Network

Network March 2018

Issue link: https://fhpublishing.uberflip.com/i/951810

Contents of this Issue

Navigation

Page 24 of 39

NETWORK / 25 / MARCH 2018 there is technology available that has been designed speci - cally for use on remote sites in harsh locations, which deliver the same bene ts as online systems with which we might be more familiar. The big bene t is you don't need wires, power or data delivered in the traditional way. The value delivered to the organisation is then accelerated when the system administrator and decision-making process uses integrated automation with other operational and business systems. This means that a change made within HR, for ex- ample, can make the necessary changes down to an employee's access rights. Employee access rights An integrated automated system can also be linked to a database of employee work permits. When the employee attempts to use their key to open the lock to a work site or dangerous piece of equipment, it can check to see if they have the necessary permissions in place. Similarly, it can be used to control access to restricted areas using variable valida- tion, forcing regular checks of the employee's or contractor's current competencies for the assigned task. Smart integrated physical security also has great potential to help all areas of infrastructure become more operationally e• cient and streamlined. The technol- ogy needed to achieve this is already out there, such as PROTEC2 CLIQ. The possibilities it o‡ ers are huge, but so can be the risks – so it's crucial that as the integration of systems increases, the protection of those systems and the data contained is vital. Data security One of the challenges that inte- grated IoT technology presents is that of security. Connecting a system to the wider internet creates another potential access point. Naturally this is a concern for all systems, but it is of particu- lar importance for the integrated technology used within physical security systems. This means that all integrated systems need to not only be physically secure, but also highly resistant to cyber attacks. There are several ways to increase the security of the sys- tem, such as ensuring that data transfers between the di‡ erent parts of the system are strongly encrypted, using a minimum of AES (advanced encryption standard) so even if the informa- tion is intercepted, the wider network remains secure. Automatically creating and maintaining a detailed, reliable audit trail of which keys have been used to access which locks, provides comprehensive traceability, regulatory audit re- ports and enhancing security. In addition, making sure that lost or stolen keys can easily and quickly have all access rights denied strengthens security. When hosting data associ- ated with the system, it's advis- able to use a highly trusted third party so that it is not stored on-site, and ensure that the mechanical security is strong. Use of three factor authen- tication is also important, and automation of on-boarding and o‡ -boarding processes. Integration with existing applications ensures that mini- mum access is required – access where you need it, when you need it, rather than everywhere at all times. Organisations across the power sector have always known their assets were valuable, but transformations in technology now mean they can deliver rich rewards that were unimaginable just a few years ago. Assets are no longer simply to be 'managed'; they can provide an integrated holistic dataset, enabling more effi cient and effective decision making, and a safer distribution network. Sensors measuring an asset's performance, environment, and composition are already able to transmit this information, in real-time, for speedy analysis. At one level, this data can support energy companies' maintenance – monitoring when components are failing or performing less effectively. Longer-term, it can deliver understanding of condition-based risk: avoiding the additional costs and waste of replacing still-productive components, but minimising failure risk and its associated downtime. But the potential benefi ts that connected assets' data deliver into systems go far beyond this. Advanced algorithms can create models and simulations, within which thousands of scenarios can be run to explore the effects of any change. Cheaper data storage means more historical data is available to enrich models' predictions. Entire distribution and network systems can now be recreated in the virtual world – digital twins – allowing suppliers to test the impacts of new designs, and the integration of components and equipment before their real-world application. With the 'smart' cities of the future predicted to have billions of devices connected to the internet, a wealth of data will be available to inform future energy networks. And with the International Energy Agency's 2017 report predicting that the savings from digitally enabled measures in the power sector could be USD 80 billion (GBP 57 billion) per year, over 2016 to 40, your data could offer an improved return on your investment! For further information contact Frazer-Nash Consultancy power, transmission and distribution business manager, Anuj Nayyar, a.nayyar@fnc.co.uk I N D U S T RY I N S I G H T How harnessing data can make your connected assets work for you Similarly, it can be used to control access to restricted areas using variable valida- tion, forcing regular checks of the employee's or contractor's current competencies for the assigned task. Smart integrated physical security also has great potential to help all areas of infrastructure become more operationally e• cient and streamlined. The technol- ogy needed to achieve this is already out there, such as PROTEC2 CLIQ. The possibilities it o‡ ers are huge, but so can be the risks – so it's crucial that as the integration of systems increases, the protection of those systems and the data contained is vital.

Articles in this issue

Links on this page

Archives of this issue

view archives of Network - Network March 2018