
Extending the Internet of Things to Brownfield Devices

![Extending the Internet of Things to Brownfield Devices Suhas D. Joshi, Director, Enterprise Architecture, Honeywell International [NYSE:HON]](https://www.cioreview.com/newsimages/special/K09PFycn.gif)
Suhas D. Joshi, Director, Enterprise Architecture, Honeywell International [NYSE:HON]
The Internet of Things (IoT) is all about unlocking business value that is locked up in data generated by “things.” Consider a smart industrial pump that is used in an oil refinery. The pump generates useful data regarding speed, volume of fluid passing through as well as vibration and noise level of the pump itself. If this data is collected from the pump and sent to an application for analysis, it will be possible to gain insight into data patterns that show the behavior of the pump. Certain anomalies, for example, a high degree of vibration and noise with normal fluid speed and volume, may suggest that the pump needs to be serviced. If not serviced quickly, it will lead to a disruptive failure. A single averted disruption can save millions of dollars. Because of IoT related technologies such as networking, cloud technology, data storage and analytics, it is now possible to collect and analyze device data at a large scale and generate significant business value.
Extending the IoT to legacy devices may appear as a daunting task but the right architectural choices will definitely pave the way for success
IoT is a relatively recent development. But there are millions of devices, sensors and controllers that were developed long before IoT came along. These devices generate data for “things” such as pumps, rooms or air handlers. Such devices have been already deployed in the field and use proprietary or standard protocols to communicate with other local devices or local applications. The local application resides in physical proximity of the devices, receives data generated by the devices and performs command and control. See the figure below as an illustration of how legacy devices are connected.
The automation and control protocols implemented in legacy (or brownfield) devices are designed for a local “site” level communications and control, as opposed to communicating with a remote application that is accessed through Internet. For example, a water leak detector may communicate through a ModBus protocol, a temperature sensor communicates through BACnet protocol and an air handler unit may use LonWorks. Operations, Administration and Maintenance (OA&M) is performed locally and not remotely through the public Internet. Finally, security design assumes a friendly, local, “site” based communication as opposed to communications over the public Internet. Thus, connecting brownfield devices to the IoT imposes formidable challenges.
Now let us review the building blocks of the IoT architecture. A key IoT component is an on-premise or off-premise cloud infrastructure. The benefits of such an infrastructure include scalability, elasticity and availability. Services to authenticate devices, ingest and store data generated by devices and tools for data analytics and cloud-resident applications reside in the cloud. Cloud resident, customized applications process data generated by devices. The scalable infrastructure lends itself to access data from devices in the entire enterprise and not just a specific site. Also, device OA&M application(s) are hosted in the cloud. Data transfer between the cloud resident applications and devices goes via the Internet. Internet Protocol (IP) is commonly used for connectivity. A secure data link between devices and cloud resident applications is a key requirement for the IoT. Security considerations include restricting access based on user role, encryption of data at rest and in transit. Finally, there is a cloud resident human-machine interface component which enables remote administration and managing of devices.
There are several challenges in integrating legacy devices with an IoT. To name a few, the automation and control protocols mentioned earlier such as BACnet cannot be extended to reach a software application in the cloud. Secondly, many legacy protocols use a synchronous approach for communications and in talking to cloud applications, an asynchronous approach is preferred. Finally, the security techniques implemented in legacy devices may not be suitable for protecting data as it traverses the public Internet. To overcome these challenges, a few solutions are proposed as follows.
One possible solution is the introduction of an “IoT Device Computing Platform (IoT DCP)”. The IoT DCP will be a scalable software platform and run on an operating system such as RTOS, Linux or Windows. It will be co-located with legacy devices. IoT DCP should support protocol drivers such as BACnet, ModBus or LonWorks which allows it to interoperate with legacy devices. To a BACnet device, the IoT DCP appears as another BACnet node. Additionally, the IoT DCP implements Transport Layer Security (TLS) protocol to establish a secure data link with the cloud based data ingestion service. Once the link is established, IoT DCP uses AMQP, MQTT protocols or the OPC/UA standard to send data to cloud resident services. See the figure below.
Another possible solution besides IoT DCP is to upgrade the firmware in each brownfield device so that each device is capable of maintaining a secure link with the cloud based data ingestion service. Then the device has to support a protocol such as AMQP, MQTT or OPC/UA to send data to the cloud based data ingestion service. This option could turn out to be quite expensive depending upon the number of devices to be upgraded. A third possible solution is a hybrid approach in which firmware is updated for some of the devices while other devices connect through the IoT DCP.
The IoT DCP option is less disruptive and could be less expensive compared to upgrading firmware in each legacy device. Regardless of whichever approach is chosen, there is cost involved in migrating the site based application(s) to the cloud. Extending the IoT to legacy devices may appear as a daunting task but the right architectural choices will definitely pave the way for success.
Featured Vendors
THETA432: Performance, Precision, Efficiency, Visibility - The Key to Incident Response and Answer to the Talent Shortage
EveryCloud Technologies: Delivering Powerful Email Filtering Services" title="Graham O'Reilly, CEO & Co-Founder" style="float:left; margin-right:10px; margin-bottom:20px;" width="60px" height="50px">
EveryCloud Technologies: Delivering Powerful Email Filtering Services
Onepath: A Responsive Info-Security Management Framework – the easier way to dramatically improve your overall info-security posture
Covenant Security Solutions, Inc.: Revolutionary Solutions to Mitigate Security and Compliance Risks
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
The Under- And Overestimation Of Data.
Protecting IP Amidst The Pandemic
AI Will Improve Talent Management Practice But Change Management Is...
Keys To Reaching The Peak Of A Cyber Security Program Journey
Sailing through Uncertain COVID times
Paving the Way for Incentivized, Ethical Waste Collection
