Addressing the Increase in Wireless Demand with Frequency-Hopping Metasurfaces

We all know that the Industrial Internet of Things and other wireless devices are straining the wireless spectrum. Spectrum turns out to be a scarce resource. With continually growing communication requirements, both data and voice, this is a problem searching for a solution. (Unlike many things floating around these days that are solutions searching for a problem.)

I am publishing this entire release regarding research into something called metasurfaces that could provide some of the solution to our spectrum strangling problem.

Recent advances in communication systems, such as the increase in mobile phone users, the adoption of Internet-of-Things devices, and the integration of smart sensors in applications ranging from smart homes to manufacturing have given rise to a surge in wireless traffic. Similar to how a roadway becomes congested with vehicles, the rising wireless traffic is resulting in congestion in the available frequency bands. New frequency bands have been introduced to accommodate more communication signals to operate wireless devices without severe interference with each other.

However, supporting a broad spectrum is challenging. There are only a limited number of frequency bands available. Additionally, it increases the complexity of wireless devices and infrastructure. One possible solution for accommodating signals within existing frequency bands is to tune them in a way to further distinguish them.

Now, in a new study published in Nature Communications, a team of researchers from Japan, led by Associate Professor Hiroki Wakatsuchi from Nagoya Institute of Technology, along with co-authors Ashif Aminulloh Fathnan and Associate Professor Shinya Sugiura of the University of Tokyo, has designed a metasurface that can distinguish wireless signals based on their frequency and pulse width.

In simpler words, metasurfaces are engineered surfaces that can manipulate incident electromagnetic waves to achieve specific modifications leading to the generation of different signals. This ensures that signals are separated and do not interfere with each other, reducing the likelihood of congestion-related issues. These materials can be integrated into radio-frequency devices like antennas and filters to accommodate more users and devices within the same frequency spectrum.

The metasurface developed by researchers in this study distinguishes signals more effectively than traditional materials. “Conventionally, when the number of frequencies available was N, electromagnetic waves and related phenomena could be controlled in N manners, which is now markedly extended to the factorial number of N (i.e., N!),” explains Dr. Wakatsuchi.

The developed metasurface consists of several unit cells that respond to specific frequencies. By activating multiple unit cells, it becomes capable of handling signals across multiple frequency bands. The metasurface can be thought of as a filter that selectively transmits signals based on specific frequency sequences. The researchers liken this to frequency-hopping, where devices switch frequencies rapidly to avoid interference. However, in this case, the metasurface can be tuned to alter incoming signals based on their frequencies. This property makes it possible to receive and distinguish a variety of signals of different frequencies from wireless devices.

As a result, with the new metasurface, the number of signals that can be distinguished grows from a linear relationship to a factorial-based one. “If four or five frequencies are available, the number of signals to be distinguished increases from four or five to 24 or 120,” remarks Dr. Wakatsuchi, adding further, “Going ahead, this could help in more wireless communication signals and devices being made available even with limited frequency resources.”

According to the researchers, the number of devices connected to wireless networks per square kilometer is projected to increase from a million in 5G to 10 million in 6G by 2030. This substantial increase will inevitably strain existing frequency bands. However, with their capability to distinguish wireless signals, metasurfaces represent a novel approach to operate numerous Internet-of-Things sensors and communication devices without severe interference.

In the long run, this will be important for next-generation communication services, such as autonomous driving, smart factories, digital twin, cyber-physical systems, and behavior recognition systems!

Dr. Hiroki Wakatsuchi is an Associate Professor in the Department of Engineering at Nagoya Institute of Technology (NITech), Japan. He completed his Ph.D. from The University of Nottingham, UK whereupon he did his postdoctoral research at UC San Diego, USA. His research interests include electromagnetics, electronics, and communications. He has so far published 62 papers (49 papers between 2005 and 2023) with over 800 citations to his credit. Dr. Wakatsuchi was also a part of the Precursory Research for Embryonic Science and Technology (PRESTO) in the Japan Science and Technology Agency (JST) until March 2023. Currently, he is involved with Fusion Oriented Research for Disruptive Science and Technology (FOREST), another JST program.

FDT Group Certifies First FDT 3.0 DTM From Flowserve Corporation

Modern flow control software driver based on FDT/DTM technology extends standardized device management to mobile and OPC UA applications.

Glad to see movement with the latest technology from the FDT Group. It certified the first Device Specific DTM based on FDT 3.0 standard supporting the HART protocol from Flowserve Corp. The newest certified Logix 3820 Series DTM is deployable using their positioners supporting HART 6 / 7, tackling flow control challenges designed for modern IIoT architectures. 

FDT DTM certification to the FDT 3.0 specification and webUI is a process whereby rigorous compliance testing using dtmINSPECTOR5 ensures the viability of the states of the DTM; its correct installation, de-installation, and multi-user environment capability; mandatory and optional user interface functionality and robustness; network scanning communication performance and the ability to import and export the topology; and the audit trail capability.

FDT 3.0 DTMs are crucial to unlocking universal device integration with essential advantages such as platform independence, mobility solutions, and a contemporary development environment to reduce costs and expedite the DTM certification process. Users can use secure and seamless data exchange/interrogation from the sensor to the cloud and achieve new levels of information technology (IT) and operational technology (OT) integration. 

“This certification is a milestone in market penetration and technology development,” says Steve Biegacki, FDT Group managing director. “Flowserve has always been a leader in flow control using DTM technology and now offers the first flow control management DTM standardized for IIoT architectures based on FDT 3.0 for HART applications. HART users can deploy this new DTM and reap the benefits by using an FDT 3.0-based device management tool, such as PACTware 6.1, and can enjoy an IT/OT data-centric model by deploying an FDT Server, extending the data reach to mobile applications and the enterprise.”

Dragos OT Cybersecurity Year in Review 

New OT threat groups include VOLTZITE linked to Volt Typhoon; ransomware attacks grew 50 percent; state actors and unsophisticated hacktivist groups gained ground against OT systems.

Cybersecurity companies busily conduct surveys and issue reports. This news concerns Dragos’ release of its sixth annual OT Cybersecurity Year in Review report

The report named the emergence of three new threat groups, including VOLTZITE linked to Volt Typhoon, and found that ransomware continued to be the most reported cyber threat among industrial organizations with a nearly 50% increase in reported incidents. 2023 also saw the first time a hacktivist group achieved Stage 2 of the ICS Cyber Kill Chain. 

Based on data gathered from annual customer service engagements conducted by Dragos’s cybersecurity experts in the field across the range of industrial sectors, the top challenges industrial organizations need to address are:

  • Lack of Sufficient Security Controls: 28% of service engagements involved issues with improper network segmentation or improperly configured firewalls. 
  • Improper Network Segmentation: Approximately 70% of OT-related incidents originated from within the IT environment. 
  • Lack of Separate IT & OT User Management: 17% of organizations had a shared domain architecture between their IT and OT systems, the most common method of lateral movement and privilege escalation.
  • External Connections to the ICS Environment: Dragos observed four threat groups exploiting public-facing devices and external services and issued findings related to externally facing networks such as the internet in 20% of engagement reports.

Visibility Across IT, OT and IoT Domains to Illuminate Attack Vectors and Risks

Tenable One has some news today about the release of Tenable One. It is a visibility product that allows managers and others to see assets across an enterprise regardless of IT, OT, or IoT. You will notice a new marketing term in the release—at least new to me. The company is now called an “Exposure Management” company. They tell me that means it enables organizations to understand cyber risk in order to make more effective business decisions.

Tenable, the Exposure Management company, announced February 29, 2024 the release of Tenable One for OT/IoT. It is the first and only exposure management platform that provides holistic visibility into assets across IT and operational technology (OT) environments.

I cannot verify the “first and only” claim, but companies are often careful to define things such that they can make the claim. In this case, exposure management most likely is the key phrase (before anyone writes to me). Also they talk management. What they do is provide information for managers to be able to take informed actions.

Tenable One for OT/IoT extends visibility beyond IT, to include OT and IoT, and helps security leaders gain a clear picture of true exposure across their entire attack surface. This first-of-its-kind approach allows organizations to prioritize security risks wherever they reside – be it in the cloud, data center, or the OT environment – and most importantly, to understand how these risks create attack paths across their infrastructure.

Users can also view their global exposure, including OT assets, to see how their security posture compares to other companies in their industry and gain additional insights from their OT assets to make better decisions, faster.

Three key points:

  • Comprehensive visibility beyond the IT environment to the modern attack surface
  • Risk intelligence to mitigate operational risks
  • Actionable planning and decision making across enterprise and critical infrastructure environments

Compression Brings Bandwidth Boost to Vision Applications

As long as I have been working with and covering vision technology in manufacturing bandwidth has been the constraint to robust applications. A Canadian company called Pleora Technologies has introduced a patented lossless compression technology called RapidPIX that is said to increase data throughput by almost 70 percent while meeting the low latency and reliability demands of machine vision and medical imaging applications.

RapidPIX is initially available on Pleora’s new iPORT NTx-Mini-LC platform, which provides a compression-enabled drop-in upgrade of the widely deployed NTX-Mini embedded interface. With added compression, designers can deploy the iPORT NTx-Mini-LC to support low latency transmission of GigE Vision compliant packets at more than 1.5 Gbps throughput rates over existing 1 Gb Ethernet infrastructure. Manufacturers are designing the iPORT NTx-Mini-LC embedded interface with RapidPIX compression into X-ray panels for medical and dental imaging, contact image sensors (CIS), and industrial camera applications.

Pleora’s RapidPIX compression is now available on the iPORT NTX-Mini-LC embedded interface to support low latency transmission of GigE Vision compliant packets at more than 1.5 Gbps throughput rates over existing 1 Gbps infrastructure. To speed time-to-market, the iPORT NTx-Mini-LC with RapidPIX Development Kit helps manufacturers develop system or camera prototypes and proof-of-concepts easily and rapidly, often without undertaking hardware development.

New Research Identifies Gaps in Securing Access to Connected OT Environments

This news reports yet another survey of managing security risk.

Cyolo, the access company for the digital enterprise, in partnership with Ponemon Institute, released a global study exploring how organizations that operate critical infrastructure, industrial control systems (ICS), and other operational technology (OT) systems are managing access and risk in an era of rising connectivity.

“Our world has become increasingly interconnected, and the findings of this report highlight the vital need for organizations to reevaluate and enhance their strategies for ensuring secure access into OT environments,” said Larry Ponemon, Chairman and Founder of the Ponemon Institute.

The report, “Managing Access & Risk in the Increasingly Connected Operational Technology (OT) Environment,” reveals that many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to OT systems. The report is based on a survey of 1,056 security professionals across the United States and EMEA who work in organizations that run an OT environment and are knowledgeable about their organization’s approach to managing OT security and risk.

Overall key findings include:

  • Organizations allow dozens of third-party users to access OT environments. 73% permit third-party access to OT environments, with an average of 77 third parties per organization granted such access. Challenges to securing third-party access include preventing unauthorized access (44%), aligning IT and OT security priorities (43%), and giving users too much privileged access (35 percent).
  • Visibility into industrial assets is dismal. 73% lack an authoritative OT asset inventory, putting organizations at significant risk.
  • IT and OT teams share responsibility for OT security but do not communicate enough to achieve optimal outcomes. 71% report that IT or IT and OT together are responsible for securing OT environments. However, collaboration and communication are lacking, with 37% reporting little or no collaboration, and 19% reporting that teams talk about OT security issues only when an incident occurs.
  • Security is seen not only as a goal of IT/OT convergence but also as an obstacle. Reducing security risk is the top objective of companies pursuing IT/OT convergence (59%), and yet one-third (33%) of organizations not pursuing convergence cite security risk as a top factor for their decision.

Register to attend a joint webinar from Cyolo and Ponemon Institute, on Tuesday, March 12 at 11am ET here: Behind the Ponemon Report: Risk & Access Management in the OT Environment.

Follow this blog

Get a weekly email of all new posts.