Know Before You Buy: How to Find Secure IoT Devices

As the number of IoT devices skyrockets, we are seeing the amazing powers of connected networks. Businesses are able to transform as they approach operations with smart, informed decisions. In the industrial sectors, IT decision makers have visibility into the OT networks and are now able to execute logic locally at the edge devices and transport critical data globally – enabling intelligent command and control of the network. We are starting to see glimpses of a connected world we never knew possible just a few years ago. As adoption of IoT rapidly expands, the Achilles Heel of these devices continues to be security – at least in the minds of end-users and consumers. A Recent report circulating around IoT news outlets states that 90 percent of consumers lack confidence in the security of IoT devices.  Yet more than half of these consumers own one or more IoT devices. The report, based on a survey conducted by Gemalto, revealed other concerning and somewhat astonishing statistics that have been reported in recent articles, including: 60 percent of respondents say their main fear is hackers taking control of their devices. 54 percent are concerned about personal information being accessed. 54 percent of the consumers surveyed said they own an IoT device but only 14 percent said they knew enough about how to protect it. Only 11 percent of manufacturers and service providers total IoT budget is spent on securing devices. Two thirds of organizations use encryption as their main means of security, with 62 percent encrypting data as soon as it hits the device and 59 percent as it leaves it. Only 50 percent of IoT companies have adopted a security-by-design approach. 92 percent of companies reported an increase in sales or product usage after devices have been made more secure, demonstrating a link between security and adoption 61 percent of businesses said regulation needs to be greater to specify who is responsible for security and data at each stage of its journey. 55 percent said safeguards are needed for ensuring non-compliance with security. 86 percent of businesses and 90 percent of consumers believe governments should handle regulation of the sector. Smart Device Selection Despite security concerns, adoption of IoT devices continues to rapidly expand. For industrial IoT (IIoT) networks, future business success is going to depend on connecting those edge networks in order optimize operations, drive production, reduce downtime, and create a safer work environment. When decision makers choose the IoT devices that will be deployed in their networks, it is critical to find products that meet the security and operating standards of the business. This can be determined through a careful evaluation of options. Are you looking to purchase IoT devices for your IIoT network? Consider carefully reviewing and answering these questions before you make your decision: What are your requirements? Must haves versus Nice to haves? Are there any regulatory considerations? What is the M2M communications technology controlling or automating? Is it essential that it operates without failure? What data is being collected and/or transmitted with this technology? Is it time sensitive and/or mission critical? What technology solutions have a proven track record for the applications being served? What external factors might impact the reliable transmission and receipt of critical data from one point to another? How does this M2M communications technology address challenges such as data encryption, network access control and signal interference? Can the vendor describe the security mechanisms? Can you understand them? Will this be secure even if everyone knows the security measures? (The right answer is yes, otherwise keep looking) Do we need this technology solution to be fail-safe, in order to prevent or eliminate catastrophic damage from occurring? What are the threat vectors I’m most concerned about? Is cyber security or physical security a greater concern for this deployment? What vulnerabilities have the Information Security community identified in the type or category of IIoT equipment I use? What is the right tradeoff between features, ease of use and security for my installation? Do I have a testing or evaluation plan in place? What ongoing improvements do I expect? While device security is going to be a lingering concern – especially as the lines between the IT and OT networks blur – companies have the power to prioritize security in their networks and make informed decisions when it comes to selecting their devices. Until there are more government guidelines in place, it is up to the IIoT decision maker to find these options in their quest for connectivity.

IIoT Top News — Security Remains Top of Mind

Cybersecurity has been top of mind for industry experts and consumers alike. The WannaCry ransomware is putting a legitimate scare into affected companies, although many are apparently preparing to call the hackers’ bluff. Yesterday, another cyberattack was announced as well, and it has the potential to be far more lucrative for the developers. The common denominator between the two? A leaked exploit developed by the NSA that leverages a Windows file-sharing protocol. These attacks are indicative of the long-term game of cat and mouse that the government and private enterprise faces for the foreseeable future of security and counterintelligence. Moving forward, the growing network of connected devices for the Industrial Internet of Things (IIoT) faces similar security threats. This week, we found several stories demonstrating some of the solutions surrounding those potential security issues. The 9 Best Practices for IIoT from a Dell Security Expert   At a recent presentation for 2017 Dell EMC World Conference, Rohan Kotian, Dell EMC’s senior product manager for IoT security, spoke about his nine best practices for improved IIoT security. His number one strategy? Simply understanding the concerns. Many IoT devices come out of the box with few security controls in place, and understanding the risk is the most important step in addressing them. In this article from Tech Republic, you can read Mr. Kotian’s other nine best practices, including studying the attack trends, classifying risk, and leveraging fog computing.   IIoT Market Expected to Approach One Trillion Dollars by 2025   Grand View Research writes that the industrial Internet of Things will experience explosive growth over the next decade, going from a $109 billion industry in 2016 to an expected $933.62 billion by 2025. The massive market increase will be driven by a number of factors, one of which continued investment by government agencies and corporate leaders. As the report states, “The role of the Internet of Things (IoT) is increasingly becoming more prominent in enabling easy access to devices and machines. Government-sponsored initiatives and innovative efforts made by key companies, such as Huawei, GE, and Cisco, are anticipated to enhance the adoption of IIoT worldwide over the forecast period.”   IIoT Presents Unique Security Challenges Security is always a top priority in the Internet of Things, but IIoT applications present unique challenges. In this article from CSO Online, Phil Neray, CyberX’s vice president of industrial cybersecurity, writes that despite the growth of IoT applications in oil, gas, electric, and pharmaceuticals, “The fact is that all of these devices were designed a long time ago.” That means IIoT innovators have the challenge of integrating the newest technology into systems that may be decades old. This sort of retrofitting can make security a real challenge and there are few experts available who have both the knowledge of legacy systems and the latest IIoT solutions.   Sprint to Deploy LTW Cat 1 by End Of July   The Internet of Things relies heavily on low-power communication protocols to perform, so a recent announcement on FierceWireless.com that Sprint will be releasing LTE Cat 1 by the end of July is music to IoT developer’s ears. LTE Cat 1 is designed to support low-power applications on the Sprint network such as vehicle telematics and industrial IoT applications. “As one of the leading enablers and solution providers of the internet of things, Ericsson believes in its power to transform industries and capture new growth,” said Glenn Laxdal, head of Network Products for Ericsson North America. “Ericsson looks forward to partnering with Sprint to deploy Cat M1 next year and bring the transformative power of IoT to the Sprint Nationwide network.” The announcement also noted that Cat M would be following in mid-2018. TE Cat M1 and LTE Cat NB1 will support other applications requiring ultralow-throughput and power consumption.

IIoT News RoundUp – Security, New Products and More

The Industrial IoT (IIoT) continues to drive big news headlines. Recently we’ve seen news on security, connectivity and new products. We’ve compiled a handful of the most compelling IoT headlines from the past couple of weeks (including exciting news from FreeWave). IIoT in the News How I Learned to Stop Worrying and Love the Industrial IoT Posted on @RTInsights | By @joemckendrick “Moving to IIoT — to capture and be able to act on real-time information on production, machine health, facility conditions, supply chain movements, inventory, shipping, and a host of other capabilities — is nothing short of a new industrial revolution. Embracing these capabilities requires hefty investments, training, skills acquisition, re-directing of resources, and even re-thinking the business you are in.” Standardized Connectivity Protocols Lead to Growth of IIoT Apps Posted on @ITKE | By @S_Allen_IIoT “IIoT app development programs will begin to outgrow/outpace consumer IoT app development programs within the next three years. Third-party IIoT application development at the edge (i.e., fog computing) specifically will eliminate need for big data transmission capabilities. The ability to filter specific data needs directly at the source means less of a need to collect all the data for broad analysis.” First Industrial IoT Programmable Radio Enables World of Connected Possibilities Posed on @CEAsiaMag | By Lim Guan Yu  “The rise of Fog Computing as a driver of intelligent analytics created a need for industrial companies to transport more data faster from Edge sensors. Rather than transport massive packets of data – Big Data –a programmable platform deployed at the edge of IP networks enables sensor control functionality and allows them to send smaller packets of data as determined by the IIoT app. This results in Smart Data that streamlines decision making, provides predictive analytics for maintenance and support, and allows organizations to automate processes that previously required ongoing, manual attention.” Data Leakage And The IIoT Posted on @SemiEngineering | By @Chip_Insider “In the past, the complexity and size of an operation generally provided safeguards against data theft or leakage. But with commonly used data mining tools, it’s now possible to separate out meaningless shop floor data and hone in on the important events, which roughly adhere the 80/20 rule. Add in multiple companies and begin correlating bottlenecks and other noteworthy industrial events, and that data suddenly becomes much more valuable to a lot of people—makers of equipment, government or industry policies, marketing groups, as well as the highest bidders within a particular industry or those looking to invest in an industry.” FreeWave Technologies Updates New WaveContact Wireless Technology Solutions Posted on Yahoo Finance “WaveContact products interface with a wide variety of sensors deployed in industrial and critical infrastructure markets such as oil and gas, electric power, water and wastewater and environmental monitoring. The product line is built for short-range field applications where simplicity and ease of use in Class 1 Division 1 hazardous locations are critical for success.” Why Collaboration Is the Key to IIoT Posted on @automationworld | By Phil Marshall “Building the Industrial Internet of Things (IIoT) is a complex undertaking. When Hilscher started to create an IIoT strategy, we realized that no single organization would be capable of a total solution. Too much was involved across too many domains. Plus, there is a lot that automation vendors don’t know about IT, while the IT world also knows little about automation—at least for now.” FreeWave Technologies Teams Up with Alliance Corporation Posted on @IoTEvolution | By @KenBriodagh “FreeWave said it is expanding its traditional channel partner distribution network with new relationships with distributors who offer new avenues for sourcing through the channel. As FreeWave expands its product offerings further into the IIoT space, aligning and building relationships with partners, like Alliance, is a critical step in offering a full system of integrated hardware and software solutions.” Security Professionals Expect More Attacks on IIoT in 2017 Posted on @HeardOntheWire | By @notjbg “The fears of a large-scale attack waiting to happen were solidified this week when security firm Tripwire released the results of a study it performed about the rise of industrial IoT deployment in organizations, and to what extent it is expected to cause security problems in 2017. The IIoT includes segments ranging from critical infrastructure such as energy and utilities all the way to government, health care and finance. Not surprisingly, more than 50 percent of the security professionals surveyed said they weren’t prepared for an IIoT attack, and 96 percent expected to see an increase in such attacks this year.”

Hacking: A Cybersecurity Top News Edition

Hacking became a scary reality last week as we all witnessed Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit simultaneously get hit with a massive Denial of Service (DoS) attack. This attack also interrupted hundreds of other sites and internet connected devices from functioning properly.  For months, we’ve been hearing about the need to protect and secure our networks and devices. As the world steps further into the digital landscape, it’s clear that new advancements around cybersecurity tactics and strategies need to be addressed. Many are calling for standardization as a means to collectively thwart attacks and identify problem areas. Due to the proliferation of IoT technology and billions of connected devices, our critical infrastructure projects are those that may deserve the most attention in the short term. Read on for this week’s top cybersecurity news highlights that shine a light on the hacking aftermath and the inherent cybersecurity risks we should all be aware of in the IoT space. Exposed to Hacking Cybersecurity Experts are calling for Internet of Things Standards in Wake of Massive Attack By @ethanbaron | Published on @mercnews “In the assault Friday that blocked access to hundreds of websites, including Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit, thousands of hijacked “internet of things” devices  bombarded a New Hampshire company called Dyn with traffic.” The Lessons From the East Coast CyberAttack By @josephinecwolff | Published on @Slate “This is an important lesson of online security and often an incredibly difficult one to impress upon users: Even the accounts and computers and machines that you don’t care about being.” Why Businesses Need to Secure Connected Devices to Win Consumer Trust By @jeffjohnroberts | Published on @FortuneMagazine “The issue now is whether the government should do more to regulate the Internet of things (IoT), or if we can instead trust companies and the market to solve the problem.”   This Attack Was Different–Cyber Threat Draws Utility Warnings By @BlakeSobczak | Published on @EENewsUpdates “Department of Homeland Security officials, who say they are investigating the attack on Dyn with the FBI, have warned that some smart-grid devices could be inadvertently swept up into attacks on other websites or key internet infrastructure.” Top Five Biggest Threats to IoT Security By Hannah Williams | Published on @cbronline “Hackers have recently been able to obtain access to a wide variety of connected devices, which has prompted new concerns over the security threats of the Internet of Things.”   Cybersecurity: The Biggest Threat to Automated Trucking By @AaronHuffCCJ | Published on @CCJnow “A single point of failure, or security breach, in a supply chain has far-reaching effects for all parties. Transportation companies must therefore think beyond their own IoT network perimeter, he advises, as the march towards automation continues.” As we conclude another round of top news highlights, we hope to have opened your eyes to modern cybersecurity considerations. As technology continues to evolve, we must continue to learn how to better protect our IoT interests upon exposure to hacking.

Securing Assets with Outdoor Wi-Fi

The video surveillance market is anticipated to grow to $42B by 2019. Many industries today are using video monitoring as part of their physical security efforts to protect assets.  As the Internet of Things (IoT) is increasingly adopted by more industries, careful consideration must be made when leveraging Sensor-to-Server (S2S) solutions for video-based security applications.  From a technology perspective, IoT is beneficial for video security because it enables more data collection to drive intelligent business and security decisions that will better protect assets. However, with more sensors and devices connected to an IT network comes increased exposure for cyberattacks. It was inevitable that IoT would cross over into the physical security space, but the idea of security devices connected into an IoT network is concerning to many security professionals. In 2015, HP reported that up to 70 percent of IoT devices are vulnerable to cyberattacks. Any intelligent communication that is leveraged in an IoT environment must be designed with security in mind and have the ability to protect the network against cyber-attacks. Without ample security in the environment, companies risk severe consequences such as compromised data or denial of service. Outdoor Assets Protected Some outdoor shorthaul, Wi-Fi-based S2S networks are now designed to securely monitor and transmit voice, video, data and sensor (VVDS) information for asset monitoring and control. Additionally, any industry looking for an outdoor network robust enough to provide Wi-Fi connectivity may also benefit from these outdoor Wi-Fi solutions. From emergency communications to municipalities, industrial networks to golf courses or campgrounds, and more, there are numerous use cases where Wi-Fi is beneficial for connectivity and also for high-speed shorthaul communications needed to enable VVDS data. In IoT environments there are sensors on every single asset, constantly pulling data, so they need to make sure that security features are part of the technology’s design. For the operator seeking outdoor Wi-Fi to connect physical security devices and enable video monitoring, it is important to be familiar with the technology they are selecting. The Wi-Fi networks best suited for outdoor environments will have a rugged design with proven reliability in extreme environmental conditions. When the right security measures are in place, these solutions can ensure that data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. Although robust, outdoor Wi-Fi can provide the connectivity needed for VVDS applications, but it needs to be able to withstand and prevent cyber security attacks. When the right technology is selected and enabled, asset protection can be enhanced through video. How are you protecting your assets?

Who Needs Rugged, Outdoor Wi-Fi Networks?

When we think about Wi-Fi, we tend to lean towards the idea of connections that allow us to access our mobile devices. With a Wi-Fi connection we can stream videos, access our apps, check email, work and basically manage our digital lives. In non-traditional settings, the need for outdoor Wi-Fi connectivity is increasing, but it is accompanied by some unique challenges. Outdoor Wi-Fi  Connectivity Industries that operate mostly outdoors are finding a greater need for Wi-Fi connectivity. Campgrounds are providing Wi-Fi as both an amenity and as a tracking and booking tool for managers and campers alike. Golf courses have deployed industrial-scale Wi-Fi networks to monitor irrigation, golfers and other assets throughout a course, and marinas are using Wi-Fi networks for both communication and vessel management needs. There has also been a strong uptick in the use of industrial Wi-Fi networking for security programs and disaster response. Companies can use  high-speed Voice, Video, Data and Sensor (VVDS) data transport as building blocks for a security network capable of real-time monitoring. These Wi-Fi solutions are especially ideal for video monitoring, as they provide the bandwidth necessary to transport large amounts of data. Disaster response has also been an ideal application for industrial-scale Wi-Fi. Often times, cell networks can get knocked out during environmental disasters, effectively eliminating a critical component for communication. Today, organizations can deploy these Wi-Fi platforms on vehicles or other response assets that can enable communications in emergency or disaster situations. For any industry with outdoor operations, assets will be exposed to the worst natural elements – extreme heat, freezing temperatures, heavy snow, strong wind, dust storms and more. The challenge is finding a shorthaul, Wi-Fi solution that is rugged and secure enough to withstand the elements, but also advanced enough to enable new types of high-speed, high throughput application solutions. Rugged Wi-Fi Communication Solutions There are solutions designed for robust, secure transport of VVDS information for the edge devices in industrial communication networks. These rugged, shorthaul communication networks are specifically designed for outdoor Wi-Fi connectivity and have proven reliability in extreme environmental conditions. These types of solutions are ideal for oil and gas, utilities, mining, power plants, municipalities, disaster recovery or any other type of industrial applications. They also suit innovative deployments at golf courses, marinas, campgrounds and other settings that require outdoor Wi-Fi connectivity. How would you like to have Wi-Fi connectivity for your own outdoor networks? FreeWave just launched a new contest and the winner will receive their own network of rugged, outdoor Wi-Fi solutions. Enter Today! Contest Closed Enter today for a chance to win FreeWave’s award-winning WavePro WP201shorthaul and Wi-Fi solution. Contest entrants must provide a high-level account of the application of the WavePro, along with a description of the need for the platform. Winners will be announced at the close of the entry period. To enter the contest, please visit http://go.freewave.com/wavepro-network-giveaway.  Submissions are due by September 30.

Behind the Scenes: Airports Across the Country

Many of us have been in airports around the country a lot lately. Summer vacations are a time when families converge at our local airports, anxious to spend time with loved ones and get to their destinations for fun, relaxation and adventure. However, we tend to take for granted all that goes into running our airports, along with the safety and security required to ensure the smooth operation each airport requires. Plus, we generally only think about what is happening inside the airports, but the truth of the matter is, there is potentially more activity happening outside of the airport at any given time. From aircraft maintenance crews and air traffic controllers to airfreight handlers and runway security personnel, there is a slew of machines and people conducting airport operations outdoors that need to be coordinated and as efficient as possible. According to a 2010 report by the Bureau of Transportation Statistics, a total of 631,939,829 passengers boarded domestic flights in the United States that year. This averages to 1.73 million passengers flying per day. It’s mind-boggling to think how this number has increased since that time as it’s clear that general aviation airports of all sizes are an integral part of our National Aviation System. Many airports have aging facilities, shifting demands to accommodate the changes in the general aviation industry, and diminishing revenue sources. These trends coupled with limited staff and budgets have made it difficult to properly maintain the facilities beyond responding to immediate needs. Automator of Airports The automation of processes and industrial communications can help. Setting up an outdoor industrial wi-fi network is one way field managers at airports can ease the burden of maintaining a safe and efficient infrastructure. For instance, establishing a hardened and ruggedized commercial-grade wi-fi network around the perimeter of an airport not only creates a safe and secure enclosed zone, but, also provides a way for maintenance crews to monitor and ensure the overall outdoor field operations of the airport facility. This can be easily achieved through resilient wireless networks because they allow for easy and relatively inexpensive modification as outdoor airport infrastructures and policies change (which can be frequent). In addition, besides obvious benefits to airport maintenance crews, there are indeed FAA requirementsthat need to be adhered to for compliance – making it even more imperative that airport facility personnel find more effective ways of ensuring proper airport operations and safety procedures are maintained at all times. Some examples of how outdoor wi-fi networks can assist in a smoother, more automated airport infrastructure include: Establishing a communications link with all airport maintenance crew through VoIP, video and data so that all personnel are able to communicate with one another and send immediate notifications if/when needed – saving time, effort and money. Adhering to FAA mandates which require personnel to provide reports on outdoor lighting, runways, vehicles and the overall airport infrastructure three times per day. Great efficiencies can be obtained through automating these various tasks reducing the amount of time and labor needed to maintain, monitor and report these things. Installing communication devices on airport maintenance vehicles connects all of them so that personnel can notify proper authorities of outages through their tablets versus manually having to inform supervisors that action needs to be taken. These are just a few of the ways an industrial outdoor wi-fi network can help airports maintain a safe, secure and well-functioning infrastructure. So what will the future airports look like and how will they operate? If the current IoT landscape has shown us anything its that any manual process or operation that can be automated through the use of machines or smart devices eventually will be (automated). As airport field operations continue to be held to higher standards and increasingly rigid regulations, the faster they can adapt to the pressures of an on-demand economy, the better.

(Industrialized) IoT App Development

Has IoT app development begun to take the globe by storm? A few weeks ago we discussed the growing need for more third-party app creation for the Industrial IoT industry. This week, we dive deeper and focus on those early adopters of industrialized IoT app development and what industries these “bleeding edgers” are serving. We all know by now the number of connected things is projected to grow massivelyover the coming years. Injecting new software applications into the industrial IoT world creates even more monitoring, control and usage of devices and data at the edge. Some would call this influx of software with industrialized hardware a modern marriage. The manufacturing sector, for example, seems to have found a use for implementing next-generation hardware to improve and automate operations, especially along the assembly line. At the same time, cloud-based software solutions are being leveraged to improve data analytics, thus improving actionable intelligence in real-time. What’s more is this new environment is incentivizing industrial manufacturers to cultivate new business models as they are finding that solutions they have developed in-house are as valuable as the hardware they manufacture. By tracking the performance of manufactured products in the field, manufacturers gain faster feedback loops and insights from customers. For example, instead of waiting months or even years for performance feedback, the integration of cloud-based software and modern hardware provides manufacturers this information in what is approaching real-time. This allows them to respond quickly with fixes, advice or, when needed, replacement equipment. As we enter into uncharted territory for many in this new interoperable, connected tech world, we have to also consider the cybersecurity measures in place and how it will combat any vulnerabilities as the surge of new, industrialized software applications enter our critical infrastructures. Security must be manufactured into the product from the very beginning – this includes tamper-proof hardware, authentication protocols, data encryption and more. What’s Next? Big companies like AT&T and Microsoft are joining forces for the good of the developer. We all can agree software is taking hold of certain business operations, so it is only natural companies would seek an easy solution for enterprise to bring about this change. The industrial side may appear to move slower when it comes to implementation, but that is only because of the various moving parts – machine-to-machine (M2M) devices, sensors and wireless technologies – that must sync with precision without missing a beat. Software is the enabler of this interoperability. So what is the next step in this industrialized development? Jeff Dorsch with Semi Engineering believes that, “Industrial Internet of Things (IIoT) applications proliferate in critical infrastructure, such as the power grid and water supply, the importance of the underlying software and the availability of an open-source platform for app development is coming to the forefront.” This fully-functioning data driven ecosystem will have to decide if open or closed systems are the best for their needs. Google and Apple, for example, have provided internet enabled ecosystems of devices. The problem is that they are closed ecosystems that limit which devices and which data can speak to each other. If industrial players want to take advantage and accelerate their own digital transformations, market opportunities and revenue, then they must take a closer look at open and secure technologies and start innovating for IIoT today. So as we all start to dip our toes in the industrialized software development pond, be sure to consider how your desired outcome matches the factors of delivering business value – customer responsiveness, security, revenue generation and operational efficiency. All are important in and of themselves, but different business models drive different decision-making. Embracing the IIoT app development opportunity early on might prove to be the smartest investment from a competitive advantage standpoint – being able to answer the “why” question is what will eventually separate the high-performers from the rest.

Difference Between Data Sheet Transmit Power & Data Stream Transmit Power

Image courtesy of Flickr Creative Commons You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (PTP) RF link between the two sites. Short-haul RF links out to 8 miles are very doable using industrial Wi-Fi Access Points with directional antennas. You evaluate potential Wi-Fi Access Points from their data sheet specs. This is given, and you select one. Now, there is one specification that is commonly misunderstood and leads to confusion when evaluating MIMO capable Wi-Fi Access Points and using them in either PTP or point-to-multipoint (PMP) IIoT networks as wireless infrastructure. Confusion and mistakes arise from the difference between the transmit power stated on the product data sheet and the transmit power of a single MIMO data stream of the Access Point. For example, a 3×3 MIMO Access Point data sheet states the transmit power is 27dBm for MCS4/12/20 data encoding in either the 2.4 or 5GHz band. This is typical, and not a surprise, but what is this transmit power really stating. The FCC limits and regulates maximum transmit power from an intentional emitter, e.g. Wi-Fi Access Points. For Wi-Fi devices, the limits apply to the aggregate transmit power of the device. In above product spec example, the transmit power stated is the aggregate transmit power for the 3 MIMO data streams. Still good? Yes. You have a Wi-Fi Access Point and the total transmit power is 27dBm. Now, you design your short-haul PTP link using Wi-Fi Access Points and directional antennas. What transmit power do you use in your RF link budget? 27dBm since it is the transmit power for the Access Point for the data encoding and the band you plan to use. Right? No. While 27dBm is the total aggregate transmit power for the Access Point, it is not the transmit power of an individual data stream. The individual data stream transmit power is roughly 5dB less than the aggregate transmit power found in the data sheet for a 3×3 MIMO product. Difference in Transmit Power versus Aggregate Power 1 Data Stream transmitting at 22dBm    —  Aggregate Transmit Power is 22dBm 2 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 25dBm 3 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 27dBm So here it is… If you use the transmit power from the data sheet in your RF link calculation without correction, your actual link distance will be approximately half what you expect for the planned fade margin or the link reliability will be less than what you expect for the planned link distance. When designing RF links for the IIoT networks, make certain you are using the correct transmit power in your RF link budget calculations.

Sensor-2-Server: Benefits & Security for IIoT Communications

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development, security and implementation. For the past two weeks, we’ve taken an in-depth look at what Sensor-2-Server communications are, how to implement these systems, and some of the specific aspects of communication that these systems facilitate. This week, for our final installment, we’ll examine some of the benefits, as well as security considerations, for S2S communications. Benefits of Sensor-2-Server Communications From a technology partnership perspective, Big Data vendors face the challenge of comparing data in motion versus data at rest. If the data has already moved through a SCADA system and has been aggregated, changed, stalled, or is not quite granular enough, it can be difficult to deliver high-value predictive analytics. The concept of predictive analytics is that an operator can make an accurate estimate that certain things can happen during operations. However, the operator needs to determine what the drivers are for the predicted actions to happen and must look at active data to determine if this is, in fact, happening. Without insight into the active data in motion, they are lacking an essential piece of the predictive analytics. This ability to compare data in motion at the access layer could benefit Big Data vendors when it comes to predictive analytics because it allows them to give higher value to their customers, which drives additional revenue. With S2S technology, they can deploy a tiered application infrastructure that allows data to intelligently move from one point to another. S2S also enables operators to go beyond a legacy SCADA data network. To operate a SCADA network, it requires a lot of institutional knowledge to truly understand, manage and work within the environment. S2S expands beyond moving the data into SCADA systems and allows operators to leverage more advanced technology, like predictive analytics. Essentially, S2S communications provide the opportunity to take advantage of new advanced tools, but the operator doesn’t necessarily have to sacrifice the institutional knowledge built into the SCADA data systems. As new generations enter the workforce, it’s likely that there will be a shift and some of that institutional knowledge will be replaced with technology that will allow operators to do more than they ever could before. The addition of new technology and IoT networks is where operators are starting to see the functional lines blur between the IT and production groups. As more technology is leveraged, these two disparate groups will have to work together more often. There is now a drive for a more holistic picture of what is going on in IT, what is going on in the field, and whether the technology used will be compatible with future needs. SCADA will likely always have value for industrial communications but, going forward, there will be an increase in the use other technologies as well. Additionally, with more technology physically in the field, there is always going to be a focus on data security. Security Sensors at the access layer present interesting security challenges. For example, consider a data concentrator sitting on an oil pad that is collecting data. This device is collecting data from a number of sensors and has data logging capabilities, which also means the other devices sitting at the remote site contain historical data. Technology providers need to insure that the technology used is taking advantage of all the security features that are available to make sure their data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. With the growing interest in IIoT, the system is providing a communication path with highly valuable information. These sensors may be running an application on the edge of the network, and many of these devices are using IP. When there are Ethernet and IP devices going out to edge devices in the field, each one of those devices has the potential to become a threat to the entire corporate network if they’re not secure. Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. Data protection data is a fundamental and extremely important element in determining the effectiveness of S2S communication. Technology vendors must be mindful of security in every step of the design and installation process, and operators must require security features that will protect their data and networks. In addition to data security, the threat to physical infrastructures in very remote locations is driving the need for new security solutions such as intelligent video surveillance designed to maximize security and minimize cost. S2S solutions need to be physically capable of delivering the bandwidth to enable these new solutions. Where Do We Go From Here? Industrial communication is changing in the sense that IIoT enables the possibility for every device in a network to be connected – including those in the outer access layer. This has created a convergence of OT and IT operations in many instances or – at the very least – has brought the two departments to a closer working capacity. IoT and technology at the access layer enable the option for Sensor-2-Server, a form of intelligent communications that can move the sensor data to a specific server for detailed analysis. New data and technology are allowing operators to do things they’ve never done before, such as predictive analytics. As this shift continues, SCADA is not becoming an obsolete technology; rather it will become a piece in the bigger technology picture. Any operator choosing S2S technology, or any technology for that matter, must carefully consider the options and keep security as a top priority.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.

Did you find what you were looking for?

Please let us know if you didn’t find what you were looking for so we can help make the site better for you.