Academia.eduAcademia.edu

D6.3 Final Evaluation and Validation

2023, Zenodo (CERN European Organization for Nuclear Research)

This deliverable provides the achieved results in the deployment of PoCs and Demos for the different trials, including the technical validation of iNGENIOUS use cases. It follows the plan defined in D6.1-Initial Planning for Testbeds and the setup and development and integration activities defined in D6.2 PoC Development, Platform and Test-bed Integration.

Grant Agreement No.: 957216 Call: H2020-ICT-2018-2020 Topic: ICT-56-2020 Type of action: RIA D6.3 Final Evaluation and Validation Revision: v.1.0 Work package WP6 Task Task 6.3 Trials and validation Due date 31/03/2023 Submission date 31/03/2023 Deliverable lead COSSP Version 1.0 Authors Carla San Miguel (COSSP), Chiara Iorfida(COSSP), Jose Boix (COSSP), Pablo Ferrer (COSSP), Pedro Pérez (COSSP), Christos Politis (SES), Alexandr Tardo (CNIT), Ivo Bizon Franco de Almeida (TUD), José Luis Cárcel (FV), Joan Meseguer (FV), Giacomo Bernini (NXW), Pietro Piscione (NXW), Erin E. Seder (NXW), Miguel Cantero (5CMM), Manuel Fuentes (5CMM), Miriam Ortiz (5CMM), Héctor Donat (5CMM) Nuria Molner (UPV), Francisco Javier Curieses (UPV), Raúl Lozano (UPV), Iván Viciedo (UPV), David Gomez-Barquero (UPV), Nuria Oyaga de Frutos (NOK), Clemens Saur (NCG), Carsten Weinhold (BI), Laura Gonzalez Estebanez (ASTI), Rodrigo Martinez (ASTI), Joe Cahill (iDR), Shane Bunyan (iDR), Eddy Higgin(iDR), Jose Costa-Requena (CMC) Reviewers Alexandr Tardo (CNIT), Nuria Molner (UPV), David Gomez-Barquero (UPV), Francisco Javier Curieses (UPV), Raúl Lozano (UPV), Iván Viciedo (UPV), Carsten Weinhold (BI), Christos Politis (SES), Efstathios Katranaras (SEQ), Pablo Ferrer iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) (COSSP), Chiara Iorfida (COSSP), Carla San Miguel (COSSP) Abstract This deliverable provides the achieved results in the deployment of PoCs and Demos for the different trials, including the technical validation of iNGENIOUS use cases. It follows the plan defined in D6.1 – Initial Planning for Testbeds and the setup and development and integration activities defined in D6.2 PoC Development, Platform and Test-bed Integration. Keywords PoCs, Demos, Trials, Test Cases, Set-up, Execution, KPIs, Impact Assessment, Lessons Learned and Potential improvement Disclaimer The information, documentation and figures available in this deliverable are written by the "Next-Generation IoT solutions for the universal supply chain" (iNGENIOUS) project’s consortium under EC grant agreement 957216 and do not necessarily reflect the views of the European Commission. The European Commission is not liable for any use that may be made of the information contained herein. Copyright notice © 2020 - 2023 iNGENIOUS Consortium Project co-funded by the European Commission in the H2020 Programme Nature of the deliverable: DEM Dissemination Level ✓ PU Public, fully open, e.g. web CL Classified, information as referred to in Commission Decision 2001/844/EC CO Confidential to iNGENIOUS project and Commission Services * R: Document, report (excluding the periodic and final reports) DEM: Demonstrator, pilot, prototype, plan designs DEC: Websites, patents filing, press & media actions, videos, etc. OTHER: Software, technical diagram, etc. © 2020-2023 iNGENIOUS Page 2 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Executive Summary The present document is the output of Task 6.3 Trials and Validation and describes the measurement campaigns and trials developed in iNGENIOUS Proof of Concept (PoCs) and Demonstrations (Demos). Once detailed the objectives of the PoCs and Demos, the setup and execution activities for the validation and demonstration are presented, as well as possible issues occurred during the execution and mitigation actions adopted. Then, the validation and results presentation are described following the test case verification and KPI calculation. Finally, the deliverable summarizes the impact assessment, lessons learned and potential improvements on a technical level for trials and testbeds. © 2020-2023 iNGENIOUS Page 3 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Table of Contents 1 Introduction ......................................................................................................... 17 2 PoC - Automated Robots with Heterogeneous Networks .................. 19 3 PoC - Transportation Platforms Health Monitoring .............................. 33 4 Demo – Situational Understanding in Smart Logistics Scenario ..... 45 5 Demo – Improved Drivers’ Safety with MR and Haptic Solutions .... 66 6 Demo – Intermodal Asset Tracking via IoT and Satellite .................... 76 7 PoC - Supply Chain Ecosystem Integration ............................................. 98 8 Additional Research Activities – Satellite Direct Access .................... 113 9 Conclusion ......................................................................................................... 120 References ......................................................................................................................... 123 Annex I: Factory UC - Automated Robots with Heterogeneous Networks124 Annex II: Transport UC - Transportation Platforms Health Monitoring ...... 138 Annex III: Port Entrance UC - Situational Understanding in Smart Logistics Scenario ............................................................................................................................. 148 Annex IV: AGV’s UC - Improved Drivers’ Safety with MR and Haptic Solutions .................................................................................................................................175 Annex V: Ship UC - Intermodal Asset Tracking via IoT and Satellite ........... 182 Annex VI: DLT’s UC - Supply Chain Ecosystem Integration ............................ 195 © 2020-2023 iNGENIOUS Page 4 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) List of figures Figure 1: gNB (left), EasyBot (top-middle), eBot (bottom-middle) and Tribot (right) 20 Figure 2: Architecture of factory UC demo in Burgos ......................................... 21 Figure 3: Execution of the demo in Burgos ............................................................ 22 Figure 4: Setup illustration at TUD’s testbed used to demonstrate the integration between Flexible PHY/MAC, 5G core, and MANO. .................... 23 Figure 5: Web GUI showing two end-to-end network slices provisioned. .. 23 Figure 6: Grafana KPI dashboard visualization of UE to UE with video streaming running. 1) Top: Downlink throughput – iperf3 test (Pink). 2) Middle: Uplink throughput – iperf3 test (Pink) and video streaming (Purple). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). ........................................................................................................................... 27 Figure 7: Grafana KPI dashboard visualization of UE to core without video streaming running. 1) Top: Downlink throughput – iperf3 test (Orange). 2) Middle: Uplink throughput – iperf3 test (Orange). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). .................................. 28 Figure 8: Grafana KPI dashboard visualization of UE to core with video streaming running. 1) Top: Downlink throughput – iperf3 test (Blue). 2) Middle: Uplink throughput – iperf3 test (Blue) and video streaming (Purple). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). ........................................................................................................................... 28 Figure 9: Illustration of the components used in the measurement setup. 29 Figure 10: Sensing and GW Modules for Rail-Health Data Logging ................ 33 Figure 11: Rail-Health Flatspot Harshness and Bearing Defect Demonstrator (Concept & Design) ...................................................................................................... 35 Figure 12: Rail-Health Simulated Fault & Sinusoidal Fault Injector Set-up ... 36 Figure 13: BI's M3 hardware/software co-design platform realized on FPGA development board, with external Ethernet extension board .................... 36 Figure 14: Raspberry Pi 4B single-board computer with a Trusted Platform Module (TPM) attached to the GPIO pin header ............................................... 37 Figure 15: Simulated satellite infrastructure with ingress and egress routers, enabling the smart edge sensor (BI IoT device) to connect to the cloud server (BI cloud) ............................................................................................................ 37 Figure 16: Main dashboard table showing RATLS connection establishment and touch controls for enabling and disabling remote attestation .......... 38 Figure 17: Secondary display showing smart sensor state and defect classification. ................................................................................................................. 38 Figure 18: Data Integration and ML-Based Algorithm Approach ..................... 47 Figure 19: Data Integration and ML Pipeline Division Approach ...................... 47 Figure 20: Data sources and model components developed for the demonstration............................................................................................................... 49 Figure 21: Autoregressive + ML method to predict TTT ........................................ 51 © 2020-2023 iNGENIOUS Page 5 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 22: Final TTT data frame ...................................................................................... 51 Figure 23: Gate In time series analysis ....................................................................... 52 Figure 24: Gate In SARIMA model instantiation ...................................................... 52 Figure 25: Random Forest Regressor hyperparameter tunning for the TTT model .............................................................................................................................. 53 Figure 26: TTT Random Forest model instantiation and fitting......................... 53 Figure 27: Port Call and Gate Access online data ingestion setup ................... 54 Figure 28: Overview of the cloud service architecture used in the demonstration............................................................................................................... 55 Figure 29: Autoregressive + ML based TTT prediction setup .............................. 55 Figure 30: Overview of predicted vessels arriving to port of Valencia in the Awake.AI web application. ....................................................................................... 57 Figure 31: Predicted route and arrival time to port of Valencia for a selected vessel. .............................................................................................................................. 57 Figure 32: Port Entrance UC demonstration custom web interface ............... 58 Figure 33: True TTT vs prediction TTT using the gate-in/out validation service. .............................................................................................................................. 59 Figure 34: Port Entrance UC IoT Tracking dashboard for one week testing 59 Figure 35: Diagram of Services ....................................................................................... 61 Figure 36: Main setup and components integrated in the trial. ........................ 66 Figure 37: Testing area in the Port of Valencia ....................................................... 67 Figure 38: AGVs A, B and C for the AGV’s UC ........................................................... 68 Figure 39: Nokia’s (left) and Fivecom’s (right) cockpits. ...................................... 69 Figure 40: Unity application developed for the digital twin. ............................... 71 Figure 41: Real scenario (left) and digital twin with the AGV included (right). ............................................................................................................................... 71 Figure 42: Remote cockpit including the SensGlove haptic gloves, VR glasses and Digital Twin............................................................................................................ 72 Figure 43: End-to end architecture of the final demo........................................... 79 Figure 44: i) RF Uplink ground Station: ATF #33 Antenna, Diameter: 9m, Vertex, Tx/Rx, Ku-band, ii) RF Downlink Ground Station: MBA#102 Antenna, Diameter: 4.5m, Multi-Beam Antenna, Rx only, Ku-band, and iii) SES GEO Satellite ASTRA 2F (28.2oE) - Europe Ku-band beam ...................................... 80 Figure 45: i) Satcube transportable satellite terminal and ii) Smart IoT Gateway ............................................................................................................................... 81 Figure 46: Front and back of the iDirect’s 5G-enabled Velocity™ Intelligent Gateway hub ................................................................................................................... 81 Figure 47: iQ200, iQ Desktop and 9350 Modem ....................................................... 81 Figure 48: i) 22G1 purchased container and ii) iNGENIOUS Container ............. 82 Figure 49: Final demo device installation .................................................................. 83 Figure 50: End-to end architecture of the final demo (part II) ........................... 84 © 2020-2023 iNGENIOUS Page 6 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 51: iNGENIOUS container starting rail transport from Valencia to Madrid. ............................................................................................................................. 84 Figure 52: SatCube, Smart IoT GW and iNGENIOUS container at the Port of Valencia ........................................................................................................................... 86 Figure 53: Temperature of the iNGENIOUS container during the trip from Valencia to Piraeus and vice versa. ....................................................................... 86 Figure 54: Humidity of the iNGENIOUS container during the trip from Valencia to Piraeus and vice versa........................................................................................... 86 Figure 55: Overview screenshot of the Cloud-side dashboard, giving a general impression of the received data during the real-time measurements at the Port of Valencia on 21 November 2022 ................................................................. 87 Figure 56: GPS location of the IoT devices during the real-time measurements at the Port of Valencia on 21 ..................................................................................... 87 Figure 57: Temperature, measured in real-time from the IoT devices, in the Port of Valencia on 21 November 2022 ................................................................. 88 Figure 58: Humidity, measured in real-time from the IoT devices, in the Port of Valencia on 21 November 2022 ................................................................................ 88 Figure 59: Battery state of charge of the IoT devices, measured in real-time in the Port of Valencia on 21 November 2022 ......................................................... 89 Figure 60: Door state of the iNGENIOUS container, measured in real-time in the Port of Valencia on 21 November 2022 ................................................................. 89 Figure 61: Accelerometer measured in real-time in the Port of Valencia on 21 November 2022 ............................................................................................................. 90 Figure 62: End-to-end latency for transmitting the measured data from the IoT devices to the SES Cloud through satellite at the port of Valencia on 21 November 2022 ............................................................................................................. 90 Figure 63: Ship UC Demo part B – IoT message received. .................................... 91 Figure 64: GPS location reported by the sensor in Part B trip ........................... 92 Figure 65: Temperature, humidity and accelerometer values by the sensor in Part II trip ........................................................................................................................ 92 Figure 66: DLT Events Visualizer representing the DigitalAsset and the associated Trustpoint for the VesselArrival event in Livorno seaport. ....102 Figure 67: IoT device used for sealRemoved event...............................................103 Figure 68: DLT Events Visualizer representing the DigitalAsset and the associated Trustpoint for the sealRemoved event in Valencia seaport. 104 Figure 69: Service vehicle in the Port of Livorno with the IoT tracking device installed on board. ......................................................................................................105 Figure 70: Tracking Application - Livorno Dashboard......................................... 106 Figure 71: Heat sensors installed in iDR lab in Killarney. .................................... 114 Figure 72: Transmission of IoT data over satellite lab and live testbed setups ..............................................................................................................................115 Figure 73: Microsoft Azure IoT cloud dashboard showing IoT information. 116 © 2020-2023 iNGENIOUS Page 7 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 74: Example of in-house IoT cloud dashboard, based on Grafana, showing IoT information. ......................................................................................... 116 Figure 75: Example of in-house IoT cloud dashboard, based on Grafana, showing IoT information. ......................................................................................... 118 Figure 76: Tribot architecture .......................................................................................124 Figure 77: EasyBot architecture ................................................................................... 125 Figure 78: Ebot architecture.......................................................................................... 126 Figure 79: Tribot AGV ....................................................................................................... 126 Figure 80: EasyBot AGV ................................................................................................... 126 Figure 81: Ebot AGV.......................................................................................................... 126 Figure 82: 5G base station .............................................................................................. 127 Figure 83: 1RSRP values obtained through the walk test around the industrial unit. ............................................................................................................................. 135 Figure 84: End-to-end architecture iperf3 test UE to UE. ................................... 136 Figure 85: End-to-end architecture iperf3 test UE to core. ................................ 136 Figure 86: End-to-end architecture used for the KPI measurement setup with 5Probe. ............................................................................................................................ 137 Figure 87: Overview of prediction model components, required features, and source datasets. .......................................................................................................... 148 Figure 88: Kernel density estimates of the empirical distributions of actual and simulated total container dwell times in the port of Valencia. ................. 149 Figure 89: Vessel ETA prediction model pipeline ..................................................150 Figure 90: Simulated vs. actual weekly numbers of containers leaving port of Valencia by truck .........................................................................................................151 Figure 91: MLOps pipeline overview. ..........................................................................151 Figure 92: Gate-in dataset resampled ........................................................................ 152 Figure 93: Port Call Dataset ........................................................................................... 152 Figure 94: Final TTT data frame .................................................................................... 153 Figure 95: Gate In time series analysis ...................................................................... 153 Figure 96: SARIMA hyperparameter tunning for the Gate In model ............. 154 Figure 97: Port Entrance UC database structure ................................................... 155 Figure 98: IoT tracking service deployment infrastructure. .............................. 156 Figure 99: Final vessel ETA prediction model accuracy statistics*.................. 172 Figure 100: 5G Network connection setup ................................................................. 175 Figure 101: Relation between modems and devices .............................................. 175 Figure 102: SenseGlove haptic gloves ..........................................................................176 Figure 103: Example of RTT during Valencia Port tests. ........................................179 Figure 104: Example of the decoded frames during Valencia Port tests. ...... 180 Figure 105: Example of the downlink data rate for AGV-B during Valencia Port tests. ............................................................................................................................ 180 © 2020-2023 iNGENIOUS Page 8 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 106: Indoor bluetooth range for Neurodigital (left) and SenseGlove (right) haptic gloves ................................................................................................... 181 Figure 107: Outdoor bluetooth range for Neurodigital (left) and SenseGlove (right) haptic gloves. .................................................................................................. 181 Figure 108: iDR lab testbed system overview ...........................................................183 Figure 109: i) iDR Lab testbed including an iQ200, iQ Desktop, 9350 modems, IoT GW & Satellite Channel Emulators x2, ii) iDR Lab Testbed generic sensor used to measure temperature and humidity of the lab and iii) iDR Lab Testbed iDirect’s 5G-enabled Velocity™ IGW hub ..........................................183 Figure 110: Scenario 1 architecture for the demonstration of the use case. ..196 Figure 111: Scenario 2 architecture for the demonstration of the use case. .197 Figure 112: Scenario 3 architecture for the demonstration of the use case. 198 Figure 113: Scenario 4 architecture for the demonstration of the use case. .199 Figure 114: sequence diagram for the demonstration of the Scenario 1. ..... 200 Figure 115: DigitalAsset for the VesselArrival event in Livorno seaport. ...... 200 Figure 116: DigitalAsset for the VesselDeparture event in Livorno seaport. .201 Figure 117: DigitalAsset for the GateIn event in Livorno seaport. .....................201 Figure 118: DigitalAsset for the GateOut event in Livorno seaport. ................ 202 Figure 119: Trustpoint of the VesselArrival event in Livorno seaport. ............ 202 Figure 120: Trustpoint of the VesselDeparture event in Livorno seaport. ..... 203 Figure 121: Trustpoint of the GateIn event in Livorno seaport. ......................... 203 Figure 122: Trustpoint of the GateOut event in Livorno seaport...................... 204 Figure 123: Sequence diagram for the demonstration of the Scenario 2. .... 204 Figure 124: sealRemoved event data at DVL level. ................................................ 205 Figure 125: Sequence diagram for the demonstration of the Scenario 3. .....206 Figure 126: IoT Tracking Sensor message format. ..................................................206 Figure 127: IoT Tracking Sensor GPS message. ....................................................... 207 Figure 128: GPS data coming from the Symphony M2M Platform and aggregated at DVL level. ......................................................................................... 207 Figure 129: Sequence diagram for the demonstration of the Scenario 4. .....208 Figure 130: The main interactions between the DVL and Pseudonymized Module. ......................................................................................................................208 © 2020-2023 iNGENIOUS Page 9 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) List of tables Table 1. Mapping of use-case names to test-case identifiers ......................... 18 Table 2. Data flows in Burgos' demo ....................................................................... 22 Table 3. Factory UC issues on execution ............................................................... 24 Table 4. Factory UC Test case verification ............................................................ 25 Table 5. Factory UC KPIs .............................................................................................. 26 Table 6. Flexible PHY/MAC throughput measurements with UDPtest ...... 30 Table 7. Transport UC issues on execution ........................................................... 39 Table 8. Transport UC Test case verification ........................................................ 40 Table 9. iDR Lab Testbed Usage................................................................................. 41 Table 10. Transport UC KPIs ......................................................................................... 42 Table 11. IoT Tracking based TTT measurement tests ........................................ 60 Table 12. Port Entrance UC Issues on execution ................................................... 61 Table 13. Port Entrance UC Test case verification ................................................ 62 Table 14. Port Entrance UC KPIs Results ................................................................. 64 Table 15. AGV UC Issues on execution...................................................................... 72 Table 16. AGV’s UC Test case verification ................................................................ 73 Table 17. AGV UC KPIs .................................................................................................... 74 Table 18. AGV UC KPIs. Comparision Neurodigital vs GloveSense haptic gloves. .............................................................................................................................. 74 Table 19. SES’s ASTRA 2F Space Segment............................................................... 80 Table 20. Ship UC Issues on execution ..................................................................... 85 Table 21. ICMP RTT of Satellite Link............................................................................ 91 Table 22. Ship UC Test case verification ................................................................... 93 Table 23. Ship UC KPIs .................................................................................................... 94 Table 24. Scenarios used for the demonstration of the DVL/DLT UC ............ 99 Table 25. DVL/DLT UC Issue on execution. ............................................................ 108 Table 26. DVL/DLT UC Test case verification. ....................................................... 109 Table 27. DVL/DLT UC KPIs. ......................................................................................... 110 Table 28. Satellite channel characterization SNR values .................................. 118 Table 29. Information flows for Tribot AGV ............................................................124 Table 30. Information flows for EasyBot AGV ....................................................... 125 Table 31. Information flows for Ebot AGV .............................................................. 126 Table 32. AGVs employed demonstration in Burgos. ......................................... 126 Table 33. Main parameters and configuration of 5G network......................... 127 Table 34. Equipment for factory UC demonstration in Burgos.......................128 © 2020-2023 iNGENIOUS Page 10 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Table 35. UC1_TC_01 verification ................................................................................. 129 Table 36. UC1_TC_02 verification ................................................................................ 129 Table 37. UC1_TC_03 verification ................................................................................ 129 Table 38. UC1_TC_04 verification................................................................................130 Table 39. UC1_TC_05 verification ................................................................................130 Table 40. UC1_TC_06 verification ................................................................................. 131 Table 41. UC1_TC_07 verification ................................................................................. 131 Table 42. UC1_TC_08 verification ................................................................................. 131 Table 43. UC1_TC_09 verification ................................................................................ 132 Table 44. UC1_TC_10 verification ................................................................................. 132 Table 45. UC1_TC_11 verification .................................................................................. 133 Table 46. UC1_TC_12 verification ................................................................................. 133 Table 47. UC1_TC_13 verification ................................................................................. 133 Table 48. UC1_TC_14 verification .................................................................................134 Table 49. UC1_TC_15 verification .................................................................................134 Table 50. UC3_TC_01 verification ................................................................................138 Table 51. UC3_TC_02 verification ...............................................................................138 Table 52. UC3_TC_03 verification ............................................................................... 139 Table 53. UC3_TC_04 verification ............................................................................... 139 Table 54. UC3_TC_05 verification ............................................................................... 139 Table 55. UC3_TC_06 verification .............................................................................. 140 Table 56. UC3_TC_07 verification .............................................................................. 140 Table 57. UC3_TC_08 verification ............................................................................... 141 Table 58. UC3_TC_09 verification ............................................................................... 141 Table 59. UC3_TC_10 verification ................................................................................142 Table 60. UC3_TC_11 verification .................................................................................142 Table 61. UC3_TC_12 verification ................................................................................142 Table 62. UC3_TC_13 verification ................................................................................143 Table 63. UC3_TC_14 verification ................................................................................143 Table 64. UC3_TC_15 verification ............................................................................... 144 Table 65. UC3_TC_16 verification ............................................................................... 144 Table 66. UC3_TC_17 verification ............................................................................... 145 Table 67. UC3_TC_18 verification ............................................................................... 145 Table 68. UC3_TC_19 verification ............................................................................... 145 Table 69. UC3_TC_20 verification .............................................................................. 146 Table 70. UC3_TC_21 verification ............................................................................... 146 Table 71. UC3_TC_22 verification............................................................................... 147 © 2020-2023 iNGENIOUS Page 11 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Table 72. UC3_TC_23 verification............................................................................... 147 Table 73. UC5_TC_13 description ................................................................................158 Table 74. UC5_TC_13 description ................................................................................ 159 Table 75. UC5_TC_15 description ................................................................................ 159 Table 76. UC5_TC_16 description ............................................................................... 160 Table 77. UC5_TC_17 description ................................................................................ 161 Table 78. UC5_TC_18 description ................................................................................ 162 Table 79. UC5_TC_19 description ................................................................................ 163 Table 80. UC5_TC_20 description ............................................................................... 163 Table 81. UC5_TC_21 description ............................................................................... 164 Table 82. UC5_TC_01 verification ................................................................................ 165 Table 83. UC5_TC_02 verification ...............................................................................166 Table 84. UC5_TC_03 verification ...............................................................................167 Table 85. UC5_TC_04 verification ...............................................................................167 Table 86. UC5_TC_05 verification .............................................................................. 168 Table 87. UC5_TC_06 verification .............................................................................. 168 Table 88. UC5_TC_07 verification ...............................................................................169 Table 89. UC5_TC_08 verification ...............................................................................169 Table 90. UC5_TC_09 verification ...............................................................................169 Table 91. UC5_TC_10 verification ............................................................................... 170 Table 92. UC5_TC_11 verification ................................................................................ 170 Table 93. UC5_TC_12 verification ............................................................................... 170 Table 94. UC5_TC_13 verification .................................................................................171 Table 95. UC5_TC_14 verification .................................................................................171 Table 96. UC5_TC_15 verification ................................................................................ 172 Table 97. UC5_TC_16 verification ................................................................................ 172 Table 98. UC5_TC_17 verification ................................................................................ 173 Table 99. UC5_TC_18 verification ................................................................................ 173 Table 100. UC5_TC_19 verification ............................................................................... 174 Table 101. UC5_TC_20 verification .............................................................................. 174 Table 102. UC5_TC_21 verification ............................................................................... 174 Table 103. UC2_TC_01 verification ................................................................................ 177 Table 104. UC2_TC_02 verification ............................................................................... 177 Table 105. UC2_TC_03 verification ............................................................................... 177 Table 106. UC2_TC_04 verification ............................................................................... 177 Table 107. UC2_TC_05 verification ...............................................................................178 Table 108. UC2_TC_06 verification ...............................................................................178 © 2020-2023 iNGENIOUS Page 12 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Table 109. UC2_TC_07 verification ...............................................................................178 Table 110. Overview of iDR lab testbed activities ................................................. 184 Table 111. UC4_TC_01 verification............................................................................... 184 Table 112. UC4_TC_02 verification ...............................................................................185 Table 113. UC4_TC_03 verification ...............................................................................185 Table 114. UC4_TC_04 verification ..............................................................................185 Table 115. UC4_TC_05 verification .............................................................................. 186 Table 116. UC4_TC_06 verification .............................................................................. 186 Table 117. UC4_TC_07 verification ...............................................................................187 Table 118. UC4_TC_08 verification...............................................................................187 Table 119. UC4_TC_09 verification .............................................................................. 188 Table 120. UC4_TC_10 verification............................................................................... 188 Table 121. UC4_TC_11 verification ................................................................................ 188 Table 122. UC4_TC_12 verification ............................................................................... 189 Table 123. UC4_TC_13 verification ............................................................................... 189 Table 124. UC4_TC_14 verification............................................................................... 189 Table 125. UC4_TC_15 verification ............................................................................... 190 Table 126. UC4_TC_16 verification ............................................................................... 190 Table 127. UC4_TC_17 verification ............................................................................... 190 Table 128. UC4_TC_18 verification ................................................................................ 191 Table 129. UC4_TC_19 verification ................................................................................ 191 Table 130. UC4_TC_20 verification ............................................................................... 191 Table 131. sealRemoved event data model............................................................. 205 Table 132. UC6_TC_01 verification. ..............................................................................209 Table 133. UC6_TC_02 verification. .............................................................................209 Table 134. UC6_TC_03 verification. ..............................................................................210 Table 135. UC6_TC_04 verification. ..............................................................................210 Table 136. UC6_TC_05 verification. ............................................................................... 211 Table 137. UC6_TC_06 verification. .............................................................................. 212 Table 138. UC6_TC_07 verification. .............................................................................. 213 Table 139. UC6_TC_08 verification. ..............................................................................214 Table 140. UC6_TC_09 verification. .............................................................................. 215 Table 141. UC6_TC_10 verification. ............................................................................... 216 Table 142. UC6_TC_11 verification. ................................................................................ 217 Table 143. UC6_TC_12 verification. ...............................................................................218 © 2020-2023 iNGENIOUS Page 13 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Abbreviations 3GPP 3rd Generation Partnership Project A2A Authority to Authority ACK Acknowledge AES Advanced Encryption Standard AI Artificial Intelligence AIDA Automazione Integrata Dogane Accise (Integrated Automation Customs Excise) AIS Automatic Identification System AGV Automatic Guided Vehicle API Application Programming Interface B2A Business to Authority B2B Business to Business BBU Baseband Unit BT Bluetooth BTC Bitcoin Native Token CIoT Consumer Internet of Things CPU Central Processing Unit CSE Common Service Entity CSV Comma Separated Values DL Downlink DLT Distributed Ledger Technology DVL Data Virtualization Layer E2E End to End ECDSA Elliptic Curve Digital Signature Algorithm EDA Exploratory Data Analysis ETA Expected Time of Arrival ETD Expected Time of Departure ETSI European Telecommunications Standards Institute FER Frame Error Rate FMEDA Failure Modes, Effects and Diagnostics Analysis FPGA Field Programmable Gate Array GAD Geographic Anomaly Detection GEO Geostationary GPS Global Positioning System GSM Global System for Mobile Communications GSMA Global System for Mobile Communications GUI Graphic User Interface © 2020-2023 iNGENIOUS Page 14 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) GW Gateway HTTP HyperText Transfer Protocol ICT Information and Communications Technology ICMP Internet Control Message Protocol IEC International Electrotechnical Commission IMSI International Mobile Subscriber Identity IoT Internet of Things IP Internet Protocol ISO International Organization for Standardization IT Information Technology LAN Local Area Network LO-LO Lift On – Lift Off LoRa Long Range LTE Long Term Evolution M2M Machine to Machine MAC Media Access Control MEC Mobile Edge Computing ML Machine Learning MR Mixed Reality NAT Network Address Translation NB-IoT Narrowband-IoT NDA Non Disclosure Agreement NEF Network Exposure Function NFV Network Function Virtualization NSA Non Standalone NSD Network Service Descriptor NSMF Network slice management function NSSMFs Network slice subnet management functions NTN Non Terrestrial Networks NWDAF Network Data Analytics Function ODU Outdoor Unit OS Operating System OU Occasional Use PC Personal Computer PCS Port Community System PMIS Port Management Information System PoC Proof of Concept PSU Power Supply Unit © 2020-2023 iNGENIOUS Page 15 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) QoE Quality of Experience QoS Quality of Service R&D Research and Development RAN Radio Access Network RF Radio Frequency RO-RO Roll On – Roll Off ROS Robot Operating System RoT Root of Trust RPI Raspberry Pi RRH Remote Radio Head SA Standalone SARIMA Seasonal Autoregressive Integrated Moving Average SCADA Supervisory Control And Data Acquisition SDR Software Defined Radio SHA Secure Hash Algorithm SNR Signal to Noise Ratio SOAP Simple Objects Access Protocol SR System Requirement TC Test Case TCP Transmission Control Protocol TLS Transport Layer Security ToD Tele-operated Driving TPCS Tuscan Port Community System TTT Truck Turnaround Time UC Use Case UDP User Data Protocol UE User Equipment UL Uplink UPF User Plane Function UR User Requirement URLLC Ultra-Reliable Low-Latency Communications USRP Universal Software Radio Peripheral VPN Virtual Private Network VSAT Very Small Aperture Terminal VSMF Vertical Service Management Function WAN Wide Area Network WiFi Wireless Fidelity WP Work Package © 2020-2023 iNGENIOUS Page 16 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 1 Introduction In this chapter, the deliverable's objective and structure are described as well as useful information for the reader is provided. Objective of the Document The main objective of the deliverable is to present the validation of results of iNGENIOUS PoCs and Demos, by describing the measurement campaigns and trials developed. Following the methodology defined deliverable in D6.1 Initial planning for testbeds [1], where specific test cases have been identified, and the work developed in D6.2 PoC development, platform and test-bed integration [2], where specific test cases have been identified, and the work developed in the D6.2 [2], where set-up and configuration activities have been defined, it details the achieved results in the deployment of the PoCs and Demos and includes their technical validation against the requirements defined in WP2. The deliverable first presents the main objectives of the demonstrations, highlighting the technologies and solutions tested to improve logistics activities along complex supply chains. Once detailed the objectives, the setup and execution of the demonstrations are provided by describing the configuration of the solutions used and the activities carried out for the execution of the PoCs and Demos. Issues occurred during the execution are identified and the mitigation actions adopted are also detailed. In order to ensure the validation of results achieved, per each PoC and Demo, the verification of the test cases is described, by detailing the results achieved. Then, the calculation of KPIs is presented, providing reference to the test cases, target defined and reached. Any deviations from the defined target are described and justified. To complete the validation of the results, an impact assessment is presented, describing main achievements and impact reached. Finally, D6.3 [3] provides a set of lessons learned during the PoCs and Demos execution and validation. Additionally, the document offers potential improvements on a technical level that could be further developed in the existing demonstrations. The following sections present the results of each PoC and Demos, which are Automated Robots with Heterogeneous Network, Improved Drivers’ Safety with MR and Haptic Solutions, Transportation Platforms Health Monitoring, Intermodal Asset Tracking via IoT and Satellite, Situational Understanding in Smart Logistics Scenario and Supply Chain Ecosystem Integration. In addition to the presentation of results and validation, the deliverable also provides a description of additional research activities carried out during the project and focuses on demonstrating satellite direct access to transmit IoT data. © 2020-2023 iNGENIOUS Page 17 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Structure of the Document The deliverable follows the following structure: • Section 2 focuses on the use of automatic robot control for industrial automation (Factory UC). • Section 3 focuses on the transportation platform to show how asset health tracking can lead to lower operational costs and higher asset availability (Transport UC). • Section 4 focuses on enhancing the situational understanding of events in maritime ports and terminals (Port Entrance UC). • Section 5 focuses on improving the driver’s safety by combining the use of mixed reality and haptic solutions for controlling AGVs in a real scenario (AGV UC). • Section 6 focuses on providing End-to-End (E2E) asset tracking using various connection and backhaul technologies (Ship UC). • Section 7 focuses on providing two different interoperable layers in order to abstract the complexity of the underlying machine-to-machine (M2M) platforms and DLT solutions (DVL/DLT UC). • Section 8 focuses on additional research carried out during the project which was outside the scope of the selected use cases. • Annexes include additional information on the UCs, mainly on execution and test case verification. The annexes follow the same structure of the deliverable to allow readers to easily find information for each specific section. The main sections reported are filled only in case there was additional information to report. In all the sections the execution and results obtained in each demo and PoC are described. Navigating this document The deliverable provides an overview of the activities related to trials and measurement campaigns performed in the PoCs and Demos and their validation against requirements and KPIs defined in WP2. In this deliverable to help readers to map the UCs to the test case validation, we use the identifiers such as “UC1_TC_01”, which refers to test case #01 of the Factory UC. Therefore, the following table is provided: UC name UC short name Test case identifier Automated Robots with Heterogeneous Networks Factory UC UC1_TC_X Improved Drivers’ Safety with MR and Haptic Solutions AGV UC UC2_TC_X Transportation Platforms Health Monitoring Transport UC UC3_TC_X Intermodal Asset Tracking via IoT and Satellite Ship UC UC4_TC_X Situational Understanding in Smart Logistics Scenario Port Entrance UC UC5_TC_X Supply Chain Ecosystem Integration DVL/DLT UC UC6_TC_X Table 1. Mapping of use-case names to test-case identifiers © 2020-2023 iNGENIOUS Page 18 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 2 PoC - Automated Robots with Heterogeneous Networks Objective and Description The final evaluation of the technological integration in the Factory UC is divided into two parts. The first part, hereafter named full5G-RAN PoC, shows the successful integration of a fully 5G compliant industrial communications network. This setup consists of 5G modems that were developed by 5CMM, which are responsible for exchanging information among industrial enddevices and the 5G base station unit (gNB). The data received over the air at the gNB is then routed through the 5G core provided by CMC. The enddevices that are used in this PoC are AGVs provided by ASTI. The main objective of this demonstration is to validate the communication performance among these industrial devices through a lightweight 5G-compliant modem. Thus, it represents an important step towards the employment of 5G wireless technology in industrial scenarios. The second part, named flexible-RAN PoC, showcases the integration of non3GPP physical layer (PHY) and medium access control (MAC) techniques with a 5G core network, which is in turn managed by the end-to-end network slice orchestration framework (i.e., the MANO), which is composed by an end-to-end network slice management function (NSMF) integrated with two dedicated network slice subnet management functions (NSSMFs) for the 5G core and the flexible-RAN. The non-3GPP radio access technology is referred as Flexible PHY/MAC in previous deliverables throughout the project timeline. For each PoC one testbed has been developed. The full-5G-RAN setup is located in the University of Burgos, Spain, where the final integration of the components as well as the performance evaluation have been carried out in February 2023. The flexible-RAN PoC setup is assembled in the laboratories of the Technische Universität Dresden, Germany. The final integration and performance evaluation have also been carried out in February 2023. Setup and Execution The following subsections provide description of the setup and execution of Factory UC. Additional information can be found in Annex I – Setup and Execution. © 2020-2023 iNGENIOUS Page 19 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Part I The demonstration takes place in Burgos, Spain, more concretely in an industrial space in the University of Burgos, where the Joint Research Unit between ASTI and the University of Burgos is located. The setup components are: • gNB (RRH + BBU + GPS) n40: The gNB consists of Nokia outdoors miniMacro Airscale model. The BBU is connected to RRH through Single Mode Fiber and 10 Gbps network capacity. The BBU gets the time synchronization through GPS signal. The base station was configured with a bandwidth of 20 MHz in the range 2370 – 2790 MHz. • 5G Core Standalone: The 5G core is installed in E900-4E Supermicro with 2 SFP+ interfaces of 10 Gbps where one of them is connected to the gNB BBU. The 5G Core is installed in bare metal where all the 5G Core network functions are running as individual processes over Linux Ubuntu 20.04LTS. The Supermicro server has additional 1 Gbps and 10 Gbps network interfaces if needed for connecting the 5G Core to a Data Network (DN). • 3 AGVs: o eBot: 5G modem + raspi + RealSense. o Tribot: 5G modem + raspi + controller. o EasyBot: 5G modem + raspi + humidity and temperature sensors. • 5G modem for connecting the PCs to the network as another UE. Figure 1: gNB (left), EasyBot (top-middle), eBot (bottom-middle) and Tribot (right) In Figure 2 the architecture of the setup and how all the components are interconnected is illustrated. The eBot has a 5G modem connected to the 5G LAN and to one Raspberry Pi with CAN bus via ethernet. This Raspberry Pi receives the control commands sent by a laptop through the 5G network and translates them to the data that the AGV understands. In addition, there is also an Intel RealSense camera connected to the Raspberry Pi that sends the real-time video back to the laptop. © 2020-2023 iNGENIOUS Page 20 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The Tribot also has a 5G modem connected and one Raspberry Pi with CAN bus via ethernet. The controller is connected directly to the 5G Core, and it sends the control commands to the Tribot. The Raspberry Pi receives the data and sends it to the AGV. The AGV is sending information about its internal variables (linear speed, rotation speed, level battery, errors states and others) to the core. The EasyBot is moved automatically following a black magnetic band on the floor of the facility. It is connected to a 5G modem and provides the core with information about the temperature and humidity of the environment by using sensors installed in the AGV with a Raspberry Pi. In this case, these values are collected by the sensor DHT11 with Arduino and sent to the Raspberry. The specific architecture of each AGV and more details about the AGVs and setup deployments can be found in Annex I – Setup and Execution. Figure 2: © 2020-2023 iNGENIOUS Architecture of factory UC demo in Burgos Page 21 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 3: Execution of the demo in Burgos All data flows in the demo are summarized in Table 2. AGV Sender Receiver Data eBot PC 192.168.34.71 AGV 192.168.34.51 Control commands eBot AGV 192.168.34.51 PC 192.168.34.71 Real-time camera flow Tribot Core 192.168.34.195 AGV 192.168.34.26 Controller motion actions Tribot AGV 192.168.34.26 Core 192.168.34.195 Internal variables from AGV EasyBot AGV 192.168.34.81 Core 192.168.34.195 Humidity and temperature measurements Table 2. Data flows in Burgos' demo Part II This PoC focuses on showcasing the integration between the flexible PHY/MAC, 5G core and MANO. The deployed setup diagram is shown in Figure 4, which illustrates how the MANO software components, such as the end-to-end NSSMF, Core NSSMF and RAN NSSMF, are connected to TUD’s testbed equipment. The information exchange among the Flexible PHY/MAC and the RAN NSSMF is accomplished through the Tactile API developed within WP5. This API is based on JavaScript Object Notation (JSON) format and the configuration files are exchanged via the user datagram protocol (UDP). The implemented PHY protocol running at the Flexible PHY/MAC base station (BS) listens continuously and waits to get the resource allocation from the RAN NSSMF. This latter component sends a JSON file via UDP containing the desired resource allocation for each application (UE). Then, the Flexible PHY/MAC BS extracts this information and analyses it (total of allocations must be ≤ 100%), and distributes the resources among the UEs accordingly sending © 2020-2023 iNGENIOUS Page 22 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) acknowledgement message to the MANO to let it know about the current status. Whenever an error occurs, e.g., if the total of allocations is more than 100%, or the allocation was not successful, the BS informs the MANO about the error and waits to receive a new resource distribution. The Flexible PHY/MAC BS forwards the data traffic from each application UE using tunnel interfaces provided by a gNB emulator named UERANSIM. Hence, the traffic of the Flexible PHY/MAC is encapsulated in the 5G compliant format before being routed through the 5G core. Figure 4: Setup illustration at TUD’s testbed used to demonstrate the integration between Flexible PHY/MAC, 5G core, and MANO. From a software deployment perspective, the NSMF, the two NSSMFs, and the web graphical user interface have been deployed as docker containers in the TUD testbed. The NSMF realizes the high-level logic for end-to-end network slice management and orchestration, the Core NSSMF interacts with the 5G core to configure and provision tailored slices in the 5G core network, while the RAN NSSMF manages the resources at the Flexible PHY/MAC RAN level. Figure 5 depicts the outcome of two end-to-end network slices provisioned into the TUD testbed, each of them composed by a 5G core subnet slice and a Flexible PHY/MAC RAN subnet slice. Figure 5: Web GUI showing two end-to-end network slices provisioned. © 2020-2023 iNGENIOUS Page 23 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) ISSUES ON EXECUTION The following subsections provide description of issues encountered during the demonstration and mitigation actions to solve them. Description of the issue Mitigation measures Some radio links between UEs and BS in the setup of part II have lower throughput than expected due to the processing capacity of the host PCs. Instead of employing a video transmission to demonstrate the setup, emulated devices are used to send data streams from each UE. Laser of eBot AGV in part I was detecting itself as an obstacle Recalibration of the laser following ASTI instructions. 5G Core deployment in bare virtualized environment due to lack of Internet access The 5G Core was deployed as Non-Public Network (NPN) without Internet access which made the installation in a virtualized environment based on containers not possible, since the installation required downloading SW packages from Linux repositories. To overcome this limitation the 5G Core was installed in bare metal after downloading SW binaries into the server. Table 3. Factory UC issues on execution Validation and Results This section provides a detailed description of the validation results obtained after the execution of the demonstration. Impact is analyzed after explaining the result validation, verification of test cases, KPIs and assessment of the UC. TEST CASES VERIFICATION In this section, the results of each test case, identified in D6.1 [1] for the Factory UC are presented. When writing these contributions, it is planned to have the final review in Valencia. To this end, the UPV testbed is taken into consideration instead of the ASTI testbed, because of the connectivity problems encountered. Specifically, the ASTI testbed is isolated from the Internet, thus it was not possible to remotely connect to it, and the installation of the necessary software from the different remote locations was not possible. For some test cases, beyond the result of the test case itself, is reported also the testbed/lab where it has been executed. Test Case ID Result UC1_TC_01 – Hardware and software implementation Passed* UC1_TC_02 – Core network integration testing Passed* UC1_TC_03 – Gateway test Passed UC1_TC_04 – Onboard industrial IoT network slice templates and NF descriptors Passed UC1_TC_05 – Automated deployment of industrial IoT network slice instance Passed UC1_TC_06 – Automated termination of industrial IoT network slice instance Passed © 2020-2023 iNGENIOUS Page 24 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) UC1_TC_07 – Manual scaling of an industrial IoT network slice instance Passed UC1_TC_08 – Automatic slice configuration through 5GC NSM Passed UC1_TC_09 – Automated deployment of industrial IoT network slice instance and of an edge robot control application as part of network slice instance UC1_TC_10 – Automated termination of industrial IoT network slice instance and of edge robot control application as part of network slice instance UC1_TC_11 – Subscription to either NWDAF or NEF for collecting monitoring and analytics information related to the network slices, NFs and UEs Passed Passed Passed UC1_TC_12 – Deletion of either NWDAF or NEF active subscription Passed UC1_TC_13 – Automated slice scaling triggered by AI\ML platform using NWDAF data Passed UC1_TC_14 – Robot interface connectivity Passed UC1_TC_15 – Test of API Passed Table 4. Factory UC Test case verification A couple of the tests listed above have been partially achieved. In particular, UC1_TC_01 validated the implementation of the Flexible PHY/MAC, and as it is explained in the next subsection, the target latency was achieved. However, the target throughput wasn’t achieved due to the spectrum bandwidth available. Similarly, the same reasoning for the partial of the target KPIs of UC1_TC_01 can be applied to UC1_TC_02 since the PHY throughput is the network bottleneck. In summary, the main aim of the test cases execution and verification was to validate the implemented heterogeneous hardware and software network technologies in support of the industrial IoT scenario with automated robots and AGVs (namely the CMC 5GC, the 5CMM modems, the ASTI AGVs, the TUD Flexible PHY/MAC, the NXW end-to-end network slice orchestration framework). Specifically, the tests covered the integration and validation of the CMC 5GC, the 5CMM modems, the ASTI AGVs, the TUD Flexible PHY/MAC, the NXW end-to-end network slice orchestration framework, which have been demonstrated to fulfil the planned functionalities and achieve the defined tests. In summary, according to the table above, this verification covered the following aspects: • The Nokia commercial gNB supporting the band N40 was installed and configured to operate with the assigned frequency license and bandwidth i.e. 20MHz. • The CMC 5GC was installed in Supermicro server and configured with operator and network code assigned for Non Public Networks (NPN) i.e. MCC=999 and MNC=99. The integration between the CMC 5GC and the NXW end-to-end network slice orchestration for 5G network slices automated deployment and operation. • The integration between the TUD Flexible PHY/MAC and the NXW end-toend network slice orchestration for flexible RAN automated control and management and transparent interworking the legacy 5G networks. • The automation capabilities of the NXW end-to-end network slice orchestration for 5G network slices lifecycle management (including onboarding, instantiation, scaling operations), assisted by AI/ML. • The implementation of FPGA-based PHY based on generalized frequency division multiplexing. © 2020-2023 iNGENIOUS Page 25 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) A detailed description of the test cases execution and verification is provided in the Annex I – Validation and Results. KPIS The following table shows the KPIs that were measured and considered relevant during the use case validation. A detailed explanation on how the measurements of the KPIs were taken can be found in the KPIs. KPI Test Case Reference Target Actual Coverage UC1_TC_14 0,01 km2 0,001 km2 Mobility UC1_TC_14 UC1_TC_14 UC1_TC_02 < 30 km/h 8 km/h High High Data rate per camera (uplink) UC1_TC_14 6 – 24 Mbps 6 – 6,5 Mbps Data rate per robot UE-UE (without camera) UC1_TC_14 10 Mbps 14,6 Mbps (UL/DL) Data rate per robot UE-core (without camera) UC1_TC_14 UC1_TC_02 10 Mbps 46,1 Mbps (DL) 14,6 Mbps (UL) Data rate per robot UE-UE (with camera) UC1_TC_14 UC1_TC_02 10 Mbps 8,95 Mbps (UL/DL) Data rate per robot UE-core (with camera) UC1_TC_14 UC1_TC_02 10 Mbps 42 Mbps (DL) 9,01 Mbps (UL) Datagram transmission reliability (uplink) UC1_TC_14 UC1_TC_02 - 100% up to 20 Mbps Connection density per robot UC1_TC_14 10k/Km2 13.6k/Km2 E2E latency for remote control (command from application to remote device) UC1_TC_14 UC1_TC_02 10-50 ms 12-50 ms Reliability for remote control UC1_TC_14 99,999% 99,999% (no disconnections during tests) Throughput (Flexible-RAN) UC1_TC_01 Max: 10 Mbps Min: 0.1 Mbps Max: 2.94 Mbps Min: 0.34 Mbps E2E Latency (Flexible-RAN) UC1_TC_01 Max: 10-50 ms Min: 1-5 ms Max: 2.9 ms Min: 1.6 ms Security Table 5. Factory UC KPIs Regarding the coverage KPI, the walk test (to measure the quality of the radio signal) was performed in the interior of the industrial unit, considering an area of 0,001 km2. This area was considered sufficient for the use case execution, thus not measuring the outside of the industrial unit. The setup includes the 5GLAN feature available in the 5G Core that allows to create private group of devices that can only connect with each other. The 5G Core creates a virtual interface for interconnecting all the devices part of the same 5GLAN group. Other devices outside the 5GLAN group will not be able to connect to the ones in the group. © 2020-2023 iNGENIOUS Page 26 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The 5GLAN allows to isolate and secure the communications within a virtual private group created by the 5GLAN. The camera was set to send a video streaming with 1280x720 pixels resolution. With that configuration, the uplink traffic sent by the camera was oscillating between 6 and 6,5 Mbps. In Figure 6Figure 6:, in the middle graph, the video streaming throughput is shown in purple. As it is further explained in the KPIs, the throughput of the network was measured considering different setups: a setup in which the tests were being performed from the UE to the core (see Figure 85) and another with the tests being performed between 2 UEs (see Figure 84). Also, different conditions were considered: with and without video streaming running. The first test performed was the communication between two modems connected to the 5G network with the core 5GLAN feature. The iperf3 test showed a throughput of 14,6 Mbps UL/DL without video streaming running and 8,95 Mbps with the video streaming running. The average RTT (Round-Trip Time) during the test was about 200 ms with video streaming running in Figure 6. In these tests, the RTT between command from the applications to a remote device can be analyzed, where the values (with video streaming running) range from 50ms to 100ms, therefore it can be concluded that the approximate E2E latency is between 25ms to 50ms. Figure 6: Grafana KPI dashboard visualization of UE to UE with video streaming running. 1) Top: Downlink throughput – iperf3 test (Pink). 2) Middle: Uplink throughput – iperf3 test (Pink) and video streaming (Purple). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). The second test was the communication between a UE and a laptop connected directly to the 5G core. Without video streaming running the result of the throughput measured with iperf3 was of 46,1 Mbps DL and 14,6 Mbps UL and the average RTT obtained was about 120 ms (see Figure 7). With the video streaming running 42 Mbps DL and 9,01 Mbps UL were obtained as throughput and 190 ms as the average RTT (see Figure 8) We can observe that the throughput is lower and the RTT is higher, since the real-time video consumes bandwidth and resources. © 2020-2023 iNGENIOUS Page 27 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 7: Grafana KPI dashboard visualization of UE to core without video streaming running. 1) Top: Downlink throughput – iperf3 test (Orange). 2) Middle: Uplink throughput – iperf3 test (Orange). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). Figure 8: Grafana KPI dashboard visualization of UE to core with video streaming running. 1) Top: Downlink throughput – iperf3 test (Blue). 2) Middle: Uplink throughput – iperf3 test (Blue) and video streaming (Purple). 3) Bottom: RTT uplink – influxDB connection (Yellow) and iperf3 test (Purple). It was considered relevant for the UC to measure the maximum bandwidth that the 5G network could support in the uplink. This measure can help to figure out the maximum data transmission from the UE to the core without loss of packets. To perform the measure, iperf3 test was used on UDP mode, analysing the bandwidth limit where UDP datagrams started being lost, this limit was established in 20Mbits. We can determine that it is possible to send up to 20 © 2020-2023 iNGENIOUS Page 28 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Mbits per second of data without loss datagrams. In the use case validation, it was only 6-7Mbits per second of video streaming transmission, thus implying we have about 13 Mbits to transmit more information from the UE to the 5G network. To determine the performance of the Flexible PHY implementation with different numerologies, end-to-end measurements were conducted using the tool UDPtest, which was developed at the Vodafone Chair Mobile Communication Systems (TUD). This software tool generates UDP packets, transmits them to an IP address and port and receives them from another port. The size and the time between the UDP packets can be set, hence varying the data throughput. The tool can measure the throughput, the latency and the frame error rate (FER). The measurement setup is visualized in Figure 6. The tool UDPtest is running on Device 1, which in an NI USRP-2974. The UDP packets are transmitted over an Ethernet connection to the Device 2, an NI PXIe-1082 with and NI USRP-2944R. This device runs the PHY transmitter and sends the signal over the wireless channel to the Device 3. This device is an NI USRP-2974 which runs the PHY receiver. The received UDP packets are forwarded over Ethernet to the Device 1, which measures the throughput, the frame error ratio (FER) and the latency. Figure 9: Illustration of the components used in the measurement setup. A wireless line-of-sight (LoS) channel was set with a distance of 4 meters in a controlled and static laboratory environment. A transmit power of 0 dBm was defined and the sample rate was fixed to 𝐵 = 20 MHz. 3.75 GHz was used for the carrier frequency. For 𝑁 ≥ 1024, the cyclic redundancy check (CRC) with 16 bits was applied, and CRC with 8 bits otherwise. Eight (𝑁pilots ) pilot symbols are employed at all payload configurations, and 𝑁 represents the number of samples of each multicarrier symbol. However, a smaller number of pilots, 𝑁pilots = 4, are used for the control channel. The time between the UDP packets was defined to be 200 μs for 𝑁 ≥ 2048 and 100 μs otherwise. Without considering the host processing limitations, the throughput of the PHY is calculated based on the PHY parameters and the occupied bandwidth: throughput PHY = 𝐵 𝑁frame 𝑁bitsFrame , where 𝑁frame = 𝑁preamble + 𝑁payload defines the number of samples in a frame. The number of samples in the preamble is defined as Npreamble = 2𝑁chirp + 𝑁CP + 𝑁CS and for the payload as 𝑁payload = 𝑁 + 𝑁𝐶𝑃 + 𝑁𝐶𝑆 . The length of the chirp, the cyclic prefix (CP) and the cyclic suffix (CS) are defined as 𝑁chirp = 64, 𝑁CP = 32 and 𝑁𝐶𝑆 = 15, respectively. The overhead ratio, describes how many samples of the frame are used for the preamble, and is given as: overhead ratio = © 2020-2023 iNGENIOUS 𝑁preamble 𝑁preamble = . 𝑁frame 𝑁preamble + 𝑁payload Page 29 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) We propose 11 different configurations of the PHY in order to meet different application requirements. The configurations are divided into four groups, namely, H, M, L and C. Specifically, H, M and L represent the high, medium and low throughput configurations, respectively, while C is reserved for the control information. The calculated and the measured throughput for the different configurations are depicted in Table 6 where the FER = 0 was achieved for all configurations, meaning that the wireless link was reliable during these tests. Config 𝑵 𝑵𝐨𝐧 𝑲 𝑴 QAM Order Bytes per block Throughput PHY (Mbps) Over head ratio Throughp ut measure d (Mbps) H0 2048 1792 2048 1 64 666 5.87 0.08 2.94 H1 M0 M1 2048 2048 2048 1680 1792 1680 128 2048 128 16 1 16 64 16 16 624 443 415 5.50 3.90 3.66 0.08 0.08 0.08 2.76 1.96 1.84 M2 1024 896 1024 1 16 219 3.52 0.14 1.75 M3 1024 810 64 16 16 205 3.17 0.14 1.64 L0 1024 896 1024 1 4 108 1.73 0.14 0.86 L1 1024 810 64 16 4 101 1.56 0.14 0.81 L2 512 448 512 1 4 53 1.44 0.24 0.42 L3 512 360 32 16 4 42 1.14 0.24 C0 64 52 64 1 4 4 0.21 0.61 0.34 Too few bytes for UDPtest Table 6. Flexible PHY/MAC throughput measurements with UDPtest The measured throughput is computed with the tool UDPtest using the whole PHY module as seen in Table 6. The difference between the measured throughput and the throughput of the PHY arises due to the limited processing speed of the host, which is not able to handle a higher UDP throughput without dropping packets. The measured end-to-end latency is similar for all configurations ranging between 1.6 ms and 2.9 ms. In the PHY, a smaller frame size leads to a smaller latency. However, due to no significant smaller latency in the measurements, it can be concluded that the major latency comes from the host UDP processing and the UDP communications over the network. The throughput of the configuration C0 was not measured, since the tool UDPtest cannot generate smaller UDP blocks than 30 bytes. However, the transmission of the control information should be robust, which is achieved with the configuration C0. This was verified by several measurements in both LoS and non-LoS wireless channels. It was observed that when the received signal is synchronized, the control information is reliably detected. IMPACT ASSESSMENT This use case focused on cooperative automated robots for future smart factory production lines or warehouses, which are enabled by the integration of a heterogeneous network that interconnects end-devices from different © 2020-2023 iNGENIOUS Page 30 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) technologies and dynamically adapts itself to the application requirements. With the deployment of edge computing, the industrial network will be regarded as a distributed computation platform that enables the programming and scheduling of robots and other resources for multiple tasks. The PoCs of this use case demonstrate how 3GPP-compliant wireless communications systems are able to provide services for industrial scenarios. The allocation of the robot's controller into the MEC provides important costsaving benefits and new functionalities. This strategy allows simplifying and reducing the hardware within the robots, as hardware to compute the control strategies is deployed in the MEC and can be shared by all robots. The advantages are not only cost-saving related but to all benefits of virtualization: easy deployment, flexibility, replicability, and redundancy, among others, are extensible to the robot sector. This allows to improve the efficiency, flexibility and quality of the supply chain and production processes handled by robots. In industrial facilities, AGVs, robots, transport vehicles and people circulate. All of them could be equipped with devices capable of sensing the environment. In this way, they could capture information on temperature, humidity, noise, presence of particles in the air, etc. of the points where they are passing through. All this information could be monitored in real time and it can be possible to detect events and anomalies in the processes, allowing decisions to be made about the processes based on the data collected by the sensors. Additionally, this information could be used to train predictive maintenance systems to react to anomalies in the production chain before they occur. The validation of the end-to-end network slice management capabilities on top of the flexible RAN and PHY-MAC technologies represents a highly impacting result, as it demonstrates the integration of non-standard RAN technologies with legacy 5G networks, specifically in private 5G scenarios for smart factories. Indeed, while the PHY-MAC developed in the project, and deployed and demonstrated in the TUD testbed is a non 3GPP standard technology, the integration performed with the 3GPP compliant Cumucore 5GC validates the feasibility of its deployment, and use in legacy 5G private networks. This allows to avoid the deployment of multiple ad-hoc non-standard networks, and thus enable the integration of heterogeneous technologies under the same 5G private network. Moreover, the use of end-to-end network slice orchestration capabilities enables full network automation by provisioning network and computing resources for operation in private 5G networks for industrial IoT scenarios. This allows to drastically reduce the complexity of private 5G networks management and control, especially in industrial contexts and environments where networking expertise might be limited. In addition, the validated endto-end orchestration functionalities enable the delivery of tailored slices in support of diverse concurrent vertical services, including AGV and robot control, AR/XR video streams, IoT sensing/actuation traffic. The deployment of 5G as Non-Private Network (NPN) with 5GLAN and TSN functionality can address the needs of industrial use cases that require secure mobile communications. NPN can bring secure infrastructure connected only to local data network and optimize specific industrial scenarios resources. © 2020-2023 iNGENIOUS Page 31 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Lessons Learned and Potential Improvements A possible improvement in the protocol for sending sensor data to the base station is using an event-based sampling approach. Currently, sensor data is captured periodically with a constant sampling period. Each time a sensor sample is taken it is sent to the station. The value of the sensed variable may not have changed in value from the previous sample, but it is sent anyway. In contrast, in event-based sampling, the sensed variable information is only sent when an event is detected, i.e. a relevant change in the variable. In this way, by using event-based sampling, communication bandwidth could be saved. The 5GLAN brings some added value when creating private groups of devices to be connected within the industrial network. However, networking and IP planning has to be done differently than public networks which connect from mobile devices to public Internet and require Firewall and NAT. Instead, the 5GLAN connects mobile devices to fixed devices in the same Data network which requires flat IP addressing and proper routing policies to ensure device to device communication between wired and wireless devices. It has been observed during the measurements with the Flexible-RAN setup that significant contribution to the observed end-to-end latency comes from the networking protocol on top of the MAC and PHY layers. This means that for obtaining end-to-end latencies close to 1 ms, more attention should be paid to the upper layers of the communications protocol stack. A potential improvement for the Flexible PHY/MAC is the ability to support runtime reconfigurability of the PHY in a frame-by-frame fashion. The integration, testing and demonstration activities which involved the endto-end network slice orchestration framework have shown the importance of the availability of well-defined and accurate management and control APIs for the support of full automation in service and slice deployment and operation. Specifically, the early availability of the CMC 5GC APIs, as well as those exposed by the PHY-MAC control, allowed to implement in software proper network slice management logics, and also prepare mock-ups to carry out standalone early integration and validation activities. This is a crucial aspect and lesson learned especially when software and hardware components are provided by different vendors or institutions in general. However, it is equal (if not more) important to have standardized APIs and operational workflows. While this is true for the 5GC, where API exposure is at the hearth of the 3GPP specifications (with the Network Exposure Function – NEF - functionalities ), still for the 5G RAN this is an open issue. Different vendors still expose custom and tailored (often non-open) APIs to control and manage their RAN network functions. In this direction, the wide adoption of standard (or de-facto standard) solutions like the one from the Open RAN (O-RAN) architecture would allow to further improve the multi-vendor interoperability for end-to-end 5G networks, as well as make introduction of full automation in slice and services management and operation. © 2020-2023 iNGENIOUS Page 32 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 3 PoC - Transportation Platforms Health Monitoring Objective and Description The Transport UC demonstrates safe and secure micro-edge sensors for monitoring and detecting wear and tear of wheels and axles of cargo train carriages. The micro-edge sensors are attached to each axle and pooled via edge-gateways capable of data fusion. These gateways in turn are connected via terrestrial and nonterrestrial (e.g., satellite) access networks to cloud servers for trend analysis and defect-based maintenance alert management. The overall communication is encrypted for security purposes with an added layer of remote attestation to ensure identity and software integrity of the communication endpoints. Figure 10: Sensing and GW Modules for Rail-Health Data Logging Smart Edge Sensors: During the project, two real-world test series with a total of seven train carriages hosting 75 injection faults were conducted. This resulted in 12,630 datasets. These were analysed via machine learning algorithms. Eventually, the machine learning algorithms were refined with physical models. The refined algorithm was tested and retested with empirical © 2020-2023 iNGENIOUS Page 33 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) and physical fault model simulation and simulator signals. The resulting rerefined algorithms were then reapplied to the initial real-world data. The PoC demonstration for final review covers how smart edge sensors can detect and quantify various defects and communicate to cloud platforms for long trend analysis and maintenance alert management. The edge sensor demonstration includes a physical fault simulator, the sensors for signal pick-up, the near real-time computation engine for feature generation, classification, and meta signal generation, as well as the interface to the end-to-end secure communication platform. End-to-end Secure Communication: In addition to demonstrate the vibroacoustic sensors and how they work, the use case also highlights how smart edge sensors can report their measurements using novel infrastructure for secure communication. In the Transport UC, safety depends not only on the accuracy of the smart edge sensors, but also on the security of the communication. To ensure safety of the train equipment, defects must be reported (i.e., not redirected or suppressed) before an accident can happen. Therefore, the sensor must be able to transmit securely the information about the defect to a control centre of the train company. It should be able to use whatever connectivity option is available at a certain time and location, but the security of the communication must be ensured. To this end, the iNGENIOUS project innovates in the area of secure embedded computers and end-to-end secure communication over networks. The PoC demonstrates a computer architecture targeted at IoT devices, along with the operating system M3, which is co-developed with this architecture. The M3 hardware/software co-design follows an isolation-by-default approach to make building secure IoT devices easier. Currently, it is realized as a system-on-chip architecture on a Field-Programmable Gate Array (FPGA). Details about this architecture, its capabilities and security properties are described in Chapter 3 of D3.3 [3]. The FPGA/M3 component aims to demonstrate end-to-end secure encryption and integrity protection of the sensor information, which is transmitted from an IoT device to a cloud server using industry-standard Transport Layer Security (TLS). However, the main purpose of this part of the PoC demonstrator is to enable even stronger security guarantees by enhancing TLS with remote attestation. BI integrated remote attestation with TLS to create a combined protocol called RATLS (Remote Attestation with Transport Layer Security). In addition to establish cryptographic protection of the communication, this protocol also enables the secure exchange of information about the identity and integrity of software running on both the IoT device and the cloud server. RATLS is demonstrated with mutual attestation of both the IoT device and cloud endpoints. The RATLS connection between the IoT device and the cloud is routed through a simulated satellite link to demonstrate feasibility and also the ability to ensure ubiquitous connection between the sensor and cloud. The PoC demonstration of the Transport UC has taken place in labs at BI and NCG in March 2023 (M30 of the project) and makes use of the satellite testbed provided by iDR. © 2020-2023 iNGENIOUS Page 34 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Setup and Execution The PoC demonstration is a lab-based setup showing how rail-health monitoring could be implemented. It consists of six main components: 1) a physical train axle fault-simulator, 2) vibration sensors for signal pick-up, 3) a FPGA-based computing engine for signal pre-processing and fault classification, 4) the M3 FPGA for IP communication and remote attestation, 5) a simulated satellite link for reporting detected defects from IoT sensor to the cloud, and 6) an interactive demonstration dashboard. Train axle fault-simulator and vibration sensor: While the Transport UC is a real-world application, it is not possible to demonstrate evolving commercial transport lorry defects in a practical manner in real-time. Therefore, the PoC demonstration consists of a live demo via a physical rail-health fault-simulator. The physical fault-simulator can simulate defect-free operation or flat spots with or without additional bearing defects. The concept design of defectsimulator, as well as its physical realization is shown Figure 11. The rail axle runs on a rolling stand simulating the rail track. Surface defects on the rolling stand simulate real-world equivalent flat-spots of 3 to 8 cm in width. As the rolling stand is moved parallel to the wheel axle, various combinations of single and multiple flat spots can be simulated and fault-injected into the sensing system. Bearings supporting the axle can be chosen with or without bearing defects (inner, outer, roller, or combination). Both speed and load parameters can be adjusted. This allows the testing and data collection of millions of simple and complex fault combinations, far exceeding the available real-world data. Figure 11: Rail-Health Flatspot Harshness and Bearing Defect Demonstrator (Concept & Design) This physical fault simulator was correlated with known real-world data and then used to validate theoretical simulation fault models. Theoretical simulation fault models were very important in this development to determine maximum sensing resolution requirements and in understand sensing limits. Theoretical data was used for boarder testing of the embedded hardware algorithm implementation. Embedded hardware typically uses lots of approximations, to stay performance and energy efficient. To make sure that there are no undesirable effects, boarder testing is a very effective validation technique. Figure 12 shows the test setup for simulated fault injection and physical sinusoidal fault injection testing. © 2020-2023 iNGENIOUS Page 35 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 12: Rail-Health Simulated Fault & Sinusoidal Fault Injector Set-up The combination of real-word, simulation and physical-fault model testing ensures that the integrity of the algorithms developed survives real world variation and allows recognizing even previously unseen real-world events. FPGA-based IoT computer and cloud server: The third main component is an FPGA-based prototype of a secure-by-default embedded computer. The FPGA is shown Figure 13, together with an Ethernet extension board that enables network connectivity. The FPGA is connected to the microcontroller of the NCG sensor via a UART link. The system-on-chip synthesized onto the FPGA is the hardware part of a hardware/software co-design that supports the M3 operating system. The M3 OS hosts an application that has access to the UART interface. This application obtains both the raw sensor data and the defect classification from the NCG smart sensor and sends the data to a server application running on a Raspberry Pi 4B single-board computer (fourth component, see Figure 14). This Raspberry Pi represents a cloud server of the hypothetical train company, which monitors their assets and would react to reported defects by sending affected carriages to maintenance. Figure 13: BI's M3 hardware/software co-design platform realized on FPGA development board, with external Ethernet extension board © 2020-2023 iNGENIOUS Page 36 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The Raspberry Pi 4B uses a Trusted Platform Module (TPM) as the root-of-trust for generating an attestation report about the server software running on the single-board computer. On the IoT device side, a signature service running on a dedicated processor tile simulates the root-of-trust that BI designed for the M3 hardware/software co-design platform. On both the IoT device and the cloud endpoint, RATLS obtains a software attestation report from the respective root-of-trust that is part of the system. Using these attestation reports, both endpoints validate the identity and integrity of the software running their respective peer. Figure 14: Raspberry Pi 4B single-board computer with a Trusted Platform Module (TPM) attached to the GPIO pin header Simulated satellite link: To simulate the satellite network for this testbed, iDR provided access to a simulated satellite emulator that connected to real satellite remotes and hub terminals, which are accessible via ingress and egress routers at iDR and SES premises. As shown in Figure 15, BI’s FPGA and the Raspberry Pi connect via the internet to the simulated satellite network endpoints to establish an RATLS connection over the simulated satellite. For this use case, the simulated satellite network characterised the timing behaviour of a real satellite in geo-stationary (GEO) orbit. Figure 15: Simulated satellite infrastructure with ingress and egress routers, enabling the smart edge sensor (BI IoT device) to connect to the cloud server (BI cloud) © 2020-2023 iNGENIOUS Page 37 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Demonstration Dashboard: There is sixth component of the PoC demonstration for the Transport UC that is an interactive dashboard. The dashboard was built by BI and consists of a table with a large touchscreen (see Figure 16) that visualizes the state of the RATLS connection establishment and data transmission. Remote attestation can be switched on and off to demonstrate the security enhancements. Figure 16: Main dashboard table showing RATLS connection establishment and touch controls for enabling and disabling remote attestation A secondary display (Figure 17) shows the internal state of the smart sensor and the raw data measured by the vibroacoustic sensor, as well as the classification of the vibration patterns (“OK” and various types of “flat spots” and “bearing defects”). Figure 17: Secondary display showing smart sensor state and defect classification. The PoC demonstration included the following steps: 1. NCG train axle simulator: Configuration of “no defect” as well as various types of defects (“flat spots”, etc.) that are measured using the vibroacoustic sensor. The measured data and classification are shown on the secondary screen of the dashboard and explained. © 2020-2023 iNGENIOUS Page 38 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 2. BI cloud server: Configuration of the cloud server to run either “correct” or “manipulated” software, which will be checked by the FPGA/M3-based IoT device. 3. BI FPGA/M3-based IoT device: Reporting of detected defect type to the Raspberry Pi cloud server by initiating, via the touchscreen, the transmission using both standard TLS (state of the art) and RATLS (with stronger guarantees about connection). 4. BI touchscreen table: Discussion of the results and security properties of the transmission for “correct” / “manipulated” software and “standard TLS” / “RATLS” configurations. 5. iDR data logs: Review of telemetry captured for RATLS transmission over the simulated satellite link to verify data encryption. ISSUES ON EXECUTION The following subsections provide description of issues encountered during the demonstration and mitigation actions to solve them. Description of the issue Mitigation measures Early during execution of the project, BI identified the risk that an FPGA-based hardware implementation of a root-of-trust for the M3 platform would not be ready to use for demonstration. According to the mitigation plan for the identified risk, the software-based parts of the root-of-trust were run on a dedicated processor tile to simulate the behaviour of a fully integrated root-of-trust in the hardware. The risk and mitigation measures have been documented in D6.1 [1], D6.2 [2], and D3.3 [3]. A stability issue caused certain application scenarios to crash consistently, including the remote-attestation scenario that is required for demonstrating the Transport UC. A bug in the FPGA-based hardware design of the M3 platform is suspected to be the cause for this problem. Due to limited (hardware) debugging capabilities of the experimental M3 platform, the bug has not been fixed at the time of writing. Development, testing, and integration activities were slowed down. As a mitigation, the M3 hardware design and operating system have been downgraded to the base version used for the mid-term review. This version was known to be sufficiently stable for the remote attestation scenario. System services and integration for client-side measured application launch and root-of-trust signature service have been backported to finalize demonstration activities. Table 7. Transport UC issues on execution Validation and Results In this section, the results the test cases identified in D6.1 [1] are summarized. TEST CASES VERIFICATION In this section, the test case verification is reported. More additional information on test case results can be found in Test Cases Verification. Test Case ID Result UC3_TC_01 – Lifetime Operation – Battery Life Passed* UC3_TC_02 – Connectivity Frequency Passed* © 2020-2023 iNGENIOUS Page 39 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) UC3_TC_03 – Connectivity Coverage Passed UC3_TC_04 – Edge Storage Passed UC3_TC_05 – Multimodal Connectivity Passed UC3_TC_06 – Monitoring Resolution Passed* UC3_TC_07 – Monitoring Capability Passed* UC3_TC_08 – Cloud Defect Validation (Optional) Passed UC3_TC_09 – Gateway Defect Validation Passed UC3_TC_10 – Security (Phishing) Passed UC3_TC_11 – Security (Listening) Passed UC3_TC_12 – Security (Flash) Passed* UC3_TC_13 – Security (Commanding) Passed* UC3_TC_14 – Data Encryption N/A UC3_TC_15 – Functional Safety Passed UC3_TC_16 – Fire/Explosion Safety Passed UC3_TC_17 – The radio access should be able to run local application processing when user selects low latency for selected applications UC3_TC_18 – Extended Satellite Coverage – Confidentiality of satellite backhauled sensor data N/A Passed UC3_TC_19 – Communication Load Optimization N/A UC3_TC_20 – OTA upgradeability (Optional) N/A UC3_TC_21 – Extended Satellite Coverage – Satellite Multi-Protocol Support Passed UC3_TC_22 – Extended Satellite Coverage – IP Connectivity Passed UC3_TC_23 – Extended Satellite Coverage – Satellite backhaul latency Passed Table 8. Transport UC Test case verification The Transport use case is evaluated based on three groups of test cases. Smart edge sensors: The first set of test cases (UC3_TC01 through UC3_TC09, UC3_TC15, UC3_TC16) covers the smart edge sensors developed by NCG. In summary, the results for these tests show that commercial rail health monitoring is technically and economically possible, even when considering KPI changes not known at the beginning of this project. Remaining, or shall we call them new problems such as 30 instead of 12 years of autonomous operation can be addressed with emerging new technologies such as triboelectric energy harvesters. The research proved that commercial rail-health monitoring can be achieved with very high defect resolution with low-cost Bill-of-Material designs. It also showed defect validation at the edge is far more cost and energy efficient than in the cloud, and that edge classification can be easily validated via simple statistical classifiers to achieve high levels of functional safety integrity. The edge sensing concepts developed for rail-health can be easily ported to other domains – such as industrial condition monitoring of rotary equipment (pumps and motors), giving us a platform for economic growth. IoT device security and communication with the cloud: The second set of tests, performed by BI, aims at demonstrating that the state of the art in IoT communication security and IoT device security has been advanced. Both © 2020-2023 iNGENIOUS Page 40 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) aspects were considered together and cover the enhancements made to the M3 hardware/software co-design platform and the Transport Layer Security Protocol (TLS). Test cases UC3_TC_11, UC3_TC_12, and UC3_TC_13 cover the extension of TLS with the concept of remote attestation, which resulted in the combined RATLS protocol. They also cover the integration of RATLS with two roots-of-trust: Industry-standard TPM 2.0 (used in the Raspberry Pi that represents the cloud server) and the root-of-trust that has been designed and partially implemented for the M3 platform. This part of the Transport use-case PoC demonstration shows that security guarantees for cooperation and communication between an IoT device and a cloud server are stronger that with standard TLS, as both endpoints mutually attested each other. This attestation performs a verification of the identity and integrity of the software on either device, resulting in endto-end secure communication between a trustworthy device and cloud server. Satellite connectivity: The final set of test cases covers the simulated satellite link, aimed at demonstrating feasibility and the ability to ensure ubiquitous connection between the sensor and cloud. The simulated satellite link mimics the timing behaviour of a real satellite in geo-stationary orbit. The iDR simulated satellite network was used for staging and testing configurations on an ongoing basis and to validate test cases UC3_TC_18, UC3_TC_21, UC3_TC_22, and UC3_TC_23. Figure 15 provides an overview of the simulated satellite network setup and how is it was used to connect the IoT device to the BI cloud. Table 9 provides a summary of the dates the end-to-end testing was performed along with a brief description of activities carried out using iDR’s simulated satellite network. Lab testing date 25/02/22 05/04/22 Use case testing activities Design & configuration for Midterm demo Initial testbed testing over simulated satellite network 25/10/22 Transport UC Satellite testing 09/12/22 Transport UC Satellite testing 08/03/23 Final Demo Preparation 15/03/23 Final Demo Lab testing Designed testbed Verified initial test setup including satellite lab system, GEO satellite simulator and routing. Introduced satellite delay of 560ms and test end-to-end. BI successfully routed experimental TLS variant without FPGA over simulated satellite network BI successfully routed experimental TLS variant using FPGA over simulated satellite network Verified testbed and routing was in configured correctly. Tested & validated endto-end IP connectivity over simulated satellite network Performed end-to-end demonstration between BI endpoints over simulated satellite network and gathered relevant captures Status Passed Passed Passed Passed Passed Passed Table 9. iDR Lab Testbed Usage A detailed description of the test case execution and verification is provided in Annex II – Validation and Results. © 2020-2023 iNGENIOUS Page 41 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) KPIS In this section, KPIs defined for Transport UC are listed and the results are briefly summarized. KPI Test Case Reference Target Actual Autonomous Operability UC3_TC_01 12-year operability without maintenance. 5+ data points per day. Achieved Low power MCU OK Low energy COM OK Critical Event Monitoring Cost Effectiveness UC3_TC_02 UC3_TC_03 UC3_TC_04 UC3_TC_05 UC3_TC_06 UC3_TC_07 UC3_TC_08 UC3_TC_09 UC3_TC_01 UC3_TC_09 UC3_TC_15 UC3_TC_16 Wake up on event 30 fault intensity classes FS 1 fault intensity classes FS Defect validation No additional load sensor No additional speed sensor Achieved Flat spot 5+ OK Bearing defects 3 OK Statistic defect val. OK No load sensor OK No speed sensor OK Less than €25 per Sensor Achievable 2 sensors per axle OK 1 sensor per axle 90% OK Functional Safety UC3_TC_15 SIL Level 2 PFH/PFD Metrics Argumentation possible Fire & Explosion Safety UC3_TC_16 ATEX Compliance Achievable ATEX battery OK Low energy reserve OK Gateway–Cloud Security + Sensor–Gateway Security Achieved: End-to-end secure communication + endpoint identity and integrity verification Concept BLE Mesh Concept Lora Mesh Concept NB-IoT + Satellite Backhaul Multimodal connectivity Security Attack Robustness Connectivity Coverage UC3_TC_10 UC3_TC_11 UC3_TC_12 UC3_TC_13 UC3_TC_14 UC3_TC_20 UC3_TC_03 UC3_TC_18 UC3_TC_21 UC3_TC_22 UC3_TC_23 Table 10. Transport UC KPIs The original edge sensor KPIs were fully achieved. The additional targets defined after the start of the project were not achieved. For economic reasons, the lifetime expectancy was increased from 12 to 30 years. This makes battery operation unachievable. Larger batteries are also not ATEX compliant, so the energy concept has to shift from battery operated to harvester operated. Fortunately, there is enough vibrational energy to in the range between 1001000Hz to make vibrational energy harvesting possible. Tribo-electric energy harvesting is cheap and capable, the question is if such an extensive lifetime can be achieved with such technology. The research has been started, outside the scope of the iNGENIOUS project. The KPI on Security Attack Robustness is non-quantitative, as it relates to improved security. This KPI has been met, as additional security guarantees (end-to-end secure communication with verifiable endpoint identity and integrity) are enabled by integration of remote attestation with TLS. © 2020-2023 iNGENIOUS Page 42 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IMPACT ASSESSMENT The iNGENIOUS Transport UC focuses on eight improvement areas when compared with conventional IoT sensors: • • • • • • • • • Energy Harvesting – 25+ years of operation. Always On – Incident Location Determination. Micro Edge Sensing – Low Power Computing. Mesh – Healthiest Node Communication. Lora – Pay per Uses Data Transmission. Cloud – Feature based Fault Verification. Secure Authorized – TLS + Remote Attestation. Novelty Detection – Sensor Swarm spiced with Novelty Loggers. Satellite Connectivity – coverage extension and satellite IoT payload optimization. Part of the work was purely conceptional, while another part achieved full function maturity. The combination of Edge-Computing, Edge-Node Attestation and Multi-Modal communication enables further projects. The ideal edge sensor requires no physical wiring and no battery maintenance. It is always-on when needed; and can be used in mobile and stationary applications. This requires smart low-power designs. Sensors collect inherently sensitive information. It can be personal and/or it can be commercial information. To ensure unauthorized access TLS and data encryption are not enough. Remote attestation stops unauthorized access and prevents brute force attacks. It is an ideal security extension for financial and medical IoT applications. Information gaps due to communication outage can be costly, Multi-modal connectivity reduces communication outage while optimizing bandwidth usage and minimizing communication cost. In this particular use-case, the optimization of communication energy was the key driving factor. EdgeSensors and Edge-Gateways running on batteries or harvesters are always energy starved. Using the most energy efficient communication paths for all sensors as a swarm is the best way to stretch limited energy reserves. Adding satellite connectivity extends the possible use-cases to far out of reach regions, warzones, and shipping applications. The work invested in building both physical and theoretic fault models for train carriage axles has a wonderful side-effect for future-based research. Vibrational tribo-electric energy harvesting is an essential area for future development. The physical fault-generator can be used to quantify available energy levels in defect-free and defect-invested situations. Neuromorphic computing is very good at pattern recognition. In a very noise contaminated environment, pattern recognition is not very effective. However, the simulated fault model can be used to define signature points to be recognized in signal patterns. This will allow us to develop extremely efficient neuromorphic classifiers in the future. As the applied technologies span so many use-cases, further cooperation between the cooperation partners involved is almost ensured. Currently there © 2020-2023 iNGENIOUS Page 43 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) is discussion on a joint medical edge application using remote attestation to ensure security and confidentiality. NCG will exploit the research performed in the Transport UC by partnering with Rail-Tech Software as a Service (SaaS) providers and by providing accelerated AI development support. The SaaS provider manages domain specific knowhow and data commercialization. The Edge IoT Sensor developed for this UC will be developed further and then licenced to the Rail-Tech SaaS Partners. Remote attestation is not a new concept, but to this date, it is hard to deploy in practice in distributed systems like IoT networks. By integrating remote attestation with industry-standard TLS, the Transport UC removes a barrier that system designers face when developing new IoT solutions with strong security requirements. Furthermore, the isolation-by-default approach of the M3 platform with a root-of-trust integrated will make it easier to build embedded computers for IoT devices. Overall, this work has the potential to build a more secure and therefore more trustworthy Internet of Things. But the principles and building blocks can be applied to any distributed system beyond IoT. Lessons Learned and Potential Improvements Rail-Health condition monitoring involves many stakeholders. Each of them wants to reap benefits from this innovative technology, but in the end only one stakeholder will pay for the IoT investment. In this particular use case, it is the rail-carriage leasing operator, which wants to minimize maintenance cycles. If possible, regular 6-year maintenance intervals shall be shifted to 12 years or longer. Accident prevention, reduction of rail track damage from poorly maintained assets, and better planning cycles, are not considered in the overall business case. And twelve years amortization duration is fairly long. Without legislation requirements on accident prevention, or penalties on infrastructure damage due to poor managed assets, it takes really gutsy Chief Finance Officers s to accept such a long Return on Investment period. But without proven in use track records and field data, it is difficult for technology innovations to influence regulatory policy. Automotive airbags were first equipped in the early 1970s, while mandated legislation did not follow until 1999. So, the challenge is to find an early adopter and/or expand the use case benefits to get more traction. © 2020-2023 iNGENIOUS Page 44 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 4 Demo – Situational Understanding in Smart Logistics Scenario Objective and Description The main objective of the use case and its demonstration was to enhance the situational understanding of events in maritime ports and terminals by combining multiple data sources and, subsequently, developing different Artificial Intelligence models able to predict and optimize the time spent by trucks inside the port facilities, i.e., truck turnaround times (TTT). To achieve this main objective, the present use case demonstration proved the following aspects: • Ingestion and integration of • • • • • • • • • online data sources (PCS data, Gate In/Out events, etc.) in two different scenarios: the Port of Valencia and the Port of Livorno. Vessel schedules, cargo flow and truck traffic level calculation and predictions for both the Port of Valencia and Livorno scenarios by exploiting different ML-based prediction models. TTT calculation and prediction at both ports Valencia and Livorno by exploiting different ML-based prediction models. Development of online API able to provide vessel schedule, cargo flow, truck traffic and TTT predictions. Development of visualization interface showing historical and real-time predictions for the vessel schedules, cargo flow, truck traffic and TTT parameters. Visualization of the past and ongoing accuracy of predictions for each parameter. Testing real-time positioning of trucks inside the Port of Valencia and Port of Livorno by using IoT tracking devices. Development of a Geographic Anomaly Detection module to validate the positioning data obtained from IoT tracking devices. Development of a graphical interface for visualizing the IoT tracking measurements with maps in the Port of Valencia and Livorno. TTT validation by comparing the data obtained through ML-based prediction models and the information retrieved from IoT tracking tests. © 2020-2023 iNGENIOUS Page 45 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The main part of the Port Entrance UC was performed through the statistical validation of Artificial Intelligence models developed using large historical datasets collected from the ports, and by demonstrating the operation of models with continuous data integrations in an online cloud environment. Dedicated dashboards were designed to show charts for the predicted parameters. These charts visualize the predictions for main target metrics including vessel arrival times, container traffic rates, and truck turnaround times. The predictions were performed by exploiting a combination of MLbased prediction models. Statistical analysis of the accuracy of these models was implemented using data science best practices, e.g., by applying nested cross-validation to estimate model performance in an unbiased manner. Complementing this demonstration, real-time positioning data was visualized and represented in a graphic interface based on HERE maps API [4]. For case of the port of Valencia, this data was collected by the IoT tracking devices installed in trucks performing regular import/export operations at the port. For the port of Livorno, this positioning data is provided by the IoT tracking devices installed in the cars owned by the port’s staff, which were used to simulate a truck. The different steps of the demonstration were executed in different time periods at the ports of Valencia and Livorno. AWA and FV carried out the deployment of ML-based models for predicting TTT in a software-based environment during the last week of January and the first weeks of February. At the port of Valencia, real IoT tracking tests were performed between 15th and 22nd of January. At the port of Livorno, these tests were performed between 6th and 19th of February. Through this demonstration, the project managed to prove that the situational understanding of events in maritime ports and terminals can be enhanced by combining multiple data sources and exploiting Machine Learning and IoT technologies. ML-based models were developed to optimize and predict TTT by exploiting data from different data sources such as Port Community Systems (PCS), summary declarations and Gate Access Systems. Additionally, IoT technology was exploited to validate the results obtained from ML-models through the data obtained in real-time positioning tests performed over trucks in the port of Valencia and Livorno. By enhancing situational understanding and optimizing truck turnaround times, maritime ports and terminals could reduce truck traffic congestion in peak traffic times. An efficient optimization of the flow of trucks contributes to reduce congestions and queues, thus leading to higher port and terminal performance. At the same time, the reduction of queues and congestion leads to lower CO2 emissions. Setup and Execution The process of setup and execution of this demonstration was split in two main parts: one related to the integration of data sources and the development and deployment of ML-based algorithms, and another related to the execution of IoT tracking tests. © 2020-2023 iNGENIOUS Page 46 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) PART I In this activity, the setup and execution were designed according to the traditional data science approach where data analysis, data ingestion, data preparation, model development, model deployment and data visualization phases are typically executed. Since the demonstration applies mainly machine learning models designed to be trained using supervised learning and statistical models based on distribution fitting, this activity has been conducted by following a two-step strategy, first exploiting historical or offline data sources in model development and training, and then deploying the models for inference using real-time or online data (see Figure 18). Figure 18: Data Integration and ML-Based Algorithm Approach Within both stages, the phase related to ML model development and deployment was performed through a combined strategy where two different ML pipelines were designed to approach the problem from two possible angles: Figure 19: Data Integration and ML Pipeline Division Approach On the one hand, AWA designed a ML pipeline based on the combination of different AI models for vessel Estimated Times of Arrival (ETA), cargo exchange volumes per vessel port call and container dwell times, which were used to generate estimates of future port gate exit event rates, and in turn were used as inputs in predicting the variation of truck turnaround times at the port. This approach assumes a worst-case scenario where only port call data is available for the service in the online phase. This can be assumed to be a common scenario in many commercial deployment cases, as e.g. cargo exchange and vehicle gate event data is not readily available for all organizations in most ports. Furthermore, the combination of models and data features used in this pipeline is designed to provide as accurate predictions as possible for long-term © 2020-2023 iNGENIOUS Page 47 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) operations, e.g. several weeks ahead, primarily on a daily or weekly level of temporal granularity. On the other hand, FV designed an ML pipeline relying on the use of autoregressive models (i.e., SARIMA) and typical regression models for calculating truck turnaround times. By exploiting use of autoregressive models, this approach relies on past gate in events to predict future gate in events in the short term. These future gate events are used as input for the TTT regressive model that predicts the final truck turnaround times. This approach relies on a best-case scenario approach where port call and gate in data is available. Consequently, and because of the nature of autoregressive models, this pipeline is able to provide accurate results in the short-term. According to the proposed approach, the execution procedure of the different phases for both offline and online phases is described as follows: Offline Stage a) Data Inspection: Multiple offline data sources were first leveraged for developing and training ML-based algorithms. In particular, the set of data sources used in this first stage were: • Vessel Port calls: Historical dataset extracted from ValenciaportPCS API that contains information related to the arrival and departure of vessels, i.e., port calls, at the port of Valencia for 2019 and 2020 time periods. The dataset was provided in CSV format and is composed of 11818 registers and 15 columns, including information related to the vessel name, Estimated Time of Arrival (ETA), Estimated Time of Departure (ETD), Actual Time of Arrival (ATA), Actual Time of Departure (ATD), terminal of operation, etc. • Vessel Master: Historical dataset extracted from VESSL system (owned by FV), which includes detailed information of the characteristics of a large set of vessels performing container shipping activities. The dataset is available in CSV format and is composed of 3280 rows and 9 columns, where each row refers to a vessel and columns include information like the IMO and vessel dimensions (length, breadth, draught, Gross Tonnage, TEU, etc). • Summary Declarations (COARRI): Historical dataset obtained from ValenciaportPCS that contains information related to the containers loaded and discharged from vessels arriving and departing from the port of Valencia in 2019 and 2020 period. The dataset was provided in CSV format and is composed of 145703 rows and 35 columns where each row refers to a container discharge event and columns provides information related to the vessel name, port call identifier, container plate, operation type, container full or empty, timestamp for the loading or discharge from the vessel, etc. • Gate Access Data (Gate In): Historical dataset obtained from Gate Access Systems that contains information related to vehicle ingress to the port of Valencia between 2019 and 2020. The dataset was provided in CSV format and is composed of 3.946.842 rows and 15 columns where each row refers to a vehicle entry to the port. Columns provide information related to the gate in event such as the gate id, truck plate number, vehicle country, gate in timestamp, etc. © 2020-2023 iNGENIOUS Page 48 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Gate Access Data (Gate In – Gate Out events): Historical dataset obtained from Gate Access Systems that contains information related to the ingress and departure of trucks to the port of Valencia in 2019 and 2020. The dataset was provided in CSV format and is composed of 178378 rows and 5 columns, where each row refers to the combination of gate in and gate out event for one vehicle, and columns provide information related to the truck plate, container plate and the timestamp for the ingress and the exit of the truck. • Global Automatic Identification System (AIS) Data: Global maritime regulations require commercial vessels to transmit their locations and other vessel information through the global VHF-based AIS system. An extensive set of global AIS data was collected during the project to enable development of prediction models for vessel traffic schedules, and implementation of online predictions based on streaming data. This data was ingested at a rate with order of magnitude 5-10 million messages per hour, resulting in a raw dataset of global AIS data starting from 2021 with total magnitude of order 100-200 billion AIS messages. This data was filtered and processed to produce labelled vessel voyages to target ports, which were used in machine learning model development. b) AWA Pipeline: As previously described, AWA’s pipeline focused on the development of predictive models for vessel ETA, cargo exchange volumes per vessel port call, and the distribution of dwell times of containers in the port before exiting by truck. These models were used to generate estimates of future port gate exit event rates, which in turn were used as inputs in predicting the variation of truck turnaround times at the port. This modelling was limited to the subset of data where timing information was available for all steps of the cargo flow in the port, including vessel arrival, container discharge, and exit through the gate by truck. Figure 20: Data sources and model components developed for the demonstration. b.1) Offline Data Preparation: On a high level, the datasets used in the development can be divided into vessel traffic (AIS) data, port call data, cargo operations data, and gate event data. The main objective in offline data preparation in the AWA pipeline was to combine the available datasets in a way that enabled tracking the times of related events surrounding the port operations. For example, a vessel is tracked over its voyage to the port, the voyage can be associated with port call information (such as start and end times, locations, cargo information, © 2020-2023 iNGENIOUS Page 49 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) etc.), cargo operations during the port call can be associated with timestamps for individual cargo item movements (e.g. a container discharged from the vessel), and hinterland events (such as a truck exiting the port) can be associated with individual cargo items. On a higher level, creating these connections requires each dataset to include identification information also present in other associated data. Once data was prepared for analysing the individual steps in container flow through the port, models were developed to describe and predict related time durations. Developed prediction model components include vessel arrival time prediction, cargo exchange volume prediction, container dwell time prediction, and truck turnaround time prediction. b.2) Model Development: The fundamental idea in the developed prediction pipeline is that individual vessel arrival times can be estimated using existing information sources and machine learning (ML) models, and while it is difficult to predict the dwell time of an individual container in the port, the total flow rates of containers related to the vessel port calls can be approximated using stochastic models. The model pipeline simulates the number of containers transported by trucks out of the port during a selected time range. This is implemented as a Monte Carlo (MC) simulation, which models the rate of containers exiting the port by adding a predicted number of randomly sampled container dwell times to predicted vessel arrival times. For training the prediction models, the vessel arrival times are obtained from the actual times of arrival in the Valencia port call dataset, and the numbers of outbound containers by truck are estimated from the container operations and gate events datasets. The distributions for container dwell times are estimated empirically by distribution fitting. In addition to the discharge and port dwell time distributions, which are here assumed to be stationary, the main dynamic inputs needed for the model described above are the vessel arrival times and numbers of containers to be discharged per vessel to be carried out of the port by trucks. Of these, the container discharge numbers can be expected to be more difficult to obtain from external sources, as terminal operators do typically not share such cargo exchange information publicly. To enable predictions without receiving this information, dedicated regression models are applied to predict the cargo discharge volumes per port call. These were implemented as extreme gradient boosting (XGBoost) models, with model selection and hyperparameter tuning performed using 3-fold cross-validation and testing of the model selection and acquisition of test data for performance evaluation obtained using additional 10-fold nested cross-validation. To apply the above-described traffic prediction models over as long-time frames and as accurately as possible, future vessel arrival schedules were predicted using global Automatic Identification System (AIS) data. A separate prediction model pipeline was developed to predict for a given vessel its current destination, the geographical voyage trajectory to this destination, and the duration of the voyage along this trajectory. These © 2020-2023 iNGENIOUS Page 50 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) component models applied various machine learning techniques trained using extensive historical vessel traffic data. The truck traffic rate variation obtained as output of the predictive simulation system described in 149 of Annex III was used as an input feature in predicting truck turnaround times at the port. This was determined to be the most important input feature in feature importance analysis of regression models for truck turnaround time. These regression models were implemented using the XGBoost framework and the cross-validation procedures described above for cargo volume prediction. c) FV Pipeline: There is an alternative method to predict the TTT of the port, especially for short-term time periods (i.e. 24-48 hours). This method combines two artificial intelligence models. The first one consists of an autoregressive method (i.e., SARIMA) to predict the number of trucks that will enter the port (i.e., Gate-IN events). The second one uses a Machine Learning algorithm (i.e., Random Forest Regressor) to predict the TTT using the output of the previous model and other variables such as vessel traffic, hour, and the day of the week (see Figure 21). Figure 21: Autoregressive + ML method to predict TTT c.1) Offline Data Preparation: After identifying the data sources required to approach the TTT prediction, data needed to be prepared and merged to create the final datasets to be injected as input to the ML-models. In this case, since TTT can be directly influenced by maritime and terrestrial events, the data sets exploited to feed TTT models were port calls dataset and gate access data (including gate in and gate out events). The dataset used to train the TTT prediction model contains the following variables (see Figure 22): Figure 22: Final TTT data frame On one side, gate access data was first processed with the following data preparation by: i) importing the datasets containing gate-in and gate-out events to Jupyter Notebook; ii) merging these datasets using the truckplate parameter for the matching; iii) dropping the truck plate parameter; iv) calculating the TTT for each gate-in and gate-out pair by subtracting the timestamp of the former to the later; and, v) resampling the resulting dataset to calculate the average TTT on an hourly basis. © 2020-2023 iNGENIOUS Page 51 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Moreover, the vessel port call dataset the vessel master dataset was processed together by using the International Maritime Organization (IMO) parameter, classifying the vessels into 6 groups depending on the vessel’s size, and resampling the resulting dataset on an hourly basis. In parallel to the above data preparation tasks, to train the gate-in prediction model, the gate-in dataset has been resampled to calculate the number of trucks per hour from the first to the last timestamps appearing in the datasets. The final step consisted of merging the three prepared sub-datasets to obtain the one shown in Figure 22 For more detailed information about the data preparation tasks, the reader is referred to the Annex III. c.2) Model Development: Gate-IN forecast model After representing the Gate-in dataset in a chart – by executing the seasonal_decompose() function from the python’s statsmodels library – it can be seen that the data has a strong seasonal component (see Figure 23). For this chart plot, the weekends have extracted. Figure 23: Gate In time series analysis In time series forecasting, autoregressive models (a.k.a ARMA models) are used to give good results. For the gate-in prediction, the SARIMA [5] (Seasonal Autoregressive Integrated Moving Averages) model was used. The model development phase consists of finding out the (p,d,q)×(P,D,Q)m parameters [6] that allow us to generate the model and train it with the dataset prepared. To do so, an accurate analysis of the time series was performed using various functions of the statsmodels. Using the results of this analysis, the auto_arima() method of the pmdarima library [7] was run to get the best parameters of SARIMA model (i.e. p,q,P and Q). The best model parameters’ combination is (2,0,2)(1,0,0)24. The model was generated using the SARIMAX() class of statsmodels library and fitted with the dataset using its fit() function. Figure 24: Gate In SARIMA model instantiation TTT prediction model With the TTT_train dataset obtained after the data preparation phase, values were first normalized to [-1,1]. To find out the best configuration parameters (a.k.a hyperparameters) that control the learning process of our models, the whole set of observations was split into a train set and a test set. The former was used to initially fit the model while the latter was used to evaluate the predictions done by the fitted model with the true values from this partition. A good rule of thumb in ML is to split the dataset in © 2020-2023 iNGENIOUS Page 52 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 80/20. In this, a random split of our observations (see line 8 in Function 2) was made using the Panda’s sample function of our dataset class. The next step consisted of finding the best hyperparameters for the ML algorithm used to generate the model. In this case, a Random Forest Regressor [8] using the RandomForestRegressor class of ScikitLearn library was leveraged. The most common parameters to fit were the number of decision trees (i.e. the n-value) and the depth of the trees (d-value). A for loop (see Figure 25) was developed to consecutively train a new RF model changing the values for these hyperparameters, calculate the Mean Absolute Error for each iteration, and save the result in a separated dataset. The combination of hyperparameters that generated the model with the lowest MAE is 10 number of decision trees and 7 as the maximum depth of the trees. Figure 25: Random Forest Regressor hyperparameter tunning for the TTT model Finally, the model was generated by instantiating the RandomForestRegressor class with the selected hyperparameters and fitting the model with the training dataset. Figure 26: TTT Random Forest model instantiation and fitting Online Stage a) Data Inspection: • Port calls: Data extracted in real-time from ValenciaportPCS API that contained information related to the arrival and departure of vessels, i.e., port calls, at the port of Valencia. The data was provided in JSON format and includes information related to the vessel name, Estimated Time of Arrival (ETA), Estimated Time of Departure (ETD), Actual Time of Arrival (ATA), Actual Time of Departure (ATD), terminal of operation, etc. • Gate Access Data (Gate In and Gate Out events): Data extracted in realtime from PI System OSIsoft (M2M platform) that contains information related to the ingress and departure of trucks to the port of Valencia. The data was provided in JSON format and includes information related to the truck plate, container plate and the timestamp for the ingress and the exit. b) Data Ingestion: To deploy the model, its input data that was used to compute the prediction needs to be available and accessible online through an API. The Gate-in, port call and gate-in/out data were made accessible through the implementation described in the architecture of Figure 27. © 2020-2023 iNGENIOUS Page 53 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 27: Port Call and Gate Access online data ingestion setup In the setup of Figure 27, there are two main components that make the models’ input data available online: • PortCall API: Component implemented in python that provides a HTTP/REST API to access future port call schedule information through a GET request with given date parameters at the request. This API was consumed by the component running the prediction models. This component was implemented using the Flask [9] tool which provides a Swagger front-end for the API test and documentation. It leverages the flask_restx and flask_httpauth libraries. The information returned in this API was retrieved directly from the Port Community System of the Port of Valencia. • Gate API: Component that provides an HTTP/REST API to access the gate in and out information. It also runs a message processing mechanism that simplifies the way it is accessed by the PI System. This module was implemented using the Node-Red [10] tool in which two separated files have been generated. The first, called Gate_in_api.json, includes the mechanisms to calculate the number of vehicles that entered the port within the time interval provided with the GET request to this API. The second one, called Gate_in_out_api.json, provides the code to calculate the average TTT for the given time interval at the received request. This API call was used for the online validation of the TTT predictions. The components above are executed on two different Docker components in a Linux virtual machine running in the datacenter of Fundación Valenciaport. c) Online Data Preparation: The data preparation followed the same approach explained in the offline stage. d) AWA Model Deployment: The developed models were deployed as microservices in a Kubernetes cluster managed by Awake.AI in the Amazon Web Services (AWS) cloud platform, as illustrated in Figure 28. The system consists of multiple microservices for data ingestion and processing, continuous monitoring of events, and applying prediction models using latest available input data. The microservices communicate streaming data through a Kafka messaging backend and on-demand requests through REST APIs. Various databases in the cloud environment are used to enable stateful service operation as necessary. To demonstrate the prediction models developed for the use case, the vessel ETA models are integrated to the commercial Awake.AI Smart Port web application enabling interactive © 2020-2023 iNGENIOUS Page 54 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) visualization and testing of the models. In addition, all developed models are included in a custom service which implements the entire developed prediction pipeline and provides a custom web interface for testing and demonstration. Figure 28: Overview of the cloud service architecture used in the demonstration. e) FV Model Deployment: As for the autoregressive-based method to predict TTT, the models’ execution setup used is shown in the diagram of Figure 29. The whole process to get the TTT prediction was triggered by calling the https://ingenious.ttt.digiport.com.es using a Http GET request. Figure 29: Autoregressive + ML based TTT prediction setup In Figure 29 we can observe four main modules which were deployed in Docker containers: • API – This module provides an HTTP/REST API to request for a TTT prediction for the next 24 hours. It is implemented in Python with the prediction_api.py file. In this file, the GET requests are received which triggers the coordination of prediction’s calculation. It first calls the prepare_data() function of datapreparation.py file to get the input © 2020-2023 iNGENIOUS Page 55 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) parameters for the TTT prediction. Once the input parameters are retrieved, the make_prediction() function of TTT_predictor.py file is executed to compute the prediction. The result is enveloped in a GET JSON response with the 24 forecasts of TTT, one for each consecutive hour from the moment of the API call. • Data Processing – In this module the process to get ready the input parameters for the TTT predictive model is executed. In the datapreparation.py file the loadpcdata.py is invoked to get the port call schedule of next 24 hours from the Por Call API. The raw data gotten from this API call is processed to calculate the vessel traffic per vessel category in the next 24 hours. In this file, the gate_in_predictor.py file from the Model Execution module is also called to compute the Gate_In prediction that provides the number of trucks that will enter the port in the next 24 hours. Finally, the datapreparation.py file creates the weekday and the hour variables, joins them with the port call and gate in variables’ values and returns the data to the API module to trigger the prediction of TTT. • Model Execution – This component executes the TTT and Gate In predictions. To do so, it provides the TTT_predictor.py and gate_in_predictor.py python files which implements the make_prediction() functions to compute the prediction based on the input parameters given in the call. In the gate_in_predictor.py the Gate_In_model.pkl file – which holds the model produced in the offline phase – is first loaded and then, the get_forecast(steps=24) function of the SARIMA model is executed to get the output array with the prediction values. The TTT prediction is similarly computed inside the TTT_predictor.py. In this case, the TTT_model.pkl file is loaded to extract the Random Forest model and the predict() built-in function of the RandomForestRegressor class is executed. • Model Update – In this module the SARIMA model that predicts the number of trucks is updated with a dedicated linux cron job that executes the model_update.sh file daily. The model_update.sh file calls the model_update() function of gate_in_update.py python file which runs and trains a new SARIMA model with an updated array of past Gate In events as input data. The new array of port entries is retrieved with the Gate API available under the URL https://ingenious.gateapi.digiport.com.es/. The generated model is then saved (using the dump() function of pickle Python library) in the Docker volume within the file system of the virtual machine of running the execution setup. f) Visualization Web Interface: The visualization web interface has been designed to represent the main outputs obtained from both ML pipelines. Figure 30 and Figure 31 below show the visualization of vessel ETA predictions implemented in the Awake.AI Smart Port web application. These have been developed into a stand-alone commercial service during the iNGENIOUS project and are included as the first step in the multimodal traffic prediction pipeline in the demonstration. In Figure 30, global vessel data is filtered to show vessels currently predicted to be arriving to port of Valencia. Hovering over a vessel shows an info box with basic vessel and voyage data and the predicted arrival time. In Figure 31, a single vessel has © 2020-2023 iNGENIOUS Page 56 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) been selected, which provides the predicted route and ETA, along with additional vessel details. Figure 30: Figure 31: Overview of predicted vessels arriving to port of Valencia in the Awake.AI web application. Predicted route and arrival time to port of Valencia for a selected vessel. © 2020-2023 iNGENIOUS Page 57 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 32: Port Entrance UC demonstration custom web interface The other parts of the developed prediction pipeline were demonstrated using a custom service developed specifically for this purpose. This integrates necessary port call information from APIs provided by the ports, vessel data from global commercial providers, vessel schedule predictions from other Awake.AI microservices as outlined above and applies the developed ML models and predictive simulations to estimate future traffic rates. Figure 32 shows a screenshot of the custom web interface developed for the demonstration. Truck Turnaround Time Validation The predictions obtained after the execution of the demonstration can be observed in the different graphs represented in Awake’s visualization framework, shown in Figure 30, Figure 31 and Figure 32. Gate-in/out Validation Service To validate predictions for a specific time frame, FV developed a new service that extracts information related to past real gate in and gate out, enabling the calculation of real truck turnaround times and the validation of predictions a posteriori. The service, which can be accessed through the following API: https://ingenious.ttt.digiport.com.es/ingenious_ttt/test, provides an array of the real truck turnaround time values observed for the time frame when the prediction was obtained. After running the validation service, real results and predictions are represented in the TTT visualization framework: © 2020-2023 iNGENIOUS Page 58 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 33: True TTT vs prediction TTT using the gate-in/out validation service. As explained in the Annex III, on test case descriptions, main performance tests for the developed models are performed using historical datasets to provide sufficient statistical coverage for estimating the results. However, as there may be differences in the statistics of the modeled processes as seen in historical data versus current inputs, smaller subsets of data are collected from the online service running the developed models, and online service performance is compared to the historical data analysis results. Obtained test results with online data for the whole prediction pipeline indicate a 13 % relative median absolute error in daily maximum turnaround time, which corresponds well with the respective results obtained with more comprehensive historical datasets. IoT Tracking Validation In addition to the validation procedure performed through the specific validation service developed by FV, IoT tracking test results can also be used as a reference for assessing if the magnitude of the predictions is in line with the magnitude of real events. In particular, UPV developed a dashboard where tracking results gathered with the IoT tracking devices can be visualized helping the easier analysis and understanding of a truck situation at a glance. An example of the data obtained for a one-week testing period at the port of Valencia is shown in Figure 34. Figure 34: Port Entrance UC IoT Tracking dashboard for one week testing As it can be observed in the figure above, many tracking points were obtained for trucks entering and exiting the port several times per day. By analyzing the © 2020-2023 iNGENIOUS Page 59 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) entry and exit timestamp at the port gate, TTT values can be calculated. In particular, the following values were extracted from this analysis: Port Entry Date Port Exit Date TTT 3/2/2023 8:33:18 3/2/2023 12:01:13 3/2/2023 15:57:07 2/2/2023 9:37:32 ½/2023 10:19:20 30/1/2023 15:07:17 3/2/2023 9:26:41 3/2/2023 13:22:05 3/2/2023 17:21:09 2/2/2023 10:09:45 ½/2023 15:57:38 30/1/2023 17:45:21 53m:23s 01h:20m:52s 01h:24m:02s 32m:13s 05h:38m:18s 02h:38m:04s Table 11. IoT Tracking based TTT measurement tests The results shown in Table 11 demonstrate that typically TTT times obtained in the time frame of daily working hours, the values have the same order of magnitude as the ones shown in Figure 33 (i.e., from 1 to 3 hours). It is worth to note that the measurements taken by the IoT tracker do not coincide in time with the results shown in the Figure 33 and, thus, it is not possible to directly compare these measurements with predictions made by the algorithms. Part II The setup related to the execution of IoT tracking tests required both the setup of devices and a number of services for data management. The tracker device selected for carrying out the IoT tracking was a MT821 manufactured by Mictrack (its specifications in Annex III). This device is a Mini waterproof GPS tracker that uses the latest CAT M1 & NB-IoT technology to provide low power consumption and optimized data transmission at low cost. The tracker was configured to work with NB-IoT and specific IP. This device send data of two types: cell data and GPS data. The important data are the GPS data whose format is as follows: MT;6;867035047588320;R0;10+20230105182049+39.454987+-0.328259+22.14+69+2+3744+113 Services The set of services developed to obtain data from the tracker as well as its representation on the dashboard are: 1. Uc_5 database – PostgreSQL Database for persist data. 2. comm_protocol – Server UDP used to wait data from any device that send this data format type and saves GPS coordinates. 3. dashboard – Flask Application (HTTP Server) in Python. 4. Geographic Anomaly Detection (GAD) – Script in Python whose purpose is to detect possible anomalies in the tracker tracks. These services are represented in the following diagram: © 2020-2023 iNGENIOUS Page 60 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 35: Diagram of Services Looking at this diagram, we can see which services comm_protocol, dashboard and GAD need to have a connection to the database. In this case, comm_protol is responsible for storing the data in the database. On the other hand, the dashboard and GAD services use the database to get data. These two-services fetch data for: • The GAD service reads data from temp_gps_tracker_gps_data to generate anomaly results via images and CSV files. • The dashboard reads data from different tables to get GPS data, weather data and port entries for a specific day. It also fetches resources generated by GAD services to display them in the view. For more information and details about the installation process or execution, the reader is referred to the Annex III – Setup and Execution. Issues on Execution The following subsections provide description of issues encountered during the demonstration and mitigation actions to solve them. Description of the issue Mitigation measures Lack of comprehensive data for modelling Simplification of applied models, estimation of the performance effects of missing data. Lack of data availability for realtime exchange (online) Developing additional models to estimate missing features (results in performance degradation, which is evaluated separately). Additional performance evaluation using available historical datasets. Lack of APIs to access critical data Implementing parts of the validation using offline datasets. Lack of coverage of commercial LTE/NB-IoT/LTE-M networks Authorization of hauliers for installing IoT tracking devices Field tests were performed with IoT tracking devices to verify the coverage at the Port of Valencia and Livorno Tracking was performed when trucks are inside the port facilities. UPV and FV configured tracking devices Table 12. © 2020-2023 iNGENIOUS Port Entrance UC Issues on execution Page 61 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Validation and Results This section provides a detailed description of the validation results obtained after the execution of the demonstration. Impact is analyzed after explaining the result validation, verification of test cases, KPIs and UC assessment. TEST CASES VERIFICATION In this section, the results of each test case, identified in D6.1 [1] for the Port Entrance UC are presented. Test Case ID Result UC5_TC_01: Quality of historical datasets Passed UC5_TC_02: Integration of different data sources Passed UC5_TC_03: Prediction model accuracy in training Passed UC5_TC_04: Performance evaluation in production Passed UC5_TC_05: Reception of trucks’ geoposition Passed UC5_TC_06: Onboard supply chain slice templates and NF descriptors N/A UC5_TC_07: Automated deployment of network slice N/A UC5_TC_08: Automated termination the slice instance N/A UC5_TC_09: Manual scaling of a running slice instance N/A UC5_TC_10: MANO interaction with DVL for collecting data N/A UC5_TC_11: MANO interaction with DVL to stop collecting N/A UC5_TC_12: Automated slice scaling with DVL collected data N/A UC5_TC_13: Correctness of datasets time event information Passed UC5_TC_14: Correctness of datasets resource ID information Passed UC5_TC_15: Vessels’ ETA prediction model performance Passed UC5_TC_16: Web application for visualizing analytics Passed UC5_TC_17: Web application alert on truck traffic levels Passed UC5_TC_18: Web application authentication Passed UC5_TC_19: communication interfaces DVL, TPCS and M2M Platforms Passed UC5_TC_20: communication interface between the AI-based Platform and the DVL UC5_TC_21: Dashboard visualization with real time and historical data Table 13. N/A Passed Port Entrance UC Test case verification For what concerns the test case verification, the 62% of test cases were executed successfully. The other 38% of test cases were not executed as the development involved was discarded for non-applicable (N/A). The original goal of test cases 06-09 was to develop an AI/ML algorithm for closed-loop slice optimization based on the combination of application/M2M (from DVL) collected and processed data with network related data (from the 5GC). © 2020-2023 iNGENIOUS Page 62 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) However, as explained in D6.2 [2] for the related development activities, at the Port Entrance UC the cross-layer MANO does not control nor manage any 5G network, and the DVL deployed on the field cannot provide insightful data for the network slice optimization purposes. For these reasons, it was agreed with the FV and CNIT to not provide such AI/ML driven network slice optimization capabilities. Nonetheless, some of these test cases (test cases 6-9) can be mapped into the test cases of AGVs UC. The UC5_ TC_10, UC5_ TC_11 and UC5_ TC_12 have not been executed because no relevant data for ML training have been identified from DVL. More details on the execution of Port Entrance UC test cases as the description and the results obtained can be found in Annex III. KPIS The following table shows the KPIs that were measured and considered relevant during the use case validation. KPI Truck Turnaround Times (TTT) Idling Times Test Case Reference UC5_TC_21 Target 10% reduction ≤ 10 % mean error* *Note: median values are considered instead of mean to handle outliers and skew present in the error statistics. Time Prediction Accuracy UC5_TC_03 Data Availability UC5_TC_04 UC5_TC_16 ≥ 99 % uptime Data Source Sufficiency UC5_TC_02 ≥ 3 sources UC5_TC_01 UC5_TC_02 Sufficient by ISO/IEC 25012 metrics Data Quality Security UC5_TC_18 © 2020-2023 iNGENIOUS High data confidentiality, privacy and integrity Page 63 of 220 Actual 7% reduction of TTT predictions/simulations if the truck traffic (input parameter) variance is reduced to a rolling mean with window length of 5 days. 25% reduction of TTT predictions/simulations if the truck traffic used is the mean of the gate events’ dataset. ETA predictions Relative median absolute error 5 %, averaged over voyage durations. Traffic rate distributions Relative median error of predicted container exit volumes: daily 13 %, weekly 4 %. Turnaround times Long term model: Relative median error of predicted daily maximum turnaround time 10 %. AWA platform availability (hosting use case service and application) 100 % over past 90 days. Valencia: 4 online sources (AIS data, vessel data, port call data, truck gate event data) Livorno: 2 online sources (AIS data, vessel data) Data accuracy, consistency, credibility, and currentness are found sufficient for the application. Data completeness should be improved for future exploitation by ensuring that truck turnaround data is fully captured. AWA applications and services implemented in high availability, fault tolerant cloud environment using multiple availabilty zones per service. Automated service monitoring, security scanning, and alerting implemented. Authentication used in all services. iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IoT Positioning Accuracy Data Protection Impact Assessment (DPIA) UC5_TC_05 ≤5m MT821 tracking device used for a series of tests, has generated GPS data with an error of less than 3 meteres. N/A Data Protection Impact assessed The impacts have been considered an analyzed for all the demonstrations with the update made to the documents D7.5 and D7.6. Privacy User Guide Availability N/A Approval through the exchange of some mails and verbal conversations The logistics company as well as the truck driver have been duly informed of the proof we aimed to do in the project, the period in which we needed to keep the tracker inside the truck and which data we were going to collect. Confidential ity and integrity protection of personal data N/A 100% Any personal or identifiable data from the truck driver was collected in the IoT Tracking demo (i.e., Part II) 100% Truck plates are not considered as confidential nor personal data as it is not linked with any person at all. Geo-positioning of the IoT trucking device has been turned off once the truck abandons the port area. Logs of privacy events N/A Table 14. Port Entrance UC KPIs Results For many prediction problems, the data source availability in the online stage is a requirement with a major impact on the accuracy of the predictions. As can be seen in the Table 14, the errors obtained in the predictions meet the established targets (average TTT error equal to 10%) with the data available. Moreover, it has been proven that the TTT reduction is achievable if the variance of the truck arrivals at the port is minimized, a quite probable scenario as it is a general goal of ports, nowadays, through the implementation of national single windows for dispatching containers in a scheduled manner. All in all, the sufficient availability and quality of the data has allowed to obtain acceptable levels of efficiency of the models. All this enabled the service deployment in production. The prediction service is up and running in a cloud environment. As for the IoT Tracking part of the demonstration, the expected level of accuracy in the geo-positioning of Trucks was also achieved. IMPACT ASSESSMENT In large city ports, upon the arrival of large ships there is the risk of congestion building up within the city. While traffic peaks could be reduced, for example, by expanding the opening hours of the port, it would be more efficient to target the use of resources such as extended operation times only to those days or weeks where traffic peaks will occur. As stated, e.g. in the Port Authority of Valencia’s environmental and energy policy, “Modern port management and market competition have led port companies to concentrate and increase the volume of their activities, and accordingly they use ever larger amounts of resources, which makes the inclusion of eco-efficient management criteria increasingly more important.” The prediction capabilities developed in the use case are targeted to enable planning and management of operations according to such criteria. One of the key targets in the sustainability policy of © 2020-2023 iNGENIOUS Page 64 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) the port is prevention and minimisation of emissions, consumption, discharges, noise, and waste produced because of its activities. A key motivation of the work performed in the use case is to provide tools for better predicting the truck congestion which contributes to emission and noise in the port city. Being able to predict congestion is an important enabler for taking steps to reduce related disadvantages. Further details on potential impacts and future exploitation plans of the presented developments are described in the deliverable D7.3 of the project. Lessons Learned and Potential Improvements During the execution of the present demonstration, and with all the historical data and data sources made available, two main outcomes have been observed: • Reaching the objectives, requirements, and KPIs set for the predictive analytics application is found to be feasible both regarding offline machine learning model development and online service deployment. • Improvements could be obtained primarily by enhancing the coverage of available historical datasets and current data integrations. Besides the lessons learned mentioned above, the following points for improvement identified too: • The long-term prediction pipeline was demonstrated with minimal data available in service deployment. Test results with historical data indicate that having access to some additional features would improve the achievable results regarding prediction accuracy. Useful data already existing in port systems include e.g. cargo exchange volume per port call, distribution of modalities for exchanged cargo per port call (transhipment, train, truck). • Additional data inputs would help to better capture outlier cases e.g. in truck turnaround (temporary high congestion), which is the main challenge with the current models; however, available data correlated to such scenarios was not identified during the project. • The data available for evaluating truck turnaround times was not complete and would benefit from infrastructure (gate monitoring system) improvements to ensure that all port visits and related timestamps are fully captured. • Further testing is needed to evaluate and optimize the developed application for production use. A primary issue to consider would be to experiment with potential mechanisms and practical changes in port traffic operations/planning with the aim to translate improved predictability into reduced congestion. © 2020-2023 iNGENIOUS Page 65 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 5 Demo – Improved Drivers’ Safety with MR and Haptic Solutions Objective and Description This use case focuses on improving the driver’s safety by combining the use of mixed reality (MR) and haptic solutions for controlling AGVs in a real scenario. In this particular case, the demonstration has been done in the port of Valencia. The particular setup used in the trial is depicted in Figure 36. Autonomous vehicles used on industrial areas may need eventually human help to accomplish with difficulties on the road. With an immersive and remote cockpit this human support can be done in an intuitive way, allowing the operator to control different AGVs from a far indoor cockpit, avoiding potential dangers of industrial areas. This is known as Teleoperated Driving. Figure 36: Main setup and components integrated in the trial. The pillars of this use case are the telepresence of the operator to know the environment in which the vehicle moves around and the interaction with the operator to control it. The use of haptics to control AGVs is also the key of this demonstration. To support the telepresence service, several 360º video cameras with low latency have been installed in the AGV provided by ABB. In the case of the interaction for vehicle’s control, this is achieved with the cockpit and the use of haptic gloves that allow the vehicles to be managed remotely and to obtain feedback from the sensors in real time. © 2020-2023 iNGENIOUS Page 66 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Through the storage and graphical representation of different KPIs in relation to the state of the network and the application, conclusions have been drawn about different aspects. For the demonstration of this use case, we ran the AGVs modifying the load on the 5G network to analyse how each of the AGVs responds. The scheme to follow was as follows: 1. A prioritized AGV (provided by ABB) was moving inside Passengers Dock area with remotely or autonomous control. 2. A normal user represented by a smartphone started to generate different traffic density on the same 5G network for a load test: a. Test 1: No load b. Test 2: TCP DL 100 Mbps c. Test 3: TCP DL 400 Mbps 3. Meanwhile, the different KPIs were collected for storage and graphic representation with Grafana. Different measurements have been carried out to analyse the behaviour of the 5G network in different circumstances. These tests have been the following: 1. 2. 3. 4. 5. Average Downlink Throughput up to 132 meters. Average Uplink Throughput up to 132 meters. Maximum Average Latency with radio load up to 132 meters. Maximum Average Latency without radio load up to 132 meters. Maximum Average Latency with radio load and Latency prioritization up to 132 meters. The final demo for this Use Case was held from November 28 to December 1 at a specific area in the passengers’ dock of Valencia Port, shown in Figure 37. Figure 37: Testing area in the Port of Valencia The KPIs were measured to ensure that the network and the system accomplish with the system requirements to perform ToD. This requires a low latency with the maximum throughput connectivity to ensure a realistic driving environment for the operator. Three video streams, driving commands and ACK messages needed to be transmitted in real time to the cockpit. © 2020-2023 iNGENIOUS Page 67 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The main objective of the demonstration is to prove an innovative ToD and ensure a proper connectivity for the AGV to perform the ToD. Also, in a second part of the demonstration the new haptic gloves from SenseGlove were validated and a digital twin was developed for improving the remote cockpit. Setup and Execution The following subsections provide description of the setup and execution of AGV UC. Additional information can be found in Annex IV – Setup and Execution. Part I The demo was planned with three real AGVs moving in the Passengers Dock, which images can be found in Annex IV: • • • • AGV-A: ABB’s AGV. AGV-B: NOK’s Robotnik AGV. AGV-C: 5CMM’s Robotnik AGV. Figure 38 shows the three different AGVs used in AGV UC. Figure 38: AGVs A, B and C for the AGV’s UC Each of the AGVs was connected to the 5G network through an Asus mobile phone via tethering which details can be found in Annex IV. Each test scenario considers two different smartphones as 5G modems: • Smartphone for generating traffic: used to generate different levels of traffic during the execution of each test case. © 2020-2023 iNGENIOUS Page 68 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Smartphone for AGVs connectivity with Ethernet Interface: mounted in all the AGVs for the 5G mmW n258 connectivity. Two implementations were done to control AGVs, as shown in Figure 36: • NOK’s Cockpit: Used to control NOK’s and ABB’s AGVs remotely via ToD. It is composed of the MR glasses, in which the AGV’s video is received with extra information about latency and other parameters; the steering wheel, which controls the AGV direction; the pedals, which set the AGV speed; the gear change, which allows the AGV to be moved forwards or backwards. • 5CMM’s Cockpit: Used to control 5CMM’s and ABB’s AGVs remotely or onsite. The Haptic Gloves are used to control the AGVs by doing different gestures, as well as to receive haptic feedback. The Haptic Gloves can be connected to the cockpit with Bluetooth for enabling an on-site control. In the remote version, MR glasses are also used to receive the AGV’s video, creating a remote immersive experience. In the on-site version, the user is directly seeing the AGV, so no glasses are needed. Figure 39: Nokia’s (left) and Fivecom’s (right) cockpits. For the measurement of KPIs, NOK has developed an infrastructure that allows them to be measured at two different levels: application and platform. At the application level, all the values that have to do with the system that allows remote driving of vehicles are obtained. Some of these values are referring to the AGV, such as speed or rotation, and others referring to the cockpit such as the FPS at which the video from the cameras is decoded, the RTT of the video stream or the throughput. On the platform side, all the measurements of KPIs that are related to the state of the 5G network and the machines that are responsible for its operation are carried out. In these values are the ping latency to modems RTTs and the values of throughput, memory usage, and CPU and GPU utilization, both in the MEC and in the 5G Core. Three main cases were defined for the execution of the demo, the first of them with two sub-cases. Each case/sub-case was run three times. In the first case the ABB’s AGV was moving inside Passengers Dock area with autonomous control. It detected an obstacle in its path and stopped giving control to the remote driver who circled it manually and returned control to the AGV. This case has two variants that give rise to two sub-cases. In the subcase 1, the teleoperated driving is done by the remote driver using the NOK’s Cockpit. In the subcase 2, the AGV start a supervision mode either remotely or on-site using the haptic gloves to control the AGV with intuitive hand movements. In © 2020-2023 iNGENIOUS Page 69 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) this use case, for the 5G connection, an International Mobile Subscriber Identity (IMSI) identified with the name “IMSI-AGV-A-1” which is prioritized has been assigned to the AGV. All the details about it can be found at Annex IV. The second case consists of the remote driving of the NOK’s AGV inside Passengers Dock area using the NOK’s Cockpit. As in the previous case, a new prioritized IMSI called “IMSI-AGV-B-1”, which details can be found at Annex IV, has been assigned to the AGV. In the last case the 5CMM’s AGV was moving inside Passengers Dock area with autonomous control and the operator supervised it either remotely or on-site. The operator used the haptic gloves to send the AGV to different predefined points to follow and when and obstacle is found, it circled it autonomously and continued its way. The operator can also stop or resume the AGV movement using the haptic gloves. For the 5G connection the “IMSI-AGV-C-1”, which was prioritized, was assigned to the AGV. All the details about the IMSI can be found at Annex IV. While the AGV was running in each case, a normal user was connected using another IMSI which was no prioritized to generate three different load test: • Test 1: No load. • Test 2: Traffic load of 100 Mbps. • Test 3: Traffic load of 400 Mbps. Part II As an extension to the demo performed in the port of Valencia, a second part of this use case was carried out in UPV campus. The main objective was to integrate and validate the new haptic gloves from SenseGlove purchased by Fivecomm in their cockpit. The purpose was also to improve the remote cockpit by creating a digital twin to monitor the AGV in a digital environment. The first activity consisted in the integration of the new haptic gloves for controlling the AGV. A new functionality was added in these devices called force-feedback, which stands for the resistance when trying to curve the fingers to emulate the sensation of grabbing an object. This feature was implemented for the control of the AGV as well as all the gestures recognition. The specifications of the haptic gloves are further explained in Annex IV – Setup and Execution. © 2020-2023 iNGENIOUS Page 70 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 40: Unity application developed for the digital twin. In a second step, a digital twin was developed. The velodrome in the UPV campus was modelled in a 3D environment and imported in the Unity application used in the cockpit. The Unity application interface is represented in Figure 40. The position and orientation data gathered from the sensors in the AGV was sent in real-time to the cockpit for the representation in the digital twin, permitting to see the robot in the same position as in the real world. Figure 41 shows a comparison between the real scenario and the digital twin represented. Figure 41: Real scenario (left) and digital twin with the AGV included (right). As in the first part of the demonstration in the port of Valencia (Fivecomm’s cockpit), the gloves were used to indicate the AGV to move autonomously to a predefined point, being possible to stop and resume the movement anytime. Apart from the position and orientation data, a video flow was sent from the robot to the cockpit with a real-time camera, as well as the GPS coordinates and the data from the proximity sensor to know how far the AGV is to the closest object. All this feedback data is represented in the cockpit application and can be seen in Figure 42. More details are provided in Annex IV. © 2020-2023 iNGENIOUS Page 71 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 42: Remote cockpit including the SensGlove haptic gloves, VR glasses and Digital Twin. ISSUES ON EXECUTION The following subsections provide description of issues encountered during the demonstration and mitigation actions to solve them. Description of the issue Mitigation measures 5G network down by saturation Restarting the core in Madrid. Mobiles did not connect correctly to the 5G network, so an IP was not obtained with which to establish communication The connection via tethering with the AGV system was lost when the mobile screen was locked 1. Restarting mobile phones to connection to 5G network. 2. Restarting the 5G core in Madrid. get correct Correctly configure the mobile settings together with the "Caffeine" application to avoid screen lock and tethering disconnection. Autonomous mode not operational when executing the demo Remote control using the haptic gloves instead VPN problem when connecting the AGV Manual configuration of the routing tables and VPN Battery of the haptic gloves not lasting more than 10 minutes Charging all the time. If the gloves shut down restarting the application Bluetooth range does not cover the full area. Gloves disconnecting when they are far from the server Keeping close to the cockpit (< 20 m) Table 15. AGV UC Issues on execution Validation and Results The results obtained in the demonstrations of this use case have been, in general terms, satisfactory. Most of the values established as target have been met and the deviations obtained in some of them have been reasonably justified. In addition, it has been possible to carry out remote driving of the three © 2020-2023 iNGENIOUS Page 72 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) considered AGVs with the two cockpits designed using the 5G network deployed in the Port of Valencia. TEST CASES VERIFICATION In this section, is summarized the results of each test case identified in D6.1 [1] Test Case ID Result UC2_TC_01 - Perform measurements of 5G millimeter wave coverage in Segovia. Passed UC2_TC_02 - AGV teleoperation via 5G millimeter wave in Segovia. Passed UC2_TC_03 - Immersive cockpit. Passed UC2_TC_04 - Fivecomm’s cockpit integration for AGV teleoperation. Passed UC2_TC_05 - Perform measurements of 5G millimeter wave coverage in Valencia Port. Passed UC2_TC_06 - ASTI AGV teleoperation via 5G millimeter wave in Burgos. Passed UC2_TC_07 - ASTI AGV teleoperation via 5G millimeter wave in Valencia Port. Passed Table 16. AGV’s UC Test case verification All the defined test cases have successfully passed, obtaining the values of the different KPIs of interest. This has allowed an analysis of the use case and the needs of the network to carry out remote driving of vehicles with different cockpits. More details about each test case, such as the description, detailed expected results and detailed actual results can be found in Annex IV – Validation and Results. KPIS In this section the KPIs for each test case are presented. To get the target value we used the values defined in the D2.1 [11]. Results are shown in Table 17: KPI Test Case Reference Target Actual Segovia Coverage UC2_TC_01 ~ 500 m 412 m Segovia End-to-end latency UC2_TC_01 < 100 ms Min: 25,06 ms Max: 38,2 ms Avg: 32,8 ms Valencia Port Coverage UC2_TC_02, UC2_TC_05 UC2_TC_07 ~ 500 m 420 m Valencia Port End-to-end latency UC2_TC_05 < 100 ms Min: 28,1 ms Max: 33,9 ms Avg: 30,3 ms Valencia Port Availability UC2_TC_02, UC2_TC_03 UC2_TC_04, UC2_TC_07 > 99.999 % 100 % Valencia Port Reliability UC2_TC_02, UC2_TC_03 UC2_TC_04, UC2_TC_07 > 99.999 % 97,93% Valencia Port Mobility UC2_TC_02, UC2_TC_03 UC2_TC_04, UC2_TC_07 < 30 Km/h 12,3 Km/h © 2020-2023 iNGENIOUS Page 73 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Min: 9,2 Mbps Max: 10,8 Mbps Avg: 9,97 Mbps Min: 32,6 ms Max: 162,1 ms Avg: 53,9 ms Min: 5,41 Mbps Max: 19,2 Mbps Avg: 13,2 Mbps Min: 24,3 ms Max: 212,7 ms Avg: 57,4 ms Min: 9,06 Mbps Max: 11,13 Mbps Avg: 10,3 Mbps Min: 207,3 ms Max: 507,9 ms Avg: 498,1 ms Min: 9,19 Mbps Max: 10,8 Mbps Avg: 10,1 Mbps Min: 30,9 ms Max: 164,8 ms Avg: 67,2 ms Valencia Port AGV-A Data rate UC2_TC_02 ~ 10 Mbps Valencia Port AGV-A End-to end latency UC2_TC_02 < 100 ms Valencia Port AGV-C Data rate UC2_TC_04 ~ 10 Mbps Valencia Port AGV-C End-to end latency UC2_TC_04 < 100 ms Burgos AGV-B Data rate UC2_TC_06 ~ 10 Mbps Burgos AGV-B End-to end latency UC2_TC_06 < 100 ms Valencia Port AGV-B Data rate UC2_TC_07 ~ 10 Mbps Valencia Port AGV-B End-to end latency UC2_TC_07 < 100 ms Velodrome mobility UC2_TC_04 < 30 km/h 10,8 km/h Velodrome video throughput UC2_TC_04 - 360p: 2,5 Mbps 720p: 8 Mbps 1080p: 16 Mbps Table 17. AGV UC KPIs For this use case, all the parameters that directly affect the remote driving quality of an AGV with a 5G network have been considered. Consequently, all the KPIs are related to the level of network saturation (data rate, latency), and its features (availability, coverage, mobility, reliability). As most of the measurements are carried out periodically along the demonstration duration, the statistics that most realistically represent each of them are required. In general, there was not a big deviation from target value. In the case of coverage, the values that appear in the table are limited by the space available to make the test. For the end-to-end latency deviation in Burgos tests, this is because it was an integration job between ABB and NOK that was carried out remotely and not in person. The objective of these tests was to be able to remotely drive the ABB’s AGV with the NOK’s cockpit correctly. A new KPI was added for the measurement of the performance in the velodrome demo (Velodrome video throughput). This KPI measures the throughput used in the demo for different video qualities. A comparison of the old and new haptic gloves was carried out, and the results appear in Table 18. KPI Neurodigital SenseGlove Bitrate (wired) Bitrate (wireless) Bluetooth range 375 kbps (UL) - 250 kbps (DL) 75 kbps (UL) - 20 kbps (DL) 32 m (outdoor) - 12 m (indoor) Not possible 52 kbps (UL) - 6 kbps (DL) 9 m (outdoor) - 5 m (indoor) Table 18. AGV UC KPIs. Comparision Neurodigital vs GloveSense haptic gloves. © 2020-2023 iNGENIOUS Page 74 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IMPACT ASSESSMENT Potential benefits that can be achieved in this scenario include, automatic handling of assets, human-machine iteration by working remotely in unexpected circumstances and scalability (e.g., working remotely in multiple sites governed by AGVs). There are a lot of places where AGVs are used to facilitate human work. The main environments in which this situation occurs is in factories, ports, airports, or warehouses, places where the transport of goods is necessary. These autonomous vehicles facilitate the task of transportation in these places but have a problem in reacting to unforeseen events during their journey. Although most of them incorporate into their system a mechanism that allows the vehicle to stop after an unforeseen event, it is possible that after this stop the vehicle doesn’t know how to continue. This problem is solved in this scenario in which the remote driver can take control of the AGV, solve the issue, and return control back to the AGV. As for the immersive component of the solution, immersive vehicle driving allows the operator to feel like driving a real car from the driver's seat which makes driving more real and therefore safer. Lessons Learned and Potential Improvements In relation to remote driving with the use of 5G networks in an immersive environment, the main lesson learned is that safe driving is possible with the established components. However, optimal performance of the network is needed. We observed that the service is still highly dependent on the network performance. When the latency obtained is higher than the established limit, the communication between the operator and the AGV is affected, putting security at risk. Another component with room for improvement is the haptic glove reaction capability. Both gloves tested in INGENIOUS (Neurodigital and SenseGlove) are a good alternative for providing orders, but the haptic feedback in both models does not feel completely natural yet. The arrangement of the cameras and their overlapping in the cockpit are also essential so that the operator feels comfortable and can drive safely. As a possible improvement in this aspect, we recommend exploring the use of new cameras to improve the immersion experienced by the teleoperator and therefore security. In terms of potential improvements in the administration of the 5G network, it has been detected that it is necessary to separate the uplink and downlink into different slices, as well as to assign different priorities depending on the needs, in order to obtain a better distribution of network traffic and, therefore, a better driving experience. © 2020-2023 iNGENIOUS Page 75 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 6 Demo – Intermodal Asset Tracking via IoT and Satellite Objective and Description Ships are equipped with legacy communication networks allowing the exchange of information with port terminals when the ship is docking, but not when it is sailing. However, no sensors are installed in containers to monitor and collect real-time data on cargo location and conditions and container safety. Thus, the Ship Use Case aims at providing E2E asset tracking via satellite backhaul from the IoT RAN to the corresponding data/control centre, enabling real-time/periodic monitoring of predetermined parameters (temperature, humidity, GPS, movement, bumps, etc.) of shipping containers when they are sailing on the sea, while terrestrial IoT connectivity is provided when the ship approaches the port and while on land. To enable this ubiquitous coverage, IoT tracking devices have been installed on the shipping containers transported on both maritime and inland segments. The end-to-end intermodal asset tracking would allow shipment information to be ubiquitously available across all connected platforms and interested parties in real-time. As part of the Ship Use Case of the iNGENIOUS project, live over-the-air and lab demonstrations were conducted, paving the way towards inter-modal asset tracking via IoT and Satellite, such as: • Live over-the-air mid-term demo in Valencia, Spain, on 27-28 April 2022. • Live over-the-air final demo in Valencia, Spain, on 03 October-09 November 2023, 21-23 November 2022 and 01-09 March 2023. • Ongoing lab demonstration and support using the iDR lab testbed. The mid-term and final live over-the-air (OTA) demonstrations together included and demonstrated: • • • • Installation of sensors on iNGENIOUS container. Installation of the Smart IoT GW on the ship. Installation of the satellite terminal at the Port of Valencia. iNGENIOUS container transport by ship from the Port of Valencia to the Port of Piraeus and vice-versa. • iNGENIOUS container transport by rail from the Port of Valencia to Madrid Rail Terminal. © 2020-2023 iNGENIOUS Page 76 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • iNGENIOUS container transport by truck from Madrid Rail Terminal to Valencia. • Integration of the Smart IoT GW with the sensors. • Integration of the Smart IoT GW with the M2M platform. • End-to-end connectivity using satellite backhaul. • Graphic interface for representing the real-time data from the sensors. The difference between the live over-the-air mid-term and final demo was that in the mid-term demo, the iNGENIOUS container was not transported by ship, truck or train, and also the satellite terminal was not deployed at the Port of Valencia. Instead, a VPN connection was established to simulate a direct Ethernet connection between the Smart IoT Gateway located at the Port of Valencia, Spain and the satellite terminal deployed at SES’s premises in Betzdorf, Luxembourg. The “Satellite VPN” was tunnelled over this VPN to provide the satellite connection towards the IoT Cloud/Data centre. The live over-the-air mid-term demo was used to validate the configurations and connectivity of the Smart IoT Gateway with IoT sensors, the satellite terminal and the IoT Cloud /Data Centre in order to de-risk the live over-the-air final demo. Hence, in the following sections, we will describe only on the live overthe-air final demo. The iDR lab testbed was designed and implemented to reflect the live overthe-air setup and was used throughout the project to prepare for and stage the live demonstrations with limited windows of live satellite capacity. This testbed proved to be a valuable asset for this use case as it ensured optimal use of the valuable live satellite capacity. More information about the iDR lab testbed can be found in the Annex V. WORKFLOW OF THE FINAL DEMO The live over-the-air final demo is split into two parts. The first part included the ship transportation of the iNGENIOUS container from Piraeus to Valencia and vice versa, while the second part included the container transportation using a truck. The workflow is described below: Part I 1. The iNGENIOUS container was equipped with heterogeneous IoT devices able to monitor the real time location of the cargo, the status of the sensor’s battery, internal environment of the container such as temperature and humidity and detect critical events such as door opening, arrived at the Container Terminal on the 3rd of October. The container was loaded on to a COSCO vessel at the Port of Valencia on the 4th of October 2022. The next day the vessel started its trip towards the Port of Piraeus. 2. During the trip, the heterogeneous IoT devices were sending status updates once per day. 3. The Smart IoT GW was installed on the bridge of the COSCO vessel to aggregate the messages from the IoT devices. 4. The COSCO vessel arrived at the Port of Piraeus on 8 October 2022 and the container was discharged. Subsequently, the container was stored at the COSCO Piraeus Terminal whilst waiting for its return trip. © 2020-2023 iNGENIOUS Page 77 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 5. On the 27th of October, the iNGENIOUS container was loaded on another COSCO vessel and on the same day the vessel started its trip towards the Port of Valencia. 6. During the trip, the heterogeneous IoT devices were sending status updates, again once per day. 7. The Smart IoT GW was removed from the first vessel and installed on the bridge of the second COSCO vessel to aggregate the messages from the IoT devices. 8. The vessel arrived at the Port of Valencia on 8 November and the iNGENIOUS container was discharged on the same day. It was then transported to the depot near the Port of Valencia on 9 November 2022. 9. The Smart IoT GW was also removed from the vessel. After analysing the collected data from the Smart IoT GW, the researchers noticed connectivity issues with the IoT devices during the trip. However, the sensors themselves had the capability to store the data. 10. On 21st of November, the satellite terminal was installed at the Port of Valencia, as well as the Smart IoT GW, while the iNGENIOUS container was placed nearby (<20m) (see Figure 52). 11. The communication between the Smart IoT GW and the IoT devices was established, and the satellite connection was setup. 12. The data was then sent to the IoT Cloud/Data centre via the satellite backhaul connection. The baseline space segment, which was used corresponds to SES’s GEO ASTRA 2F satellite, which provided seamless connectivity between the satellite terminal at the Port of Valencia and iDirect’s 5Genabled Velocity™ Intelligent Gateway (IGW) hub located at the SES teleport in Betzdorf, Luxembourg. 13. Subsequently, the data was visualized from a graphical interface connected to the IoT cloud. Part II 14. The iNGENIOUS container was transported form the depot to Valencia Port Rail Terminal the 1st of March 2023. The next day, March the 2nd the container was loaded in a COSCO train and transported to Madrid. 15. During the trip, the heterogeneous IoT devices were sending status updates once per hour. 16. The Smart IoT GW was not installed because during inland transport the IoT devices sent data by NB-IoT directly to the cloud. 17. The COSCO train arrived at Madrid Rail Terminal on 2nd March 2023 and the container was discharged. Subsequently, the container was stored at the Madrid Dry port whilst waiting for its return trip. 18. On the 9th of March, the iNGENIOUS container was loaded on a truck transported to Valencia. 19. During the trip, the heterogeneous IoT devices were sending status updates, again once per hour. 20. The truck arrived at the depot the same day, March 9th at 17:07. © 2020-2023 iNGENIOUS Page 78 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 21. Subsequently, the data was visualized through a graphical user interface connected to the IoT cloud. Setup and Execution The following subsections provide description of the setup and execution of Ship UC. Part I The end-to-end demonstration setup of the Part I of the live over-the air final demo (where the iNGENIOUS container is discharged from the vessel and stored at the Port of Valencia) is illustrated in Figure 43. It was built upon the following elements by the respective iNGENIOUS project partners: • SES: Provided end-to-end managed services, powered the space segment with its existing ASTRA 2F geostationary satellite system (28.2oE), and delivered seamless connectivity between the remote and the hub platform located at its teleport in Betzdorf, Luxembourg. Furthermore, SES provided the satellite terminal and the Smart IoT Gateway. • iDR: Provided iDirect’s 5G-enabled Velocity™ Intelligent Gateway which incorporates SDN/NFV and MEC capabilities and enables the satellite integration into a 3GPP 5G core network architecture as a 5G access network. Furthermore, iDR provided MEC server and VSAT modems along with the support required to provide the satellite backhaul connectivity. • FV: Provided the IoT devices, the iNGENIOUS shipping container, access to the Port of Valencia, and the access point for establishing internet connection. • COSSP: Provided a Ship for shipping the iNGENIOUS container from Valencia to Piraeus and vice versa and prepared all the documents for maritime transports. Figure 43: End-to end architecture of the final demo. More details are provided in the following sections. © 2020-2023 iNGENIOUS Page 79 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Satellite Capacity and Space Segment: Occasional Use (OU) Satellite capacity has been provided by SES over ASTRA 2F satellite. As can be seen in 80, satellite capacity was provided for the live over-the-air demonstrations as well as other periods in preparation for the live demonstrations to test the end-to-end system including the iDirect 5G-enabled Velocity™ IGW and modem. OU Book. ID Start Date End Date Satellite Freq. Band BW (MHz) Satellite Hub Activities 499159 25/05/21 31/05/21 SES ASTRA 2F Ku 6 Initial testbed testing over live satellite 199335 01/11/21 05/11/21 SES ASTRA 2F Ku 6 214210 07/02/22 11/02/22 SES ASTRA 2F Ku 6 222888 28/03/22 01/04/22 SES ASTRA 2F Ku 6 222889 25/04/22 29/04/22 Ku 6 Mid-term demo 258712 07/11/22 25/11/22 Ku 6 Final Demo Table 19. SES ASTRA 2F SES ASTRA 2F Feasibility testing using SatCube End to end testing with SatCube and IoT network. SatCube testing in preparation for midterm demo SES’s ASTRA 2F Space Segment. Figure 44: i) RF Uplink ground Station: ATF #33 Antenna, Diameter: 9m, Vertex, Tx/Rx, Ku-band, ii) RF Downlink Ground Station: MBA#102 Antenna, Diameter: 4.5m, Multi-Beam Antenna, Rx only, Ku-band, and iii) SES GEO Satellite ASTRA 2F (28.2oE) - Europe Ku-band beam Uplink Ground Station: A 9m Ku band antenna located at SES’s teleport in Betzdorf, Luxembourg was used for the RF uplink (Figure 44). Downlink Ground Station: Furthermore, a 4.5m Ku band, multi-beam antenna located at SES’s teleport in Betzdorf, Luxembourg was used for the RF downlink reception, and it can be seen in Figure 44. Satellite Terminal: The SatCube Ku-band small-factor transportable terminal (see Figure 45Figure 45:) is a light weight, compact, portable satellite terminal © 2020-2023 iNGENIOUS Page 80 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) that enables broadband connectivity almost anywhere on earth. More information can be found in D6.2 [2]. Smart IoT Gateway: The Smart IoT GW is pictured in Figure 45. The main platform of the Smart IoT GW is the Raspberry Pi 4 and it is protected by a universal and modular metal case. More information can be found in D6.2 [2]. Figure 45: i) Satcube transportable satellite terminal and ii) Smart IoT Gateway 5G-enabled Velocity™ IGW hub: iDirect’s 5G-enabled Velocity™ IGW hub (see Figure 46) is installed at the SES teleport facility in Luxembourg. This test system is hosted on a Dell R630 server which is specifically configured and administered to support the iNGENIOUS use case demonstrations. Figure 46: Front and back of the iDirect’s 5G-enabled Velocity™ Intelligent Gateway hub Modems: iQ200, iQ Desktop and 9350 modems (see Figure 47) were used to verify and test satellite connectivity prior to the live over-the-air demonstrations. Figure 47: © 2020-2023 iNGENIOUS iQ200, iQ Desktop and 9350 Modem Page 81 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) MEC Server: For the live demonstration at the Port of Valencia a MEC server (Raspberry Pi 3 model B and a network switch were used to facilitate the integration of the Smart IoT GW and the satellite network and also to make the deployment easier to manage. iNGENIOUS Container: FV purchased a twenty-foot dry shipping container following 22G1 International Organization for Standardization (ISO) standard, where specific external dimensions (Length: 6,058 m; Width: 2,438 m and Height: 2,591 m) are defined (see Figure 48). The container was purchased for demonstrating inter-modal asset tracking through the installation of IoT tracking and monitoring sensors, which can gather measurements and transmit the information via LoRa and NB-IoT. For performing the live over-the-air final demo, the container was customized and painted by FV, adding the project logo along with the logos of all partners involved in the UC, as shown in Figure 48. Figure 48: i) 22G1 purchased container and ii) iNGENIOUS Container During the final demonstration, the container was monitored and transported from Valencia to Piraeus in a round trip by combining terrestrial (inside the ports of Valencia and Piraeus) and maritime transportation (from Valencia to Piraeus). Sensors: FV outsourced the acquisition of a set of IoT Sensors (more information in D6.2 [2]) which were integrated together with LoRa and NB-IoT communication modules and then installed on the shipping container for monitoring cargo conditions and container status when terrestrial and maritime transportation is performed. Thanks to the integration of LoRa and NB-IoT communication modules, IoT sensors were able to communicate data with the Smart IoT GW developed by SES. All sensors were integrated together with the communication modules and assembled in a single IoT tracking device. After ensuring this integration and the communication with the Smart IoT GW, the device was installed on the iNGENIOUS container. © 2020-2023 iNGENIOUS Page 82 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 49: Final demo device installation Terrestrial Communication: FV ensured the availability of Commercial NB-IoT coverage for performing IoT tracking tests inside the Port facilities. The coverage of these technologies was tested by UPV and FV through the execution of car-driven tests inside the facilities of Valencia Port. IoT tracking devices use this coverage for reporting the tracking and monitoring measurements. Port Facilities: FV and COSCO ensured the access to Valencia Port and COSCO terminal facilities for performing this demonstration. COSCO terminal at the Port of Valencia was the place where iNGENIOUS container was loaded and discharged as part of the trip to Piraeus. As for the mid-term demonstration, FV also managed the access to a specific depot inside the Port. Ship: A different ship was used for each voyage during the first part of the final demo. For the first trip from Valencia to Piraeus, the iNGENIOUS container was loaded on a COSCO Vessel, CSCL Venus, which is a 14074 TEU vessel. For the return trip from Piraeus to Valencia, another COSCO vessel was used, particularly, a 13114 TEU vessel called COSCO Glory. Vessel Trip Transport Documentation: The documentation, needed for the vessel trip, was prepared by COSCO. More information can be found in D6.2 [2]. Part II The end-to-end demonstration setup of the second part of the live over-the air final demo (the iNGENIOUS container was also loaded to the truck) is illustrated in Figure 50. In particular, it was built upon the following elements by the respective iNGENIOUS project partners. • FV: Provided the IoT devices, the iNGENIOUS container, the access to the Port of Valencia and the terrestrial communication. • COSSP: Provided the transport of the iNGENIOUS container by rail from Valencia to Madrid as well as a truck for transporting the iNGENIOUS container form Madrid to Valencia. Furthermore, COSSP prepared all the documents for the rail and truck transports. © 2020-2023 iNGENIOUS Page 83 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 50: End-to end architecture of the final demo (part II) More details are provided in the following sections. Truck: For the inland transport from Madrid to Valencia during the second part of the final demo, the container was transported on a truck by a COSCO’s transport provider. Truck Transport Documentation: The documentation needed for the inland transport by truck was prepared by COSCO. This included the release order, the acceptance order and the transport order. Rail: During the second part of the final demo, the container was transported in the Valencia-Madrid Rail corridor by train. The propulsion of the locomotive was diesel-based. The train had 18 wagons of 90 feet, having the capacity to transport 72 TEU containers. In Figure 51 you can see the iNGENIOUS container during the second part of the Final Demo. Figure 51: iNGENIOUS container starting rail transport from Valencia to Madrid. Rail Transport Documentation: The documentation needed for the terrestrial rail transport was prepared by COSCO. This included the release order, the acceptance order and the transport order. ISSUES ON EXECUTION The following subsections provide description of issues encountered during the demonstration and mitigation actions to solve them. © 2020-2023 iNGENIOUS Page 84 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Description of the issue Mitigation measures The satellite terminal was not installed on the ship for several reasons: 1) very high cost (more than 40K) for buying a tracking GEO satellite terminal, 2) a lot of effort (site survey, installation, etc.). In this particular UC, the effort and the cost would have been doubled because we had to use two different ships for the shipping of the iNGENIOUS container from Valencia to Piraeus and vice versa and 3) equipment installation follows very strict time schedules aligned with maintenance periods. The iNGENIOUS container, equipped with the sensors, was transported from Valencia to Piraeus and vice versa. During the trip, the Smart IoT GW, installed on the bridge of the ship, and the sensors faced connectivity issues. Sensors were not able to gather GPS data while the container was being transported in the maritime segment. This issue was faced because the container was hidden by several layers of containers and the GPS antenna did not have direct visibility with the GPS satellite for establishing GPS communication and retrieving tracking information. Table 20. In line with the proposal, a fixed satellite terminal was installed in the Port of Valencia for carrying out the demonstrations. Approval for the transmission regulatory licence of the satellite terminal at the Port of Valencia was obtained after a formal request to the Spanish Ministry. The sensors had the capability to store the data collected during the trip from Valencia to Piraeus and vice versa. When the ship arrived at the Port of Valencia and the connectivity issues were resolved the data was transmitted to the Smart IoT GW. GPS tracking information could be provided in the maritime segment by integrating AIS data with the stream of information provided by the IoT sensors. AIS data provides tracking information linked to the vessel position. As an alternative, GPS tracking information could also be provided if the Smart IoT GW integrated a GPS antenna, following a similar approach as for the AIS. Ship UC Issues on execution Validation and Results In this section, the results the test cases identified in D6.1 [1] are summarized. Part I Data collected during the trip from Valencia to Piraeus and vice versa The data collected from the IoT devices during the trip from Valencia to Piraeus and vice versa should have been sent in real time to the Cloud through satellite backhaul. However, as mentioned earlier, the installation of the satellite terminal on a COSCO vessel could not be carried out during this project. For this reason, the Smart IoT GW was capable of storing the data during the trip and transmitting it over satellite when the ship arrived again at the Port of Valencia, where a satellite terminal was installed. However, the Smart IoT GW and the IoT devices faced some connectivity issues during the trip and hence the Smart IoT GW was not able to gather and store the data. But the IoT devices, themselves, also had the capability to store their data and transmit it when the communication with the Smart IoT GW could be set up. And this is exactly what happened on 21 November, where the satellite terminal was installed at the Port of Valencia, as well as the Smart IoT GW, while the iNGENIOUS container was placed in the near vicinity (<20m) (see Figure 52). © 2020-2023 iNGENIOUS Page 85 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 52: SatCube, Smart IoT GW and iNGENIOUS container at the Port of Valencia When the connectivity issues between the IoT devices and Smart IoT GW were resolved, the collected data during the trip was transmitted to the Smart IoT Gateway, and then it was sent to the SES Cloud through satellite backhaul and we were able to observe the collected data in the Grafana dashboards. Figure 53: Temperature of the iNGENIOUS container during the trip from Valencia to Piraeus and vice versa. Figure 54: Humidity of the iNGENIOUS container during the trip from Valencia to Piraeus and vice versa © 2020-2023 iNGENIOUS Page 86 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Data collected on 21 November at the Port of Valencia After the transmission of the collected data, from the round trip to Piraeus, to the SES Cloud, we continued the tests at the Port of Valencia. This time, we transmitted in real-time the data from the IoT devices to the SES Cloud. As mentioned earlier and shown in Figure 52, on 21 November 2022, the satellite terminal was installed at the Port of Valencia, as well as the Smart IoT GW, while the iNGENIOUS container, equipped with the IoT devices, was placed in close proximity (<20m). With the communication between the IoT devices and the Smart IoT Gateway as well as the satellite connection established, the IoT devices were sending in real time the measured data. The Smart IoT GW then collected it and pushed it towards the SES Cloud via satellite backhaul. This automatic process worked flawlessly, and we were able to observe the collected data in the Grafana dashboards of the SES Cloud servers. From that point on, all periodic transmissions coming from the IoT devices were immediately forwarded to the Cloud server. Figure 55: Overview screenshot of the Cloud-side dashboard, giving a general impression of the received data during the real-time measurements at the Port of Valencia on 21 November 2022 Figure 56: GPS location of the IoT devices during the real-time measurements at the Port of Valencia on 21 © 2020-2023 iNGENIOUS Page 87 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 55 provides an overview screenshot of the Cloud-side dashboard, giving a general impression of the received data, where we noticed consistent transmissions of temperature, humidity, battery state and GPS values. The door state (or signal state) was only transmitted if triggered, which did not work consistently. Furthermore, the accelerometer values were only included in three sensor messages. Figure 56 presents the GPS location of the IoT devices at the Port of Valencia. The measured GPS points showed an approximate accuracy of around 50m, being distributed in a radius of roughly 25m around the actual location of the IoT devices. This might be partially caused by the fact that at some point during the demonstration, the IoT devices were removed from the iNGENIOUS container and placed closer to the Smart IoT GW. Figure 57: Figure 58: Temperature, measured in real-time from the IoT devices, in the Port of Valencia on 21 November 2022 Humidity, measured in real-time from the IoT devices, in the Port of Valencia on 21 November 2022 In the beginning, the IoT devices were sending status updates every 90 seconds and after 30 minutes of consistent transmissions, the frequency changed to every 5 minutes. This can be seen in Figure 57, where we can also see that the temperature is over 19°C at around 11:15AM and steadily increased to 21°C around 15:00PM, fairly realistically representing a temperature trend, when the IoT devices were wind-protected during the demonstration. © 2020-2023 iNGENIOUS Page 88 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Like the temperature, the humidity was measured consistently, ranging from 55% to 60%, as can be seen in Figure 58Figure 58:. It seems adequate, considering the proximity to the sea and the perceived humid weather conditions during the demonstration. Furthermore, Figure 59 illustrates the battery state of charge, where the power steadily declined from 90% to 77% over the demonstration period of 4 hours and 15 minutes. This represents a drop of around 13% for 61 transmissions made at an average rate of 4.25 transmissions per minute. Considering that the intended transmission rate for the actual trip was one transmission per day, the battery of the sensor device should have more than enough capacity to cover the whole duration of the trip. Figure 59: Battery state of charge of the IoT devices, measured in real-time in the Port of Valencia on 21 November 2022 Moreover, as the door state is only transmitted when triggered by a change event of the physical state of the door, Figure 60 does not show a consistent graph as for the previous metrics. We can see a total of six opening events received and three closing events. This is an indication that some intermediate state change events have been dropped, as the data should represent an alternating pattern between the opened and closed state. Figure 60: Door state of the iNGENIOUS container, measured in real-time in the Port of Valencia on 21 November 2022 In addition, over the period of the demonstration, we received three data transmissions containing the accelerometer payload. The values are within the © 2020-2023 iNGENIOUS Page 89 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) expected range, as one axis has an acceleration value of around 1G (here: Z-axis), while the remaining two have a value close to 0G (see Figure 61). Figure 61: Accelerometer measured in real-time in the Port of Valencia on 21 November 2022 Figure 62 illustrates the end-to-end latency for transmitting the measured data from the IoT devices to the SES Cloud through satellite, where the average latency was 613 ms. Figure 62: End-to-end latency for transmitting the measured data from the IoT devices to the SES Cloud through satellite at the port of Valencia on 21 November 2022 Finally, Table 21 below shows the results of the end-to-end round-trip time (RTT) (ICMP) tests carried out between the MEC server (FV) and the satellite network edge gateway at the satellite hub. The RTT can vary depending on the location of the remote terminal but the typical RTT for the satellite hop of the data path is between 560ms and 570ms. In this example, it would mean the extra hops contributed to an increased overhead of approximately 23ms to 33ms of the overall RTT. © 2020-2023 iNGENIOUS Page 90 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Betzdorf Teleport egress point -> Satellite Terminal --- 192.168.252.100 ping statistics --1050 packets transmitted, 1048 received, 0% packet loss, time 1049013ms rtt min/avg/max/mdev = 570.345/593.199/1185.147/23.257 ms Satellite Terminal -> Betzdorf Teleport egress point --- 192.168.252.73 ping statistics --1042 packets transmitted, 1041 received, 0% packet loss, time 1040968ms rtt min/avg/max/mdev = 577.292/593.949/677.548/15.083 ms Table 21. ICMP RTT of Satellite Link Part II The data collected from the IoT devices during the trip from Valencia to Madrid by train, and back from Madrid to Valencia by truck, was sent in real time to the Cloud through the terrestrial (commercial) network using the device’s NB-IoT antenna. The messages received at the IoT Cloud can be visualized in the Figure 63Figure 63:. The message includes the measured temperature, humidity, accelerometer, and GPS location at the date and time 2023-03-03 09:03:32. This figure also shows that the location captured by the IoT devices corresponds to the middle point of the entire trip of the demo’s Part II (the Madrid Dry port). Figure 63: © 2020-2023 iNGENIOUS Ship UC Demo part B – IoT message received. Page 91 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) In the Figure 64, it is shown an overview screenshot of the Cloud-side dashboard (provided from FV), giving a general impression of the received data, where we noticed consistent transmissions of the GPS values. Figure 64: GPS location reported by the sensor in Part B trip As for the rest of the parameters, the Figure 65 shows an overview screenshot of the Cloud-side dashboard (provided from FV) listing and plotting the historical values of temperature, humidity and accelerometer parameters sent by the sensor during the trip done by the container. Figure 65: Temperature, humidity and accelerometer values by the sensor in Part II trip TEST CASES VERIFICATION Several Test Cases were identified in the D6.1 [1]. In this section, we present their actual results, while more information can be found in Annex V – Validation and Results. Test Case ID Result UC4_TC_01: Integration and installation of sensors and communication modules on iNGENIOUS container Passed © 2020-2023 iNGENIOUS Page 92 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) UC4_TC_02: Over-the-air tests for evaluating LoRa and LTE connectivity at the container in maritime and terrestrial scenarios at the Port of Valencia UC4_TC_03: Develop an application where data gathered by IoT sensors and actuators is stored and visualized UC4_TC_04: Container transport from the Port of Valencia to the Port of Piraeus, including storage at the Port of Piraeus until next loading UC4_TC_05: Container transport from the Port of Piraeus to the Port of Valencia UC4_TC_06: Terrestrial transport by truck from Port of Valencia to hinterland and vice versa UC4_TC_07: Site Survey for exploring the practical viability of accommodating and installing the Smart IoT Gateway aboard, as well for exploring the theoretical viability of installing VSAT antenna on the vessel Passed Passed Passed Passed Passed Failed UC4_TC_08: Validate proposed satellite backhaul infrastructure Passed UC4_TC_09: Validate end to end connectivity using Satellite backhaul Passed UC4_TC_10: Verify uplink and downlink Satellite backhaul capacity meets Use Case KPI requirements Passed UC4_TC_11: Verify uplink and downlink Satellite backhaul latency Passed UC4_TC_12: Validate confidentiality of satellite backhauled sensor data Passed UC4_TC_13: Connectivity of the Smart IoT GW with sensors Passed UC4_TC_14: Connectivity of the Smart IoT GW with M2M space (direct) Passed UC4_TC_15: Connectivity of the Smart IoT GW with M2M space (VSAT) Passed UC4_TC_16: Smart IoT GW will receive and process sensor data Passed UC4_TC_17: Smart IoT GW configuration via remote management Passed UC4_TC_18: Smart IoT GW will receive and process sensor data during outages Passed UC4_TC_19: Smart IoT GW Security Passed UC4_TC_20: Smart IoT GW Integration with other systems Passed Table 22. Ship UC Test case verification The main aim of the test cases execution and verification was to guarantee that the core elements of the Ship use Case were able to act as initially defined and planned. According to the table above, this verification covered the following aspects: • The verification of the functionalities of the Smart IoT GW. • The integration of the IoT devices with the Smart IoT GW. • The integration of the Smart IoT GW with the satellite terminal and the M2M platform. • The verification of the satellite connectivity. • The verification of the container transportation. • We should also mention that the UC4_TC_07 has failed, because as we reported in the D6.2 [2], the site survey did not take place The verification of the container transportation. We should also mention that the UC4_TC_07 has failed, because as we reported in the D6.2 [2], the site survey did not take place. COSSP contacted Marine Operating Center Department for authorization, however due to COVID restrictions, COSSP headquarters prohibited boarding the ship if not necessary. As a mitigation action, the partners contacted a feeder service provider, that agreed to do the site survey in the feeder vessel, however due to high level of work, provider availability and timing, the site survey was finally cancelled. © 2020-2023 iNGENIOUS Page 93 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) KPIS The KPIs of the Ship Use Case as defined in the Deliverable D2.1 [11]: The KPIs of the Ship Use Case as defined in the Deliverable D2.1 [11]: KPI Availability Reliability Battery life Coverage Typical message size Maximum message size Typical frequency (messages per day) Connectivity of heterogeneous IoT devices Latency Mobility Positioning accuracy Test Case Reference Target Actual ≥ 99.9% ≥ 99.9% ≥ 99.9% ≥ 99.9% > 12 years 5 years GEO GEO UC4_TC_01, UC4_TC_10 200 bytes 110 bytes UC4_TC_01, UC4_TC_10 2500 bytes 250 bytes Maximum at every 10 minutes Once per day during the trip from Valencia to Piraeus and vice versa. Once per 5 minutes during the real-time over-the-air demo at the Port of Valencia LoRa, Wi-Fi, Bluetooth and wired LoRa and Wi-Fi UC4_TC_02, UC4_TC_03, UC4_TC_04, UC4_TC_05, UC4_TC_06, UC4_TC_08, UC4_TC_09, UC4_TC_13, UC4_TC_14, UC4_TC_15, UC4_TC_16, UC4_TC_18, UC4_TC_20 UC4_TC_02, UC4_TC_04, UC4_TC_05, UC4_TC_06, UC4_TC_08, UC4_TC_09, UC4_TC_13, UC4_TC_14, UC4_TC_15, UC4_TC_15, UC4_TC_16, UC4_TC_18, UC4_TC_20 UC4_TC_01, UC4_TC_03 UC4_TC_02, UC4_TC_08, UC4_TC_09, UC4_TC_13, UC4_TC_16, UC4_TC_18 UC4_TC_01, UC4_TC_02, UC4_TC_04, UC4_TC_05, UC4_TC_06, UC4_TC_10, UC4_TC_16, UC4_TC_18 UC4_TC_02, UC4_TC_04, UC4_TC_05, UC4_TC_06, UC4_TC_14, UC4_TC_15, UC4_TC_16, UC4_TC_18, UC4_TC_20 UC4_TC_02, UC4_TC_11, UC4_TC_16, UC4_TC_18 UC4_TC_02, UC4_TC_04, UC4_TC_05, UC4_TC_06, UC4_TC_14 UC4_TC_01, UC4_TC_04, UC4_TC_05, UC4_TC_06 Table 23. ≤1s 613 ms ≤ 90 km/h(truck) 45 km/h (ship) ≤ 90 km/h(truck) 45 km/h (ship) ≤5m 25 m Ship UC KPIs All the KPIs defined for the Ship Use Case are intended to guarantee the set technical requirements. Such requirements include the availability and reliability of the satellite connectivity, as well as the capability the capability of the Smart IoT GW to gather and process data from heterogeneous IoT devices. During the validation phase, no significant deviations from the target values were faced and all the KPIs were considered fulfilled. © 2020-2023 iNGENIOUS Page 94 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IMPACT ASSESSMENT Ship container tracking is an essential part of the supply chain and logistics to make them more efficient. Monitoring and seamlessly tracking the container in near real-time provides all the supply chain players and stakeholders full traceability and optimises the transport and storage of container goods. Any event related to a container is quickly reported and analysed and acted on e.g., alternative sourcing plans if needed. By tracking and tracing the cargo, the operator will monitor the asset movement, record the actual routes, transit times, stationing in the facilities and congestion points for every transport mode. By analysing the transit performance, the operator can make informed decisions by choosing preferred routes, carriers or even modes of transport. Real time monitoring of temperature, humidity, accelerometers and even simple contact sensors allow the operator to assess additional critical information for various goods in transport. Temperature and humidity are relevant for perishable goods and abnormal variations in the values will indicate to customers will not receive the goods in adequate condition or that they need the immediate maintenance to avoid the loss of goods e.g., prepare a new transport to receive goods needed on time or solve possible future disputes. Furthermore, the accelerometer output will provide real-time indication about the integrity of the goods and the container. Similarly, abnormal variations may trigger subsequent inquiries which may conclude for example, that an accident occurred. Knowing where this accident happened helps to know the responsibility and if an intervention is required. Continuous contact sensors data may certify that the goods are transported securely in their containers, and no unauthorized access occurred. If a door alarm event took place, the operator will alert security entities to counteract the potential illegal action. In summary, the continuous monitoring and awareness of the goods as they pass through the various supply chain steps, from beginning to end, will allow all suppliers and consumers to have confidence in the quality and safety of the products they are supplying and consuming. Furthermore, the continuous monitoring of goods, over land and sea, will ensure early intervention if something goes wrong which could result in major cost savings for the suppliers and avoid loss of good. Lessons Learned and Potential Improvements Shipping companies want to track and trace containers. To do so, in this Ship Use Case, IoT devices were installed on the containers that can report location and other parameters (e.g., temperature, humidity, etc. in the container) to a central server. As containers travel in areas where there is no terrestrial coverage, satellite communication was provided to ensure that the containers are tracked when they are travelling by ship at sea or are travelling by train/truck through remote areas without terrestrial network coverage. © 2020-2023 iNGENIOUS Page 95 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Furthermore, a Smart IoT GW was used which ensures efficient connectivity from heterogeneous IoT devices, by harmonizing different IoT technologies and application protocols and formatting the data to be transferred in an intelligent and efficient way across the network. The design of the Ship Use Case, the description of each individual component and the trial results presented in the previous sections provide evidence to the significant team effort made by the partners to meet the iNGENIOUS project objectives, as well as those set forth by the specific iNGENIOUS Ship Use Case. The over-the-air live demonstration of the Ship Use case was successfully delivered and produced new insights and useful results for the way forward. However, the use case also faced several challenges. Overall, it was learned that over-the-air live demos are very much different and more complex than lab simulations, especially in the maritime domain, for several reasons: • Equipment installation on a ship follows very strict time schedules aligned with maintenance periods, which means that it is challenging to get the authorization and align with the ship timetables. • A ship site survey should be planned from the very beginning of the project, as it adds important value. The site survey will explore the potential locations for the installation of the VSAT antenna system on the ship as well as will identify how the communication between the Smart IoT GW and the container will be obtained, where the Smart IoT GW will be installed, etc. • Formal requests for getting the approval for the transmission regulatory licence of the satellite terminal at the Ports should be submitted at least four months before the over-the-air live demos. • Direct line of sight is desirable for the communication of the Smart IoT GW with the IoT devices. That is not always available (e.g., when a container is at the bottom of a stack on a container ship) and in this case the communication is lost or is quite poor. Regarding the IoT network several improvements were identified. For example, the Smart IoT GW is quite effective and scalable. Assuming the IoT devices inside the container should send updates every ten minutes and that a LoRa WAN session lasts less than one second, the Smart IoT GW is able to gather and process data simultaneously from around 600 IoT devices. However, some additional improvement can be researched, including: • Implementation of additional sensor space interfaces is needed in order to be able to support different use cases. At the moment, LoRaWAN and Wi-Fi are the sensor space interfaces supported by the Smart IoT GW. However, we plan to add support for additional communication technologies, such as Bluetooth, Serial, etc. • Improve the configurability of the Smart IoT GW. Currently, the Smart IoT GW features a basic configuration interface, allowing to manipulate its behaviour in a limited way. It is planned to extend these capabilities, allowing it to be fully configurable and controllable by an operator. • Remote management improvements. The implemented cloud-integration of the Smart IoT GW allows for downstream commands to be sent towards the Smart IoT GW. Using these commands, remote management and action triggering can be implemented to influence the behaviour of the Smart IoT GW from anywhere in the world. © 2020-2023 iNGENIOUS Page 96 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Improved software packaging and over-the-air updates are needed. The software packaging should be improved to allow for straight-forward deployment of the whole system, for example using Debian packages. In combination with the previous point, this could also be extended to allow the installation of over-the-air updates to a deployed Smart IoT GW. An overall learning from the project was that the continuous monitoring and analysis of the shipping container or goods requires large scale coordination and oversight which cannot be performed by one entity alone along the supply chain. Today, each area is working on improving their own tracking however it requires oversight of many different areas and technologies to meet the continuous monitoring goal that was set out by this use case. There may be an opportunity here for new entrants to coordinate and provide this service. © 2020-2023 iNGENIOUS Page 97 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 7 PoC - Supply Chain Ecosystem Integration Objective and Description Standard approaches for efficient and secure data management are still missing and the interoperability across heterogeneous machine-tomachine (M2M) platforms still needs to be tackled on a case-bycase and platform-by-platform basis due to a wide number of possible applications, design choices, formats and configurations within the IoT domain. Moreover, many of available M2M solutions have been developed in the form of application silos where the interoperability is limited by the scope of the solution. On the other hand, Distributed Ledger Technologies (DLTs) industry is completely fragmented with different alternatives: there is still a lack of consistent standardization across different available DLT solutions that do not interoperate with each other. DLT’s security capabilities are not fully exploited. The DVL/DTL UC is focused on the interoperability between different M2M platforms as well as different DLT solutions. The main aim of this use case is to provide two different interoperable layers in order to abstract the complexity of the underlying M2M platforms and DLT solutions, guaranteeing at the same time data privacy by means of most common pseudonymization techniques. The main components of this use case include the Data Virtualization Layer (DVL) and the cross-DLT layer (TrustOS). The DVL allows to federate the underlying M2M platforms as well as external data sources (e.g., the Port Community System), while the TrustOS components allows to federate a set of DLTs on top. The demonstration of this use case took place in February 2023 and it was performed by considering four different scenarios where several software components and platforms are involved, as summarized in Table 24: © 2020-2023 iNGENIOUS Page 98 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Scenario Id 1 2 3 4 Description Related UC This scenario is focused on GateIn, GateOut, VesselArrival and VesselDeparture events in Livorno and Valencia seaports. Such events are retrieved from the DVL and stored in a form of TrustPoints in different DLTs through TrustOS component. This scenario is focused on sealRemoved event in Valencia seaports. Such event is retrieved from the DVL and stored in a form of TrustPoints in different DLTs through TrustOS component. This scenario is focused on tracking of trucks in Livorno seaport. Geolocation real-time data are retrieved from the DVL and visualized in a map through a Web Application. This scenario is focused on the pseudonymization of personal data (truck plate number) through a Pseudonymization Function integrated with the DVL. Table 24. DVL/DLT UC Ship UC Port Entrance UC Port Entrance UC Scenarios used for the demonstration of the DVL/DLT UC A detailed description and the main architecture used for each scenario, is described in Annex VI – Objective and Description. The first demonstration of this DVL/DLT UC was performed during the mid-term review meeting in May 2022 with a limited set of functionalities. The final part of the demonstration took place in February 2023 by relying on a remote interaction with the following software components hosted in partners’ premises (e.g., staging environments and cloud-based infrastructures): • • • • • • • • TrustOS (owned by TIOTBD). DVL (owned by CNIT). TPCS (owned by AdSPMTS). Awake.AI platform (owned by Awake). Tracking Web Application (owned by UPV). M2M platforms (owned by CNIT, NXW, SES and FV). DLTs (owned by CNIT, TIOTBD, PJATK and FV). DLT Events Visualizer (owned by PJATK and TIOTBD). Setup and Execution According to the DVL/DLT UC’s scenarios listed in the previous section, the following setup was used for the validation and demonstration of each scenario. SCENARIO 1 Setup In this scenario, the following software components were used and properly configured for the execution of the demonstration: TPCS: an instance of the Port Community System hosted in a staging environment in Livorno and managed by CNIT. The underlying SQL Server was © 2020-2023 iNGENIOUS Page 99 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) not synchronized with the production environment and the datasets used for the demonstration of the scenario (for the case of the Port of Livorno) were historical ones (2021). This component provided datasets to DVL for the GateIn, GateOut, VesselArrival and VesselDeparture events’ implementation in Livorno seaport. PISystem M2M Platform: an instance of the M2M platform used by the Port of Valencia and hosted in FV facilities. This component provided datasets for the GateIn and GateOut events’ implementation in Valencia seaport. DVL: an instance of the Data Virtualization Layer (Teiid) running in a dedicated virtual machine within the Staging Farm in Livorno seaport. The platform is managed by CNIT. It retrieves data stored in TPCS and PISystem M2M Platform and exposes such data (properly aggregated and formatted in a form of GateIn, GateOut, VesselArrival and VesselDeparture events) through a RESTful API to the Integration Bridge. Integration Bridge: a microservice hosted in TIOTBD facilities in Spain which acts as an intermediate component between DVL and TrustOS. It asks the DVL, every 60 seconds, if there are new GateIn, GateOut, VesselArrival or VesselDeparture events. If the information belongs to a new event, the event’s digital asset is created in TrustOS, otherwise the existing digital asset is updated accordingly. The access to the DVL (by invoking the API of considered events) is provided with “ReadOnlyRole” enabled on DVL side, so that the entity is not able to perform any changes to the underlying datasets. TrustOS: an instance of the Cross-DLT platform deployed in TIOTBD facilities in Spain. It allows to distribute the information of the TrustPoints among available DLTs by means of a common API. DLTs: testntets of different DLTs the TrustOS is integrated with. These includes: Ethereum and Polygon (deployed in TIOTBD facilities in Spain), IOTA Private Tangle (deployed in CNIT facilities in Livorno), Bitcoin (both testnet and mainet deployed in PJATK facilities in Gdansk) and Hyperledger Fabric (deployed in FV and TIOTBD facilities in Spain). The DLTs store the TrustPoint of the GateIn, GateOut, VesselArrival or VesselDeparture events. DLT Events Visualizer: a web-based application hosted in PJATK facilities in Gdansk (dedicated server) which is integrated with TrustOS. It allows end-users to visualize the different events recorded on TrustOS and DLTs as well as to verify the TrustPoints. It provides then two main functionalities: Asset View (information representing the GateIn, GateOut, VesselArrival or VesselDeparture events) and TrustPoint View (information of a TrustPoint stored in a specific DLT). Execution The aim of the demonstration of this scenario is to test the integration between the DVL, TPCS, TrustOS, PISystem M2M platform and the DLTs in the context of semantic and syntactic interoperability of the heterogeneous Machine-toMachine platforms, as defined by the Challenge 2 (advancements on security, privacy and interoperability) of the iNGENIOUS project. Moreover, it addresses the DLT interoperability topic by relying on a cross-DLTs layer that abstracts the complexity of the underlying DLTs and serving as a © 2020-2023 iNGENIOUS Page 100 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) standard interface between DLT networks and the higher layers of the infrastructure. The demonstration of this scenario consisted of several steps as described below (and depicted in the sequence diagram in Annex VI – Objective and Description). Step 1: the Integration Bridge was able to correctly consume implemented APIs at DVL for the retrieval of the GateIn and GateOut events (for the Port of Valencia) as well as of the GateIn, GateOut, VesselArrival and VesselDeparture events (for the Port of Livorno). The GateIn and GateOut events from the Port of Valencia were retrieved from the PISystem M2M Platform which is integrated with the DVL. All the other events were correctly retrieved from the TPCS platform used in Livorno by means of implemented RESTful APIs. Step 2: for each retrieved event from DVL (through the Integration Bridge component), TrustOS was able to create a DigitalAsset as well as the associated Trustpoint. The Trustpoint was then stored among integrated DLTs by means of a common API which allowed TrustOS to write and read the information in/from a given DLT. In the Annex VI – Setup and Execution, the pictures depict both the DigitalAssets and Trustpoints for each considered event stored either on TrustOS and on the specific DLT (identified by the attribute “networkId”). Step 3: the Integration Bridge was able to ask the DVL, every 60 seconds, if there were new GateIn, GateOut, VesselArrival or VesselDeparture events. When the information belonged to a new event, the corresponding DigitalAsset was correctly created in TrustOS. When the information belonged to an existing event, the existing DigitalAsset was updated accordingly. Step 4: once the TrustPoint related to a given DigitalAsset was stored both in TrustOS and in a given DLT, the DLT Events Visualizer application allowed the end-users to correctly visualize their own DigitalAssets and Trustpoints. The Figure 66 depicts how a DigitalAsset and the associated Trustpoint were represented through the DLT Events Visualizer (assetId 001 linked to the VesselArrival event in Livorno seaport): © 2020-2023 iNGENIOUS Page 101 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 66: DLT Events Visualizer representing the DigitalAsset and the associated Trustpoint for the VesselArrival event in Livorno seaport. SCENARIO 2 Setup In this scenario, the following software components were used and properly configured for the execution of the demonstration: IoT Sensor: physical IoT device installed on iNGENIOUS container stored in Valencia for monitoring purposes, which sends data to the Smart IoT Gateway. Smart IoT Gateway: physical gateway which connects to the IoT sensor mounted on the iNGENIOUS container over the wireless LoRa interface as well as to the M2M space on the network/cloud side (Eclipse OM2M Platform). Eclipse OM2M Platform: an instance of the machine-to-machine platform deployed in a cloud-based environment in Luxembourg owned by SES which allowed to store data coming from the Smart IoT Gateway. © 2020-2023 iNGENIOUS Page 102 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) DVL: an instance of the Data Virtualization Layer which retrieves data stored in Eclipse OM2M M2M platform and exposed such data (properly formatted in a form of sealRemoved event) through a RESTful API to the Integration Bridge. Integration Bridge: a microservice which acts as an intermediate component between DVL and TrustOS as described in Scenario 1. In this case the sealRemoved event is considered. TrustOS: an instance of the Cross-DLT platform, as described in Scenario 1. DLTs: test nets of different DLTs the TrustOS is integrated with, as per Scenario 1. The DLTs store the TrustPoint of the sealRemoved event. DLT Events Visualizer: a web-based application, as described in Scenario 1. Execution The aim of the demonstration of this scenario is to test the integration between the DVL, Eclipse OM2M Platform, TrustOS and DLTs. It consisted in the test steps described below (and depicted in the sequence diagram in Annex VI – Setup and Execution). Step 1: the IoT sensor (see Figure 67) was removed from the iNGENIOUS container (to simulate the door opening event) and the data was sent to Eclipse OM2M Platform through the Smart IoT Gateway (according to in-field tests performed in Valencia in November 2022). Figure 67: IoT device used for sealRemoved event. Step 2: the Integration Bridge component interacted with DVL in order to check if a new sealRemoved event was available. The DVL was able then to retrieve data from the Eclipse OM2M Platform. The data was aggregated at DVL level according to a given data model so that the sealRemoved event was correctly made available to the Integration Bridge. The event was obtained by combining static and dynamic information. Step 3: TrustOS component retrieved sealRemoved event from the DVL through the Integration Bridge and correctly created both a Digital Asset and a TrustPpoint with the same procedures described in Scenario 1. Step 4: the TrustPpoint was then stored among the DLTs, as per Scenario 1. © 2020-2023 iNGENIOUS Page 103 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Step 5: once the TrustPpoint related to a given DigitalAsset was successfully stored both in TrustOS and in a given DLT, the DLT Events Visualizer application allowed the end-users to visualize their own DigitalAsset (related to the sealRemoved event with assetId 005) and the associated TrustPpoint, as depicted in Figure 68: Figure 68: DLT Events Visualizer representing the DigitalAsset and the associated Trustpoint for the sealRemoved event in Valencia seaport. SCENARIO 3 Setup In this scenario, the following software components were used and properly configured for the execution of the demonstration: IoT Tracker: physical IoT device (Micktrack MT821) installed on a testing vehicle in Livorno seaport. It sends data to Symphony M2M platform. Symphony M2M Platform: an instance of the M2M platform running in a dedicated virtual machine within the Staging Farm in Livorno seaport (remotely accessible through a VPN). The platform is managed by NXW and process and stores data coming from the IoT device. DVL: an instance of the Data Virtualization Layer which retrieves data stored by Symphony M2M platform and exposes such data through a RESTful API (when the Tracking Application requests it). © 2020-2023 iNGENIOUS Page 104 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Tracking Application: a web-based application hosted in a private server in Valencia and managed by UPV. It visualizes data provided by DVL by means of a GUI. The access to the DVL is provided with “ReadOnlyRole” enabled on DVL side, so that the entity is not able to perform any changes to the underlying datasets. Execution The aim of the demonstration of this scenario is to test the integration between the DVL and Symphony M2M Platform. It consisted of the test steps described below (and depicted in the sequence diagram in Annex VI - Setup and Execution). Figure 69: Service vehicle in the Port of Livorno with the IoT tracking device installed on board. Step 2: a dedicated HAL southbound plugin (Tracker SBI Plugin implemented in Symphony M2M platform) successfully received, filtered and transformed structured data from the IoT tracking sensor into the internal format supported by the HAL. A custom HAL northbound plugin (NBI Plugin implemented in Symphony M2M platform) allowed then to integrate the Symphony Data Storage by storing data collected from the underlying HAL southbound plugin by using a message broker based on RabbitMQ. The data was then exposed through a RESTful interface which is integrated with DVL. Step 3: on one hand the DVL integrated the interface exposed by Symphony M2M platform and on the other hand it exposed a RESTful interface which was used by a Tracking Application to consume datasets coming from the IoT tracking device. This interface was integrated with the Tracking Application which correctly performed requests to DVL to retrieve such data. Step 4: the DVL retrieved GPS data from the Symphony M2M platform by performing a data mapping according to the Tracking Application requirements. The picture included in Annex IV – Setup and Execution, depicts the structure of data available at DVL level by using Postman tool to perform the POST request. © 2020-2023 iNGENIOUS Page 105 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Step 5: the data was correctly made available to the Tracking Application as a result of the HTTP request. Step 6: the Tracking Application provided a GUI for a graphical representation of the main path undertaken by the service vehicle with the tracking device on board within the Port of Livorno area, as shown in Figure 70: Figure 70: Tracking Application - Livorno Dashboard. SCENARIO 4 Setup In this scenario, the following software components were used and properly configured for the execution of the demonstration: TPCS: an instance of the Port Community System which provides datasets to DVL for the GateIn and GateOut events occurring in Livorno seaport. Mobius OneM2M Platform: an instance of the Machine-to-Machine platform hosted and running in a staging environment in Livorno seaport, managed by CNIT. The platform is responsible for collecting data coming from the IoT © 2020-2023 iNGENIOUS Page 106 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) devices installed within the seaport. In the context of this scenario, the platform stores the meteorological data coming from two distributed monitoring stations within the seaport. DVL: an instance of the Data Virtualization Layer which retrieves data stored by Mobius OneM2M and TPCS platforms and exposes such data through a RESTful API (when requested by the Predictive Analytics Application). Pseudonymization Module: a microservice-based application hosted in a dedicated virtual machine (managed by TEI) accessible only via VPN in a staging environment in Livorno seaport. The microservice allows to retrieve GateIn and GateOut events from DVL (for the Port of Livorno), pseudonymize and store them by using available pseudonymization techniques and expose a pseudonymized dataset to DVL by a RESTful interface so that external applications may consume such datasets through the DVL component. It also provides interfaces for the management of all stored datasets (e.g., deleting of the pseudonyms which retention period has expired). The access to the DVL (by invoking the API of considered events) is provided with “ReadOnlyRole” enabled on DVL side, so that the entity is not able to perform any changes to the underlying datasets. Predictive Analytics Application: a cloud-based application managed by Awake for performing predictive analysis in the scope of the Port Entrance use case for both the Port of Valencia and the Port of Livorno. Further details are given in the Chapter 6 of this document. The access to the DVL (by invoking the API of considered events) is provided with “ReadOnlyRole” enabled on DVL side, so that the entity is not able to perform any changes to the underlying datasets. Execution The aim of the demonstration of this scenario is to test the integration between the DVL and Mobius OneM2M Platform. In addition, the demonstration aims at extending the DVL’s capabilities by providing a Pseudonymization Module with a pseudonymization functionality for personal data management (e.g., truck’s plate number) in line with GDPR requirements. Pseudonymized data can be then used by third-party applications for analytics and/or analysis purposes by guaranteeing data confidentiality. The demonstration of this scenario consisted of several steps as described below (and depicted in the sequence diagram in Annex VI – Setup and Execution): Step 1: using two distinct RESTful interfaces implemented in the DVL (HistoricalGateInEvent() and HistoricalGateOutEvent()) the Pseudonymization Module was able to read once per day all historical GateIn and GateOut events (in Livorno seaport) by considering a time window set to 24h for the demonstration scope. Step 2: the Pseudonymisation Module successfully applied the selected pseudonymization algorithm (Hashing Without Key - HWK) on the fetched personal data in GateIn/GateOut events (truck’s plate number attribute), before storing them within an encrypted database. The Figure 129 and Figure 130 depict the above-mentioned interactions. Step 3: the pseudonymized events were then retrieved through the DVL (which exposes an additional RESTful interface called FetchGateEvents()), by the © 2020-2023 iNGENIOUS Page 107 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Predictive Analytics Application, and were used for the AI-based algorithms training which are part of the Port Entrance UC (further details and the main outcomes of this scenario are given in the Demo – Situational Understanding in Smart Logistics Scenario of this document). ISSUES ON EXECUTION During the DVL/DLT use case demonstration, no significant issues occurred. Nevertheless, the main issues faced during the preparation of the execution were based on technical aspects, and they have been properly addressed through appropriate development activities. Such issues are briefly summarized in 108. Description of the issue Mitigation measures Lack of a mechanism to keep TrustOS synchronized when new events are available in DVL (both are passive components) Implementation of an intermediate layer (namely Integration Bridge) which allows checking whether new events are available in DVL. DVL does not support the response format (XML) of the Eclipse OM2M platform API Implementation of an additional service within the DVL which allows parsing the API’s response correctly. A token-based authentication is not natively supported by the DVL to interact with the PISystem APIs Unsupported communication protocol between the tracking IoT sensor and Symphony M2M Platform Table 25. Implemented the authentication procedure within the VDB (which defines the API to be integrated with TrustOS) to interact with PISystem. Development of a dedicated southbound plugin for proper hardware abstraction in Symphony M2M platform. DVL/DLT UC Issue on execution. Validation and Results In this chapter, the main results and outcomes of the DVL/DLT UC are provided. The verification process was based on the validation of the defined test cases which allowed fulfilling the user and the system requirements respectively. Moreover, the KPIs’ assessment is described according to the main expectations initially set for the use case. Finally, the impact assessment of the solution as well as potential improvements to be done in the future are briefly presented and discussed. TEST CASES VERIFICATION In the context of the DVL/DLT UC, the following test cases were performed so that both the user and system requirements were fulfilled as defined and described in D2.1 [11]. The test cases were initially defined in D6.1 [1] while the description of all related development and integration activities with technical details are reported in D6.2 [2]. The following table provides a list of all test cases for this use case that were performed and verified (further details are included in Annex VI – Validation and Results): © 2020-2023 iNGENIOUS Page 108 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case ID Result UC6_TC_01 - Interaction between OneM2M platform and Data Virtualization Layer UC6_TC_02 - Interaction between OM2M platform and Data Virtualization Layer UC6_TC_03 - Interaction between PISystem platform and Data Virtualization Layer UC6_TC_04 - Interaction between DVL, Integration Bridge, TrustOS and the set of DLT providers UC6_TC_05 - Mapping of the access roles for Data Virtualization Layer consumers UC6_TC_06 - All personal data received by Data Virtualization Layer has to be pseudonymized UC6_TC_07 - DVL (authorized entity) can fetch data, in pseudonymized format, from PF module Passed Passed Passed Passed Passed Passed Passed UC6_TC_08 - Personal Data storage Passed UC6_TC_09 - Data Owner can request to the platform to cancel personal data Passed UC6_TC_10 - Views and query results caching capability Passed UC6_TC_11 - Interaction between TPCS and Data Virtualization Layer Passed UC6_TC_12 - Integration between Symphony M2M Platform and Data Virtualization Layer Passed Table 26. DVL/DLT UC Test case verification. The main aim of the test cases execution and verification was to guarantee that the core elements of the iNGENIOUS Interoperable Layer (namely DVL and TrustOS) were able to act as initially defined and planned in the scope of this use case. According to the table above, this verification covered the following aspects: • The integration between the DVL and the underlying M2M platforms as well as data sources for data aggregation; • The integration between the DVL and TrustOS by means of an Integration Bridge for maritime events retrieval; • The integration between the TrustOS and the DLTs on top for maritime events storage; • The integration between the DVL and a Pseudonymization Module for personal data pseudonymization based on HWK technique. KPIS In this section, the list of identified KPIs is provided for the DVL/DLT use case. Each KPI is further described in KPIs with additional technical details used for their assessment. For each KPI, the related testing activities are also reported in a form of test cases. In addition, the target values (the ones set at the beginning of the project) are benchmarked against the actual values resulted from the validation and demonstration of the DVL/DLT use case. The Table 27 provides a summary of such comparison. KPI © 2020-2023 iNGENIOUS Test Case Reference Target Page 109 of 220 Actual iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Data Virtualization Layer scalability Data Virtualization Layer data processing Data Virtualization Layer access control UC6_TC_01 UC6_TC_02 UC6_TC_03 UC6_TC_11 UC_TC_12 UC6_TC_01 UC6_TC_02 UC6_TC_03 UC6_TC_10 UC6_TC_11 UC6_TC_12 UC6_TC_05 ≥5 heterogeneous and simultaneous M2M platforms as data sources 4 Real-time Real-time Role-based access control RBAC Dedicated TrustOS identity for iNGENIOUS Integration with 8 simultaneous DLT providers High availability (8x5 environment) Cross-DLT layer access control UC6_TC_04 Role-based access control Cross-DLT layer scalability UC6_TC_04 At least 4 simultaneous DLT technologies Availability of the DLT connectivity layer UC6_TC_04 The DLT connectivity layer should be highly available Data processing time in DLTs UC6_TC_04 Each request for the given DLT should be processed in less than one minute Less tan 30 sec Cross-DLT concurrent requests UC6_TC_04 At least 4 concurrent requests 8 concurrent requests 100% 100% 100% 100% Confidentiality and integrity protection of personal data Logs of privacy events UC6_TC_06 UC6_TC_07 UC6_TC_08 UC6_TC_09 UC6_TC_06 UC6_TC_07 UC6_TC_08 UC6_TC_09 Table 27. DVL/DLT UC KPIs. All the KPIs defined for the DVL/DLT use case are intended to guarantee technical requirements set for the proposed solution (namely iNGENIOUS Interoperability Layer). Such requirements include the scalability and availability of both the DVL and TrustOS (Cross-DLT layer) components, as well as the capability to properly manage the access to all considered data sets by addressing data privacy and confidentiality aspects. Originally, it was planned to have at least five heterogeneous M2M platforms among all iNGENIOUS use cases, but one of them (namely NB-IoT Platform) was never used as M2M platform in the context of the project. Nevertheless, this deviation did not impact the overall scalability of the DVL component, which was additionally integrated with an external data source (namely TPCS). During the validation phase, no significant deviations from the target values were faced and all the KPIs were considered fulfilled. © 2020-2023 iNGENIOUS Page 110 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IMPACT ASSESSMENT First of all, the DVL/DLT use case allowed to tackle the lack of standardization, which is one of the issues that are currently hindering massive consumer uptake of IoT technologies. This was achieved by providing a new approach for the interoperability based on the federation of different IoT platforms within heterogeneous domains, overcoming the compatibility issues between both standard and non-standard, proprietary and custom M2M solutions. Secondly, the use case addressed the abstraction of different available DLTs, going beyond the distinction between public and private DLTs, by providing a common layer for their interoperability within a heterogeneous environment and ensuring an immutable data storage as well as removing (or reducing) the need of the third trusted party that holds records of events (during the lifetime of the project, the most important aspect of the DLTs in the context of supply chain was data immutability and accountability rather than smart-contract compatibility). By means of this approach, the organizations and companies could spend less on building and managing data integration processes for connecting distributed data sources, benefiting in terms of costs and time savings by quickly validating new business models using an agile approach to data integration. In addition, the lack of interoperability between independent blockchain-based systems and use cases, is preventing DLTs from being applied in large industrial ecosystems and unleashing their full potential and benefits. The implementation of a blockchain and DLT interoperability leads to a significant breakthrough towards global blockchain use cases and systems. Instead of being forced to deploy the technology for corporate business cases with a small number of participants, iNGENIOUS interoperable layer enables the exchange of data and the orchestration between different use cases. This allows the transformation of limited use cases into global ones, with a corresponding business impact. Finally, iNGENIOUS interoperability layer enables the communication and exchange of data that allows users and companies with a way of governing their data in every network, fulfilling one of the promises of blockchain technology and decentralize identities that is to return the control of their data to users. Lessons Learned and Potential Improvements During the demonstration of the DVL/DLT UC and based on the requirements as well as constraints of the implementation approach that was adopted, the following aspects were identified in relation to further improvement of the considered solution (namely Interoperability Layer): i) TrustOS and DVL are implemented as a single access point for both the underlying data sources (e.g., M2M platforms) and DLTs on top (namely Bitcoin, IOTA, Hyperledger Fabric and Ethereum). This approach may, in principle, lead to a single-point-of-failure issue. In order to further improve the proposed solution, a distributed approach may be used: more than one instance of both software components can be deployed and synchronized so that in case of a failure, another instance can be © 2020-2023 iNGENIOUS Page 111 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) used without compromising the availability of the interoperability layer; ii) Four different scenarios have been used for the validation of the DVL/DLT use case. Only two of such scenarios (Scenario 2 and Scenario 3) were validated using real-time data due to technical constraints. This slightly limited the validation process of both TrustOS and DVL components in a real environment with more realistic conditions. In order to further test and validate the proposed solution, more than two data sources, with real-time capabilities, would be beneficial; iii) Due to the project’s constraints, only five different DLTs have been used to validate the DVL/DLT use case. In a real context, the supply chain ecosystem (at least in the maritime context) includes a lot of actors: terminal operators, maritime agencies, freight forwarders, carriers, institutional bodies, etc. Considering a real scenario, the proposed solution may be tested by involving a wider range of actors and assuming each of them relies on a different DLT solution for their own business. © 2020-2023 iNGENIOUS Page 112 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 8 Additional Research Activities – Satellite Direct Access The purpose of this section is to capture additional notable research carried out during the project which was outside the scope of the selected use cases. The exploratory research was always planned from a project perspective but not directly impacting the uses cases defined. One such activity was the research carried out by iDR in the area of direct access of IoT devices over satellite. Satellite technology was used in the Transport and Ship use cases with focus on using satellite to backhaul the IoT information between the IoT gateway and the cloud. However, satellite direct access for IoT devices is where IoT devices connect directly to the satellite network, which in turn connects to the IoT cloud/data center. This allows delivery of the IoT content in a more efficient and cost-effective manner by utilizing a Direct-toSatellite approach rather than using the satellite to backhaul IoT traffic. This section describes the setup, testing and results from the satellite direct access activities. Objective and Description The objective of this activity was to research satellite direct access concepts. Direct access of IoT devices over satellite can be categorized in the following three areas. • Non-3GPP IoT access - Direct access of IoT devices over satellite using proprietary non-3GPP access technologies is already supported by many industry partners today. Within iNGENIOUS, iDR researched the use of their own proprietary access technologies to determine if they were suitable for connecting IoT devices over satellite. • 3GPP 5G NR-NTN - 5G New Radio Non-Terrestrial Network support is a new feature added in 3GPP Release 17. This offers the capability to use a standard 5G NR waveform over satellite links. This could offer new opportunities for both the direct access and satellite backhaul use cases. • 3GPP NB-IoT NTN - 3GPP have also made changes to NB-IoT and LTE-M to support NTN. These changes were studied in Release 16 and included in Release 17. In general, the changes are similar to the changes outlined for 5G NR-NTN but tailored for NB-IoT. There was no use case requirement for direct access over satellite solutions within the iNGENIOUS project, however, within this project research was carried out on all three areas mentioned above. Details of the iNGENIOUS research on 3GPP 5G NR-NTN and 3GPP NB-IoT NTN are included in D3.2 [12]. The following sections contain details of Non-3GPP IoT access (direct access) research. © 2020-2023 iNGENIOUS Page 113 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Setup and Execution The satellite direct access research and development work can be further categorized into two main areas: • Transmission of IoT data over satellite. • Satellite radio channel characterization. TRANSMISSION OF IOT DATA OVER SATELLITE The purpose of this research was to investigate and demonstrate the possibility of generating a robust IoT data transmission message that can be encoded, transmitted and received over a satellite link and decoded at the other side by an existing iDR satellite system before forwarding to the IoT cloud. This would allow existing satellite remote terminals to receive IoT data from sensors and transmit over satellite without having to make any hardware changes to the existing satellite nodes. Importantly the IoT data transmission does not require the setup of an end-to-end data session but uses control plane messaging to transmit the information. The research work carried out is summarized below. Researching IoT payload transmission over GEO satellite network This research included the enhancement of the existing commercial satellite system to add capability to transmit and receive an IoT payload. This required modifications to the access procedure and control plane on the existing VSAT terminal and satellite hub. Building Sensor Network in iDR lab testbed To test and verify the end-to-end IoT data transmission, a lab testbed was setup which comprised of three IoT nodes (with seven temperature sensors in total) and a network edge MEC node at the IoT sensor side. The core network side consisted of a satellite hub for IoT processing and the cloud endpoint which stored and displayed the received IoT information. An example of the IoT devices can be seen in Figure 71. Figure 71: © 2020-2023 iNGENIOUS Heat sensors installed in iDR lab in Killarney. Page 114 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) IoT Data Payload Optimisation Once the initial investigations were complete and the test lab was setup, the next task was to work on the sensor data encoding at the IoT network edge to encode the data securely and robustly for transmission over the satellite link. Once the data was encoded at the network edge it was forwarded onto the satellite modem for encapsulation and transmission. On the satellite hub side, the IoT data transmission had to be received, detected and decoded before being forwarded onto the IoT cloud for storage and analysis. Satellite Network Validation The final part of this research was testing in the lab testbed and over the live satellite network. This was done in the lab by setting up a GEO satellite network using satellite channel emulators and in the live network using SES’ GEO satellite connectivity over Astra 2F. In both cases the remote terminal and satellite hub needed to be upgraded to support the transmitting and receiving of the IoT data. Figure 72 below provides an overview of the lab testbed and live over the air setups both of which were used to test and validate the IoT data transmission. The same IoT sensors and MEC nodes were used for collecting, concatenating and encoding the IoT data. Using the same edge network nodes allowed for seamless switching between the lab testbed and live network when capacity was made available. Another useful element to the lab setup was the ability to capture and replay IoT burst information which is highlighted in red in Figure 72. Figure 72: Transmission of IoT data over satellite lab and live testbed setups One important characteristic of how the direct access IoT over satellite network operates is that the IoT data is sent over the satellite link from the VSAT satellite terminal to the satellite hub without ever creating a data session over the satellite. The information is sent using control signaling messages that are typically used for requesting access to the satellite network prior to a data session being setup. This means that no data session is required to pass the IoT © 2020-2023 iNGENIOUS Page 115 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) data over the satellite network which allows for a more efficient use of resources. On the IoT Cloud side, the initial integration was done with the Microsoft Azure IoT cloud system which was used to store, analyze and display the communicated IoT information. An example of the Azure IoT dashboard can be seen in Figure 73. Figure 73: Microsoft Azure IoT cloud dashboard showing IoT information. Maintaining the Microsoft Azure IoT cloud service was proving costly, so it was decided to move to an in-house IoT cloud system based on Grafana coupled with an influxDB timeseries databases to provide data storage and visualization. An example screen shot can be seen in Figure 74 below. Figure 74: Example of in-house IoT cloud dashboard, based on Grafana, showing IoT information. © 2020-2023 iNGENIOUS Page 116 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) SATELLITE CHANNEL CHARACTERIZATION The purpose of this research was to identify the lowest possible signal to noise ratio (SNR) that an IoT device could successfully send and receive IoT data over an existing iDR satellite network using the direct access setup described earlier. This would be a major consideration when determining the type of IoT devices and configuration that can be supported on the existing satellite network for connecting IoT devices using direct access over satellite connectivity. The research included identifying and analyzing the power and SNR limits for IoT data transmission for various configurations. This was performed using the lab test setup shown in Figure 72. The return link (link from the remote terminal/IoT device to the satellite hub) satellite emulator was used to reduce the SNR step by step until the IoT data was not received by the satellite hub any longer. At each step the SNR was recorded and several IoT data messages were sent to the satellite hub. If the information was received successfully the SNR was dropped further until the lower limit was reached. Validation and Results TEST CASES VERIFICATION Transmission of IoT data over satellite Successful transmission of IoT data over satellite using direct access was validated and confirmed by the IoT sensors data (temperature sensor data) being received by the Grafana system and displayed correctly on the Grafana user interface. An illustration of this can be seen in Figure 75 below which shows the temperature of the iDR lab in Killarney where the sensors were installed (see Figure 73). The correct capture, transmission and display of the IoT sensor information on the Grafana system confirmed the following steps were completed correctly (see Figure 72 for system overview diagram): 1. IoT Sensor information was received correctly by the MEC server. 2. MEC server correctly encoded the IoT information in order forward the data over the satellite link. 3. MEC server forwards the encoded IoT information to the satellite modem. 4. Satellite terminal receives IoT data from the MEC server and transmits it over the satellite within an IoT burst. 5. IoT burst containing IoT data is received on the satellite hub and extracted successfully. 6. IoT data is decoded correctly and passed to influxDB for storage. It is then retrieved by Grafana for analysis and display. 7. IoT information is displayed correctly on Grafana system. © 2020-2023 iNGENIOUS Page 117 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 75: Example of in-house IoT cloud dashboard, based on Grafana, showing IoT information. Satellite channel characterization The satellite channel characterization testing required detailed setup and testing of the satellite system at different power and noise levels to identify the lowest possible SNR where an IoT burst could still be successfully received by the satellite hub. The testing was performed on the modified lab and live networks and a summary of the results are provided in Table 28 below. IoT Config iDR Lab dB (SNR) Narrowband + min bandwidth Narrowband + min-low bandwidth Narrowband + mid bandwidth Spread spectrum + min-low bandwidth Spread spectrum + mid bandwidth Table 28. SES Astra2F Live dB (SNR) -6.01 -5.81 -5.96 -15.06 -15.73 -5.71 -5.71 -5.82 -10.12 -13.32 Satellite channel characterization SNR values The table shows the lowest recorded SNR value where an IoT burst was received by the satellite hub. The SNR values recorded for the narrowband setup were similar for both the lab and live systems which is a good indication that the test setup was representative of the live network. The satellite remote terminal and hub equipment used were similar for both, so this was expected. For the spread spectrum setup, the difference was larger and it may be possible that the environmental conditions may have been a bigger factor here. Further investigation is required to determine such difference. The number of successful IoT transmission received at the various SNR levels was seen to reduce as the SNR level reduced which is also expected. However, it proved difficult to get a consistent measurement of the success rate at the © 2020-2023 iNGENIOUS Page 118 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) lower SNR values. For the latter, it should be noted that the setup was a standard satellite network VSAT deployment that was not tuned for low SNR or IoT data transmission which was the focus of the testing in this case. Further research and investigations are required on what the SNR level may be if a different waveform was used over the satellite e.g. LoRa or NB-IoT. IMPACT ASSESSMENT The ability for an existing satellite system to successfully transmit IoT data over satellite using the existing control plane mechanisms and without having to setup a dedicated radio bearer (end-to-end data session) is a powerful capability that has been identified and tested with this research. It allows the transmission of IoT data very efficiently as there is no resource overhead required to set up a dedicated radio bearer. It means there is potential for the existing satellite system to immediately become an IoT Sensor network without any major hardware upgrades apart from deploying the IoT sensors and connecting to the satellite terminal. It was also shown that the IoT data transmission is robust and can be transmitted and received at low SNR values which is an important aspect of any IoT sensor network where the IoT sensors may be located in very remote areas. The ability to successfully transmit and receive data at low SNR values also means that there is very little interference with the wider satellite network which is an important network planning consideration. The results of this research will provide valuable input to the existing product deployment capabilities and future planning for IoT solutions over satellite. Lessons Learned and Potential Improvements The satellite channel characterization testing took a large effort to setup, test and analyse the large amount of generated data. This is an area that could be explored further and is so large that it could warrant a dedicated project. The live over-the-air testing was very useful and confirmed the lab testing results. In the future more time could be spent on this testing, especially to test with different hardware configurations which would be more representative of the IoT sensors network connecting directly to satellite. There is also potential for improvement on the SNR levels achieved for successful reception of the IoT burst information. As mentioned above, the test setup used was not modified or tuned for IoT data transmission apart from the addition of the IoT burst encoding and detection feature which was added at the application level. Improvements could be made on the existing waveform to reach lower SNR levels and improve the success rate of received IoT bursts for a given SNR. Also investigating the use of other waveforms over satellite (e.g. LoRa, NB-IoT) could lead to better performance as these waveforms are designed for low SNR IoT data transmission. © 2020-2023 iNGENIOUS Page 119 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 9 Conclusion The document has described the activities related to measurement campaigns and trials developed in the PoCs and Demos and their validation against KPIs and requirements defined in WP2 and gathered in D2.1 [11]. For each PoC and Demo, the objectives of the demonstration have been defined as well as the set-up and execution activities. Results and test cases validation have been described and KPIs calculated and accordingly compared with the target values pursued and defined in D2.1 [11]. The trials conducted in the use cases allowed to identify main lessons learned and potential improvements that can be summarized as follows. The Factory UC focuses on cooperative automated robots for future smart factory production lines or warehouses. Within the iNGENIOUS project it has been demonstrated how wireless communications systems based on 3GPP standards are able to provide services for industrial scenarios. The advantages highlighted are related to cost-saving and benefits of virtualization, that allow to improve efficiency, flexibility and quality of the supply chain and production processes handled by robots, AGVs, transport vehicles and people. All of them could be equipped with devices, capturing real-time data on temperature, humidity, noise, presence of particles in the air, etc. In addition, all of this data can be used to train predictive maintenance system before any anomalies occur. The results obtained in the tests and trials of this use case allowed to identify possible improvements in the protocol for sensor data sending sensor by using an event-based sampling approach, in order to send information only when an event is detected. Additionally, the 5GLAN use has been identified to bring added value when creating private groups of devices to be connected within the industrial network. The integration, testing and demonstration activities have shown the importance of the availability of well-defined and accurate management and control APIs for the support of full automation in service and slice deployment and operation. This has been identified as a crucial aspect and lesson learned, especially when software and hardware components are provided by different vendors or institutions in general. The Transport UC focuses on safe and secure micro edge sensors for monitoring wheels and axles of cargo train carriages. Within the iNGENIOUS project, it demonstrated eight improvement areas when compared with conventional IoT sensors, such as energy harvesting, data cloud and secure data authorized, etc. One of the key driving factors of the Transport UC is the optimized and efficient communication energy paths for sensors tested, that always run on batteries or energy-starved harvesters. Along the development of these components, it has been detected its possible further usage with the corresponding updates for joint medical edge applications. The usage of remote attestation to ensure security and confidentiality for this future application is under discussion and further cooperation with partners involved is almost ensured. One of the most important learnings for the future applicability of these developments is the need of clear legislations for accident and rail track damage prevention as well as penalties on damaged infrastructure due to poor maintenance. Furthermore, it is of primary importance the cooperation among many relevant stakeholders to share not only benefits from the applied innovative technology but also implementation cost. © 2020-2023 iNGENIOUS Page 120 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The Port Entrance UC focuses on enhancing the situational understanding of events in maritime ports by ingesting multiple data. Within the iNGENIOUS project, it has been demonstrated how prediction capabilities enable to optimize truck turnaround times (TTT), therefore minimizing truck congestion, consumption, noise, emissions and time waste. The use case demonstrated how the inclusion of eco-efficient management criteria is increasing in modern port management and market competition. One of the most important learnings obtained is the need of historical datasets availability and updated data integration allowing to feed machine learning models. The test results with historical data indicated that having access to some additional features already existing in port systems and to real-time data improves the prediction accuracy. In fact, the long-term prediction was demonstrated with minimal data available and additional inputs such as temporary high congestion were not taken into account during the testing. These aspects represent the most important challenges to improve the current use case models and are considered to be performed prolonging the cooperation among the involved partners after the project’s end. Such cooperation ensures the viability of a future integration of the iNGENIOUS work into real operation processes in smart ports. The AGV UC focuses on improving the driver’s safety by combining the use of mixed reality and haptic solutions for controlling AGVs (autonomous vehicles) in a real scenario, to solve the problem with the actual autonomous vehicles without remote driver control. Within iNGENIOUS, an innovative Tele-operative Driving has been demonstrated ensuring a proper connectivity for the AGV, validating the haptic gloves, and developing digital twin for improving the remote cockpit. The safe driving is possible with the established components if the network performance is optimal, under the limit of the latency established. It has been observed that both tested gloves work well, but completely natural feeling is not yet achieved. Another observed aspect to be improved for the technology behind is the immersion experienced by the teleoperator and therefore safety, exploring the use of new cameras and their overlapping in the cockpit. For the 5G network administration, in order to obtain a better distribution of network traffic, it will be necessary to separate the uplink and downlink traffic into different slices, as well as to assign different priorities depending on the needs. The Ship UC focuses on providing end-to-end (E2E) container tracking via IoT devices, Smart IoT gateway and satellite technology. Within iNGENIOUS project, it has been demonstrated how shipment information is available across all connected platforms and interested parties in real-time. The live demonstration of the Ship UC produced new insights and useful results on container track and tracing, reporting location and other parameters (e.g., temperature, humidity, etc. in the container) to a central server. It was learned that live demos are very much different and more complex than lab simulations, especially in the maritime domain, due to the different and several protocols, regulations and restrictions to be fulfilled. Regarding the IoT network several improvements were identified, such as implementation of additional sensor space interface, improvement in configurability and remote management. As overall learning, the continuous monitoring and analysis of the shipping container or goods requires large scale coordination and oversight among multiple entities along the supply chain. © 2020-2023 iNGENIOUS Page 121 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The DVL/DTL UC focuses on the interoperability between different M2M platforms as well as different DLT solutions for efficient and secure data management. Within iNGENIOUS, it has been demonstrated a novel approach to ensure an immutable data storage and privacy capabilities. This was achieved by providing federation of different IoT platforms within heterogeneous domains and common interoperability layer within a heterogeneous environment. The interoperability layer enables the communication and exchange of data that allows users and companies to govern their data in every network, fulfilling one of the premises of blockchain technology and decentralized identities: to return the control of data to users. During the demonstration, improvement on the interoperability layer has been identified in order to avoid a single-point-of failure issue and use a distributed approach that allows the applications and users to switch to another instance in case of failure, without compromising the interoperability layer. Moreover, in order to further test and validate the proposed solution, more than five data sources, with real-time capabilities, would be beneficial. Considering a real scenario, where lots of actors are involved in the supply chain ecosystem, the proposed solution can be tested by considering a wider range of actors and assuming each of them relies on a different DLT solution for their own business. Additional research activities have been carried out during the project, satellite direct access concepts of IoT devices, to demonstrate the ability to transmit IoT data over satellite using the existing control plane mechanisms and without having to setup a dedicated radio bearer. This powerful capacity allows a very efficiently transmission of IoT data without actual resource overhead required. There is potential for the existing satellite system to immediately become an IoT Sensor network without any major hardware upgrades apart from deploying the IoT sensors and connecting to the satellite terminal. It was also shown that the IoT data transmission is robust and can be transmitted and received at low SNR, demonstrating that IoT sensors may be located in very remote areas and the very little interference with the wider satellite network. This area could be explored further, improving the existing waveform or investigating the use of other waveforms over satellite. As conclusion, we can say that with the different Demos and PoCs developed in the iNGENIOUS project, the following objectives and challenges were achieved and properly addressed according to the project’s ambition: • new Cellular IoT solutions were developed, using innovative 5G systems at both New Radio and 5G Core for enabling the enhanced Mobile Broadband and Ultra-reliable and Low-latency Communications capabilities that the tactile use cases are demanding. • AI/ML technologies were exploited across all iNGENIOUS architectural layers, from neuromorphic sensor level to smarter applications passing through network automation enablers. • a semantic and syntactic interoperability between the heterogeneous Machine-to-Machine platforms as well as DLT solutions currently used in the supply chain sector, was enabled and tested. Finally, the security aspects of IoT systems were enhanced, by developing IoT devices based on new hardware paradigms that enable strong isolation by default. © 2020-2023 iNGENIOUS Page 122 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) References [1] iNGENIOUS Consortium, "D6.1 Initial Planning for Testbeds", 2021. [2] iNGENIOUS Consortium, ""D6.2 PoC development, platform and test-bed integration"," 2023. [3] iNGENIOUS Consortium, "D3.3 Secure, private and more efficient HW solutions for IoT devices", 2022. [4] HERE Technologies, "Start building customizable maps and spatial intelligence content using your data," 2023. [Online]. Available: https://www.here.com/get-started/start-building. [5] G. E. P. Box and G. M. Jenkins, Time Series Analysis: Forecasting and Control, San Franciasco: Holden-Day, 1976. [6] J. Perktold, S. Seabold and T. Jonatan, "Statsmodels User Guide: SARIMAX," 02 November 2022. [Online]. Available: https://www.statsmodels.org/stable/generated/statsmodels.tsa.statespa ce.sarimax.SARIMAX.html. [7] T. Smith, "API Reference: pmdarima.arima.auto_arima," 2022. [Online]. Available: https://alkalineml.com/pmdarima/modules/generated/pmdarima.arima.auto_arima.ht ml. [8] L. Breiman, "Random Forests. Machine Learning," pp. 5-32. [9] A. Ronacher, "Flask: web development, one drop at a time," 2022. [Online]. Available: https://flask.palletsprojects.com/en/2.2.x/. [10] OpenJS Foundation, "Node-Red: Low-code programming for eventdriven applications," [Online]. Available: https://nodered.org/. [11] iNGENIOUS Consortium, "D2.1 - Use cases, KPIs & requirements", 2021. [12] iNGENIOUS Consortium, "D3.2 Proposals for next generation of connected IoT modules," 2022. [13] 5G-eve, "5Probe GitHub repository," [Online]. https://github.com/5GEVE/5Probe. [Accessed 2023]. Available: [14] R. Curnow, "Chrony official web page," 12 2021. [Online]. Available: https://chrony.tuxfamily.org/index.html. [Accessed 2023]. [15] iNGENIOUS Consortium, "D6.3 Final Evaluation and validation", 2023. [16] "Tradelens platform," [Online]. Available: https://platformsandbox.tradelens.com/documentation/swagger/?urls.primaryName=Ev ent%20Publish%20API. [Accessed 2023]. [17] iNGENIOUS Consortium, ""D5.3 Final iNGENIOUS data management platform"," 2023. © 2020-2023 iNGENIOUS Page 123 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex I: Factory UC - Automated Robots with Heterogeneous Networks Below information about Factory UC Setup and execution and validation and results. Setup and Execution Part I The Factory UC was tested with different AGV and operation modes in each one, using the 5G network for different purposes. The deployments used for the use case implementation are shown below: Tribot AGV This AGV (see Figure 79) has one Fivecomm modem which is connected to the 5G-LAN and it has one RPI with can bus via ethernet. This RPI receives the data which are been sent by a gamepad. It can see in the next architecture. Figure 76: Tribot architecture The information is sent from the gamepad to the RPI thanks to 5G-LAN and the information from the AGV goes from the AGV to the laptop (192.168.34.56). This information are the internal variables of the Tribot such as linear speed, rotation speed, level battery, errors states and others. Sender Receiver Data Gamepad Tribot Motion actions Tribot Laptop Variables from AGV Table 29. © 2020-2023 iNGENIOUS Information flows for Tribot AGV Page 124 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) EasyBot AGV This AGV (see Figure 80) is moved automatically thanks a black magnetic band on the floor of our facility. It gives to the laptop the information the temperature and humidity of the environment. In this case, we have the modem connected to the 5glan and it has connected one RPI to send the information, which is collected by the sensor DHT11 with Arduino. The architecture is shown in figure bellow: Figure 77: EasyBot architecture Sender Receiver Data Arduino Laptop Temp. & Humd. Table 30. Information flows for EasyBot AGV Ebot This AGV (see Figure 81), has one Fivecomm modem which is connected to the 5GLAN and it has one rpi with can bus via ethernet. This rpi receives the data which are been sent by a laptop, which has a script to generate the data that the AGV needs it. It can see in the next architecture. It also has connected a depth camera, d435i specifically. This camera sends the information by the 5GLAN. © 2020-2023 iNGENIOUS Page 125 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 78: Ebot architecture Sender Receiver Data Laptop Ebot Motion actions D435i Laptop Camera frames Table 31. Information flows for Ebot AGV Equipment The main characteristics of these AGVs are detailed in Table 32. AGV Specifitations Tribot • Towing capacity: 3200 N • Maximum payload: 5000 Kg • Dimensions (LxWxH): 1221 x 695 x 762 mm • Movement: Unidirectional • Speed range: From 0.035 to 2 m/s • Battery: Li-lon 24V 120Ah Figure 79: Tribot AGV Easybot Figure 80: EasyBot AGV Ebot Figure 81: Table 32. © 2020-2023 iNGENIOUS Ebot AGV • Towing capacity: 600 N • Maximum payload: 1200 Kg • Dimensions (LxWxH): 1700 x 520 x 370 mm • Movement: Unidirectional • Speed range: From 0.01 to 1.2 m/s • Battery: Li-lon 24V 40Ah • Maximum payload: 350 Kg • Dimensions (LxWxH): 1052 x 660 x 352 mm • Movement: Omnidirectional • Speed range: From 0.05 to 2.2 m/s • Battery: Li-lon 48V 40Ah AGVs employed demonstration in Burgos. Page 126 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The following table shows the main parameters and configurations of the 5G network used. Component Model Antenna AAFGHC Features • Radio Unit AZNA Baseband Unit Airscale System Module 5G core Cumucore 5G modem Fivecomm Table 33. • • Work on n40 band (2370-2390 MHz) 20 MHz of bandwith 4T4R Rel. 16 Rel 17 inc. network slicing and UPF with 5GLAN, TSN functions • Works in both 5G SA and 5G NSA • Bands supported: n41, n77, n78, n79, n1, n3, n5, n7, n8, n20, n28, n38, n40 • Ethernet connection • Up to 2.1 Gbps (DL)/ 900 Mbps (UL) in SA Main parameters and configuration of 5G network The figure below shows the gNB, deploy at UBU premises, was used to perform the use case trial. Figure 82: 5G base station Other devices Other devices were used during the demo for communication or sensing purposes. These devices are listed on the following table. © 2020-2023 iNGENIOUS Page 127 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Device Specifications Raspberry Pi 3 Model B Rev 1.2 with can bus hat (connected to Tribot) • • • • • • • • • • • • Raspberry Pi 4 Model B with can bus hat (connected to Easybot) Raspberry Pi 4 Model B with can bus hat (connected to Ebot) SOC Type: Broadcom BCM2837 Core Type: Cortex 453 64 bit No of cores : 4 CPU Clock: 1,2 GHz USB 4xUSB2.0. Ethernet: 10/100M. SPI: YES. I2C: YES. 2.4GHz 802.11n. 4.1 BLE. Oscilator: 160000. Bitrate: 10000000 Mbits/s • SOC Type: Broadcom BCM2711. • Core Type: Cortex-A72 (ARM v8) 64 bit. • No of cores: 4. • CPU Clock: 1,5 GHz. • USB: 2xUSB2.0 + 2xUSB3.0 + USB-C OTG. • Ethernet Gigabit. • SPI: YES. • I2C: YES. • Wi-Fi: 2.4 GHz and 5GHz 8002.11. • Bluetooth 5.0. • Oscilator: 120000. • Bitrate: 250000 Mbits/s. • 1 CAN port. • SOC Type: Broadcom BCM2711. • Core Type: Cortex-A72 (ARM v8) 64 bit. • No of cores: 4. • CPU Clock: 1,5 GHz. • USB: 2xUSB2.0 + 2xUSB3.0 + USB-C OTG. • Ethernet: Gigabit. • SPI: YES. • Wi-Fi: 2.4 GHz and 5GHz 8002.11. • Bluetooth: 5.0. • Oscilator: 120000. • Bitrate: 250000 Mbits/s. • 2 CAN ports. Arduino Uno • Microcontroller ATmega38P – 8-bit AVR family. • DC Current on I/O Pins: 40 mA. • Flash Memory 32 KB. • SRAM 2 KB. • EEPROM: 1 KB. • Frequency (Clock Speed): 16 MHz. DHT11 • Operation Voltage: 3.5 to 5.5 V • Output Serial data. • Temperature Range: 0 ºC to 50 ºC • Humidity Range: 20% to 90% • Resolution Temperature and Humidity are 16 bit. • Accuracy +- 1ºC and +- 1% Table 34. © 2020-2023 iNGENIOUS Equipment for factory UC demonstration in Burgos Page 128 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Validation and Results TEST CASES VERIFICATION Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_01 Hardware and software implementation UC1_SR_08 • • • • • • E2E latency for remote control: 10-50 ms E2E latency for control/human-in -loop control: 1-5 ms Data rate per robot: 10 Mbps Data rate for IoT sensors: 0.1 Mbps E2E latency: max: 2.9 ms, min: 1.6 ms Throughput: max: 2.94 Mbps, min: 0.34 Mbps Partially Table 35. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_02 Core network integration testing UC1_SR_08 • • • • • • E2E latency for remote control: 10-50 ms E2E latency for control/human-in -loop control: 1-5 ms Data rate per robot: 10 Mbps Data rate for IoT sensors: 0.1 Mbps E2E latency: max: 3.1 ms, min: 1.6 ms Throughput: max: 2.45 Mbps, min: 0.33 Mbps Partially Table 36. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_02 verification UC1_TC_03 Gateway test UC1_SR_08 Successful data transmission with different RAN standards Successful integration among Flexible PHY/MAC and 5G core using UERANSIM Passed Table 37. © 2020-2023 iNGENIOUS UC1_TC_01 verification UC1_TC_03 verification Page 129 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_04 Onboard industrial IoT network slice templates and NF descriptors UC1_SR_06 The onboarded network slice templates and related descriptors are successfully maintained by the cross-layer MANO to create new vertical services and network slices instances. The network slice templates (NSTs) have been successfully onboarded into the NSMF catalogue and are visible from the NSMF web GUI. Two NSTs describing a video streaming and device-todevice communication services have been onboarded. This test case has been validated first in the NXW lab, for the mid-term review demo in UPV testbed, and finally in the TUD testbed. The test case is fully achieved. Passed Table 38. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_05 Automated deployment of industrial IoT network slice instance UC1_SR_03, UC1_SR_07, UC1_SR_08 A new network slice instance is created, all the related network and computing resources have been allocated and the 5G Core NFs are up and running and ready to be configured. Moreover, the crosslayer MANO maintains the information related to the network slices instance and the NFs information related. Based on the outcome of UC1_TC_04, the automated deployment of the industrial IoT network slice instance has been completed. This test case has been validated first in the NXW lab, then for the midterm review demo in the UPV testbed, and finally into the TUD testbed. In the last case, the automated end-to-end slice deployment includes also resource management on the RAN segment, assigning the correct amount of radio resources interacting with the flexible PHY-MAC control APIs. This test case can be considered passed. Passed Table 39. Test Case Id Test case description System requirements covered Expected result Actual result © 2020-2023 iNGENIOUS UC1_TC_04 verification UC1_TC_05 verification UC1_TC_06 Automated termination of industrial IoT network slice instance UC1_SR_03, UC1_SR_07, UC1_SR_08 The network slice instance is terminated, all the related network and computing resources have been de-allocated and the 5G Core virtualized NFs are terminated and the related virtual resources freed. Moreover, the cross-layer MANO still maintains the information of the network slice instance terminated. Based on the outcome of UC1_TC_05, the automated termination of industrial IoT network slice instance has been completed. As for Page 130 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) previous tests, this one has been validated initially in the NXW lab, then demonstrated in the mid-term review in the UPV testbed, and finally executed in the TUD testbed. The resources allocated in the 5GC and in flexible RAN are freed as expected upon termination of the end-to-end network slice through the NSMF APIs. Moreover, the NSMF keeps track of the terminated end-to-end network slice. Therefore, this test case can be considered passed. Passed/Failed Passed Table 40. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_07 Manual scaling of an industrial IoT network slice instance UC1_SR_07 The network slice instance is modified, all the related network and the 5G Core virtualized NFs are modified (or new ones are created) and the related virtual resources as well Based on the outcome of UC1_TC_05, the manual scaling of the industrial IoT network slice instance has been validated initially on the NXW lab and then on the TUD testbed. As result, downlink or uplink throughput of the end-to-end network slice (according to the network slice data model used in the NSMF) can be automatically scaled, resulting in a re-configuration of the 5GC subnet-slice (according to the Cumucore 5GC APIs), combined with a reconfiguration of the flexible RAN resource allocation to meet the application requirements. Passed Table 41. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed Test case description © 2020-2023 iNGENIOUS UC1_TC_07 verification UC1_TC_08 Automatic slice configuration through 5GC NSM UC1_SR_07 The network slice is correctly configured by the NSM NF as requested. Based on the outcome of UC1_TC_07, the process of slice configuration through the Cumucore 5GC APIs has been automated within the NSMF and 5GC NSSMF, and validated initially on the NXW lab and then in the TUD testbed. For this reason, this test case is being considered passed. Passed Table 42. Test Case Id UC1_TC_06 verification UC1_TC_08 verification UC1_TC_09 Automated deployment of industrial IoT network slice instance and of an edge robot control application as part of network slice instance Page 131 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Expected result Actual result Passed/Failed UC1_SR_04 A new network slice instance is created, all the related network and computing resources have been allocated and the 5G Core NFs are up and running and ready to be configured. As part of network slice instance, a robot control application is deployed at the edge and the related computing resources have been correctly allocated. Moreover, the cross-layer MANO maintains the information related to the network slices instance and the related NFs information. The automated deployment of an industrial IoT network slice instance is already being validated in the UC1_TC_05 test case. However, in the TUD testbed the edge application is considered already deployed. The edge application consists of a video streaming application sending data relying on the end-to-end network slice deployed. However, in the NXW lab, the automated deployment of the video streaming edge application integrated with an end-to-end network slice has been validated, through a dedicated additional NSSMF for the management of virtualized edge functions and applications. For this reason, this test case can be considered passed. Passed Table 43. Test Case Id Test case description System requirements covered Expected result Actual Result Passed/Failed UC1_TC_10 Automated termination of industrial IoT network slice instance and of edge robot control application as part of network slice instance UC1_SR_04 The network slice instance is terminated, all the related network and computing resources have been de-allocated and the 5G Core virtualized NFs are terminated and the related virtual resources freed. As part of network slice instance, also the computing resources at the edge are de-allocated. Moreover, the cross-layer MANO still maintains the information of the network slice instance terminated. The automated termination of an industrial IoT network slice instance is already being validated in the UC1_TC_06 test case. In the NXW lab, the automated termination of the end-to-end network slice, integrated with a video streaming edge application deployed for UC1_TC_10 has been validated. For this reason, this test case can be considered passed. Passed Table 44. Test Case Id Test case description System requirements covered Expected result Actual Result © 2020-2023 iNGENIOUS UC1_TC_09 verification UC1_TC_10 verification UC1_TC_11 Subscription to either Network Data Analytics Function (NWDAF) or Network Exposure Function (NEF) for collecting monitoring and analytics information related to the network slices, NFs and UEs. UC1_SR_03, UC1_SR_05, UC1_SR_07, UC1_SR_08 The cross-layer MANO is able to receive the notifications it is subscribed to. The automated termination of an industrial IoT network slice instance is already being validated in the UC1_TC_06 test case. In the NXW lab, the automated termination of the end-to-end network Page 132 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) slice, integrated with a video streaming edge application deployed for UC1_TC_10 has been validated. For this reason, this test case can be considered passed. Passed/Failed Passed Table 45. Test Case Id Test case description System requirements covered Expected result Actual Result Passed/Failed UC1_TC_12 Deletion of either Network Data Analytics Function (NWDAF) or Network Exposure Function (NEF) active subscription. UC1_SR_03, UC1_SR_05, UC1_SR_07, UC1_SR_08 The cross-layer MANO is no longer able to receive the notifications related to the just removed subscription As already mentioned in the previous test case validation, there is no actual subscription to either NWDAF or NEF. However, the monitoring platform exposes dedicated APIs to control the data collection, and is integrated with the NSMF that can activate and deactivate the monitoring jobs. This test case can be considered passed, and executed in both NXW lab and TUD tested. Passed Table 46. Test Case Id Test case description System requirements covered Expected result Actual Result Passed/Failed Test case description © 2020-2023 iNGENIOUS UC1_TC_12 verification UC1_TC_13 Automated slice scaling triggered by AI\ML platform using NWDAF data. UC1_SR_07, UC1_SR_11 The cross-layer MANO correctly and automatically scales with the support of the AI\ML platform the network slice instance. This test case has been executed and validated in two flavours: • UC1_TC_13a (NXW lab), the AI/ML engine/agent implements a decision logic for scaling UPF network functions as a whole upon UPF load and congestion prediction provided by the ML model, thus triggering towards the NSMF a UPF scaling action. This is processed and translated by the NSMF into the creation of new UPFs instances for the UEs to connect to, and distributing the data plane traffic. • UC1_TC_13b (TUD testbed): the AI/ML engine/agent implements a decision logic for scaling generically the entire end-to-end network upon slice congestion prediction provided by the ML model, thus triggering towards the NSMF a network slice scaling action. This is processed and translated by the NSMF into consistent 5GC subnet slice re-configuration (increase of slice uplink or downlink throughput) and flexible RAN resource allocation (increase of PHY-MAC radio resource allocation). Passed Table 47. Test Case Id UC1_TC_11 verification UC1_TC_13 verification UC1_TC_14 Robot interface connectivity Page 133 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Expected result Actual result Passed/Failed UC1_SR_01 The devices in the robot can utilize standard Ethernet RJ45 ports to connect to 5G communication module and connect to 5G network. The AGVs and the camera were controlled through a Raspberry Pi, which was responsible to process the control messages from the controller application to the remote device. The Raspberry Pi was connected through Ethernet RJ45 to the 5CMM 5G modem, providing a successful connection with others UEs and 5G network. On the other hand, the AGVs were successfully connected to the Raspberry Pi through the CAN bus. Several KPIs (present in Table 5) were taken to measure the quality of the connection between these devices using the 5G private network. Passed Table 48. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC1_TC_14 verification UC1_TC_15 Test of API for application development UC1_SR_10 Simple application implemented using the available devices and the connectivity among them should be demonstrated Emulated applications have their data transmission configured via the Tactile API, which abstracts the network resources. The API was successfully used to integrate the Flexible PHY/MAC in a 5G compliant network configured by the MANO. Passed Table 49. UC1_TC_15 verification KPIs This section explains the procedures taken in order to validate the performance of the network and measure the KPIs. The coverage of the 5G signal was measured with the scanner R&S® TSME6 from UPV, which can analyse the environment and decode mobile communication signals, obtaining the main information of the gNB, such as RSRP (Reference Signal Receive Power), RSRQ (Reference Signal Receive Quality), SINR (Signal Interference Noise Ratio), PCI (Physical Cell Identifier), SCS (Sub-Carrier Spacing), among others. The scanner was used around the entire trial area, verifying the proper configuration and functionality of the installed gNB (transmitting in band n40, 2370-2390MHz). The walk test was performed around the industrial unit where the AGVs were circulating. The signal power received by the scanner (RSRP) was between -50 dBm and -75 dBm (Figure 83), thus the UEs could receive the 5G signal without a problem. SINR and RSRQ values measured were adequate for a successful 5G transmission. Also, we could verify the proper frequency transmission, PCI (54), and the SCS (30 kHz), which had been configured previously in the gNB. © 2020-2023 iNGENIOUS Page 134 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 5G SA n4 Figure 83: 1RSRP values obtained through the walk test around the industrial unit. Once the coverage test was performed successfully and the received signal was proper to operate the AGV, the different devices and robots were connected to the 5G SA network through 5CMM modems. While the operators control the AGVs and the stream of data from cameras and robots is transmitted through the network, some KPIs such as mobility (AGV´s speed), data rate (from the AGV to the operator and vice versa), latency (Round-Trip-Time, RTT) and, connection density for robots, and reliability for remote control. The speed of the AGV is obtained from the internal logs of the robot. At the same time, the connection density for the robots was simulated by connecting several modems (3 modems connected to AGVs and another one connected to the PCs which control the AGV) to the network at the same time and simulating the same traffic, in order to analyse the performance of the network and the evolution of the KPIs. To perform the data rate and latency measurement, 5Probe [13] tool has been used. This tool has been developed by the consortium of the 5G-EVE project, which permits measuring the uplink and downlink throughput, RTT and OneWay-Delay (OWD) of the network. The tool was installed on the Raspberry Pi connected to the AGV. Also, InfluxDB was used to store the parameters discussed above by the tool, which is installed on an external virtual machine on a laptop. This virtual machine is time-synchronized through NTP (Network Time Protocol) protocol using Chrony tool [14]. While the 5Probe tool was executed, several iperf3 and ICMP tests were performed, two scenarios were tested: i) Communication between two different UEs of the network (through 5GLAN technology) Figure 84 and, ii) Communication between a UE and a laptop connected directly to the 5G core Figure 85. The first scenario would emulate the communication machine-to-machine (M2M) in an industrial environment were “things” have to exchange data between them using the 5G radio interface. The second scenario emulates the communication of a machine connected with 5G to a resource outside the 5G network. The most remarkable difference between these two scenarios is that, in a 5G network, the © 2020-2023 iNGENIOUS Page 135 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) uplink throughput (UE to 5G network) is usually the most limiting factor in the communication due to the power of the signal the UEs transmit. In the first scenario, this “UE to 5G network” traffic is always present in the communication acting as the bottleneck. Figure 84: Figure 85: End-to-end architecture iperf3 test UE to UE. End-to-end architecture iperf3 test UE to core. Grafana has been used to analyse the data stored in the database. The following Figure represents the full architecture to measure the KPIs using the 5Probe tool. The results of these tests were shown in Section 2.3 of the main document. © 2020-2023 iNGENIOUS Page 136 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) AGV 5G Modem Raspberry Pi (control) 5G connectivity 5G SA Network NTP sync (port 123) POST KPI data (port 0 6) AirScale Raspberry Pi OS Port forwarding 22 (ssh ) KPI measure Client Radio 5GCore 5G connectivity 5G Modem Visuali e data Virtual Box (VM) Ubuntu 2 . 4 Port forwarding 0 6 (in uxdb ) 123 (ntp) Figure 86: uery Server KPI storage Visuali ation End-to-end architecture used for the KPI measurement setup with 5Probe. © 2020-2023 iNGENIOUS Page 137 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex II: Transport UC - Transportation Platforms Health Monitoring Below information about Transport UC Validation and results Validation and Results TEST CASES VERIFICATION Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_01 Lifetime Operation - Battery Life Load Cycles Battery Spec UC3_SR_01 Lifetime Operation Value See description below Passed* Table 50. UC3_TC_01 verification 12 years+ Lifetime Operation @ -20 to +60°C environmental conditions with 5 broadcast per day is theoretically possible. 24-30 years of operation is not possible, but essential for the business case to avoid sensor replacement. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_02 Minimum Communication Content and Frequency Requirements UC3_SR_02 Communication Frequency and Fault Latency for Bearing & Critical Flat Spot detection. See description below Passed* Table 51. UC3_TC_02 verification Micro-Edge Sensor to Gateway communication @5x per day is possible for 12 years. Gateway GSM communication @5x per day is only possible without extended periods of snow and ice coverage on solar harvester. Changing from GSM communication from each gateway to LORA communication between gateways and GSM2Cloud communication form the energy heathiest node reduces weather-based communication outage by a factor of 10. © 2020-2023 iNGENIOUS Page 138 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_03 Connectivity Coverage UC3_SR_03 Communication Frequency and Fault Latency for Bearing & Critical Flat Spot detection. See description below Passed Table 52. UC3_TC_03 verification GSM connectivity coverage is generally acceptable for 5x daily status reporting. Regional communication outage is rare and not prolonged. Extended communication outage is more likely occur in stational situations due to infrastructure interference. This type of interference can be nearly completely avoided via Lora-Wan Gateway2Gateway plus healthiest/best connectivity node GSM2Cloud communication. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_04 TC3 Connectivity Coverage UC3_SR_04 Memory Requirements Reduction/Compression and Strategy for Data See description below Passed Table 53. UC3_TC_04 verification Micro-Edge Sensor meta data storage is trivial due to the small data volume required. The same applies to Gateway fusion data storage. The edge storage capability is used to bridge communication outage between Edge2Gateqway and Gateway2Cloud. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_05 Functional Safety Requirements, Connectivity Coverage UC3_SR_05 Multimodal Connectivity Opportunities See description below Passed Table 54. © 2020-2023 iNGENIOUS UC3_TC_05 verification Page 139 of 220 Connectivity Frequency, iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Multimodal connectivity results in significant performance (online availability) improvements. Changing Micro Edge Sensor communication from BLE_SensorEdge2Gateway to BLE_SensorEdge2 SensorEdge2Gateway allows to lower communication power, while adding Lora-Wan communication between Gateways allows reduced gateway power consumption and improved online availability as described in UC3_TC_03. Test Case Id Test case description System requirements covered UC3_TC_06 Functional Safety Requirements, Customer Requirements UC3_SR_06 Expected result Monitoring Resolution Actual result See description below Passed/Failed Passed* Table 55. UC3_TC_06 verification Ideally, increasing fault/speed levels should be time-stamped with the first level of occurrence. This information can be used to determine when and which operator is likely to have caused the fault. 5 measurements per day are the minimum resolution requirement. Wake on dynamic defect energy (PiezoElectric Energy Gradient) is good indicator for fault detection. If subsequent fault intensity computations at a given speed result in higher than previously recorded value, than a new, even more intense fault event than previously recorded has occurred. While the speed is typically not known in fault-free conditions, it can be easily determined once a fault is present. What cannot be detected (or at least not with high reliability) are new faults with same or lower intensity than previous faults. Test Case Id Test case description System requirements covered UC3_TC_07 Functional Safety Requirements, Customer Requirements, Energy Resources, Application Results UC3_SR_07 Expected result Monitoring Capability Actual result See description below Passed/Failed Passed* Table 56. UC3_TC_07 verification The biggest functional challenge of commercial- vs. passenger-rail condition monitoring is the differentiation of non-critical faults and the one critical fault buried in a mass of non-critical faults and noise. After two years of continuous algorithm development, the results exceed expectations. The approach is completely different from reviewed publications, and the fault resolution is phenomenal. Fault severity levels can be reliably classified into up to 64 and possibly more severity levels for flat spots and 4 or more levels for bearing © 2020-2023 iNGENIOUS Page 140 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) defects. This far exceeded the targeted 3-5 severity levels for flat spots and the OK/NOK classification of bearing defects. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_08 Edge Classification & Edge Pre-Processing Capabilities & Results UC3_SR_08 Cloud Defect Validation Capability See description below Passed Table 57. UC3_TC_08 verification Cloud or alternatively Gateway fault validation is not really important if simple statistical approaches can be applied. This is good news, as defect validation via Cloud based SVM Engine or similar require more data intensive FeatureVectors which require higher than desired levels of communication energy resources. Since the implemented micro-edge fault classification is based on a physical-model (validated by real-world data, empirical and physical fault data, and hypothetical signal injection), it will beat any neural network-based approach. The statistical cloud validation checks for continuity and crosschecks neighbouring axles and wheels. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_09 Edge Classification & Edge Pre-Processing Capabilities & Results UC3_SR_09 Gateway Defect Validation Capability See description below Passed Table 58. UC3_TC_09 verification UC3_TC_09 is analogue to US3_TC_08. The validation of condition monitoring defects @Gateway level is at most statistical, or simply data-fusion of MicroEdge Sensor Meta values. Test Case Id Test case description System requirements covered Expected result © 2020-2023 iNGENIOUS UC3_TC_10 System Architectural Design and Communication Architecture UC3_SR_10 Confidentiality and integrity of connection via TLS Page 141 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Actual result Passed/Failed TLS has been determined to be the suitable solution for protecting confidentiality and integrity of the communication between IoT sensor and the cloud. Passed Table 59. UC3_TC_10 verification This test case is a not a functional test, but a review activity performed at the beginning of the project to assess the suitability of TLS in the context of the Transport use case. Due to its flexibility, industry-wide usage, and strong security guarantees, TLS has been found to be an excellent foundation for securing IoT communication security beyond the state of the art. Test Case Id Test case description System requirements covered UC3_TC_11 Security (Listening) UC3_SR_11 Expected result Confidentiality and integrity of connection between sensor endpoint and cloud server protected via TLS Actual result TLS v1.3 is used and integrated with remote attestation, ensuring both the security of the communication channel and strong identity and integrity of endpoint devices. Passed/Failed Passed Table 60. UC3_TC_11 verification This test case shows that the connection between cloud sensor endpoint and server is established and confidentiality and integrity of this communication channel is protected via. Test Case Id Test case description System requirements covered UC3_TC_12 Security (Flash) UC3_SR_12 Expected result Only cryptographically signed M3 operating system and applications can start on BI platform Actual result Applications and service programs (part of the operating system) are measured during started for reporting via remote attestation. Passed/Failed Passed* Table 61. UC3_TC_12 verification Measured startup before execution of applications and service programs ensures that remote attestation can report the identity and integrity of said applications and service programs. The original goal of secure startup for the entire M3 OS turned out too ambitions and could not be realized, because hardware root-of -trust support could not be implemented (as documented in Issues on execution). Hence, as an intermediate step, only a specific application scenario consisting of a set of programs is supported fore measurement and © 2020-2023 iNGENIOUS Page 142 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) remote attestation. Full support for measured startup of all software will be worked on after the end of the project. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_13 Security (Commanding) UC3_SR_13 Connection only established, if remote attestation of sensor endpoint passed; connection refused, if the sensor endpoint does not pass remote attestation Connection between cloud sensor endpoint and server is established only if remote attestation of the IoT sensor and cloud endpoint passed verification. The connection is refused, if either the sensor or cloud endpoint fail verification during remote attestation. Passed Table 62. UC3_TC_13 verification A connection between cloud sensor endpoint and server is established only if remote attestation of the IoT sensor and cloud endpoint passed verification. The connection is refused, if either the sensor or cloud endpoint fail verification during remote attestation. Both the IoT sensor and the cloud server will abort the connection attempt, if the software running on the other device is not recognized (based on a cryptographic hash fingerprint). Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_14 Data Encryption UC3_SR_14 Sensor data is encrypted and digitally signed, cloud server can decrypt and verify signature. Not pursued N/A Table 63. UC3_TC_14 verification This test case was aimed at confirming that data provided by the sensor can be encrypted offline and stored in local memory/storage of the FPGA/M3 platform for later transmission to sensor endpoint. However, the very ambitious goal of implementing a root-of-trust for the M3 platform in FPGA-based hardware could not be reached during the duration of the project. The associated risk has first been documented in deliverable D6.1 [1] and mitigations were described in D6.1 [1], D6.2 [2] and D3.3 [3]. As a result of a scaled-back software-only simulation of a root-of-trust, support for encrypting data at rest has been delayed and will be pursued after the end of iNGENIOUS. Data encryption support is not essential to demonstrate the improved security guarantees enabled by remote attestation, which has been the main goal; this limitation therefore does not impact the use case significantly. © 2020-2023 iNGENIOUS Page 143 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_15 Rail Health Requirements Functional Safety Requirements, Customer UC3_SR_15 Fault Detection Diagnostics Coverage See description below Passed Table 64. UC3_TC_15 verification Functional Safety considers the integrity of the signal measurement. Is it possible to detect a broken sensor, and what safeguards are in place to assure that critical faults can be detected reliably? A broken sensor can mean no signal or completely random signal noise. The relative white noise signal energy between adjacent axles sensors follows both expected and relative ranges. If this white noise level exhibits unexpected permanent changes in one or the other direction, then the sensor element must be broken. This can be detected at both micro-edge device and gateway or cloud level. Likewise, a communication failure with a micro-edge sensor, or gateway is detected at cloud level. Therefore, the sensor signal integrity can be assured for all critical fault modes. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_16 Explosion Safety Requirements, Customer Requirements UC3_SR_16 ATEX Compliance Gaps See description below Passed Table 65. UC3_TC_16 verification Fire/Explosion Safety is a specialty requirement for hazardous goods transport vessels. Such rail carriages typically lack electric connection, because the technical solutions are cost intensive. Therefore, all sensors and gateways must be battery and harvester powered, and any energy reserves must be physically designed not to cause uncontrolled thermal dissipation if physically damage. ATEX is an example of a standard guiding fire and explosion safety. The rail market is very segmented and governed by mostly national/regional and not international standards. ATEX compliant batteries are readily available, as are ceramic capacitors for sufficient energy reserve to make ATEX compliance achievable. Therefore, Fire/Explosion compliance is not a technically challenging compliance issue. © 2020-2023 iNGENIOUS Page 144 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result UC3_TC_17 The radio access should be able to run local application processing when user selects low latency for selected applications UC3_SR_17 The data received from the device will be processed as closer as possible to the device and returned with lower delay than processing the data in another UPF in the cloud. Actual result N/A Passed/Failed N/A Table 66. UC3_TC_17 verification Not pursued in this use case. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_18 Extended Satellite Coverage: Confidentiality of satellite backhauled sensor data. UC3_SR_18 Captured sensor data is indecipherable between Sensor Gateway and teleport IP egress point Same as expected result Passed Table 67. UC3_TC_18 verification This test was aimed at validating the confidentiality of sensor data as it transited the satellite network. Sensor data was sent between two BI endpoints over iDR’s simulated satellite network. Traces were taken at the ingress and egress points of the simulated satellite network and they confirmed the packets sensor data was encrypted correctly. Test Case Id Test case description System requirements covered Expected result UC3_TC_19 Communication Load Optimization: The platform shall be able to use the most appropriate radio technology depending on network access and communication demands. UC3_SR_19 Communication Load Optimization Actual result N/A Passed/Failed N/A Table 68. UC3_TC_19 verification Not pursued in this use case. © 2020-2023 iNGENIOUS Page 145 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_20 OTA upgradeability UC3_SR_20 After reboot in A/B configuration, the signature-checked software update is B is running; A is started if signature checks failed on B Not pursued Passed Table 69. UC3_TC_20 verification This test case aimed to validate robustness against failed or compromised software updates. Only digitally signed (i.e., authorized, correct, and not manipulated software) is started on the IoT sensor device. As considered in D6.1 [1], this test case was about and A/B software configuration, where the currently running and correctly signed software (A) is kept as a fallback in case an updated, new version (B) fails to start due an incorrect code signature. Due to the unavailability of a fully-integrated root-of-trust, this capability could not be implemented during the project. However, the measured startup capabilities of M3 that are covered by test case UC3_TC_11 ensure that only correct applications and service programs can be started using a signature check; fallback to previous version will be worked on by BI after the end of iNGENIOUS project, when the necessary root-of-trust support has been implemented. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_21 Extended Satellite Coverage: Satellite Multi-Protocol Support; Validate confidentiality of satellite backhauled sensor data UC3_SR_21 All protocols tested are shown to work over satellite Same as expected result Passed Table 70. UC3_TC_21 verification This test was created to show that multi-protocol support was possible over a satellite network. Multiple protocols were tested and verified over iDR’s simulated satellite network including; arp, tcp, udp, mqtt, sctp, http and ftp. Test Case Id Test case description System requirements covered Expected result © 2020-2023 iNGENIOUS UC3_TC_22 Extended Satellite Coverage: IP Connectivity UC3_SR_22 Sensor data is received successfully at data centre/cloud Page 146 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Actual result Passed/Failed Same as expected result Passed Table 71. UC3_TC_22 verification This test was carried out as part of the preparation for the mid-term and final demonstrations. IP connectivity was established between the edge network MEC server and hub side gateway server via the simulated satellite network. Sensor data was successfully sent and received in both directions using the simulated forward and return satellite links. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC3_TC_23 Extended Satellite Coverage: Verify uplink and downlink Satellite backhaul latency UC3_SR_21, UC3_SR_23 Perform enough tests and preparation to ensure sources of connectivity issues are known and resolved Same as expected result Passed Table 72. UC3_TC_23 verification This test was created to simulate the latency of a GEO stationary satellite using iDR’s lab testbed and verify connectivity between the sensors and cloud/data center with added latency applied. The typical latency of a GEO stationary satellite link ranges between 560-580ms depending on environmental conditions and other factors. In the lab setup the satellite delay was set to 560ms which was verified during multiple testing windows. © 2020-2023 iNGENIOUS Page 147 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex III: Port Entrance UC - Situational Understanding in Smart Logistics Scenario Below information about the Port Entrance UC Setup and execution and validation and results. Setup and execution Part I b.1) Offline Data Preparation Examples of the features used from historical data are included in Figure 87, which illustrates the relevant content in distinct datasets, and how they are used in the model development. When these are present in the data, basic data engineering methods (e.g. database queries, filtering, transformations, merge operations) are used to combine the datasets as necessary for subsequent model development. Specifically, the smaller datasets related to port operations were processed offline using mainly the Python Pandas library. Figure 87: Overview of prediction model components, required features, and source datasets. The most complex offline data preparation needed in this development was required for obtaining voyage information and timestamps from global AIS data. This involved decoding the raw AIS data transmitted globally by vessels in the National Marine Electronics Association (NMEA) format, analyzing the messages to determine voyage start and stop times and locations (classified according to ports following e.g. global UNECE UN/LOCODE definitions), and labelling data points along voyages accordingly. Due to the size of the dataset (as noted above, as a tabular dataset this would contain of order 10¹¹ rows), this is a computationally demanding task not well suited for offline batch processing. In the AWA pipeline, this processing was implemented using continuously operating cloud-based microservices (implemented in a scalable Kubernetes © 2020-2023 iNGENIOUS Page 148 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) environment), which performed the above described processing operations over streaming data and store the obtained metadata as logs for use in a dedicated machine learning operations (MLOps) pipeline performing machine learning model training and validation, as outlined in the following subsection. b.2) Model Development The monte Carlo simulation used to predict container traffic rates can be described with the following formulation for the number of containers transported by trucks out of the port during a selected time range R: 1 𝑁 𝑗 𝑗 𝑗 𝑖 𝑖 𝑖 𝑖 𝑁𝑅,𝑀𝐶 = 𝑀 ∑𝑀 𝑘=1 ∑𝑗 ∑𝑖=1 𝐼𝑅 (𝑇𝑉 + 𝛥𝑉 + 𝛥𝐺 + 𝐼𝐵 [𝑇𝑉 + 𝛥𝑉 + 𝛥𝐺 ] ⋅ 𝑆). (1) Here, 𝐼𝑅 (𝑥) and 𝐼𝐵 (𝑥) are indicator functions defined as: 𝐼𝑅 (𝑥): = 1𝑖𝑓𝑥 ∈ {𝑅𝑚𝑖𝑛 , 𝑅𝑚𝑎𝑥 },0𝑖𝑓𝑥 ∉ {𝑅𝑚𝑖𝑛 , 𝑅𝑚𝑎𝑥 }, where 𝑅𝑚𝑖𝑛 , 𝑅𝑚𝑎𝑥 are the limits of the time range for which events are simulated and 𝐼𝐵 (𝑥): = 1𝑖𝑓𝑥 ∈ 𝐵, 0𝑖𝑓𝑥 ∉ 𝐵, where 𝐵 is a set of blocked days when no events are allowed (for example, there is typically no truck traffic in the Port of Valencia on Sundays). 𝛥𝑖𝑉 and 𝛥𝑖𝐺 are i.i.d. random variables corresponding to the delay between vessel arrival and container discharge and the delay between container discharge and gate exit, respectively. The distributions of these variables are estimated empirically by fitting to observed events using a KolmogorovSmirnov metric for goodness of fit over 60 candidate distributions. The combination of the random variables 𝛥𝑖𝑉 + 𝛥𝑖𝐺 estimates the total dwell time of a container in the port. The figure below illustrates the distribution of the simulated dwell times compared to the actual observed events. Figure 88: Kernel density estimates of the empirical distributions of actual and simulated total container dwell times in the port of Valencia. 𝑗 𝑗 𝑇𝑉 is the arrival time of vessel j, where 𝑇𝑉 ≤ 𝑅𝑚𝑎𝑥 . These times are obtained using estimated time of arrival (ETA) prediction models, which are composed of separate predictions for the vessels’ current destination, the geographical © 2020-2023 iNGENIOUS Page 149 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) voyage trajectory to this destination, and the duration of the voyage along this trajectory. These component models applied various machine learning techniques trained using extensive historical vessel traffic data. Destination prediction was performed using a combination of neural network embedding, classification models, and lookup tables. Trajectory prediction was based on training a global graph model representing vessel movements around the world, allowing use of graph algorithms such as Dijkstra’s algorithm to estimate the minimum cost route between any two locations based on history. Finally, sea voyage durations were estimated based on a combination of the vessel’s current speed and regression models trained with historical voyage data to compensate for typical location-specific variations in vessel speeds. The regression model training was performed similarly as described above for cargo volume prediction. An overview of the models and steps used in vessel ETA prediction is shown in Figure 89. Figure 89: Vessel ETA prediction model pipeline 𝑆 is a random variable used to shift generated exit times falling on blocked days. This is a heuristic meant to disperse values more evenly around the blocked days instead of e.g. simply shifting the events to the next possible time. In the considered examples, a uniform distribution is used with a range of approximately one week. 𝑁𝑗 is the number of containers discharged from vessel j estimated to be leaving the port by trucks. This is a critical parameter for the simulation, which should ideally be obtained from operators or port authorities. In the final demonstration, these were estimated using dedicated ML models. Input features used in predicting the cargo exchange volumes included (in order of estimated feature importance) the estimated port call duration, vessel gross tonnage, arrival hour, vessel length, arrival weekday, vessel beam, and vessel maximum draught. 𝑀 is the Monte Carlo simulation parameter specifying how many trials are performed to obtain the cargo flow estimates. Using the above described models, Monte Carlo simulations of the gate traffic 𝑁𝑗 1 𝑗 𝑖 rates 𝑁𝑅,𝑀𝐶 are implemented as described in 𝑁𝑅,𝑀𝐶 = ∑𝑀 𝑘=1 ∑𝑗 ∑𝑖=1 𝐼𝑅 (𝑇𝑉 + 𝛥𝑉 + 𝑀 𝑗 𝛥𝑖𝐺 + 𝐼𝐵 [𝑇𝑉 + 𝛥𝑖𝑉 + 𝛥𝑖𝐺 ] ⋅ 𝑆). (1). The figure below shows weekly simulated vs. true container exit numbers over the year 2019 for a development data subset. © 2020-2023 iNGENIOUS Page 150 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 90: Simulated vs. actual weekly numbers of containers leaving port of Valencia by truck To enable automated training and updates of those machine learning models for which source data is continuously available (such as vessel ETA prediction), a machine learning operations pipeline was implemented. This allowed orchestrating the entire model training and validation process in a cloud environment using automatically ingested and labelled training data, enabling a self-learning ML system. Figure 91 illustrates the data processing flow and computational environments used in the MLOps pipeline on a high level. Figure 91: MLOps pipeline overview. c.1) Offline Data Preparation: After identifying the data sources required to approach the TTT prediction, data needed to be prepared and merged to create the final datasets to be injected as input to the ML-models. In this case, since TTT can be directly influenced by maritime and terrestrial events, the data sets exploited to feed TTT models were port calls dataset and gate access data (including gate in and gate out events). For estimating truck entry events, some data preparation work was carried out over the Gate In raw dataset. In this process, the independent variables considered for the TTT prediction from this dataset were the following: • Num_trucks: variable showing the number of trucks sampled for the given time and date. • WeekDay: variable indicating the day of the week, from 0 (Monday) to 6 (Sunday), for the new sample • Hour: the hour of the day (1-24) in which the sample was taken To get a dataset with the number of gate-in events in regular time slots a resample of the “dataTruckEntryGates” dataset was performed. In addition to the existing rows, two extra variables “Hour” and “WeekDay” were also included. The dataset shown in Figure 92 was used as an input for the SARIMA model. © 2020-2023 iNGENIOUS Page 151 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 92: Gate-in dataset resampled For estimating TTT, the preparation of the port calls dataset focused on quantifying the cargo volume that each vessel could load and discharge. Since cargo information is not available in our port call historical data, the type of vessel is identified as the most relevant factor to address the impact of vessel arrivals and departures at the port of Valencia. To execute this approach, Vessel port calls and Vessel master datasets were merged to link the vessel port calls to the characteristics of the vessels (gross tonnage, length, draught, TEU capacity). The column "category” is a classification of the vessel into 6 groups (from A to F) considering the size and capacity of the vessel (calculated from the rest of parameters). After merging both data sets, new variables are created to quantify the number of vessels per category. These variables were filled after performing a resampling process where the number of vessels for each category is calculated per hour, assuming the existing port calls. Figure 93: Port Call Dataset In addition, to quantify the impact of terrestrial operations in TTT estimation, the gate in and gate out dataset was also ingested and transformed. Initially, this dataset provided the timestamp of ingress, the truck plate, the timestamp of exit, the truck plate, and the container number for each combination of gate in and gate out per truck. Considering that one of the most relevant factors for quantifying TTT is the volume of trucks inside the port facilities, the information related to truck plates © 2020-2023 iNGENIOUS Page 152 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) was dropped. To calculate the exact number of trucks located inside the port facilities per hour, a resampling process was again carried out. Additionally, since the timestamp for both ingress and exit was available, truck turnaround time for past events can also be calculated. To complement this approach, the time frame (hour) and the day of the week were also included in the terrestrial dataframe. Since maritime and terrestrial dataframes provided information per hour, a final dataframe was assembled by combining both of them. Consequently, the resultant dataframe to be injected as an input for generating the TTT model was the following: Figure 94: Final TTT data frame c.2) Model Development: Gate-IN forecast model After representing the Gate-in dataset in a chart – by executing the seasonal_decompose() function from the python’s statsmodels library – it could be seen that the data has a strong seasonal component (see Figure 95). To plot this chart, the weekends were extracted from the prepared dataset. Figure 95: Gate In time series analysis In time series forecasting, autoregressive models (a.k.a ARMA models) are used to give good results. For the gate-in prediction, the SARIMA [x] (Seasonal Autoregressive Integrated Moving Averages) model was used. The model development phase consists of finding out the (p,d,q)×(P,D,Q)m parameters [x] that allow us to generate the model and train it with the dataset prepared. The term p represents the number of autoregressive, the term d refers to the number of times the differencing between lags is applied to make the time series stationary, and the q parameter indicates the number of moving average lags to be used. The parameters 𝑃, 𝐷 and 𝑄 represent the seasonal regression, © 2020-2023 iNGENIOUS Page 153 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) differencing and moving average orders, and 𝑚 represents the number of data points (rows) in each seasonal cycle. First, the time-series was analyzed to get the degrees of stationarity and seasonality in data as well as the level of autocorrelation and partial autocorrelation of the different time-series lags. To check if our time-series is stationary we run Augmented Dickey-Fuller Test using the adfuller() function of the statsmodels library. As we obtained a value of 4.582775e-16, the data seems to be stationary, and we do not need to apply differencing to make timeseries stationary (i.e. d = 0 of SARIMAX). To check the level of seasionality order (i.e. parameter m) we used the plot_acf() and plot_pacf() functions which plot the correlation of time-series by lag and the direct relationship between an observation and its lag respectively. From these charts, we verified that the time-series has a seasonality of 24 (hours) as expected. Finally, auto_arima() method of the pmdarima library [x] was run to get the rest of SARIMA parameters (i.e. p,q,P and Q). The best combination of parameters for the model is (2,0,2)(1,0,0)24. Figure 96: SARIMA hyperparameter tunning for the Gate In model Finally, as mentioned in section 4.2.1, the model was generated and fitted using the SARIMAX() class and its fit function of statsmodels library. Part II Devices - MT821 Specifications The MT821 device has the following characteristics: • • • • • • • • • Connectivity: GSM, LTE-M and NB-IoT. Dimensions : 86 mm x 60 mm x 33 mm. Weight: 286 gr. Battery backup: 3.7 V 7800mAh. Power consumption: 60uA (standby). Operating temperature: between -40ºC and 85ºC. Minimum accuracy: 10 m. GPS receiver sensitivity: -162dBm. Sensor: 3D accelerometer. © 2020-2023 iNGENIOUS Page 154 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • • • • Cold start: 30 s. Hot start: 15 s. Classification: IP65 against water. SIM slot: Micro. Dashboard - Installation and execution process Pre-requisites for the installation and the execution of the IoT tracking solution is the following: • • • • • Linux operating system like Ubuntu or some similar Debian Distribution. Python (version >= 3.8) and **pip** installed. PosgreSQL server installed pgAdmin 4 (Optional). Docker and Docker-Compose Once the prerequisites for implementation were established, the installation of a specific data base instance (called uc_5) was deployed with the following table structure: Figure 97: Port Entrance UC database structure For the installation of the database, the executable 'install_project.sh' contained in the 'script' folder of the project was used. This script checks if PostgreSQL is installed and generates the database together with the ingenious users and data. Once the data was available, it was necessary to install a series of libraries in Python with the pip tool. Pip was used together with the list of libraries written in the file requirements.txt for this purpose. For the execution of the dashboard and ‘comm_protoco’ services the developed start_projectUC5.sh script was used. The successful launch of the script was checked with the status.sh script, which should generate the following output: © 2020-2023 iNGENIOUS Page 155 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) [INFO] - APPLICATION SERVICES STATUS, IF EMPTY MAYBE NOT RUNNING dashboa+ 7022 0.0 1.6 548692 79604 ? /home/dashboard/newdashboard/code/iot-logisticsplatform/venv/bin/python3 /home/dashboard/newdashboard/code/iotlogistics-platform/venv/bin/flask run --host=0.0.0.0 dashboa+ 7023 0.0 0.5 108256 27332 ? python3 -m comm_protocol.mt82x dashboa+ 7042 6.1 1.7 978288 86384 ? /home/dashboard/newdashboard/code/iot-logisticsplatform/venv/bin/python3 /home/dashboard/newdashboard/code/iotlogistics-platform/venv/bin/flask run --host=0.0.0. On the other hand, the GAD service was launched via a Docker container using the following commands inside of GAD directory: docker build -t gad . docker run -d --env-file ./GAD.list.env --name gad_container --network host v /home/dashboard/gad:/gad gad All the different parameters such as addresses, ports, folders and credentials were loaded as environment variables. These environment were declared in a file called ‘.env’ and this file was used by all necessary scripts such as ‘install_project.sh’ and ‘start_projectUC5.sh’ . The project was deployed via Docker-compose, through the command ' docker-compose up -d '. This command was launched from the terminal while being in the project folder inside './test_code/dc-project'. Once launched, the deployment was shown in Figure 101. Figure 98: © 2020-2023 iNGENIOUS IoT tracking service deployment infrastructure. Page 156 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Validation and Results ADDITIONAL TEST CASES Regarding the present use case, in section 7.2 of Deliverable D6.1 [1] a total of 12 test cases were defined. Apart from these test cases, in the course of the development of the use case, it was detected the need to create nine additional test cases with the aim to maximise the coverage of the validation of the implemented solutions. In this section, these test cases are defined and described respecting the format established in the Deliverable D6.1 [1] (see Table 73-Table 80). Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? Test Steps © 2020-2023 iNGENIOUS UC5_TC_13 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Verification of availability and correctness of time event information in historical datasets Historical datasets are available on vessel, container, and truck traffic in the ports Data quality test None Local processing environment using Python libraries, e.g. Pandas, Numpy. Historical data sets from text files (e.g. CSV), databases or similar Report quantifying availability of timestamps in input data sets, evaluation of timestamp validity Datasets about: • History of port calls at the port • History of cargo flows at the port • History of trucks' entry/exit events • History of meteorological data • AIS data • History of vessels that arrived at the port and their characteristics UC5_SR_17 Data Source Sufficiency, Data Quality Yes: FV and Port of Livorno FV and AWAKE 1. 2. 3. Check availability of timestamps for events. Check formal validity of timestamps. Check timestamps for anomalies and outliers (e.g. clearly incorrect times or event durations). Page 157 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 4. Risks Mitigation Expected result If possible cross-reference event times between related datasets (e.g. port calls and AIS data). Timestamps are missing or incorrect. Revise datasets, find alternative references for event data. Correct timestamps are available for majority (e.g. over 95 %) of events. Table 73. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_TC_14 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Verification of availability and correctness of resource ID information in historical datasets. Historical datasets are available on vessel, container, and truck traffic in the ports. Data quality test None Local processing environment using Python libraries, e.g. Pandas, Numpy. Historical data sets from text files (e.g. CSV), databases or similar Report quantifying availability of timestamps in input data sets, evaluation of timestamp validity Datasets about: • History of port calls at the port • History of cargo flows at the port • History of trucks' entry/exit events • History of meteorological data • AIS data • History of vessels that arrived at the port and their characteristics UC5_SR_18 Data Source Sufficiency, Data Quality Yes: FV and Port of Livorno FV and AWAKE 1. Test Steps Risks Mitigation © 2020-2023 iNGENIOUS UC5_TC_13 description 2. 3. Check availability of resource IDs (e.g. vessel IMO or MMSI numbers, container and truck IDs (possibly anonymized). Check formal validity of IDs. If possible cross-reference IDs between related datasets (e.g. port calls and AIS data). IDs are missing or incorrect. Revise datasets, find alternative references for identifying and matching resources between datasets. Page 158 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Expected result Correct IDs are available for majority (e.g. over 95 %) of events and resources. Table 74. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_TC_15 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Verification of vessel estimated time of arrival (ETA) prediction model performance. Historical datasets are available on vessel traffic in the ports, prediction models have been trained. Statistical error analysis. None Local processing environment using Python libraries, e.g. Pandas, Numpy, XGBoost, Scikit-klearn. ETA prediction model, historical dataset containing necessary input features for prediction (model-dependent) and actual times of arrival to target areas. Statistical analysis of prediction errors, e.g. mean absolute prediction error (MAE) and standard deviation over remaining time to arrival. Datasets about: • History of port calls at the port • AIS data • History of vessels that arrived at the port and their characteristics UC5_SR_20 Time Prediction Accuracy No AWAKE 1. Test Steps 2. 3. 4. Risks Mitigation Expected result Extract subset of historical data not used in prediction model training (test data). Find actual times of arrival to the target prediction areas (analysis of historical AIS data). Inference of predicted ETAs using test data subset. Statistical analysis of error statistics for obtained predictions. Prediction accuracy does not meet expected criteria. Collection of more or better training data, selection of new model features or model architectures, model hyperparameter optimization. Prediction results meet set criteria (e.g. less than 10 % MAE relative to remaining time to arrival). Table 75. © 2020-2023 iNGENIOUS UC5_TC_13 description UC5_TC_15 description Page 159 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_TC_16 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Web application functionality for visualizing analytics. Data integrations, models, backend services, and user interfaces have been developed. Usability testing. None Web application accessed by users. Web service application providing graphic visualization of truck turnaround analytics. User feedback on usability of the application. N/A UC5_SR_08 N/A Yes, ports of Valencia and Livorno. AWAKE, FV, CNIT. 1. Test Steps Test users are provided access and instruction for using web application. Feedback is collected from users on application usability. 2. Risks N/A Mitigation N/A Expected result Users either confirm usability of application or provide feedback on necessary improvements. Table 76. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test © 2020-2023 iNGENIOUS UC5_TC_16 description UC5_TC_17 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Web application alert functionality on truck traffic levels. Data integrations, models, backend services, and user interfaces have been developed. Automation testing Page 160 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? None Web application front- and backend services. Configuration of alert and notification conditions. Verification that system produces alerts and notifications as expected. N/A UC5_SR_09 N/A No AWAKE 1. Test Steps Test automation scripts are configured to trigger necessary alerts and notifications. Automation tests verify that required alerts and notifications are shown in the web application. 2. Risks N/A Mitigation N/A Expected result Alerts and notifications are produced according to specifications Table 77. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test © 2020-2023 iNGENIOUS UC5_TC_17 description UC5_TC_18 AWAKE Situational Understanding and Predictive Models in Smart Logistics Scenarios Web application authentication functionality. Data integrations, models, backend services, and user interfaces have been developed. Automation testing None Web application front- and backend services. Test user logs in to system. Verification that log in procedure operates correctly. N/A Page 161 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_SR_24 N/A No AWAKE 1. Test Steps Test automation scripts are configured to log in to the web application using correct and incorrect credentials. Automation tests verify that the authentication procedure works correctly. 2. Risks N/A Mitigation N/A Expected result Users with correct credentials can log in, others cannot. Table 78. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? © 2020-2023 iNGENIOUS UC5_TC_18 description UC5_TC_19 CNIT Situational Understanding and Predictive Models in Smart Logistics Scenarios Testing the functioning of the communication interface between the DVL and the Tuscan Port Community System (TPCS) and between DVL and the M2M Platforms. A DVL connecting all data sources is up and running. This is mainly a software test to check the information retrieving from the M2M platform and TPCS by means of DVL. None Tools such as Postman, Soap UI or similar. HTTP REST request with the necessary parameters. Data coming from the sources being queried. Trucks/Vessels arrival/departure data, Meteorological data, AIS data. UC5_SR_21 and UC5_SR_22 Data Availability, Data Source Sufficiency, Data Quality Yes, Port of Livorno. CNIT Page 162 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 1. Test Steps Risks Mitigation Expected result 2. Trucks/Vessels arrival/departure data, Meteorological data, AIS data are sent to a local server at the laboratory; Through DVL which uses specific APIs, it will be possible to read the information. Impossibility to reach the information sources. Periodical check of the connection between DVL and data sources. All data provided by the sensor are recovered by means of DVL. Table 79. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_TC_20 CNIT Situational Understanding and Predictive Models in Smart Logistics Scenarios Testing the functioning of the communication interface between the AI-based Platform and the DVL. A DVL connecting all data sources is up and running. This is mainly a software test to check the connection between the AI-based platform and DVL.. None Tools such as Postman, Soap UI or similar. HTTP REST request with the necessary parameters. Data coming from the sources being queried. Trucks/Vessels arrival/departure data, Meteorological data, AIS data. UC5_SR_23 Data Availability, Data Source Sufficiency, Data Quality Yes, Port of Livorno. CNIT 1. Test Steps Risks Mitigation Expected result 2. Trucks/Vessels arrival/departure data, Meteorological data, AIS data are sent to a local server at the laboratory; Through DVL which uses specific APIs, AI-based platform can retrieve the information to perform its operations (predictions made by the models In production). Impossibility to establish a connection with the DVL. Periodical check of the connection between DVL and AI-based platform. All necessary data for AI-based platform are obtained by means of DVL. Table 80. © 2020-2023 iNGENIOUS UC5_TC_19 description UC5_TC_20 description Page 163 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? UC5_TC_21 UPV Situational Understanding and Predictive Models in Smart Logistics Scenarios Testing the dashboard visualisation with real time and historical data in the Valencia Port. The dashboard and tracker devices are fully working. Historical data is available. Software (dashboard) and hardware (tracker device) tests. None Web application - front and backend services. Tracker dataframes with geoposition and speed. Data visualisation on the Dashboard. Truck geolocation and speed. UC5_SR_07, UC5_SR_08, UC5_SR_11, UC5_SR_17 Truck Turnaround Time, Idling Time, Time Prediction Accuracy, IoT Position Accuracy. Yes, Port of Valencia. UPV 1. Test Steps Risks Mitigation Expected result 2. Attach the tracker device to a truck that will enter the port of Valencia. Confirm that geofences and real time data are working. Tracker may lose connectivity. Use alternative Cellular technology (GSM). The truck position and speed is shown correctly inside the port. Table 81. UC5_TC_21 description TEST CASES VERIFICATION Test Case Id Test case description System requirements covered Expected result © 2020-2023 iNGENIOUS UC5_TC_01 Test the quality of historical datasets for the development of predictive and simulation models UC5_SR_04 Sufficient historical data is available to develop predictive models. Page 164 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Actual result Passed/Failed The purpose of this test case was to verify that sufficient historical data is available to develop predictive models according to the targets of the Use Case. The main dataset requirements identified during the work were: • History of port calls at the port. • History of cargo flows at the port. • History of trucks' entry/exit events. • AIS data. • History of vessels that arrived at the port and their characteristics. The primary criterion in estimating the sufficiency of data for modeling was whether it was possible to meet model performance KPIs using the available data. Model performance is estimated in test case UC5_TC_03; to summarize, it was found that in port of Valencia, data for port calls, cargo flows, AIS, and vessel information were sufficient to enable model development according to performance targets, but access to trucks’ entry and exit events was limited both in time coverage (data available only for 2019) and vehicle coverage (not all vehicles exiting the port were captured in the data). This causes some inaccuracy both in training models and evaluating their true accuracy. For port of Livorno, there was better coverage of truck gate events over time, but lack of reliable baseline data for truck turnaround time estimation was more significant, as less than 50 % of truck gate exits with containers could be associated with truck gate entries within a realistic turnaround time margin (8 h). From the perspective of ISO/IEC 25012 data quality characteristics and related ISO/IEC 25024 data quality properties, the relevant characteristics for historical data include accuracy, completeness, consistency, and credibility. For the purposes of the modeling performed in the project, we find that the data accuracy, consistency, and credibility are sufficient (time event data is obtained from official IoT sensor systems, port call records, or mandatory positioning systems, and no issues e.g. regarding format, semantic consistency, or detectable inaccuracy in recorded values were observed). However, as discussed above, the historical datasets available for the development are partially incomplete regarding the measurement of truck turnaround times, which should be addressed in further exploitation of the results. All in all, there were some issues with data coverage, but this did not prevent development of models according to the Use Case objectives. Passed Table 82. Test Case Id Test case description System requirements covered Expected result Actual result © 2020-2023 iNGENIOUS UC5_TC_01 verification UC5_TC_02 Integration of different data sources UC5_SR_04, UC5_SR_06 Necessary data sources are available for operating the developed predictive models The purpose of the test is to verify that necessary data sources are available for operating the developed predictive models. These include the following data types: • Port call data. • Cargo flow data. • Trucks' entry/exit events. • Meteorological data. Page 165 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Vessel’s characteristics. • AIS data. For port of Valencia, all of the listed data sources except cargo flow data are available and integrated to relevant components of the developed application (however, meteorological data is not used, as it was considered not to be essential for the use case). For port of Livorno, current port call data, cargo flow data, and truck entry/exit event data are not available through online APIs allowing integration, preventing online demonstration of the developed models. Regarding ISO/IEC 25012 and 25024 data quality characteristics and properties for online service deployment, in addition to the issues described for UC5_TC_01, data currentness including frequency and timeliness of updates is critical. For the data sources available in the online service, these are sufficient. Overall, the service output time resolution is on a time scale of hours or days at minimum, and all data sources are updated sufficiently frequently and with sufficiently up to date information to produce the target predictions. All in all, although there were some issues with data availability, this did not prevent online demonstration of the developed models according to the Use Case objectives. Passed/Failed Passed. Table 83. Test Case Id Test case description System requirements covered Expected result Actual result © 2020-2023 iNGENIOUS UC5_TC_02 verification UC5_TC_03 Evaluate prediction model accuracy analysis as part of training process UC5_SR_01, UC5_SR_02 KPIs for time prediction accuracy are met The purpose of the test is to quantify how closely the performance KPIs (primarily Time Prediction Accuracy) for the predictive analytics are met. This testing also enables quantifying the effects of insufficient historical data as considered in UC5_TC_01, as data problems affect model performance. Model accuracy testing was performed by generating test data for ML-based prediction components using nested cross-validation. In this process, cross-validation is used in model hyperparameter optimization. Here for each potential model configuration, the dataset is split e.g. to three groups of approximately equal size, and the model training is repeated three times using a different subset each time to provide an accuracy metric for the tested model configuration. Furthermore, in nested cross-validation, the entire dataset is first divided e.g. into ten subsets, and the hyperparameter optimization (using cross-validation) is repeated ten times with a different 1/10 subset reserved as test data in each round. This process enables using a maximal amount of data for model training, while producing a maximal amount of test data on model performance. The drawback is that this is computationally complex, e.g. if there are 300 combinations of model hyperparameter candidates defined for a model, its training is performed 9000 times with the above outlined procedure. In the AWA model pipeline, the component ML models were tested separately using nested cross-validation as described above, and the total pipeline was tested also by using the resulting model validation data as inputs to subsequent pipeline models. This enables evaluating how inaccuracies in intermediate models affect the outputs of later steps in the pipeline. Regarding the performance of Page 166 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) the final output of the modeling pipeline (long-term truck turnaround time predictions), the median absolute relative prediction error is 10 %, which meets the original KPI for Time Prediction Accuracy. In this metric, the comparison was done with daily maximum values because especially high turnaround times are of interest for the use case, and generally the reference turnaround times can be close to 0 hours, causing large outliers in computing relative errors. It is possible that this prediction model could be further improved by extending the truck turnaround reference data to cover all truck traffic in the port; as noted regarding UC5_TC_01, currently part of truck gate events in port of Valencia are not included in the data, and the time coverage of data available for model training was limited to 2019. When the observed rates are replaced by predictions from the preceding pipeline model components (predicted discharge volumes per port call, predicted container dwell times in port), some accuracy loss is observed due to compounding error in the predictions. Specifically, the median absolute relative prediction error when using only predicted cargo volumes and traffic rates in the turnaround time model was 13 %, i.e. the accuracy was reduced by three percentage points. For reference, if the traffic rate input is completely removed from the turnaround prediction model (i.e. the full model pipeline is not used), the predictions have significant bias, and the median absolute relative prediction error is 21 %, or 11 percentage points higher than with the full model, highlighting the benefit from the developed prediction pipeline. Similar performance analyses were performed for other prediction models in the prediction pipeline regarding Time Prediction Accuracy; the results are summarized for the KPIs in the main document. In general, developed models meet the KPIs when sufficient input data is available. Passed/Failed Passed Table 84. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_04 Performance evaluation of models deployed in production UC5_SR_01, UC5_SR_02, UC5_SR_03, UC5_SR_10 Test service output corresponds with test results using historical data and current observations. The purpose of the test is to evaluate the performance of predictions made by the models running in an online service. Main performance tests for the developed models are performed using historical datasets to provide sufficient statistical coverage for estimating the results. However, as there may be differences in the statistics of the modeled processes as seen in historical data versus current inputs, smaller subsets of data are collected from the online service running the developed models, and the current model inputs and outputs are compared to the historical data analysis results. Such testing can be used to adjust or reconfigure/retrain the models as needed in case of discrepancies between history and current processes. All in all, the service is up and running, functioning as expected. Passed Table 85. © 2020-2023 iNGENIOUS UC5_TC_03 verification UC5_TC_04 verification Page 167 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_05 Validate the reception of trucks' geoposition data in the M2M platform UC5_SR_07, UC5_SR_19 All data provided by the sensor is returned by the M2M platform in near real-time. At the port of Valencia scenario, data collected by IoT tracking devices installed on trucks for obtaining geopositioning data were not finally integrated in the M2M platform of the Port of Valencia due to the internal port strategy. To enable the storage and processing of this information, data was directly stored in UPV server where tracking information is processed and represented in a dashboard interface. For the port of Valencia Livorno scenario, the geopositioning data collected by IoT tracking devices is received and stored in Symphony M2M Symphony platform. Two different plugins were developed allowing on one hand to collect data coming from the IoT tracking device and on the other hand to expose such data to DVL. The DVL is able to aggregate such data according to a given data model and expose it through a RESTful interface so that a Web Application (developed by UPV) can use it by providing a graphical representation of the main track recorded during the on-field tests. Passed Table 86. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_06 Onboard supply chain network slice templates and NF descriptors UC5_SR_13 The onboarded network slice templates and related descriptors are successfully maintained by the cross-layer MANO to create new vertical services and network slices instances The original goal of this set of test cases was to develop an AI/ML algorithm for closed-loop slice optimization based on the combination of application/M2M (from DVL) collected and processed data with network related data (from the 5GC). However, as explained in D6.2 [2] for the related development activities, at the Port Entrance UC the cross-layer MANO does not control and manage any 5G network, and the DVL deployed on the field cannot provide insightful data for the network slice optimization purposes. For these reasons, it was agreed with the FV and CNIT to not provide such AI/ML driven network slice optimization capabilities. This test case validation can be referred to the validation of the Automated Robots with Heterogeneous Network test case whose identifier is UC1_TC_04. The onboarding of supply chain network slice templates (NSTs) and NF descriptors was demonstrated during the mid-term review. An NST was onboarded on the NSMF catalogue and the Virtual Network Functions (VNFs) along with the corresponding Network Service Descriptors (NSDs) were onboarded on the Open-Source MANO (OSM) through its GUI. N/A* *For above reasons the test was not run Table 87. © 2020-2023 iNGENIOUS UC5_TC_05 verification UC5_TC_06 verification Page 168 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_07 Automated deployment of supply chain network slice instance UC5_SR_14, UC5_SR_15 A new network slice instance is created, all the related network and computing resources have been allocated and the 5G Core NFs are up and running and ready to be configured. Please refer to actual result of UC5_TC_6. Additionally, this test case validation can be referred to the validation of the Automated Robots with Heterogeneous Network test case whose identifier is UC1_TC_05. However, as explained in the activity “VALENCIA_LIVORNO_UC5_development_09” in Deliverable D6.2 [2], the Situational Understanding in Smart Logistic Scenario makes use of a commercial mobile network which cannot be controlled and managed by the cross-layer MANO. For this reason, this test cases cannot be considered applicable. N/A Table 88. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_08 Automated termination of supply chain network slice instance UC5_SR_14, UC5_SR_15 A new network slice instance is created, all the related network and computing resources have been allocated and the 5G Core NFs are up and running and ready to be configured. Please refer to actual result of UC5_TC_6. This test case validation can be referred to the validation of the Automated Robots with Heterogeneous Network test case whose identifier is UC1_TC_06. However, as explained in the activity “VALENCIA_LIVORNO_UC5_development_09” in Deliverable D6.2 [2], the Situational Understanding in Smart Logistic Scenario makes use of a commercial mobile network which cannot be controlled and managed by the cross-layer MANO. For this reason, this test cases cannot be considered applicable. N/A Table 89. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_08 verification UC5_TC_09 Manual scaling of a running supply chain network slice instance UC5_SR_14, UC5_SR_15 The network slice instance is manually modified, all the related network and computing resources have been scaled and the 5G Core resources accordingly. Please refer to actual result of UC5_TC_6 N/A Table 90. © 2020-2023 iNGENIOUS UC5_TC_07 verification UC5_TC_09 verification Page 169 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_10 Interaction with the Data Virtualization Layer (DVL) to start collecting IoT application data from deployed M2M platforms UC5_SR_12 The cross-layer MANO is able to collect data from DVL With the reference to UC5_TC_06, the integration between the MANO platform and the DVL component was not performed. As explained in UC5_TC_06, DVL deployed on the field cannot provide insightful data for the network slice optimization purposes, so this test case cannot be considered applicable. Nevertheless, the DVL was integrated with available M2M platforms and it was validated in the DLT’s UC (Scenario 1, Scenario 2, Scenario 3 and Scenario 4) as described in Setup and Execution and Validation and Results of this deliverable. N/A Table 91. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_11 Interaction with the Data Virtualization Layer (DVL) to stop collecting IoT application data from deployed M2M platforms. UC5_SR_12 The cross-layer MANO does not collect DVL data anymore Please refer to actual result of UC5_TC_6. As explained in UC5_TC_06, DVL deployed on the field cannot provide insightful data for the network slice optimization purposes, so it cannot be considered applicable. N/A Table 92. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_11 verification UC5_TC_12 Automated slice scaling triggered by AI\ML platform using data application collected from DVL. UC5_SR_12, UC5_SR_14, UC5_SR_15, UC5_SR_16 The cross-layer MANO correctly scales the network slice instance Please refer to actual result of UC5_TC_6. The original goal of this activity was to develop an AI/ML algorithm for closed-loop slice optimization-based on the combination of application/M2M (from DVL) collected and processed data with network related data (from the 5G Core). However, as already explained the cross-layer MANO cannot control and manage any 5G network. Therefore, this test case, cannot be considered applicable. N/A Table 93. © 2020-2023 iNGENIOUS UC5_TC_10 verification UC5_TC_12 verification Page 170 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_13 The purpose of this test case was to verify that necessary time event information for model development is available, that the available time information is correct. This is closely connected with test case UC5_TC_01, where some missing data relevant for modeling was identified. For port of Valencia, it was determined during development that necessary timestamps were available for development, these were formally valid, there were not a significant number of outliers such as clearly incorrect times or durations. For port of Livorno, the truck gate exit data was missing a large percentage of events which could be associated to gate entries, causing uncertainty and significant outliers in estimating true truck turnaround times (as it is not possible to know whether the available entry and exit events for a given vehicle actually correspond to the same port visit). UC5_SR_17 Necessary data for model development is available. There were some issues with data coverage, but this did not prevent development of models according to the Use Case objectives. Passed Table 94. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_14 The purpose of this test case was to verify that resources in different datasets can be connected correctly. UC5_SR_18 Necessary IDs are available for combining different datasets such as vessel voyages, port calls, and cargo events. As expected. Passed Table 95. Test Case Id Test case description © 2020-2023 iNGENIOUS UC5_TC_13 verification UC5_TC_14 verification UC5_TC_15 This test case regards performance evaluation of the vessel schedule prediction components in the AWA model pipeline. The models were evaluated during training using a similar nested crossvalidation procedure as described for UC5_TC_03. In addition, the models were operated as online services with live input data sources and the produced predictions were logged for performance analysis. Finally, the log data collected from online predictions was used to perform a retraining of the ETA optimization model. Figure 99 shows the performance of the final ETA model in terms of absolute prediction error mean and median vs. remaining travel time to port. With the training set of 2154 voyages to port of Valencia, the final optimized model reaches a median absolute error of approximately 5 % relative to remaining travel time up to 200 h before arrival (this limit corresponds to > 30 ongoing voyages for computing the error statistics). Page 171 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) igure 99: Final vessel ETA prediction model accuracy statistics*. * Blue dash-dot curve: unoptimized predictions, orange dashed curve: ML-optimized predictions mean, red curve: ML-optimized predictions median. Gray dashed lines indicate the 5 % and 10 % relative error levels. System requirements covered Expected result Actual result Passed/Failed UC5_SR_20 Relative prediction error less than 10 %. Relative prediction error between 5-10 %. Passed Table 96. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_16 The web application visualizing the developed model outputs is made available for test users, and features such as visualization of the output data are improved according to feedback as needed. UC5_SR_08 Web application functionalities work according to requirements. As expected. Passed Table 97. Test Case Id Test case description © 2020-2023 iNGENIOUS UC5_TC_15 verification UC5_TC_16 verification UC5_TC_17 According to the service requirements, an alert functionality was included in the web service to highlight predicted scenarios where the output variables (e.g. truck turnaround time) exceed pre-set thresholds. This functionality was tested by adjusting the threshold and verifying that the alerts are visualized correctly in the web application. Page 172 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Expected result Actual result Passed/Failed UC5_SR_09 Alerts are generated in the service according to specification. As expected. Passed Table 98. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_18 The service authentication functionality was implemented using the Keycloak identity and access management solution. Tests were performed to verify that users are able to sign in with correct credentials, are not able to sign in with incorrect credentials, access without a user account is not allowed, new credentials can be created by valid users, and users can correctly log out of the service. UC5_SR_24 Service authentication functions according to specification. As expected. Passed Table 99. Test Case Id Test case description System requirements covered Expected result Actual result © 2020-2023 iNGENIOUS UC5_TC_17 verification UC5_TC_18 verification UC5_TC_19 Testing the functioning of the communication interface between the DVL and the Tuscan Port Community System (TPCS) and between DVL and the M2M Platforms UC5_SR_21 and UC5_SR_22 All data provided by the sensor are recovered by means of DVL As part of the Scenarios from the DLT’s UC, several RESTful interfaces were developed at DVL in order to allow the cross-DLT layer, based on TrustOS, to retrieve data for the maritime events from both seaports (e.g., GateIn, GateOut, VesselArrival, VesselDeparture and sealRemoved). More precisely, the DVL was integrated with the following M2M platforms and data sources: • Mobius OneM2M M2M Platform: provides meteorological data for the Port of Livorno; • PISystem M2M Platform: provides GateIn and GateOut data for the Port of Valencia; • Symphony M2M Platform: provides data coming from the IoT tracking device used in the Port of Livorno; • Eclipse OM2M M2M Platform: provides data coming from the sensors installed on iNGENIOUS Smart Container; • TPCS (Tuscan Port Community System): provides GateIn, GateOut, VesselArrival and VesselDeparture data for the Port of Livorno. For all listed data sources, several wrappers were developed to allow the communication with the DVL. The DVL extracts all data sets according to a given data model and exposes them through a set of Page 173 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) RESTful interfaces. The usage and testing of such interfaces is further described in Setup and Execution and Validation and Results of Deliverable 6.3. Passed/Failed Passed Table 100. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_20 Testing the functioning of the communication interface between the AI-based Platform and the DVL UC5_SR_23 All necessary data for AI-based platform are obtained by means of DVL Please refer to actual result of UC5_TC_6 N/A Table 101. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC5_TC_20 verification UC5_TC_21 Testing the dashboard visualisation with real time and historical data in the Valencia Port UC5_SR_07, UC5_SR_08, UC5_SR_11, UC5_SR_17 The truck position and speed is shown correctly inside the port Predictions and real TTT times can be visualized for real-time and historical data in the graphs integrated in the visualization framework developed by AWA, as specified in Issues on execution of Deliverable 6.3. On the other hand, historical IoT tracking data can be visualized in the dashboard developed by UPV and explained in Section 4.2.2 of this deliverable. Passed Table 102. © 2020-2023 iNGENIOUS UC5_TC_19 verification UC5_TC_21 verification Page 174 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex IV: AGV’s UC - Improved Drivers’ Safety with MR and Haptic Solutions Below is additional information about setup, execution, validation, and results of the AGV use case. Setup and Execution Part I The specifications about the 5G connection of each device using the mobile phone via tethering are the following: • Mobile phone model: ASUS Smartphone for Snapdragon Insiders I007D. EXP21 Smartphone. • Ethernet Connector: Tethering by USB-C Interface to Ethernet. Figure 100: 5G Network connection setup The details of each 5G modem and the relation with the AGVs and other devices are described below. Figure 101: Relation between modems and devices The different profiles 5QI had been used to give different priorities to the different devices in order to test how this affect to the use of 5G network resources. © 2020-2023 iNGENIOUS Page 175 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Part II Details of GloveSense haptic gloves are: • Motion capturing o 9-axis orientation sensor in the wrist o 4 flexion and extension sensors (thumb, index, middle, ring) o Computer-vision algorithms to enhance finger tracking in the field of view of HMDs cameras • Haptic feedback o 2 Linear Resonant Actuators (thumb, index) of vibration magnitude 1.8G o 1 Voice Coil actuator in the palm of vibration magnitude 4.3G • Force feedback o 4 passive modules (thumb, index, middle, ring) that restrict flexion o Programmable force magnitude until a maximum of 20N at the fingertips, with a resolution of 0.2N Figure 102: SenseGlove haptic gloves Validation and Results TEST CASES VERIFICATION Test Case Id Test case description System requirements covered © 2020-2023 iNGENIOUS UC2_TC_01 Perform measurements of 5G millimeter wave coverage in Segovia. UC2_SR_03, UC2_SR_11 Page 176 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Expected result Actual result Passed/Failed Low latency measurements. Low latency measurements were obtained in the Segovia tests. Passed Table 103. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC2_TC_02 AGV teleoperation via 5G millimeter wave in Segovia. UC2_SR_02, UC2_SR_04, UC2_SR_06, UC2_SR_09 Low latency. Proper AGV teleoperation The AGV had a proper teleoperation thanks to the low latency. The KPIs were measured during the final test in Valencia Port. Passed Table 104. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed Test case description System requirements covered Expected result Actual result Passed/Failed Immersive cockpit. UC2_SR_07, UC2_SR_08, UC2_SR_12 Good performance of the visualization of the AGV environment through virtual reality glasses. Good software capture of the hardware interaction of the cockpit. The visualization of the AGV environment through virtual reality glasses and the software capture of the hardware interaction of the cockpit were good enough for AGV teleoperation. Passed UC2_TC_03 verification UC2_TC_04 Fivecomm’s cockpit integration for AGV teleoperation. UC2_SR_02, UC2_SR_03, UC2_SR_04, UC2_SR_07, UC2_SR_09 Successful teleoperation with fully integrated VR glasses and haptics gloves. Haptic feedback from the AGV. Future integration with Nokia. Successful teleoperation with fully integrated VR glasses and haptics gloves (including new gloves from Senseglove). Haptic feedback from the AGV. Passed Table 106. © 2020-2023 iNGENIOUS UC2_TC_02 verification UC2_TC_03 Table 105. Test Case Id UC2_TC_01 verification UC2_TC_04 verification Page 177 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC2_TC_05 Perform measurements of 5G millimeter wave coverage in Valencia Port. UC2_SR_03, UC2_SR_11 Low latency measurements. Low latency measurements were obtained in the Valencia Port tests. Passed Table 107. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC2_TC_06 ASTI AGV teleoperation via 5G millimeter wave in Burgos. UC2_SR_02, UC2_SR_04, UC2_SR_06, UC2_SR_09 Low latency. Proper AGV teleoperation. The ASTI AGV was successfully teleoperated in the Burgos thanks to the appropriate latency conditions. Passed Table 108. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC2_TC_05 verification UC2_TC_06 verification UC2_TC_07 ASTI AGV teleoperation via 5G millimeter wave in Valencia Port. UC2_SR_02, UC2_SR_04, UC2_SR_06, UC2_SR_09 Low latency. Proper AGV teleoperation. The ASTI AGV was successfully teleoperated in Valencia Port thanks to the appropriate latency conditions. Passed Table 109. UC2_TC_07 verification KPIS Coverage Defined as the maximum distance at which the 5G network coverage continues to be good. The measured have been performed in Segovia and Valencia Port, both places where the 5G system have been deployed. End-to-end latency © 2020-2023 iNGENIOUS Page 178 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) The time it takes for a data packet to travel through the 5G network from source to destination. In this use case we have measures latencies of two types: related to the driving of the AGVs by calculating the RTT in the driving commands; and referring to the network itself by sending pings from a mobile device. These latencies have been measured in the different scenarios proposed in the test cases: AGV-A, AGV-B, AGV-C in Valencia Port and AGV-B in Burgos; also, for the 5G network in general in Valencia Port and Segovia. Figure 103: Example of RTT during Valencia Port tests. Availability The amount of time that the 5G network is fully operational in the Valencia Port network system during the test performance. During the tests carried out, the 5G network was always available, which makes this measure reach the value of 100%. Reliability The ability of the 5G network to minimize the scope and frequency of incidents, continue operations while under pressure and recover as quickly as possible. To measure this value, the number of decoded frames in the cockpit every second had been considered. The transformation to a percentage measure has been made with the number of seconds that the acceptable threshold for driving (25 FPS) is exceeded over the total duration of the test. © 2020-2023 iNGENIOUS Page 179 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 104: Example of the decoded frames during Valencia Port tests. Mobility The maximum AGV speed at which the 5G connectivity is guaranteed by providing a suitable QoS. Data rate The number of bits transmitted from one device to another or over the 5G network per second. As in the case of latency this KPI has been measured in the different scenarios proposed in the test cases: AGV-A, AGV-B, AGV-C in Valencia Port and AGV-B in Burgos. Figure 105: Example of the downlink data rate for AGV-B during Valencia Port tests. A Bluetooth coverage test have been carried out with the two pair of gloves: Neurodigital and SenseGlove. This test is represented below, where we can see the difference of performance in an indoor and outdoor scenario. It is easy to check that the Neurodigital haptic gloves have a bigger range of movement, as it still can perform far from the server they are connected to. On the other hand, the SenseGlove ones lose connection earlier. © 2020-2023 iNGENIOUS Page 180 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 106: Figure 107: Indoor bluetooth range for Neurodigital (left) and SenseGlove (right) haptic gloves Outdoor bluetooth range for Neurodigital (left) and SenseGlove (right) haptic gloves. For indoor, the Neurodigital coverage is 12 m, and 5 m in the case of SenseGlove. For outdoor, the Neurodigital coverage is 32 m, and the SenseGlove coverage is 9 m. © 2020-2023 iNGENIOUS Page 181 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex V: Ship UC - Intermodal Asset Tracking via IoT and Satellite As mentioned in Demo – Intermodal Asset Tracking via IoT and Satellite, along with the Intermodal Asset Tracking via IoT and Satellite live over-the-air demonstrations, we also conducted lab simulations. This Annex provides more information on the lab testbed along with an overview of the verification testing and a more detailed description of the KPIs for the use case in general. iDR Lab Testbed The iDR Lab Testbed was setup to allow iDR test and validate different configurations in advance of any live satellite occasional use capacity received from SES for live demonstrations. iDR built the lab to closely resemble the live testbed environment hosted at SES’ Betzdorf facility thus allowing minimum disruption to the live testbed. The testbed proved to be an invaluable asset throughout the project as a testing environment. The workflow of the iDR lab testbed setup and demonstrations were as follows: 1. iDirect’s 5G-enabled Velocity™ Intelligent Gateway (IGW) hub was installed which included an integrated cloud based 5G core network. 2. An NMS server was installed to manage the satellite system. 3. An edge-UPF was integrated and hosted at SES’s teleport allowing for a local breakout of user plane traffic in Betzdorf. 4. Two satellite channel emulators were deployed to simulate the forward and return carrier of a satellite link. 5. Three different models of modems were installed (iQ DT, iQ200 & 9350) for testing. 6. A Raspberry Pi model 3 was used as an IoT Gateway. 7. Generic IoT sensors were installed in the iDR lab to emulate the functionality of the container sensors. 8. Lab demonstrations were used for staging, testing and validation of the end-to-end system in preparation for the live demonstrations. From a satellite system perspective, the iDR lab setup is very similar to the live testbed environment described in section 5 apart from the satellite link which is provided by two satellite emulators that simulate the forward and return satellite links. Also, the modem in use was a fixed Very Small Aperture Terminal (VSAT) modem rather than the SatCube modem used for the live demonstrations. Similar to the live setup, the lab setup also used iDirect’s 5G-enabled Velocity™ IGW hub which connected to the same Cloud hosted 5G core network used by the live network. Furthermore, the iDR lab setup included an in-house IoT test network which was used for staging, testing and validation of the end-to-end system in preparation for the live demonstrations. © 2020-2023 iNGENIOUS Page 182 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 108 provides a high-level overview of the iDR lab testbed used throughout the project, while Figure 109 shows pictures of the equipment installed in the lab. Figure 108: iDR lab testbed system overview Figure 109: i) iDR Lab testbed including an iQ200, iQ Desktop, 9350 modems, IoT GW & Satellite Channel Emulators x2, ii) iDR Lab Testbed generic sensor used to measure temperature and humidity of the lab and iii) iDR Lab Testbed iDirect’s 5G-enabled Velocity™ IGW hub IDR LAB TESTBED - RESULTS The iDR lab testbed was used for staging and testing on an ongoing basis including testing iDR’s end-to-end IoT network. Another major focus of the iDR testbed was to de-risk the live mid-term and final demonstrations by validating the configurations and connectivity in advance. Table 110 below provides an overview of the testing carried out during the initial testbed setup and in preparation for the mid-term and final live demonstrations. Live testing booking ID Dates Live satellite testing activities Lab testing Status 499159 25/05/21 Initial testbed testing over live satellite Verify initial test setup including satellite lab system, GEO satellite simulator and IoT sensors. Introduce satellite delay of Passed © 2020-2023 iNGENIOUS Page 183 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 560mS and test live configuration. 199335 01/11/21 Feasibility testing using SatCube Test SatCube test configuration. Passed 214210 07/02/22 End to end testing with SatCube and IoT network. Verify SatCube test configuration and verify end to end IoT connectivity and operation. Passed 222888 28/03/22 SatCube testing in preparation for midterm demo Verify configuration setup for mid-term demo. Passed 222889 25/04/22 Mid-term demo Verify configuration setup for mid-term demo. Passed 258712 07/11/22 Final Demo Verify configuration setup for final demo. Passed Table 110. Overview of iDR lab testbed activities Validation and Results TEST CASES VERIFICATION The actual result of the test cases was presented in the Section 6.3.1, while here more information is provided. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_01 Integration and installation of sensors and communication modules on iNGENIOUS container Integration of sensors in main board Integration of communication modules in main board Installation of main board module on iNGENIOUS container UC4_SR_25, UC4_SR_27 Module with all sensors installed on iNGENIOUS container Module with all sensors was installed on iNGENIOUS container as can be also seen in Figure 49. Passed Table 111. Test Case Id Test case description Test Steps © 2020-2023 iNGENIOUS UC4_TC_01 verification UC4_TC_02 Over-the-air tests for evaluating LoRa and LTE connectivity at the container in maritime and terrestrial scenarios at the Port of Valencia 1. LoRa connectivity tests at the laboratory 2. LoRa connectivity tests in the maritime segment (when the container is on the vessel) 3. LoRa connectivity tests at the Port of Valencia 4. LTE connectivity tests at the laboratory Page 184 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 5. LTE connectivity tests in the terrestrial segment (when the container is on the truck) System requirements covered Expected result Actual result Passed/Failed UC4_SR_27, UC4_SR_28 LoRa and LTE connectivity ensured with the container at the terrestrial and maritime segments LoRa and LTE connectivity was validated Passed Table 112. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_03 Develop an application where data gathered by IoT sensors and actuators is stored and visualized 1. Structuring and storage of data in a database 2. Development an application for visualization UC4_SR_04 Application where data gathered by IoT sensors and actuators is stored and visualized As we can see in several figures, Figure 53 – Figure 62, we were able to observe the collected data in the Grafana dashboards of the SES Cloud servers Passed Table 113. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed © 2020-2023 iNGENIOUS UC4_TC_03 verification UC4_TC_04 Container transport from the Port of Valencia to the Port of Piraeus, including storage at the Port of Piraeus until next loading Transport from Valencia port to Piraeus port: 1. Container loading to the ship at the Port of Valencia 2. Transport to the Port of Piraeus by vessel 3. Container unloading at the Port of Piraeus 4. Storage at the Port of Piraeus UC4_SR_01, UC4_SR_03 The iNGENIOUS container should be transported from the Port of Valencia to the Port of Piraeus, including storage at the Port of Piraeus until next loading The iNGENIOUS container was transported from the Port of Valencia to the Port of Piraeus (05-08 October 2022) and it was stored there until the next loading (27 October 2022). More information about the details of the transportation have been provided in Section 6.2.1. Passed Table 114. Test Case Id UC4_TC_02 verification UC4_TC_04 verification UC4_TC_05 Page 185 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed Container transport from the Port of Piraeus to the Port of Valencia Transport from the Port of Piraeus to the Port of Valencia 1. Container loading to the ship at the Port of Piraeus 2. Transport to the port of Valencia by vessel 3. Container unloading at the Port of Valencia 4. Storage at the Port of Valencia UC4_SR_01, UC4_SR_03 The iNGENIOUS container should be transported from the Port of Piraeus to the Port of Valencia, including storage at the Port of Valencia until we conduct the over-the-air demo using the satellite connection The iNGENIOUS container was transported from the Port of Valencia to the Port of Piraeus (27 October – 08 November) and it was stored there until 21 November 2022 where the over-the-air demo took place. More information about the details of the transportation have been provided in Section 6.2.1. Passed Table 115. Test Case Id UC4_TC_05 verification UC4_TC_06 Test case description Terrestrial transport by truck from Port of Valencia to hinterland and vice versa Test Steps Inland segment from the Port of Valencia to Madrid area and vice versa: 1. Container loading on the truck 2. Inland transport by truck 3. Container unloading System requirements covered Expected result Actual result Passed/Failed UC4_SR_01, UC4_SR_03, UC4_SR_23, UC4_SR_27 The iNGENIOUS container should be transported by truck from the Port of Valencia to hinterland and vice versa The iNGENIOUS container was transported from the Port of Valencia to the Madrid Dry Por (01 March – 09 March). More information about the details of the transportation have been provided in Section 6.2.2. Passed Table 116. Test Case Id Test case description © 2020-2023 iNGENIOUS UC4_TC_06 verification UC4_TC_07 Site Survey for exploring the practical viability of accommodating and installing the Smart IoT Gateway aboard, as well for exploring the theoretical viability of installing VSAT antenna on the vessel Page 186 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test Steps System requirements covered Expected result Actual result Passed/Failed Drafting of list of activities for performing the site survey Validation with COSCO, the captain and the owner of the ship Execution of the site survey Drafting of document summarizing the main outcomes of the survey UC4_SR_01, UC4_SR_08, UC4_SR_12, UC4_SR_13, UC4_SR_15 Assessment and validation of power supply requirements, environment and physical dimensions required, electromagnetic compatibility, LoRa, Wi-Fi and BT coverage, accessibility and deployment constraints for installing the Smart IoT GW on board. Theoretical assessment of a potential installation of the VSAT antenna onboard The site survey did not take place as we have described in the D6.2 [2]. Failed Table 117. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_08 Validate proposed satellite backhaul infrastructure A number of iterations of testing will take place as satellite capacity is made available, in order to guarantee that the infrastructure will meet the KPI requirements of the live demonstration 1. Setup – SatCube terminal connectivity to SES live network. 2. Send measurement data from device co-located with SatCube via satellite to host at teleport side (and vice-versa). 3. Verify receipt of test data in both directions. UC4_SR_01, UC4_SR_18, UC4_SR_29 Test data exchanged successfully over satellite between terminal and teleport. Achieved bandwidth and latency results should indicate sufficient performance to meet use case requirements Testing completed successfully with SatCube and Fixed VSAT terminals. Several iterations took place based on the provided satellite capacity (see Table 19) Passed Table 118. Test Case Id Test case description UC4_TC_07 verification UC4_TC_08 verification UC4_TC_09 Validate end to end connectivity using Satellite backhaul Setup – Data path establishment between Sensor and Data centre using satellite backhaul. 2. Publish sensor data from device to data centre/cloud. 3. Verify successful receipt of sensor data. 1. Test Steps System requirements covered Expected result Actual result Passed/Failed © 2020-2023 iNGENIOUS UC4_SR_01, UC4_SR_18, UC4_SR_24, UC4_SR_26, UC4_SR_29 Sensor data is received successfully at data centre/cloud Sensor data is received successfully at data centre/cloud as we can see also in several figures, Figure 53 – Figure 62. Passed Page 187 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Table 119. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_10 Verify uplink and downlink Satellite backhaul capacity meets Use Case KPI requirements 1. Setup – Data path establishment between Sensor and Data centre using satellite backhaul. 2. Using iperf or similar utilities, measure UDP and TCP downlink bandwidth between Satellite Terminal location and Betzdorf egress point. 3. Using iperf or similar utilities, measure UDP and TCP downlink bandwidth between Satellite Terminal location and Betzdorf egress point. UC4_SR_01, UC4_SR_05, UC4_SR_07, UC4_SR_08, UC4_SR_18 Uplink and downlink capacity should exceed the minimum requirements defined in Use Case KPIs The uplink and downlink capacity (see Table 19) was enough for a successful over-the-air demo Passed Table 120. Test Case Id Test case description UC4_TC_09 verification UC4_TC_10 verification UC4_TC_11 Verify uplink and downlink Satellite backhaul latency Setup – Data path establishment between Sensor and Data centre using satellite backhaul. 2. Send test TCP/UDP data uplink and downlink between host at/co-located with satellite terminal and Betzdorf teleport egress point, to measure latency observed over satellite segment of backhaul. 1. Test Steps System requirements covered UC4_SR_01, UC4_SR_05, UC4_SR_07, UC4_SR_08, UC4_SR_18 Expected result Latency should be within the limits specified for the use case Actual result Passed/Failed Using ICMP packets, an average latency of 593 ms was observed between the satellite terminal and Betzdorf teleport egress point which is shown in Table 21. Passed Table 121. Test Case Id Test case description UC4_TC_11 verification UC4_TC_12 Validate confidentiality of satellite backhauled sensor data Setup – Data path establishment between Sensor and Data centre using satellite backhaul. 2. Capture sensor data in transit, at point between Smart IoT Gateway and Teleport IP egress point. 3. Analyse captured sensor data to verify encrypted status. 1. Test Steps System requirements covered © 2020-2023 iNGENIOUS UC4_SR_01, UC4_SR_05, UC4_SR_07, UC4_SR_18, UC4_SR_21 Page 188 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Expected result Actual result Passed/Failed Captured sensor data is indecipherable between IoT Gateway and teleport egress point Pcaps were taken of the sensor data at the ingress and egress of the satellite network to confirm the data was indecipherable as it was contained within a VPN which was setup between the Smart IoT GW and the IoT Cloud. Passed Table 122. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_13 Connectivity with sensors 1. 2. 3. 4. 5. Configure GW and sensors (IDs, security…). Sensors start transmitting meaningful data. GW receives the messages. GW processes the messages. GW stores the messages. UC4_SR_03, UC4_SR_06 GW and sensors can communicate and exchange data The Smart IoT GW and the IoT devices communicated and exchanged data successfully, as we can see in several figures, Figure 53 – Figure 62. Passed Table 123. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed Test case description Test Steps © 2020-2023 iNGENIOUS UC4_TC_13 verification UC4_TC_14 Connectivity with M2M space (direct) 1. Configure oneM2M CSE. 2. Trigger messages on the IoT GW that needs to be routed directly. UC4_SR_01, UC4_SR_02 Messages are correctly routed to the oneM2M CSE Messages were correctly routed to oneM2M CSE and this can be seen in several figures, Figure 53 – Figure 62, as the data are observed from the SES Cloud through Grafana dashboard Passed Table 124. Test Case Id UC4_TC_12 verification UC4_TC_14 verification UC4_TC_15 Connectivity with M2M space (VSAT) 1. Configure VSAT termina. 2. Configure oneM2M CSE. 3. Trigger messages on the IoT GW that needs to be route via satellite. 4. Send M2M messages through the VSAT. Page 189 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Expected result Actual result Passed/Failed UC4_SR_01, UC4_SR_23 Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed Test case description Test Steps System requirements covered UC4_SR_17, UC4_SR_19, Messages were correctly routed via satellite. All figures, Figure 53 – Figure 62 presents results through satellite communication Passed UC4_TC_15 verification UC4_TC_16 Smart IoT GW will receive and process sensor data 1. Trigger message generation for a specific route type. 2. Change message parameters (type, priority, payload…). 3. Repeat step 2 for the supported message types. UC4_SR_07, UC4_SR_08, UC4_SR_10, UC4_SR_17, UC4_SR_19, UC4_SR_23 UC4_SR_11, UC4_SR_16, Correctly formatted messages are routed to the appropriate destination Correctly formatted messages were routed to SES Cloud and can be seen in several figures, Figure 53 – Figure 62. Passed Table 126. Test Case Id UC4_SR_16, Messages are correctly routed via satellite Table 125. Test Case Id UC4_SR_11, UC4_TC_16 verification UC4_TC_17 Smart IoT GW configuration via remote management 1. 2. 3. 4. 5. Log in to Smart IoT GW management endpoint. Send configuration parameters. Retrieve status and configuration data. Sensors send alert/warning messages. Verify that the Smart IoT GW sends the appropriate alerts. UC4_SR_09, UC4_SR_12, UC4_SR_20 Expected result The Smart IoT GW changes configuration and shows status Actual result The Smart IoT GW changes configuration and shows status Passed/Failed Passed Table 127. Test Case Id Test case description Test Steps © 2020-2023 iNGENIOUS UC4_TC_17 verification UC4_TC_18 Smart IoT GW will receive and process sensor data during outages 1. 2. 3. 4. 5. 6. Trigger message generation for a specific route type. Change message parameters (type, priority, payload…). Verify that messages are being routed. Disconnect destination endpoint. Verify that messages are being stored. Connect back the destination. Page 190 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) 7. Verify that the stored messages are (re)sent again. System requirements covered Expected result Actual result Passed/Failed UC4_SR_12, UC4_SR_12, UC4_SR_14, UC4_SR_15, UC4_SR_16 During the outages, the messages are held and sent again when the destination network is available During the outages, the messages were held and sent again when the destination network was available. During the final over-the-air demo this happened, as in the beginning we faced some difficulties to establish the satellite connection while the Smart IoT GW was receiving data from the IoT devices Passed Table 128. Test Case Id Test case description Test Steps System requirements covered UC4_TC_18 verification UC4_TC_19 Smart IoT GW Security 1. The Smart IoT GW captures and processes sensor data. 2. Analyse captured sensor data to verify encrypted status. UC4_SR_21 Expected result Captured sensor data are sent to cloud with high level of security Actual result Captured sensor data are sent to cloud with high level of security Passed/Failed Passed Table 129. Test Case Id Test case description Test Steps System requirements covered Expected result Actual result Passed/Failed UC4_TC_19 verification UC4_TC_20 Smart IoT GW Integration with other systems 1. Communication of the Smart IoT GW with the sensors. 2. Communication of the Smart IoT GW with the satellite terminal or the LTE network. UC4_SR_22 Sensor data is received successfully at data centre/cloud Sensor data was received successfully at data centre/cloud as we can see in several figures, Figure 53 – Figure 62. Pending Table 130. UC4_TC_20 verification KPIS VERIFICATION The actual result of the KPIs was presented in KPIs, while here more information is provided. Availability © 2020-2023 iNGENIOUS Page 191 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Description: The measured data from the IoT devices, installed in the iNGENIOUS container, should be ubiquitously available at any time to the end users with the user’s requested oE level. • Verification: The live over-the-air tests for the first part of the final demo took place at the Port of Valencia. The data measured by the IoT devices were sent to the SES Cloud through satellite connectivity where the used space segment was the ASTRA 2F GEO satellite. Figure 44 presents the coverage of the ASTRA 2F in Europe where we can see that the Port of Valencia is covered all the time. Furthermore, from Figure 57, Figure 58, and Figure 59, we can see that when the communication between the IoT devices and the Smart IoT Gateway and the satellite connection were established the data were sending to the SES Cloud consistently. Reliability • Description: The reliability is an assessment criterion to describe the quality of the radio link connection for fulfilling a certain service level • Verification: The live over-the-air tests for the first part of the final demo took place at the Port of Valencia. From Figure 57, Figure 58 and Figure 59, we can see that all the data were sending to SES Cloud without any loss and based on the established frequency for the IoT devices to send updates. Battery life • Description: The battery powered IoT UE should be able to operate for the entire lifetime of the tracked container (>12 years) without large capacity battery packs and without being replaced during this period of time. Measured in years. • Verification: The lifetime of the IoT devices deployed in the iNGENIOUS container is 5 years with a reporting frequency of 1 message per day. Furthermore, the battery life of the IoT devices could be observed in realtime in the Grafana dashboards of the SES Cloud servers as shown in Figure 59. Coverage • Description: Satellite coverage will be provided to enable ubiquitous coverage of the shipping iNGENIOUS • Verification: The data measured by the IoT devices were sent to the SES Cloud through satellite connectivity where the used space segment was the ASTRA 2F GEO satellite. Table 19 presents the details of the provided OU) satellite capacity for the preparation and execution of the live over-the-air demo, such as booking confirmation ID, start and end dates, used satellite and frequency band, bandwidth and satellite hub. Typical message size • Description: The typical size of the information sent by the IoT devices should be 200 bytes. • Verification: The values for the average and maximum message sizes are extracted from the syslog for the lora_pkt_fwd service, which is the concentrator service for the LoRa module, attached to the Smart IoT Gateway. This log contains entries for all received LoRa transmissions (including join requests and response), as seen in the screenshots below, providing of the message in bytes. Using the calculations shown in © 2020-2023 iNGENIOUS Page 192 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) calculation.png, the average and maximum message sizes could be determined. Maximum message size • Description: The size of the data payload containing the status information related to a container can be up to 2500 Bytes. • Verification: Same explanation as for the typical message size. Typical frequency (messages per day) • Description: Depending on the service level required by the owner of the container and the supply chain associated, the IoT devices installed in the iNGENIOUS container send regular status update. • Verification: From Figure 53 and Figure 54, we can see that the IoT devices were sending messages once per day during the trip from Valencia to Piraeus and vice versa. While, from Figure 57 and Figure 58 we can see that this frequency was set up to every 5 minutes for the live over-the-air final demo at the Port of Valencia. Connectivity of heterogeneous IoT devices • Description: The Smart IoT GW is responsible for the appropriate routing and sorting of sensor data, coming from one or more sensor networks. Sensors can send messages to the Smart IoT GW either wirelessly (with technologies such as Wi-Fi, LoRa, Bluetooth), or directly connected to the device (via ethernet, I2C or SPI). • Verification: The Smart IoT GW was developed to support LoRa and Wi-Fi protocols but during the live over-the-air demonstrations only LoRa communication with the IoT devices was tested. Figure 53, Figure 54, Figure 55, Figure 56, Figure 57, Figure 58 and Figure 59 present the capability of the Smart IoT GW to receive and process the data, sent from the IoT devices. Latency • Description: The end-to-end latency which represents the maximum tolerable elapsed time from the instant a data packet is generated at the source application to the instant it is received by the destination application should be less than ≤ 1s. • Verification: Figure 62 and Table 21 and depict that the end-to-end latency is in the range of 600 ms. Mobility • Description: Mobility is defined as the maximum vehicle speed at which IoT connectivity is guaranteed by providing a suitable QoS. © 2020-2023 iNGENIOUS Page 193 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) • Verification: As the sensor was configured to send the data once every hour, checking this KPI during the demo was not applicable. As all the data was received in each report sent by the sensor, the actual values assigned to this KPI were the maximum speed achievable by each of these transport means. Positioning accuracy • Description: Degree of correctness provided by the real-time IoT positioning sensors when tracking the iNGENIOUS container on the ship or the truck. • Verification: Figure 56 shows the measured GPS points with an approximate accuracy of around 50m, being distributed in a radius of roughly 25m around the actual location of the IoT devices. © 2020-2023 iNGENIOUS Page 194 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Annex VI: DLT’s UC - Supply Chain Ecosystem Integration For each section of the D6.3 [15], additional technical details are reported in relation to the DVL/DLT UC. Objective and Description The main aim of the demonstration for this use case is to show that all data flows (from the data sources to the end users) are properly implemented and are processed as expected. More in detail, the demonstration covers the following aspects: • For all defined scenarios, the DVL is able to retrieve and aggregate raw data from all available machine-to-machine platforms (namely OneM2M, Eclipse OM2M, Symphony and PISystem) as well as external data sources (namely Port Community System in Livorno). • The DVL implements a set of remote procedures (exposed by means of RESful APIs) for GateIn, GateOut, VesselArrival, VesselDeparture and sealRemoved maritime events as well as for data defined in Scenario 3 and Scenario 4 to be used by TrustOS and external applications respectively (namely Awake.AI platform and a Web Application for trucks’ real-time monitoring). • The TrustOS component is able to interact with DVL by means of a RESTful interface and to correctly retrieve the data of the maritime events as per above. A DigitalAsset (a digital representation of the data) is created for each of the supported maritime events and stored as a TrustPoint accordingly. • The TrustOS component communicates with four different DLTs (namely Bitcoin, Ethereum, IOTA and Hyperledger Fabric) by means of a common API, and it makes sure that a given DigitalAsset (as well as the relative TrustPoint) is written among the ledgers of the DLTs as a proof of evidence for the stored data. A GUI is able then to visualize the main information related to a DigitalAsset (e.g., TrustPoint, ownership and metadata) stored on a given DLT as well as on TrustOS so that the end user can double check the content accordingly. • Pseudonymization Function is able to detect the truck plate number (for GateIn and GateOut events in Scenario 4), pseudonymize it and make it available to DVL by means of a RESTful interface. The DVL exposes such data by means of a remote procedure and an external application (namely Awake.AI platform) can consume pseudonymized data accordingly. The access to DVL is performed according to a role-based policies for all data consumers (CRUD operations). According to the defined scenarios, data consumers are represented by the following entities: TrustOS, Pseudonymization Module, Awake.AI platform and the Web Application for trucks’ monitoring. © 2020-2023 iNGENIOUS Page 195 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) SCENARIO 1 In this scenario, the DVL is responsible for providing GateIn, GateOut, VesselArrival and VesselDeparture events for both seaports. In this case, TrustOS, which is part of the Cross-DLT layer, plays the role of data consumer of such events. Each event is defined by a given set of attributes according to a common data model from Tradelens platform [16]. DVL retrieves from the underlying and available data sources by aggregating available data sets. The structure of these events is described in deliverable D6.2 [2], along with further details. GateIn, GateOut, VesselArrival and VesselDeparture events for the Port of Livorno are obtained by aggregating data from the Port Community System (TPCS), whereas for the Port of Valencia, only GateIn and GateOut events are considered and retrieved from the PISystem OSIsoft M2M platform. In both cases, DVL implements two different connectors/wrappers to interact with both the PCS and the underlying M2M platform. RESTful interfaces are then exposed so that TrustOS can consume such events by associating a TrustPoint and store it across available DLTs. The overall architecture for this scenario is depicted in Figure 110 and further technical details can be found in D6.2 [2] and in D5.3 [17]: Figure 110: Scenario 1 architecture for the demonstration of the use case. SCENARIO 2 This scenario is linked to the Ship UC where the Port of Valencia is involved. The DVL is responsible here for interacting with Eclipse OM2M platform in order to retrieve data coming from smart sensors installed on the transported container. In this case the main aim is to detect when the doors of the packed container are opened by removing the smart seal from the iNGENIOUS container. This information is retrieved from the M2M platform by means of a © 2020-2023 iNGENIOUS Page 196 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) RESTful connector/wrapper, processed by the DVL, and exposed to TrustOS through a consumable RESTful API. As in the Scenario 1, TrustOS can use such an API to retrieve the event, create a TrustPoint, and distribute it across all DLTs for secure storage. The overall architecture for this scenario is depicted in Figure 111: and further technical details can be found in D6.2 [2] and in deliverable D5.3 [17]: Figure 111: Scenario 2 architecture for the demonstration of the use case. SCENARIO 3 This scenario is linked to Port Entrance use case where both Port of Valencia and Port of Livorno are involved. The DVL is responsible for interacting with the Symphony M2M platform in order to retrieve GPS data coming from tracking devices installed on trucks in the Livorno seaport. The device sends data to the M2M platform for storage. This information is then retrieved by the DVL through a RESTful connector/wrapper which allows to directly interact with the platform. Finally, a dashboard-based application consumes the tracking data by invoking a RESTful API at DVL level. The data are then visualized through a © 2020-2023 iNGENIOUS Page 197 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) dashboard in real time. The overall architecture for this scenario is depicted in Figure 112 and further technical details can be found in D6.2 [2]and D5.3 [17]: Figure 112: Scenario 3 architecture for the demonstration of the use case. SCENARIO 4 This scenario is also related to Port Entrance use case implemented in both Port of Valencia and Port of Livorno. Two different components are involved: Mobius OneM2M platform and a Pseudonymization Module. The M2M platform is responsible for collecting meteorological data in Livorno seaport. DVL implements a RESTful connector/wrapper to interact with this platform, extracts the available data set, and exposes it by means of a RESTful API so that an AI-based platform can consume and correlate it with truck-turnaround times in the Livorno seaport. Moreover, a Pseudonymization Module component is used to process GateIn and GateOut events in order to identify personal data and pseudonymize it accordingly (trucks’ plate number). The module retrieves the GateIn and GateOut events from the Port of Livorno by using existing RESTful APIs (available from Scenario 1), detects all the attributes © 2020-2023 iNGENIOUS Page 198 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) which may be potentially sensitive (in our case the truck plate number), pseudonymizes the attribute according to available pseudonymization techniques (e.g., hash without key), and stores it within a conversion database. The DVL is able then to expose a RESTful API to allow an AI-based platform to consume pseudonymized data sets for training of predictive AI/ML models. The overall architecture for this scenario is depicted in Figure 113 and further technical details can be found in D6.2 [2] and D5.3 [17]: Figure 113: Scenario 4 architecture for the demonstration of the use case. Setup and Execution SCENARIO 1 Technical specifications of the hosting environment and the used APIs in this scenario are provided in D6.2 [2] and D5.3 [17]: © 2020-2023 iNGENIOUS Page 199 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 114: Figure 115: © 2020-2023 iNGENIOUS sequence diagram for the demonstration of the Scenario 1. DigitalAsset for the VesselArrival event in Livorno seaport. Page 200 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 116: DigitalAsset for the VesselDeparture event in Livorno seaport. Figure 117: © 2020-2023 iNGENIOUS DigitalAsset for the GateIn event in Livorno seaport. Page 201 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 118: Figure 119: © 2020-2023 iNGENIOUS DigitalAsset for the GateOut event in Livorno seaport. Trustpoint of the VesselArrival event in Livorno seaport. Page 202 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 120: Trustpoint of the VesselDeparture event in Livorno seaport. Figure 121: © 2020-2023 iNGENIOUS Trustpoint of the GateIn event in Livorno seaport. Page 203 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 122: Trustpoint of the GateOut event in Livorno seaport. SCENARIO 2 Technical specifications of the hosting environment and the used APIs for this scenario are provided in deliverable D6.2 [2] and [17]: Figure 123: © 2020-2023 iNGENIOUS Sequence diagram for the demonstration of the Scenario 2. Page 204 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Attribute Type Source originatorName Static Port of Valencia originatorId Static VLC equipmentNumber Static ZIMU13 12 2 Dynamic SENSOR_DATA/signal_state/... /ct Static CSP Iberian Valencia Terminal latitude Dynamic SENSOR_DATA/GPS/... /con/latitude longitude Dynamic SENSOR_DATA/GPS/... /con/longitude Static Carrier sealNumber Dynamic CONTAINER_INFO/... /con/dev_eui signalState Dynamic SENSOR_DATA/signal_state/... /con/signal_state eventOccurrenceTime86 1 smdgTerminal sealType Table 131. Figure 124: sealRemoved event data model. sealRemoved event data at DVL level. SCENARIO 3 Technical specifications of the hosting environment and APIs for this scenario are provided in deliverable D6.2 [2] and D5.3 [17]: © 2020-2023 iNGENIOUS Page 205 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 125: Sequence diagram for the demonstration of the Scenario 3. Figure 126: © 2020-2023 iNGENIOUS IoT Tracking Sensor message format. Page 206 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 127: Figure 128: IoT Tracking Sensor GPS message. GPS data coming from the Symphony M2M Platform and aggregated at DVL level. SCENARIO 4 Technical specifications of the hosting environment and APIs of this scenario are provided in deliverable D6.2 [2] and D5.3 [17]: © 2020-2023 iNGENIOUS Page 207 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Figure 129: Figure 130: Sequence diagram for the demonstration of the Scenario 4. The main interactions between the DVL and Pseudonymized Module. © 2020-2023 iNGENIOUS Page 208 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Validation and Results TEST CASES VERIFICATION Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_01 Interaction between OneM2M platform and Data Virtualization Layer. The test should demonstrate the interaction is working properly according to defined system requirements. UC6_SR_01, UC6_SR_02 Correct meteorological data retrieval from OneM2M platform. Correct data processing and its availability at DVL layer. The implemented RESTful interface in DVL allows to retrieve meteorological data from two meteorological stations deployed in Livorno seaport when invoked by Awake.AI platform. Passed Table 132. UC6_TC_01 verification. UC6_TC_01: This test case is intended to verify the integration between the DVL and OneM2M machine-to-machine platform. A RESTful interface was developed at DVL allowing data retrieval from the underlying OneM2M platform. The interface was tested by using Postman as a testing tool in order to verify that the HTTP request is correctly executed. The HTTP response was then benchmarked against the expected one, with a positive result: meteorological data was in line with the defined data model (Scenario 4). The RESTful interface and the implemented translator between the DVL and OneM2M platform behave as expected. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_02 Interaction between OM2M platform and Data Virtualization Layer. The test should demonstrate the interaction is working properly according to defined system requirements. UC6_SR_01, UC6_SR_02 Correct sensor data retrieval from OM2M platform. Correct data processing and its availability at DVL layer. The implemented RESTful interface in DVL allows to retrieve sealRemoved event when remotely invoked by TrustOS. Passed Table 133. UC6_TC_02 verification. UC6_TC_02: This test case is intended to verify the integration between the DVL and Eclipse OM2M machine-to-machine platform. A RESTful interface was developed at DVL allowing data retrieval from the underlying OM2M platform. The interface was tested by using Postman as a testing tool in order to verify that the HTTP request is correctly executed. The HTTP response was then benchmarked against the expected one, with a positive result: sealRemoved data was in line with the defined data model (Scenario 2). The RESTful interface © 2020-2023 iNGENIOUS Page 209 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) and the implemented translator between the DVL and Eclipse OM2M platform behave as expected. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_03 Interaction between PISystem platform and Data Virtualization Layer. The test should demonstrate the interaction is working properly according to defined system requirements. UC6_SR_01, UC6_SR_02 Correct GateIn/GateOutt data retrieval from PISystem platform. Correct data processing and its availability at DVL layer. The implemented RESTful interface in DVL allows to retrieve GateIn and GateOut events when invoked by TrustOS. Passed Table 134. UC6_TC_03 verification. UC6_TC_03: This test case is intended to verify the integration between the DVL and PISystem machine-to-machine platform. A RESTful interface was developed at DVL allowing data retrieval from the underlying PISystem platform. The interface was tested by using Postman as a testing tool in order to verify that the HTTP request is correctly executed. The HTTP response was then benchmarked against the expected one, with a positive result: GateIn and GateOut data was in line with the defined data model (Scenario 1). The RESTful interface and the implemented translator between the DVL and PISystem platform behave as expected. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_04 Interaction between DVL, Integration Bridge, TrustOS and the set of DLT providers. The test should demonstrate the interaction is working properly according to defined system requirements. UC6_SR_05, UC6_SR_08, UC6_SR_13, UC6_SR_15 UC6_SR_10, UC6_SR_11, UC6_SR_12, Correct storing of the data on the different DLTs. Correct display of event information and TrustPoints generated for each of the DLT providers. Passed Table 135. UC6_TC_04 verification. UC6_TC_04: This test case is intended to verify that the interaction between the DVL, Integration Bridge, TrustOS and DLTs works as expected according to the defined system requirements. The test consisted in the following steps: i) the Integration Bridge was able to retrieve the maritime events’ data from the DVL by using the available set of APIs, ii) the Integration Bridge was able to send HTTP request to TrustOS for events storage as well as for the creation of the corresponding set of Digital Assets, ii) TrustOS was able to create the corresponding truspoints and to store them in all available DLTs (Bitcoin, IOTA, Ethereum and Hyperledger Fabric) by using the common API, iii) the Integration Bridge was able to detect the availability of new events from the DVL with a polling mechanism sending a request to TrustOS to update the © 2020-2023 iNGENIOUS Page 210 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) corresponding Digital Asset which was correctly updated, iv) the availability of all stored trustpoints in DLTs was checked by using a GUI integrated with TrustOS. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_05 Mapping of the access roles for Data Virtualization Layer consumers (e.g: TrustOS, Awake.AI and PF module): RBAC – Role-Based Access Control. UC6_SR_03 The considered Data Virtualization Layer consumer has the permission to perform only assigned operations (CRUD basic operations). All available maritime events are retrieved through the exposed RESTful interfaces at DVL by the following data consumers: TrustOS, PF module and Awake.AI. For all of them only reading operations are allowed. Passed Table 136. UC6_TC_05 verification. UC6_TC_05: This test case is intended to verify that data consumers which interact with DVL have defined access rules properly set. First, a proper rule (according to CRUD – Create, Read, Update and Delete) is defined in the corresponding Virtual Database file (.xml), implemented in DVL. A given data consumer is then identified in a form of resource path within the Virtual database (e.g., TrustOS, PF module, Tracking Application, etc.). For the considered consumer, only READ permissions are assigned. To test the correct behaviour of the rule, a dummy schema was created, and a testing application acted as a consumer in order to verify assigned roles were properly working. This included two different scenarios: i) the data consumer attempts to invoke a specific operation he is not authorized for and ii) the data consumer attempts to invoke a specific operation he is authorized for, according to the defined virtual schema. The test result was positive: in the first scenario, the data consumer was not able to perform the HTTP request with Update SQL statement, while in the second case the requested information was correctly retrieved. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment © 2020-2023 iNGENIOUS UC6_TC_06 TEI Supply Chain Ecosystem Integration All personal data received by Data Virtualization Layer has to be pseudonymized so that, when stored, it is never in cleartext format. Incoming personal data Non-functional test N/A. The test is expected to be executed in a laboratory environment (Joint Lab staging farm). Page 211 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? Test Steps Risks Mitigation Expected result Actual result Passed/Failed GateIn and GateOut data coming from the Tuscan Port Community System (TPCS) used in Livorno seaport. Personal data is pseudonymized (pseudonym). GateIn and GateOut data UC6_SR_14, UC6_SR_15, UC6_SR_16, UC6_SR_19 Confidentiality and integrity protection of personal data, Logs of privacy events. No TEI/CNIT Pseudonymization function is fed by sensor data; Personal data are pseudonymized (pseudonym production) and a retention period is associated to it; No risks foreseen N/A No personal data in cleartext format; In case a conversion table is needed for the selected pseudonymization function, it is stored in encrypted repository. GateIn and GateOut events are available at DVL level with the field “truck plate number” pseudonymized. Passed Table 137. UC6_TC_06 verification. UC6_TC_06: This test case was intended to verify that personal data of the GateIn/GateOut events handled by DVL is processed by the pseudonymization function module so that it is not available in clear-text format within the DVL. This test uses the two interfaces HistoricalGateInEvent and HistoricalGateOutEvent. Through such RESTful interfaces, the PF module fetches the events from the DVL, and then, based on the pseudonymization technique used (for the test, Hashing-With-Key), generates pseudonyms associated with the personal data, storing all of them in an encrypted internal database. As for clarification, the only personal data handled by DVL is the vehicleId field (namely the truck plate number) of the GateIn/GateOut events (in Livorno seaport). The test case was successfully verified. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test © 2020-2023 iNGENIOUS UC6_TC_07 TEI Supply Chain Ecosystem Integration DVL (authorized entity) can fetch data, in pseudonymized format, from PF module Events exists in PF module Non-functional test Page 212 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? Test Steps Risks Mitigation Expected result Actual result Passed/Failed N/A. The test is executed in a laboratory environment (Joint Lab staging farm). A request on dedicated interface, FetchGateEvents, with the following data: {startdate, enddate, gate} Events in the time frame requested are returned with personal data in pseudonymized format Pseudonym stored in encrypted DB into PF module UC6_SR_14, UC6_SR_17 Confidentiality and integrity protection of personal data, Logs of privacy events. No TEI/CNIT The DVL asks for events in a specified time frame; The Pseudonymization Function (PF) retrieve data events, including personal data in pseudonym format and returns them to DVL. Note: only DVL (pseudonymization entity) has the rights to fetch data from PF module. No risks foreseen N/A Only authorized partners can access personal data in cleartext format. GateIn and GateOut events are available at DVL level with the field “truck plate number” pseudonymized. Passed Table 138. UC6_TC_07 verification. UC6_TC_07: This test case aims to verify that personal datasets are not provided in clear-text format to external applications that access the DVL. In particular, it has been verified that when an application requests the GateIn/GateOut events to the DVL through the FetchGateEvents interface, the DVL requests such events in pseudonymized format to the PF module via the FetchGateEvents RESTful interface. The events are properly returned with the vehicleId field (namely the truck plate number) in encrypted format by using a pseudonym. The FetchGateEvents interface exposed to the DVL is password protected, so that only the pseudonymization entity (the DVL) can use it. The test case was successfully verified. Test Case Id Responsible Partner Use Case © 2020-2023 iNGENIOUS UC6_TC_08 TEI Supply Chain Ecosystem Integration Page 213 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Personal Data cannot be stored forever, when retention period expires personal data has to be cancelled. Events exists in PF module with date out of retention period Non-functional test N/A. Test executed on staging environment with local instance of Pseudonymization Function module running in a dedicated Virtual Machine. N/A All the personal data out of retention period is canceled. Personal data and pseudonyms in Conversion Table UC6_SR_18 Confidentiality and integrity protection of personal data, Logs of privacy events. Are UC’s users involved in the test? No Who will perform the test? TEI Test Steps Risks Mitigation Expected result Actual result Passed/Failed Every night a process in n Pseudonymization Function module checks if personal data with expired retention period exist. In that case it personal data in conversion table. No risks foreseen N/A No personal data with expired retention period stored in the Interoperable Layer. Personal data with expired retention period are not available. Passed Table 139. UC6_TC_08 verification. UC6_TC_08: The PF module introduces an auditor function that once per day checks personal data stored in encrypted DB. If the timestamp of the stored data is older than the retention period (default value set to 5 years) the personal data is removed. To test this functionality, the retention period was set to 1 day via the configTemplate API to force the auditor function to delete data. The test case was successfully verified. Test Case Id © 2020-2023 iNGENIOUS UC6_TC_09 Page 214 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment Input to the system Output of the system Data involved in the test System requirements covered Related KPIs TEI Supply Chain Ecosystem Integration Data Owner can request to the platform to cancel own personal data. Events exists in PF module Non-functional test N/A. Test executed on staging environment with local instance of Pseudonymization Function module running in a dedicated Virtual Machine. N/A All personal data will be canceled after Data Owner requests for deletion. Personal data in Conversion Table, if any UC6_SR_18 Confidentiality and integrity protection of personal data, Logs of privacy events. Are UC’s users involved in the test? No Who will perform the test? TEI Test Steps Risks Mitigation Expected result Actual result Passed/Failed A Data Owner submits a right-to-be-forgotten request, this is simulated sending a request to “deleteData” API to PF module: The request is processed by pseudonymization function removing personal data from conversion table. No risks foreseen N/A Personal data involved in the deleteData request is canceled from PF module. Personal data are removed from the conversion table. Passed Table 140. UC6_TC_09 verification. UC6_TC_09: To enable the “right to be forgotten” functionality, the PF module implements the deleteData interface. Through this interface, the DVL (pseudonymization entity) can ask the PF module to remove specific personal © 2020-2023 iNGENIOUS Page 215 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) dataset. The test execution verified that after the deletion of the personal data via deleteData interface, it was not more available in the encrypted DB. The test case was successfully verified. Test Case Id Test case description System requirements covered Expected result Actual result Passed/Failed UC6_TC_10 Views and query results caching capability in case underlying data does not change frequently. UC6_SR_04 Query results are properly cached and properly retrieved by a test application. The query results of the SQL statement are retrieved from the cache when the same RESTful interface is invoked more than one time (for GateIn, GateOut, VesselArrival and VesselDeparture events in Livorno seaport). Passed Table 141. UC6_TC_10 verification. UC6_TC_10: This test case is intended to verify the DVL’s caching capability of the query’s results in case the data included within the response from the APIs does not change frequently. In order to retrieve and aggregate data at DVL level, a specific query was implemented and included in a virtual database configuration file (.xml). A test application was used to perform the query and the query results were cached according to the virtual database configuration file. A test application performed the same query again and the main results were taken from the cache as expected, instead of being retrieved from the underlying data source. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used UC6_TC_11 CNIT Supply Chain Ecosystem Integration Interaction between TPCS and Data Virtualization Layer. The test should demonstrate the interaction is working properly according to defined system requirements. TPCS and DVL instances properly configured in a staging environment. Non-Functional testing (integration test). N/A Test Environment The test is expected to be executed in a laboratory environment (Joint Lab staging farm). Input to the system GateIn, gateOut, VesselArrival and VesselDeparture data from TPCS. Output of the system Data involved in the test © 2020-2023 iNGENIOUS Virtual view of extracted data at DVL level. GateIn, gateOut, VesselArrival and VesselDeparture data from TPCS. Page 216 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? Test Steps Risks Mitigation Expected result Actual result Passed/Failed UC6_SR_01, UC6_SR_02 Data Virtualization Layer Scalability No CNIT/AdSPMTS 1. By using a tool for APIs’ testing (e.g. Postman), HTTP request is sent to DVL (note that at this stage the translator for the communication with TPCS is implemented and unit tests have been performed correctly). 2. The result of the HTTP request is visualized and checked in order to make sure that the expected data are properly formatted (GateIn, GateOut, VesselArrival and VesselDeparture data in Livorno seaport). No risks are foreseen. N/A Correct data retrieval from TPCS. Correct data processing and its availability at DVL layer. The GateIn, GateOut, VesselArrival and VesselDeparture events are properly retrieved and visualized according to the adopted data model. Passed Table 142. UC6_TC_11 verification. UC6_TC_11: This test case is intended to verify the integration between the DVL and the TPCS (Tuscan Port Monitoring system) platform. A RESTful interface was developed at DVL allowing data retrieval from the underlying TPCS platform. The interface was tested by using Postman as a testing tool in order to verify that the HTTP request is correctly executed. The HTTP response was then benchmarked against the expected one, with a positive result: GateIn, GateOut, VesselArrival and VesselDeparture data was in line with the defined data model (Scenario 1). The RESTful interface and the implemented translator between the DVL and TPCS platform behave as expected. Test Case Id Responsible Partner Use Case Test case description Prerequisites Type of test Reference standards used Test Environment © 2020-2023 iNGENIOUS UC6_TC_12 CNIT Supply Chain Ecosystem Integration Integration between Symphony M2M Platform and Data Virtualization Layer. The test should demonstrate the interaction is working properly according to defined system requirements. Symphony M2M Platform and DVL instances properly configured in a staging environment. Non-Functional testing (integration test). N/A The test is expected to be executed in a laboratory environment (Joint Lab staging farm). Page 217 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Input to the system Output of the system Data involved in the test System requirements covered Related KPIs Are UC’s users involved in the test? Who will perform the test? Test Steps Risks Mitigation Expected result Actual result Passed/Failed Trucks’ tracking data from Symphony M2M Platform. Virtual view of extracted data at DVL level. Trucks’ GPS coordinates. UC6_SR_01 Data Virtualization Layer Scalability Yes CNIT/NXW/UPV 1. By using a tool for APIs’ testing (e.g. Postman), HTTP request is sent to DVL (note that at this stage the translator for the communication with Symphony M2M Platform is implemented and unit tests have been performed correctly). 2. The result of the HTTP request is visualized and checked in order to make sure that the expected data are properly formatted. 3. A web application consumes data through a RESTful interface implemented at DVL level and visualize them correctly. No risks are foreseen. N/A Correct data retrieval from Symphony M2M Platform. Correct data processing and its availability at DVL layer. Correct data visualization by means of a web based application. Data are correctly visualized through a GUI and the truck’s path is displayed in a map. Passed Table 143. UC6_TC_12 verification. UC6_TC_12: This test case is intended to verify the integration between the DVL and the Symphony machine-to-machine platform. A RESTful interface was developed at DVL allowing data retrieval from the underlying Symphony platform. The interface was tested by using Postman as a testing tool in order to verify that the HTTP request is correctly executed. The HTTP response was then benchmarked against the expected one, with a positive result: geolocation data from the IoT tracking device was in line with the defined data model (Scenario 3). The RESTful interface and the implemented translator between the DVL and Symphony platform behave as expected. KPIS Data Virtualization Layer scalability: The total number of simultaneous M2M platforms used during the demonstration was four. Although the Data Virtualization Layer can suffer from scalability constraints (e.g. use cases based on data trending/historical analysis), the proposed solution utilizes a cachingbased mechanism to compensate for this issue. © 2020-2023 iNGENIOUS Page 218 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Data Virtualization Layer data processing: Overall latency to retrieve the maritime events from DVL was measured as a sum between network latency and the time required for the execution of the specific SQL statement (1400ms as an average value over five consecutive tests). Real-time data integration requirement was achieved. Data Virtualization Layer access control: Data roles, also called entitlements, are sets of permissions that are defined per VDB that dictate data access (create, read, update and delete). In the scope of the iNGENIOUS project, for each exposed API the specific role has been assigned according to the expected operations to be performed by the applications running on top of DVL. Once the application is authenticated at DVL (e.g., TrustOS, PF module, smart applications for trucks’ localization and predictive models), the “ReadOnly” role is assigned accordingly so that any unauthorized operation over the underlying data sources is prevented (e.g., create, update or delete). Therefore, the data access at DVL level is role-based. Cross-DLT layer access control: A general identity has been generated in TrustOS to authorise all requests for registration of event information coming to the platform. It was decided to do so for simplicity, but for future versions an identity could be generated for each of the identified entities that need to log information both in TrustOS and in the different DLT providers and thus provide granularity of roles. Cross-DLT layer scalability: TrustOS currently has integration with different DLT providers (Ethereum, Göerli, Besu, Polygon and Mumbai). In addition, integration with Bitcoin, IOTA, Hyperledger Fabric has been included for the iNGENIOS project. Currently it is possible to register information (TrustPoints) of the different events coming from the DVL simultaneously in all these DLTs. Availability of the DLT connectivity layer: TrustOS is running within an environment supported by Telefonica based on 8x5 schedule (8 hours per day, from Monday to Friday). Data processing time in DLTs: The type of request that offers the highest latency are write requests, specifically, in this case, these requests are related to the creation of TrustPoints based on event information. Depending on the DLT provider selected, this request will have a variable latency because it is necessary to wait for the confirmation of the block in which the transaction is added. Since the block generation time of the DLT providers used is different, it has been established that the response to the request is always generated as soon as the transaction identifier is available. This never exceeds a maximum of 15 seconds. Cross-DLT concurrent requests: Currently, it is possible to launch a number of 8 concurrent requests for the creation of a TrustPoint (one for each of the DLT providers). This is achieved through replication, high availability and load balancing of the TrustOS instance. Confidentiality and integrity protection of personal data: Personal data are stored in the Pseudonymization Function (PF). The PF module uses password protected RESTful API, which means that only authorized user (the DVL, acting as pseudonymization entity) can have access to the data. PF uses a table for conversion and this table is encrypted. © 2020-2023 iNGENIOUS Page 219 of 220 iNGENIOUS | D6.3: Final Evaluation and Validation (V 1.0) Logs of privacy events: The personal data is handled by DVL through Pseudonymization Function module. This module aims to obfuscate the data substituting the sensible info with pseudonyms. During this process the microservices involved (of Teiid and PF modules) produce logs information for debugging purposes. This KPI want to measure, in percentage, how many logs avoid including sensible information (the personal data). To cover all the SW a static analysis on code has been performed on last SW revision, checking that personal data is never included in log in cleartext format, so this KPI reach the target (100%). © 2020-2023 iNGENIOUS Page 220 of 220