Industrial IoT Robustness Simulation
Name of demonstration
Industrial IoT Robustness Simulation
Main objective
The Industrial IoT (IIoT) Robustness Simulation provides an extensible and configurable discrete event simulator. The implementation of different simulation models realizes a simulation for wireless sensor networks in a 3D environment.
Short description
Wireless Sensor Networks (WSN) are essential in production or IIoT environments. Mobile robots, edge devices, or Automated Guided Vehicles need to communicate. Such networks are prone to physical changes of the environment and cyber attacks. This use case simulates the WSN behaviour in a virtual IIoT infrastructure.
The two modules that are emphasized by the TRINITY project are “Network Device Positioning” and “Cyber-security Fallback Simulation”. The two software artefacts are extending the core functionality of a software project called d3vs1m – discrete events & development for network device simulation. The d3vs1m project is an open source library and simulation tool to simulate WSNs in order to support the integration process of such IIoT networks in the factory domain.
Owner of the demonstrator
Fraunhofer Institute for Machine Tools and Forming Technology (IWU)
Responsible person
M.Sc. Adrian Singer Adrian.Singer@iwu.fraunhofer.de
NACE
J58.2 - Software publishing
Keywords
IIoT, WSN, Simulation, Cyber Security.
Potential users
Software Developers, Software Operations, Simulation Scientists
Benefits for the users
Low-cost test: Software-based simulations of the network behavior is a low-cost approach compared to a testbed installation or a test in a productive environment.
Innovation
There is a number of technologies to investigate the behaviour of IIoT networks, mostly real-world test bed installations or various types of hard- and software simulations. There is also a number of technologies, in terms of Breach and Cyber-Attack simulations (BAS). Popular systems can be summarized as Vulnerability Scans, Traffic-based Monitoring or Mulit-Vector Testing. This use case proposes another technology called Network and Intrusion Detection System (IDS) Simulation. On the one hand, d3vs1m provides an application-programming interface (API) to compose individual simulators in one application. On the other hand, it can be used also directly as an executable that users can install and configure.
Risks and limitations
Knowledge of software: Developers needs to be familiar with the provided software artefacts and their implementation process into the IT environment of their organization.
Knowledge of simulation environment: Users needs to be familiar with the functionalities and the user interfaces provided by d3vs1m.
Technology readiness level
4 – Component and/or breadboard validation in laboratory environment
Sectors of application
Network-Integration, Research.
Potential sectors of application
Breach Attack Simulation (BAS)
Patents / Licenses / Copyrights
All software artefacts are licensed under GNU General Public License v3.0.
Hardware / Software
Hardware:
100% hardware- or platform-independent modules
Software:
.NET Core Runtime or .NET Core Software Development Kit (SDK), version 3.1 with long-term support (LTS)
.NET Framework 4.8 Runtime or Development Pack
.NET 5 Runtime or SDK
No media items assigned
IIoT Network Device Positioning
This module provides the simulation environment d3vs1m in order to compute the optimal distribution of the ...
LEARN MORE
IIoT Network Fallback Simulation
This module provides the simulation environment d3vs1m in order to simulate the network behaviour, specifie...
LEARN MORE
Trainings
To learn more about the solution, click on the link below to access the training on the Moodle platform
IIoT Robustness Simulation