Industrial Internet Security Framework v 1.0 | Page 123

Security Framework 12: Looking Ahead—The Future of the IIoT Split key technology could be used to enable multi-party control (i.e., N of M) of IIoT system components such as actuators. Not all technological advances will benefit the security of IIoT systems. Some, such as quantum computing, may reduce the viability of some cryptographic techniques while others may still be useable [UWAT-QC]. Thus, algorithm agility is appropriate in IIoT systems, including the ability to update algorithms in hardware securely. Computing done at the network edge or perimeter areas is sometimes referred to as fog computing. 1 In fog computing, more processing is done at the network edge before being moved to the core network and the optional cloud repository. With the potential for billions of IoT devices creating data, it becomes challenging to move all of it at adequate speed through the network—this creates a data management issue at the edge of the network that must be addressed. The fog may become a viable deployment method to address these issues for IIoT. New consortia are in the early stages of defining reference architecture for fog. Once their reference architecture becomes better defined, the aspects of fog can be applied to IIoT security. Similarly, management paradigms, especially for brownfield deployments will gain in capability with microservices. A microservice is an element that results from the architectural decomposition of an application’s components into loosely coupled patterns consisting of selfcontained services that communicate with each other using a standard communications protocol and a set of well-defined APIs, independent of any vendor, product or technology. Industrial microservices are small autonomous software components that work to manage a particular aspect of a physical asset. Although the physical asset remains the same for years, the microservices used to manage them can be easily upgraded. There are many types of industrial internet microservices such as data microservices, common microservices, intelligent cities microservices and others. Blockchain is a permission-less distributed database often used as a public ledger with integrity assurance. It maintains a continuously growing list of data records hardened against tampering and revision. Each block includes the hash of the prior block, linking the blocks together. Blocks are in turn defined as small sets of transactions that have taken place within the system. Each new block includes a hash of the previous transaction, which “chains” it to all previous blocks. Blocks are computationally difficult to create, taking multiple specialized processors and significant amounts of time to generate. In some IIoT systems creating a tamper-proof log of transactions or other information may have value. The blockchain technology could possibly support this as well as enabling multiple secure records of broadcast updates. Supply chain management is a key area where blockchains could be leveraged in the IIoT environment. Some of the advantages of blockchains are the ability for independent nodes to converge on a consensus of the latest version of a large data set such as a ledger. This provides consistency, validity of transactions and automated conflict resolution. 1 See [OpenFog-Res] IIC:PUB:G4:V1.0:PB:20160926 - 123 -