The different technologies in the form of tools (AMORA, HEIMDAL, THOR, ODIN, and FRIGG) will be validated in three different scenarios during the project methodology.
These three scenarios have been selected from three different industrial sectors involving three main potential end-users (OT device manufacturers – MASS, manufacturing machinery provider –FARR, and IoT system manufacturer and integrator – COS) in order to have a wider point of view for the requirements definition and validation.
Scenario 1: Manufacturing of gas valves for household
The energy consumed by households around the world is based on electricity for the lighting and low power applications, but almost all the households remain still on natural gas for high power applications (e.g. heating systems, hot water generation, cooks, ovens).
Due to the risk associated with the natural gas, each of these gas-based appliances must incorporate thermocouples and gas valves which are mandatory in most countries. Currently, around 100 M of gas valves and thermocouples are produced and sold each year, which are installed in household appliances around the world (heaters, ovens, cooks…etc). These elements are considered as safety components and must comply with very strict standards in terms of manufacturing quality and zero defect manufacturing. In case some defective parts arrive to home appliances and fatal accidents occur, the manufacturer of the gas valve or thermocouple can get very high severe penalties, even can be forced to close operations.
Mondragon Assembly will validate project results on a real production line equipment (OT environment) in France and on an IT environment involving France and a Chinese subsidiary. The automation of security-based event detection (e.g. vulnerabilities, exploits, network traffic, …) will increase trust, time for response and faster recovery times. The AI-based decision support module, THOR and ODIN will produce recommendations or even actions for containing the threat and for minimizing the business impact. The advanced SOC and the tools will be able to correlate events collected by heterogeneous data sources and detection systems, both at IT and OT business processes. IDUNN’s results will enhance the production lines with cybersecurity operation, that can be thought as a premium option for sensitive customers.
Scenario 2 Manufacturing machinery manufacturer. Automotive mechanical and hydraulic presses
All standardization organizations coincide in the way in which information flows must be structured and a series of security zones defined in industrial environments. These considerations must be taken into account, not only by the owners of production plants but by the same machinery manufacturers like Fagor Arrasate who must undergo controls and audits. Security zones must be compatible with information flows. In addition to the information flows of the production plants, the manufacturers of machinery in Industry 4.0 have their own which can be used to provide new advanced services, such as the concept of Teleservice. On these information flows, the manufacturer analyses the information in real-time. All these flows must be regulated, controlled, audited and, if appropriate, allowed by both the owners of the production plants and manufacturers.
Standards also specify a crucial part for IDUNN, the safety standards that industrial devices must integrate since the failure or service interruption of a machine can cause very serious consequences throughout the production chain that result in series of economic losses and some human cases. For that purpose IDUNN uses multiple modules like HEIMDALL or AMORA which help the process of information gathering, therefore making it easier to detect the compliance faults and their solution.
By developing new methods of data analysis within IDUNN, Fagor Arrasate will be able to generate new valuable information to use and analyze, creating important advantages for end customers lead to the generation of new great value-added digital services that boost the competitiveness of the company. Thus, servitization to improve their competitiveness, increasingly incorporate this type of services within their offer. IDUNN´s mechanisms will not only have the role of protectors but must also ensure interoperability and control of information flows with other systems. Besides, it will be necessary to establish an adequate security infrastructure for the establishment of the new service, but it must be scalable in terms of quality and quantity and applicable to other ICT chains. Using modules like ODIN and THOR they will be able to react on time and correct the system’s flaws without the effort it could carry. Then, the creation of IDUNN plan tailored to potential threats along with the necessary security technology will be essential as an orchestrator to ensure the success of the operation of the new services.
Scenario 3: IoT controller for edge computing. The application for aviation lightning of wind energy
Cosynth will make use of their I4IoT controller platform, a versatile hardware platform for building custom-tailored edge devices. These IoT devices are capable of conducting real-time control services on-premise and provide remote control and remote surveillance for SCADA and cloud support. It is applicable in various domains and use cases as a distributed edge computing device. The architecture consists of two separated domains with its own computing components running independently from each other. The real-time attributed part is designed for the control part, gathering all inputs and setting the desired outputs based on the microcontroller program. The majority of necessary inputs and outputs for the real-time part are usually directly connected to the real-time domain controller. Switching behaviour of the outputs can be changed dynamically by updating the control flow program of the real-time core via the application processor.
The second domain is designed for cloud access and remote connectivity from and to the backend system, SCADA or cloud space. This part is run on a processor not capable of real-time processing but supporting the larger bandwidth communication. Moreover, the processor can also perform analyses of the captured process indicators for supervision and more complex intelligent control purposes. The platform character of the device is realized by the special hardware design, being focused on modularity and scalability. The application processor is integrated as a compute module, which can be exactly fitted on the actual performance requirements of the use case, giving advantages for device cost and applicability on sophisticated algorithms. Furthermore, the interfaces to peripherals can be easily redesigned for each use case as also these inputs and outputs are kept interchangeable. The communication between the processor and real-time core is standardized and can handle the exchange of information between both sides for all scenarios.
As a use case for this project, the I4IoT controller is used as a controller for the top and tower lighting (beaconing) of wind energy plants. Each tower is equipped with one device, while all devices of a wind park are connected on an internal LAN via Ethernet. Remote access is used for interacting with a single unit, e.g. for setting up new blink patterns, or by gathering just the actual status of each unit and displaying a dashboard for the whole wind park. Especially for offshore wind parks the remote access and state surveillance are crucial for reducing the dangerous and costly servicing. The real-time domain collects inputs, such as current state and error conditions, from e.g. the light controllers, the visibility and weather sensors, and discrete inputs from the switch cabinet, and produces the proper outputs to enable and disable the lights, to control the light intensity, and also to synchronize the blink patterns among the other devices of the wind park. For advanced control tasks such as the blink pattern synchronization, additional interaction with the application processor is required.
Since lighting of a wind turbine tower is safety-critical and a loss of lighting can lead to helicopter and plane crashes with fatal casualties, an independently running real-time core is crucial in this use case. This will test the capabilities of low-level modules such as AMORA and HEIMDAL and the trustworthiness of their communications and capabilities. For the control via a central SCADA system, the operator requires remote access to the machine and a made-up data presentation via webservices instantiated on the application processor. The device state is continuously updated with data from the real-time domain and thus represents the live status of the whole system.