Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice
Abstract
:1. Introduction
- Relevance: IIoT patterns are crucial for addressing security and privacy challenges, enhancing the adoption and implementation of IoT devices and services. Patterns encode solutions to common problems and facilitate secure and privacy-aware design in IoT environments [16].
- Complementarity: Patterns in software engineering, including those used in IIoT, promote reusability and interoperability among components, offering modular solutions that complement each other and enhance system functionality [17].
- Interoperability: Digital twins in IIoT systems enable significant interoperability and flexibility by facilitating the integration of diverse data sources and enhancing system responsiveness [18].
- Data Flow: The design of IIoT systems emphasizes robust data acquisition systems that support a wide range of data handling capabilities from collection to analytics, ensuring effective data flow throughout the system [19].
- System Functionality: IIoT design patterns significantly contribute to system architecture by enhancing connectivity and security, thereby supporting complex system functionalities and integration across varied industrial environments [20].
- Complexity: Patterns provide structured approaches to managing complexity in IIoT systems, from simple device communications to sophisticated analytics and fault tolerance mechanisms, making complex systems more manageable and efficient [21].
2. Related Work
2.1. Heterogeneous Systems
2.2. Pattern Languages and IIoT Systems
3. Pattern Language Development
3.1. Overview of Patterns
- Publish/Subscribe [39]: Ensuring that heterogeneous devices can communicate with each other and with the IIoT system.
- Device Gateway [40]: Connecting devices with various communication protocols using gateways to provide data exchange and functionalities inside an IIoT system.
- Data Acquisition [41]: Collecting data from heterogeneous devices and integrating it into the IIoT system.
- Edge Computing [42]: Addresses the need for efficient data processing and analytics in IIoT systems.
- Device Management [43]: Managing the lifecycle of heterogeneous devices, including device discovery, configuration, provisioning, and maintenance.
- Security (Authentication) [44]: Ensuring the security of IIoT systems and devices. Includes strategies for the authentication of data.
- Scalability [45]: Designing IIoT systems that can scale up or down based on changing demands.
- Modular Architecture [46]: Design the IIoT system as a collection of modular components that can be easily assembled and disassembled.
- Analytics [47]: Analyzing data collected from heterogeneous devices to extract insights and derive actionable information.
- Predictive Maintenance [48]: Using analytics techniques to predict when devices are likely to fail allows for proactive maintenance and replacement.
- Fault Tolerance [49]: Discusses the difficulty of creating IIoT systems that can function even if a device fails or the network is disrupted.
3.2. Importance of Pattern Interrelationships
4. Research Methodology
4.1. Case Study “State Company for Automotive Industrial (S.C.A.I.)”
4.2. Case Study Design
4.3. Areas of the S.C.A.I. Components and Defects
4.3.1. Main Components
- Manufacturing Unit: Represents the various production lines within the factory, such as trucks, buses, and saloon cars manufacturing units.
- Machinery: Includes all equipment used in production, from assembly robots to welding machines.
- Sensor: Devices that monitor machinery and environmental conditions.
- IIoT Device: A generalization for all IIoT-enabled devices, including sensors and smart machinery.
- Data Management System: Manages data collection, storage, and analysis.
- Security Protocol: Defines the security measures and protocols for protecting data and devices.
- Maintenance Schedule: Manages the maintenance activities for machinery and equipment.
4.3.2. Defect Areas and Points of Failure
- Manufacturing Unit: Defect areas include overcapacity, underutilization, or outdated production techniques. Points of failure might involve the lack of flexibility in switching between product types or delays in production due to equipment failure.
- Machinery: Critical points of failure include machinery that is prone to frequent breakdowns due to lack of maintenance or obsolete technology. Defect areas cannot be identified in machinery that has a high energy consumption or low efficiency.
- Sensor and IIoT Device: Key defect areas involve inaccurate readings due to poor calibration or sensors that are not adequately rugged for the factory environment. A significant point of failure is the lack of secure firmware updates, risking cyber-attacks.
- Data Management System: Defects include insufficient data storage capacity or poor data analysis capabilities leading to inadequate decision-making. A failure point is a system overload due to excessive data inflow.
- Security Protocol: A major defect area is the lack of robust security measures, leading to vulnerabilities in data integrity and device safety. Points of failure include weak authentication mechanisms and insufficient encryption.
- Maintenance Schedule: Defects in scheduling result in delayed maintenance, causing unplanned downtime. A critical failure point is the lack of predictive maintenance capabilities, leading to equipment failures.
4.4. Relationships and Associations
- ManufacturingUnit to Machinery: A composition relationship, as each ManufacturingUnit contains multiple pieces of Machinery. This represents that if a ManufacturingUnit ceases to exist, its associated Machinery would no longer be relevant.
- Machinery to Sensor: An aggregation relationship, indicating that Machinery can have multiple Sensors attached to it, but these Sensors can exist independently of the Machinery.
- IIoTDevice to Sensor and Machinery: A generalization relationship, where IIoTDevice is a parent class and both Sensor and Machinery are child classes that inherit from IIoTDevice. This denotes that both Sensors and Machinery can be considered IIoTDevices with additional functionalities.
- DataManagementSystem to IIoTDevice: A direct association, indicating that the DataManagementSystem collects and processes data from multiple IIoTDevices. This relationship signifies data flow from IIoTDevices to the DataManagementSystem.
- SecurityProtocol to IIoTDevice and DataManagementSystem: A dependency relationship, as both IIoTDevices and the DataManagementSystem rely on SecurityProtocol for secure operation. This relationship highlights the importance of security measures for the integrity and safety of the system.
- MaintenanceSchedule to Machinery: Another direct association, where the MaintenanceSchedule manages maintenance activities for Machinery. This indicates that each piece of Machinery has a corresponding set of maintenance schedules.
4.5. Challenges
- Heterogeneity of Devices: The factory utilizes a wide range of machines and sensors from different manufacturers, each with its own set of protocols and interfaces. This diversity complicates the integration of a cohesive IIoT system [53]. For example, integration efforts can consume up to 30% of the total project time due to incompatibility issues between devices. In a typical IIoT project costing USD 500,000, this translates to an additional USD 150,000 in expenses solely for integration efforts.
- Data Management and Analysis: Capturing, processing, and analyzing data from numerous sources in real-time demand robust and scalable data management solutions [54]. For instance, an automotive manufacturing plant generates approximately 2 terabytes of data daily from various sensors and machines. Without efficient data management, up to 20% of this data could be lost or go unanalyzed, leading to missed insights and potential operational inefficiencies. This data loss could equate to a financial impact of USD 200,000 annually due to suboptimal decision-making.
- Security and Authentication: Ensuring the security of IIoT devices and safeguarding sensitive data from cyber threats is paramount [55]. A single cyberattack can result in downtime costing up to USD 100,000 per hour in a manufacturing setting. In 2020, the average cost of a data breach was USD 3.86 million, which underscores the importance of robust authentication mechanisms to prevent unauthorized access and protect sensitive data.
- Scalability: As the factory expands its IIoT infrastructure, the system must be scalable to accommodate new devices and technologies without compromising performance [56]. A lack of scalability can lead to performance bottlenecks, where system efficiency drops by 15–20% as new devices are added. This inefficiency can cause production delays, potentially costing the factory USD 50,000 daily in lost productivity during peak scaling periods.
- Interoperability: Ensuring seamless communication and interoperability between diverse systems and technologies is critical for achieving operational efficiency and flexibility [57]. For example, a project has a budget of USD 1 million but faces significant delays due to interoperability issues. These delays could extend project timelines by 6 to 12 months. As a result, there can be cost overruns of up to USD 400,000, which will have a significant impact on the project’s return on investment.
4.6. Solutions
- Device Gateway Pattern: Acts as an intermediary that simplifies communication between heterogeneous devices and the IIoT platform. It can translate different protocols and manage connections efficiently [62].
- Data Acquisition and Edge Computing: By processing data at the edge, closer to where it is generated, S.C.A.I. can reduce latency, decrease bandwidth usage, and improve response times. Edge computing devices can pre-process data before sending it to the cloud for further analysis [63].
- Scalability with Modular Architecture: Adopting a modular architecture for the IIoT system allows for easier scalability. This approach enables the factory to add, remove, or upgrade modules without disrupting the entire system [64].
- Security with Authentication: Implementing robust authentication protocols and encryption standards ensures secure communication between devices and protects against unauthorized access [65].
- Predictive Maintenance with Analytics: Utilizing advanced analytics and machine learning algorithms for predictive maintenance can significantly reduce downtime and maintenance costs by forecasting equipment failures before they occur [66].
4.7. Developing a Comprehensive UML Conceptual Diagram for IIoT Solutions to Overcome the Challenges in S.C.A.I.
4.7.1. Components and Patterns
- Device Gateway:Role: Facilitates communication between heterogeneous devices and the central IIoT system.Components: GatewayController, DeviceAdapter, ProtocolTranslator.Relationships: Connects directly to IIoTDevices (Sensor, Machinery) and interfaces with the DataManagementSystem. Use aggregation between GatewayController and DeviceAdapter to indicate that multiple adapters can be managed by a single controller.
- Data Acquisition and Edge Computing:Role: Processes data at the source to reduce latency and bandwidth usage.Components: EdgeDevice (inherits IIoTDevices), DataProcessor, LocalStorage.Relationships: EdgeDevice connects to Sensors and Machinery, sending processed data to the DataManagementSystem. Composition between EdgeDevice and DataProcessor to represent that each EdgeDevice contains a DataProcessor.
- Modular Architecture:Role: Ensures system scalability and flexibility.Components: CoreSystem, ModularComponent.Relationships: Use a plug-in relationship between CoreSystem and ModularComponent to represent the dynamic addition/removal of modules.
- Security—Authentication:Role: Protects data and devices from unauthorized access.Components: AuthServer, SecurityProtocol (updated to include AuthenticationMechanism).Relationships: Dependency from IIoTDevices and DataManagementSystem on AuthServer to signify the need for authentication before access.
- Scalability:Role: Allows the system to handle growth in data and devices.Components: ScalableDatabase, LoadBalancer.Relationships: ScalableDatabase is connected to DataManagementSystem, indicating data storage solutions that can expand. LoadBalancer shows association with GatewayController to manage incoming device connections.
- Analytics and Predictive Maintenance:Role: Uses data analysis for forecasting and decision-making.Components: AnalyticsEngine, MaintenancePredictor.Relationships: AnalyticsEngine connects to DataManagementSystem for data analysis. MaintenancePredictor uses data from AnalyticsEngine to schedule maintenance (MaintenanceSchedule).
- Fault Tolerance:Role: Ensures system reliability and continuous operation.Components: RedundantSystem, HealthMonitor.Relationships: RedundantSystem mirrors critical components like DataManagementSystem and EdgeDevice. HealthMonitor is associated with all IIoTDevices and critical system components to monitor system health.
4.7.2. Integration with Pre-Solution State
5. Validation of the Pattern Language Using the Delphi Process Theory
5.1. Implementation of Delphi Process
- Expert Selection: A panel of experts in IIoT, industrial systems design, and pattern language development was assembled. These experts were selected based on their knowledge, experience, and contribution to the fields relevant to the project. The study limited the number of experts to nine due to communication limitations, access to information, scheduling problems, confidentiality issues, and time constraints. The Delphi approach is enhanced by the idea of comparison with a single participant; “n + 1” participants achieve more effective results [67]. Data analysis involves using computer-based qualitative analysis programs or manual analysis. According to John W. Creswell [68], analyzing qualitative data from a few pages can be performed manually instead of utilizing computer programs. Therefore, we manually analyzed the qualitative data obtained from nine interviewees to determine their perception of the study model’s suitability. Table 4 shows the summary of interviewees’ profiles.
- First Round: The initial questionnaire was distributed to the experts, detailing the pattern language and its application in the S.C.A.I. case study. Experts were asked to evaluate the adequacy, relevance, and potential effectiveness of each pattern in addressing the identified challenges.
- Feedback Compilation: Responses were collected and summarized to identify common agreements and disagreements. Key points of contention or uncertainty were highlighted for further exploration.
- Second Round: The summary and specific feedback from the first round were sent back to the experts, along with additional questions that aimed to delve deeper into the issues raised. Experts were encouraged to reconsider their initial assessments and provide further insights based on the collective feedback.
- Final Analysis: The responses from the second round were analyzed to assess the consensus among the experts. Adjustments to the pattern language were proposed based on areas where significant agreement or insightful suggestions were noted.
5.2. Results of the Delphi Process
5.2.1. System Validation
- Interaction of Patterns: Shows how the device gateway, publish/subscribe, and edge computing patterns interconnect and facilitate seamless communication and data processing across the system.
- Security Integration: Highlights the implementation of the security pattern across various layers of the IIoT system, ensuring data protection and secure device interaction.
- Scalability and Modularity: Demonstrates how the system can be scaled and modified by adding or removing components within the modular architecture without disrupting operations.
5.2.2. Results and Discussion
- ▪
- Enhanced System Interoperability
- ▪
- Improved Operational Efficiency
- ▪
- Robust System Security
- ▪
- Scalable and Flexible System Architecture
- ▪
- Comprehensive System Validation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jain, S.; Chandrasekaran, K. Industrial Automation Using Internet of Things. In Advances in Information Security, Privacy, and Ethics; IGI Global: Hershey, PA, USA, 2020; pp. 28–64. [Google Scholar] [CrossRef]
- Peeples, M.M.; Iyer, A.K.; Cohen, J.L. Integration of a Mobile-Integrated Therapy with Electronic Health Records: Lessons Learned. J. Diabetes Sci. Technol. 2013, 7, 602–611. [Google Scholar] [CrossRef]
- Lytra, L.; Sobernig, S.; Tran, H.; Zdun, U. A pattern language for service-based platform integration and adaptation. In Proceedings of the EuroPLoP 201217th European Conference on Pattern Languages of Programs; Irsee, Germany, 11–15 July 2012, ACM: New York, NY, USA, 2012. [Google Scholar] [CrossRef]
- Yi, K.J.; Jeong, Y.-S. Smart factory: Security issues, challenges, and solutions. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 4625–4638. [Google Scholar] [CrossRef]
- Sen, S.; Song, L. An IIoT-Based Networked Industrial Control System Architecture to Secure Industrial Applications. In Proceedings of the 2021 IEEE Industrial Electronics and Applications Conference (IEACon), Penang, Malaysia, 22–23 November 2021; pp. 280–285. [Google Scholar] [CrossRef]
- Rouhi, A.; Zamani, B. Towards a formal model of patterns and pattern languages. Inf. Softw. Technol. 2016, 79, 1–16. [Google Scholar] [CrossRef]
- Noaman, M.; Khan, M.S.; Abrar, M.F.; Ali, S.; Alvi, A.; Saleem, M.A. Challenges in Integration of Heterogeneous Internet of Things. Sci. Program. 2022, 2022, 8626882. [Google Scholar] [CrossRef]
- Price, J. Christopher Alexander’s pattern language. IEEE Trans. Prof. Commun. 1999, 42, 117–122. [Google Scholar] [CrossRef]
- Wiles, J.; Watson, J. Patterns in Complex Systems Modeling. In Intelligent Data Engineering and Automated Learning—IDEAL 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 532–539. [Google Scholar] [CrossRef]
- Hegedűs, P.; Bán, D.; Ferenc, R.; Gyimóthy, T. Myth or Reality? Analyzing the Effect of Design Patterns on Software Maintainability. In Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany, 2012; pp. 138–145. [Google Scholar] [CrossRef]
- Huston, B. The effects of design pattern application on metric scores. J. Syst. Softw. 2001, 58, 261–269. [Google Scholar] [CrossRef]
- Bayley, I.; Zhu, H. Formal specification of the variants and behavioural features of design patterns. J. Syst. Softw. 2010, 83, 209–221. [Google Scholar] [CrossRef]
- Liu, Y.; Lu, Q.; Yu, G.; Paik, H.-Y.; Zhu, L. A Pattern-Oriented Reference Architecture for Governance-Driven Blockchain Systems. In Proceedings of the 2023 IEEE 20th International Conference on Software Architecture (ICSA), L’Aquila, Italy, 13–17 March 2023. [Google Scholar]
- Rouhi, A.; Zamani, B. A model-based framework for automatic generation of a pattern language verifier. Softw. Pract. Exp. 2017, 47, 1945–1980. [Google Scholar] [CrossRef]
- Schmidt, D.C.; Cleeland, C. Applying patterns to develop extensible ORB middleware. IEEE Commun. Mag. 1999, 37, 54–63. [Google Scholar] [CrossRef]
- Papoutsakis, M.; Fysarakis, K.; Spanoudakis, G.; Ioannidis, S.; Koloutsou, K. Towards a Collection of Security and Privacy Patterns. Appl. Sci. 2021, 11, 1396. [Google Scholar] [CrossRef]
- Zhang, C.; Budgen, D. What Do We Know about the Effectiveness of Software Design Patterns? IEEE Trans. Softw. Eng. 2012, 38, 1213–1231. [Google Scholar] [CrossRef]
- Malakuti, S.; Grüner, S. Architectural aspects of digital twins in IIoT systems. In Proceedings of the ECSA ’18: 12th European Conference on Software Architecture: Companion Proceedings, Madrid, Spain, 24–28 September 2018; ACM: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Zhou, J.; He, P. Research on Data Acquistion System of Flow Workshop Based on IIoT. In Proceedings of the 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), Chongqing, China, 28–30 November 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar] [CrossRef]
- Pivoto, D.G.S.; de Almeida, L.F.F.; da Rosa Righi, R.; Rodrigues, J.J.P.C.; Lugli, A.B.; Alberti, A.M. Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review. J. Manuf. Syst. 2021, 58, 176–192. [Google Scholar] [CrossRef]
- Dobaj, J.; Schuss, M.; Krisper, M.; Boano, C.A.; Macher, G. Dependable mesh networking patterns. In Proceedings of the EuroPLoP ’19: 24th European Conference on Pattern Languages of Programs, Irsee, Germany, 3–7 July 2019; ACM: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
- Song, S.; Gao, Y.; Wang, C.; Zhu, X.; Wang, J.; Philip, S.Y. Matching Heterogeneous Events with Patterns. IEEE Trans. Knowl. Data Eng. 2017, 29, 1695–1708. [Google Scholar] [CrossRef]
- Kacem, M.H.; Tounsi, I.; Khalfi, N. Modeling and Specification of Bootstrapping and Registration Design Patterns for IoT Applications. In The Impact of Digital Technologies on Public Health in Developed and Developing Countries; Springer International Publishing: Cham, Switzerland, 2020; pp. 55–66. [Google Scholar] [CrossRef]
- Jin, H. Integration Mechanism of Heterogeneous Foreign Language Education Resources Based on Time Series Analysis in IIoT. Mob. Inf. Syst. 2022, 2022, 5309556. [Google Scholar] [CrossRef]
- Xiong, H.; Wu, Y.; Jin, C.; Kumari, S. Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 2020, 7, 11713–11724. [Google Scholar] [CrossRef]
- Petroulakis, N.E.; Lakka, E.; Sakic, E.; Kulkarni, V.; Fysarakis, K.; Somarakis, I.; Serra, J.; Sanabria-Russo, L.; Pau, D.; Falchetto, M.; et al. SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; IEEE: Piscataway, NJ, USA, 2019. [Google Scholar] [CrossRef]
- Wang, J.; Jiang, C.; Zhang, K.; Hou, X.; Ren, Y.; Qian, Y. Distributed Q-Learning Aided Heterogeneous Network Association for Energy-Efficient IIoT. IEEE Trans. Ind. Inform. 2020, 16, 2756–2764. [Google Scholar] [CrossRef]
- Sengupta, S.; Chen, Y. Spectral clustering in heterogeneous networks. Stat. Sin. 2015, 25, 1081–1106. [Google Scholar] [CrossRef]
- Narayanan, R.; Murthy, C.S.R. A Probabilistic Framework for Protocol Conversions in IIoT Networks with Heterogeneous Gateways. IEEE Commun. Lett. 2017, 21, 2456–2459. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, X.X.; Zhang, L. Tree pattern matching in heterogeneous fuzzy XML databases. Knowl.-Based Syst. 2017, 122, 119–130. [Google Scholar] [CrossRef]
- Arcaini, P.; Mirandola, R.; Riccobene, E.; Scandurra, P. MSL: A pattern language for engineering self-adaptive systems. J. Syst. Softw. 2020, 164, 110558. [Google Scholar] [CrossRef]
- Jaloudi, S. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study. Future Internet 2019, 11, 66. [Google Scholar] [CrossRef]
- Hamood, M.; Albaseer, A.; Abdallah, M.; Al-Fuqaha, A. Clustered and Multi-Tasked Federated Distillation for Heterogeneous and Resource Constrained Industrial IoT Applications. IEEE Internet Things Mag. 2023, 6, 64–69. [Google Scholar] [CrossRef]
- Chand, S.; Pandey, S.K.; Horkoff, J.; Staron, M.; Ochodek, M.; Durisic, D. Comparing Word-Based and AST-Based Models for Design Pattern Recognition. In Proceedings of the PROMISE ’23: 19th International Conference on Predictive Models and Data Analytics in Software Engineering, San Francisco, CA, USA, 8 December 2023; ACM: New York, NY, USA, 2023. [Google Scholar] [CrossRef]
- Yu, D.; Zhang, P.; Yang, J.; Chen, Z.; Liu, C.; Chen, J. Efficiently detecting structural design pattern instances based on ordered sequences. J. Syst. Softw. 2018, 142, 35–56. [Google Scholar] [CrossRef]
- Orłowski, C.; Ziółkowski, A.; Orłowski, A.; Kapłański, P.; Sitek, T.; Pokrzywnicki, W. Ontology of the Design Pattern Language for Smart Cities Systems. In Transactions on Computational Collective Intelligence XXV; Springer: Berlin/Heidelberg, Germany, 2016; pp. 76–100. [Google Scholar] [CrossRef]
- Elaasar, M.; Briand, L.C.; Labiche, Y. VPML: An approach to detect design patterns of MOF-based modeling languages. Softw. Syst. Model. 2013, 14, 735–764. [Google Scholar] [CrossRef]
- Zamani, B.; Butler, G. Pattern Language Verification in Model Driven Design. Inf. Sci. 2013, 237, 343–355. [Google Scholar] [CrossRef]
- Rana, B.; Singh, Y.; Singh, P.K. A systematic survey on internet of things: Energy efficiency and interoperability perspective. Trans. Emerg. Telecommun. Technol. 2020, 32, e4166. [Google Scholar] [CrossRef]
- Iqbal, M.A.; Hussain, S.; Xing, H.; Imran, M. Enabling the Internet of Things: Fundamentals, Design, and Applications; Wiley: Hoboken, NJ, USA, 2020. [Google Scholar] [CrossRef]
- Perera, C.; Liu, C.H.; Jayawardena, S. The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey. IEEE Trans. Emerg. Top. Comput. 2015, 3, 585–598. [Google Scholar] [CrossRef]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
- Fortino, G.; Trunfio, P. Internet of Things Based on Smart Objects; Springer International Publishing: Cham, Switzerland, 2014. [Google Scholar] [CrossRef]
- Reinfurt, L.; Breitenbücher, U.; Falkenthal, M.; Leymann, F.; Riegg, A. Internet of Things Patterns for Device Bootstrapping and Registration. In Proceedings of the EuroPLoP ’17: 22nd European Conference on Pattern Languages of Programs, Irsee, Germany, 12–16 July 2017; ACM: New York, NY, USA, 2017. [Google Scholar] [CrossRef]
- Li, F.; Voegler, M.; Claessens, M.; Dustdar, S. Efficient and Scalable IoT Service Delivery on Cloud. In Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, 28 June–3 July 2013; IEEE: Piscataway, NJ, USA, 2013. [Google Scholar] [CrossRef]
- Sethi, P.; Sarangi, S.R. Internet of Things: Architectures, Protocols, and Applications. J. Electr. Comput. Eng. 2017, 2017, 9324035. [Google Scholar] [CrossRef]
- Khan, A.R.; Kashif, M.; Jhaveri, R.H.; Raut, R.; Saba, T.; Bahaj, S.A. Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions. Secur. Commun. Netw. 2022, 2022, 4016073. [Google Scholar] [CrossRef]
- Cao, Q.; Zanni-Merk, C.; Samet, A.; Reich, C.; De Beuvron FD, B.; Beckmann, A.; Giannetti, C. KSPMI: A Knowledge-based System for Predictive Maintenance in Industry 4.0. Robot. Comput.-Integr. Manuf. 2022, 74, 102281. [Google Scholar] [CrossRef]
- Smaali, S.; Benbessem, R.; Touati, H.M.N. A Fault Tolerance and Recovery Formal Model for IoT Systems. Int. J. Organ. Collect. Intell. 2022, 12, 1–24. [Google Scholar] [CrossRef]
- Alexander, C.; Ishikawa, S.; Silverstein, M. A Pattern Language: Towns, Buildings, Construction; Center for Environmental Structure Series; Center for Environmental Structure: Berkeley, CA, USA, 1977. [Google Scholar]
- Gamma, E.; Helm, R.; Johnson, R.; Vlissides, J. Design Patterns: Elements of Reusable Object-Oriented Software; Pearson Deutschland GmbH: München, Germany, 1995. [Google Scholar]
- Caiza, J.C.; Martín, Y.-S.; Del Alamo, J.M.; Guamán, D.S. Organizing Design Patterns for Privacy: A Taxonomy of Types of Relationships. In Proceedings of the EuroPLoP ’17: 22nd European Conference on Pattern Languages of Programs, Irsee, Germany, 12–16 July 2017; ACM: New York, NY, USA, 2017. [Google Scholar] [CrossRef]
- Noble, J. Classifying relationships between object-oriented design patterns. In Proceedings of the 1998 Australian Software Engineering Conference (Cat. No.98EX233), ASWEC-98, Adelaide, SA, Australia, 9–13 November 1998; IEEE Computer Society: Washington, DC, USA, 1998. [Google Scholar] [CrossRef]
- Zimmer, W. Relationships between design patterns. Pattern Lang. Program Des. 1995, 1, 345–364. [Google Scholar]
- Hamdan, S.; Ayyash, M.; Almajali, S. Edge-Computing Architectures for Internet of Things Applications: A Survey. Sensors 2020, 20, 6441. [Google Scholar] [CrossRef] [PubMed]
- Xu, X.; Bandara, H.M.N.D.; Lu, Q.; Weber, I.; Bass, L.; Zhu, L. A Decision Model for Choosing Patterns in Blockchain-Based Applications. In Proceedings of the 2021 IEEE 18th International Conference on Software Architecture (ICSA), Stuttgart, Germany, 22–26 March 2021; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar] [CrossRef]
- Ungurean, I.; Gaitan, N. A Dynamic IIoT Framework Based on the Publish–Subscribe Paradigm. Sensors 2023, 23, 9829. [Google Scholar] [CrossRef] [PubMed]
- AL-Munim, M.A.H.; Abdul Hameed, M.M. Investment Trends for Iraqi Industries in Terms of Clean Production (selected model). J. Econ. Adm. Sci. 2021, 27, 155–169. [Google Scholar] [CrossRef]
- Iraqi Ministry of Industry and Minerals. Automotive Industry. Available online: https://scai.industry.gov.iq/CMS.php?CMS_P=2 (accessed on 26 February 2024).
- Lu, X.; Baraldi, P.; Zio, E. A data-driven framework for identifying important components in complex systems. Reliab. Eng. Syst. Saf. 2020, 204, 107197. [Google Scholar] [CrossRef]
- Chi, Y.; Dong, Y.; Wang, Z.J.; Yu, F.R.; Leung, V.C.M. Knowledge-Based Fault Diagnosis in Industrial Internet of Things: A Survey. IEEE Internet Things J. 2022, 9, 12886–12900. [Google Scholar] [CrossRef]
- Dafare, M.; Waghmare, S.; Bhoyar, A.; Titarmare, A.S.; Chandankhede, P. LoRa-Enabled Smart RS485 Data Logger and MQTT Gateway for Industrial IoT Applications Using ESP32. In Proceedings of the 2023 International Conference on Circuit Power and Computing Technologies (ICCPCT), Kollam, India, 10–11 August 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar] [CrossRef]
- Padmavathy, T.; Muralidharan, C.; Sirajudeen, Y.M. Cloud-based industrial IoT infrastructure to facilitate efficient data analytics. In Cloud Analytics for Industry 4.0; De Gruyter: Berlin, Germany, 2022; pp. 31–52. [Google Scholar] [CrossRef]
- Bartolomucci, M. Automating Safety Mechanisms Insertion Providing Standard SIL Compliance in Digital Circuits. Ph.D. Thesis, Politecnico di Torino, Torino, Italy, 2023. [Google Scholar]
- Sun, P.; Shen, S.; Wan, Y.; Wu, Z.; Fang, Z.; Gao, X. A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends. IEEE Internet Things J. 2024; early access. [Google Scholar] [CrossRef]
- Farooq, B.; Bao, J.; Li, J.; Liu, T.; Yin, S. Data-Driven Predictive Maintenance Approach for Spinning Cyber-Physical Production System. J. Shanghai Jiaotong Univ. Sci. 2020, 25, 453–462. [Google Scholar] [CrossRef]
- Crisp, J.; Pelletier, D.; Duffield, C.; Adams, A.; Nagy, S. The Delphi Method? Nurs. Res. 1997, 46, 116–118. [Google Scholar] [CrossRef]
- Guetterman, T.; Creswell, J.W.; Kuckartz, U. Using joint displays and MAXQDA software to represent the results of mixed methods research. In Use of Visual Displays in Research and Testing: Coding, Interpreting, and Reporting Data; Information Age Publishing, Inc.: Charlotte, NC, USA, 2015; pp. 145–175. [Google Scholar]
- Melo, P.F.S.; Godoy, E.P.; Ferrari, P.; Sisinni, E. Open source control device for industry 4.0 based on RAMI 4.0. Electronics 2021, 10, 869. [Google Scholar] [CrossRef]
- Adolphs, P.; Bedenbender, H.; Dirzus, D.; Ehlich, M.; Epple, U.; Hankel, M.; Heidel, R.; Hoffmeister, M.; Huhle, H.; Kärcher, B.; et al. Status Report—Reference Architecture Model Industrie 4.0 (RAMI4.0); Technical Report; VDI—Verein Deutscher Ingenieure eV: Düsseldorf, Germany; ZVEI—German Electrical and Electronic Manufacturers Association: Frankfurt am Main, Germany, 2015. [Google Scholar]
- Nakagawa, E.Y.; Antonino, P.O.; Schnicke, F.; Capilla, R.; Kuhn, T.; Liggesmeyer, P. Industry 4.0 reference architectures: State of the art and future trends. Comput. Ind. Eng. 2021, 156, 107241. [Google Scholar] [CrossRef]
No. | Author | Year | IoT/IIoT | Patterns/Pattern Language | Heterogeneity | Security Measures | Interoperability | Predictive Maintenance | Communication | Case Study |
---|---|---|---|---|---|---|---|---|---|---|
1 | Song et al. [22] | 2017 | ✓ | ✓ | ✓ | |||||
2 | Hadj et al. [23] | 2020 | ✓ | ✓ | ✓ | ✓ | ||||
3 | Jin [24] | 2022 | ✓ | ✓ | ✓ | |||||
4 | Xiong et al. [25] | 2020 | ✓ | ✓ | ✓ | |||||
5 | Petroulakis et al. [26] | 2019 | ✓ | ✓ | ✓ | ✓ | ✓ | |||
6 | Wang et al. [27] | 2020 | ✓ | ✓ | ✓ | |||||
7 | Sengupta et al. [28] | 2015 | ✓ | ✓ | ✓ | |||||
8 | Narayanan et al. [29] | 2017 | ✓ | ✓ | ✓ | ✓ | ||||
9 | Liu et al. [30] | 2017 | ✓ | ✓ | ||||||
10 | Arcaini et al. [31] | 2020 | ✓ | ✓ | ✓ | ✓ | ✓ | |||
11 | Jaloudi [32] | 2019 | ✓ | ✓ | ✓ | |||||
12 | Hamood et al. [33] | 2023 | ✓ | ✓ | ✓ | |||||
13 | Chand et al. [34] | 2023 | ✓ | ✓ | ✓ | |||||
14 | Yu et al. [35] | 2018 | ✓ | |||||||
15 | Orłowski et al. [36] | 2016 | ✓ | ✓ | ✓ | |||||
16 | Elaasar et al. [37] | 2015 | ✓ | ✓ | ✓ | |||||
17 | Rouhi et al. [6] | 2016 | ✓ | |||||||
18 | Zamani et al. [38] | 2013 | ✓ | |||||||
Our Work | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
No. | Pattern | Device Layer | Communication Layer | Data Layer | Application Layer |
---|---|---|---|---|---|
1 | Pub/Sub Pattern | Yes | Yes | No | No |
2 | Device Gateway Pattern | No | Yes | Yes | No |
3 | Data Acquisition Pattern | Yes | No | Yes | No |
4 | Edge Computing Pattern | No | Yes | No | Yes |
5 | Device Management Pattern | Yes | Yes | No | No |
6 | Security Pattern (Authentication Pattern) | Yes | Yes | Yes | Yes |
7 | Scalability Pattern | No | Yes | No | Yes |
8 | Modular Architecture | Yes | Yes | Yes | Yes |
9 | Analytics Pattern | No | No | Yes | Yes |
10 | Predictive Maintenance | No | No | Yes | Yes |
11 | Fault Tolerance Pattern | Yes | Yes | Yes | Yes |
Notations | Meaning | |
---|---|---|
Complementary | Pattern A and Pattern B can be used together [52]. | |
Sequential | Pattern A must be implemented before Pattern B [53]. | |
Conflicting | Pattern A and Pattern B cannot be used together [52]. | |
Can be used | Pattern A can be used in Pattern B in the solution [52,53,54]. | |
Complementary all patterns | Pattern A is complementary to all patterns in the pattern language [55,56]. |
No. | Pattern Name | Complementary | Can be Used | Sequential | Conflicting |
---|---|---|---|---|---|
1 | Publish/Subscribe | Device Gateway Data Acquisition | Security Scalability | ||
2 | Device Gateway | Security | |||
3 | Data Acquisition | Scalability Device Management Security | Analytics | ||
4 | Edge Computing | Data Acquisition Analytics | Device Gateway | ||
5 | Device management | Fault Tolerance | Edge Computing Predictive Maintenance | ||
6 | Security | All | Predictive Maintenance Device Management | ||
7 | Scalability | Data Acquisition | Edge Computing | ||
8 | Modular Architecture | All | Publish/Subscribe Fault Tolerance | ||
9 | Analytics | Edge Computing Device Gateway Predictive Maintenance | |||
10 | Predictive Maintenance | Analytics Security | Fault Tolerance Publish/Subscribe | ||
11 | Fault Tolerance | Predictive Maintenance | Device Gateway Edge Computing Publish/Subscribe | Scalability |
# | Academic Position | Current Institute/Faculty | University | Field of Experience | Years of Experience | Time/Date of Meeting |
---|---|---|---|---|---|---|
1 | Head of IT Department | Iraqi Gas Company | Iraqi University | Cloud Computing, IoT, Networks | 12 years | 11 a.m., 20 March 2024 |
2 | Director of Research | National Institute of Technology | Baghdad University | Embedded Systems, IoT | 15 years | 2 p.m., 21 March 2024 |
3 | Senior Systems Analyst | Ministry of Science and Technology | University of Basra | Data Analytics, Information Systems | 10 years | 10 a.m., 24 March 2024 |
4 | IoT Project Manager | Iraq Tech Solutions | University of Mosul | IoT Integration, Project Management | 8 years | 3 p.m., 27 March 2024 |
5 | Professor of Computer Science | College of Information Technology | University of Baghdad | Distributed Systems, Security | 20 years | 11 a.m., 26 March 2024 |
6 | Head of Development | Innovative Tech Solutions | University of Technology | Software Engineering, IoT | 13 years | 4 p.m., 26 March 2024 |
7 | Chief Engineer | Iraq Industrial Automation Company | University of Kufa | Industrial IoT, Automation | 18 years | 9 a.m., 27 March 2024 |
8 | IoT Solutions Architect | Advanced IoT Systems | Mustansiriyah University | Network Design, IoT Solutions | 11 years | 1 p.m., 28 March 2024 |
9 | Data Scientist | Data Analysis and Systems Integration Firm | Al-Nahrain University | Machine Learning, Big Data | 9 years | 12 p.m., 28 March 2024 |
Factory | Challenge | Agreement (Frequency) | Satisfaction Rate |
---|---|---|---|
Factory (S.C.A.I.) | Challenge One | 9 | 100% |
Challenge Two | 9 | 100% | |
Challenge Three | 8 | 88.89% | |
Challenge Four | 7 | 77.78% | |
Challenge Five | 6 | 66.67% | |
Overall Agreement Rate | 87.11% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Azeez, H.H.; Sharbaf, M.; Zamani, B.; Kolahdouz-Rahimi, S. Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice. Information 2024, 15, 595. https://doi.org/10.3390/info15100595
Azeez HH, Sharbaf M, Zamani B, Kolahdouz-Rahimi S. Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice. Information. 2024; 15(10):595. https://doi.org/10.3390/info15100595
Chicago/Turabian StyleAzeez, Hasanain Hazim, Mohammadreza Sharbaf, Bahman Zamani, and Shekoufeh Kolahdouz-Rahimi. 2024. "Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice" Information 15, no. 10: 595. https://doi.org/10.3390/info15100595
APA StyleAzeez, H. H., Sharbaf, M., Zamani, B., & Kolahdouz-Rahimi, S. (2024). Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice. Information, 15(10), 595. https://doi.org/10.3390/info15100595