2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference O 2018
DOI: 10.1109/cscloud/edgecom.2018.00018
|View full text |Cite
|
Sign up to set email alerts
|

MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(23 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…By combining with machine intelligence, such a framework could act as an enabling protocol for automation efforts in onsite and factory offsite operations alike. For example, [51] discusses the utilization of the MTComm standard with semantic ontology for the communication of manufacturing operations via Internet technology. Their study Table 2.…”
Section: Industrial Connectivitymentioning
confidence: 99%
“…By combining with machine intelligence, such a framework could act as an enabling protocol for automation efforts in onsite and factory offsite operations alike. For example, [51] discusses the utilization of the MTComm standard with semantic ontology for the communication of manufacturing operations via Internet technology. Their study Table 2.…”
Section: Industrial Connectivitymentioning
confidence: 99%
“…in a production system allowing advanced simulations of a complete manufacturing system and the units involved in an autonomous system [15]. Typically, then the digital twin part is represented and executed on cloud resources [16]. Fig.…”
Section: Digital Twin Concept Related Work and Definitionsmentioning
confidence: 99%
“…The attacker has no other option to intercept any synchronization information. According to (15) and (16), at each clock cycle, one delta message is sent from the digital twin towards the physical twin and a replay delta message is sent in return. An adversary has two options to intercept the first message, e u →u (t); Either he or she intercept it when it is sent from the digital twin the synchronization GW in the virtual domain or when it is forwarded from the synchronization to the GW in the factory domain (or physical twin in the second option).…”
Section: Security Analysismentioning
confidence: 99%
“…∑ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑃𝑎𝑐𝑘𝑒𝑡 𝑇𝑟𝑎𝑛𝑠𝑚𝑖𝑡𝑡𝑒𝑑 ∑ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑃𝑎𝑐𝑘𝑒𝑡 𝐺𝑒𝑛𝑒𝑟𝑎𝑡𝑒𝑑 (7) As initialized in equation ( 7) packet delivery ratio has been predicted. The proposed CLR-IIoTpresume that each tag has a long updating cycle.…”
Section: 𝑃𝑎𝑐𝑘𝑒𝑡 𝑑𝑒𝑙𝑖𝑣𝑒𝑟𝑦 𝑟𝑎𝑡𝑖𝑜 =mentioning
confidence: 99%