Internet of Things (IoT) 

On the factory floor and in the field

Industrial companies are increasingly implementing the Internet of Things (IoT) on the factory floor and in the field. Such largescale end-to-end Internet Protocol (IP) connectivity will doubtless facilitate many more capabilities at the edge of these networks, but at the same time, it presents a huge security threat. IIoT enabled Operations Technology (OT) offers a much larger surface prone to cyber-attack than the IT space where by comparison the volumes of data are lower and its comings and goings can be more precisely controlled.  

In the industrial sector, huge amounts of data are being processed at the edge and sent back to the cloud for further analysis and used by different applications. These applications as well as the operating systems they reside on, communicate with physical devices through device drivers and firmware. Attackers can exploit these special classes of software to subvert and compromise hardware. Every single device and sensor in the IoT represents a potential risk but today significant numbers of IoT devices are not being used with security in mind. Many are easily available for physical access.


Security

Security - a major and growing priority

It’s therefore not surprising that for many companies, security is a major and growing priority even though a few may still prefer to delay the harnessing of the full potential benefits of the IIoT if it means security pressure points can be postponed a little while longer. Inevitably, however, all industrial companies will need to take ongoing action to more securely share and analyse critical real-time data. This has to be the end game.

For this to happen it is important to not only secure assets, but also secure the communication links themselves. After all, IIoT networks may span many miles with potentially hundreds of thousands of data points.

Our SUSiEtec  framework is designed to remotely deploy, manage, and update edge computing devices, bridging edge nodes, sensors, and other IoT devices to cloud frameworks, and automating the provisioning of software and updates to remote embedded equipment. To facilitate this we offer comprehensive Board Support Packages on various operating software including Yocto Linux and Android.

Essential IIoT security rules:

  • Ensure every access is authenticated and authorized
  • All communication will be encrypted·All software and firmware will be regularly updated
  • Unsecured brownfield systems and machines easy integrated
  • Secure management interface for managed updates and mass distribution
  • Functionalities and data protected at the edge and in the cloud
  • Addition of new devices via remote IoT connectivity mechanism
  • Secure interface for remote updates and mass device management
  • Watchdog functionality presented in defined reports
  • Emergency handling of critical vulnerabilities
rules