Internet of Things Cybersecurity

March 22, 2016
The biggest concern about the Industrial Internet of Things is security. Classifying the devices that comprise such applications can be a big step toward addressing the IIoT cybersecurity issue in easy-to-manage segments.

In every discussion about the Internet of Things (IoT) at every industry conference or event, the question of security always arises. And there’s a good reason for that. To embrace the IoT concept and position yourself to be on the receiving end of all its potential game-changing benefits, you have to connect many of your plant-floor devices to the Internet. And in doing so, you are potentially exposing your operations to every hacker in existence.

Viewed from this perspective, the cybersecurity challenges of the IoT seem overwhelming. And the ongoing rush of new security products and approaches—from embedded devices to in-depth IT policies and procedures—makes it even harder for many manufacturers to determine what to do first.

Alan Grau, president and co-founder of Icon Labs, offers a different view of the issue to help industrial companies approach the problem. “Part of the challenge is recognizing every IoT device requires a different approach to security,” he says. “So, how do you decide the correct level of security for your device?”

Grau suggests first recognizing the four device classes with common security concerns. He describes these classes as:

  • Class 1—includes very small ZigBee, Bluetooth, and near-field communication (NFC) IoT devices often using 8 and 16 bit MCUs. Industrial examples of these devices include remote telemetry (often battery-powered), sensors, and other lower bandwidth sensors and devices.
  • Class 2—these devices are typically small, low cost RTOS-based devices utilizing 32 bit MCU systems, such as medical devices, low-end network appliances, and telematics often paired with cellular or Wi-Fi connectivity.
  • Class 3—this class of devices is exemplified by larger and more expensive medical and industrial automation devices, such as robotics and even smart automobiles, which are usually powered by 32 bit MPUs with Ethernet or Wi-Fi connectivity.
  • Class 4—here, the devices run single or multiple 32 or 64 bit processors and use embedded Linux, Android, or a full-featured RTOS supporting multiple networking protocols. Gateways, high-end medical devices, and military devices are common examples.

By classifying devices on your network in such a way, it’s easier to address your IoT cybersecurity issues in more approachable segments, rather than attempting to secure everything at once.

“Obviously there is overlap among these [classes],” Grau says, “but this model allows some general assessment of security requirements. Determining the details of security capabilities and features to be implemented for a given device depends upon the available memory, processing power of the core(s), interfaces, attack vectors, threat analysis, and ultimately, business trade-offs.”

The Floodgate Security Framework offered by Grau’s company, Icon Labs, is designed to address the differing cybersecurity needs for the varying class levels of devices. To learn more about this Framework of security products, visit: www.iconlabs.com/prod/product-family/floodgate-security-framework.

About the Author

David Greenfield, editor in chief | Editor in Chief

David Greenfield joined Automation World in June 2011. Bringing a wealth of industry knowledge and media experience to his position, David’s contributions can be found in AW’s print and online editions and custom projects. Earlier in his career, David was Editorial Director of Design News at UBM Electronics, and prior to joining UBM, he was Editorial Director of Control Engineering at Reed Business Information, where he also worked on Manufacturing Business Technology as Publisher. 

Sponsored Recommendations

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...

Creating A Digital Transformation Roadmap Using A Unified Namespace

Digital Transformation has become one of the most popular buzzwords in the automation industry, often used to describe any digital improvements to industrial technology. But what...