1. Introduction
One of the most important improvements in the recent technological universe is the IoT. The IoT involves connecting and integrating billions of smart devices and networks, such as wireless sensor networks (WSNs), to the internet. This creates networks that can share and interchange data to increase performance and, ultimately, individual interaction. IoT applications span a wide range of fields, including transportation, smart building control, energy management through smart meters, healthcare services, and home automation [
1].
Industrial automation is currently undergoing a significant transformation, thanks to the advent of IoT technology in industrial applications. This transformation has become possible due to recent technological advancements that enable extensive and precise interconnectivity. Efforts to automate processes independently of continuous human intervention rely on the seamless flow of data between sensors, controllers, and actuators on a large scale. In recent times, the focus has been on developing and optimizing data interchange and distribution schemes within industrial structures. Data generated in this context are typically transmitted wirelessly to a central network controller. The controller then analyzes the received data and, when necessary, adjusts network pathways and data transfer mechanisms. This process not only optimizes resource allocation but also influences physical environments through actuator systems.
In industrial networks, topologies and connectivity can vary due to connection or sensor node defeats. Additionally, highly dynamic situations, where connection efficiency differs significantly from central scheduling calculations, may result in sub-optimal efficiency and possibly lead to the construction of non-guaranteed application needs. These dynamic network topologies can cause several nodes of industrial sensors to fail. The increase in systems that have batteries causes industrial networks to consume a lot of energy. Taking advantage of locally distributed computation exceeds what would normally be required [
2].
In order to meet critical requirements, such as latency and network lifetime in industrial applications, data management should be based on a flexible and reliable architecture. Generating a large number of data was rarely investigated in the past and was less considered due to the problems that existed in the analysis of large volumes of data. But today, by using data management methods, this important issue can be addressed, and valuable information can be obtained in this field. It should be noted that for data management, data characteristics are investigated based on practical cases.
A large number of sensor nodes use batteries. Therefore, limiting the amount of energy in each node is one of the important challenges of industrial networks. One straightforward procedure involves delivering the packet to its destination with minimal power consumption. One popular solution involves using the shortest path with a connection cost that is the same as the energy required on every link to transmit the packet. Another method involves the maximization of network lifetime [
3]. The definition of the lifetime of a WSN can vary, but it is often expressed as the elapsed time from when the first node loses power. The intended meaning of the sentence is to convey that the lifetime of a WSN can be defined in various ways. One possible definition is based on the time elapsed from the beginning of data distribution to the moment the first node in the network depletes its energy.
The model that is very common for data transfer in the industrial IoT is pub/sub [
4]. The implementation of this model in industrial IoT may not be applicable due to high energy consumption and data access delay. To adopt the pub/sub industrial IoT, several papers are available that illustrate distributed methods. To explore the implementation of pub/sub mechanisms within industrial IoT contexts, numerous papers provide insights into distributed methodologies. Notable examples include [
2,
5,
6], which collectively examine the utilization of specialized, high-capacity nodes for data storage. In these studies, the focus lies on employing select nodes with enhanced capabilities, setting them apart from standard nodes, to effectively manage and store data. In these works, several nodes that are more powerful and different from other nodes have been used to store data. Despite the outstanding works in the mentioned model, there are numerous areas ripe for development and progress; the research conducted is still in the early stages
The growth of IoT devices is leading to massive amounts of data that require low-latency access and processing from cloud data centers. This drives the need for efficient resource management and network optimization [
7,
8]. Battery-powered IoT devices, like sensors, have limited energy; thus, methods to reduce power consumption through scheduling, duty-cycling, and energy-harvesting are important [
8,
9]. For networks with many battery-constrained devices, like sensors, the lifetime is critical and can be extended through efficient protocols, scheduling, duty-cycling, and energy-harvesting techniques [
7,
9]. Energy-efficient distributed mobile data management is a promising approach that uses local proxies and network optimization to provide low-latency access while also saving energy [
7,
8,
9].
This paper addresses strict latency requirements and introduces an energy-aware data management method (EDMM) that maximizes network lifetime designed to distribute and cache data at selected proxy nodes near sensors and actuators. This significantly reduces energy consumption, latency, and overhead, aligning with the principles of environmentally friendly industrial IoT practices. Dynamic node management strategies are incorporated, ensuring that nodes that are not actively involved in caching or communication are switched off to conserve energy resources. These innovations collectively pave the way for more responsive and efficient data management techniques in industrial IoT networks, aligning with the real-time demands of industrial applications.
In this article, the industrial IoT system, which consists of sensor and operator nodes, is considered. In the proposed model, data consumers are introduced as actuators and producers as sensors. Some intermediate nodes, which have different capabilities from other nodes, act as proxy nodes. The primary objective of this paper is to maximize the network’s lifetime, taking into account certain limitations to enhance the performance of the proposed strategy. Given the location of the proxy, the initially limited energy resources, the data request models, and the maximum latency, this goal is achieved. For better performance, the nodes that are not involved in the process are turned off. Data are also prioritized and some data are available faster than others; these data are known as urgent data. In this way, to check the latency requirements, the data are considered in two categories—urgent and normal data—and each node has its own latency threshold. We show that the proposed method (1) guarantees data access latency below a specified threshold and (2) performs well in terms of network lifetime when compared to an offline centralized heuristic algorithm.
The remainder of this article is as follows: We supply a summary overview of the literature review in
Section 2. The introduction of the model system is presented in
Section 3. We illustrate the proposed approach (EDMM) in
Section 4. In
Section 5, the performance evaluation and obtained results are mentioned. Finally, in
Section 6, the article is concluded, and we present some intuitions for future schemes.
2. Literature Review
Related works for the current study are [
5,
10,
11]. In these articles, the authors focus on how to place the proxy in the network. In these works, the delay of data access is investigated and analyzed in order to improve the efficiency of the suggested approaches. Maximizing network lifetime is considered in [
5]. A limited number of edge nodes, which have distinct and more powerful abilities than other nodes, are introduced as proxy nodes. Among the other objectives in that article, the location of proxies, the limited energy resources that nodes have, and the maximum delay that can be tolerated by consumer nodes are looked at. To maximize the lifetime of the network, the authors prove that the investigated problem is NP-hard and should be investigated by heuristic algorithms. In their proposed method, the authors show that the access latency is lower than the threshold and even though the lifetime of the network in their proposed method is lower than the optimal method, the performance of this method is better. The authors in [
5] only consider the paths that achieve the maximum delay limit; all paths are not considered in this approach and the number of proxy nodes in the network is fixed.
In [
10], the authors focus on energy consumption optimization. They consider the access latency, cache valency, and different data types in their investigation. In their proposed approach, energy consumption is considered in two ways, i.e., from the sensor to the proxy and from the proxy to the sensor. Regarding energy savings, some proxy nodes that are not involved in the process are turned off. In addition to considering proxies in the off mode, some data that are available more rapidly than others are designated as critical (urgent) data, and other data are designated as normal data. According to the data classification, the limits related to normal and critical data are separately considered; the limitation discussed in this article pertains to combined aspects of access latency. Moreover, along with the approach proposed by the authors, an algorithm based on ACS is also presented, and the meta-heuristic algorithm works like the optimal method in many cases. It should be noted that the proposed method is proven superior against corresponding methods based on different criteria, including energy consumption, access latency, and computing time. In [
10], the authors do not consider the issue of maximizing the lifetime of the network and only focus on the optimization of energy consumption.
In [
11], the authors consider a function that consists of the amount of energy consumption and access delay. This function includes the total energy consumption required to keep the nodes active and the energy consumption for data transfer, involving transmissions from the sensor to the proxy and from the proxy to the actuator. This function also includes data access latency. Their proposed method ensures the mean access latency remains below a predetermined maximum threshold, corresponding to data volume. The proposed strategy in [
11] is similar to the strategy in [
10], i.e., when increasing the efficiency of the proposed approach, data that are available faster are introduced as urgent data, and others are introduced as normal data. In this article, several proxy nodes are considered as idle (off). Finally, the proposed approach in 3 exhibits superior performance compared to similar and corresponding methods. The authors of [
11] do not address the issue of maximizing network lifetime; their main goal is to reduce energy consumption.
In [
12], the authors proposed new optimization formulas to maximize the network lifetime. Based on column generation, a method is provided to solve this type of optimization problem. In this article, the machine-to-machine connection is considered. In a machine-to-machine connection, sensor measurements are conducted within the network and are dispatched to various destinations through multi-part transmission. Since only a few configurations are used to maximize network lifetime, their proposed method is effective in practice. In addition to maximizing network lifetime, the authors provide upper and lower bands for their proposed formula. The authors do not address the issue of data access delay and do not pay attention to the role of proxy in the network.
The authors of [
9] propose an energy-efficient resource management framework for software-defined data centers (SDDCs) to handle rapidly growing IoT and big data workloads. The consolidated model optimizes VM deployment and network bandwidth allocation to minimize energy consumption in SDDCs while guaranteeing quality of service. It uses a priority-aware heuristic approach based on weighted utility functions to select the best hosts and switches for allocating VMs and bandwidth for both critical and non-critical applications. The utility functions account for power consumption, resource utilization, and bandwidth usage. Experiments demonstrate that compared to existing schemes, the framework reduces the total energy consumption of SDDCs by 27.9%, with negligible quality of service violations of 0.33. The scheme is shown to be effective at improving energy efficiency in cloud data center resource management.
The authors of [
8] propose an Internet of Things-based industrial data management framework with five layers: physical, network, middleware, database, and an application to efficiently collect and leverage massive, heterogeneous manufacturing data from smart devices on factory floors. The middleware layer collects, pre-processes, and aggregates real-time data using protocols like OPC-UA and provides modules for resources, events, data, and recovery management. A distributed database layer offers local storage prior to cloud transmission to avoid network delays. The application layer analyzes the data to gain insights into optimizing manufacturing processes, predicting maintenance, and driving smart factory decision-making. A case study with smart pumps demonstrates the framework’s ability to successfully acquire, manage, and convert real-time industrial big data at scale into useful information to improve factory operations and productivity.
The authors of [
7] explore technological trends that drive the evolution of massive MIMO into the 6G era, including metasurface-enabled massive MIMO for enhanced beamforming and sensing, ultra-massive MIMO at THz frequencies (offering tremendous capacity along with design challenges), cell-free architectures to improve spectral and energy efficiency, the integration of AI for gains in resource allocation and channel estimation, adaptations like non-coherent demodulation for high-speed applications, and expanding the reach to non-terrestrial networks while managing large delays and losses. The survey examines how these advancements, including intelligent surfaces, new frequency bands, innovative architectures, AI, and expanding applications, are transforming massive MIMO capabilities to meet future demands, but also require solutions to new challenges around factors like beam management, interference, transport, and modeling, to fully unlock their potential in 6G and beyond.
In [
6], the authors specify and select a limited set of proxy nodes to store the data required by the consumer nodes, striking a balance between threshold data access latency and choosing a low number of proxies. The selection of proxy nodes should ensure guaranteed maximum access latency for data delivery to the requesting nodes. Any node can potentially be selected as a proxy node, and if the selection of proxy nodes is conducted correctly, the authors’ goal of reducing access latency will be achieved. By minimizing the number of proxy nodes, the overall consumption of system resources is reduced. In this method, the average access latency is considered instead of the access latency of each node, and the maximization of network lifetime is not considered.
Standard WirelessHART uses graph routing to improve network reliability. The issue of network lifetime in graph routing is an important topic and has been focused on by many authors. The maximum lifetime of network WirelessHART under graph routing is mentioned in [
13]; the authors prove that this problem is NP-hard and should be solved with the help of optimization algorithms. Therefore, in order to maximize the lifetime of WirelessHART networks, they introduce several algorithms. They show that the computation time required by greedy heuristics is greatly reduced, especially for WirelessHART networks, where graph roots may be computed often when network variations occur in open environments; thus, it is suitable and has good performance.
In [
14], the authors develop their work from [
5]. Considering the access delay, they attempt to increase network lifetime in industrial environments that have several hops. They prove that the problem is computationally complex and unsolvable; in order to solve the objective function, they design a one-step algorithm. Here, the authors use a fixed number consisting of proxy nodes and do not consider other modes of the proxy selection, such as whether the proxy nodes are on or off.
Sensor nodes in the WSN are nodes that have lower costs and less capability. However, they have the ability to work in environments that cannot be closed but cannot be transported in an effective manner. In [
15], the authors propose a clustering technique to partition these nodes. In the clustering method, the cluster head must have special privileges, and the cluster heads are responsible for sending information to other nodes. In [
15], the authors present a model for choosing the cluster head; the chosen method aims to maximize the lifetime of the network and optimize energy consumption. This method takes into account limitations, such as lower energy consumption and delay. The authors compare their proposed method with different algorithms and prove that this method exhibits superior performance. To achieve the article’s goal, the authors utilize all sensor nodes, with some nodes not considered to be off.
3. System Modeling
System modeling is a principal issue in studies of this nature and it needs to encompass various topics for a comprehensive understanding of what we have, what we present, and the preferences.
In fact, it is a basic concept that we need in order to evaluate past and present methods. Corresponding models should be presented and, accordingly, other related topics will be represented around them.
An industrial network can include three kinds of components: sensors, actuators, and central controllers, which are enumerated as corresponding components for traditional networks. The ordinary connection method of IIoT involves both pub and sub models. As an example of data sources, sensors can be defined and transmit data to a central controller; this component can store the data so that they are available to the actuators when they request it. In smart factories, where industrial network applications are subject to time constraints, access latency is of considerable importance, in accordance with caching relative data in the central controller from the consumers of actuators. Therefore, access latency is very important and requires special attention. On the one hand, the latency corresponds to data access and is important for numerous reasons, including the extensive distance between data and the central controller. On the other hand, the overhead surrounding the central controller can be attributed to the burden of highlighting, maintaining, and processing all network data through the central controller. Both traditional pub and sub models endure important and critical challenges concerning network lifetime, due to the vital energy consumption surrounding the central controller in addition to data path triangularization.
The elapsed time from the start of data distribution to the earliest node losing its energy is defined as the lifetime of the network. The purpose of this paper is to maximize the lifetime of the network. By considering all available and possible paths for the data if the proxies are certain, a path is chosen that leads to the maximization of the lifetime. In our proposed method, we also use the off and on properties of nodes and we consider off nodes that are not used in the path. To achieve the objective of the problem, for each piece of data, we identify the possible paths and select the paths that meet the maximum delay restriction. For every one of these paths, we calculate the energy discharge on the path nodes. Therefore, if that path is active, we determine the node in the path with the minimum remaining lifetime. Among all possible paths, we finally choose the path that leads to the maximum remaining lifetime. In particular, for every path, a node is considered to be the first to die in the network while that path is active; in this way, a path is selected wherein the nodes have the longest lifespan. In this article, the available data are prioritized and a group of data is considered urgent data. Urgent data are available to the consumer faster than other data, and the data access latency is analyzed in two separate groups of urgent and normal data. Since one of the goals of this plan is to reduce the data access latency, it is demonstrated that in the case of a semi-determined proxy, the amount of data access latency is reduced compared to a determined proxy; as a result, it improves network performance.
The models can be organized as follows. Their corresponding details are expressed below. In the model of the proposed system, internet devices of industrial objects are connected with each other, with the help of wireless communication links. We illustrate this in
Figure 1. Some of the nodes in the network are producer nodes (sensors), some are consumer nodes (operators), and others are proxies.
In order to tackle the challenges mentioned earlier, we propose a system model, as depicted in
Figure 1. In this model, certain components of the IIoT network act as proxy nodes, which are responsible for caching the data generated by the sensor nodes. This caching mechanism enables efficient data access. To ensure seamless data retrieval, each actuator is assigned to a suitable proxy node that holds the relevant cached data. By intelligently selecting proxy nodes and appropriately designating actuators to them, we guarantee that the data access latency remains below a predefined maximum threshold. This optimization not only improves performance but also minimizes the energy consumed during the data transmission between the sensor nodes and proxy nodes, as well as between the proxy nodes and actuators. A crucial element within our system model is the central controller, which assumes a managerial role by executing the EDMM. This scheme oversees the overall operation, coordination, and management of the network components, ensuring efficient data handling and resource allocation. Overall, our proposed system model, with its selection of proxy nodes, actuator assignments, and central controllers with the EDMM, aims to optimize data access latency and conserve energy in the industrial IoT environment.
All these nodes are connected to each other by means of communication links.
Suppose that is as a graph of an industrial IoT network, where V denotes a set of nodes of a graph G and every node has a limited amount of energy that can be defined as . The network is able to characterize two kinds of nodes: resource-constrained sensors and data nodes in addition to potential proxy nodes that are placed in a set P. If P is the total number of proxy nodes, V is the number of nodes, and is the limited amount of energy of proxy p, then , ,and , , . A node can propagate data utilizing appropriate industrial wireless technologies to nodes that are in the neighborhood . includes nodes that satisfy so that is the transportation limit area of node u, is the Euclidean interval among u and , and is a neighborhood adjustment parameter, where .
One essential aspect of industrial operations involves consumer access to data on demand (typically in a timely manner). A delivery system must ensure compliance with certain maximum data access latency constraints.
is defined as a delay that includes one hop from
u to
. The latency resulting from multiple hops, achieved from
u to
p, is defined by
. It is shown in
Figure 2.
Upon a requisition from
, data piece
is delivered from
p through a (distinct) multi-hop path; the data access latency of
can be defined by
Urgent data with high-priority data parts should be sent quickly. Therefore, we consider as the maximum tolerable delay for normal data and as the maximum tolerable delay for urgent data, with .
In some cases, data generation takes place in networks related to industrial processes. In general, data are divided into two groups: urgent data and normal data. Urgent data are data that are necessary to exist in the network. The data are introduced by D, where . Any data piece can be defined by , where is the source of is the consumer of , represents the data production rate of , where and m is the number of data.
Given this constraint and the constraints that we will demonstrate in the following, the main aim for each data source, , is the proxy recognition p, where the relevant data should be cached, for the purpose of maximizing the lifetime of the network. For the following topics, we are going to provide a suitable showcase for our main problem, i.e., the maximization issue. The purpose of modeling is to progress, and decisions should be made corresponding to our model representation Decision-making will be given in the next subsection.
Decision Problem
As mentioned previously, we should deal with the problem of what we can do. Clearly, our decision should be made and our constraints should be highlighted and explained. Regarding decision-making, many related issues are better clarified and understood. Meanwhile, there are numerous constraints that must be accepted, and considering such items, we want to choose the best options. However, the choice must be optimized and have at least one preference due to the other items. For the following sub-section, we will prove suitable decision constraints and their related decision-making procedures to achieve our goal. Further topics and complimentary topics will be presented.
Suppose that there is a set of deployed proxies p for a provided network . Two situations are considered for each P: active (that is, communicating or caching) and idle. In the idle mode, P is ON but its internal storage is not in use and refuses to participate in sending or receiving data. Therefore, denotes the energy costs of activating node P as a proxy node. Energy consumption costs can be defined by for every V.
The aim is to maximize network lifetime, which can be challenging in industrial IoT. Consequently, the time span from the initiation of data distribution to the moment when the first node in the network depletes its energy is defined as the lifetime of the network. To construct the objective function that maximizes the lifetime of the network, we present the decision variables,
, which keep the essential information about the transport of the data pieces across the edges of the graph. In particular,
when an edge
is activated for the data piece
. We denote
as the sum of the data rate of
. All
is defined by
. According to the above statements, the lifetime of node
is given by
The original objective function for this study, which can be enumerated as network lifetime, can be formulated as follows:
4. Energy-Aware Data Management Method
The first problem is to find suitable objective issues that can be regarded in the decision-making process and formulation of our constraints. Among the different subjects, energy is one of the most important, applicable, and interesting topics to deal with. The energy is of interest in both internal and existing problems. There is an interest in minimizing internal energy consumption, in direct contrast to maximizing the available external energy. Having information about energy enables us to design a decision problem that can be useful in data management, utilizing energy amounts and energy-aware concepts. To address this, an energy-aware data management strategy, encompassing both theoretical and applied topics, will be presented. Methods for resolving these concerns are also discussed.
Here, we introduce the EDMM method that chooses proxy nodes from set P. This strategy simultaneously divides them into data pieces, to maximize network lifetime. In the same direction, we take into account the access delay and storage capacitance. We propose an algorithm to solve our problem of maximizing the lifetime in the network.
The constraints mentioned are briefly stated. Constraint (
4) ensures that neither normal nor urgent data can exceed the latency thresholds. Constraint (
5) ensures that one or more proxies are involved in the distribution of the data pieces. Data flow conservation is assured according to constraints (
6)–(
8) for all nodes. Regarding constraints (
9), it is clear that the total energy consumption related to each node
u will not exceed the primary level
. In the following, constraint (
10) is able to make sure that any data piece is propagated from
u through just one edge
. Variables
(
11) are set to be integers that are understood based on the formulation of the problem.
For better understanding, the procedure algorithm will be presented. According to this algorithm, the strategy can be completely executed. The input and output can be clearly found, allowing us to base our intuition on the results Algorithm 1 demonstrates the procedure for finding our problem, which is obtained using the CPLEX tool.
Algorithm 1 EDMM. |
network graph , set of data pieces D, energy of an active node , limited energy node , energy consumption costs , , and For all
For all ← Sort D from highest to the lowest Compute the lifetime by Equation (2) X← Proxy for every data piece maximizing the objective function X |