What is the Industrial IoT?

The Industrial Internet of Things, or IIoT, connects machines and devices in industries such as transportation, power generation, and healthcare. The potential is high and so are the risks.

Everyone’s heard of the IoT, smart thermostats, Internet-connected refrigerators, connected lightbulbs, but there’s a subset called industrial IoT that has a much more significant day-to-day impact on businesses, safety and even lives.

The term IIoT refers to the Industrial Internet of Things. In broad strokes, it’s the application of instrumentation and connected sensors and other devices to machinery and vehicles in the transport, energy and industrial sectors.

What that means in practice varies widely. One IIoT system could be as simple as a connected rat trap that texts home to say that it’s been activated, while another might be as complicated as a fully automated mass production line that tracks maintenance, productivity and even ordering and shipping information across a huge, multi-layered network.

How the Industrial Internet of Things is different from IoT

The Industrial Internet of Things is also referred to as the industrial internet, a term coined by GE, and Internet of Industrial Things. Whatever you call it, the IIoT is different from other IoT applications in that it focuses on connecting machines and devices in industries such as oil and gas, power utilities and healthcare.

IoT includes consumer-level devices such as fitness bands or smart appliances and other applications that don’t typically create emergency situations if something goes wrong.

Simply stated, there is more at stake with IIoT deployments where system failures and downtime can result in life-threatening or high-risk situations.

The IIoT brings computers from IT to operational technology, opening up vast possibilities for instrumentation, leading to major efficiency and productivity gains for almost any industrial operation.

Is IIoT its own category?

Technologically, IIoT works on similar principals to any other piece of IoT tech, automated instrumentation and reporting being applied to stuff that didn’t have those capabilities before. That said, the scale of it is much different than a simple system that lets you mess with your thermostat on your phone, hundreds, perhaps thousands or even tens and hundreds of thousands of individual endpoints can be present in an IIoT deployment.

What are businesses doing with the industrial IoT?

Instrumentation for production lines can let companies track and analyse their processes on an enormously granular level, asset tracking can give a quick, accessible overview of a huge amounts of material, and predictive maintenance can save companies big money by addressing problems before they have a chance to become serious, the number of potential use cases is vast, and growing by the day.

The Industrial IoT Consortium lists these 15 possible uses of IIoT:

  1. Smart factory warehousing applications
  2. Predictive and remote maintenance.
  3. Freight, goods and transportation monitoring.
  4. Connected logistics.
  5. Smart metering and smart grid.
  6. Smart city applications.
  7. Smart farming and livestock monitoring.
  8. Industrial security systems
  9. Energy consumption optimisation
  10. Industrial heating, ventilation and air conditioning
  11. Manufacturing equipment monitoring.
  12. Asset tracking and smart logistics.
  13. Ozone, gas and temperature monitoring in industrial environments.
  14. Safety and health (conditions) monitoring of workers.
  15. Asset performance management

Do you need to implement IIoT differently?

Yes, because IIoT devices can have much longer service lives than consumer gadgetry, Canonical executive vice president of IoT and devices Mike Bell estimates the average at seven to 10 years, so any implementation has to be built to, last.

Even beyond the raw scale and longevity involved, the implementation process can be convoluted, the kind of back end necessary to make the most of data gleaned from instrumentation is a considerable undertaking in and of itself, and has to be undertaken in close coordination with the rest of the enterprise.

It requires a dedicated strategy for collecting data from endpoints, storing it in an accessible format, whether in a data center or in the cloud, feeding it to the analysis engine, and having a way to turn insights from that analysis into actionable and timely information.

How does machine-to-machine communication let the IIoT talk to everything?

There's a wide range of different formats and technologies that address different parts of the need for machine-to-machine communication among connected devices. Physical layer technology like Sigfox and Zigbee, software layers like Weave and IoTivity - all of it is necessary for a fully functioning IIoT environment, and it all has to be interoperable.

What about IIoT security and other concerns?

Just like consumer IoT, IIoT has a lot of security issues. Recall the Mirai botnet, which leveraged poorly secured security cameras and other gadgets into a huge DDoS weapon.

Beyond the possible use of compromised IIoT devices to create massive botnets, there’s also the issue that vulnerabilities can be exploited to allow theft of valuable data already on your network, yet another attack vector.

One thing that might help keep IIoT secure, according to Bell, would be to borrow the increasingly common practice of automatic, silent downloading and patching from the consumer side of IoT. Some companies won’t like this, preferring to have absolute control over the software running on their machines, but it could be a big help from a security perspective.

Other factors that IT leaders are concerned about include the following:

  • Lack of standardisation. As an attempt to graft newer technology onto old, there's a huge range of different designs and standards for everything from transmission protocols to ingestion formats. Simply put, if the gizmo that sends operational information about the temperature of a blast furnace isn't made by the same company that makes the network or the data ingestion engine, they might not work together.
  • Integration with legacy technology. Lots of older equipment isn't designed to provide data in a format that's legible for modern IIoT tech, so getting a decades-old power station controller to talk to a sophisticated new IIoT infrastructure could require some translation.
  • Money. As both of the above points highlight, fully embracing IIoT requires new hardware, new software and a new way of thinking about technology. The idea is to make money, but plenty of people are understandably worried by the up-front costs.
  • People. Getting the most out of IIoT often requires expertise in machine learning, real-time analytics, and data science - to say nothing of cutting-edge knowledge of networking technology.

Network World

You Might Also Read: 

UK Must Prepare For The 4th Industrial Revolution:

Industrial Robotics Market Will Triple:

Attacks On Industrial Control System At An All-Time High:

 

 

« Businesses Using Apple & Cisco Products Pay Less For Insurance
Girls Are Future Cybercrime Fighters »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.