IT/OT Convergence: The Impact from the Industrial Internet of Things
Brad Gilbert Director, Product Management
Valuable Data Where is it being produced in your network?
Process
Security Operation
Internet of Things Reference Model
7
Collaboration and Processes
6
Application
5
Data Abstraction
4
Data Accumulation
3
Edge Computing
2
Connectivity
1
Physical Devices / Controllers
Involving People and Business Processes Reporting, Analytics, Control
Information Technology
Query Based
Data at Rest
Non-Real Time
Operational Technology
Event Based
Data in Motion
Real Time
Aggregation and Access Storage Data Element Analysis and Transformation Communications and Processing Units The “Things” in IoT Reference IoT World Forum
IoT Protocols Request/Response and Publish/Subscribe
Protocol
Transport
Messaging
Security
Architecture
CoAP
UDP
Request/Response
Medium Optional
Tree
HTTP/REST
TCP
Request/Response
Low Optional
Client/Sever
MQTT
TCP
Publish/Subscribe Request/Response
Medium Optional
Tree
SNMP
UDP
Request/Response
High Optional
Client/Sever
XMPP
TCP
Publish/Subscribe Request/Response
High Mandatory
Client/Sever
Publish / Subscribe Model Reducing Network Traffic Sensor 1
Process 1
Sensor 2
Process 2
Broker or Pub/Sub Server
Sensor 3 •••
Process 3 •••
Sensor N
Process N Publisher
Publishers
Subscriber
Sensor 1 A, D
A Process 1
Sensor 2 A, B
B, C, E, G Process 2
Sensor 3 A, C, E, F Sensor N G
E, F, G Process 3 D Process N
Subscribers
Request / Response Model Information When Needed Sensor 1
Process 1
Sensor 2
Process 2
Sensor 3
Process 3
•••
•••
Sensor N
Process N Responder
Responders
Requestor
Sensor 1 A, D
A Process 1
Sensor 2 A, B
B, C, E, G Process 2
Sensor 3 A, C, E, F Sensor N G
E, F, G Process 3 D Process N
Requestors
Elevating RF Noise Floors Aggregate Emissions This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Cognitive, Adaptive Radios Interference Mitigation Processing and Protocols to Reduce Transmissions Move to Licensed Bands
Top Security Risks in 2016 Similar to 2015
Mitigating Network Risks Plan and Prepare
Defense-in-Depth
Role-Based Access
Personnel Training
Assess Security Risks
Document Control
Software Mgmt
Mitigating Network Risks Control and Monitor
Enable Forensics
Active Monitoring
AAA
Physical Security
Port Access
Password Mgmt