Artificial Intelligence Notice: ISA prohibits the entry of ISA standards and related ISA intellectual property (“ISA IP”) into any form of Artificial Intelligence (AI) tools, such as ChatGPT. Additionally, creating derivatives of ISA IP using AI is also prohibited without express written permission from ISA’s CEO. In the case of such use, ISA will suspend a licensee’s access to ISA IP, and further legal action will be considered. Please review ISA's Terms and Conditions for further information.

  • By Marissa Morales-Rodriguez, PhD, Penny Chen, PhD, Peter Fuhr, PhD, Sterling Rooke, PhD
  • InTech
Convergence and commercial momentum
Industrial Internet of Things evolution

By Peter Fuhr, PhD; Marissa Morales-Rodriguez, PhD;
Sterling Rooke, PhD; and Penny Chen, PhD


Industrial instrumentation and sensors are purpose-built for applications. Rugged and proven for field applications in harsh environments, such as on an oil platform or in a copper mine 5,000-feet below ground, these instruments require reliability and performance. Before the turn of the millennium, industrial technology-and information technology (IT) in particular-drove these systems, and they often exceeded the abilities of consumer products. However, as we stand today, commercial Internet of Things (IoT) technology has advanced rapidly, with industrial control systems lagging in intelligence and features.

Experienced owner-operators of industrial facilities recognize the buzz surrounding the Industrial Internet of Things (IIoT), but often shun the notion of consumer-grade devices being installed and integrated into an operational control system. During the ISA Process Control and Safety Forum (PCS) in Houston, Texas, in November 2016, ISA's Communication Division convened a panel to focus on IIoT. Experienced industrial and control engineers on the panel expressed concerns and reservations with IIoT. Whereas some acknowledged an interest in the topic, others did not recognize it as an inevitable part of the industrial controls landscape. Granted, IIoT is still mostly a vision in the instrumentation and automation landscape; however, its place on stage is coming into view. During the opening session of PCS 2016, ISA President Jim Keaveney rhetorically asked the audience if IoT had peaked and also wondered if "cyber" would be the next area for innovation. This article explores the nexus of "domestic" IoT and how product evolution will drive its development toward that of IIoT.

U.S. government to promote IIoT evolution?

On 1 September 2016, the National Telecommunications and Information Administration within the U.S. Department of Commerce (DOC) conducted an IoT workshop. Discussions included how IoT and IIoT were set to converge around common threads. An important area of convergence will occur around onboard components and subsystems, with software as a runner-up because of cost and the innate drive to be first to market. However, as the recent Samsung Note 7 battery failure and subsequent recall has shown, releasing a product with flaws that are later discovered in the field by your customers is a bad idea. Despite this, the hype surrounding IoT is truly at its peak relative to other emerging technologies.

President Trump has targeted infrastructure as a key agenda item in his administration. This proposed infrastructure buildout combined with growth in U.S. industrial capacity would benefit from incorporation of IIoT sensors and systems. At the Consumer Electronics Show (CES) in January 2017 in Las Vegas, many companies demonstrated attempts to deploy IIoT in industrial facilities-often with woefully inadequate performance and cybersecurity. The rush to develop and deploy will no doubt increase consumer IoT being used for IIoT (again, as on display at CES 2017), accelerating the IoT and IIoT convergence.

At the DOC IoT workshop, participants spent a significant amount of time discussing the important role government can play in setting IoT standards. IoT experts at the workshop made it clear that with assistance from the federal government-specifically the U.S. Department of Energy (DOE) and DOC and their national laboratories-guidelines for cybersecure and robust IoT could be developed. With help from the government and organizations such as ISA, industry will have a clearer path to develop industry-centric IIoT rather than rushing to field consumer IoT devices. The question is that, even with this framework, will simple cost and a discount of risk dominate, so that IIoT essentially becomes IoT wrapped in a harder shell? We propose that this is what will occur.

However, we must take heed when it comes to cybersecurity and realize that with commercial IoT, an industrial target could be attacked in a manner similar to an attack on a commercial target-but with very different consequences. The solution? Although we should accept that IoT and IIoT will converge, there must be clear distinctions in cyberarchitecture and associated protections. This goes for implementation as well as regulations and guidelines proposed by governments and industry standards developed by organizations like ISA.


Figure 1. IoT for electric grid

Industrial Internet of Things

Could seemingly trivial items, such as Amazon Echo/Alexa, be worthy of consideration for industrial automation and applications? Many stalwarts of the status quo voice concerns about safety standards and dangers of this technology in the industrial setting. Although these are valid concerns, a more important concern is that commercial IoT standards or best practices do not always apply to IIoT concerns.

IIoT is a specialized IoT implemented in ruggedized packages suitable for industrial application environments. In fact, legacy industrial control devices, such as programmable logic controllers, will be compatible-for the time being-with IIoT running alongside. IIoT benefits from data flowing through standards-based and common networks. From a networking standpoint, the IIoT systems will break the ongoing practice of using proprietary networks and bring into place a common standards-based networking technology. The convergence of IT and operational technology (OT) operation knowledge for industrial automation environments is well underway. Soon IIoT will approach the network edge for almost every industrial application. IIoT installations can include hundreds or even thousands of sensors across a large facility. To handle all of this information, one approach is for IIoT to leverage the cloud in a manner similar to the Alexa example with IoT. In his book Internet of Things with Python, Gaston Hillar illustrates how sensor readings from IoT devices compound into a situation that must be managed.

A typical industrial practice involves acquiring one measurement per second from each IoT device. The number of measurements-from just one device-is:

  • 60 measurements for all the variables per minute
  • 3,600 (60 x 60) measurements per hour
  • 86,400 (3,600 x 24) measurements per day
  • 31,536,000 (86,400 x 365) measurements per year (assuming a nonleap year)

Consider the situation where an industrial facility has 3,000 IIoT devices running the same code, thereby generating 94,608,000,000 (31,356,300 x 3,000) measurements per year. (Each IIoT device is generating one reading per second.) In addition, it is envisioned that a data ingestion engine may analyze and acquire information from other data sources, such as tweets about weather-related issues in the locations in which the sensors are capturing data. The net result is huge volumes of both structured and unstructured data to analyze computationally to reveal patterns and associations.

From a convergence standpoint, many of these big data repositories and data manipulation centers will be the same for both IoT and IIoT. The key differences are cost and technical capability, and these commercial repositories are quite capable of servicing IIoT data at a low cost. Comingling of data between a home toaster oven (IoT) and the IIoT data from a cement kiln, for example, is not the real worry. The greater concern is a denial of service attack on the large provider. If we consider Amazon and its Amazon Web Services (AWS) and similar technologies, we can appreciate how an attack on a commercial business such as Amazon could disrupt critical processes supported by IIoT in a factory.

What constitutes IoT and the technology levels associated with IoT use in, for example, the electric grid? Figure 1 illustrates the situation.



Figure 2. Spectrum sensing, sharing, decision, and mobility functional components of an IoT device for dense deployments in industrial settings

Intersecting technologies

With the introduction and promulgation of IoT devices in an industrial setting, a wide range of questions and problems arise, including the following examples:

1. How do wireless IoT devices all share the frequency spectrum? Issues of spectrum congestion-such as numerous devices sharing the same frequency spectrum-are lumped into the general category of the "spectrum crunch." One example of the correct answer can be for the IoT device to incorporate levels of spectrum sensing (in essence acting as a spectrum analyzer for the frequencies of "interest"), while having spectrum mobility (being able to change operating frequencies easily and quickly). The spectrum subsystem elements for such an adaptable IoT device are shown in figure 2.

2. Process control systems speak a wide range of protocols. Should an IIoT device or system speak one or all of these protocols? Or is having a logical system element perform protocol translation sufficient?

3. "IP addressable to the edge," such as most IoT device and system designs, causes the logical element and subsystem design-which is foundational to the vast majority of today's industrial networks-to be incorrect. IP-to-the-edge can provide wonderful integration into IT-centric networks, thereby allowing IT security applications to have entire network visibility. A "flat architecture" provided by IP-to-the-edge allows for an everything-to-everything level of connectivity. It also allows users to partition a variety of working zones based on operational or business needs. We believe the constraints should be set by application and business needs, not by technology incompatibility. This should be one basic concept of IIoT.

4. IoT movement has also advanced sensing technology. IoT edge devices may have varying levels of complexity and functionality, with various vendors leaning toward sophisticated and relatively energy-consumption-intensive operation, whereas others promote the advancing technology of passive wireless sensor tags (with no batteries, extremely low cost, and intrinsically safe operation). The ISA Communications Division has collaborated with the U.S. National Aeronautics and Space Administration, DOE, and other organizations during the past six years to conduct passive wireless sensor tag workshops and promote new types of low-cost wireless sensing technologies for IIoT.

5. In essence, the question distills to the following: What does the industrial network have to look like for IIoT devices to be used? Several great standardization activities have been initiated in IEEE and the Internet Engineering Task Force (IETF), such as IEEE 802.1 Time Sensitive Networking and the IETF Deterministic Networking. Those technologies are created to address the need of IIoT, which allows a single network to share its resources and to be deterministic to reserve network bandwidth for time-critical applications. An initial set of functionality and performance "answers" for IoT devices in a factory automation setting is provided in figure 3.



1. Communicate outside the plant in standard
ways
2. Have object-oriented data models that
relate to their physical objects
3. Not interfere with the reliability, integrity,
or security of control applications
4. Be portable to devices on the plant floor
5. Share the existing infrastructure
6. Anticipate various forms of wireless media
7. Be able to easily add or reconfigure applications
without affecting the existing plant.

Figure 3. An industrial Internet-ready, time-sensitive network architecture

Reader Feedback


We want to hear from you! Please send us your comments and questions about this topic to InTechmagazine@isa.org.



Like This Article?

Subscribe Now!

About The Authors


Marissa Morales-Rodriguez, PhD, is a research and development scientist at Oak Ridge National Laboratory. She has been working in the area of chemical sciences, concentrating on applications related to sensing, additive manufacturing, and document security. She is director-elect of the ISA Test & Measurement Division.


Penny Chen, PhD, is a senior principal technology strategist at Yokogawa US Technology Center (USTC), responsible for technology strategy and standardization focusing on wireless, networking, and related security, and exploring new technologies for industrial applications. Chen is actively involved in ISA100, Wireless Systems for Automation, and a variety of IoT standardization activities, including IEEE P2413 IoT Architecture Reference Framework. Chen received a PhD in electrical engineering from Northwestern University. She is the director of the ISA Communications Division.


Peter Fuhr, PhD, is a distinguished scientist at Oak Ridge National Laboratory and also serves as the technology director for the Unmanned Aerial Systems (UAS) Research Laboratory. He is the director of the ISA Test & Measurement Division.


Sterling Rooke, PhD, is the founder of X8 LLC, a technology company focused on industrial sensors with an eye toward cyber- and energy security. On a part-time basis, Rooke is the director of training within a Cyber Operations Squadron in the U.S. Air Force. In his role as a reserve military officer, Rooke leads airman through training exercises to prepare for future conflicts in cyberspace. He is the director-elect of the ISA Communication Division.