Telecoms, Datacoms, Wireless, IoT


Wireless security and Industry 4.0

31 May 2023 Telecoms, Datacoms, Wireless, IoT

5G wireless technology is transforming telecommunication networks, enabling a plethora of connected devices that provide new capabilities and enhance innovation. This transformation is accelerating Industry 4.0, which has applied the benefits of IT capabilities on physical systems, enhancing many different control mechanisms. Using digital technology to replace legacy analogue controls, connected devices such as embedded digital controls, cameras, and sensors have ushered in an environment of ‘smart’ everything – from buildings and transportation to manufacturing and many other industries.

This has, in turn, created numerous endpoints vulnerable to cyber threats. With the broad adoption of 5G in industrial systems comes increased cyber risks that leave networks vulnerable to compromise. 5G networks are a likely target for cybercriminals to exploit sensitive data.

Mitigating security risks

Segregate networks: One way to mitigate risks across an organisation – and an important point of overall network security – is by segregating corporate and industrial or control networks via different architectures. By introducing a simple two-port firewall between the corporate and control networks, companies can achieve significant security improvements. If properly configured, such a firewall reduces the chance of a successful external attack on the control network.

Develop risk management plans and policies: To further mitigate the risk of cybersecurity compromise brought on by the infusion of billions of connected devices that 5G enables, risk management plans and policies are critical. Companies should continually evaluate and adjust these policies as 5G adoption continues to grow and as automation technology, cybersecurity threats, and personnel change.

Risk management plans and policies should be built on processes that focus on framing and assessing risks, responding to threats, and continuously monitoring processes and systems to detect such risks. For example, policy may include implementing symmetric encryption as a means of protecting data so that only the sender and recipient can use the key or password to gain access.

In the context of cybersecurity, these processes are mostly interrelated and will vary according to the size, location, landscape, and nature of the business and industry.

Build a security programme to deter cyber risk: Using these risk management policies, organisations should develop and deploy an industrial control security programme. Such a programme should work together with other IT security programmes throughout the enterprise. The security programme’s key elements should include building and training cross-functional teams, conducting regular security audits, and using an established risk management framework, such as the NIST cybersecurity framework.

While establishing a security programme is important, it’s equally important to continually update it to reflect changes in technology, operations and processes, industry standards and regulations, and any unique requirements for the security of specific equipment, processes, or facilities.

Develop a cross-functional team and promote cybersecurity culture: Cross-functional teams are an important part of a security programme. Because the domain knowledge across an enterprise varies, cross-functional teams can bring different but complementary knowledge and skills to managing and mitigating risk. For example, a team may include personnel from IT, engineering (specifically those knowledgeable about underlying automation and controls), and operations, plus cybersecurity and IT architecture subject matter experts. An information security manager should oversee the team and its ongoing work.

To further bolster the cross-functional team and its mission, organisations also need to create a cybersecurity culture that extends beyond the team and into the extended enterprise. This includes training and educating all personnel, implementing policies such as two-factor authentication throughout the organisation, and enforcing processes like cybersecurity clearances for contractors, vendors, and other tiered organisations that work with the company.

Conclusion

By utilising established cybersecurity frameworks and developing shrewd policies and practices, organisations can mitigate much of the risk posed by the expansion of 5G in Industry 4.0. Part of the journey is understanding the consequences of attacks, and taking steps to build not only secure networks and devices, but also a culture that recognises threats and vulnerabilities well ahead of an attack.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The trends driving uptake of IoT Platform as a Service
Trinity IoT Editor's Choice Telecoms, Datacoms, Wireless, IoT
IoT platforms, delivered as a service, are the key that will enable enterprises to leverage a number of growing trends within the IT space, and access a range of benefits that will help them grow their businesses.

Read more...
RF power amplifier
RF Design Telecoms, Datacoms, Wireless, IoT
The ZHL-20M2G7025X+ from Mini-Circuits is a 32 W power amplifier that operates from 20 to 2700 MHz and delivers a saturated output power of +45 dBm.

Read more...
Introducing the Quectel EG800Z series
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
The EG800Z series is Quectel’s latest ultra-compact LTE Cat 1 bis module, designed to deliver reliable connectivity, low power consumption, and robust performance across a wide range of IoT applications.

Read more...
NeoMesh on LoRa
CST Electronics Telecoms, Datacoms, Wireless, IoT
Thomas Steen Halkier, CEO of NeoCortec, recently gave a keynote speech where he spoke about “NeoMesh on LoRa: Bringing true mesh networking to the LoRa PHY”.

Read more...
Modules upgraded with Direct-to-Cell tech
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has announced that several of its LTE modules are now available with Direct-to-Cell (D2C) functionality, enabling devices to seamlessly connect to satellite networks.

Read more...
USB/Ethernet smart RF power sensor
RF Design Telecoms, Datacoms, Wireless, IoT
The PWR-18PWHS-RC from Mini-Circuits is an RF power sensor that operates from 50 MHz to 18 GHz and is designed to capture pulsed and trace modulated signals with very high data resolution.

Read more...
Tiny Bluetooth LE + 802.15 + NFC module
RF Design Telecoms, Datacoms, Wireless, IoT
Unleashing enhanced processing power, expanded memory, and innovative peripherals, the BL54L15µ from Ezurio is the ultimate choice for small and low power connectivity.

Read more...
AI modules for edge intelligence
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
SIMCom has introduced two new entry-level AI computing modules, the SIM8668 and SIM8666, designed to bring intelligent capabilities to lightweight, energy-efficient edge devices.

Read more...
High performance ISM antennas
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has announced the launch of two new high performance ISM antennas, designed to meet the need for wireless communication in devices that operate in the industrial and commercial applications.

Read more...
Quad-band high-precision positioning module
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has recently announced the launch of the LG680P, a multi-constellation, quad-band GNSS module designed to deliver high-precision positioning across a wide range of applications.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved