IT in Manufacturing


Securing critical industrial processes in real-time

September 2012 IT in Manufacturing

The susceptibility of critical scada systems to security issues confronts many organisations. While it may be rare to penetrate a control system directly from the Internet, corporate intranet connections, remote support links, USB keys, and laptops can all create pathways for the typical worm or hacker. Once inside, impacting an industrial control system is not difficult – in some cases, even the most basic scanning by a hacker or worm can wreak havoc.

Unfortunately, 99% of all scada and process control devices do not support even basic authentication and authorisation functions. Thus, these devices cannot take advantage of any of the security infrastructures offered by many corporate IT departments. Complicating the matter even more, many scada end users have found the common VPN solutions to be either unbelievably complex to manage in real-time or ill-suited for handling the protocols that are found in automation networks.

Security in aerospace manufacturing

A major aerospace manufacturer faced exactly these issues when securing the systems used in the production of its long-range passenger aircraft. Large, highly mobile crawlers with extensive PLC and HMI components are vital for the assembly of new aircraft. In order to coordinate that assembly, these PLCs require secure access to each other and real-time connection to the corporate network.

Since the PLCs are installed on mobile platforms, they require wireless access to communicate. However, the models of PLCs currently on the market cannot participate in the corporate public key infrastructure (PKI) system, which is a requirement for secure wireless communications. Furthermore, the plant security solution must modify security policy (and allow PLC to PLC connections) based on information from a large variety of sources that change rapidly. For example, the position of a crawler or the card scan of an operator will determine which PLCs can interconnect.

Scadanet Endboxes secure the PLCs

The solution is an architecture called Scadanet that provides a simple and secure encryption system between control devices. Each crawler is protected by a Scadanet Endbox. These Endboxes interconnect securely with other Endboxes over a variety of secure or insecure networks, including the corporate intranet, various cellular services or even the Internet. The Endboxes interact with the corporate IT security services, including the PKI system, to provide an encrypted overlay network between the PLCs assigned to them by the crawler operators.

F-Map ties it all together

Tying all the Endboxes together in a scalable manner is a central publish/subscribe repository of network information based on the interface metadata access protocol (IF-Map) technology. This Trusted Computing Group standard allows systems from different vendors to publish information that the Endboxes can use to determine security policy in real-time. For example, if the IP address of an Endbox changes because a crawler has moved into the range of a new wireless access point, then this information can be propagated to other Endboxes so that critical communications are not disputed. Or if an operator that is not approved for a given crawler swipes into the badge reader, the crawler can be immediately disconnected from the critical control network.

The Scadanet architecture, IF-Map and Tofino Endboxes provide a framework that allows the IT department to manage access to its services and yet let the scada engineers maintain full control over their network systems and devices.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved