Industrial IoT Robustness Simulation

  • BASIC INFORMATION
  • INNOVATION
  • EXPLOITATION
  • MEDIA
  • MODULES
Name of demonstration

Industrial IoT Robustness Simulation

Main objective

The Industrial IoT (IIoT) Robustness Simulation provides an extensible and configurable discrete event simulator. The implementation of different simulation models realizes a simulation for wireless sensor networks in a 3D environment.

Short description

Wireless Sensor Networks (WSN) are essential in production or IIoT environments. Mobile robots, edge devices, or Automated Guided Vehicles need to communicate. Such networks are prone to physical changes of the environment and cyber attacks. This use case simulates the WSN behaviour in a virtual IIoT infrastructure. 

 

The two modules that are emphasized by the TRINITY project are “Network Device Positioning” and “Cyber-security Fallback Simulation”. The two software artefacts are extending the core functionality of a software project called d3vs1m – discrete events & development for network device simulation. The d3vs1m project is an open source library and simulation tool to simulate WSNs in order to support the integration process of such IIoT networks in the factory domain.

Owner of the demonstrator

Fraunhofer Institute for Machine Tools and Forming Technology (IWU)

Responsible person

M.Sc. Adrian Singer Adrian.Singer@iwu.fraunhofer.de

NACE

J58.2 - Software publishing

Keywords

IIoT, WSN, Simulation, Cyber Security.

Potential users

Software Developers, Software Operations, Simulation Scientists

Benefits for the users

Low-cost test: Software-based simulations of the network behavior is a low-cost approach compared to a testbed installation or a test in a productive environment.

Innovation

There is a number of technologies to investigate the behaviour of IIoT networks, mostly real-world test bed installations or various types of hard- and software simulations. There is also a number of technologies, in terms of Breach and Cyber-Attack simulations (BAS). Popular systems can be summarized as Vulnerability Scans, Traffic-based Monitoring or Mulit-Vector Testing. This use case proposes another technology called Network and Intrusion Detection System (IDS) Simulation. On the one hand, d3vs1m provides an application-programming interface (API) to compose individual simulators in one application. On the other hand, it can be used also directly as an executable that users can install and configure. 

Risks and limitations

Knowledge of software: Developers needs to be familiar with the provided software artefacts and their implementation process into the IT environment of their organization.

 

Knowledge of simulation environment: Users needs to be familiar with the functionalities and the user interfaces provided by d3vs1m.

Technology readiness level

4 – Component and/or breadboard validation in laboratory environment

Sectors of application

Network-Integration, Research.

Potential sectors of application

Breach Attack Simulation (BAS)

Patents / Licenses / Copyrights

All software artefacts are licensed under GNU General Public License v3.0.

Hardware / Software

Hardware:

100% hardware- or platform-independent modules


Software:

.NET Core Runtime or .NET Core Software Development Kit (SDK), version 3.1 with long-term support (LTS)

.NET Framework 4.8 Runtime or Development Pack

.NET 5 Runtime or SDK

Back to LIST
Subscribe to newsletter

Please subscribe to our mailing list to be the first one informed about the new open calls, events and other hot news!


    Please check if the email you entered is correct
    All done!

    Your have successfully subscribed to Trinity newsletter.