Sunteți pe pagina 1din 24

MAY 2017

Inside:
 Technologies and
technicians p8
 The signal processing
perspective p12

Supplement to Periodicals Publication


No place PROVEN

to replace
a battery. 40
YEAR
OPERATING

LIFE *

Highly remote locations call for Tadiran batteries.

Battery replacement is costly and often ANNUAL SELF-DISCHARGE


dangerous work. Reduce the risk with
Tadiran bobbin-type lithium thionyl TADIRAN COMPETITORS
chloride (LiSOCl2) batteries. With an
annual self-discharge rate of just 0.7%
per year, Tadiran LiSOCl2 batteries enable
low power consuming wireless devices 0.7%
to operate for up to 40 years on a single
battery, up to 4 times longer than the
competition. Our batteries also feature the
highest capacity, highest energy density,
and widest temperature range of any
lithium cell, plus a glass-to-metal hermetic
seal for added ruggedness and reliability in Up to 3%
extreme environments.
Tadiran Batteries
2001 Marcus Ave.
Take no chances. Take Tadiran batteries that last a lifetime.
Suite 125E
Lake Success,
NY 11042
1-800-537-1368
516-621-4980
* Tadiran LiSOCL2 batteries feature the lowest annual self-discharge rate of any competitive battery, less than 1% per year, enabling these
batteries to operate over 40 years depending on device operating usage. However, this is not an expressed or implied warranty, as each
application differs in terms of annual energy consumption and/or operating environment. www.tadiranbat.com
input #100 at www.controleng.com/information
netIOT Edge:
Merging OT and IT in the Real World

netIOT Edge Gateways Merge Production


Operations with IT and Cloud Applications
Connects operational IoT data to IT and cloud services
for asset management, business analytics, predictive
maintenance, and more
Collects data as a slave on the I/O network or polls
data from the controller as a master
Runs parallel TCP/IP and IoT channels over real-time
Ethernet, OPC UA and MQTT
Ideal for brownfield and greenfield applications
Can function in promiscuous mode, with an air Learn more from Hilscher:
gap for secure physical isolation call 1.630.505.5301,
Integrated tools to support vertical communication email: info@hilscher.us or
to the cloud visit www.hilscher.com,
www.netIOT.com
Multi-cloud support: IBM Bluemix and Watson;
SAP Cloud Platform; Microsoft Azure, and more

2017 Hilscher North America, Inc. All trademarks are the properties of their respective companies.

input #101 at www.controleng.com/information


Get Your Business Set For Growth.
To grow your business, you need to not only streamline operations and expand
into new markets, but act on opportunities to enhance the customer experience.
Epicor provides industry-specific, tailored ERP solutions to get your business set for
growth and scale with business demand, fast. Together, we are the Grow Getters.

Get your business set for growth at:


epicor.com/getsetforgrowth

input #102 at www.controleng.com/information


MAY 2017 IIoT technologies can be seen
as an alternative to the tradi-
tional automation triangle
comprising control,
execution and enterprise
levels.

FEATURES

4 Cybersecurity risk spikes with mingling


of operations and IT technologies
Resources available to learn about frameworks; receive alerts,
advisories and reports

8 Smart devices make the difference


when determining shut-down causes

8
Succeeding generations of technicians, and technologies,
change plant-floor diagnostics

12 The IIoT opportunity seen


from a signal-processing perspective
Address challenges involving real-time signals exchanged
by many data-generating devices

NEWS

16 Connectivity server strengthened


in core product offering

16
Enhanced drivers support IIoT connectivity, bridge operation
and IT

 COMPOSITE COVER DESIGN by Michael Smith, CFE Media.

E DITORIAL N OTE
Cybersecurity is all about knowing things
I f nothing else, cybersecurity concerns remind
us of knowledges value. Quantitatively speaking,
half of organizations plan on increasing IT spending
overall this year. At the same time, 69% said they are
that value is only hinted at by all the money com- increasing spending on cybersecurity. Further, 48% will
panies are spending for better cybersecurity, not to make their most significant cybersecurity investment in
mention the bitcoin ransoms some already have paid cloud, 39% in network and 30% in endpoint security, as
to malefactors. According to SonicWall, by the end of well as 29% in security analytics.
2016s first quarter, companies had paid about $209 The cybersecurity strands knot at the intersection of
million in response to rapidly proliferating ransom- human and computer knowledge. Networks handle mil-
ware attacks. lions of data points, but arent context-aware enough to
Enterprise Strategy Groups annual IT-spending inten- always know to whom access shouldnt be granted. Hu-
tions research based upon a global survey of nearly 650 mans contextualize like mad, but then misread an email
IT and cybersecurity professionals found that just over when rushed and click when they shouldnt.
www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 3
ENTERPRISE ANALYTICS: SAFETY & SECURITY

Cybersecurity risk spikes


with mingling of operations
and IT technologies
Resources available to learn about cybersecurity frameworks;
receive alerts, advisories and reports

A
s a technology concept, connectivity will include a combina- incidents. Remote cybersecurity attacks
the term Industrial Internet tion of wireline and wireless technol- were reportedly used to cause the
of Things (IIoT) denotes, ogiesrather than being hardwired 2008 explosion of a pipeline in Turkey.
among other things, the ongoing and linear. Increasing digitization of In December 2015, the first successful
proliferation of intelligent sensors operations technology delivers ben- disruption of a public energy grid oc-
and better means-to- efits, Including improved productivity curred in Ukraine when attackers used
connectivity. These devices and and more reliable energy supplies. a spear-phishing campaign to obtain
means are then used in the administrator credentials, then
control and management remotely accessed the SCADA


of a wide variety of indus- network and halted electric-
trial assets throughout the
Responsibility for U.S. federal gov- ity distribution. The resulting
energy sector, including in ernment functions related to indus- blackouts affected more than
midstream oil and gas and 230,000 customers.
electricity transmission. trial cybersecurity is spread across Also in 2015, a major


IIoT-enabled technologies reconnaissance and data
not only enhance the ability
several departments and agencies. exfiltration attack targeted
to monitor asset- the American natural gas
performance in real-time, and geothermal electricity
they also enable management of Unfortunately, it also makes it eas- company Calpine Corp. Attackers
SCADA from remote locations. In ier for malicious actors to hack into operating from IP addresses in Iran
past, industrial-control systems (ICS) operational systems and remotely delivered a Trojan that established
were separate from corporate IT control, or cause catastrophic dam- remote access to the companys
networks. Today, precursors to, and age to, critical energy infrastructure. networks, including its operations-
the growing prevalence of, IIoT blur Alternatively, hackers can surrepti- technology environment. The hackers
the lines between at-the-process tiously access operations systems to made off with more than 19,000
technologies and IT, creating new quietly gather data from within an files, including drawings that detailed
vectors of cybersecurity exposure ICS, which can later be shared with the energy companys network archi-
and increased threat vulnerability bad actors. tecture; the devices used to manage
wherever PLCs, SCADA, and ICS are gas turbines, boilers and other critical
installed. The growing threat equipment; and a mapping of data
As these operations systems are The threat is not hypothetical. The flows between facilities around the
adapted to an open-standard, digital- global energy industry has already country and Calpine Corp.s cloud
age IT infrastructure, enhanced experienced a number of significant environment.

4 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


Even more recently, in 2016, the standards, guidelines and
U.S. Justice Department revealed practices to promote the SCADA defined
that Iranian operatives used a cel- protection of critical infra-

S
lular modem to compromise the structure.
upervisory control and data
command-and-control system of a The U.S. network of oil
acquisition (SCADA) implies a
dam in Rye, N.Y. Finally, in an alarm- and gas transportation
highly configurable set of indus-
ing warning delivered in Decem- and distribution pipelines
trial software applications that can
ber 2016, United Nations Deputy is the purview of the same
be used to support management of
Secretary-General Jan Eliasson spoke Transportation Security Ad-
almost any form of process produc-
of the growing threat of potential ministration responsible for
tion or discrete manufacturing, as
hacking attacks targeting nuclear security in the 440 airports
well as processes in oil and gas,
power plants. of the United States. Oil
mining and other heavy industries.
While cybersecurity attacks in any and gas pipeline managers
SCADA is a platform technology
industry can cause disruption or dam- can look to the cybersecu-
used to control and supervise many
age that costs money for businesses rity recommendations in
types of industrial processes but also
and individuals, a cybersecurity attack the Transportation Security
to optimize complex coordination of
that compromises SCADA in the Administrations Pipeline
operations, including with business
energy sector can be disastrousand security guidelines.
partners.
deadly. For this reason, the security The Federal Energy
measures developed in other indus- Regulatory Commission
triessuch as virtual private net- (FERC) is an independent agency that not create incentives for the con-
works (VPN), firewalls and antivirus regulates interstate transmission of tinual improvement and adaptation
technologiessimply are not sophis- electricity, natural gas and oil. The needed to respond effectively to rap-
ticated enough to prevent advanced idly evolving threats.


cyberattacks that specifically target In addition, The SANS Institutes
industrial-control systems in the Machine learning enables CIS critical security controls provides
energy sector. guidance for implementing cyberse-
Securing todays energy infra- industrial cybersecurity curity and risk management programs
structure requires a combination of
solutions to dynamically specifically for critical infrastructure.
sophisticated cybersecurity frame- The SANS Institute was established
works, training and software solu- map the entire network in 1989 as a cooperative research
tions specifically designed to address and education organization. It says
the unique threats our industries now
and learn industrial it is the largest source in the world


face in the digital age. processes. for information-security training and
security certification in the world.
Information sources Besides the adoption of frame-
As you might imagine, respon- North American Electric Reliability works, energy-asset owners and
sibility for U.S. federal govern- Corp. (NERC), which FERC has certi- operators should develop appropriate
ment functions related to industrial fied as the nations electric reliabil- supporting management practices,
cybersecurity is spread across several ity organization, has developed including employee training, perfor-
departments and agencies. Good critical infrastructure protection (CIP) mance tracking metrics and business
places to start your a quest for more cybersecurity reliability standards for intelligence related to their cyber-
insight into energy-sector cybersecu- electric smart grids. security program.
rity include the following: Note that while these standards
The Cybersecurity framework are a good place to begin, follow- Cultural aspects of security
implementation guidance from the ing their recommendations is in no Energy companies must develop
U.S. Department of Energy includes way mandatory. Moreover, they do a risk-management culture that
www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 5
ENTERPRISE ANALYTICS: SAFETY & SECURITY

focuses on identifying and prevent- security are especially a matter of attachments are opened, or laptops
ing cybersecurity vulnerabilities. This concern because employees are one or USB drives are inappropriately con-
can be done in much the same way of the weakest links in cybersecurity. nected to networks.
a culture for identifying and elimi- The cause of many, if not most, intru- Employees at every level of the or-
nating threats to physical safety of sions is that individuals unintention- ganization, from the executive suite
individuals and infrastructure was ally provide systems access to hackers to engineers to operators, should
developed in the U.S. and Europe by falling victim to spear-phishing receive ongoing cybersecurity train-
in the past. The cultural aspects of campaigns in which malicious email ing tailored to their job role. Those

Ransomware proliferation spurs increase


in cybersecurity attacks

A
recent Booz Allen Hamilton briefing con- enterprise networks increased by 33%. The total
firmed that spearphishing remains the pri- number of incidents reported by control operators
mary method of cybersecurity attack. It was rose by 20% in 2015.
the initial attack vector for Operation Clandestine Attacks on control systems can lead to tan-
Wolf, one of the largest industrial control system gible impacts, said Booz Allen, making them
(ICS) attack campaigns [of 2016], as well as attacks choice targets for attack. Instead of simply en-
on a German steel mill and Ukrainian electricity crypting files to make them inaccessible, as can
distributors, the two most destructive attacks dis- happen when a business is attacked, ransomware
closed [in 2015], stated the Booz Allen Hamilton attacks on ICS could disrupt operations or prevent
Industrial Cybersecurity Threat Briefing. access to an asset.
For 2015 and 2016, even though many intrusions The incorporation of ransomware into exploit
went unreported, it is known that at least 15 major kits facilitates a profitable build-once, infect-many
industrial incidents occurred. While there as yet approach, Booz Allen said. It has led to a veritable
no reported ransomware attacks on ICS, vulner- army of attackers, ensuring massive infection
ability has been a well-known fact for more than a rates. Infections for some variants were estimated
decade. The difference today is that the availability at 90,000 machines per day in February 2016,
of bitcoin digital currency allows criminals to finan- according to Forbes magazine. In fact, per the
cially benefit from attacks. As businesses and other Cryptothreat Alliance, between January and Oc-
possible ransomware targets become more difficult tober 2015 an estimated $325 million in revenue
to penetrate, attackers may turn to industrial- was generated from just one variant, Cryptowall
control systems as easier targets. Operators should version 3.0.
install intrusion-monitoring systems to alert them
if the digital forays of attackers penetrate process- The undocumented past
control networks. The problem is only compounded, Booz Allen
pointed out, when ICS are older and not restorable
By way of enterprise from backup. It also may be difficult to obtain a
The penetration of control networks by way clean version of system software and configura-
of enterprise networks is also on the rise, Booz tion settings. Access to the system itself may be
Allen confirmed, basing its conclusions on a difficult, and there may be a shortage of trained
study by the Department of Homeland Security. personnel for the restoration.
While enterprise-intrusion remained low, at 12% Frequency and severity of ransomware infec-
of reported incidents in 2015, during that time tions on ICS networks are likely to increase, the
the number of intrusions attempted by way of report concluded.

6 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


responsible for operations technol- Armed with this knowledge, a action to avoid service disruption,
ogy, the operators and engineers, cybersecurity solution can identify damage or downtime.
must be equipped with the knowl- in real-time if something out of the Cybersecurity threats to ICS are
edge needed to identify and address ordinary is occurring during the increasing and evolving as the propa-
threat vectors. Energy companies normal industrial-process cycle. The gation of digital-driven IoT technolo-
must make these individuals their ability to be fully passive means gies in the energy sector continues to
first line of cyberdefense. grow. By making our critical infra-


Energy-asset owners and opera- structure more secure and resilient
tors can leverage the SANS Insti- through the adoption of detailed
tutes global industrial cybersecurity
Simply creating an alert cybersecurity protocols, educational
professional certification program, about an atomic event programs and solutions designed
which trains ICS operators how specifically for the critical infrastruc-
best to recognize and react to
or anomaly without the ture in these energy sectors, com-
cyberattacks. The U.S. Department proper situational con- panies can minimize cyber vulner-
of Homeland Securitys Industrial abilities and better protect industrial
Control Systems Cyber Emergency
text will not provide infrastructure against the new threats
Response Team (ICS-CERT) also operators with the in- that come with ever-increasing indus-
provides both in-person and online trial digitization. IIoT


training courses. sight they need.
ABOUT THE AUTHOR
For the energy sector
Energy companies must architect that a solution should be non- Ken Hans is a vice president with
their systems to minimize exposure intrusive, requiring zero downtime Trellis Energy, a wholly owned
to the possibility of bad actors and zero interruption to the exist- subsidiary of Blackstone Technology
accessing systems from a remote ing industrial-control network to Group, a technical and management
location. Threat-detection tools install, setup, learn and monitor the consulting firm. Through Trellis En-
specifically for industrial networks network. ergy it provides technology solutions
in the energy sector are available. Important for cybersecurity solu- for midstream oil & gas, as well as
Unlike general-purpose IT security tions in the energy sector is the abil- for electricity grids.
solutions, technologies purpose- ity to provide situational awareness
built for the industrial energy sector to specific security incidents. With MORE
can help identify security incidents, an increasing number of sensors and INFORMATION
malfunctions or misuse in the digital technologies throughout our U.S. Department of Energy; Office of electricity deliv-
industrial-process network, service energy infrastructure, operators can ery and energy reliability; Energy sector cybersecurity
disruptions, anomalies in the ICS be overwhelmed by a deluge of data framework for implementation guidance
www.energy.gov/oe/downloads/energy-sector-cyberse-
and other relevant parameters. originating from multiple systems. curity-framework-implementation-guidance
Important features to look for The reason for this is clear. Simply Sans Institute; CIS critical security controls
in cybersecurity solutions include creating an alert about an atomic www.sans.org/critical-security-controls
machine learning, the ability to be event or anomaly without the proper Transportation Security Administration (TSA);
Pipeline security guidelines
fully passive, and the ability to pro- situational context will not provide www.tsa.gov/sites/default/files/tsapipelinesecuri-
vide situational awareness. Machine operators with the insight they need tyguidelines-2011.pdf
learning enables industrial cyber- to make decisions that allow a quick Federal Energy Regulatory Commission (FERC)
security solutions to dynamically and appropriate response. and North American Reliability Corp. (NERC)
www.ferc.gov/industries/electric/indus-act/reliability/
map the entire network and learn Cybersecurity solutions can corre- cybersecurity.asp
industrial processes, such as what late individual anomalies into threat Dept. of Homeland Security, Industrial control systems
each PLC touches, whether these events and present to operators and cyber emergency response team (ICS-CERT). The site
includes mechanisms so interested parties can receive
be control valves, switches, actua- engineers perceived threat levels and alerts, advisories and reports.
tors or other. the context needed for appropriate https://ics-cert.us-cert.gov/

www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 7


CONNECTIVITY & COORDINATION: PLANT ASSET MANAGEMENT

Smart devices make the


difference when determining
shutdown causes
Succeeding generations of technicians, and technologies, change plant-floor diagnostics

A
process shuts down or already retired. Those taking their technology (IT) are converging. Tools
unexpectedly. A plant tech- places may know the latest software being used on plant floors today re-
nician is called to find and tools, but how good is their under- flect that. For traditional operations
fix the problem. No one witnessed standing when it comes to the best peoplemany of whom have been
exactly what happened. The techni- way to diagnose a failed or failing around for as many as 30 years
cian must therefore systematically motor or pump? the primary tools are the voltmeter,
inspect the equipment involved. He ammeter and oscilloscope. These
or she might restart the process, individuals have the skills and quali-


hoping to make it repeat the fault fications to enter a live panel and
condition. However, numerous Wireless and other work in it safely.
components are involved. Applying Those from an IT background, on
diagnostic tools to any one of them IIoT technologies can the other hand, have a modus ope-
is time-consuming, and the techni- randi that tends more to plugging in
cian typically can focus on only one
deliver real support to an Ethernet cable and going back to
process component at a time. the office, or using a smart phone,
troubleshooting efforts,
Todays Industrial Internet of Things to view the relevant data. Theyre
(IIoT), including wireless smart de- matching emerging probably not very comfortable get-
vices, can help rectify the situation. ting into live equipment, nor do they
The technologies involved do so by technologies with a have the experience with the tools
giving technicians quick access to the that the previous generations used
right information. They can quickly new generation of regularly. Yet trends indicate these
determine what equipment was not people will be be responsible for


involved, reducing troubleshooting technicians. maintenance in the future.
time. In addition, smart, connected Although wireless monitoring is
devices deliver real-time informa- useful, its most useful when inte-
tion during a process restart. These In these circumstances, wireless grated into an asset-management
valuable diagnostics were virtually and other IIoT technologies can system. However, at the same time,
unavailable or financially impractical deliver real support to troubleshoot- tethering a smart device to the
on factory floors until recently. ing efforts, matching emerging asset-management system can be a
What makes this an urgent topic technologies with a new generation challenge, because locating data for
is that maintenance budgets are of technicians. a given component or sensor requires
under pressure even as population going to a dedicated terminal. For
demographics indicate our most Purpose of convergence troubleshooting, its better to have
experienced and skilled technicians It has been widely remarked that access to the asset-management
and engineers are near retirement operations technology and information data from the plant floor, without

8 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


When connected to a smart device, a smartphone becomes a diagnostic tool for the plant floor. All images courtesy: Littelfuse

recourse to a dedicated workstation example, from the motor-protection through normal readings to find
being necessary. relay. Technicians also have access anomalies. This wastes time and is a
An example of a smart device that via a smartphone application to all negative incentive for any technician
can prove very useful, if not tethered associated information in the cloud, who wants to be productive. The
to the asset-management system including manuals, datasheets and service person needs data pertaining
workstation, is a motor-protection the like. to the exception, not the rule.
relay. A motor-protection relay moni- As an example, lets say in the past
tors for multiple faults, including Data needs context there was a power problem. To ad-
overloads, underloads, undercurrent, Like IIoT itself, Big Data is use- dress the situation the first step was
current imbalance, phase loss, phase ful as a concept because it reflects that someone from a utility company
reversal, overvoltage, under-voltage, the growing power of information hooked a logging meter up to the
voltage imbalance, rapid cycling/ technology in industrial-operations power system. Once a minute, it
jog, contactor failure, zero-sequence environments. As a term having a printed out a set of voltages. The
ground fault and motor overtemper- certain currency, it is part of the real- utility company left it logging for
ature. Most motor-protection relays ization that a lot of the process data days. Eventually, a representative
have a networking connection that we already have in hand or which would say, Well, everything looks
allows their use with Modbus, De- we can easily acquire will now cost- good to us; heres a stack of paper
viceNet, Profibus, Ethernet or some effectively be put to good use. that we just printed out; we didnt
other network standard. Data, however, is of little use to see anything wrong there.
Even short-range wireless con- a factory-floor technician unless its All the stack of paper proves is
nectivity allows a plant-floor tech- properly filtered and context pro- there were many long hours of
nician access to all appropriate vided. In todays world, a technician normal operation. The one or two
data, including the fault history, for might spend hours or days sifting bad readings in that paper stack that
www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 9
CONNECTIVITY & COORDINATION: PLANT ASSET MANAGEMENT

it would be useful to know of, may Lacking a remote display, the elec-


take some time to uncover. trician gathers whatever diagnostic
Storing data in the cloud may be Like IIoT itself, Big equipment might be neededvolt-
more convenient and promise better meter, ammeter or other device.
productivity, but digital records are Data is useful as a con- He gears up with the appropriate
often just as poorly utilized as that personal-protective equipment,
stack of paper. We should be very cept because it reflects depending on the arc-flash-hazard
specific about what we store, and level indicated on the panels
not just store everything we can, the growing power of arc-flash warning label. Finally, he
even if we have the room to do it throws the disconnect on the panel
and its not expensive. There must
information technology to off and opens the panel.
be a purpose behind all of it, and The electrician then re-energizes
in industrial operations
we must be able to use it quickly the open panel and resets the relay.


and easily, to our advantage. environments. If the motor-protection relay has a
display, the electrician can push the
A closer look reset button to bring up the code
To see the difference that IIoT and for the last fault. If the relay has a
wireless can make, lets go back to When the electrician walks up to network port, its also possible to
our earlier example. A cooling pump this equipment, he or she really has plug in a laptop or tablet and get
quits. The operator calls the mainte- no way of knowing what just hap- the same information.
nance electrician and says, Ive had pened. They only know the equip- The electrician restarts the motor,
cooling pump number-two go down ment tripped off, was reset, and which runs for a couple of seconds
twice; I reset it and it went down tripped off again. It could be a power and trips right back off. He con-
again. You need to come down problem, blown fuse, damaged motor nects a single-phase ammeter to
here and figure out whats wrong starter, bad motor or pump bearings, the first phase and tries to restart.
with this thing. Weve stopped the failed motor or any of a host of other Finding the current normal, the
process. potential problems. electrician goes to the next phase,
The pump motor has some sort of and continues until finding a phase
electrical protectioneither a simple in which the current is not normal.
overload or, if He inspects the wiring and finds a
the electrician is conductor thats bad. Hes solved
lucky, a smart the puzzle, but it has all taken a fair
motor-protection amount of time.
relay. If the
motor-protection The difference IIoT makes
relay is equipped What would happen in the same
with a remote dis- situation, if the motor-protection
play, or if the cabi- relay were a smart unit connected
net has a window wirelessly? The narrative runs a bit
that allows looking at different. The electrician walks up to
the local display, there the panel but does not de-energize
may be some indication of it or open it. Instead he pulls out a
what went wrong. But few smartphone, bring up an applica-
A motor protection power panels have such win- tion and connects the smartphone
relay is an example of a dows and most motor-protection via Bluetooth to the pumps motor-
smart device that communicates to a relays are installed without remote protection relay. The fault history
technicians smartphone via a Bluetooth displays. A simple thermal-overload indicates the device has tripped
connection. device has no display at all. twice recently on what is considered

10 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


a contact failure. The electrician
reviews other related information Bluetooth beats Wi-Fi on plant
and sees that during the fault one
of the currents on a three-phase
floors, due to range limitations
motor is at zero amps. Clicking on

K
the information screen produces a ip Larson, a director of product technology at Littelfuse, says
contact-failure message, which Wi-Fi, the most-frequent choice for wireless Internet access, is
means the voltages are normal but
not as good a choice for plant-floor diagnostics as Bluetooth.
theres a single phase in the current.
The potential causes listed include To start, Larson said, It has too wide a range, posing security
a faulty contactor, motor starter or concerns. A single Wi-Fi hotspot can have a range up to several
motor wiring. hundred feet. Bluetooth has a shorter range. The smart overload
At that point, the electrician turns relay used as an example in the article uses Bluetooth 4.0. Blue-
off the panel disconnect. Its un-
tooth Low Energy (aka BLE or Bluetooth Smart) Class 2, should
necessary to put on any protective
equipment because the electrician have a range of about 20 meters in open air, and 5-10 meters when
wont be working on a live panel. mounted inside a closed metal cabinet. This allows the electrician
A quick inspection inside the panel or technician to communicate with the relay while standing next
doesnt show anything obviously to the motor, but it stymies more distant intruders. In addition, the
wrong, so the next step is to check
relay and the smartphone appication that goes with it require a
the pump-motor wiring. Opening
one-to-one pairing code, plus password security, for changes.
the junction box shows one of the
motor terminations is discolored,
indicating damage from heat. After have to inspect the motor or pump wireless technology such as Blue-
repairing the bad terminal, the elec- for mechanical problems. The power tooth, combined with data storage
trician closes the junction box and system wasnt to blame, so it wasnt in the cloud, greatly simplifies elec-
re-energizes the panel. Everything necessary to haul out the voltmeter trical maintenance. It also fits in well
works and the problem is solved. and test the power system. with the way the next generation of
The motor-protection relay pre- Three of five possible problems technicians approach their work. IIoT
vented damage to the motor. Use of were eliminated by having direct ac-
diagnostic equipment or work in a cess to plant-floor fault information. ABOUT THE AUTHOR
live environment wasnt required. The The key was getting to it quickly.
electrician found the solution to the Best of all, there was no need to Kip Larson is director of product
problem quickly without any tools haul out the manual for the relay technology, electrical business unit,
other than the smartphone in his because that information was readily protection relays, Littelfuse. He has
pocket and perhaps using a screw- accessible via a smartphone applica- more than 30 years of industrial
driver to open the terminal box. tion that brought up the appropriate electronics product design and ap-
An intelligent motor-protection section of the user manual, includ- plication experience. He received a
relay with a Bluetooth connection ing the fault description and its pos- B.S. in electrical engineering from
to a smartphone eliminated most of sible causes. South Dakota School of Mines and
the work and time required to solve Technology.
the problem. It was unnecessary to Final words
look at the fuses because the fault IIoT devices show great promise
record showed they werent a prob- for plant maintenance but efforts
lem. Nor was there indication of an will be limited if connections are via
overload, such as from bad bearings Ethernet or other wired networks, or MORE
or something wrong in the motors if less-than-secure wireless systems INFORMATION
operation. The electrician didnt are needed. Use of a short-range For more information, www.littelfuse.com

www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 11


SENSING & CONTROLS: SIGNAL PROCESSING

The IIoT opportunity seen from


a signal-processing perspective
Address challenges involving real-time signals exchanged by
many data-generating devices

I
n future, the process- that IIoT will be the driver for third industrial processes. Autonomous
production and discrete- industrial-innovation wave. machine capabilities enabled by IIoT
manufacturing industries But what does IIoT mean from a culminate in cyber-physical produc-
increasingly will rely on the Indus- signal-processing perspective? tion systems (CPPS). In other words,
trial Internet of Things (IIoT) to systems for which the boundary
improve operations. While there are Signal processings role between what is physical and what
many definitions for IIoT, one of the The IIoT concept includes all the is digital becomes increasingly indis-
more common is a distributed net- main characterizing features of the tinguishable.
work of smart sensors that enables IoT computing paradigm, including Signal processing plays a critical
precise control and monitoring of ubiquitous sensing, data interaction role as an IIoT enabler, despite being
complex processes over arbitrary overshadowed by other aspects of
distances. IIoT, including the communication


A 2016 survey by PriceWater- architectures, sensing technologies
houseCoopers revealed that 33% of
Even multimedia signal and power management involved.
leading industrial and manufactur- Advanced machine-learning ap-
ing companies with current high
processing contributes proaches will support predictive and
levels of digitization are projected to IIoT development, prescriptive analytic solutions by
to increase their digitization efforts connecting previously stranded data
to 72% by 2020. The survey of despite appearing to be from smart sensors, equipment and
more than 2,000 participants from other assets.
26 countries showed that leading a technology quite far This eases the means to enable
investment areas include vertical condition monitoring, failure diag-


value-chain integration (72%), prod- from this domain. nostics, efficiency improvement and
uct development and engineering downtime reduction. By anticipat-
(71%) and customer access, includ- ing failures, these approaches assist
ing within sales channels and for and collection and data analysis. with continuous improvement at
marketing efforts (68%). These functions are enabled by design and manufacturing levels.
Almost 72% of manufacturing machines that talk to each other as The IEEE Signal Processing Society
enterprises surveyed predicted their they complete tasksin a smarter (SPS) IoT Special Interest Group
use of data analytics would improve and more efficient way than possible (SIG) promotes the development,
customer relationships, and 35% of by humans acting alone. Machine- standardization and application of
companies adopting the European to-machine communication sup- signal- and information-processing
variant of IIoT, Industrie 4.0, expected ports autonomous communications technologies targeting unique chal-
revenue gains higher than 20% over among devices. It enables collabora- lenges from emerging IIoT scenarios.
the next five years. These results tive automation between machines These challenges, among others,
illustrate the growing expectation and intelligent optimization of include: analyzing, summarizing

12 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


and protecting real-time signals and
information exchanged by many
data-generating devicesincluding
sensors, machines and robotsand
their corresponding data-processing
nodes.

Focus on the industrial


Significant industrial sectors
impacted by IIoT include process
production, discrete manufacturing,
utilities and oil and gas. However,
these industrial applications also
have relevance in areas such as
smart cities or smart agriculture
domains. The common foundation
of these sectors relies on the basic
integration between information
technology (IT) and operation tech- Signal-processing techniquesaimed at more efficient radio transmission, communication
nology (OT), enabled by the IIoT. protocols and use of the shared radio are important to the success of IIoT technologies.
The IIoT market is estimated to Courtesy IEEE SPS
reach near $124 billion by 2021.
According to Ovum, the more  Because long-lifecycle legacy power devices supported by batter-
remarkable investments today are field devices wont be upgraded ies, which constrain the continuous
taking place in industrial settings anytime soon, to achieve ubiq- operations of IIoT systems.
such as manufacturing, transporta- uitous IIoT the solutions must In the IIoT domain, data collection
tion and utilities. Automotive and be appendages to in-service relies heavily on massive numbers
consumer IoT, as well as ad hoc products. of sensor nodes and smart devices.
IoT-enabled smart-city projects are Thus, optimized IIoT sensing, pro-
emerging. Typical cross-industry IoT  The scaling of vertical IIoT cessing and communications may ef-
use cases include smart lighting and solutions presents challenges. fectively reduce energy consumption.
smart traffic solutions in cities, intelli- Acting as the backbone of IIoT sys-
gent machine applications, condition  Engineering managers resist de- tems, wireless sensor networks are
monitoring, smart agriculture, and ploying unproven technologies. the main source of energy consump-
healthcare. These cases are on the tion. Therefore, signal-processing
rise and expected to grow even more Energy consumption techniquesaimed at more efficient
in 2017 under the IIoT umbrella. Even In its early stages, IIoT has radio transmission, communication
As IT and OT converge, IIoT tech- been used to reduce resource con- protocols and use of the shared radio
nology enables more innovative, sumption and carbon emissions by resourcebecome critical and have a
on-demand approaches to customer industrial systems. Nevertheless, IIoT practical impact. Similarly, the design
out-reach. As a result, newand systemsincluding a diversity of of efficient power management
sometimes unexpectedrevenue devices with sensing, processing and algorithms for systems and nodes
and business models emerge. communications capabilitiescon- supplied by batteries is essential
Yet despite innovation and increas- sume substantial amounts of energy, to ensuring a long lifetime for the
ing awareness about IIoT opportuni- which can contribute to a larger industrial infrastructure.
ties, the industrial sector lags in fully carbon footprint. On the other hand, Even multimedia signal process-
embracing IoT for reasons as follows: IIoT systems typically consist of low- ing contributes to IIoT development,
www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 13
SENSING & CONTROLS: SIGNAL PROCESSING

despite appearing to be a technol- algorithms to process multimedia improves learning and aids in devel-
ogy quite far from this domain. signals. oping skills to deal with unanticipat-
Multimedia signal processing lever- They must perform at high speeds ed plant situations. Workers increase
ages new technologies, including due to the real-time operational their confidence in performing the
gaming, augmented and virtual constraints involved; with high preci- job functions assigned to them as
reality, 3-D displays and wearable sion in terms of synthetically local- well as in dealing with emergencies.
devices for new workers who must izing the user into a virtual scenario Other simulation applications include
be trained or those who are already reproducing the plant; and with high testing and validating new software
employed within the production responsiveness, due to the very short and supporting system migration.
plant. High-fidelity simulation-based delay between the action performed Raw and real-time data from
applications for training, or for real by the user in the virtual domain and sensors and end nodesand ag-
operation on the plants and their its effect on the real, physical plant. gregated data from information
assets, require extremely efficient Running these immersive simulations sources like intermediate systems
and devices, which can be queried
via built-in capabilitiesfuel the
The role of the development of robots capable of

IEEE Signal Processing Society taking specific actions. IIoT becomes


a driver of autonomous decision-
making devices. Such an Internet of
IEEEs Signal Processing Society (SPS) is the worlds premier asso- robotic things, already in place in
ciation for signal-processing engineers and industry professionals. big warehouses, requires develop-
Engineers around the world look to the society for information on ment of extreme machine-learning
the latest developments in the signal-processing field. algorithms to support intelligent
robots that can self-assign tasks and
 The societys deeply rooted history spans almost 70 years, operations and make decisions.
featuring a membership base of more than 19,000 involved Use of IIoT, within a broader
context, will ultimately lead to con-
signal-processing engineers, academics, industry professionals
nected ecosystems that encompass-
and students. es supply chains, factories and all
manner of industrial and commercial
 The purpose of SPS Internet of Things Special Interest Group is
facilities, thus giving the extended
to promote the development, standardization and application enterprise concept a new meaning.
of signal- and information-processing technologies targeting
unique challenges from emerging IoT scenarios that require Signal-processing perspectives
analyzing, summarizing and protecting of real-time signals and Unique signal-processing needs
arise from the IoT ecosystem. These
information exchanged or shared by massive data-generating
include: robust information sensing
devices such as sensors, machines, robots, cars, etc., and their
from complex and adverse environ-
corresponding data-processing nodes. ments using massive connected
sensors and distributed signal pro-
 Examples of unique signal-processing challenges from IoT
cessing; low-power situation-aware
include: robust information-sensing from complex and adverse data-transmission and processing;
environments using massive numbers of connected sensors and and the privacy-preserving process-
distributed signal processing, low-power situation-aware data- ing of information that is shared by
connected things.
transmission and processing and privacy-preserved processing
In IIoT systems, data-transmission
of information shared by connected things.
and its sharing among machines is
critical to the performance of the

14 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


whole system. Therefore, research tions might include mobile robots in embedded systems, and by het-
and investigations in this area are able to collaborate with humans to erogeneous communication tech-
gaining interest as new machine- perform complex tasks; wearable nologies that range from Ethernet
to-machine standards and protocols computing platforms for industrial connections to wireless and cel-
emerge, combined with affordable environments; additive manufactur- lular gateways. Protocol conversion
sensing and communication mod- ing; and IIoT technologies that drive gateways can interface disparate
ules. However, due to the complex networks in the framework of the
system structure and heterogeneity emerging device-to-cloud integra-


of hardware and software platforms, tion trend. Fog computing and
ubiquitous access and interoperable
The design of efficient streaming data analytics will lever-
sharing of the machine-generated age IIoT to feed any sort of artificial-
data are still open issues. An under-
power management intelligence application.
lying standard messaging mecha- IIoT is going to dominate the evolu-
nismbased on cross-platform
algorithms for systems tion of manufacturing and industry
technologies to support the com- in the coming years. It will be driven
munication between machinesis
and nodes supplied by by the increasingly vanishing bound-


a significant factor in the success of ary between the physical and the
autonomous industrial systems to
batteries is essential. digital worlds. New approaches in
ensure proper quality of the col- will tackle the many challenges and
lected data and information. opportunities: from data curation and
In April 2016, Morgan Stanley increased supply-chain visibility. In processing, to advanced and efficient
published the results of a survey their turn, IIoT solutions will support communication technologies, to ex-
from which data security and a set of flourishing applications, like treme machine-learning algorithms. It
cybersecurity emerged as growing asset-monitoring and tracking, smart is important now for the engineering
concerns for organizations rely- grids, digital oil fields and smart community to foster research and
ing on universal connectivity, as is buildings, with an initial focus on innovation in this exciting field by
the case for industrial applications energy management. supporting actions that highlight the
enabled by IIoT. These environ- importance of signal processing, in its
ments typically feature hybrid- and Edge-device evolution many manifold flavors, for improved
mixed-connectivity solutions that Edge devices or intelligent gate- productivity in industrial environ-
range from cellular and low-power ways also play a prominent role in ments. IIoT
wide-area networks to industrial- the growing IIoT infrastructure and
connectivity solutions that require these network devices will be used ABOUT THE AUTHOR
innovative approaches to data and to collect, aggregate, filter and relay
communication security, far be- data close to industrial processes or Susanna Spinsante, PhD, is senior
yond the traditional firewall-based production assets. By running analyt- member of the IEEE and member of
solutions used in legacy network ics and advanced machine learning Signal Processing Societys Special
infrastructures. In this context, signal algorithms, they detect anomalies Interest Group on IoT. Shes also an
processing helps companies design in real time and communicate to RTDA (temporary researcher) at the
new security tools that are IIoT-com- operators. Therefore, the emerging Universit Politecnica delle Marche,
patible, based on the distributed- trend is to move intelligence to the Ancona in Italy. You can reach
ledger concept at the foundation of network edge, closer to the data Susanna at s.spinsante@univpm.it.
blockchain, or exploiting efficient sources. This is also a viable option
and robust mathematical primitives, when it is not feasible to run analyt-
such as elliptic curves. ics on a cloud platform or when a MORE
Signal-processing aspects of IIoT cloud-based solution is unavailable. INFORMATION
will see increasing adoption in 2017 In IIoT, the edge of the network is For more information, please go to
and beyond. These new manifesta- being populated by devices, including www.signalprocessingsociety.com

www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 15


IIoT IN THE NEWS

Connectivity server strengthened


in core product offering
Enhanced drivers support IIoT connectivity, bridge operations and IT

K epware announced the re-


lease of KEPServerEX Version
6.1 connectivity software.
well as complex data types. Pack-
aged with the Siemens Plus suite,
the enhancements provide the  Enhanced SCADA
addresses global
The release strengthens the connectivity only Siemens-approved method
platforms core server functionalities that for third-party communication to developments
support operational intelligence and S7-1500 PLCs using optimized
rapid deployment of Industrial Internet data blocks. Schneider Electric announced
of Things (IIoT) solutions. Key updates availability of ClearSCADA 2017,
include an enhanced OPC UA client  Configuration API updates: with location services and integrat-
driver, expanded API-configuration Customers using the API to ed-mapping functionalities. The
capabilities and new connectivity- remotely create, read, update driving force behind this product
mapping features. and delete (CRUD) configuration upgrade was to enhance insight
The release puts a bow on the objects in the server can now and control for customers manag-
IoT-friendly and enterprise-ready con- perform these actions on the ing geographically dispersed infra-
nectivity solutions of Version 6.0, IoT Gateway advanced plug-in. structure; particularly those within
said Tony Paine, platform president, Configuration API has also been the upstream oil and gas, mining,
Kepware. Our goal was to balance enhanced to support access to water and wastewater and power
the productivity demands of our tradi- event-log messages without the and utility sectors.
tional industrial-operations customers configuration client. Industrie 4.0 adoption coupled
while developing new features and with broader economic, political
functionalities that enable customers  Enhanced KEPServerEX inte- and environmental developments
to bridge the gap between operations gration with the ThingWorx are rapidly redefining global op-
and ITand prepare them for emerg- industrial IoT platform: Enables erations, driving a need to better
ing industry needs and opportunities. users with smart, connected standardize technology adoption,
The release addresses the industrys manufacturing applications or enhance security protocols and
need to produce and analyze diverse products that leverage industrial improve predictive-analytic capa-
types of data to supply a wider, more controllers to seamlessly map tags bilities. These forces impact the
diverse set of client applications, the within the server to properties on management of remote assets,
company also said. devices connected to ThingWorx. critical infrastructure and opera-
The newly released version includes tions personnel spread over vast
the following: In addition, the release introduces geographical areas.
the new CODESYS Ethernet driver for The upgrade addresses these
 OPC UA client driver updates connectivity to devices running COD- challenges with embedded loca-
and new Siemens Plus suite: ESYS V2.3. It also features enhance- tion-based alarming and filtering,
Users will have full access to con- ments to 34 key drivers. IIoT overlaid with real-time weather-
trollers with embedded OPC UA data and GPS mapping. This allows
Servers. Updates to the OPC UA MORE insight into asset performance,
client driver include support for INFORMATION with alarming and graphical in-
OPC UA Nano profile servers as For more information: www.kepware.com terfaces consolidating and trans-

16 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


forming real-time process data robots to read and respond to HMI
into business-critical information, screens, perform quality inspections
heralding a new era of control in and monitor part status. Analytic
telemetry and remote SCADA dashboards deliver a real-time view MORE
applications. into the status of robots, machines INFORMATION
Location support improves clar- and specific jobs. IIoT For more information: www.tend.ai
ity of asset position and status via
location-based alarming and filter-
ing, with asset locations displayed
on integrated maps. These maps
facilitate selection of online map
sources, ArcGIS map information
or web-map service information.
Active-directory user access allows
central management and permis-
sions through the active directory,
with new user accounts created
automatically on logon. IIoT

MORE
INFORMATION
For more information: http://software.schneider-
electric.com/clearscada/.

 Cloud platform for


robotics released
The company Tend announced
what it said is the first hardware-
agnostic, smart-cloud robotics soft-
ware platform that allows manufac-
turers to remotely control, monitor
and analyze robot and production
equipment performance from mo-
bile devices. The Tend product in.
control makes smart manufacturing
simpler and accessible for companies
of all sizes, allowing control of any
robot, tending any machine, from
any location, the company said.
Through a secure application,
the product allows users to moni-
tor their production lines remotely,
from a simple mobile interface. The
solution allows customers to ex-
tend the flexibility of their existing
automation equipment by enabling
IIoT For Engineers MAY 2017 | 17
input #103 at www.controleng.com/information
CFE Medias
Global System Integrator Database

CFE Medias Global System Integrator Database is an interactive community


of global end-users and system integrators hosted by Control Engineering, Plant
Engineering, and our global partners in Asia and Europe.

The newest version of the online database is even easier to use.


Features and updates:
Relevancy score indicates how closely New feature allows an end-user to
an integrators qualifications match a request a quote for a project directly
users search criteria from the database site

Users can now preview the most The most relevant data about an
pertinent data of a System Integrator integrators engineering services appear
before clicking to view the full on one page on their corporate profile
corporate profile other details are organized by tabs.

As a Systems Integrator there are quite a few options available


for online advertising. They vary in functionality and design,
but the Global System Integrator Database has been our go to.
It is easy to use, professionally designed, and has given us a great
deal of exposure to clients we wouldnt normally be able to reach.
We have had more clients contact us with this solution than any


other System Integrator database combined. We not only going
to renew our profile this year, we plan on upgrading.
William Aja, Panacea Technologies

Find and connect with the most suitable service


provider for your unique application.

www.controleng.com/global-si-database
IIoT IN THE NEWS

also ensures prompt actions are taken that desire a visible deterrent to po-
in the event of an emergency. tential intruders, as well as an A-UGV
 Oji Group implements Networks help to create new capable of managing repetitive tasks
next-generation plant value by connecting various types of in dangerous environments, said
network solution devices, but it is essential to be able Cliff Quiroga, vice president of Sharp
to flexibly change their configuration, Robotics Business Development.
Yokogawa Electric Corp. an- quickly respond to surges in data vol- Capturing video, audio and envi-
nounced that its subsidiary, Yok- ume and ensure secure operations. ronmental data, and communicating
ogawa Solution Service Corp., For the optimal implementation of that to a command-and-control cen-
completed installation of a software- IIoT technology, attention is now in- ter, requires an advanced network.
defined networking (SDN) solution creasingly turning to the use of SDN As a mobile platform capable
at four paper plants in Japan that technology in plant IT infrastructure. of traversing terrain, the A-UGV
are operated by group companies This also will help company IT depart- can perform outdoor surveillance,
of Oji Holdings Corp. This is the ments manage the infrastructure in a security, safety and maintenance
first-ever plantwide implementation more integrated manner. inspection patrols. Optional features
in Japan of SDN, software-based Capitalizing on its production site detect toxicity levels, capture images
technology that enables creation of know-how, Yokogawa says it will and sounds and use so-called light
virtual-network environments. continue in its endeavors to introduce detection and ranging to measure
With conventional plant networks, SDN and other cutting-edge tech- variable distances.
network devices such as routers and nologies that enable realization of The Sharp A-UGV extends the
firewalls must be installed and con- smarter plant IT infrastructure. IIoT impact of traditional security forces,
figured for each individual applica- so it stands to reason that it would
MORE
tion, location and facility. require a network infrastructure
SDN technology enables flexible
INFORMATION capable of supporting continuous
For more information: www.yokogawa.com
implementation of virtual networks connectivity and real-time com-
for each individual application, munications of sensor and monitor-
linking network devices using the ing data, said Bob Schena, Rajant
same physical network. This facili-  Mesh wireless network chairman and CEO. IIoT
tates the integrated management, chosen for unmanned MORE
implementation and reconfigura-
vehicle INFORMATION
tion of networks. It also reduces the
For more information: www.rajant.com
required number of network devices Rajant announced that Sharp
and the amount of wiring to be Electronics Corp. will use its kinetic-
performed, saving both operating mesh technology as the wireless
and management costs. Further, the communications infrastructure for  Solution released
visualization of network status leads the Sharp INTELLOS automated un- for the secure use of
to enhanced security. Problems can manned ground vehicle (A-UGV).
USB devices
be identified, and network operators The mobility, reliability and scal-
can shut down specific segments of ability of Rajants network were key Honeywell Process Solutions an-
the plant network in the event of an reasons for the companys selection. nounced a solution for industrial sites
emergency. Its radios, networking software, balancing productivity and cybersecu-
Yokogawa also is providing on a military-grade security and cryp- rity demands. Honeywells Secure Me-
trial basis a security-management tography support the autonomous dia Exchange (SMX) protects facilities
service that monitors the status and applications and network infra- against USB-borne threats, without
health of the networks throughout structures of large companies, the complex procedures or restrictions.
these plants. While enabling timely company said. Malware spread through USB devices
preventive measures that help to The outdoor security robot is a used by employees and contractors
maintain network health, this service strategic investment for companies to patch, update and exchange data
www.controleng.com/IIoT IIoT For Engineers MAY 2017 | 19
IIoT IN THE NEWS

rely on USB-removable media to get ever for smart industry, IIoT and criti-
their jobs done. Plants need solutions cal infrastructure protection.
that let people work efficiently, but The solution provides hassle-free,
also dont compromise cybersecurity multi-layered protection for managing
and, with it, industrial safety. USB security, letting users simply plug-
Many plants ban USBs, but bans in and check devices for approved use
can be difficult to enforce and one in the facility. Contractors check-in
that significantly reduces productivity. their USB drive by plugging them into
Others rely on traditional IT malware an SMX Intelligence gateway. The
scanning solutions, which are difficult ruggedized industrial device analyzes
to maintain in an industrial-control files using a variety of techniques
USBs are too convenient to abandon, but facility and provide limited protection. included with Honeywells advanced
their use needs to be managed. Courtesy: Neither way protects process-control threat intelligence exchange (ATIX), a
Honeywell Process Solutions networks against the latest threats, hybrid-cloud threat analysis service.
nor offers a means to address tar- SMX client software installed on
with onsite control systems is a big geted or zero-day attacks. plant Microsoft Windows devices
threat. It was the second leading SMX is a great example of Hon- provides another layer of protec-
threat to these systems in 2016, eywells major investments in new tion, controlling which USB devices
according to surveys. Uncontrolled industrial cybersecurity technologies, connect, preventing unverified USB
USBs have taken power plants offline, products, services and research which removable media drives from being
downed turbine-control worksta- further strengthen our ability to se- mounted and stopping unverified
tions, and caused raw sewage floods, cure and protect industrial assets, op- files from being accessed. SMX also
among other industrial accidents. erations and people, said Jeff Zindel, logs USB-device connectivity and file
Industrial operators often have vice president and general manager, access, providing a valuable audit
hundreds or thousands of employees Honeywell Industrial Cyber Security. capability.
and dozens of contractors on sites ev- With the continued increase in cy- The proliferation of removable
ery day, said Eric Knapp, chief engi- berthreats around the world, Honey- media and USB devices is unavoid-
neer for cybersecurity with Honeywell wells industrial cybersecurity expertise able, said Knapp. Our customers
Process Solutions. Many, if not most, and innovation are needed more than have limited resources to maintain
another system, so Honeywell man-

AD INDEX ages SMX for them. SMX never


connects to our customers process
Beckhoff Automation LLC - 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 control networks. From a system
www.beckhoff.com administration perspective, its like its
CFE Medias Global System Integrator Database -18 . . . . . . . . . . . . . . . . . . . . . . . . . . . not even there.
www.controleng.com/global-si-database The solution helps prevent spread
EPICOR - 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 of malware through removable media
www.epicor.com and stops unverified files being read
hilscher - 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 by Windows hosts. Through the
www.hilscher.com
private ATIX connection, continu-
IIoT Webcasts - C3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ally updated threat information and
www.plantengineering.com/lloT
advanced analytics to help detect
Inductive Automation - Bellyband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
www.inductiveautomation.com advanced, targeted and zero-day
malware are available. IIoT
TADIRAN BATTERIES - C2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
www.tadiranbat.com
WAGO Corp - C4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 MORE
www.wago.us INFORMATION
For more information: www.becybersecure.com.

20 | MAY 2017 IIoT For Engineers www.controleng.com/IIoT


WEBCAST SERIES

The Industrial Internet of Things (IIoT) is a transformational strategy that is


revolutionizing manufacturing operations across the world.
CFE Media publications take an in-depth look at IIoT-related issues, strategies, and opportunities
in the 2017 IIoT Webcast series.

The 2017 Industrial Internet of Things (IIoT) Webcast Series:

Webcast One: Get your head into the cloud


Available On-Demand
This Webcast focuses on how emergent IIoT technologies change the way process and automation engineers execute projects and
sustain productivity in todays, and tomorrows, cyber-physical world.

Sponsored by:

Webcast Two: Take sensing and control to the edge


Thursday, June 8, 2017
This Webcast will focus on how better sensing leads to big data, and how in future, process control will be foundat the process.

Sponsored by:

Webcast Three: IIoT transforms predictive maintenance


Thursday, August 24, 2017
Connecting complex machinery and equipment to operations and enterprise systems enables machine learning, predictive maintenance
and secure monitor and alarm. IIoT addresses significant integration challenges posed by the unique data types generated by the many
kinds of machinery and equipment found in plant environments, from CNC machines to robotics.
Sponsored by: Bosch Rexroth, Deublin, GTI, Rittal

Webcast Four: How IIoT helps cybersecurity efforts


Thursday, October 19, 2017
Cybersecurity is a threat to enterprises large and small, at risk of being attacked from unexpected sources both inside and outside the
enterprise. IIoT can reduce the cybersecurity risks inherent in legacy automation, instrumentation, equipment, and devices.

Register for the IIoT series today at www.plantengineering.com/lloT


PLC WITH
N
BUILT-IN RIT
Y B U I LT-I

CU
VPN & FIREWALL SE

IIoT
READY

PFC Series Performance Class Controllers


VPN technology with IPsec and OpenVPN security protocols
IIoT-ready application security with SSL/TLS encryption
Firewall with whitelisting for increased network security

www.wago.us/PLC-VPN

input #104 at www.controleng.com/information

S-ar putea să vă placă și