SMART FACTORY ADDRESSING IOT SECURITY ISSUES IN MANUFACTURING SITES A
lthough the Internet of Things (IoT) has enjoyed explosive growth in recent times, it’s still a relatively recent concept. It’s based around the idea of connecting any devices or objects that incorporate electronics, software or sensors, with the aim of collecting and exchanging data. Over the past few years, IoT has spread like wildfire – and shows little sign of slowing down. Indeed, according to Cisco, the number of connected devices is expected to exceed 50 billion by next year. These range from everyday items such as controllable lighting and heating in the home through to machine-to-machine (M2M) communications in the factory.
However, this rapid increase in the number of devices or end points for the Industrial Internet of Things (IIoT) also means that there is a correspondingly higher risk in terms of security - especially in relation to the data that’s being collected and exchanged. This issue needs to be urgently addressed so that IoT as well as IIoT can continue to develop safely and securely in the future. CMSWire recently reported that if this can be achieved, “It is likely that adoption will continue at an exponential rate, greater consolidation will drive developers to edge computing and connected applications will unlock multi-purpose robots, leading to far greater capability and functionality”. In reality, this is already beginning to happen in some areas. Manufacturers around the world are striving to strengthen their global competitiveness and corporate value by enhancing their manufacturing capabilities through the use of IIoT. The industry is also rising to the challenge of making manufacturing sites more intelligent through the active use of digital technologies. However, the risks are also much higher in the manufacturing industry than in many other sectors. Manufacturing sites are facing more serious threats than ever before, as evidenced by recent cases of disrupted production due to ransomware and other malware attacks.
Meanwhile, both customers and the market are demanding higher levels of quality and safety through measures such as more stringent regulations on food and pharmaceutical products, as well as better traceability that will ensure the quality of individual components in the electronic parts industry. Manufacturers therefore face significant challenges in continuing to improve the technologies they use while addressing these issues.
KEY ISSUES FOR MANUFACTURERS
Three specific areas of security risks in relation to the use of IIoT in manufacturing include the people who access equipment and data at the manufacturing sites, the devices that are connected to machinery and production lines and the data that is collected and exchanged. Each of these areas pose challenges in terms of effective authentication procedures.
PERSONAL SECURITY One of the first areas that is likely to come under attack involves hackers who attempt to impersonate an authorised user so that they can access data or carry out a disruptive task of some kind. Everyone is now familiar with the Internet, where authentication takes place through passwords and where websites are protected by the SSL (Secure Sockets Layer) protocol. However, usernames and passwords aren’t always a very effective method of personal authentication for potential users of IoT. Some of the encryption methods that are used can also be fairly weak and ineffective against potential hackers. IoT security – particularly authentication and encryption – is therefore an area that leading manufacturers are urgently addressing.
DEVICE SECURITY Authentication, access control and a lack of basic 22 JULY/AUGUST 2020 | FACTORY&HANDLINGSOLUTIONS
cyber security measures are all key issues relating to the devices employed in an IIoT set-up. If the devices have weak security, that will also have implications for the systems to which they are connected and indeed the whole infrastructure. Traditional authentication methods and weak passwords are inadequate and can’t cope with the sheer number of devices and the machine-to- machine communications that occur within an IIoT operation – which in turn will typically be part of a complex manufacturing environment. The devices need to be able to authenticate each other so that data can be safely exchanged within the system. The IIoT platform also needs to be able to provide strong authentication processes as well as device authorisation and access control. Another important step includes the development of an inventory of the devices, especially those that could be particularly vulnerable to attack. This can help managers to isolate any devices involved in a breach until the issue is resolved. After the security of the devices has been assured, the next step is to ensure the security of any communications between the devices, any apps and the cloud. This could typically include the use of sophisticated encryption techniques.
DATA SECURITY
At the centre of all of the concerns about the security of IIoT within manufacturing sites is the need to maintain stringent data security – including safeguarding its transmission, storage, processing and ultimate disposal. Any security must also comply with a range of strict data protection regulations, including the General Data Protection Regulation (GDPR).
Quite apart from the hundreds or thousands of interconnected devices that might be present within a manufacturing site, the sheer quantity of data that is collected and exchanged is almost impossible to monitor: for instance, IBM believes that as much as 2.5 quintillion bytes of data could be being generated each day.
Data security starts with personal and device security and might also involve further encryption techniques and the use of items such as data signatures. Network communications also need to be carefully monitored for signs of any vulnerabilities or data breaches. This includes the need to identify any affected devices, any services that might have been accessed and any data that might have been compromised. Finally, manufacturers will need an effective strategy in place for rapidly resolving any issues that might arise.
HOW IS OMRON ADDRESSING IIOT IN MANUFACTURING So, what steps are organisations taking to try and ensure that manufacturers can enjoy the benefits
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54