Speeding up your reactions

Suzanne Gill, editor, Control Engineering Europe, finds out more about the benefits that edge computing is bringing to the operational technology environment.
Living on the edge.
Living on the edge.

Several of the most important responsibilities for modern control engineers can be made simpler, more autonomous and more secure through the adoption of edge computing. From trouble shooting and maintenance, through optimisation, collaboration, compliance and cyber security – the edge environment presents a way of visualising and processing data that offers potentially huge advantages when compared to less digitalised methods or even the use of cloud data management.

“With the right edge computing solutions, these benefits can be gained with minimal IT expertise at the application level,” argued Greg Hookings, Director of Digital Industries – EMEA at Stratus Technologies. “This is vital for a swathe of control engineers who have limited access to ongoing IT support.”

The need for edge computing solutions continues to grow as businesses of all sizes explore artificial intelligence (AI) and machine learning capabilities and deal with ongoing skills and labour shortages, while also protecting their operations from cyber threats.

In the data-rich environment of modern industrial environments, edge computing plays a crucial role in delivering timely insight into application management. “The primary reason for this is down to latency,” continued Hookings. “While traditional approaches to data management require collating data for processing in a data centre, or more recently in the cloud environment, this necessarily means that data needs to travel, usually away from the application edge, in order to be processed. This limits the potential for making decisions quickly enough to react to fast-changing conditions of the application. Edge computing offers control engineers much more localised control, with data being managed at the application level in real-time. This brings forward opportunities to take proactive decisions that can reduce downtime and improve the vital overall equipment effectiveness (OEE) metric at the machine level.”

Hookings pointed to another factor driving the growth of edge computing – cyber security – especially given that controls systems are increasingly targeted in ransomware attacks. “Edge computing platforms can reduce this risk through the use of real-time threat detection monitoring and rapid response to potential ransomware threats,” he said. “With data stored, processed and secured locally, the exposure of control systems to external threats is also reduced, making edge computing a more inherently secure model for managing critical data.”

A paradigm

Daniel Korte, Technology Manager PLCnext Technology at Phoenix Contact, considers industrial edge computing to be a paradigm that combines the advantages of cloud computing and local data processing to enable more efficient, secure and flexible production systems. “By using open standards, interoperable technologies and real-time communication, industrial edge computing can help the manufacturing industry achieve higher levels of productivity, quality and innovation,” he said.

Korte highlighted the main benefits for industrial edge computing as being lower latency and data protection while obtaining added value from data. This enables cost reductions as well as productivity increases, or improved quality, to be obtained. “Lower latency is enabled through data processing close to the source, reducing the delay and bandwidth consumption of sending data to the cloud. Data protection can also be achieved as the data is in the local network,” he said.

The specific applications for industrial edge computing, according to Korte, include connectivity and data infrastructure applications. In edge computing, these include the brownfield connection of machines in order to leverage the added value of the data without exchanging the PLC or accessing the logic of the machine. “This is mainly about connectivity with data buffers and data pre-processing,” Korte explained. “The data pre-processing, of course, also includes the use of AI, which enables real-time decision-making, feedback and control.

“Preconditions and trends in industrial edge computing are openness as the leading variable, and no proprietary technologies, interfaces or protocols should be used. Open catalogue interface (OCI) containers and virtualisation in general are key technologies here, as a basis for the use of applications that is as hardware independent as possible. In addition, the deployment of these applications must function via standard mechanisms.”

Data management revolution

According to Giacomo Tenerini, Hardware Developer at Exor International, the growing integration between IIOT and edge computing is revolutionising the management of data generated by industrial devices. “While the cloud approach has traditionally been used, the exponential increase in data necessitates deeper consideration,” he said. “The process of sending data to the cloud for processing can be slow, especially for IIOT applications that require near real-time responses. Edge computing is a better solution, enabling processing close to the data source, reducing latency and optimising information flow management.”

Giancomo highlighted the primary motivation for adopting edge computing as being latency reduction, bandwidth optimisation and managing associated costs. Furthermore, he pointed out that the integration of analytics algorithms and machine learning models at the data source further enhances operational efficiency.

Security issues

Dan White, Director of Technical Marketing at Opto 22, highlighted a prevailing trend in industrial edge computing as being a pivot towards enhanced cyber security. “Edge manufacturers recognise that robust cyber security is not just a protective measure, but is also a key enabler of broader connectivity, both for on-premises systems and especially for cloud-based computing platforms,” he said. “Tools like advanced analytics, anomaly detection, AI, machine learning and large language models all rely on abundant data, and the edge is where that data resides – in the form of sensors/actuators, industrial equipment and various IIOT devices.”

Edge devices serve as the linchpins in establishing secure connections to cloud services and, when considering the right edge device, White advises that engineers should look out for the following features to ensure it is possible to securely democratise data:

  • Integrated firewall management: Built-in firewalls that scrutinise and regulate network traffic are essential for maintaining network integrity and reliability in OT settings. These firewalls filter traffic to block unauthorised access and potential threats.
  • Encryption and security certificates: SSL/TLS encryption ensures secure data transmission and protects against data breaches. Security certificates authenticate communication between devices and systems, allowing only verified exchanges.
  • Network segmentation: Networks should be segmented into secure zones, protecting critical systems from less secure networks and thereby mitigating cyber threats.
  • Zero trust user management: Secure edge devices should avoid default credentials and backdoors for password recovery. Look for devices that do not inherently trust any user or device and necessitate rigorous authentication and authorisation, often managed through Lightweight Directory Access Protocol (LDAP). Strict access control is crucial for preventing unauthorised access and securing OT systems.

Pub/sub communication methodologies: Support for advanced publish/subscribe (pub/sub) communication models like MQTT enables efficient and reliable data exchange between devices and systems. This model is particularly effective in environments requiring real-time data distribution. Protocols like SparkplugB, recognised as the international standard ISO/IEC 20237:2023, ensure interoperability among devices, further solidifying the cyber security framework within OT environments by enabling secure, structured and efficient data communication.

“The trend towards prioritising cyber security in edge computing is clear and fundamentally about data democratisation," concluded White. “Whether connecting to an on-premises server or a cloud computing platform, enabling more secure and scalable connectivity ensures that production systems are not only resilient against increasing cyber threats, but also primed for future growth and innovation.”

Share