{"title":"Generation of OPC UA Companion Specification with Eclipse Modeling Framework","authors":"Sebastian Friedl, C. Arnim, A. Lechler, A. Verl","doi":"10.1109/WFCS47810.2020.9114448","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114448","url":null,"abstract":"Open Platform Communications Unified Architecture (OPC UA) is a relevant technology in the field of machine-to-machine communication that defines data transport protocols and standardizes information modeling. Instead of defining a generalized world model, domain-specific models enable interoperability. These domain-specific models can be developed and released as Companion Specifications. More than 40 Companion Specifications are currently in development or already released. In this paper the current approaches to generate an OPC UA information model or an OPC UA Companion Specification are analyzed. A new modeling tooling based on the Eclipse Modeling Framework (EMF) is presented. This tooling demonstrates the potential of a model-driven approach for the creation of the information model and the structured part of the descriptive text document of a Companion Specification.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128556708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Geng, Honglei Li, M. Kashef, Yongkang Liu, R. Candell, S. Bhattacharyya
{"title":"Integrating Field Measurements into a Model-Based Simulator for Industrial Communication Networks","authors":"Jing Geng, Honglei Li, M. Kashef, Yongkang Liu, R. Candell, S. Bhattacharyya","doi":"10.1109/WFCS47810.2020.9114530","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114530","url":null,"abstract":"Efficient and accurate simulation methods are of increasing importance in the design and evaluation of factory communication systems. Model-based simulation methods are based on formal models that govern the interactions between components and subsystems in the systems that are being simulated. The formal models facilitate systematic integration across the system, and enable powerful methods for analysis and optimization of system performance. However conventional simulation approaches utilize communication channel models that do not fully reflect the characteristics and diversity of industrial communication channels. To help bridge this gap, we develop in this paper new methods for channel model construction for link-layer simulation that systematically incorporate field measurements of wireless communication channels from industrial networks, and derive corresponding channel modeling library components. The generated library components capture channel characteristics in the form of lookup tables, which can be flexibly integrated into system-level simulators or co-simulation tools. We integrate our new table-generation methods into a model-based co-simulator that jointly simulates the interactions among process flows, physical layouts of workcells, and communication channels in factory systems that are integrated with wireless networks. Experimental results using our lookup-table-augmented co-simulator demonstrate the utility of the proposed methods for flexibly and accurately integrating realistic industrial network channel conditions into simulation processes.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Hörmann, C. Kastl, Hans-Peter Bernhard, P. Priller, A. Springer
{"title":"Lifetime Security Concept for Industrial Wireless Sensor Networks","authors":"L. Hörmann, C. Kastl, Hans-Peter Bernhard, P. Priller, A. Springer","doi":"10.1109/WFCS47810.2020.9114496","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114496","url":null,"abstract":"Secure wireless communication is essential for most industrial applications. The secure and reliable control of processes as well as the data integrity of measured values are key targets in these applications. The industrial Internet-of-Things (IIoT) tries to connect an increasing number of sensors wirelessly. The wireless sensors form wireless sensor networks (WSNs). However, wireless sensor nodes are exposed to various security threats ranging from physical modification on the device itself to remote attacks via the communication channel. It is important to secure the complete lifetime of the wireless sensor nodes and other system components. This includes the production phase, shipping, preparation phase and operational phase. This paper presents a lifetime security concept for a wireless sensor network applied in automotive test beds. In this application scenario, the wireless sensor nodes are used to capture various temperatures in an automotive unit under test. In order to indicate the current state of trustworthiness of the system, a trustworthiness indicator is implemented which is shown to the user. An evaluation of the impact of encrypted communication on power consumption shows that the increase is negligible, and can be expected to be provided by the wireless sensor node's power supply without reducing the node lifetime.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Ferrari, E. Sisinni, Abusayeed Saifullah, Raphael Machado, Alan Oliveira de Sá, M. Felser
{"title":"Work-in-Progress: Compromising Security of Real-time Ethernet Devices by means of Selective Queue Saturation Attack","authors":"P. Ferrari, E. Sisinni, Abusayeed Saifullah, Raphael Machado, Alan Oliveira de Sá, M. Felser","doi":"10.1109/WFCS47810.2020.9114505","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114505","url":null,"abstract":"The industrial control systems (ICS) are using Real-Time Ethernet (RTE) protocols for many years. Today, Ethernet based control systems are widely used in industries. The Time Sensitive Networking (TSN) initiative will definitely push their further diffusion. With the introduction of Industry 4.0, production machines and their components have been connected to the Internet. Currently adopted RTE protocols do not require authentication, and hence may exchange data also with potentially malicious partners. In this paper, a selective Denial of Service (DoS) attack is presented. The proposed Selective Queue Saturation Attack (SQSA) is aimed to jam the message queue of the RTE communication stack in selected devices. The SQSA minimizes the chances of being detected by keeping its requirements (in term generated traffic) as low as possible. The SQSA has been applied to a real scenario based on PROFINET. The results of the use case demonstrate: the feasibility of the proposed attack; the reduced footprint compared to known DoS attacks (more than one thousand times less); and the selectivity of the attack, which can disrupt the realtime behavior of even a single target node inside the RTE network.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional Qos Metric For Lorawan Applications In Challenging Industrial Environment","authors":"C. Cameron, W. Naeem, Kang Li","doi":"10.1109/WFCS47810.2020.9114401","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114401","url":null,"abstract":"Industry 4.0 applications rely upon timely and accurate data about plant and process within a production site. Whilst modern facilities tend to have this capability as a matter of course, older equipment may lack network connectivity. A lack of data-gathering capability represents a significant barrier-to-entry when undertaking any data-driven investigation or improvement programs. Wireless sensor networks (WSNs) can be used as a flexible and low-disruption technique to acquire data at the point of interest, however the data stream is often lossy when deployed in harsh conditions without costly adaptations to the environment.This paper introduces the F-QoS metric which is able to classify the quality of the data stream from a WSN (using only packet reception timestamps), at user-defined sampling rates with a constraint placed upon the maximum amount of missing data. The resulting classifications can be used in an offline fashion to select periods of high-quality data for modelling, or, in an online manner to assess the realtime performance of a WSN.The F-QoS metric is applied to a LoRaWAN network in a large commercial bakery with a low-disruption installation-the network links are strained by large metal obstructions and the endpoints are installed inside metal cabinets. Each node transmits on a 10s cycle, and the analysis shows that >70% of the data is suitable for sampling at a 30s rate. The results indicate that LoRaWAN is capable of data acquisition in an unadapted and challenging environment, with the recommendation that the raw sample rate should be triple the desired final sample rate.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Cena, S. Scanzio, L. Seno, A. Valenzano, C. Zunino
{"title":"Energy-Efficient Link Capacity Overprovisioning In Time Slotted Channel Hopping Networks","authors":"G. Cena, S. Scanzio, L. Seno, A. Valenzano, C. Zunino","doi":"10.1109/WFCS47810.2020.9114449","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114449","url":null,"abstract":"TSCH is emerging as a reliable access mechanism for wireless sensor networks that, thanks to time slotting, suits the needs of battery-powered devices deployed in industrial scenarios. To take into account the traffic needs of the different links in a mesh network and the related variability, in such a way to prevent instability and butter overruns, overprovisioning can be exploited. It consists in allocating more cells than strictly needed for communication between a node and its neighbors. Unfortunately, overprovisioning in TSCH leads to higher power consumption, because of idle listening. In this paper, two approaches for saving energy are proposed, which temporarily disable listening when no packets are available at the transmitter. Such mechanisms show good backward compatibility with existing TSCH devices, and may coexist with them.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work-in-Progress: Voting Framework for Distributed Real-Time Ethernet based Dependable Systems","authors":"H. D. Doran","doi":"10.1109/WFCS47810.2020.9114402","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114402","url":null,"abstract":"In many industrial sectors such as factory automation and process control sensor redundancy is required to ensure reliable and highly-available operation. Measured values from N-redundant sensors are typically subjected to some voting scheme to determine a value which is used in further processing. In this paper we present a voting framework which allows the sensors and the voting scheme to be configured at system-configuration time. The voting scheme is designed as a Real Time Ethernet profile. We describe the structure of the voting system and the design and verification of the framework. We argue the applicability of this subsystem based on a successful prototype implementation.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Hellmanns, Alexander Glavackij, Jonathan Falk, R. Hummen, Stephan Kehrer, Frank Dürr
{"title":"Scaling TSN Scheduling for Factory Automation Networks","authors":"David Hellmanns, Alexander Glavackij, Jonathan Falk, R. Hummen, Stephan Kehrer, Frank Dürr","doi":"10.1109/WFCS47810.2020.9114415","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114415","url":null,"abstract":"Industry 4.0 and the vision of smart factories drive the need for real-time communication. Time-Sensitive Networking (TSN) augments the IEEE Std 802.1Q with a family of mechanisms enabling real-time communication. One of the key mechanisms is the Time-Aware Shaper (TAS) implementing a TDMA scheme on a traffic class basis. With proper synchronization it can even be used to schedule individual frames or streams. With this capability, the network can guarantee communication deadlines, bounded latency, and bounded jitter. However, for these guarantees a system-wide schedule needs to be calculated, which is an NP-hard problem. Current approaches are mainly based on constraint programming and optimization problems, and, therefore do not scale well for larger topologies and number of streams. In this paper, our contribution is twofold: first, we propose a scheduling model for converged networks supporting different traffic types and, secondly, we introduce a novel procedure for schedule planning of isochronous traffic which exploits the hierarchical structure of factory networks. To this end, we split the network into sub-networks and use a two-stage approach based on a heuristic and tracing. Our evaluation shows that the new scheduling approach outperforms the reference scheduler by more than two orders of magnitude with regard to execution time.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Friederike Bruns, W. Nebel, Jörg Walter, Kim Grüttner
{"title":"Work-in-Progress: Modeling of real-time communication for industrial distributed automation systems","authors":"Friederike Bruns, W. Nebel, Jörg Walter, Kim Grüttner","doi":"10.1109/WFCS47810.2020.9114413","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114413","url":null,"abstract":"Real-time communication of distributed automation systems come with many challenges as there is no common time basis. Often a periodic execution of applications is considered which leads to time phenomena like drifts or jitter. Thus, this type of communication requires observance and enforcement of real-time properties to guarantee reliability of distributed systems. New industrial technologies like Time-Sensitive Networking (TSN) and the IEC 61499 standard provide support to conquer upcoming challenges. Therefore, we are using these jointly with contract-based design to propose a design methodology for verification of real-time communication in IEC 61499 systems. We implemented a simulation-based verification environment and performed postmortem trace-based verification against timing specifications. The evaluation confirms the possibility of integrating our proposed representation for non-local communication into IEC 61499 for analyzing time behavior of applications.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work-in-Progress: Layering Concerns for the Analysis of Credit-Based Shaping in IEEE 802.1 TSN","authors":"Hamid Hassani, P. Cuijpers, R. J. Bril","doi":"10.1109/WFCS47810.2020.9114408","DOIUrl":"https://doi.org/10.1109/WFCS47810.2020.9114408","url":null,"abstract":"Flow control is of particular importance in TimeSensitive Networking (TSN), where timeliness of messages is guaranteed through several types of traffic shaping. This has given rise to a number of papers discussing the worst-case response time analysis of, in particular, the credit-based traffic shaping approach. In this work-in-progress paper, we concern ourselves with the possibility that traffic shaping can be applied in different layers of the protocol stack, e.g., the physical layer and link layer, which may give rise to different credit behaviors. We convey our concern that the analysis performed in literature seems to assume application of traffic shaping in the physical layer, and that the analysis therefore cannot be readily used in a context where shaping is applied in a higher layer. In particular, assuming application of credit-based shaping in the link layer, there are different interpretations possible for credit behavior. Depending on the interpretation, some of the basic properties of credit, that are crucial for the analysis, may no longer be valid after overhead is added by the physical layer. As an ongoing effort, we plan to revisit the eligible interval analysis of [1] with an adaptation for a link layer interpretation of the standard concerning application of traffic shaping.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}