ODVA Adds Level Sensor Profiles and CIP Security Configuration

April 9, 2025
The level sensor addition improves interoperability and preparation of data for edge and cloud analytics, while the new pull model for CIP Security eases device replacement and allows for configuration data to be automatically provided to mobile devices and devices on a private network.

At Hannover Messe 2025, ODVA announced two updates: the addition of level sensors for process device profiles and a new pull model for configuration data for CIP Security, the cybersecurity network extension for the EtherNet/IP protocol.

Related to the level sensors announcement, ODVA explained that process device profiles help users more quickly install new devices in the event of an unplanned replacement. By standardizing the semantics and scaling for process variables and diagnostics with this update to the EtherNet/IP process device profiles “significantly improves vendor interoperability and preparation of process data for use with edge and cloud analytics,” said ODVA. “Device profiles are now available for level measurement along with Coriolis flow, electromagnetic flow, vortex flow, standard pressure, scaled pressure, resistance temperature detector (RTD) and thermocouple temperature sensors.”  

The EtherNet/IP process device profile for level transmitters can be applied to devices that rely on free wave, guided wave, capacitive, magnetostrictive, radiometry and buoyancy measuring technologies. Additionally, NAMUR NE 107 diagnostics are available for level transmitters that use free wave, guided wave, and radiometry sensor technology approaches. 

The addition of a CIP Security pull model for configuration makes it easier to replace devices to minimize downtime and allows for configuration data to be automatically provided to mobile devices and devices on a private network.

ODVA further explained that the goal of process device profiles is to enable seamless device replacement by delivering plug-and-play type capabilities for process field devices to reduce the need for maintenance workers to be electronic device or Ethernet experts. 

CIP Security pull model

The new pull model for CIP Security configuration data announced by ODVA in Hannover is an addition to the existing pull model for CIP Security certificates. This new model focuses on enabling more efficient distribution of device authenticity information. 

According to ODVA, the new CIP Security pull model for configuration information will allow for parameters in JSON format to be automatically available for EtherNet/IP network-capable devices. This will make it possible for non-CIP devices, such as mobile phones and tablets, to access secure EtherNet/IP information. It also allows for hierarchical metadata to be more readily available. 

With this addition, CIP Security now includes a pull model for configuration data and device certificates along with security properties, including a broad trust domain across a group of devices, a narrow trust domain by user and role, data confidentiality, device and user authentication, device and user identity, and device integrity.  

“The addition of a CIP Security pull model for configuration makes it easier to replace devices to minimize downtime and allows for configuration data to be automatically provided to mobile devices and devices on a private network,” said Dr. Al Beydoun, president and executive director of ODVA. “CIP Security development is a continuous effort to help deter bad actors from accessing EtherNet/IP networks that enable efficient production in critical industries across the world.”  

Use cases for the new CIP Security pull model for configuration include software that does not have CIP target functionality, such as with a mobile device application and with devices that are on a private network with Network Address Translation (NAT) that has configuration software on the public network. 

Sponsored Recommendations

Optimize food production with SEW-EURODRIVE’s hygienic, energy-efficient automation and drive solutions for precision, reliability, and sustainability.
George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.
Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...
In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...