Industrial automation devices control extremely critical and valuable assets, but all too often security is an afterthought in industrial networks. In the past, industrial operators trusted in their isolation, or “air gap,” from the broader network, the relative obscurity of their communications protocols, and the physical security of their facilities to protect the integrity of their networks. Now, in a changing, more connected world, automation network operators are realizing they must confront their unique security vulnerabilities. In a recent report prepared for the US Department of Homeland Security, security consultants InfraCritical found 500,000 exposed SCADA devices just by using a search engine, with 7,200 of those devices found to be controlling critical infrastructure assets such as water, energy, and other utilities. It’s not surprising, then, that security researchers characterize the state of ICS security as “laughable.”
Many industrial operators are not even aware the extent that their systems are exposed on the internet. The critical first step to closing the security gaps, then, is to acknowledge the existence of a vulnerability. But the next step is just as critical: the vulnerabilities must be completely addressed—and automation networks have three major unique vulnerabilities.
It Is Difficult to Secure Industrial Modbus TCP Protocol Packets
Even industrial networks that have moved to modern TCP/IP and Ethernet infrastructure for the transport, internet, and link layer of their communications are often still running industrial application layer protocols. The most popular of these, Modbus TCP, is also extremely vulnerable despite being widely used in industrial communications, with no built-in security systems at all.
This means that a packet that appears to be entirely legitimate when inspected as a TCP/IP packet—such as by checking its source IP address—may in fact contain malicious Modbus TCP communications that would be evident if the system were able to filter packets by Modbus source device ID, function codes, or other Modbus command type. Since industrial devices rarely have much in the way of application layer security, it’s up to the cyber security devices, such as hardware firewalls, to provide this critical missing protection. Unfortunately, conventional firewall solutions rarely include the technology to scan industrial protocols such as Modbus TCP.
Industrial Applications are Time-Critical and Can Not Tolerate Transmission Delay
SCADA and industrial control devices directly manage real-world machinery in a way that is highly time-critical. For example, on an assembly line, all of the different machinery needs to operate in perfect coordination in order for the line to keep moving. Electric substation operations are even more time-sensitive, as a delay in triggering a circuit switch could create a power fluctuation or even a blackout.
The highly time-critical nature of industrial operations means that industrial networks can not tolerate significant latency issues. However, a common assault vector used by malicious attackers is to overwhelm a network with requests, which can affect the network latency even if a firewall is able to block the unauthorized requests. Insufficient bandwidth during critical moments will also expose the network to latency issues if the firewall is struggling to process packets quickly enough to maintain timely communications.
The latency and network demands on industrial security will only grow as industrial networks become more advanced and begin to integrate more systems ,such as video, voice, and data. IP cameras generate a lot of bandwidth, and the network security devices need to have the bandwidth and throughput to support advanced applications without compromising the security of the network or the latency of other industrial operations.
Demanding Physical Environments can Overwhelm Security Devices
Industrial machinery and industrial control devices are deployed in more extreme conditions than most conventional IT network equipment. This presents a potential mismatch in the performance of industrial control devices and the network security devices that are intended to protect them—the network security devices might struggle to hold up in the sort of intense industrial conditions that industrial automation systems must operate in. Harsh environmental hazards such as extreme temperature, EMC, and EMI, can be even more damaging to network equipment than a malicious attacker. If the network security hardware is not able to shrug off these hazards, the network will remain exposed and vulnerable to attackers.
Moxa’s Gigabit-Performance Cyber Security Solution for Automation Networks
Moxa has combined its background in industrial automation with its expertise in networking to create a cyber security solution that was designed with the unique needs and requirements of automation networks in mind. The Moxa EDR-810 is an industrial multi-port secure router that includes security functionality and is specifically optimized to address the security vulnerabilities of industrial networks. In addition to a VPN that encrypts data tunnels for remote access, a NAT to hides local IPs, and a firewall that filters packets, the EDR-810 adds automation-friendly functions such as:
Deep Modbus TCP inspection: PacketGuard™, is the world’s first built-in Modbus TCP packet inspector. With PacketGuard, the EDR-810 will inspect network packets all the way up to the Modbus application level, deeper than the transport-layer scanning that conventional network firewalls can achieve.
Low latency gigabit performance: The EDR-810 can aggregate its many ports into a Gigabit uplink, for extremely low latency performance that will not interrupt industrial operations, even when used in extremely bandwidth-hungry applications such as IP video.
Highly integrated multi-port secure router with switch functions: The EDR-810 combines security, routing, and layer 2 switch functionality into a single device, making it a highly convenient and cost-effective solution that connects and protects many devices.
The EDR-810 is the latest in Moxa’s EDR family of network security devices tailored for industrial operators. Wide operating temperature range, hardened metal housings, and strong EMI/EMS resistance give Moxa’s EDR security devices the resilience to stand up to harsh operating conditions and keep up with robust industrial networks. For all the details about this entire line of advanced network security hardware, visit http://www.moxa.com/product/Industrial_Secure_Routers.htm
New Technologies Pair the Physical with the Digital
Digital twinning is one part of the technology road map for Industry 4.0 and the Industrial Internet of Things. A gamut of new technologies must be integrated to work seamlessly together to pair the physical domain with the digital information domain.
Digital twinning seeks to improve the design and maintenance of physical systems by offering datadriven ways to discretely map these physical systems into digital and computerized replicas of themselves. With the arrival of automation and data exchange, digital twinning could be useful in a myriad of industrial applications.
This new industrial context, where the physical and the digital worlds meet, is known as the fourth industrial revolution—or Industry 4.0. Brought on by the intersection of a host of high-technology electronic and computer systems, the “new way” of Industry 4.0 promises increasing gains, efficiencies, and flexibility. A gamut of new technologies must be integrated to work seamlessly together to pair the physical domain with the digital information domain. Digital twinning is only one part of the technology roadmap for Industry 4.0, as these additional technologies are helping to enable digital twinning for Industry 4.0 to manifest its potential:
• Pairing technologies
• Cyber-physical systems
• Augmented, virtual, and mixed reality
• Artificial intelligence
• Additive manufacturing
• 3D printing
• Digital thread
Pairing technologies are critical to digital twinning and the world of Industry 4.0, as these technologies empower a device or system to find, connect, and communicate with other devices and systems. For example, sensors and the Industrial Internet of Things (IIoT) products require the ability to find and connect with other devices successfully. Technologies such as Bluetooth®, among others, are employed to make these connections. To accomplish this, connected devices must be able to interrogate other potentially connectable devices successfully. When inquiring other devices, units must be able to ascertain whether they are communicating with a unit that they should be corresponding and exchanging data with. When properly enabled and successful, this accomplishment is called pairing.
Security issues are paramount. Every device should pair only after proper identification has been confirmed to avoid crosstalk or misinformation. Shortcuts may be achieved through programming algorithms that allow the devices to quickly and easily identify other units that they should pair with. Pairing gets accomplished through authentication keys employing cryptography. Pairing works to ensure that the connections stay bonded in a data exchanging relationship between devices and works to prevent an external source from prying into their data exchanges.
Being that flexibility is paramount, units must be able to make and break their pairing quickly and without external, human involvement. Successful pairing may require ongoing communication to keep the pairing active. If one of the units determines that the pairing bond is no longer relevant to its successful operational objectives, it will remove its pairing relationship and present itself available for a different pairing opportunity.
The National Science Foundation (NSF) defines cyber-physical systems (CPS) as, “The tight conjoining of and coordination between computational and physical resources.” The critical element in this definition is that it focuses on a system approach— where a set of connected things or parts form a complex whole.
A current example of a CPS is the automated airline flight-control systems. Industry 4.0 requires traffic control, not for airplanes, but for the machines, computers, robots, sensors, and processes that comprehensively work together for its realization. It represents a system of higher order than IIoT, because it sits one level higher in the complexity chain. Where IIoT is concerned with collecting, handling, and sharing of large amounts of data, CPS is focused on ensuring that this large amount of data, collected from multiple systems, gets properly utilized across multiple disciplines that are relevant to the industry involved. The unique dilemmas of any given industry will require engineering expertise to address these specific challenges.
Augmented, Virtual, and Mixed Reality
New technologies are augmenting our reality. They are providing us with the ability to overlay digital content in front of us physically, merging the real with the virtual, creating a mixed reality that should be considered augmented. This gain is allowing engineers to view things in new ways. For example, rather than viewing a DT on a computer monitor, we could view a DT using an augmented reality (AR) headset that enables the users to engage with digital content or interact with holograms.
The use of such AR empowers viewers to have an immersive experience whereby they engage their bodily senses.
Reality-enhancing headsets can create real-time experiences of actual conditions happening in the physical world, by way of experiencing them through a digitized environment. AR could lead to new insights and understandings. Additionally, a DT display could appear in the user’s field of view, making real-time feedback that much more accessible and easy to use.
Artificial Intelligence Technologies
IIoT offers the promise to provide connected data; therefore, useful data must be stored and analyzed. Artificial intelligence (AI) is a solution to how to analyze and successfully handle large amounts of digital data. It helps in allowing digital twinning to become more realized because it promotes value by enabling rapid integration, hybrid integration, investment leverage, and system management and compliance.
Through machine learning, it offers the opportunity to use digital data to model, analyze, train, apply, and infer how best to make decisions. AI is helping to change the traditional perspective of computing, moving it beyond what primarily has been an automating- and scaling-process perspective towards a knowledgebased perspective, via actionable insights. Soon, it will help engineers gather new insights and ways to create value. By using a data-science approach, rapidly powered decisions will enable the generation of further opportunities.
Additive manufacturing (AM) is a method of production in which 3D objects are built by adding layer-upon-layer of material. AM holds promise because it leads to industries that can address variable demand and produce products that are distributable and flexible. Two areas of AM – 3D printing and digital thread – are advancing to make digital twinning possible.
3D printing is perhaps the most well-known example of AM. In 3D printing, a printer is programmed to print an object using plastics, metals, or other custom materials with virtually zero lead-time. 3D printing is extremely flexible and eliminates the issues involved in producing objects with large economies of scale. What this means for the future is that you will be able to get what you want quickly—as if walking up to the fast food counter.
With complex systems, however, AM has been confined primarily to the laboratory because all the systems involved do not operate under a unified system and, thus, are hard to scale. Digital thread promises to change that.
A digital thread is a single, seamless strand of data that acts as the constant behind a data-driven digital system. It activates the potential of AM by allowing a unification of disparate applications by way of their adherence to the thread, which is their source of shared information. A digital thread creates an easier process for collecting, managing, and analyzing information from every location involved in the redesigned Industry 4.0. It enables better and more efficient design, production, and utilization throughout the entire process.
Digital twinning will be a hallmark of Industry 4.0, helping to increase gains, efficiencies, and flexibility for existing products and processes. But digital twinning is just one part of the Industry 4.0 road map. Pairing technologies, CPS, AI, and AM are key to seamlessly bringing together the physical realm and the realm of its DT information and insights. While these technologies are bringing their complexities into the digital twinning equation, ultimately, they promise to enable Industry 4.0 to manifest its potential.
by Paul Golata for Mouser Electronics
Industrial manufacturers turn AI to “turbocharge” products and services, says Accenture
The vast majority of manufacturers are turning to artificial intelligence (AI) to “turbocharge” their products and services, finds a new research report from Accenture.
Based on a survey of 500 manufacturing companies in six industries across Europe, North America and Asia, the report notes the ability of AI – particularly when combined with mobile computing and big data analytics – to transform not only core operations, but also worker and customer experiences, and ultimately even business models, and to enable “Industry X.0” strategies.
Yet the research found that only a small group is already leveraging AI in a way that Accenture refers to as Applied Intelligence – intelligent technology and human ingenuity, combined with analytics and industry expertise, applied at the core of business – at scale. For instance, while 98 percent of the surveyed organizations have begun to enhance their offerings with AI, only 16 percent of them have established a holistic AI vision for their business, only 5 percent are committing resources to AI-driven product initiatives, and only 2 percent report that they have begun to leverage AI solutions at scale.
The research also highlights the challenges companies face when trying to use the technology: The concerns cited most often were data quality (identified by 51 percent of respondents); data- and cyber security (45 percent); deciding between ‘buying vs. making’ AI-embedded solutions (45 percent); and data sharing and protecting intellectual property (40 percent).
“The re-invention of industrial products with AI is still in its early stages, and getting it right is anything but easy,” said Eric Schaeffer, a senior managing director at Accenture and global lead of its Industrial practice. “However, the successes of the AI leaders in our sample clearly show that it can be done and that the business case for AI in industrial is very strong.”
The report mentions how companies that re-invent their products by combining AI with other digital technologies can reap huge rewards. For instance, it cites other Accenture research showing that mastering AI can enable industrial-equipment manufacturers to boost their market capitalization by as much as 25 percent.
How AI leaders succeed
To get to these kinds of results, companies must go through a journey which, according to the Accenture report, comprises four stages: (1) exuding belief in AI and its ability to digitally reinvent products; (2) building a vision for leveraging existing offerings with AI; (3) committing resources to AI-driven product reinvention; and (4) executing on their vision and planned initiatives to digitally reinvent the product at scale.
Through clustering the surveyed companies by both industry and “AI-journey stage,” the report shows that AI maturity seems to vary by industry: Automotive companies seem to be more likely to commit to and execute AI initiatives, with 9 percent reaching the third stage and 5 percent reaching the fourth stage. However, only 7 percent and 3 percent of consumer durables companies and industrial and heavy equipment makers, respectively, reach the third stage, with only 1 percent of companies in each of those two sectors reaching the fourth stage.
Other results indicate what sets apart the 16 percent of companies that are at least envisioning AI-enabled ways to reinvent their products: Companies that reach the “vision” stage develop the investment and ecosystem strategies to acquire, process and secure the data needed to drive maximum value from AI. Moreover, they carefully analyze what they need to focus on: 82 percent of these “visionaries” cited enhanced “customer loyalty” and “deeper insights from product and service usage” as the key value drivers for themselves. The same proportion also said that “greater safety” and “smarter solutions and services” would be critical benefits of AI use for their customers.
Most of the 5 percent of surveyed companies that commit significant resources to AI initiatives concentrate on building both the IT capabilities and the skills necessary for large-scale AI implementation: 91 percent of those companies cited analytics and systems integration skills as imperative, and 64 percent said they would change elements of their business model as a result of embedding AI.
The 2 percent that reach the fourth stage – execution at scale – set themselves apart by closely working with ecosystem partners to identify, in granular detail, the AI components they want to combine with other digital technologies, now and in the future, as part of their customer value propositions. Among the key AI solutions these companies are planning to use are computer vision (73 percent), deep learning (64 percent) and robotics process automation (64 percent).
“Our findings suggest a strong correlation between a holistic, well-planned strategy and AI success,” said Raghav Narsalay, a managing director and Industry X.0 research lead at Accenture. “However, three-quarters of the companies we surveyed are still experimenting, using what might be called a ‘scattershot’ approach. But this is likely to change in the near future — and that’s when we’ll really see a rise in product reinvention with AI.”
Results from the research also indicate that the rate of product reinvention with AI will likely vary by industry. Changing sources of profitable revenue is a priority for 65 percent of those in the automotive sector, for example, while the sub-groups of the reports’ “industrial equipment manufacturing” cluster are split: Most heavy equipment makers (57 percent) state that product-lifecycle sales and marketing strategy is their key priority, while 42 percent of those in the industrial and electrical equipment sector expect that embedding AI will lead to changes in their innovation architecture.
hordon kim / firstname.lastname@example.org
HMS 인더스트리얼 네트웍스, 독일 Beck IPC 인수로 IIoT 솔루션 강화
ABB, intrion 인수로 물류 로봇 솔루션 강화나서
중국 전기 모터 생산업체 Wolong, GE 소형 산업용 모터 사업부 인수
올소에너지, 스카이트론 에너지와의 합병
퀄컴, NXP 인수 무산…. 중국 승인 불발
마우저-이마하라, 로봇이 운영하는 호텔에서 AI를 보다
CSR, IoT 위한 블루투스 스마트 솔루션 CSR Mesh 출시
언제 어디서나 안전한 원격 접근 서비스, VSE(Virtual Support Engineer)
정책뉴스6 년 ago
[ICNweb] (캐리어) 삼성전자 R&D센터 – 무선 네트워크
로지스틱스12 개월 ago
[이슈] 딥러닝이 영상처리 스마트팩토리에 미치는 영향
로지스틱스1 년 ago
[테마취재] 물류센터 피킹, 이제는 말로 하자… 음성인식 기술과 작업 정밀도 향상
머신/팩토리12 개월 ago
[이슈] 현대로보틱스, 쿠카 소형 산업로봇 및 협동로봇 생산 판매 전망
로지스틱스1 년 ago
[기획] 스마트팩토리 구현을 위한 스마트 비전 솔루션의 진화
칼럼1 년 ago
[칼럼] 제4차 산업혁명, 공정한 혁신으로 사회안전망 재설계부터
정책뉴스1 년 ago
[카드뉴스] 자율주행차 국가표준(KS), 2021년 200종으로 확대
머신/팩토리10 개월 ago
[이슈] 지능형로봇, 기술 진보와 적용분야 확산 주목