Secure Data Transmission for Industrial Facilities with the MICA

Mica data transmission 400

 

April 30, 2019

By Thomas Holthöfer, Regional Digital Marketing Manager, HARTING Deutschland

The large variety of machines and plants that has mushroomed over many years is increasingly being networked for monitoring and maintenance purposes. The threat posed by cyber-attacks is highly problematic in the face of old systems and their data connections which lack their own protection mechanisms. This is where HARTING comes in with its MICA® Edge Computer.

HARTING’s MICA® Edge Computer enables machines and systems of any kind to be integrated into an IIoT system. As a result, services such as condition monitoring, predictive maintenance and determining KPIs such as OEE (Overall Equipment Effectiveness) are now possible for existing plants and equipment as well. Depending on the application, suitable interfaces and the appropriate software are combined with the MICA® to form a solution package.

When integrating existing systems into a network, besides the availability of plant interfaces the security of connections and data poses the greatest challenge. Given this, HARTING has developed special protection mechanisms for the MICA® mini-computer and enhanced it with security solutions developed in its MICA partner network.

Major cyber risks for machinery and facilities

A variety of recent studies confirms the growing number of cyber-attacks. Know-how at medium-sized production companies is an especially attractive target. According to the VDMA study “Cyber Risks in Mechanical and Plant Engineering”, the majority of companies are not adequately prepared for attacks. The protection that is in place is inadequate and outdated, and consequently there are threats in the form of business interruption and the loss of confidential company data.

This is where the MICA® and the enhancements developed in the MICA partner network come in. The MICA® enables medium-sized businesses without large IT departments to securely connect machines and systems. Protection comprises five core elements:

  • MICA®-provided protection due to a secure operating system
  • Holthofer mica 400Protection of applications in the MICA®
  • The use of secure protocols
  • End-to-end encrypted data transfer
  • Protection of applications

One MICA network partner is Berlin-based Infotecs, a leading international IT security provider and specialist in software-based VPN solutions. Combining the MICA® and Infotecs’ security solutions permits e.g. the remote control of wind farms, video transmission of final quality inspection in remote production facilities, the management of remote maintenance access, and early scheduling of maintenance work. With Infotecs’ solution, data transmission between the MICA® and a remote peer is protected by a bug-proof and tamper-proof VPN connection (Virtual Private Network) and encrypted end-to-end. “The starting point for our security solution is the MICA. The MICA is particularly robust and secure for the industrial environment,” explains Josef Waclaw, CEO of Infotecs.                                          (Thomas Holthöfer)

Securing the MICA® against attacks

The MICA® is a mini-computer with network connection. The computer has a Linux-based operating system and virtualised application environment consisting of Linux containers. The MICA® operating system is designed to be very slim and contains only the software elements required to operate the MICA®. This in itself eliminates numerous potential attack vectors. For example, the MICA base system does not include package managers, e-mail clients or other services that are often attacked by hackers. The MICA® base system is also inaccessible to users and administrators and cannot be modified by them.

The applications on the MICA® run in separate, virtualised Linux containers. They are designed so that processes or applications cannot gain access to another container or to the operating system. While the MICA® operating system is provided by HARTING, containers can also be developed by third parties, e.g. in order to provide security applications.

End-to-end protection of data transmission from applications

ViPNet software from Infotecs was developed as a MICA container and acts as a virtual security gateway for the MICA’s other application containers. When the applications send data, the latter are picked up by ViPNet, encrypted and sent to the equally protected peer. This can be another machine at the same location as well as a remote peer in a remote network, for processing of the process data.                                                                                                        (Infotecs CEO Josef Waclaw)

CEO mica

Infotecs CEO Josef Waclaw emphasises that additional safety requirements should be considered in industrial applications. Standard networking applications typically work with web servers vulnerable to cyberattacks. Waclaw cites problems with buffer overflow, insecure protocols and man-in-the-middle attacks. Consequently, ViPNet software does not use web server technologies. Another difference mentioned by Waclaw is that standard VPN solutions with asymmetric encryption have been developed for office environments. The keys and certificates are first exchanged in the network and a secure connection is then made to the complete network.

“However, for the security of an industrial production environment it’s important to establish a connection solely to a single machine, rather than immediate access to the entire network. We achieve this through a direct connection that is symmetrically encrypted end-to-end,” the Infotecs CEO said. The remote peers are also equipped with symmetrical keys, and only those data packets where the key fits are opened. This procedure does away with the necessity of exchanging keys via the network and the subsequent verification of certificates. This is advantageous e.g. for connections via mobile communications, since no additional delays are caused by renewed exchange of keys in the face of more frequent disconnections. “The solution, in combination with the MICA, protects sensitive equipment and industrial applications. The software is set up once, and no in-depth IT skills are required,” Waclaw summarises the concept.

Security solutions for industrial applications

With the MICA.network, HARTING has set up a user organisation around the MICA® Open Computing Platform. A partner network has emerged here that provides solutions for e.g. factory automation, logistics, ERP connectivity, IoT and embedded systems, predictive maintenance and a wide range of security solutions. Berlin-based Infotecs is one of these partners. Perfact and krumedia are among other partners with solutions in the area of data protection.

Remote maintenance solution with central service portal

PerFact::MPA (Meeting Point Architecture) was specifically designed in-house for efficient and controlled collection and troubleshooting malfunctions via remote maintenance. It enables the secure and easy setup of a remote connection to a machine. If a problem occurs on a machine, with the push of a button the customer connects the machine via the internet and the service technician receives temporary access to the machine’s controls.

Secure data transmission over public networks

krumedia’s SeComBo Suite enables the secure and dynamic networking of individual network subscribers or complete networks via public networks. This is possible even with restrictive security requirements in company-owned infrastructure and data transmission paths. The focus is on ease of use and complete transparency for the devices involved, so that any network subscribers can use these services. Central administration is web-based and requires no additional software.

Related Articles


Changing Scene


Sponsored Content
The Easy Way to the Industrial IoT

The way to the Industrial IoT does not have to be complicated. Whether access to valuable data is required or new, data-driven services are to be generated, Weidmuller enables its customers to go from data to value the easy way. Weidmuller’s comprehensive and cutting-edge IIoT portfolio applies to greenfield and brownfield applications. Weidmuller offers components and solutions from data acquisition, data pre-processing, data communication and data analysis.

Visit Weidmuller’s Industrial IoT Portfolio.


ADVANCED Motion Controls Takes Servo Drives to New Heights (and Depths) with FlexPro Extended Environment Product Line

Advanced Motion Controls is proud to announce the addition of six new CANopen servo drives with Extended Environment capabilities to their FlexPro line. These new drives join AMC’s existing EtherCAT Extended Environment FlexPro drives, making the FlexPro line the go-to solution for motion control applications in harsh environments.

Many motion control applications take place in conditions that are less than ideal, such as extreme temperatures, high and low pressures, shocks and vibrations, and contamination. Electronics, including servo drives, can malfunction or sustain permanent damage in these conditions.

Read More


Service Wire Co. Announces New Titles for Key Executives

Bruce Kesler and Mark Gatewood have been given new titles and responsibilities for Service Wire Co.

Bruce Kesler has assumed the role of Senior Director – Business Development. Bruce will be responsible for Service Wire’s largest strategic accounts and our growing Strategic Accounts Team.

Mark Gatewood has been promoted to the role of Vice President – Sales & Marketing. In this role, Gatewood will lead the efforts of Service Wire Company’s entire sales and marketing organization in all market verticals.

Read More


Tri-Mach Announces the Purchase of an Additional 45,000 sq ft. Facility

Tri-Mach Elmira Facility

Recently, Tri-Mach Inc. was thrilled to announce the addition of a new 45,000 sq ft. facility. Located at 285 Union St., Elmira, ON, this facility expands Tri-Mach’s capabilities, allowing them to better serve the growing needs of their customers.

Positioning for growth, this additional facility will allow Tri-Mach to continue taking on large-scale projects, enhance product performance testing, and provide equipment storage for their customers. The building will also be the new home to their Skilled Trades Centre of Excellence.

Read More


JMP Parent Company, CONVERGIX Acquires AGR Automation, Expanding Global Reach

Convergix Automation Solutions has completed the acquisition of AGR Automation (“AGR”), a UK-based provider of custom, high-performance automation design and systems integration primarily to the life sciences industry.

Following Convergix’s acquisitions of JMP Solutions in August 2021 and Classic Design in February 2022, AGR marks the third investment in Crestview’s strategy to build Convergix into a diversified automation solutions provider targeting the global $500+ billion market, with a particular focus on the $70 billion global systems integration and connectivity segments. Financial terms of the transaction were not disclosed.

Read More


Latest Articles

  • Implementing Functional Safety Requirements

    Implementing Functional Safety Requirements

    The Safety Functional Requirements Specification (SFRS; sometimes referred to as SRS or Safety Requirements Specification) is the plan for the safety controls on a machine and is the second step of the safety lifecycle. The SFRS document serves as a framework for the safety control system design, is informed by prior work done in the… Read More…

  • From Endress+Hauser, 24/7 Digital, Plant-Wide Health Monitoring for Rockwell Systems Optimizes Workflows and Processes

    From Endress+Hauser, 24/7 Digital, Plant-Wide Health Monitoring for Rockwell Systems Optimizes Workflows and Processes

    Endress+Hauser’s Asset Health Monitoring Solution–Rockwell Edition, now available for installation, provides operators with a centralized, digital overview of plant-wide device health to avoid unscheduled shutdowns and accelerate troubleshooting. It not only presents early visibility of problematic devices but distinguishes itself by adding likely causes and remedies to such a report so problems can be fixed… Read More…