The general trend towards Industrial IoT, Industry 4.0 and connecting OT (operations technology) to IT faces a serious challenge: security. Acquiring process data is becoming essential to stay competitive, but most plant engineers and supervisors are wary of exposing their OT systems to the outside world. And who can blame them as ransomware and infrastructure attacks skyrocket?
The best way to secure industrial systems, according to industry experts and government agencies alike, is to segregate OT and IT networks using a DMZ (demilitarized zone).
A DMZ isolates the production system from IT, ensuring no direct link between corporate networks and control networks. Only known and authenticated actors can enter the system at all. Firewalls can protect both operations and IT sides and should be configured to allow only outbound connections to the DMZ. This ensures that only the correct data passes between networks.
Challenges for OPC UA and MQTT
However, implementing a DMZ in an Industrial IoT environment is problematic for the two most used IoT protocols: OPC UA and MQTT. Getting data out of a plant through a DMZ typically requires two or more servers, chained together one after the other.
The OPC UA protocol is simply too complex to reproduce well in a daisy chain like this. Information will be lost in the first hop. The synchronous multi-hop interactions needed to pass data across a DMZ would be fragile on all but the most reliable networks and would result in high latencies. Also, there would be no access to the data at each node in the chain.
MQTT, on the other hand, can be chained but it requires each node in the chain to be aware that it is part of the chain and to be individually configured. The QoS (quality of service) guarantees in MQTT cannot propagate through the chain, making data at the ends of the chain unreliable.