The Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium

Similar documents
This is the Next Industrial Revolution: The Industrial Internet. 8 February 2017

Introduction of the Industrial Internet Consortium. May 2016

Welcome to the Industrial Internet Forum

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

Business Impact of Digitization Ruba Borno, Ph.D.

DDS for the Energy Industry. Howard Wang, Ph.D. Director of Business, APAC

Making the Industrial IoT a Reality. Tom Craven VP of Product Strategy RRAMAC Connected Systems

L2 - Internet of Things

Bill Ruh, CEO of GE Digital & Chief Digital Officer of GE. December #IndustrialInternet

Integrated Security Management Framework

CONNECTING SERVICES IN IOT DESIGN

LES high Tech Sector Joint Call Aerospace and Transportation Committee Content, Communications & Cloud (3CX) Committee

Internet of Things (IOT) What It Is and How It Will Impact State Pools

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Internet of Things: Driving the Transformation

The Safe, Secure and Reliable Industrial Internet: A Standards Story March 2017

February Investor Presentation

Using DDS with TSN and Adaptive AUTOSAR. Bob Leigh, Director of Market Development, Autonomous Vehicles Reinier Torenbeek, Systems Architect

IoT Security and Risk Management

Introduction of the Industrial Internet Consortium. July 2015

Innovating with a Trillion Smart Objects

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

IIC World Tour - Turin: Security Working Group Briefing. Nisarg Desai Product Manager, GlobalSign

Innovation policy for Industry 4.0

Internet of Things Toolkit for Small and Medium Businesses

Technology in Ohio: The Past, Present, and Future. Ice Miller LLP

SMART INFRASTRUCTURE. Your Digital Strategy Realized in the New Age of Connected Data Alan Kiraly, Senior Vice President, Bentley Systems NYC FORUM

ACARE WG 4 Security Overview

Introduction to Device Trust Architecture

Internet of Things. Transforming How We Live and Work. Chris Perera Senior Director, AT&T International External & Regulatory Affairs.

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Achieving End-to-End Security in the Internet of Things (IoT)

New Partners Join Charter of Trust to Protect Critical Infrastructure

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

Angela McKay Director, Government Security Policy and Strategy Microsoft

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust


Vitheia IoT Services

Building the Future. New ICT Enables Smart Cities. Yannis Liapis Oct 25 th,

TD01 - Enabling Digital Transformation Through The Connected Enterprise

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

The Integrated Smart & Security Platform Powered the Developing of IOT

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

IoT in the Valve and Actuator Industry

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

The NIS Directive and Cybersecurity in

GDPR - How it may clear up the digital market. Anett Mádi-Nátor, Cyber Services Plc.

The Role of the PI System in IIoT. Dr Dominic John, VP of Marketing and Technical Communication

In Accountable IoT We Trust

The Internet of Things and Security

Internet of Things Towards a more collaborative model

Digital Health Cyber Security Centre

There s Never Been a Better Time. Dave West CTO, Cisco APJ May 2016

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

The Internet of Things Cognition for Cost Savings and Efficiency Improvements

Windows 10 IoT Core Azure Connectivity and Security

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

IoT privacy risk management in ANASTACIA project

EY and GE Digital Industrial Internet Alliance

IoT and Privacy by Design

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

Converged Platforms and Solutions. Business Update and Portfolio Overview

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.

Digitalization Risk or opportunity?»

Module 2: Rise of Urbanization & Digital Technologies

General Framework for Secure IoT Systems

Alternative Fuel Vehicles in State Energy Assurance Planning

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

Center for Cloud and Autonomic Computing (CAC)

The Internet of Things and Factory of Future

Resilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy. B20 Recommendations on Digital Trade

Embedded Tech Trends: Market Insights

5G Networks. Arturo Azcorra. U. Carlos III and IMDEA Networks

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.

An overview of mobile call recording for businesses

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Accelerate Your Cloud Journey

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Monitoring and Managing IIoT Security

Future-Proof Security & Privacy in IoT

from SCADA to IoT Cyber Security Bogdan Matache - Romania 2015

The Internet of Things. Presenter: John Balk

ECEN Security and Privacy for Big Data. Introduction Professor Yanmin Gong 08/22/2017

The Berlin Center for Digital Transformation Jürgen Diller Berlin, 31st January 2018

Covering North America

Open access or Making money openly. David D. Clark MIT Computer Science and AI Lab January, 2006

Industrial F-Secure Auditorium Jukka Kuusinen COO & Head of Sales Tieto Industrial Internet

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Open Digital: The Digital Services Opportunity Explored

Smart Sustainable Cities. Trends and Real-World Opportunities

Smart Cities & The 4th Industrial Revolution

Transcription:

The Industrial Internet: Opportunities, Disruptions and Standards Stephen Mellor Chief Technical Officer Industrial Internet Consortium

Industrial vs. Consumer Internet of Things Similar Technology Drivers Small inexpensive sensors & actuators Low cost processing power and data storage Smart devices Connectivity Different Business Drivers Consumer Adequate Quality Modest Security Cost Sensitive Industry QoS Safety Robust Security ROI Sensitive Efficiency New Products New Markets 2

The Measurable Outcome will be in the Trillions of Dollars GE: $32.3 trillion opportunity representing 46% share of GDP today. Cisco: Internet of Things (IoT) will increase private sector profits 21% and add $19 trillion to the global economy by 2020 Gartner: IoT product and service suppliers will generate incremental revenue exceeding $300B in 2020. McKinsey Global Institute: $33 trillion operating costs could be impacted by IIoT Sources: GE, Cisco, Gartner, McKinsey 3

Monetization 1% savings from efficient Industrial Internet solutions could save billions in operational costs $30B fuel cost saving in aviation industry $66B fuel cost saving in gas powered fleets $63B productivity improvement in healthcare $90B reduction in Cap X in oil & gas exploration and development $27B productivity improvement in rail industry Source: Industrial Internet: Pushing the Boundaries (2012, Evans & Annuziata) 4

Repercussions With the advances in industry come serious concerns over security Productivity Efficiency Performance Increased Risk Larger Attack Surface Grave Consequences Content restricted to IIC Members Not for External Publication 5

Information Technology IT Security specialists focus on: Security first, then Privacy and Reliability. Resilience is interesting for financial transactions. 6

Operational Technology Operational Technology experts focus on: Safety, Resilience and Reliability Security is interesting now that control sytems are connected to the Wide Wide World. 7

Trustworthiness Trustworthiness is a combination of these five elements: Safety Security Resilience Reliability Privacy (not only security and privacy). Reliability These must be reconciled. 8

Permeation of Trust Trust flows down from the owner/operator to all parts of the IIoT system, but trust must be enabled from the bottom up. Content restricted to IIC Members Not for External Publication 9

Assurance of the Permeation of Trust Permeation of Trust trust in all of the system elements, how these elements are integrated and how they interact with each other. Content restricted to IIC Members Not for External Publication 10

IIoT Security Application Content restricted to IIC Members Not for External Publication 11

IIoT Security Building Blocks and Techniques Content restricted to IIC Members Not for External Publication 12

The IIC and standards organizations The IIC is not a standards organization. The IIC will: establish a reference architecture evaluate existing standards against it identify requirements, and propose these requirements to standards organizations Requirements are different for the Industrial Internet compared to consumer IoT. 13

Security Boundaries System Boundary Network Transport Media access (layer 2) Network (layer 3) security Session/Endpoint (layer 4/5) security Data & Information flows This is addressed by DDS Security 2017 Real-Time Innovations, Inc.

DDS: Data-Centric, Fine-Grained Security Per-Data-Topic Security Control r,w access for each function Ensures proper dataflow operation Complete Protection Discovery authentication Data-centric access control Cryptography Tagging & logging Non-repudiation Secure multicast 100% standards compliant PMU CBM Control Operator Analysis State Alarms SetPoint Data Topic Security model: PMU: State(w) CBM: State(r); Alarms(w) Control: State(r), SetPoint(w) Operator: *(r), Setpoint(w) Applications Data Topics 2017 Real-Time Innovations, Inc. Permission to distribute granted.

Thank you mellor@iiconsortium.org www.iiconsortium.org info@iiconsortium.org +1-781-444 0404 x137 Things are coming together 16

INDUSTRIAL INTERNET CONSORTIUM USE OF INFORMATION - TERMS, CONDITIONS & NOTICES Authors and legal notice Copyright 2016 Industrial Internet Consortium (by Object Management Group, Inc.). All rights reserved. This document is provided AS-IS and WITHOUT WARRANTIES. All copying, distribution and use are subject to the limited License, Permission, Disclaimer and other terms stated in the Industrial Internet Consortium Use of Information Terms, Conditions & Notices. If you do not accept these Terms, you are not permitted to use the document. 17