Connectivity: The Key to IoT Data Communications
Unlocking Interoperability via the Industrial Internet Connectivity Framework
From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.
The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.
An ACG Analysis, Research Brief and Webinar Developed in Partnership with RCR Wireless. Concurrent innovations in 5G radio access and in network control and application delivery using virtualization and the cloud at multiple layers of the ‘stack’ will bring services to market not feasible in the past. This fortunate combination makes the arrival of 5G especially inspiring. Evaluating several of the more impactful new radio access innovations, the way they benefit from virtualization and the cloud in managing the network and and delivering new applications, and examining the benefits these enhancements bring to stakeholders in the 5G and IIoT ecosystems is the focus of this research.
One area of innovations in 5G and IIoT is to support a massive scale of connectivity for ‘things’ for commercial and industrial use. In many cases use of low power access technologies such as LoRa is integral to supporting new applications at scale. In other cases innovative data distribution mechanisms such as Coordinated Multi-Point communications (or CoMP) to support the use of diverse types of end-stations are crucial to bringing the versatility, efficiency and scale to IIoT that some applications need. In parallel support for highly reliable and ultra-low latency communication for applications in transportation, health care, public safety and other vertical sectors will harness new frequency bands and transmission management techniques to accomplish their functions.
This research brief and webinar from ACG Research will examine the symbiosis between 5G radio access innovations and the technologies of virtualization and the cloud for delivering IIoT at scale in ways that have not been possible in the past.
What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.
On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
Industrial Internet Security in Action --
Interoperable IIoT Security Event Monitoring
(Inlcuding a preview of security interop demo at Hannover Messe)
With the rise of the Industrial Internet of Things and Industrie 4.0, manufacturers are adding more connected devices and sharing operation data with IT systems within their own factories and businesses, and they are extending information exchange across their entire value chain. This increased digitization offers a host of benefits to businesses, partners, suppliers and customers. But such connectivity must not itself put sensitive equipment at risk. Security is important within a single manufacturers’ plants, and across every participant in the value chain. Since there is no single, homogeneous security environment, multiple companies and systems that need to work together.
JOIN THE WEBINAR TO LEARN:
-How a strong Identity and Root-of-Trust forms the foundation of IoT Security
-How to securely connect systems from the operational domain (OT), to become more accessible to the information technology (IT) domain.
-How to implement end-to-end security from device to cloud
-How 24 IIC Members will demonstrate secure, interoperable IIoT event monitoring at Hannover Messe
Today's computing infrastructure is changing dramatically to support new requirements in design and structure. This is no more evident than in the Internet of Things, where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come.
These new IoT systems need data-centric technology that directly addresses real-time systems to explicitly manage the communications “data model.” No matter what application – from financial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation – industries need solutions to find right data then communicates it to its intended destination in a reliable, flexible, fast, and secure manner.
To learn more about the proven standard for data-connectivity in mission- and business-critical systems join OMG's webinar featuring experts from the leading DDS middleware vendors; PrismTech, RTI and Twin Oaks Computing
Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.
To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.
This webinar, Part II of the OMG DDS Webinar series, will cover in detail the mechanisms available in DDS to meet challenging real-world application requirements; from discovery to state management, information consistency, data durability, reliability and scalable information distribution. With over 20 different quality-of-service (Qos) policies DDS provides ready-made configurable patterns that can be used to meet most of these use-cases. Learn to leverage DDS Qos and patterns to simplify your application code and increase the robustness of your system. Presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group.
Part I: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technology and co-chair of OMG's DDS Special Interest Group, is available here https://www.brighttalk.com/webcast/12231/252365
Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President of Twin Oaks Computing here: https://www.brighttalk.com/webcast/12231/252391
Don’t confuse the Internet of Things (IoT) with the Industrial IoT (IIoT), which typically has much more stringent characteristics. That’s because the IIoT usually involves some sort of manufacturing, robotics, or other mission-critical application, where down-time can be measured in dollars, often lots of them. In Day 3 of this three-day class, we’ll look at how to best power your IIoT application, which could include FPGA power and design considerations for high-speed RS-485 data links. The class will use the Intersil PowerCompass tool to help simplify the design. Day 3 sponsored by IntersilRead more >
Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.
To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical oveview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.
This webinar, Part III of the OMG DDS Webinar series, will take an in-depth look at the latest advances in the DDS standards to meet the demanding cyber-security requirements of today’s industrial connected systems. From authentication and access control to integrity and encryption, learn how to leverage DDS Security features to secure your connected system against cyber attacks, while maintaining a flexible, scalable architecture. Presented by Nina Tucker, Vice President of Twin Oaks Computing.
Part I of the OMG DDS Webinar Series: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technologies and co-chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252365
Part II of the OMG DDS Webinar series: Applying DDS QoS to Solve Real-World Problems, presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252387
Machine Learning and Time Sensitive Networking in the Smart Factory: How the IIoT makes critical data available when & where it is needed.
In today’s digital age, the rapid emergence of IoT is changing operations throughout the manufacturing domain. Machines and systems have become more intelligent and more connected, and the proliferation of sensors generates a non-stop flow of data. This wealth of actionable information provides the key to unlocking higher efficiency and increased reliability of machines and systems. The opportunity lies in harvesting the data.
Join IIoT experts from the Industrial Internet Consortium to discover exciting developments in the field of machine learning -- products and systems taking action on their own -- and how this self-optimization will play a pivotal role in enhancing the intelligence of the factory. We will also showcase the Time Sensitive Networking (TSN) testbed and the technology used to support real-time control and synchronization of high performance machines over a single, standard Ethernet network.
What you will learn:
-How IIoT connectivity has enabled data from the operational domain (OT), to become more accessible to the information technology (IT) domain.
-How Machine Learning will lead to real-time, self-optimization of Industrial Systems and help reduce downtime via predictive and preventative maintenance.
-How TSN capabilities are extending standard Ethernet (IEEE 802.1 & 802.3) to enable more devices, applications, and deterministic potential to manufacturing networks.
With the emergence of the Industrial Internet of Things (IIoT) many are trying to understand how their organization can step up to the new world of connected things that can cause harm, lead to safety issues, and could serve for decades. Join this session as we explore the driving concepts behind creating a safe, secure, and reliable IIoT system and look at how OMG standards play their role in the new IIoT marketplace and IIoT ecosystems as we evolve our IT & OT cultures into the IIoT culture. Topics discussed include:
* Safe, Reliable, and Secure - how to tell?
* Sourcing and integrating trustworthy components
* Standards and evidence-based value chains in IIoT ecosystems
Recent events have proven that you can never be too careful when you’re designing batteries into your systems, and that covers everything from wearables to hybrid/EV battery packs. In Day 1 of this three-day class, we’ll look at how to make your battery packs safer; how to build a USB-to-controller interface that “talks” to a power device; and how to extend battery life in wearable devices. The class concludes with a question and answer period between the attendees and the expert instructor. Day 1 sponsored by Intersil.Read more >
Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.
Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF).
On January 26, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will provide an introduction to the approach needed to secure industrial systems and offer insights gained from one of our testbeds encompassing several security technologies.
Join the webinar to learn:
• The importance of securing the IIoT and why it differs from securing the IoT
• The value of securing industrial Internet systems
• Recommendations for engaging OT about developing an IIoT strategy
Don’t miss this webinar – first in a series of monthly webinars offered by the Industrial Internet Consortium.
February: Securing IIoT Endpoints
March: Securing the Smart Factory
Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow, DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.
To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group is offering this DDS Technical Overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.
Part I of the OMG DDS Webinar Series will get you started with DDS. We will (1) cover in great details DDS’ key abstractions, (2) introduce the essence of DDS-based data-centric and modular architectures, and (3) clearly position DDS with respect to messaging technologies. After attending this webcast you will know the fundamentals required to start using DDS in your next project. Presented by Angelo Corsaro, Ph.D., CTO at ADLINK Technology and Co-Chair of the OMG's DDS Special Interest Group.
Part II: DDS QoS to Solve Real World Problems presented by Gerardo Pardo-Castellote, CTO of RTI and Co-Chair of OMG's DDS Special Interest Group is available here: https://www.brighttalk.com/webcast/12231/252387
Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President, Twin Oaks Computing is available here: https://www.brighttalk.com/webcast/12231/252391
Presented by IoT expert, Bill Roberts, this webinar explores how the Industrial Internet of Things (IIoT) is having a dramatic impact on how manufacturers and service providers operate. From the factory floor to a distributed energy generation facility to anywhere a critical piece of equipment operates, machine data holds enormous potential to drive high levels of operational efficiency and unlock new service innovations. This blending of operational technologies (OT) with Information Technology (IT) has created challenges with the data, the analytics lifecycle and a deep thinking into the roles of personnel. A robust IoT analytics lifecycle can play a critical role in helping organizations separate the relevant signals from the noise in IIoT data, gain real time critical insights, and drive appropriate, timely action to realize the promised value of IIoT. This session will explore these topics and offer insights on pursuing a successful industrial IoT strategy that leverages a robust analytics lifecycle.Read more >
Heavy industry was first to arrive at the IoT party, quickly recognizing the potential to augment existing processes and establish new protocols. As a result, organizations that embraced the industrial internet of things (IIoT) have been at the forefront of fine-tuning applications and establishing best practices. And while many of those practices have turned out to be impactful, it’s becoming increasingly apparent that the opportunity is much bigger with predictive analytics.
We’ve entered a perfect storm where the falling costs of capturing, processing and analyzing data coincide with the explosion of data streams generated by millions of pieces of connected equipment, devices and systems. And the same technology that created the perfect storm has empowered customers with near-instant data and instantaneous engagement with each other and also with your organization. So the opportunities extend beyond tactical process improvements and have become both strategic and enterprise-wide.
Recognizing and capitalizing on the opportunities requires an evolution of skills and mindset, made possible with key technology relationships. The Industrial IoT collaboration between SAS and Intel enables organizations to capture, process and analyze data. The end result is the ability to evolve their strategic advantage and realize the full value of their IIoT data.
Tune in to this webinar to gain insights and best practices for evolving the industrial IoT into strategic advantage for your organization.
Segmentation is a crucial element to modern network design and accepted widely as a recommended best practice. It is believed that many of the current successful cyber-attacks against ICS/SCADA infrastructures could have been prevented or contained if proper segmentation had been in place.
Unfortunately, many existing ICS/SCADA systems predate modern best practices. Owner-operators are challenged to face cybersecurity risks with outdated defense mechanisms. Implemented during an era where air gaps existed, the use of commercially available off-the-shelf products (COTS) have connected the serial based on brownfield systems into the industrial Internet of things (IIoT). In doing so exposing the ICS/SCADA to the same threats and perils as its enterprise counterpart. Come join us as we discuss ways and techniques that Palo Alto Networks NGFW can be used to achieve ideal network segmentation.
Why You Must Attend:
• Understand the impact of key IIoT-based technologies that are poised to change MES platforms
• Realize the value addition through dynamic modularization and smart functionalities in MES platforms
• Recognize the opportunities bought about by the transformation of traditional MES into manufacturing intelligence platforms
• Learn key industrial verticals and analyze the implications that are set to occur due to the advent of advanced MES solutions
• Capture the benefits of scaling and orchestrating MES solutions across global manufacturing facilities
• Participate in an interactive Q&A session with Frost & Sullivan and Forcam
Filmed during OMG's TC meeting in Reston, DC in 2017, this conversation explores the role of standards in Healthcare ITRead more >
Mocana Corporation CEO Bill Diotte discusses the importance of private companies and the government working together on cybersecurity solutions and cultivating talent.Read more >
SysML v1 was adopted in 2006, and has been a key enabler of model-based systems engineering (MBSE). Since that time, much has been learned about applying MBSE with SysML. This presentation describes the directions and approach for the next generation of SysML (v2) to provide capabilities that address the limitations of SysML v1, and enable the evolving practice of MBSE.Read more >
The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.
Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.
In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.