2023
DOI: 10.1016/j.heliyon.2023.e12868
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of architectures implemented for IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 86 publications
0
6
0
Order By: Relevance
“…The solutions for fog computing from the specialized literature that are analyzed in different review or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] specify that either they are presented at an abstract level or they are solutions for specific applications. An essential advantage of the proposed solution, which distinguishes it from the solutions presented in the specialized literature, is customizability, because it allows the instantiation of objects and their interconnection to implement specific solutions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The solutions for fog computing from the specialized literature that are analyzed in different review or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] specify that either they are presented at an abstract level or they are solutions for specific applications. An essential advantage of the proposed solution, which distinguishes it from the solutions presented in the specialized literature, is customizability, because it allows the instantiation of objects and their interconnection to implement specific solutions.…”
Section: Discussionmentioning
confidence: 99%
“…The main solutions for fog computing from the specialized literature that are analyzed in different reviews or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] present the high-level parts of the fog nodes, such as security, the task scheduling, or resource scheduling when resources are limited; these papers are not focused on how data are processed within fog computing.…”
Section: Related Workmentioning
confidence: 99%
“…The devices connected to IoT systems are potentially risky in the absence of security elements or algorithms ( Ibrahim and Gebali, 2022 ), reason why the devices performing edge gateway functions have improved designs with the use of application-specific integrated circuits (ASICs), just as security chips are essential in the implementation of Industrial IoT (IIoT) ( Oñate and Sanz, 2023 ) and Ag-IoT systems. Wide evolution and adaptability of ML algorithms lead to their employ in optimizing gateway equipment tasks (ML-Optimized Gateways), making the performance of these tasks efficient even with resource limitations.…”
Section: Emerging Technologies Of Precision Crop Protection In Line W...mentioning
confidence: 99%
“…Likewise, the industrial internet of things (IIOT), presents autonomous work systems operating in real time with diverse architectures and communication protocols that handle large amounts of data with computer security alternatives that allow offering cloud services and that present an alternative for the management of bibliographic resources [22], [23]. In addition, with the current technological advances, it is possible to talk about intelligent power plants that implement automatic learning algorithms with data science to improve the management of machinery and information [24], [25].…”
Section: Introductionmentioning
confidence: 99%