IIoT, the Edge and the Energy Industry

How the use of edge computing devices as a key component of an Internet of Things initiative addresses both bandwidth and security concerns.

Aw 108010 Kepware Sponsellerweb

Conceptually, the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have been discussed at great lengths over the past few years. During this time, questions like “Why IoT?” have been asked, use cases have been explored, and implementations have begun. The shift from concept to implementation is now sparking new discussions as users and system integrators explore what technologies are best and how integration will work between the applications.

To advance IIoT implementations in the energy industry, at least two concerns must be addressed. The first concern is bandwidth limitations of telemetry networks. A November 2015 report by Gartner estimates that there will be 35 billion to 50 billion connected devices by 2020. A large part of this growth will come from the industrial segment—which is typically slower in adopting newer technologies, due in a large part to the robust requirements needed for industrial environments where a typical device could have a functional lifespan of 20-30 years.

Because many of the networks available to connect to assets in the field have limited bandwidth, numerous companies are already struggling to support the number of SCADA systems and devices they have today. For example, an industrial oil and gas operator could have 10,000-20,000 legacy devices located remotely across multiple production sites with limited connectivity, power and network bandwidth. Depending on the device, there could be a couple thousand bits of data or even gigabytes of data being produced and updated in milliseconds. As more devices come online, data production will increase exponentially, consuming new levels of required bandwidth that could result in service degradation, data latency and increased costs.

The second concern is security. The energy industry is already a target because of the volatile nature of its products and the catastrophic impact that man-in-the-middle cyber attacks could have on infrastructure and society. Companies must accommodate for the influx of connected devices sending data and assess the risk in opening up networks to the Internet to minimize the threat of exploitation.

Solutions to these concerns are being discussed and proposed by industry leaders. Collecting and analyzing data at the “edge” has the potential to alleviate both network bandwidth limitations and security concerns. As Moore’s Law continues to prove, price and form factors of processors keep decreasing, thus allowing unnecessary computing and data storage to be moved away from the central server where enterprise-level applications reside. This enables companies to distribute their computing to the edge of the network through low-cost gateways and industrial PCs that can host localized and task-specific actions in near real time, requiring them to transmit much less required data back to the enterprise. Collecting and analyzing data at the edge also increases security because information is kept within a local network. Instead of using insecure legacy device protocols for communications across a wide area network, companies could use more modern communication techniques specifically designed for secure and efficient network communications, which deploy encryption and security certificates to strengthen access controls and prevent man-in-the-middle attacks.

The transmission of more data across an enterprise for the purpose of achieving the benefits of IoT can appear to be challenging and risky business. By employing edge solutions and technologies, energy companies can push IoT initiatives forward in a safe and effective way.

 

Companies in this article
More in IIoT