Cybersecurity high on the list of obstacles to Internet of Things
Before the Illinois Tollway adopted its iPass transponder-based collection system in the early aughts, I used cash to pay three tolls each way on my daily commute. I always made sure I had sufficient change, so I could use the faster, coin-operated, unmanned lanes. These were simple in a car but more complex on a motorcycle because itās easy to fumble dimes with gloves on. (I got good at sorting coins with my tongue.)
āWhen tolls rose and the Tollway Authority gave the option of paying less by getting a transponder, I was tempted, but cautious. Automatic payment would be a big convenience, but the authorities would not only know where I went, but also when.
āFrom that, they could easily calculate my average speed, which, like everyone elseās and maybe more than most, would be significantly above the limit. I called and asked the tollway representative if they had any plans to use the data for measuring my speed. They calmly assured me they did not, and to my knowledge, they never have. Those were the days.
āOver the past 15 years, much has changed. Alongside that transponder sits the smart phone, giving me directions, road hazards, traffic conditions and police presence, updated in real time. Waze knows exactly where I am and when, and I donāt care. Anyone can have my home phone number and e-mail address, and apparently already does. My computerās RAM runneth over with cookies. So what?
āBut thereās a limit, and weāre running into it in both our private and professional lives.
āPrivately, every day brings a new story of accounts compromised, hacking and data abuse, as well as evidence of increasingly creepy awareness by Internet-hosted marketing apps.
āOn the professional side, people in charge of the safety and security of their industrial facilities see no shortage of news reportsāand evidenceāthat their plants are under constant attack, and the Internet remains the major vector.
āStill, the Internet wants everything connected, and many otherwise respectable folks are exhorting you to do just that with your systems and equipment. Regardless of the topic, it seems that Control articles now almost always have some mention of the Internet of Things (IoT) and its industrial subset (IIoT).
āCybersecurity remains high on the list of obstacles to IIoT implementations, alongside how to move the data into a system in the first place, and how to use it to solve problems and improve operations.
āUntil the IIoT came along, cybersecurity wasnāt much of an impediment to selling automation and system integration services, and we expected it wouldnāt be solved until plants blew up and people died. Now that itās standing in the way of sales, we notice that itās getting more of the attention it deserves.
āThis monthās list of issue topics includes both IIoT and cybersecurity, and I suggested to Jim Montague, executive editor, that in many ways, theyāre the same topic and could be covered with a single article. He protested, partly, I think, on the grounds that theyāre different, but mostly, I suspect, because thereās so much going on in both areas, he wanted more space to write about it.
āWeāre finding increasing numbers of clever, innovative applications of IIoT technology, contained and engineered, so they donāt ramp up cyber insecurity. Some are in Jimās stories, some will unfold in our news coverage of this yearās user group meetings, and some will be highlighted during our own Smart Industry event during Sept. 24-26 in Chicago.
āDone properly with the right suppliers, a little Internet connectivity can safely translate into faster, smoother, more efficient operations with significant cost savings. Like a toll road transponder or Waze, itās worth the hassle, and weāll live with the problems.
About the Author
Paul Studebaker
Paul Studebaker

Leaders relevant to this article: