Industrial Communications and Security Go Way Back

Industrial communications and security have a long standing history. In 2016, industrial network operators can collect more data from geographically dispersed field assets than ever before. As we head towards fully connected systems through the Industrial Internet of Things (IIoT), communication technology manufacturers continue innovating and creating enhanced solutions that will meet the Big Data demands of today and the future.  Data has become one of the most valuable assets an organization can own.  It can help operators improve operational decisions, save manpower and improve employee safety by keeping them out of dangerous environments. Industrial Communications  Industrial communications networks have more access points than ever before and we will continue to see more IIoT devices in service as connectivity improves in challenging environments. The IP-based technology incorporated into Industrial IoT communiations make it easier to deploy and talk to sensors, but it also makes it easier for intruders to see and snoop on valuable data streams. Anytime we talk about the collection and transfer of large amounts of critical data, security becomes an important part of the conversation.  If you’re a manufacturer, you are probably nodding your head in agreement or maybe even thinking that is an obvious statement.  However, based on the major cyber-attacks that have occurred in industrial networks over the past decade it is clear that a security focus from design to deployment isn’t always the case. Take a look at this infographic, “A History of IIoT Cyber Attacks and the Future of Security,” to see just how many huge scale cyber-attacks have impacted a variety of industries. While the infographic offers insight into major IIoT security breaches we’ve seen in the past decade or so, it does not provide the entire picture of industrial communication technology history and security practices. It does not highlight the fact that industrial operations networks have been using communication devices for decades and many industrial systems have been “online” since well before 2007. In fact, wireless machine-to-machine (M2M) communication solutions have owned the command and control of field assets for decades. Looking Closer at Solutions Top-tier industrial communication solution manufacturers have been leveraging security to prevent cyber-attacks and vulnerabilities on data long before the first major breach identified in the infographic. For years, these manufacturers have used a variety of techniques beyond physically securing the devices, including frequency hopping spread spectrum (FHSS) based devices with security standards like TLS/SSL and basic AES-128 data encryption. Some communication technology providers created solutions that are trusted by the US military for secure mission critical data transmission and have been used for more than 20 years. If one thing is clear in the efforts to protect data over time, it is that a critical infrastructure project is only as reliable and secure as the technology serving it. Security will ultimately be the limiting factor on how much IIoT technology is deployed.  A modern operator striving for an IIoT network must look at SCADA security, the convergence of Operations Technology (OT) and Information Technology (IT), and make a thorough assessment of what will allow them to achieve a secure data communications network and where they want to be in this triangle.  As the industry has evolved, so have the security practices. But what hasn’t changed is that an operator looking to build an IIoT network must carefully select their technology and look for the solutions that are focused on security.

IoT Evolution Podcast Recap: Edge Computing Future

Edge computing has become a topic of hot conversation as the technology capable of supporting sensor-2-server data transport has matured. The realization of true edge computing is accompanied by a host of benefits, including real-time data transmission, maintenance needs and considerable savings for operational expenses. Is edge computing the cut-and-dry future? Ken Briodagh, editorial director with IoT Evolution, plays devil’s advocate on a recent podcast with FreeWave Technologies CMO Scott Allen. He asks, essentially, “If companies focus resources on the real-time data transport at the edge – sending small packages of data at a time in the interest of speed – are we losing the benefits of big data? Do we lose the information that big data sets can provide in terms of predictive analytics and, ultimately, machine learning if we discard bits and pieces of data at the edge that we’ve deemed irrelevant?” Listen to the podcast below for Allen’s response! Overall, edge computing has three main drivers: latency–our need to have the data in milliseconds; loss of communication–able to solve the factory problem without shutting down the entire plant; proximity–sensors in the field monitor the data back to the edge. Edge Computing Solution Depending on the industry, a mixed bag of both programmable and edge computing solutions is an answer to Briodagh’s question. In some cases, especially with the oil and gas industry, companies rely on a sensor-2-server stream of communication, where they need to have the information in real-time, and if there is a problem, be able to act locally and fix the issue before anything drastic happens. The network is a combination of radios communicating with sensors that pass the data to a gateway and up to a cloud system. The network uses only small data sets to transmit a continuous flow of intelligent, sensor-based information, optimizing bandwidth in situations where latency is crucial. Next for the Edge There will come a time when using edge technology will just become a regular line item expense needed to do business in this modern age. Some early adopters have already started using gateway systems as a cookie cutter roll-out for all future expansions. Many worry the cost of entry is still too high to integrate, even though the need for transmission is great. As our digital age grows, infrastructure complexity and the desire to implement the latest technology grow along with it. Altogether, edge computing is still in its infancy stage, so no one really knows what data  we deem irrelevant today will be vital tomorrow.

IoT Weekly Roundup

The IoT weekly roundup is designed to share the latest and most interesting news from the past week. As the industrial and consumer IoT space continues to heat up, we decided to uncover some very unique IoT applications that many didn’t even know existed. As the connected world continues to advance in the emerging digital age, virtually every facet of our lives is now being impacted by the IoT. In this week’s addition of IoT weekly roundup, we explore M2M, sensors, automation, drones and IoT language. Dive in and enjoy this week’s highlights! Weekly Roundup of News How M2M and IoT enable new data-intensive applications By @dhdeans | Published on @TTech_News “During the last couple of years, machine-to-machine (M2M) technology has become an integral part of the services offered by global telecom providers and a significant revenue stream for M2M app specialists. They’ve developed comprehensive offerings, designed to reduce costs and increase efficiency.”   Sonar Mapping Sensors Help Understand Where Life Can be Found Underwater By Brooks Hays | Published on @UPI “New maps charted using sonar sensors have revealed the importance of ‘marine snow’ to the distribution of biomass on the ocean floor. Until now, mapping the ocean floor’s terrain, as well as distribution of marine snow and biomass, has proven difficult.”   Rail and Production Technology Parallels When it Comes to Automation By @DJGreenfield | Published on @automationworld “Explaining the IoT trend in rail, Weatherburn said that IoT is increasing interest in greater connectivity for operations optimization reasons. It’s also driving a move away from proprietary protocols and toward greater use of standard Ethernet. He noted that this is particularly true in rail when it comes to the delivery of communications and entertainment for the railway customer, pointing out that the rail industry is looking to carry both sets of data over standard Ethernet.”   Indie Sci-fi Film Shot Entirely by Autonomous Drones By @trentlmoore | Published on @blastr “Drone cameras are being used in just about everything nowadays, from sports coverage to emergency response, but what happens when you shoot a movie entirely from the sky?” The connected IoT is spawning a new vocabulary By @pmcfedries | Published on @IEEESpectrum “A big chunk of the Internet of Things consists of wireless transceivers combined with sensors, which can reside in appliances, devices, clothes, machinery, buildings—just about anything physical. Of course, the phrase ‘wireless transceiver combined with sensors’ is unwieldy, so such a node of the IoT is called a mote (short for remote).”   As we conclude our IoT weekly roundup, we hope you enjoyed learning about all the new applications and insights related to the powerful force of the Internet and connected technologies. Now go out and see what other IoT applications you can uncover!

Seismic Shift in IIoT Monitoring

There’s been a seismic shift in monitoring earthquakes via the  Industrial Internet of Things (IIoT) with advanced Machine-to-Machine (M2M) technology have reshaped the industrial communication industry. Every device or machine along the network, even at the outermost edge, now has the opportunity to be fully-connected for automated collection and delivery of information. As Sensor-2-Server (S2S) communication technology evolves to keep up with the demand for this connectivity paradigm, new efficiencies are created and Big Data is available to drive actionable intelligence. Seismic Shift Data that Saves Lives The sheer quantity of available data, combined with the speed of automation can support mission critical applications that are designed to save lives. Research centers can leverage IoT networks to relay critical data in real-time from areas where earthquakes are a common threat to people living nearby. While natural events like earthquakes and volcanos are not avoidable or fully predictable, an IoT network can potentially help reduce the level of devastation through close, reliable seismic monitoring via highly sensitive and advanced sensor technology. S2S communications monitor and send data from remote areas where Earth changes are first detected, to the monitoring authorities who are closely tracking seismic activity. S2S solutions leveraged for early detection of these events can enable authorities to warn citizens in advance to take appropriate precautionary measures. When robust, rapid, real-time monitoring is combined with effective emergency communications, human casualties can be significantly decreased. Seismic Shift and the Ever Changing Landscape IoT has been adopted at such a rapid pace that the demand for modern, sophisticated communication technology is driving constant changes in remote, industrial communication networks that will further advance applications like seismic monitoring. These changes have clearly disrupted the traditional Supervisory Control and Data Acquisition (SCADA) market. While SCADA systems are not obsolete, industries like environmental monitoring will continue to leverage new technologies designed to help seismologists make more informed decisions than with just SCADA alone. Now, network operators can evolve and adapt their monitoring programs over time through the IoT with edge devices that allow third-party software applications to be deployed network-wide. This has not only opened new doors for software developers, but it opens up the opportunity for advancements in environmental monitoring to further improve natural event monitoring. Fast and accurate data transport from the sensor networks in seismic monitoring therefore requires robust and reliable technology that doesn’t fail in remote and sometimes harsh environments. RF technology, for example, is advancing to help field crews make intelligent decisions and closely monitor the elements that can help delivery early warning for natural events. Find us at JavaOne this Week

Thinking Outside the Box with Sensor-2-Server Applications

When we talk about Sensor-2-Server (S2S) applications, we tend to lean towards examples of common industrial communication networks for industries like oil and gas, utilities and municipalities. These application solutions typically incorporate the transfer of data from edge devices back to a specific server for use cases such as pump and tank monitoring or SCADA systems. However, as Machine-to-Machine (M2M) communications transform alongside the adoption of the Internet of Things(IoT), the types of applications that require connectivity at the edge are virtually endless. If we step back and look at the big picture, it is clear the entire landscape of technology is changing. With these changes we foresee the decline of standalone RF technology. Decision makers need Big Data in to make intelligent decisions that will transform their business operations and save them time and money. S2S communication networks are designed to address this challenge by driving intelligent transmissions from a specific location back to the appropriate server with the necessary intelligence to drive action for change. As technology evolves to meet industry demands, RF technology must adapt to meet new needs. We’re already seeing this happen in the industrially hardened, wireless communications industry. Some wireless IoT communication solutions providers are offering platforms to host third-party applications in addition to creating the communication links for devices. Sensor-2-Server Solution Along with this widespread technology change, we have begun to see new and exciting ways that modern RF technology solutions can be leveraged in an S2S network. Here are some nontraditional real-life examples of S2S applications: S2S communications to connect satellite communication dishes in remote locations where there is little to no cell coverage. The solutions extend communications and create a single POC for all of the remote locations. Monitoring cold storage food at distribution centers for a large US Supermarket chain where the cold storage warehouses are 500 feet X 500 feet and are located several hundred feet away from the monitoring room. RTK base station communications to improve data and correlation for an Electric Car manufacturer. Remote access to GPS Stations for improved data transfer in order to complete ocean mapping. Irrigation control on golf courses. For most industrial organizations there is a clear push towards complete connectivity from the sensors at the edge of the network all the way back to the central server. We often talk about data collection for familiar applications in oil and gas, utilities and smart cities. However, the reality of today’s technology transformation is that any industrial communication network, regardless of the industry, will likely need to connect its edge devices and eventually program its edge through third party applications in order to take the most cost effective approach and drive intelligent operational decisions.

IoT Top News: A Sensor Driven World

Much of the world around us is becoming driven by sensors, where we are able to track and map numerous possibilities with countless M2M and IoT solutions. So, we wanted to highlight some of the trending use applications of sensors today. The Army is looking at installing sensors to their combat soldiers The Army is looking for a way to better track the health and well-being of their soldiers in combat, and current health fitness sensors have too many irregular findings. Jennings Brown with Vocativ informs us that “The United States Department of Defense is interested in monitoring the health of soldiers in real-time.”   Although it is interesting to see Army uses of sensors. One must ask how sensors impact the industry at large? IoT is responsible for propelling sensors further into our world. Recent findings from ABI Research show that you can’t have one without the other — meaning, as we continue to explore the numerous IoT and M2M solutions it is only natural that we also see a dramatic increase in sensors used across the board. Peter Clarke with EET Asia reports, “ABI Research reckons sensors and peripherals will be 65 percent of an installed base of 47 billion units by 2021, double the 2016 level.”   The latest IoT Sensors Market Report for 2015-2023 sheds light on the global growth of sensors. An increased demand for sensors is expected to impact the industrial and automotive IoT sectors according the the recent ReportBuyer’s IoT Sensors Market research. Electronic News has shared the latest  findings from the ReportBuyer’s IoT Sensors Market 2015-2023 report which states, ” There will be a number of opportunities for the global IoT sensors market. One such opportunity is the increasing development of ‘smart cities’ around the world. IoT sensors will need to be used in aspects such as smart meters, smart grids, intelligent traffic management systems and smart packing, among others.”   Sensors are being used in both industrial and consumer IoT applications across the board. As technology improves, it is now easier to create higher quality sensors for a fraction of the cost, opening the doors for more industrial and consumer IoT applications. Mary Catherine O’Connor with IoT Journal believes that with the growth of IoT sensor applications,  That means there is a big opportunity for systems integrators in this market. There may also be an opportunity for companies that develop their own sensor-integration capabilities. It will be fascinating to watch the market develop.”   With that said, we can’t forget to realize that implementation of any IoT sensors will require a sensor-2-server plan, that will ensure the data makes it safely in real-time to the intended end-user.

Machine Hackathon: DARPA Plays Cyber Capture the Flag

A machine hackathon is about to take on a whole new meaning as Defense Advanced Research Projects Agency (DRAPA) prepares to hold it’s first ever machine-only hackathon. With a specific focus on cybersecurity, this cyber version of Capture the Flag (CTF), is DARPA’s way of combating the onset of cyber attacks in real-time. DARPA’s normal approval process is lengthy; once a potential threat is recognized and a software solution has been created, it has to be tested and approved before it can be implemented, and by the time the software fix is ready to be used across the board, another threat looms on their horizon. Some of you might be asking, “What is DARPA and who are their finalists in this cyber challenge?” Not to worry, the short video below provides some background and context. The contest is truly a battle of the minds, as hacker teams try their hand at reverse-engineering software to seek out and find weakness in the system and fix those holes while attacking other machines at the same time. Those teams that are successful in both attacking and fixing holes capture the digital flag and win points in the ongoing process. This competition will take place in conjunction with the annual DEFCON, the longest running annual hacker competition. Before we start thinking that we’re living a modernized version of “Hackers,” there are a few more things to know. First, this is really a battle of software. The final teams were given a DARPA computer to code and must create a software platform to interact with the DARPA database. Once the competition begins, the teams will not be able to intervene if their software fails to see a weakness or is attacked by another team. The goal is to create an artificial intelligence (AI) software that is capable of responding in real-time to potential threats and weakness within its databases.   Wired has added this contest to their radar, saying, “DARPA has gone full Tron. It might feel more like a video game, than a hacking contest, as DARPA has arranged for a visual diagram to be displayed on the big screen, that will show each attack and from what machine the attack came from.” Whether you believe Wired or the other tech experts, this type of machine AI is hoping to turn the tables on the war on cyber safety. Instead of waiting for an attack to strike, DARPA’s intuitive software will attempt to seek out weakness autonomously giving the Defense Department the added edge it needs to prevent leaks in the system. This is another intriguing example of how machine learning is becoming integrated into so many facets of the world at-large. Whether you make your way to Las Vegas to witness the DARPA’s version of CTF or not, that fact is we continue to add more M2M and IoT solutions to our daily lives. It’s only natural we find new ways to have machines assist us.

IoT Evolution Expo 2016 Recap

IoT Evolution Expo invaded Las Vegas this week by taking over Caesars Palace. The conference focus was to be a premier source of information needed to help drive your enterprise forward with the latest in IoT applications. A few of the tracks found this year at IoT Evolution included IoT Security, Fog Computing and IoT Enterprise. Overall this expo gave attendees the chance to listen to various talks and panel discussions, as well as hands-on demos on the exhibitor floor, and evening networking nights with industry experts and peers. Here are some of the posts during the event: Diving into the IoT Evolution sessions, we learn the weakness of our smartphone. Godfrey Chua, analyst at Machina Research, informs us that the smartphone can be a very weak link in IoT and M2M communications when it is used as a remote control. And…IoT Evolution continued with more panel discussions. Yann Kulp, VP SmartSpace North America with Schneider Electric tells us that, the panel with GE, Amazon, US Celluar and Argus Insights offered intriguing updates with the use of Wiser Air in your home and other Wi-Fi IoT applications. FreeWave was fortunate to participate this year on both the Oil and Gas: Pirates and Protection, as well as the Brown Field Round Table: What to do when it’s too late to start again panel discussions. The Pirates and Protection panel give us all a chance to dive deeper into the critical industries and what IoT secure options area available for these remote locations. My second panel of the night with the Brown Field Round Table gave attendees to hear real world case study examples of Sensor-2-Server implementation challenges with blending older SCADA systems with the latest IoT solutions for continuous real-time results.  Time to see an IoT application at work! James Brehm & Associates tried their hand at capturing this IoT conference with virtual reality technology. A new solution from RICOH THETA. The 360 angle is best viewed prior to hitting up Margaritaville. Interesting to see the “Workspaces & IoT” concept discussed as well. Digital workspaces takes center stage at IoT Evolution as Global Workspace Analytics reports 3.7 million U.S. employees now work from home. Cynthia Artin with IoT Evolution informs us that,”while the IoT is arguably taking off faster in more industrial domains (factories, farms, transportation), and has the most “sizzle” in consumer domains (smart homes, smart cars, fitness wearables), there is new energy forming around IoT enhanced offices.” Now as this year’s IoT conference comes to a close, we remember all the ways IoT will change our enterprise and our life this year. One thing is clear, the more we innovate, the more we strive to become more efficient, automated and safety operated within fog computing and cloud applications. We hope you have enjoyed this week’s roundup, as always tells us about your IoT highs and lows.

IIoT Top News: Machine Learning

Machine-to-machine (M2M) learning is an integral apart of the expanding world of Industrial IoT. Over the past few months we have given attention to manufacturing and its current digital disruption, but have failed to show the direct impact smart M2M and IoT technology is having on the industry. So, this week we are diving deeper into the term machine learning and how it connects to manufacturing both today and in the future. Before we get to our news round up let’s start by re-defining M2M, to ensure we are all on the same page with its purpose and meaning. Gartner has defined machine-2-machine communications as “something used for automated data transmission and measurement between mechanical or electronic devices.” Now, that we have defined M2M, its time to check out our top news round up for the week on how M2M applies to both manufacturing and IoT. 10 ways machine learning is revolutionizing manufacturing Machine learning is poised to improve manufacturing by streamlining the process of OT and IT, thus increasing efficiency and lowering overall operation costs. Louis Columbus at Forbes believes that “Every manufacturer has the potential to integrate machine learning into their operations and become more competitive by gaining predictive insights into production.”   IoT will recharge Machine Manufacturers Manufacturing can look to software companies as an example of how IoT can implement creating a smarter M2M network. Timothy Chou with CFO.com writes, “Today, manufacturers of machines — whether seed drills, chillers, or CT scanners — can leverage the path paved by the software product companies through three new business models: service and support; assisted services and machine-as-a-service.”   Climbing the IoT Mountain–by adding M2M to manufacturing Manufacturing is only at the beginning of its ascent into IoT and M2M, so there are many more bumps and obstacles a long the way for the industry to fully integrate. Ronnie Garrett with Supply & Demand Chain Executive describes IoT and M2M manufacturing implementation as, “Standing at the foot of Mount Everest, ready to climb the world’s tallest mountain. You know you want to get to the top but you aren’t really sure how you will get there or what obstacles you’ll encounter along the way.”   Cybersecurity is manufacturing’s biggest risk factor Manufacturing needs to continue to add M2M automation and big data analytics to the shop floor, but a threat to the overall industry is manifesting itself in the cybersecurity world. Ian Wright with Engineering.com informs writes, “A new report from BDO indicates that 92 percent of manufacturers cited cybersecurity concerns in their SEC disclosures this year. According to BDO, this represents a 44 percent increase compared to the first Manufacturing Risk Factor report in 2013.”   As we wrap up our top news for the week, we realize the need to fully implement advanced machine learning across the manufacturing world will take more than a simple flick of the wrist. With that said, we leave you with a cautionary tale of when automation goes wrong. It was recently discovered an airport in India had an sign translated with automation software which read, “eating carpet strictly prohibited” — of course this was not the translation they had meant to display. Regardless, as we move towards a fully integrated M2M world, we will have to adjust our equations depending our our intended outcome, much like the world is finding with the love/hate of language automation. Hope you have enjoyed this week’s top news, as always tell us your thoughts on M2M and how it might impact your world!

Fog Computing: Answering the IoT Challenge

Fog Computing is being touted as the data communication solution our Internet of Things (IoT) devices are asking for by bringing the power of cloud computing closer to the end user. The fact is, the number of connected devices is going to continue to grow exponentionally. In fact, Gartner predicts that by 2020 IoT will include 26 billion connected things. Consider the impact that amount of data collected and processed will have.   The Challenge Naturally, with billions of devices all connected to the cloud for manufacturing, oil and gas, utilities, municipalities and enterprise, to name a few, the data transmission and processing rate is bound to slow down – especially if the current cloud architecture is upheld. Some IoT devices use the cloud to store data long term, where other connected things send data to the cloud to be analyzed and sent back to the devicewith operational instructions. Ahmed Banafa with SemiWiki explains, “As dependence on our newly connected devices increases along with the benefits and uses of a maturing technology, the reliability of the gateways that make the IoT a functional reality must increase and make up-time a near guarantee.”   What is Fog Computing? Fog Computing is a term coined by Cisco, that offers a way to analyze the data closer to the IoT device, thus saving valuable milliseconds. It may be hard to believe, but a millisecond has the power to prevent a M2M line shut-down, increase the speed at which power is restored to utilities and prevent an oil rig from leaking, just to name a few. An easy way to visually understand where Fog Computing fits in our IoT world, is by looking at the diagram above. It clearly shows that Fog Computing hangs between the cloud and the device, much like the fog on an early San Francisco morning. Fog Computing operates at the network edge, extending the cloud capabilities closer to the source (IoT device). Each IoT connection works with what’s called Fog Nodes to digest the intelligent data and then coordinate operational next steps, whether that be acting directly and or transmitting results to the cloud. The diagram below covers the types of response times IoT devices face from both Fog Nodes and main cloud locations.   Fog Computing Brings Efficiency to Enterprise A recent report by Machina Research highlights the companies that pioneered Fog Computing and those poised to capitalize on the benefits in their near future. These companies are able to collect, protect, transport and control the data via IoT devices at the edge of the network, saving time and creating a more stream-line approach to sending and receiving data efficiently and more securely. Overall, as our need to connect explodes, we will not only need to think about IoT, but also the way in which intelligent data is processed from the critical infrastructure and back to the cloud. Fog Computing will continue to open more efficient channels across our IoT, as long as we allow it.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.