Welcome!

WebRTC Summit Authors: Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff, Yeshim Deniz

Blog Post

The Industrial IoT Risks You Must Not Ignore in 2018

Today’s security challenges and tomorrow's

Like other new technologies before it, IoT is going through its honeymoon phase. Can we cut out a manual process? Can we improve data transmission speeds? Can we make our machines smarter? When the answer is yes, the solution is IoT technology. But the haste to adapt to these new possibilities has left many feeling a growing and very real problem: security.

How network and systems architects respond to this problem could determine the long-term viability of technology that holds either the promise or the challenge of fundamentally changing the way our industrial sectors function.

For decades, Supervisory Control and Data Acquisition (SCADA) systems have played a significant role in industrial operations. Industries like oil and gas, electric power/smart grid, agriculture, and utilities have implemented SCADA systems and networks to collect data and automate processes, and are always looking to automation systems for more effective ways to operate.

The capability to collect more data from geographically dispersed field assets in remote locations has driven the need for enhanced communication technologies. The number of sensors and data points collected will continue to rise dramatically with improved connectivity.

This collected data helps operators improve operational decisions, save manpower and, in many instances, keep employees safe by avoiding dangerous environments. Today, industrial network operators are increasingly implementing end-to-end IP connectivity or the Internet of Things (IoT), enabling more capabilities at the edge of these networks. This does not make SCADA systems obsolete by any means; it opens the door to greater possibilities of enabling new applications and analytics with every single data point being captured in the system.

There are many implications for the concept of a connected enterprise in terms of network security. Critical infrastructure projects are only as reliable and secure as the technology serving them. Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed. With security, the traditional trade-off is either “easy to use” or “secure”— but not both. We often consider features to be part of the equation, though in most cases operators are not willing to trade off features.

Today’s security challenges

Traditional SCADA systems have several challenges when it comes to security.

With more data being transported than ever before, it’s important not only to secure assets, but to secure the communication link itself. Traditionally, SCADA systems have been on the outside of a firewall from the corporate IT network. Newer SCADA systems that use Ethernet devices are more security focused with measures such as VPN, secure sockets, encryption, and dedicated log-ins on the devices.

Intelligent sensors offer value

With the growing use of IoT technologies, operators must realize that the system is not only providing a communications path, but also enables intelligent sensors that provide additional value when using that path. Rather than just Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs) at the edge of the networks providing data, the sensors themselves may be running an application on the edge of the network, and many of these devices are using IP.

IIoT sensors bring more capabilities and increased connectivity to these devices, and their full value may not be realized if the only connection to the device is through a PLC or RTU. Long-promised benefits, such as assessing predictive failure, become possible when the device can be accessed directly. IoT implies that data flow is no longer strictly controlled and only accessible via the SCADA system, but that data in any form from any device can be accessed by any system which needs it. There is no longer a reliance on SCADA system providers to support device compatibility if the data can be accessed through another means.

With IoT, many industries are now looking at how every single asset, across every facility, can be connected through the internet (or an intranet), making data readily available to key decision makers, without the time and resource bottleneck of routing all of that information through a central SCADA system.

When there is Ethernet everywhere and IP devices going out to the edge in the field, each one of those devices has the potential to become a threat to the entire corporate IT network if not secured properly. In comparison to a traditional SCADA system, this is a communication network on a much larger scale with thousands of potential end points.

Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. This IoT data can be extremely useful, but safely enabling it requires a network that can meet the necessary security requirements.

Using standards like TLS/SSL and basic AES-128 data encryption, secure connections can be established, even where data moves across an open network and it’s assumed that an unauthorized party could potentially see the traffic, such as in an Industrial IoT environment. When data is properly encrypted, an unauthorized party cannot access it even if they can see it. In wireless connections, standards-based connections allow relatively easy access to the moving data, leaving encryption as the only line of defense against snooping.

The dangers that lurk in IT/OT convergence

Traditionally, companies have a corporate firewall that divides the corporate IT space from operational technology (OT) space. With an IoT network this division is greatly reduced, and so there is a need to protect the sensors and new applications on the OT side. However, even with a secure communication link, if the individual devices that are connected on the OT side become compromised and an intruder gains access to that communication link, they can push malicious data, cause denial of service (DoS), or introduce malware or viruses to the entire network, IT side included. There are many ways to run into problems on the IoT front if companies are not careful in their network design security implementation.

On the IT side, corporate network security typically sees many threats. Those threats require significant attention, and consequently IT organizations have numerous options and tools to use, such as intrusion detection, log monitoring, network behavior monitoring, network inspections, whitelisting, firewalls, and more. The IT space has a much different attack surface than OT because with an IT network the company can physically secure the building and control where the data goes in and out. Data escaping the building is relatively small in comparison to the OT space.

WiFi that is leaking outside the building could be a vulnerability, but there are tools and ways to lock down that type of threat, and checkpoints where the IT department can analyze the traffic going through the network. In IT, bandwidth is plentiful and the network overhead associated with security is generally not a major factor.

IIoT networks, on the other hand, can span many miles with potentially hundreds of thousands of data points. This data often traverses a network with very limited bandwidth. An IIoT network likely consists of small embedded devices with long lifespans. However, they are generally not like operating systems found on an office computer, which regularly conduct updates to patch security flaws, among other things.

Some embedded technologies don’t allow any updates, making it essential to carefully select devices which offer the desired features but do not compromise on security. Having thousands of these edge devices is where organizations will begin to see IT/OT convergence – many more points in the field where threats could be coming into the IT network.

Industrial organizations today are creating a connected infrastructure with IP-enabled sensors or IP/IIoT-enabled Access Gateways. The data generated by sensors at an asset location can be valuable to more than just the central control system. This might mean machine-to-machine (M2M) communication with sensors talking directly to each other. It may mean that multiple systems consume the live, real-time sensor data directly from the field.

It may even mean that operators connect their sensors directly to the cloud or other back office systems without going through a traditional SCADA system. If there is a way to share critical data that can help provide information to key data users while addressing security issues, then that information becomes increasingly valuable.

IIoT solutions often utilize the widely deployed security technologies developed for the Internet to avoid the custom, one-off solutions of past industrial security. IP technology makes it easier to deploy and talk to sensors, but it also makes it easier for intruders to see and snoop on valuable data streams. Security through protocol obscurity is not a solution. There are many common attack vectors for industrial devices that become even more relevant when considering the IIoT infrastructures and fully networked, geographically dispersed projects.

Making informed IIoT decisions

The concept of IoT offers many advantages from a business standpoint, but also opens the door to many security questions. Companies moving to IIoT need to ask these important questions before selecting a technology:

  • What are your requirements? Must haves versus Nice to haves?
  • Are there any regulatory considerations?
  • What is the IoT communications technology controlling or automating? Is it essential that it operates without failure?
  • What data is being collected and/or transmitted with this technology? Is it time sensitive and/or mission critical?
  • What technology solutions have a proven track record for the applications being served?
  • What external factors might impact the reliable transmission and receipt of critical data from one point to another?
  • How does this IoT communications technology address challenges such as data encryption, network access control and signal interference?
  • Can the vendor describe the security mechanisms? Can you understand them?
  • Will this be secure even if everyone knows the security measures? (The right answer is yes, otherwise keep looking)
  • Do we need this technology solution to be fail-safe, in order to prevent or eliminate catastrophic damage from occurring?
  • What are the threat vectors I’m most concerned about?
  • Is cyber security or physical security a greater concern for this deployment?
  • What vulnerabilities have the Information Security community identified in the type or category of IIoT equipment I use?
  • What is the right tradeoff between features, ease of use and security for my installation?
  • Do I have a testing or evaluation plan in place?
  • What ongoing improvements do I expect?

Prioritize IoT security in your  network

Each company is different in how it approaches IoT and the resulting IT/ OT convergence. With this convergence, the firewall that separates the two becomes more complicated and less well defined. IT and OT professionals within the same company might put a different emphasis on security. The IT organization is typically owned by the CIO, who is being measured on how secure they keep the network. On the other hand, it’s less clear who is in charge of OT.

It may be a foreman, who is more concerned with the system functioning because he is being measured on system performance only. As IoT continues to prove its value, it will be increasingly important for both sides to focus on the same security goals without making the networks and systems so difficult to use that it interferes with the functionality.

There are many benefits to the concept of a completely connected IoT system, but this also implies more crossover between IT and OT systems. Companies need to prioritize security in their quest to create end points for all of their field assets. Some industries, like the smart grid, are already experiencing mandates that ensure a more cyber-secure network. With others, however, it is still up to the organization to make security a top priority. There are technology providers available that are security focused and will provide those extra layers of security to the OT network.

The original version of this article was published by FreeWave Technologies Systems Engineer Jesse Steiner on RTInsights.com.

More Stories By Scott Allen

Scott is an executive leader with more than 25 years of experience in product lifecycle management, product marketing, business development, and technology deployment. He offers a unique blend of start-up aggressiveness and established company executive leadership, with expertise in product delivery, demand generation, and global market expansion. As CMO of FreeWave, Scott is responsible for product life cycle/management, GTM execution, demand generation, and brand creation/expansion strategies.

Prior to joining FreeWave, Scott held executive management positions at Fluke Networks (a Danaher Company), Network Associates (McAfee), and several start-ups including Mazu Networks and NEXVU Business Solutions. Scott earned his BA in Computer Information Systems from Weber University.

@WebRTCSummit Stories
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multiple Intel RealSense Depth Camera to scan 3D and build 3D models in real-time, and display as hologram in front of remote participants.
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buyers learn their thoughts on their experience.
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented a comprehensive view of the numerous testing challenges researchers have faced before arriving at the first release candidate of the WebRTC specifications.
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone innovative products that help customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business and personal computing needs.
SYS-CON Events announced today that Google Cloud has been named “Keynote Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Companies come to Google Cloud to transform their businesses. Google Cloud’s comprehensive portfolio – from infrastructure to apps to devices – helps enterprises innovate faster, scale smarter, stay secure, and do more with data than ever before.
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interoperability. It has lots of potential to address current issues around IoT - security, connectivity and so on - based on P2P technology. It will become a key-component especially in edge computing use cases, in his view.
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service.
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service.
DevOps at Cloud Expo – being held June 5-7, 2018, at the Javits Center in New York, NY – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Among the proven benefits, DevOps is correlated with 20% faster time-to-market, 22% improvement in quality, and 18% reduction in dev and ops costs, according to research firm Vanson-Bourne. It is changing the way IT works, how businesses interact with customers, and how organizations are buying, building, and delivering software.
@DevOpsSummit at Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, is co-located with 22nd Cloud Expo | 1st DXWorld Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
SYS-CON Events announced today that T-Mobile exhibited at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on quality and value. Based in Bellevue, Washington, T-Mobile US provides services through its subsidiaries and operates its flagship brands, T-Mobile and MetroPCS. For more information, visit https://www.t-mobile.com.
SYS-CON Events announced today that Cedexis will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Cedexis is the leader in data-driven enterprise global traffic management. Whether optimizing traffic through datacenters, clouds, CDNs, or any combination, Cedexis solutions drive quality and cost-effectiveness. For more information, please visit https://www.cedexis.com.
SYS-CON Events announced today that Vivint to exhibit at SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California. As a leading smart home technology provider, Vivint offers home security, energy management, home automation, local cloud storage, and high-speed Internet solutions to more than one million customers throughout the United States and Canada. The end result is a smart home solution that saves you time and money and ultimately simplifies your life.
SYS-CON Events announced today that Opsani will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Opsani is the leading provider of deployment automation systems for running and scaling traditional enterprise applications on container infrastructure.
SYS-CON Events announced today that Nirmata will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Nirmata provides a comprehensive platform, for deploying, operating, and optimizing containerized applications across clouds, powered by Kubernetes. Nirmata empowers enterprise DevOps teams by fully automating the complex operations and management of application containers and its underlying resources. Nirmata not only simplifies deployment and management of Kubernetes clusters but also facilitates delivery and operations of applications by continuously monitoring the application and infrastructure for changes, and auto-tuning the application based on pre-defined policies. Using Nirmata, enterprises can accelerate their journey towards becoming cloud-native.
SYS-CON Events announced today that Opsani to exhibit at SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California. Opsani is creating the next generation of automated continuous deployment tools designed specifically for containers. How is continuous deployment different from continuous integration and continuous delivery? CI/CD tools provide build and test. Continuous Deployment is the means by which qualified changes in software code or architecture are automatically deployed to production as soon as they are ready. Adding continuous deployment to your toolchain is the final step to providing push button deployment for your developers.