Development and implementation of IIOT cyber security - SK-035Project type: Innovation
Desired discipline(s): Engineering - computer / electrical, Engineering, Engineering - other, Computer science, Mathematical Sciences
Company: International Road Dynamics Inc.
Project Length: Longer than 1 year
Preferred start date: As soon as possible.
Language requirement: English
Location(s): Saskatoon, SK, Canada; Canada
No. of positions: flexible
Desired education level: CollegeUndergraduate/BachelorMaster'sPhDRecent graduate
Open to applicants registered at an institution outside of Canada: No
About the company:
International Road Dynamics Inc. (IRD) is a multi-disciplinary Intelligent Transportation Systems (ITS) company. Established in 1980 by Dr. Art Bergen, Professor of Civil Engineering, University of Saskatchewan. IRD is recognized as a world leader in the design, development, and deployment of customized technology. Today, IRD offers a growing portfolio of services and solutions, bringing new technology to transportation planning, operations, and management of transportation. ITS is the use of advanced technology to enhance the operation of highway systems and save lives, time, money, energy, and the environment.
When established, IRD introduced one of the first commercially available sensors developed specifically as a weigh-in-motion technology. IRD continues to develop and adopt the use of advanced technology, including cloud computing, data analytics, edge computing, distributed systems, and innovations to in-road sensor technology to create our portfolio of products and services.
Recent work includes VectorSense in-road sensor technology, which utilizes time domain reflectometry technology to measure tire contact at highway speeds to derive a variety of vehicle characteristics. IRD is currently researching and developing non-intrusive vision AI technology for the ITS industry.
Describe the project.:
IRD deploys operational technology (OT, also known as industrial internet of things, IIOT) systems to customer sites around the world. While information technology (IT) security is difficult, OT security is more difficult still. Deployed systems are frequently limited by CPU capacity, memory, and storage; and may host real-time processes whose performance must not be compromised. Communication links are often limited in bandwidth and accessibility and are typically subject to customer network security controls.
Solving these challenges is essential – for a variety of reasons, OT systems are more vulnerable to cyber attacks than IT systems. (24/7 system, limited capacity, restricted access)
The goal of this project is to provide satisfactory logging, monitoring, vulnerability management, and endpoint protection to the components of our OT systems. Our approach is to exploit third-party tools and services to the greatest extent possible while implementing or adapting solutions to meet the unique challenges posed by the OT context. These bespoke tools will be integrated with commercial backend tools to provide integrated analysis, detection, and endpoint vulnerability management.
Cybersecurity, networking, cybersecurity, system software and programming.