{"title":"Digital twins and multi-access edge computing for IIoT","authors":"Andreas P. Plageras, Konstantinos E. Psannis","doi":"10.1016/j.vrih.2022.07.005","DOIUrl":null,"url":null,"abstract":"<div><h3>Background</h3><p>All recent technological findings can be collectively used to strengthen the industrial Internet of things (IIoT) sector. The novel technology of multi-access edge computing or mobile edge computing (MEC) and digital twins have advanced rapidly in the industry. MEC is the middle layer between mobile devices and the cloud, and it provides scalability, reliability, security, efficient control, and storage of resources. Digital twins form a communication model that enhances the entire system by improving latency, overhead, and energy consumption.</p></div><div><h3>Methods</h3><p>The main focus in this study is the biggest challenges that researchers in the field of IIoT have to overcome to obtain a more efficient communication environment in terms of technology integration, efficient energy and data delivery, storage spaces, security, and real-time control and analysis. Thus, a distributed system is established in a local network, in which several functions operate. In addition, an MEC-based framework is proposed to reduce traffic and latency by merging the processing of data generated by IIoT devices at the edge of the network. The critical parts of the proposed IIoT system are evaluated by using emulation software.</p></div><div><h3>Results</h3><p>The results show that data delivery and offloading are performed more efficiently, energy consumption and processing are improved, and security, complexity, control, and reliability are enhanced.</p></div><div><h3>Conclusions</h3><p>The proposed framework and application provide authentication and integrity to end users and IoT devices.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"4 6","pages":"Pages 521-534"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579622000663/pdf?md5=235db91e4789f7379fba3ed9c4a28582&pid=1-s2.0-S2096579622000663-main.pdf","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Virtual Reality Intelligent Hardware","FirstCategoryId":"1093","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2096579622000663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 3
Abstract
Background
All recent technological findings can be collectively used to strengthen the industrial Internet of things (IIoT) sector. The novel technology of multi-access edge computing or mobile edge computing (MEC) and digital twins have advanced rapidly in the industry. MEC is the middle layer between mobile devices and the cloud, and it provides scalability, reliability, security, efficient control, and storage of resources. Digital twins form a communication model that enhances the entire system by improving latency, overhead, and energy consumption.
Methods
The main focus in this study is the biggest challenges that researchers in the field of IIoT have to overcome to obtain a more efficient communication environment in terms of technology integration, efficient energy and data delivery, storage spaces, security, and real-time control and analysis. Thus, a distributed system is established in a local network, in which several functions operate. In addition, an MEC-based framework is proposed to reduce traffic and latency by merging the processing of data generated by IIoT devices at the edge of the network. The critical parts of the proposed IIoT system are evaluated by using emulation software.
Results
The results show that data delivery and offloading are performed more efficiently, energy consumption and processing are improved, and security, complexity, control, and reliability are enhanced.
Conclusions
The proposed framework and application provide authentication and integrity to end users and IoT devices.