āThe technology is there,ā observes Robert Trask, PE and senior systems architect at Beckhoff Automation LLC headquartered in Savage, Minn. āThe huge missing component is having standardized data protocols.ā
Use of industry standard protocols allows a network to support devices and applications from a variety of vendors. Standard protocols also secure the network and remote application in a time-tested and proven manner.
Trask and his colleagues at Beckhoff advocate adopting the OPC-UA standard because it contains what they consider to be the necessary components: built-in security, a reliable protocol, and independence from a particular vendor or operating system. āAlso, there are several low-level, chip-level implementations that only require 15 kBytes of memory on the remote end,ā adds Trask.
OPC-UA gives industry the tools to put remote nodes under a facilityās security umbrella and to avoid the common pitfall of leaving them vulnerable to hackers. One of these tools is a stack of standard code containing built-in security. āAs a result, the developer does not have to become a security expert,ā notes Trask.
The standard uses two security mechanisms, certificates and public keys. Smart phones secure e-mail by synchronizing the certificates at each end, and HTTP Secure (HTTPS) relies on a public key. āPublic keys need to be renewed periodically, which is automatically done by the OPC-UA security mechanism,ā says Trask.
Other benefits of an open standard like OPC-UA are what Trask calls future proofing and communication neutrality. āFor the hyper-connected systems of the future, you really need openness,ā he says.
To view our complete coverage on leaping into the mobility movement, click here.