Supplier eBooks

Analog Devices - Industry 4.0 and Beyond

Issue link: https://resources.mouser.com/i/1437657

Contents of this Issue

Navigation

Page 36 of 37

37 Industry 4.0 and Beyond | ADI Figure 3: Operational environment. (Source: Analog Devices Inc.) Extending Identity and Integrity to the Edge of the Network The ADI ChronousTM portfolio of Industrial Ethernet connectivity solutions enables secure communication at the edge of the control loop. Our devices exist at the communication endpoints and can secure network communications at each node point within the system while minimizing trade-offs in power, performance, and latency. These scalable Ethernet solutions provide the means to extend security in highly time-sensitive applications to meet the changing security risks, such as: Securing the edge of the factory control network to establish a resilient and trusted architecture. Allowing for secure connectivity of robots, drives, and production machines within an integrated OT/IT TSN network. Providing means for authentication and encryption (as required) in a highly time-critical environment. Analog Devices' security solutions for ADI Chronous Industrial Ethernet enables the rapid adoption of the connected factory. Leveraging ADI's secure development processes, our Industrial Ethernet solutions ensure the security design enable the system application while allowing for risk to be managed throughout the product lifecycle. ADI's Industrial Ethernet solutions provide security features such as key generation/management, secure boot, secure update, and secure memory access. Integrating security in devices at the edge of the industrial control loop will provide trust in data necessary to scale solutions capable of making real-time decisions on the factory floor. Accelerate the path to Industry 4.0 by assuring: Machine/worker safety Reliable operation Product quality Uptime and throughput Production efficiency Production metrics and insights Conclusion If the next cyberattack happens today, how will you address the changing cyberrisk? Will the attacker target the device's software? Or will it be a network attack inserting bad data? Regardless, your devices will need to provide the ability to communicate securely and recover from the next attack. This requires security to be implemented at the lowest level—the hardware itself. Being able to trust the lowest levels of a device's boot and issue software updates enables a factory to recover and resume normal operations. 3

Articles in this issue

view archives of Supplier eBooks - Analog Devices - Industry 4.0 and Beyond