDLINE | ID: mdl-37430882

RESUMEN

With the promotion of Industry 4.0, which emphasizes interconnected and intelligent devices, several factories have introduced numerous terminal Internet of Things (IoT) devices to collect relevant data or monitor the health status of equipment. The collected data are transmitted back to the backend server through network transmission by the terminal IoT devices. However, as devices communicate with each other over a network, the entire transmission environment faces significant security issues. When an attacker connects to a factory network, they can easily steal the transmitted data and tamper with them or send false data to the backend server, causing abnormal data in the entire environment. This study focuses on investigating how to ensure that data transmission in a factory environment originates from legitimate devices and that related confidential data are encrypted and packaged. This paper proposes an authentication mechanism between terminal IoT devices and backend servers based on elliptic curve cryptography and trusted tokens with packet encryption using the TLS protocol. Before communication between terminal IoT devices and backend servers can occur, the authentication mechanism proposed in this paper must first be implemented to confirm the identity of the devices and, thus, the problem of attackers imitating terminal IoT devices transmitting false data is resolved. The packets communicated between devices are also encrypted, preventing attackers from knowing their content even if they steal the packets. The authentication mechanism proposed in this paper ensures the source and correctness of the data. In terms of security analysis, the proposed mechanism in this paper effectively withstands replay attacks, eavesdropping attacks, man-in-the-middle attacks, and simulated attacks. Additionally, the mechanism supports mutual authentication and forward secrecy. In the experimental results, the proposed mechanism demonstrates approximately 73% improvement in efficiency through the lightweight characteristics of elliptic curve cryptography. Moreover, in the analysis of time complexity, the proposed mechanism exhibits significant effectiveness.

11.
Sensors (Basel) ; 23(7)2023 Mar 28.
Artículo en Inglés | MEDLINE | ID: mdl-37050602

RESUMEN

Industrial production and manufacturing systems require automation, reliability, as well as low-latency intelligent control. Industrial Internet of Things (IIoT) is an emerging paradigm that enables precise, low latency, intelligent computing, supported by cutting-edge technology such as edge computing and machine learning. IIoT provides some of the essential building blocks to drive manufacturing systems to the next level of productivity, efficiency, and safety. Hardware failures and faults in IIoT are critical challenges to be faced. These anomalies can cause accidents and financial loss, affect productivity, and mobilize staff by producing false alarms. In this context, this article proposes a framework called Detection and Alert State for Industrial Internet of Things Faults (DASIF). The DASIF framework applies edge computing to execute highly precise and low latency machine learning models to detect industrial IoT faults and autonomously enforce an adaptive communication policy, triggering a state of alert in case of fault detection. The state of alert is a pre-stage countermeasure where the network increases communication reliability by using data replication combined with multiple-path communication. When the system is under alert, it can process a fine-grained inspection of the data for efficient decison-making. DASIF performance was obtained considering a simulation of the IIoT network and a real petrochemical dataset.

12.
Sensors (Basel) ; 23(18)2023 Sep 12.
Artículo en Inglés | MEDLINE | ID: mdl-37765883

RESUMEN

Industry 4.0 has significantly improved the industrial manufacturing scenario in recent years. The Industrial Internet of Things (IIoT) enables the creation of globally interconnected smart factories, where constituent elements seamlessly exchange information. Industry 5.0 has further complemented these achievements, as it focuses on a human-centric approach where humans become part of this network of things, leading to a robust human-machine interaction. In this distributed, dynamic, and highly interconnected environment, functional safety is essential for adequately protecting people and machinery. The increasing availability of wireless networks makes it possible to implement distributed and flexible functional safety systems. However, such networks are known for introducing unwanted delays that can lead to safety performance degradation due to their inherent uncertainty. In this context, the Time-Sensitive Networking (TSN) standards present an attractive prospect for enhancing and ensuring acceptable behaviors. The research presented in this paper deals with the introduction of TSN to implement functional safety protocols for wireless networks. Among the available solutions, we selected Wi-Fi since it is a widespread network, often considered and deployed for industrial applications. The introduction of a reference functional safety protocol is detailed, along with an analysis of how TSN can enhance its behavior by evaluating relevant performance indexes. The evaluation pertains to a standard case study of an industrial warehouse, tested through practical simulations. The results demonstrate that TSN provides notable advantages, but it requires meticulous coordination with the Wi-Fi MAC layer protocol to guarantee improved performance.

13.
Sensors (Basel) ; 23(24)2023 Dec 14.
Artículo en Inglés | MEDLINE | ID: mdl-38139675

RESUMEN

The use of the Internet of Things (IoT) technologies and principles in industrial environments is known as the Industrial Internet of Things (IIoT). The IIoT concept aims to integrate various industrial devices, sensors, and actuators for collection, storage, monitoring, and process automation. Due to the complexity of IIoT environments, there is no one-size-fits-all solution. The main challenges in developing an IIoT solution are represented by the diversity of sensors and devices, connectivity, edge/fog computing, and security. This paper proposes a distributed and customized IioT (Industrial Internet of Things) framework for the interaction of things from the industrial environment. This framework is distributed on the fog nodes of the IIoT architecture proposed, and it will have the possibility to interconnect local things (with low latency) or global things (with a latency generated by the Internet network). To demonstrate the functionality of the proposed framework, it is included in the fog nodes presented in other paper. These fog nodes allow the integration of CANOpen networks into an IioT architecture. The most important advantages of the proposed architecture are its customizability and the fact that it allows decision operations to be carried out at the edge of the network to eliminate latency due to the Internet.

14.
Sensors (Basel) ; 23(7)2023 Mar 28.
Artículo en Inglés | MEDLINE | ID: mdl-37050609

RESUMEN

With the convergence of information technology (IT) and operational technology (OT) in Industry 4.0, edge computing is increasingly relevant in the context of the Industrial Internet of Things (IIoT). While the use of simulation is already the state of the art in almost every engineering discipline, e.g., dynamic systems, plant engineering, and logistics, it is less common for edge computing. This work discusses different use cases concerning edge computing in IIoT that can profit from the use of OT simulation methods. In addition to enabling machine learning, the focus of this work is on the virtual commissioning of data stream processing systems. To evaluate the proposed approach, an exemplary application of the middleware layer, i.e., a multi-agent reinforcement learning system for intelligent edge resource allocation, is combined with a physical simulation model of an industrial plant. It confirms the feasibility of the proposed use of simulation for virtual commissioning of an industrial edge computing system using Hardware-in-the-Loop. In summary, edge computing in IIoT is highlighted as a new application area for existing simulation methods from the OT perspective. The benefits in IIoT are exemplified by various use cases for the logic or middleware layer using physical simulation of the target environment. The relevance for real-life IIoT systems is confirmed by an experimental evaluation, and limitations are pointed out.

15.
Sensors (Basel) ; 23(17)2023 Aug 28.
Artículo en Inglés | MEDLINE | ID: mdl-37687926

RESUMEN

The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.

16.
Sensors (Basel) ; 23(8)2023 Apr 12.
Artículo en Inglés | MEDLINE | ID: mdl-37112271

RESUMEN

The recent advancements in the Internet of Things have made it converge towards critical infrastructure automation, opening a new paradigm referred to as the Industrial Internet of Things (IIoT). In the IIoT, different connected devices can send huge amounts of data to other devices back and forth for a better decision-making process. In such use cases, the role of supervisory control and data acquisition (SCADA) has been studied by many researchers in recent years for robust supervisory control management. Nevertheless, for better sustainability of these applications, reliable data exchange is crucial in this domain. To ensure the privacy and integrity of the data shared between the connected devices, access control can be used as the front-line security mechanism for these systems. However, the role engineering and assignment propagation in access control is still a tedious process as its manually performed by network administrators. In this study, we explored the potential of supervised machine learning to automate role engineering for fine-grained access control in Industrial Internet of Things (IIoT) settings. We propose a mapping framework to employ a fine-tuned multilayer feedforward artificial neural network (ANN) and extreme learning machine (ELM) for role engineering in the SCADA-enabled IIoT environment to ensure privacy and user access rights to resources. For the application of machine learning, a thorough comparison between these two algorithms is also presented in terms of their effectiveness and performance. Extensive experiments demonstrated the significant performance of the proposed scheme, which is promising for future research to automate the role assignment in the IIoT domain.

17.
Sensors (Basel) ; 23(24)2023 Dec 12.
Artículo en Inglés | MEDLINE | ID: mdl-38139615

RESUMEN

Large-scale incorporation of new energy generation units based on renewable sources, such as wind and photovoltaic power, drastically alters the structure of the power system. Because of the intermittent nature of these sources, switching in grids (connection and disconnection) occurs much more frequently than with conventional sources. As a result, the power system will inevitably experience a large number of transients, which raises questions about the stability of the system and the quality of the electrical energy. Therefore, measuring various types of transients in power system is crucial for stability, power quality, fault analysis, protection design, and insulation design. Transient recorders that are currently used are generally expensive and only suitable for particular locations in power systems. The number of installed transient recorders is insufficient for a comprehensive analysis of problems that may occur. Hence, it is important to have inexpensive and efficient transient recorders that can be installed at multiple points in the power system on various types of objects. It is also essential to have a transient record database with open access, which can be used by researchers to develop new analysis techniques based on artificial intelligence. This paper proposes an inexpensive measurement and acquisition system designed to record transient phenomena on different objects within the power system. The system is designed to use autonomous power, a standardized data acquisition module, a low-budget system for transmitting recorded transient events to the server via mobile network, and a sensor system adapted to the object where transients are recorded. The proposed system is designed to be used for all types of objects in the power system where transients may occur, such as power lines, transmission towers, surge arresters, and transformers. All components of the system are described, and the system is tested under laboratory conditions. The modular nature of the system allows customization to the specifics of the location in power system by choosing appropriate components. The calibration method of the custom designed Rogowski coil is described. The cost analysis of the proposed system and power consumption analysis are performed. The results show that the system's performance meets application requirements at a low cost.

18.
Sensors (Basel) ; 23(2)2023 Jan 09.
Artículo en Inglés | MEDLINE | ID: mdl-36679565

RESUMEN

An intelligent transportation system (ITS) aims to improve traffic efficiency by integrating innovative sensing, control, and communications technologies. The industrial Internet of things (IIoT) and Industrial Revolution 4.0 recently merged to design the industrial Internet of things-intelligent transportation system (IIoT-ITS). IIoT sensing technologies play a significant role in acquiring raw data. The application continuously performs the complex task of managing traffic flows effectively based on several parameters, including the number of vehicles in the system, their location, and time. Traffic density estimation (TDE) is another important derived parameter desirable to keep track of the dynamic state of traffic volume. The expanding number of vehicles based on wireless connectivity provides new potential to predict traffic density more accurately and in real time as previously used methodologies. We explore the topic of assessing traffic density by using only a few simple metrics, such as the number of surrounding vehicles and disseminating beacons to roadside units and vice versa. This research paper investigates TDE techniques and presents a novel Markov model-based TDE technique for ITS. Finally, an OMNET++-based approach with an implementation of a significant modification of a traffic model combined with mathematical modeling of the Markov model is presented. It is intended for the study of real-world traffic traces, the identification of model parameters, and the development of simulated traffic.


Asunto(s)
Benchmarking , Internet de las Cosas , Industrias , Tecnología de la Información , Inteligencia
19.
Sensors (Basel) ; 23(7)2023 Mar 24.
Artículo en Inglés | MEDLINE | ID: mdl-37050501

RESUMEN

Visible light communication (VLC) is one of the key technologies for the sixth generation (6G) to support the connection and throughput of the Industrial Internet of Things (IIoT). Furthermore, VLC channel modeling is the foundation for designing efficient and robust VLC systems. In this paper, the ray-tracing simulation method is adopted to investigate the VLC channel in IIoT scenarios. The main contributions of this paper are divided into three aspects. Firstly, based on the simulated data, large-scale fading and multipath-related characteristics, including the channel impulse response (CIR), optical path loss (OPL), delay spread (DS), and angular spread (AS), are analyzed and modeled through the distance-dependent and statistical distribution models. The modeling results indicate that the channel characteristics under the single transmitter (TX) are proportional to the propagation distance. It is also found that the degree of time domain and spatial domain dispersion is higher than that in the typical rooms (conference room and corridor). Secondly, the density of surrounding objects and the effects of user heights on these channel characteristics are also investigated. Through the analysis, it can be observed that the denser objects can contribute to the smaller OPL and the larger RMS DS under the single TX case. Furthermore, due to the blocking effect of surrounding objects, the larger OPL and the smaller RMS DS can be observed at the receiver with a low height. Thirdly, due to the distance dependence of the channel characteristics and large time-domain dispersion, the link adaption method is further proposed to optimize the multipath interference problem. This method combines a luminary adaptive selection and delay adaption technique. Then, the performance of the link adaption method is verified from four aspects through simulation, including the signal-to-noise (SNR), the RMS DS, the CIRs, and the bit-error rate (BER) of a direct-current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) system. The verification results indicate that our proposed method has a significant optimization for multipath interference.

20.
Sensors (Basel) ; 23(20)2023 Oct 12.
Artículo en Inglés | MEDLINE | ID: mdl-37896522

RESUMEN

The technical capabilities of modern Industry 4.0 and Industry 5.0 are vast and growing exponentially daily. The present-day Industrial Internet of Things (IIoT) combines manifold underlying technologies that require real-time interconnection and communication among heterogeneous devices. Smart cities are established with sophisticated designs and control of seamless machine-to-machine (M2M) communication, to optimize resources, costs, performance, and energy distributions. All the sensory devices within a building interact to maintain a sustainable climate for residents and intuitively optimize the energy distribution to optimize energy production. However, this encompasses quite a few challenges for devices that lack a compatible and interoperable design. The conventional solutions are restricted to limited domains or rely on engineers designing and deploying translators for each pair of ontologies. This is a costly process in terms of engineering effort and computational resources. An issue persists that a new device with a different ontology must be integrated into an existing IoT network. We propose a self-learning model that can determine the taxonomy of devices given their ontological meta-data and structural information. The model finds matches between two distinct ontologies using a natural language processing (NLP) approach to learn linguistic contexts. Then, by visualizing the ontological network as a knowledge graph, it is possible to learn the structure of the meta-data and understand the device's message formulation. Finally, the model can align entities of ontological graphs that are similar in context and structure.Furthermore, the model performs dynamic M2M translation without requiring extra engineering or hardware resources.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA