IIoT, the Edge and the Energy Industry

Nov. 23, 2016
How the use of edge computing devices as a key component of an Internet of Things initiative addresses both bandwidth and security concerns.

Conceptually, the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have been discussed at great lengths over the past few years. During this time, questions like ā€œWhy IoT?ā€ have been asked, use cases have been explored, and implementations have begun. The shift from concept to implementation is now sparking new discussions as users and system integrators explore what technologies are best and how integration will work between the applications.

To advance IIoT implementations in the energy industry, at least two concerns must be addressed. The first concern is bandwidth limitations of telemetry networks. A November 2015 report by Gartner estimates that there will be 35 billion to 50 billion connected devices by 2020. A large part of this growth will come from the industrial segmentā€”which is typically slower in adopting newer technologies, due in a large part to the robust requirements needed for industrial environments where a typical device could have a functional lifespan of 20-30 years.

Because many of the networks available to connect to assets in the field have limited bandwidth, numerous companies are already struggling to support the number of SCADA systems and devices they have today. For example, an industrial oil and gas operator could have 10,000-20,000 legacy devices located remotely across multiple production sites with limited connectivity, power and network bandwidth. Depending on the device, there could be a couple thousand bits of data or even gigabytes of data being produced and updated in milliseconds. As more devices come online, data production will increase exponentially, consuming new levels of required bandwidth that could result in service degradation, data latency and increased costs.

The second concern is security. The energy industry is already a target because of the volatile nature of its products and the catastrophic impact that man-in-the-middle cyber attacks could have on infrastructure and society. Companies must accommodate for the influx of connected devices sending data and assess the risk in opening up networks to the Internet to minimize the threat of exploitation.

Solutions to these concerns are being discussed and proposed by industry leaders. Collecting and analyzing data at the ā€œedgeā€ has the potential to alleviate both network bandwidth limitations and security concerns. As Mooreā€™s Law continues to prove, price and form factors of processors keep decreasing, thus allowing unnecessary computing and data storage to be moved away from the central server where enterprise-level applications reside. This enables companies to distribute their computing to the edge of the network through low-cost gateways and industrial PCs that can host localized and task-specific actions in near real time, requiring them to transmit much less required data back to the enterprise. Collecting and analyzing data at the edge also increases security because information is kept within a local network. Instead of using insecure legacy device protocols for communications across a wide area network, companies could use more modern communication techniques specifically designed for secure and efficient network communications, which deploy encryption and security certificates to strengthen access controls and prevent man-in-the-middle attacks.

The transmission of more data across an enterprise for the purpose of achieving the benefits of IoT can appear to be challenging and risky business. By employing edge solutions and technologies, energy companies can push IoT initiatives forward in a safe and effective way.

Companies in this Article

Sponsored Recommendations

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...

Creating A Digital Transformation Roadmap Using A Unified Namespace

Digital Transformation has become one of the most popular buzzwords in the automation industry, often used to describe any digital improvements to industrial technology. But what...