Skip to main content

Machine Learning Economy for Next Generation Industrial IoT: A Vision Under Web 3.0

  • Conference paper
  • First Online:
Management of Digital EcoSystems (MEDES 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2022))

Included in the following conference series:

  • 79 Accesses

Abstract

The centralised nature of the current Internet i.e., Web 2.0, brings data privacy and security issues to the fore as critical barriers to the realisation of the digital economy. Due to such issues, it is difficult for data-driven services such as ‘ML-as-a-service’ to prosper under the umbrella of Web 2.0. Therefore, it is important to explore the platform utilities Web 3.0 can provide to support such services as they require to be executed and served in a highly distributed manner. This paper envisages an ML model marketplace for Industrial IoT applications exploiting next-generation IIoT components. A theoretical analysis of the ML economy and the technical components required to realize this marketplace are presented in this paper along with the specification of key open research questions.

This project has received funding from Sustainable Energy Authority of Ireland under the SEAI Research, Development & Demonstration Funding Programme 2021, Grant number 21/RDD/688 and Science Foundation Ireland SFI Research Centres 2017 PhD Awards Program under SFI CONNECT Centre 13/RC/2077 and SFI CONNECT Centre 13/RC/2077 P2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Achir, M., et al.: Service discovery and selection in IoT: a survey and a taxonomy. J. Netw. Comput. Appl. 200, 103331 (2022)

    Article  Google Scholar 

  2. Ali, S., et al.: Design methodology of microservices to support predictive analytics for IoT applications. Sensors 18(12), 4226 (2018). https://doi.org/10.3390/s18124226

    Article  Google Scholar 

  3. Otto, B., Steinbuß, S., Teuscher, A., Lohmann, S.: Reference Architecture Model - Version 3.0 (2019)

    Google Scholar 

  4. Chen, C., et al.: When digital economy meets web3.0: applications and challenges. IEEE Open J. Comput. Soc. 3, 233–245 (2022)

    Article  Google Scholar 

  5. Docker Swarm .https://docs.docker.com/engine/swarm/. Accessed 23 Nov 2022

  6. European Commission: COMMISSION STAFF WORKING DOCUMENT on Common European Data Spaces. Technical report SWD(2022) 45 final, European Commission (2022). https://digital-strategy.ec.europa.eu/en/library/staff-working-document-data-spaces

  7. Francisco, C., et al.: Roadmap for IoT Research, Innovation and Deployment in Europe 2021–2027. White Paper, NGIoT (2022). https://www.ngiot.eu/ngiot-report-a-roadmap-for-iot-in-europe/

  8. Fraunhofer: Data ecosystems: conceptual foundations, constituents and recommendations for action (2019). https://www.isst.fraunhofer.de/content/dam/isst-neu/documents/Publikationen/StudienundWhitePaper/FhG-ISST_DATA-ECOSYSTEMS.pdf

  9. Gaia-X: Gaia-X Architecture Document - 21.12 Release (2021)

    Google Scholar 

  10. Garamvölgyi, P., et al.: Towards model-driven engineering of smart contracts for cyber-physical systems. In: IEEE/IFIP International Conference on Dependable Systems and Networks Workshops. IEEE (2018)

    Google Scholar 

  11. Guo, J., et al.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1–14 (2017)

    Article  Google Scholar 

  12. IIC: The industrial internet of things volume g1: Reference architecture (2016). https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf. Accessed 31 Jan 2017

  13. IIC: Industrial internet of things volume G4: security framework (2016). https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB-3.pdf

  14. IIC: The industrial internet consortium and the trusted IoT alliance announce liaison (2019). https://www.iiconsortium.org/press-room/07-10-19.htm. Accessed 10 July 2019

  15. Isaja, M., et al.: Combining edge computing and blockchains for flexibility and performance in industrial automation. In: International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) (2017)

    Google Scholar 

  16. Karthikeyan, S., Patan, R., Balamurugan, B.: Enhancement of security in the internet of things (IoT) by using X.509 authentication mechanism. In: Khare, A., Tiwary, U.S., Sethi, I.K., Singh, N. (eds.) Recent Trends in Communication, Computing, and Electronics. LNEE, vol. 524, pp. 217–225. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-2685-1_22

    Chapter  Google Scholar 

  17. Kouicem, D.E., et al.: A decentralized blockchain-based trust management protocol for the internet of things. IEEE Trans. Dependable Secure Comput. 19, 1292–1306 (2020)

    Google Scholar 

  18. Kubernetes. https://kubernetes.io/. Accessed 23 Nov 2022

  19. Li, L., Fan, Y., Tse, M., Lin, K.Y.: A review of applications in federated learning. Comput. Ind. Eng. 149, 106854 (2020). https://doi.org/10.1016/j.cie.2020.106854, https://www.sciencedirect.com/science/article/pii/S0360835220305532

  20. Liu, Y., et al.: A survey on blockchain-based trust management for internet of things. IEEE Internet Things J. 10, 5898–5992 (2023)

    Article  Google Scholar 

  21. NIST: CPS PWG Cyber-physical systems (CPS) framework release 1.0 (2016). https://pages.nist.gov/cpspwg/

  22. Onose, E.: Machine learning as a service: what it is, when to use it and what are the best tools out there (2023). https://neptune.ai/blog/machine-learning-as-a-service-what-it-is-when-to-use-it-and-what-are-the-best-tools-out-there

  23. Orive, A., et al.: Quality of service aware orchestration for cloud-edge continuum applications. Sensors 22(5), 1755 (2022). https://doi.org/10.3390/s22051755

    Article  Google Scholar 

  24. Parthasarathy, A., Krishnamachari, B.: Defer: distributed edge inference for deep neural networks. In: International Conference on Communication Systems & NETworkS (COMSNETS) (2022)

    Google Scholar 

  25. Ranathunga, T., et al.: The convergence of blockchain and machine learning for decentralized trust management in IoT ecosystems. In: Proceedings of the ACM Conference on Embedded Networked Sensor Systems (2021)

    Google Scholar 

  26. Rouhani, S., et al.: Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24, 1617–1644 (2021)

    Article  Google Scholar 

  27. Salaht, F.A., et al.: An overview of service placement problem in fog and edge computing. ACM Comput. Surv. 53(3), 1–35 (2020)

    Article  Google Scholar 

  28. Tan, C., Sun, F., Kong, T., Zhang, W., Yang, C., Liu, C.: A survey on deep transfer learning. In: Kůrková, V., Manolopoulos, Y., Hammer, B., Iliadis, L., Maglogiannis, I. (eds.) ICANN 2018. LNCS, vol. 11141, pp. 270–279. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01424-7_27

    Chapter  Google Scholar 

  29. Team, T.I.: Web 3.0 explained, plus the history of web 1.0 and 2.0 (2022). https://www.investopedia.com/web-20-web-30-5208698

  30. Technologies, D.: Data confidence fabric and the importance of vetted data (2020). https://www.dell.com/en-us/perspectives/data-confidence-fabric-and-the-importance-of-vetted-data/

  31. Teerapittayanon, S., et al.: Distributed deep neural networks over the cloud, the edge and end devices. In: International Conference on Distributed Computing Systems (ICDCS) (2017)

    Google Scholar 

  32. Wang, Y., et al.: A reinforcement learning approach for online service tree placement in edge computing. In: IEEE International Conference on Network Protocols (ICNP) (2019)

    Google Scholar 

  33. Windley, P.: How sovrin works. Sovrin Foundation (2016)

    Google Scholar 

  34. Wu, D.J., Taly, A., Shankar, A., Boneh, D.: Privacy, discovery, and authentication for the internet of things. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 301–319. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45741-3_16

    Chapter  Google Scholar 

  35. Wu, W., Liu, E., et al.: Blockchain based zero-knowledge proof of location in IoT. In: ICC 2020–2020 IEEE International Conference on Communications (ICC). IEEE (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sourabh Bharti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bharti, S., Ranathunga, T., Dhanapala, I., Rea, S., McGibney, A. (2024). Machine Learning Economy for Next Generation Industrial IoT: A Vision Under Web 3.0. In: Chbeir, R., Benslimane, D., Zervakis, M., Manolopoulos, Y., Ngyuen, N.T., Tekli, J. (eds) Management of Digital EcoSystems. MEDES 2023. Communications in Computer and Information Science, vol 2022. Springer, Cham. https://doi.org/10.1007/978-3-031-51643-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51643-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51642-9

  • Online ISBN: 978-3-031-51643-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics