Manufacturers adopting wireless tech

Networks Asia Staff
06 Feb 2014
00:00
News
Daily News

Increasing networking of manufacturing equipment is opening up factories to the benefits of flexible production and wireless mobile communications.

However, the rising use of connected devices is also exposing production sites to security breaches and cyber-attacks, compelling companies to seek ways to protect their networks, according to a new white paper from IHS Technology.

Wireless network connections in industrial automation components in global factories will rise from 2.1 million in 2012 to 3.4 million by 2017. This increase magnifies risk factors to manufacturing environments.

Do the worm

The issue of security in manufacturing networks became front-page news in 2010, when the Stuxnet computer worm afflicted industrial control systems in Iran. Stuxnet was designed to both subvert and engage in the surveillance of supervisory control and data acquisition systems made by Siemens.

While Stuxnet is thought be an intelligence tool, other types of malware are designed simply to infect and cause damage to manufacturing systems. In some cases, hackers have engaged in blackmailing the manufacturing operations of companies, demanding a ransom in order to lift the malware from their systems.

Mobile malady and catching flies

“The rising use of wireless networks and industrial Ethernet is leading to a growing trend in the so-called bring-your-own-device (BYOD) movement in the manufacturing business, with workers utilizing their own smartphones and tablets to monitor and control industrial equipment,” said Mark Watson, associate director, industrial automation group at IHS. “However, such devices may lack adequate security, offering hackers easy access to confidential data—or allowing them to spread malware through factory automation systems.”

To counter this threat, manufacturing operations are taking cyber-security measures. Among these is the “honeypot,” a site that masquerades as a manufacturing network but is actually an isolated system designed to divert and gather information about hackers.

Related content

Comments
No Comments Yet! Be the first to share what you think!