Abstract
Industry 4.0 is reshaping conventional factories into “smart factories” via the widespread use of IoT-enabled networks of linked devices, sensors, and software for process optimization and monitoring. Intelligent manufacturing facilities may employ IoT-based predictive maintenance to reduce downtime, increase equipment longevity, and avoid machine problems. Manufacturers may get real-time insights into energy consumption patterns, which is a major concern in the business. The primary objective is to optimize energy use during part manufacturing. Hence, this paper proposes the Internet of Things- Low-Power Wide-Area Network Model (IoT-LPWM) to monitor manufacturing and reduce energy consumption. The proposed method's production status component uses visual Knowledge Map Analysis loaded with data from the edge device. A Low-power wide-area network (LPWAN) is the fundamental component of the suggested approach to industrial wireless communication. Using edge computing technology in LPWAN helps reduce computational complexity by shifting high-intensity processing to the periphery, where devices with computing resources are more readily available. Both the energy needed to process and store massive data and the likelihood of cyberattacks may be decreased with this method. The experimental results show that the IoT-LPWM provides useful information to help them make decisions and reduce energy consumption. The experimental results show that our proposed method IoT-LPWM achieves a high performance ratio of 97%, attack prevention ratio of 96.3%, energy management ratio of 93.8%, and data transmission ratio of 98.1% compared to other methods.
Significance of industrial internet of things (IIoT) for smart manufacturing
Intelligent factories are an integral feature of Industry 4.0, the fourth industrial revolution, which aims to improve manufacturing efficiency. 1 Internet of Things (IoT), artificial intelligence (AI), and robots are some of the state-of-the-art technologies that are being integrated into industrial processes as part of Industry 4.0 to boost efficiency and adaptability. 2 A “smart factory” in the context of Industry 4.0 is a completely automated manufacturing facility that utilizes state-of-the-art technologies such as robotics, AI, and the IoT to improve quality, efficiency, and productivity. 3 A “smart factory” is a manufacturing facility with integrated digital technology to maximize output while decreasing waste. 4 Smart factories can streamline production processes and increase operational efficiency by utilizing cutting-edge technology like the IoT, artificial intelligence (AI), and robots. 5 An Industry 4.0 smart factory aims to facilitate real-time monitoring, analysis, and decision-making via networked and communicative machinery and equipment. 6 In this manner, factories may streamline their operations, cut down on emissions, and be more adaptable to meet the needs of a dynamic market. 7 To facilitate digital transformation in manufacturing and help businesses run more efficiently, cheaply, and sustainably, the Internet of Things (IoT) has lately been integrated into smart factories. 8 Smart factories are becoming more commonplace because of the Internet of Things. In addition, the data is created from other sources, which are then combined and layered. 9 Conventional big data analytics approaches have several drawbacks when dealing with large and complicated data sets, including excessive energy consumption, inconsistent latency, insufficient data fusion, and inadequate security. 10 The Internet of Things (IoT) and edge computing are crucial enabling technologies in the modern industrial environment since sensors are the primary data source. 11 To improve data transfer and the performance of applications that need real-time processing, edge computing enables computation to be executed near physical devices. 12
The business world necessitates a data connection system with enough real-time processing capacity, reliability, stability, and fault tolerance to access the hidden information therein. 13 Edge devices have become more potent concerning processing speed, memory capacity, and the number of embedded functionality. As a result, it now offers safe, low-energy, and latency-sensitive application support by moving data, application, and processing power closer to the user. 14 The capacity to learn and find new things based on big data and each other is present at every edge of this IoT ecosystem. 15
Processing and analyzing enormous applications at the edge allows for the computation of difficult tasks in almost no time. Artificial intelligence (AI) applications may be trained and deployed at the edge because of the massive data collection. An artificial intelligence (AI) application for production planning processes data sent by the machine's Numerical Control Unit (NCU) to a cloud platform. Moving away from preventative maintenance and toward predictive techniques has been made possible by the massive amounts of data lately available. Visual Knowledge map analysis allows edge intelligence called predictive analytics and production statistics created from subsets of the acquired data rather than the complete datasets as needed and desired. Visual knowledge maps are increasingly used in business to help with data collection, allowing quicker and more accurate development of AI systems. Visual Knowledge maps are very useful in building engineering for making incremental improvements. A system for tracking a machine's actions has been implemented using a set of concepts.
Industrial environments, including manufacturing lines, robots, and CNC machines, provide smart sensors with the raw data they need to gather. Smart sensors combine and pre-process data in several dimensions. Smart gateways then take the pre-processed data and use it to ascertain the knowledge of the smart sensors and industrial environment. At last, the data undergoes processing before being sent to the cloud. This ensures that only the crucial processed information is posted. The architecture is an information system because of the Visual Knowledge map chains that run through it. According to this method, the computation and data-communication capabilities of LPWAN and edge devices have been fully realized. Consequently, the intelligent factory might have more explicable results, and the monitored parts of a cyber-physical production system could gain more knowledge from a mix of semantic technologies and data-driven AI methodologies.
The novelty of the paper:
The study presents the IoT-LPWM as a unique industrial monitoring and energy-saving method. This method increases industrial wireless communication using edge computing and LPWAN. Edge device data makes Visual Knowledge Map Analysis stand out for providing decision-makers with full visual insights into production. The approach simplifies processing by moving computationally demanding jobs to the edge, where computer resources are more abundant. This technology saves energy during production while processing and storing large data sets. Decentralized processing reduces cyberattacks, improving cybersecurity. Experimental results showed that the IoT-LPWM model may be used for energy-efficient factory monitoring in industrial IoT. The model reduces energy use and offers crucial decision-making data.
The main contribution of this paper:
Designing the proposed IoT-LPWM to monitor the manufacturing industry and reduce energy consumption. The proposed method utilizes visual knowledge map analysis and edge devices to provide real-time production status and store the data in the cloud platform. The numerical results and the proposed method IoT-LPWM have been performed to achieve a high-performance ratio compared to other methods.
The upcoming section is as follows: section 2 deliberates the related works, section 3 examines the proposed methodology, section 4 discusses the numerical analysis and Section 5 concludes the overall paperwork.
Innovative integrated method (IIM) to the q-rung ortho-pair fuzzy sets (q-ROFSs) multi-objective optimization based on ratio analysis plus completes multiplicative form (MULTIMOORA) and criterion interaction via inter-criteria correlation (CRITIC). 16 The suggested approach uses CRITIC to determine the weights of the attributes and MULTIMOORA to approximate the order of the alternatives on the q-ROFSs. Sensitivity and comparative studies are performed using the suggested method to demonstrate the created framework's capabilities in intelligent IIoT system prioritizing.
Non-orthogonal multiple Access (NOMA) and Mobile Edge Computing (MEC) have shown promise in handling delay-sensitive jobs inside the IIoT network. 17 Improving the task satisfaction ratio is the goal of creating a distributed DRL system that optimizes the choice of task offloading and sub-channel assignments to support the task offloading policy for binary computing. Based on the results of the simulations, the proposed prediction-based-DRL (P-DRL) method may outperform the current systems in terms of the task-satisfaction ratio.
The Efficient Heterogeneous Signcryption Scheme (EHSS) is a computing-based edge solution for the Industrial Internet of Things (IIoT) that allows for certificateless data transmission and multi-message/multi-receiver communication between edge servers and data consumers. 18 To provide confidentiality and immutability, our proposed technique satisfies the computational Diffie-Hellman criterion and the discrete logarithmic assumption for the randomised oracle model. The testing confirmed our theory, showing that our system is better than the current ones.
The decentralized partially observable Markov decision process (Dec-POMDP) and Dual dual-attention assisted deep reinforcement learning (DADR) algorithm is a novel energy-efficient resource allocation algorithm and it utilizes the centralized training and distributed executed (CTDE) framework to be able to provide constrained by resources nodes with the ability to make intelligent decisions. 19 Based on the simulation findings, the suggested DADR method achieves better network lifespan, transmission reliability, and stability than the current resource allocation algorithms.
Attribute-based searchable encrypted scheme (ASES) technique that combines online/offline encryption with outsourcing decryption, which uses a reusable ciphertext pool to lessen processing during encryption and makes use of an edge server to lower the cost for users with limited resources by outsourcing decryption. 20 An additional layer of protection for the solution may be implemented by having the designated server verify the cloud server in the accessible area. Lastly, performance and safety research has shown that our system is efficient and satisfies CCA2-secure.
A neutrosophic weighted product method (NWPM) based machine learning model (MLM) was used to determine the trustworthiness of IIoT objects. 21 The IIoT devices’ gathered geographical knowledge, temporal experience, and behavioural patterns and the resulting model determines the devices’ reliability. The model suggests neutropolic support vector machines (SVM) and neutrosophic K-NN clustering to categorize the retrieved attributes. The suggested neutrosophic SVM algorithm generates the final trust score and accurately identifies the trust boundaries.
The Federated Learning Method (FLM) aims to safeguard IoT networks from malicious assaults. 22 Every time FL training is finished, the global server updates the model and sends it to all IoT clients, who then train their local dataset. Each IoT device may preserve its privacy while the whole network improves. They conducted comprehensive testing using a novel dataset named Edge-IIoTset to determine the efficacy of the proposed method.
Efficient lightweight secure authentication scheme (ELSAS) for the viewpoint of IIoT with a focus on people. 23 The proposed method presupposes a registration centre and proposes an automated generation of a node's public and secret keys upon the first network connection. This method may reduce processing overhead and exponential computations while fixing possible vulnerabilities.
Combining the IIoTs with the IoT in the public sector has been a huge boon to the growth and development of Industry 4.0. Blockchain and Federated Learning for Intrusion Detection in Industrial Internet of Things Networks. 24 The FL-IDS strategies address the potential for attacks on IIoT systems and provide suggestions for securing them, showcasing the variety and complexity of approaches to handle security risks in IoT and IIoT settings.
Cognitive computing integrates ideas, methodologies, and technology from several fields. IoT applications allow physical and digital items to communicate. 25 Smart and secure IoT systems should be developed for dependability, resistance to threats, operational efficiency, energy efficiency, and resource usage. Cognitive computing embedded data solutions let specialists make decisions by processing and analyzing enormous quantities of data from secure IoT devices.
Proposed methodology
The IoT revolutionised manufacturing in the fourth industrial revolution, turning traditional factories into “smart factories” that optimize and monitor processes via interconnected devices, sensors, and software networks. A big issue for manufacturers is energy usage patterns; they may gain real-time insights into these trends. The main goal is maximizing energy consumption efficiency while making the parts. To keep tabs on production while cutting down on power use, this study put forth the IoT-LPWM model. Compiled using data from the edge device, the visual Knowledge Map Analysis is used by the production status component of the proposed technique. The proposed method for wireless communication in industrial settings relies on an LPWAN. By moving the processing of high-intensity tasks to the periphery, where devices with computing capacity are more accessible, edge computing technology in LPWAN helps to decrease computational complexity. This approach can reduce the energy requirements for managing and storing large amounts of data and the probability of cyberattacks. The experimental findings demonstrate that the IoT-LPWM offers valuable insights to assist decision-making and decrease energy use.
A physical segment low-power wide area network (LPWAN) part and a cloud section comprise the three primary components of the IIoT architecture shown in Figure 1. The key data sources in the physical segment are the many pieces of industrial machinery, such as computer numerical control (CNC) machines, industrial robots, and other industrial machines. The smart sensors of the LPWM division collect raw data from these several sources. The physical sector also includes crucial information systems.

Proposed IoT-LPWM.
Cloud and IoT-LPWM sections on the ground unearth information and knowledge, which is then delivered by these platforms. This structure is a component of the LPWAN. To compile raw data, the smart sensors communicate with the many pieces of industrial gear. The data collected by smart sensors that rely on embedded processors undergoes a preprocessing stage. The physical part receives low-level knowledge, such as system condition warning knowledge and the smart gateway receives the pre-processed data. Helping individuals make better decisions is what this is all about. Next, the pre-processed data is sent to the smart gateways for advanced data analytics tests, such as clustering, statistical regression, and classification. During processing, the data is more abstracted. The smart gates generate two separate types of information. An item of data about smart sensors allows for improving the software and hardware parameter settings of smart sensors.
On the other hand, the physical portion of the whole production system will include additional information. Data that has been processed is uploaded into the cloud under the framework established for IIoT. Integrated modelling and synthesis, collaborative diagnostics, and decision-making are all examples of high-level data analysis that may be carried out in the cloud. The Internet of Learning-based low-power wide area network (LPWM) may be improved using cloud-discovered information. The proposed IoT-LPWM, which includes intelligent sensors and gateways, is equipped with the capacity to learn from one another and the cloud. A further benefit of cloud computing is the discovery of artificial intelligence knowledge, which includes self-configuration, self-adjustment, and self-optimization.
The knowledge map analysis is found and flows across smart sensors and gateways in a suggested LPWM network, considering each edge's computational capabilities. Cloud computing and many knowledge chains are part of the proposed system. What follows is an examination of these knowledge networks’ finer points.
The following is a representation of the smart sensors that gather raw data from the physical section (1):
The main information (Knowledge V)
Figure 2 illustrates the required knowledge graphs based on the IIoT network security system. The presented framework is compatible with energy efficiency regarding structure and requirements. Data technology, analytics technology, and operation technology are the three main components of the LPWM architecture. Levels one through four of the five functional categories are sensor connection, cyber, cognitive, and configuration. The smart sensors in the proposed system have defined their roles in sensor connection and data-to-information conversion. Here, edge devices’ data-gathering and processing skills shine. Fast data transmission rate, low latency, high dependability, preprocessing capability, and visualization capabilities are anticipated attributes of data and analytical technologies. The suggested smart gates provide cyber-level services using analytical technologies.

Knowledge map analysis based on IIoT data security.
In addition, the cloud enables basic functions at the cognition and configuration levels—the intelligent and self-configuring manufacturing system. Operation technology is used for intelligent optimization and corporate management to uncover hidden patterns via knowledge map analysis. These graphs pertain to the security of the network. When it comes to maintaining the network security of the IIoT, it is beneficial to determine the extent of the damage caused by network attacks and install and concentrate on preventing potentially damaging network assaults in advance. However, it is important to consider which factors might be included in addition to the kinds of assaults to estimate the degree of injury more precisely. Various types of attacks cause varying degrees of damage.
This application aims to provide an easy-to-understand evaluation of the production status and details on the state of the industry's important equipment pieces. The component's general design is shown in Figure 3.

Industrial production Status assessment.
The program uses a MQTT broker to get information from the online platform. Once the knowledge graph is generated, the context builder module stores and semantically correlates the data. Concerning the specifics, the experts’ established rules govern how the context builder generates nodes and their connections. At first, the users had to manually enter the historical data into the Knowledge map analysis (KMA). Nonetheless, the context builder dynamically stores the real-time data and the outcomes from the condition assessment and maintenance forecasting component in the KMA.
Furthermore, the Cypher programming language implements the connections among the features. In the next step, the evaluation module checks the KM data and gives the user feedback on the current production state. The program has always relied on a client-server model. They built the front end using the React JavaScript toolkit for building user interfaces. With Flask and Python, the backend side was built. Web platforms and REST API communication protocols were used to establish data connections between clients and servers.

IoT-LPWM-based energy efficiency management.
An assertion that the Internet of Things (IoT) would make businesses more efficient is supported by some preliminary data. The concept that machinery, automobiles, and other real-world components may be digitized is potent. At this early point, the Industrial Internet of Things is beginning to have a major influence by altering how it is manufactured and delivered, as well as h and The IIoT can start functioning at its full potential, provided legislative steps are taken to promote interoperability, guarantee security, and safeguard privacy and property rights. This is particularly true if leaders fully embrace data-driven decision-making. Systems that are really in existence and are referred to as WSN feature communication capabilities, information and control processing, and monitoring of sensors.
Creating a network that connects several sensors placed with the central area node and transmits information to process it is the second component of the Industrial Internet of Things (IIoT).
Additionally, this central node is responsible for controlling the various settings of sensor devices and ensuring that connectivity with the cloud is maintained. The mode of operation functions as a gateway, or more specifically, a communication bridge between various sensor devices and the cloud-based system.
The cloud, the central system, and the control room comprise the third segment according to setup resources or offer any data. The cloud is an online infrastructure often situated on the Internet. It enables universal access to a shared point that can be used for any purpose. After that, the central processing system stores all of the information in a database and processes it using big data methods, yet another technology has emerged due to the paradigm shift toward smart societies and industries. All pertinent information is reviewed from the central control room, and as a result, suitable judgments are made.
To obtain a true self-power behaviour that is close to the eternal operation, the design and operation of Very Low Power are performed. The capacity to scale and handle large networks enables monitoring of different construction situations. The cost of the nodes is quite cheap, which makes it possible to install them at a reasonable price even for large-scale structures. • Interfaces that are standardized to enable coexistence and cooperation with any systems that are already in place.
IoT-LPWM integrates LPWAN with edge computing for industrial monitoring and energy savings, making it unique. It moves high-intensity processing to edge devices, simplifying and saving energy. Unlike other systems, the model uses Visual Knowledge Map Analysis to improve production insights. By reducing cyberattack risk, its decentralized approach improves cybersecurity. This makes the IoT-LPWM approach more efficient, safe, and insightful than existing industrial IoT techniques.
Performance measurements like latency, energy usage, and data throughput across deployment situations may help us examine this. Controlled trials and simulations in various industrial contexts may verify the model's efficiency and scalability. Using statistical techniques to compare the IoT-LPWM concept against centralized alternatives can quantify its energy savings and cybersecurity benefits. The model's generalizability across industrial applications is confirmed by this thorough research, which shows that the reported advantages are not context-specific.
With the advent of Industry 4.0, IIoT has become an essential technology. Wireless communication technology that is well-suited to industrial settings is LPWAN, which can cover a vast area with little power usage. This study has focused on learning to make the most of the IIoT network, which consists of network nodes and edge devices. An analysis of relevant studies revealed that edge devices and LPWAN had substantial computation and data communication capabilities. The suggested IOT-LPWM architecture takes advantage of all nodes in the network to provide useful data and insights. The interchange of information and knowledge map analysis between gateways and edge devices enhances the system's performance. Knowledge Map Analysis (KMA) gained from the suggested IoT-LPWM technique enhanced smart sensors and gateways, and data was gathered for various uses. Models were built in the cloud using machine learning and deep learning data analytics techniques. The findings aid pertinent experts in comprehending the system and predictively keeping the vital component.
The IoT-LPWM model's logical assessment criteria are based on measurements examining its industrial effectiveness. Real-time performance evaluation and data processing depend on latency. Integrating edge computing with LPWAN reduces energy usage, and Energy Consumption quantifies the model's efficiency. Data Throughput evaluates the network's data handling and transmission capability to ensure reliable operation. Finally, computing Complexity measures how successfully the model distributes processing workloads between edge devices and central servers, reducing central system computing load. These criteria objectively evaluate the model's performance, efficiency, and scalability.
Dataset Description:
Machine-learning intrusion detection systems may train their models in a centralized or federated manner. Edge-IIoTset, a realistic IoT and IIoT cyber security dataset, addresses this. To address IIoT and IoT demands, new technologies are suggested at each tier. After processing and analyzing the realistic cyber security dataset, do a major exploratory data analysis and evaluate ML approaches in federated and centralized learning.
25
Figure 5 deliberates the energy management ratio based on equation 1. In this era of Industry 4.0, the IoT is one of the essential technologies. The current crop of edge devices has powerful computational capabilities that can handle complex data sets. Because of its large coverage area and low power consumption, LPWAN is an ideal wireless communication technology for industrial settings. This article investigates the IIoT network's entire potential, comprising network and edge devices. A data and knowledge architecture was proposed after reviewing pertinent research demonstrating the significant processing and data-communication capabilities of LPWAN and edge devices. All nodes in the network would contribute to the development of useful data and insights under the proposed design. Interactions between gateways and edge devices allow data and knowledge exchange, improving the system's performance. Data is gathered for various reasons, and the information gained from the Internet of Things lightweight power wavelength (LPWM) strategy is used to enhance the functionality of smart sensors and gateways.

Energy management ratio (%).
This condition monitoring and predictive maintenance component allows frequent time-based or event-based assessments of data obtained from assets’ sensors. When considering the Condition Monitoring & Predictive Maintenance component, it is necessary to analyze sensed data streams. One of the primary goals here is to determine the current status of technical equipment by constantly monitoring data streams from several sensors. Things like unusual actions taken by technological devices and the subsequent categorization of their current situation could fall under this category. The typical workflow aids with data collecting, pre-processing, AI technique setup, and post-processing.
Figure 6 explores the data transmission rate using equation 6. The user may insert nodes and connect them using edges. With smart devices, it is feasible to link the condition monitoring and predictive maintenance components to possibilities for heterogeneous data collecting. This way, a gadget may send out sensory data that has already been processed or is of a certain quality. Sensor data output is configuration-dependent and must be matched with an analysis flow. The edge device's data is in JSON format and it is possible to receive JSON configuration data, modify it, store it, and then send it back to the edge device. The edge device will reconfigure and transmit the updated sensory data using the specified parameters when pushed. While the administration view does let users conduct the JSON configuration, it does not understand or map its information. This method alleviates data integration conflicts, allowing diverse heterogeneous edge devices to be maintained.

Data transmission rate (%).

Performance ratio (%).
Figure 7 shows the performance ratio (%) through equation 5. An assessment of the current production status is a part of the planned Industrial Internet of Things system for predictive maintenance and condition monitoring. The cloud platform accepts data from various field devices via a high-performance gateway. Specifically intended to assist and allow predictive maintenance and ease the production status assessment, the core system board provides various instruments such as vibration, acceleration, and gyroscope information. To gain access to the intelligent data before it is circulated to the platform, the device performs a transformation in the frequency domain on the data that has been acquired. The MQTT protocol is used to communicate between the device and the platform.
The industrial knowledge map offers a graphical and sharable design for depicting manufacturing information. It benefits the integration and exchange of production information to enable intelligent applications. Collaborative construction of the knowledge graph is beneficial for gathering knowledge from various sources, including current data models, existing technical publications, websites, human experts, historical application records, etc.
Figure 8 expresses the Attack Prevention Ratio (%) based on Equation 2. This graph-based knowledge base lends a hand to the LPWAN's edge computing technologies, facilitating the distribution of heavy computing loads to the network's periphery and the semantic matching of industrial services. This allows for the integration of the computing resources of edge devices, which in turn reduces the computational complexity in the central. Not only does it lessen the energy used in processing and storing large amounts of data, it also lessens the likelihood of cyberattacks. In addition, the framework that has been developed allows for the discovery and generation of information and knowledge from many components of the system. These components include smart sensors, smart gateways, and the cloud. With this structure, it is possible to construct a ubiquitous knowledge network to enhance all the devices that are part of the system.

Attack prevention ratio (%).
Experimental findings show that the suggested IoT-LPWM approach improves industrial monitoring and reduces energy usage. LPWAN and edge computing successfully optimized industrial wireless communication, reducing computational complexity. Clear and actionable insights from Visual Knowledge Map Analysis improved decision-making. Energy efficiency was achieved by shifting high-intensity processing to edge devices, reducing data processing and storage energy. Due to its decentralized nature, the IoT-LPWM paradigm lowered cyberattack risk and improved industrial communication network security. These findings demonstrate that the IoT-LPWM model may educate decision-makers and dramatically reduce industrial energy use. This validation underscores the model's pioneering position in industrial IoT, providing a holistic approach to energy-efficient and secure factory monitoring.
The IoT-LPWM model's flexible design allows experimental findings to be used in various industrial settings, independent of size or needs. LPWAN's broad coverage and dependable connectivity are vital in many production environments. The edge computing component may be tweaked to use the network's peripheral devices’ processing capacity to offload computationally heavy activities. Visual Knowledge Map Analysis's data-agnostic nature makes it ideal for evaluating many industrial data sources. The model's cybersecurity and energy-saving solutions may benefit any industry. The IoT-LPWM architecture's scalability and flexibility should allow other industrial settings to repeat the trials’ excellent outcomes, assuming the underlying infrastructure supports edge computing and LPWAN integration.
The integration of LPWAN and edge computing complicates the IoT-LPWM paradigm, requiring extensive network components and edge device synchronization. The paradigm moves high-intensity computing workloads to the edge, requiring durable edge devices with enough processing and storage. This dispersion decreases central server demand but complicates data flow management and real-time processing over a dispersed network. Using Visual Knowledge Map Analysis involves sophisticated data analytics and visualization technologies, significantly complicating the system. The approach is technically difficult yet efficient and secure due to the necessity for LPWAN and edge computing infrastructure interoperability and cybersecurity.
Conclusion
The Internet of Industrialized Things (IIoT) is becoming a game-changer thanks to the rise of Industry 4.0. The low-power wide-area network (LPWAN) is perfect for factories and other industrial settings since it can cover much ground with less power. Maximizing the IIoT network's potential has been the primary goal of this research. The network comprises both nodes and edge devices. Research on LPWAN and edge devices found they could communicate and compute data. The suggested IOT-LPWM architecture maximizes the network's performance by fully utilising each node. The overall system performance is improved when data is shared and analyzed via knowledge maps between gateways and edge devices. The proposed IoT-LPWM method improved smart sensors and gateways, and data is collected for several purposes using Knowledge Map Analysis (KMA). State-of-the-art data analytics techniques like deep learning and machine learning were used to construct working models in the cloud.
To sum up, this approach is data-driven, which means it has room for improvement to support a wider range of industrial operations than those covered here. The experimental results show that our proposed method IoT-LPWM achieves a high performance ratio of 97%, attack prevention ratio of 96.3%, energy management ratio of 93.8%, and data transmission ratio of 98.1% compared to other methods. The IoT-LPWM approach has issues but shows promise. A key drawback is the dependency on powerful edge devices, which may not be accessible in all industrial settings. Professional expertise and significant upfront costs may be needed to set up and integrate LPWAN with existing systems. The model's applicability and scalability to industrial settings must be improved in future studies.
Footnotes
Funding
This work was supported by (Research on Digital Transformation Construction Guide for Future Factory of Cigarette Production (ZJZY2023F004)
Declaration of conflicting interests
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
