Creating hyper-aware industrial facilities

Issue 2 2021 Infrastructure

A hyper-aware industrial site is instrumented such that applications are cognisant of the contextual status of the environment, machines, occupants, inventory, service needs, security and safety. Industrial Internet of Things (IIoT) is collectively the eyes and ears of a cognisant plant and generates logical representations of physical data, i.e., temperature, flow, current consumption and speed, among many others. IIoT data are supplemented by contextual information generated by a plant’s data network, i.e., identity, location and applications in use.

The combination of data and context enables applications to be cognisant and plants to become smart enough to adapt to the environment, machines and workers. The richer the set of data and context, the more adaptive the site can become. Some plants have only limited cognisance, while others are fully instrumented and hyper-aware.

IIoT is characterised by devices and systems that are ruggedly designed and constructed, capable of operating in environmentally uncontrolled environments with high mean-time-between-failures, operated using a wide range of wired and wireless physical layers and communication protocols, often deployed in firewalled silos without access to the Internet and capable of deterministic operation in closed-loop control applications.

According to McKinsey, the total economic impact of IIoT in worksites and factories in 2025 will be between $1.3 trillion and $4.6 trillion. The top identified areas include operations optimisation, predictive maintenance, inventory optimisation, health and safety and human productivity monitoring:

Operations optimisation is expected to increase worksite productivity by 5-10% and lower costs by 5-12%.

• Predictive and improved maintenance are expected to yield 3-5% productivity gains and lower costs by 10-40%.

• Inventory optimisation is expected to lower costs by 20-50%.

• Health and safety are expected to reduce costs by 10-20%.

• Human productivity monitoring is expected to yield a 5-10% increase in productivity.

Tips for designing hyper-aware industrial sites

IIoT security: IIoT stands out as a category because in no other industry is the impact of a security breach so impactful or the defences so poor. Adhering strictly to a zero trust framework, IIoT devices should not be allowed on a network unless and until trust can be asserted to the same standard as it is with IT devices. The framework should leverage contextual information from a multitude of sources to scrutinise user and device security posture before and after they connect.

Business transformation enabled: Companies frequently rush headfirst into IIoT projects without clearly defining objectives, value propositions, or the suitability of tools. The first order of business in any IIoT project is to identify the strategic business goals to be achieved. Those should flow down into a series of specific objectives that rely on successfully delivered business moments. The IIoT architecture is the tool by which relevant context and data can be successfully extracted and exploited in favour of the strategic goals.

Building a contextually adaptive plant: Factory asset tracking systems feed real-time inventory and work-in-process data to analytics engines to more efficiently manage production lines. If inventory delivery is delayed, production lines can be slowed instead of stopped, reducing expensive scrap, rework and re-start expenses. The result is a contextually adaptive factory that automatically balances the speed of production with the availability of parts. Asset tags are an important building block of an adaptive factory.

Bridging IT/ OT plant-wide for uniform visibility and security: What do CIOs and COOs have in common? Both want uniform visibility into, and security of, OT traffic and device behaviour, with IT policy management supervision of crossover traffic. Bridging the IT and OT divide requires a recognition that both definitions of trust and both modes of operations, are important to achieving enterprise-wide data visibility and cybersecurity. One without the other would put an enterprise at risk financially and operationally.

Automating plant network access for service personnel and contractors: Enhancing human productivity necessitates making devices and the environments in which they work more cognisant of, and automatically adaptive to, the needs of employees, service personnel and contractors. On-boarding service personnel and contractors onto plant networks has historically been challenging because of network security concerns. The trick is to both simplify guest access so it doesn’t create an administrative burden and implement security policies that tightly control what guests can do and access while on the network.

Migrating from break/ fix to predictive maintenance: Addressing maintenance proactively to minimise downtime and maximise the utilisation and performance of assets, can reduce maintenance costs substantially. Juggling cost-asset performance management solutions and its security risks against the benefits of lower downtime and fewer disruptions is a challenging calculation. An optimal solution is to leverage secure, robust IT infrastructure that is already deployed in a plant to capture machine status from IIoT sensors. A dual-use IT/IIoT network is more economical to deploy and can eliminate gateways and the security threat they pose.

Physical distance monitoring and contact tracing: Workplace safety extends beyond physical and environmental hazards. Today, physical distance monitoring and contact tracing are essential for back-to-work and stay-healthy-at-work initiatives. While there is no single physical distance monitoring and contact tracing application that will work for all enterprises, real-time location services and identity stores have an essential role to play in every workplace infection control solution.

Conclusion

The digital transformation of IIoT is focused on delivering meaningful business value across all facets of local and remote operations. Aruba’s Edge Services Platform (Aruba ESP) addresses all the imperative industrial facilities. It is the industry’s first AI-powered platform designed to automate, unify and protect the edge for businesses of any size or type. Aruba ESP includes attributes of unified infrastructure, zero trust security, AI-powered operations (AIOps) and flexible consumption/financing models.

Working in concert with key technology partners, Aruba helps bridge the IT/OT divide and boost efficiency, productivity, reliability, safety, security and profitability. By enabling uniform visibility and uniform security from I/O to CEO and accommodating the different operating modes of both IT and OT, Aruba is able to address the needs of CIOs, COOs and CISOs at a price-point that checks the box for CFOs.

Find out more at www.arubanetworks.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...