{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:38:34Z","timestamp":1760236714186,"version":"build-2065373602"},"reference-count":54,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T00:00:00Z","timestamp":1639958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for the ubiquitous control of industrial machines. As a PoC, the proposed system provides useful insights to support the further development of full-fledged systems for Industrial Internet of Things (IIoT) applications. The proposed system allows for the quasi-decentralisation of the control architecture of conventional programmable logic controller (PLC)-based industrial control systems (ICSs) through data and information exchange over the transmission control protocol and the internet protocol (TCP\/IP) suite using multiple agents. Based on the TCP\/IP suite, a network device (Samsung Galaxy Tablet S2) and a process field net (PROFINET) device (Siemens Simatic S7-1200) are interfaced using a single-board computer (Raspberry Pi 4). An override system mainly comprising emergency stop and acknowledge buttons is also configured using the single-board computer. The input signals from the override system are transmitted to the PROFINET device (i.e., the industrial control unit (ICU)) over TCP\/IP. A fully functional working prototype is realised as a PoC for an integrated system designated for the wireless and ubiquitous control of the CNC machine. The working prototype as an entity mainly comprises a mobile (handheld) touch-sensitive human-machine interface (HMI), a shielded single-board computer, and an override system, all fitted into a compact case with physical dimensions of 300 mm by 180 mm by 175 mm. To avert potential cyber attacks or threats to a reasonable extent and to guarantee the security of the PoC, a multi-factor authentication (MFA) including an administrative password and an IP address is implemented to control the access to the web-based ubiquitous HMI proffered by the PoC.<\/jats:p>","DOI":"10.3390\/info12120529","type":"journal-article","created":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T08:43:32Z","timestamp":1639989812000},"page":"529","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1300-0061","authenticated-orcid":false,"given":"Stefan A.","family":"Aebersold","sequence":"first","affiliation":[{"name":"Faculty of Arts, Science and Technology, Wrexham Glynd\u0175r University, Wrexham LL11 2AW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1164-5501","authenticated-orcid":false,"given":"Mobayode O.","family":"Akinsolu","sequence":"additional","affiliation":[{"name":"Faculty of Arts, Science and Technology, Wrexham Glynd\u0175r University, Wrexham LL11 2AW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3829-3278","authenticated-orcid":false,"given":"Shafiul","family":"Monir","sequence":"additional","affiliation":[{"name":"Faculty of Arts, Science and Technology, Wrexham Glynd\u0175r University, Wrexham LL11 2AW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8835-2331","authenticated-orcid":false,"given":"Martyn L.","family":"Jones","sequence":"additional","affiliation":[{"name":"Faculty of Arts, Science and Technology, Wrexham Glynd\u0175r University, Wrexham LL11 2AW, UK"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"key":"ref_1","first-page":"1474","article-title":"Digital Economy Is a Guarantee of Government and Society Development","volume":"20","author":"Mulaydinov","year":"2021","journal-title":"Ilkogr. Online"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSPEC.2019.8594798","article-title":"Spacex\u2019s space-internet woes: Despite technical glitches, the company plans to launch the first of nearly 12,000 satellites in 2019","volume":"56","author":"Foust","year":"2018","journal-title":"IEEE Spectr."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"L36","DOI":"10.3847\/2041-8213\/ab8016","article-title":"The low earth orbit satellite population and impacts of the SpaceX Starlink constellation","volume":"892","author":"McDowell","year":"2020","journal-title":"Astrophys. J. Lett."},{"key":"ref_4","unstructured":"Gralla, P. (1998). How the Internet Works, Que Publishing."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Weber, R.H., and Weber, R. (2010). Internet of Things, Springer.","DOI":"10.1007\/978-3-642-11710-7"},{"key":"ref_6","unstructured":"Wood, A.F., and Smith, M.J. (2004). Online Communication: Linking Technology, Identity, & Culture, Routledge."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"10827","DOI":"10.1109\/ACCESS.2020.2965259","article-title":"A model-driven mobile HMI framework (MMHF) for industrial control systems","volume":"8","author":"Qasim","year":"2020","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Misic, V.B., and Misic, J. (2014). Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications, CRC Press.","DOI":"10.1201\/b17141"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MC.2018.2876181","article-title":"Cyber-physical systems and digital twins in the industrial internet of things [cyber-physical systems]","volume":"51","author":"Koulamas","year":"2018","journal-title":"Computer"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/00207547908919600","article-title":"Concept of a manufacturing system","volume":"17","author":"Parnaby","year":"1979","journal-title":"Int. J. Prod. Res."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Shin, K.Y., Shin, N.H., Choi, S.W., and Choi, S.H. (2016, January 16\u201319). Systems engineering approach to designing smart condition monitoring systems for smart manufacturing (iccas 2016). Proceedings of the 2016 16th International Conference on Control, Automation and Systems (ICCAS), Gyeongju, Korea.","DOI":"10.1109\/ICCAS.2016.7832462"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Alhasnawi, B.N., Jasim, B.H., Sedhom, B.E., Hossain, E., and Guerrero, J.M. (2021). A New Decentralized Control Strategy of Microgrids in the Internet of Energy Paradigm. Energies, 14.","DOI":"10.3390\/en14082183"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Jost, J., Kirks, T., and M\u00e4ttig, B. (2017, January 2\u20133). Multi-agent systems for decentralized control and adaptive interaction between humans and machines for industrial environments. Proceedings of the 2017 7th IEEE International Conference on System Engineering and Technology (ICSET), Shah Alam, Malaysia.","DOI":"10.1109\/ICSEngT.2017.8123427"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3447","DOI":"10.1109\/TSG.2020.2970755","article-title":"Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid","volume":"11","author":"Wang","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_15","unstructured":"PROFIBUS & PROFINET International (2012). PROFINET System Description Technology and Application, PROFIBUS and PROFINET International."},{"key":"ref_16","unstructured":"Raspberry Pi Foundation (2019). Raspberry Pi 4 Computer MODEL B, Raspberry Pi Foundation. Available online: https:\/\/www.raspberrypi.com\/products\/raspberry-pi-4-model-b\/specifications\/."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MDAT.2016.2594178","article-title":"Cybersecurity for Control Systems: A Process-Aware Perspective","volume":"33","author":"Khorrami","year":"2016","journal-title":"IEEE Des. Test"},{"key":"ref_18","first-page":"19","article-title":"Cyber security in industry 4.0: The pitfalls of having hyperconnected systems","volume":"10","author":"Dawson","year":"2018","journal-title":"J. Strateg. Manag. Stud."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.ijpe.2019.01.004","article-title":"Industry 4.0 technologies: Implementation patterns in manufacturing companies","volume":"210","author":"Frank","year":"2019","journal-title":"Int. J. Prod. Econ."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Working Group on Centralized Substation Protection and Control, and IEEE Power System Relaying Committee (2016). Advancements in Centralized Protection and Control within a Substation. IEEE Trans. Power Deliv., 31, 1945\u20131952.","DOI":"10.1109\/TPWRD.2016.2528958"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Luejai, W. (2021, January 9\u201322). Automated Storage and Retrieval System using FIFO Method via PLC-integrated Human Machine Interface. Proceedings of the 2021 18th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Chiang Mai, Thailand.","DOI":"10.1109\/ECTI-CON51831.2021.9454823"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Brown, S. (1997). Functional safety of electrical machines and drives. 1997 Eighth International Conference on Electrical Machines and Drives, IET. Conf. Publ. No. 444.","DOI":"10.1049\/cp:19971092"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TIE.2014.2317456","article-title":"A data-driven process controller for energy-efficient variable-speed pump operation in the central cooling water system of marine vessels","volume":"62","author":"Giannoutsos","year":"2014","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/THMS.2013.2279006","article-title":"Toward nonconventional human\u2013machine interfaces for supervisory plant process monitoring","volume":"43","author":"Skripcak","year":"2013","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"ref_25","first-page":"201","article-title":"Design of Web Based Based Human Machine Interface (HMI) for Electric Tube Furnace","volume":"10","author":"Sinuraya","year":"2018","journal-title":"Int. J. Comput. Eng. Inf. Technol."},{"key":"ref_26","first-page":"6668843","article-title":"Web-Based Human-Machine Interfaces of Industrial Controllers in Single-Page Applications","volume":"2021","author":"Jeng","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.arcontrol.2008.03.004","article-title":"Decentralized control: An overview","volume":"32","author":"Bakule","year":"2008","journal-title":"Annu. Rev. Control"},{"key":"ref_28","first-page":"30","article-title":"Mobile HMI: Improves plant operations","volume":"63","author":"Clark","year":"2016","journal-title":"Control Eng."},{"key":"ref_29","unstructured":"(2021, October 04). ICONICS, MobileHMI, 2017. Available online: https:\/\/www.iconics-uk.com\/sites\/default\/files\/productbrochure\/MobileHMI_1.pdf."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The industrial internet of things (IIoT): An analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"106522","DOI":"10.1016\/j.compeleceng.2019.106522","article-title":"Industrial internet of things: Recent advances, enabling technologies and open challenges","volume":"81","author":"Khan","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_32","first-page":"723","article-title":"Exploiting siemens SIMATIC S7 PLCS","volume":"16","author":"Beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"ref_33","unstructured":"(2021, October 04). Siemens. SIMATIC Controller-Take Control of the Future, Available online: https:\/\/new.siemens.com\/global\/en\/products\/automation\/systems\/industrial\/plc.html."},{"key":"ref_34","unstructured":"(2021, October 04). Siemens. Remote Access to SIMATIC HMI Comfort Panels, Available online: https:\/\/cache.industry.siemens.com\/dl\/files\/153\/109476153\/att_1016758\/v3\/109476153_Remote_Panels_HTML_V16_DOC_en.pdf."},{"key":"ref_35","unstructured":"Morris, T.H., and Gao, W. (2013, January 16\u201317). Industrial control system cyber attacks. Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) 1, Leicester, UK."},{"key":"ref_36","unstructured":"Candell, R., Stouffer, K., and Anand, D. (2014, January 6\u20139). A cybersecurity testbed for industrial control systems. Proceedings of the 2014 Process Control and Safety Symposium, Houston, TX, USA."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Hogan, M., and Piccarreta, B. (2018). ; Interagency International Cybersecurity Standardization Working Group. Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT), National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.IR.8200"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","article-title":"Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning","volume":"9","author":"Sangodoyin","year":"2021","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"4362","DOI":"10.1109\/TII.2019.2891261","article-title":"Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data","volume":"15","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gupta, U. (2015). Application of Multi factor authentication in Internet of Things domain. arXiv.","DOI":"10.5120\/ijca2015905221"},{"key":"ref_41","unstructured":"Feng, X., Babatunde, O., and Liu, E. (2021, October 04). Cyber security investigation for Raspberry Pi devices. Int. Ref. J. Eng. Sci., Available online: https:\/\/uobrep.openrepository.com\/handle\/10547\/622090."},{"key":"ref_42","unstructured":"Electronics, S. (2021, October 04). Samsung Galaxy S2 Tablet: User Manual. Available online: https:\/\/www.samsung.com\/uk\/support\/model\/SM-T810NZKEBTU\/#downloads."},{"key":"ref_43","unstructured":"Richardson, M., and Wallace, S. (2012). Getting Started with Raspberry PI, O\u2019Reilly Media, Inc."},{"key":"ref_44","unstructured":"Netgear Inc. (2021, October 04). Datsheet 300 Series-Plus Gigabit Ethernet Switches. Available online: https:\/\/www.netgear.com\/images\/datasheet\/switches\/GS305E_GS308E_DS.pdf."},{"key":"ref_45","unstructured":"Berger, H. (2013). Automating with SIMATIC S7-1200: Configuring, Programming and Testing with STEP 7 Basic, John Wiley & Sons."},{"key":"ref_46","unstructured":"Siemens (2015). SIMATIC S7-1200 Easy Book: Device Manual, Siemens."},{"key":"ref_47","unstructured":"Fritz Studer AG (2021, October 04). S33. Available online: https:\/\/cdn.studer.com\/fileadmin\/content_live_2019\/www.studer.com\/01_pdf\/01_brochures\/englisch\/s33-brochure_studer_en.pdf."},{"key":"ref_48","unstructured":"FANUC CORPORATION (2021, October 04). Fanuc Series Oi-Model F. Available online: https:\/\/www.fanuc.co.jp\/en\/product\/cnc\/fs_0i-fplus.html."},{"key":"ref_49","unstructured":"Raspberry Pi Foundation (2019). Datasheet: Raspberry Pi 4 MODEL B, Raspberry Pi Foundation."},{"key":"ref_50","unstructured":"Spring, J., Nelson, D., and Lu, X.Y. (2018). CACC Truck Instrumentation and Software Development, Institute of Transportation Studies at UC Berkeley. Technical Report."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wang, L., Mahulea, C., J\u00falvez, J., and Silva, M. (2010, January 15\u201317). Minimum-time control for structurally persistent continuous Petri Nets. Proceedings of the 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, USA.","DOI":"10.1109\/CDC.2010.5717999"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TASE.2019.2909043","article-title":"RFID-Driven Energy-Efficient Control Approach of CNC Machine Tools Using Deep Belief Networks","volume":"17","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"3256","DOI":"10.1109\/TPWRD.2018.2852942","article-title":"Switching Control of GSC of DFIGWTs for Disturbance Rejection Based on Bang\u2013Bang Control","volume":"33","author":"Liu","year":"2018","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_54","unstructured":"O\u2019Brien, R. (2006, January 5\u20137). Bang-bang control for type-2 systems. Proceedings of the 2006 Proceeding of the Thirty-Eighth Southeastern Symposium on System Theory, Cookeville, TN, USA."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/12\/529\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:52:22Z","timestamp":1760169142000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/12\/529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,20]]},"references-count":54,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["info12120529"],"URL":"https:\/\/doi.org\/10.3390\/info12120529","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2021,12,20]]}}}