TECHNOLOGY OF SEMANTIC TRANSFORMATION OF INFORMATION MESSAGES IN THE INDUSTRIAL INTERNET OF THINGS ENVIRONMENT
DOI:
https://doi.org/10.26906/SUNZ.2025.4.195Keywords:
industrial Internet of Things, semantic transformation, heterogeneous gateway, IIoT protocol, interoperabilityAbstract
The relevance of the research is the development and implementation of the technology of semantic transformation of information messages, which will increase the efficiency of data processing and promote the development of intelligent industrial process control systems. The purpose of the research: the development of the technology of semantic transformation of information messages in the industrial Internet of Things environment, which provides a consistent representation, interpretation and exchange of data between heterogeneous devices and systems. Results. The article proposes the architecture of a heterogeneous gateway for the industrial Internet of Things. The possibility of implementing the technology of a semantic gateway, which solves the problems of interaction of various applied technologies at the metadata level, is proven. In a heterogeneous environment, such a gateway is responsible for the transformation of industrial Internet of Things protocols. An analysis of data transmission protocols used in IIoT networks for the purpose of semantic transformation is carried out. Conclusion. The proposed approach allows to increase the level of interoperability, reduce information losses during message transmission, and create a basis for building intelligent data processing services in industrial cyber-physical systems.Downloads
References
1. Yang, X., Huang, J., Ao, F. and Yin, J. (2023), “Ontology-based Semantic Data Model for Command and Control”, 2023 9th Int. Conf. on Big Data and Inf. Analytics Bigdia Proc., pp. 330–335, doi: https://doi.org/10.1109/BigDIA60676.2023.10429478
2. Chalapathi, G.S.S., Chamola, V., Vaish, A. and Buyya, R. (2022), “Industrial internet of things (Iiot) applications of edge and fog computing: A review and future directions”, Advances in Information Security, vol. 83, pp. 293–325, doi: https://doi.org/10.1007/978-3-030-57328-7_12
3. Zuev, A., Karaman, D. and Olshevskiy, A. (2023), “Wireless sensor synchronization method for monitoring short-term events”, Advanced Information Systems, vol. 7, no. 4, pp. 33–40, doi: https://doi.org/10.20998/2522-9052.2023.4.04
4. Gramoli, V. (2020), “From blockchain consensus back to Byzantine consensus”, Future Generation Computer Systems, vol. 107, pp.760–769, doi: https://doi.org/10.1016/j.future.2017.09.023
5. Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3
6. Kuchuk, H. and Malokhvii, E. (2024), “Integration of IOT with Cloud, Fog, and Edge Computing: A Review”, Advanced Information Systems, vol. 8(2), pp. 65–78, doi: https://doi.org/10.20998/2522-9052.2024.2.08
7. Decker, C. and Wattenhofer, R. (2014), “Bitcoin transaction malleability and MtGox”, European symposium on research in computer security, pp. 313–326, doi: https://doi.org/10.1007/978-3-319-11212-1_18
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Serhii Pyrozhenko, Serhii Datsenko

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.