<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Majorov International Conference on Software Engineering and Computer Systems, December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Informational Messages and Space Models Application in Smart Factory Concept</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maria Usova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilia Viksnin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Chuprov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ITMO University</institution>
          ,
          <addr-line>Kronverksky Pr. 49, 197101, St. Petersburg, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>0</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>Smart Factory concept is considered to play one of the crucial roles in the Industry 4.0 paradigm development and evolution. The informational space model provides a wide spectrum of opportunities for developers to implement new informational interaction mechanisms within the Smart Factory system. In this paper, we propose the informational message and the basic information space models for Smart Factory networks. The informational messages model allows to ensure confidentiality of data transmitted between Smart Factory nodes. In addition, we implement Smart Factory network in a simulation environment, apply described informational interaction models, and analyze further viability of the developed approach.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Smart Factory</kwd>
        <kwd>Information Interaction</kwd>
        <kwd>Informational Space</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>the proposed specification. The functional structure and abilities of the simulator are presented
in Section 4.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Nowadays the smart factory is represented as a fully connected and flexible system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] that
uses constant information and adapts it for new technological requests. Supply manufacturing
chains transform from a static sequence to a dynamic one that uses many sources of information
to drive a production process. According to this paper, the five key characteristics of a smart
factory are connected, optimized, transparent, proactivity, agile.
      </p>
      <p>
        Systems that combine the informational level (the level of computing and communication)
and the physical level are related to cyber-physical systems (CPS). CPS are engineering
systems whose operations are controlled, coordinated, and integrated by the computing core [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Since the level of physical devices and the network level (set of informational elements) are
integrated, the Smart Factory system can be considered as a CPS. Cyber-components of the
system include components responsible for performing calculations, implementing algorithms,
and transmitting data over a network. The physical component of such a system is determined
by "analog" elements, other physical systems, and the environment itself. The use of CPS in
the manufacturing sector allows increasing the production process eficiency due to the full
integration of computing devices with enterprise mechanisms [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The Smart Factory’s functional structure and the sequencing production process mechanism
are well-studied topics [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The autonomous manufacturing physical side is researched, partially
implemented and simulated by various scientific communities [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The concept of the Industrial
Internet of Things (IIoT) is widely used as the basis to organize the factory elements’ interaction
with the use of IIoT routing protocols [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. However, the Smart Factory mathematical concept
formalization has not been proposed yet, as well as the interaction and communication models
for the Smart Factory elements.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Information Interaction in the Framework of Smart Factory</title>
      <sec id="sec-3-1">
        <title>3.1. Mathematical Description of the Smart Factory</title>
        <p>
          We consider Smart Factory as a structure &lt; , , ,   &gt;. The elements of this structure are
the sets of Smart Factory objects: agents-robots set , informational space set , resources
set , products set  . It is assumed that the Informational Space is a result of a function
 =  (). This assumption means that the set of informational messages (informational space)
is formed during the robots’ communication process. Due to the specific features described in
[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], Smart Factory can be described as a multi-agent system. The agents can be represented as
agents-robots (further - agents) of the set . These agents are autonomous and perform specific
tasks to achieve the common system goal. In this case, agents assemble the products using the
information space I as a communication channel.
        </p>
        <p>The set of agents is represented as  = {(1|1), (2|2), . . . , (|)}, where  is a particular
agent’s access level to the Informational Space messages. The resource set can be described
as  = {1, 2, . . . , }, the set of Smart Factory products as   = {1, 2, . . . , , }.
Production process can be described as a function  = (, , , , ) +  where , ,
 are some subsets of the agents’ set, functions and resources (,  , , respectively) are
involved in this product assembling;  is the informational messages set;  is the time spent on
the production process,  presents other features that have an impact on production process.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. The Structure of the Informational Space</title>
        <p>We introduce informational space as a structure &lt; ,  &gt; where  is a set of elementary
informational messages  = {1, 2, . . . , } and  is a set of the access parameters for the
corresponding messages of the set ,  = {1, 2, . . . , }, 0 ≤  ≤ 1. The parameter  can
be calculated in the following ways.</p>
        <p>• The message was sent by the agent to itself. In this case, the access parameter is calculated
as  = , where  is the access level of the sender agent.
• The message was sent to another agent. The sender can specify the  parameter value
and, in this case, it cannot be greater than the access level of the sender. In another case,
the parameter value may be calculated automatically as  = (, ),
where  is the access level of the sender,  is the access level of the receiver.
• In case the informational message receiver is represented as a set of all agents in the
system (e.g. broadcasting mode), the access parameter value is taken as the minimum
possible value of the access level of all agents:  = (1, 2, . . . , ).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Informational Space Representation Approaches</title>
        <p>For analysis purposes, the described informational space can be represented as a two- or
three-dimensional space.</p>
        <p>A three-dimensional representation of the informational space is given by the coordinates
,  and , and is illustrated in Fig. 1. The axis  illustrates the agents sending informational
messages, the axis  represents the agents receiving informational messages, the  axis portrays
the time. Considering this informational space representation, the following assumptions are
introduced:
• on the axis  and  the agents are displayed discretely;
• the axes of the sender and receiver agents are limited by -th agent, where  is the ID
number of the last agent in the system, and the identifier has the highest value;
• the time is a discrete value;
• the time value  = 0 is the initial system operation time moment;
• the transmission time tends to zero, →0, therefore the time of sending and
the time of informational message receiving are considered as equal:  = .</p>
        <p>These assumptions allow finding any transmitted message in case of the known time of its
transmission and the IDs of the sender or receiver agent. Types of informational messages are
introduced below.</p>
        <p>bi
time</p>
        <p>timei</p>
        <p>•  = . In this case, the agent sent the message to itself. The type of the mes-sage is
“the agent’s own message”, it can be a report of the accomplished work. The set of these
messages is represented as ;
•  ∈ [1,  − 1] ∪ [ + 1, ]. The messages of this type indicate interactions
between agents  and . The set of the messages passed between agents  and  is
described as ;
•  = . These messages are broadcasted to all agents since this identifier value is an 
instruction. All the agents with  ≥  have access to such messages. These messages
are defined by the set .</p>
        <p>At the same time, only the sender and the receiver agents, whose identifiers are specified
when sending the message, have access to this informational message. Agents should have the
minimum required access level of . This requirement was described earlier.</p>
        <p>Informational space is considered as a set of informational messages’ subsets, grouped by
messages current position following the specified identifier of the receiver agent, and can be
described by equation (1).</p>
        <p>=  ∪  ∪ 
(1)
The visualization of the informational space in this form is presented in Fig. 2.</p>
        <p>Receiver ID
n+1
n</p>
        <sec id="sec-3-3-1">
          <title>Iall</title>
          <p>0
field 2
b</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>IInteraction</title>
        </sec>
        <sec id="sec-3-3-3">
          <title>Iown</title>
        </sec>
        <sec id="sec-3-3-4">
          <title>IInteraction</title>
          <p>n Sender ID</p>
        </sec>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. The Informational Message Structure</title>
        <p>We assume that informational message has a packet structure. The structure of the message is
presented in Figure 3. The message frame is divided into fields, each of them carries a certain
type of data about agents and the message itself. The fields are described as follows:
1. "" is the ID of the sender agent;
2. "" is the ID of the receiver agent;
3. "" is the access parameter of the message;
4. "" is the message sending time. According to the introduced assumption, the time of
sending and the time of receiving a message are considered equal;
5. "" is the informational message type. The field contains the information on a subset
to which the message belongs (according to equation (1));
6. " " is the informational message content;
7. "" is the sender agent digital signature, used as a basic measure to ensure data
dissemination process security.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Simulation</title>
      <sec id="sec-4-1">
        <title>4.1. Simulator Description</title>
        <p>To model the informational interaction between agents in a Smart Factory we developed a
custom software simulator using Python 3 programming language and the IDE PyCharm Edu
2019.3.2 environment. Python was chosen as the main tool by the reason that it provides free
public libraries for developing function-oriented programs, working with diferent file formats,
and allows to obtain and analyze statistics. As the basis, csv – File Reading and writing and
matplotlib libraries were used. The first one allows to parse *.csv format files and modify it, the
second was used to generate statistical plots. All basic operations conducted in the informational
space were described by particular functions.</p>
        <p>All agents introduced in Section 3 are described by csv-format strings. The first field contains
the agent’s ID, the second - agent’s access level. The informational space is also presented as a
csv-format file, where each string is a particular informational message that consists of the field
described in Subsection 3.4. The realization of an agents’ list and the informational space is
conditioned by the need to have the access to the concrete fields and the easy use of the *.csv
format.</p>
        <p>As the Python language uses Global Interpreter Lock (GIL) and allows the only thread to
manage the Python interpreter, it is impossible to implement a multi-thread paradigm. To
overcome this limitation, we developed a simulator of information interaction as the console
program providing the interface to perform informational space operations on behalf of the
Smart Factory agents during an infinite main cycle.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Available actions in the simulator</title>
        <p>The developed simulator provides the following functions:
• To transmit the informational message from agent  to agent . Sender and receiver IDs
and the message access parameter have to be entered manually. Otherwise, auto mode
can be chosen. The program writes the message to the related csv-format file.
• Message generation. A particular number of messages can be generated manually (with
randomly chosen agents’ IDs and the content) and written to the informational space.
• Message search. The message search with the use of known interacted agents’ IDs and the
time when the message was sent can be performed manually. In this case, the condition
when the access level must be higher than the access parameter is not considered, as we
assume that this action is performed manually.</p>
        <p>It is also possible to perform operations from the side of the agent directly. The operator
needs to call the corresponding function and choose an ID of the desired agent. The following
functions are accessible in this mode:
• reading chosen messages. This option is similar to “Message search” function described
earlier, but the access condition is mandatory. In this case, the agent does not have access
rights to the message, and cannot read it;</p>
        <p>• send a message. This function is similar to the function described earlier.</p>
        <p>The scalability of the system is provided by a function that adds new agents with the chosen
access level. The added agent and its access level are written to the csv-file. Statistics and plots
generating functions include the possibility of building two- and three-dimensional spaces. An
example of plots generated by these functions is illustrated in Fig. 4.</p>
        <p>In the current moment, the mechanism of a digital signature is not yet implemented in the
simulator. The main dificulty of the implementation is to develop the mechanism for storing
private and public keys and their use by the agents.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Results</title>
        <p>The developed simulator demo-test showed that the model described in Section 3 is viable, and it
is possible to implement it in production systems or digital twins of Smart Factory. The proposed
interaction model provides basic measures to protect data and increase the information security
level. The accuracy and eficiency of the model have not verified yet, as in this paper we were
focused on the models’ formalization and demonstration of their implementation in a software
simulation environment possibility. In the next step, we will outline eficiency and security
metrics, provide experiments design, and conduct an empirical study to assess the proposed
mechanisms via a developed software simulator.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The Smart Factory is considered to be a vital part of Industry 4.0 development and evolution.
At the current moment, it is treated as a fully autonomous and self-organized manufacturing
system that aimed to reduce the human factor influence on the production process. It brings a
wide list of topics to be discussed. The rapid development of the Smart Factory concept arises
the need to provide safe and secure interaction among system elements. To address this issue,
in the present paper we proposed an informational space concept that allows implementing
our developed model of the informational messages for communication among Smart Factory
elements. The informational interaction custom software simulator was developed, the results
showed that the presented interaction concept is viable and can be implemented in practice.</p>
      <p>In further work, we plan to analyze simulation results on communication speed and security
and assess the approach information security aspects.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This paper is supported by the Government of Russian Federation (grant 08-08).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mussomeli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Laaper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hartigan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sniderman</surname>
          </string-name>
          ,
          <article-title>The smart factory-responsive, adaptive, connected manufacturing</article-title>
          .
          <source>deloitte insights</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Rajkumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stankovic</surname>
          </string-name>
          ,
          <article-title>Cyber-physical systems: the next computing revolution</article-title>
          , in: Design automation conference, IEEE,
          <year>2010</year>
          , pp.
          <fpage>731</fpage>
          -
          <lpage>736</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Pozdneev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sutyagin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Kupriyanenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tikhomirova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Levchenko</surname>
          </string-name>
          ,
          <article-title>New horizons of standardization in the age of digital education and manufacturing</article-title>
          , Vestn. Mosk. Gos. Tekhnol. Univ.,
          <string-name>
            <surname>Stankin</surname>
          </string-name>
          (
          <year>2015</year>
          )
          <fpage>35</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. Zhang,</surname>
          </string-name>
          <article-title>Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination</article-title>
          ,
          <source>Computer Networks</source>
          <volume>101</volume>
          (
          <year>2016</year>
          )
          <fpage>158</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Harrison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Vera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          , Engineering the smart factory,
          <source>Chinese Journal of Mechanical Engineering</source>
          <volume>29</volume>
          (
          <year>2016</year>
          )
          <fpage>1046</fpage>
          -
          <lpage>1051</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chehri</surname>
          </string-name>
          , G. Jeon,
          <article-title>Routing protocol in the industrial internet of things for smart factory monitoring</article-title>
          ,
          <source>in: Innovation in Medicine and Healthcare Systems, and Multimedia</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>505</fpage>
          -
          <lpage>515</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>Survey on industrial wireless network technologies for smart factory</article-title>
          ,
          <source>Journal of Platform Technology</source>
          <volume>4</volume>
          (
          <year>2016</year>
          )
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>