Professional Documents
Culture Documents
PDF The Iot Architects Guide To Attainable Security and Privacy 1St Edition Damilare D Fagbemi Ebook Full Chapter
PDF The Iot Architects Guide To Attainable Security and Privacy 1St Edition Damilare D Fagbemi Ebook Full Chapter
https://textbookfull.com/product/iot-security-and-privacy-
paradigm-internet-of-everything-ioe-1st-edition-souvik-pal-
editor/
https://textbookfull.com/product/women-securing-the-future-with-
tippss-for-iot-trust-identity-privacy-protection-safety-security-
for-the-internet-of-things-florence-d-hudson/
https://textbookfull.com/product/iot-security-issues-gilchrist/
https://textbookfull.com/product/the-2020-international-
conference-on-machine-learning-and-big-data-analytics-for-iot-
security-and-privacy-spiot-2020-volume-1-john-macintyre/
Security And Privacy Joseph Savirimuthu
https://textbookfull.com/product/security-and-privacy-joseph-
savirimuthu/
https://textbookfull.com/product/attainable-sustainable-1st-
edition-kris-bordessa/
https://textbookfull.com/product/beyond-the-algorithm-ai-
security-privacy-and-ethics-1st-edition-santos/
https://textbookfull.com/product/security-privacy-and-forensics-
issues-in-big-data-advances-in-information-security-privacy-and-
ethics-1st-edition-ramesh-c-joshi/
https://textbookfull.com/product/smart-grids-security-and-
privacy-issues-1st-edition-kianoosh-g-boroojeni/
DAVID M.
WHEELER
DAMILARE D.
FAGBEMI
JC
WHEELER
AN AUERBACH BOOK
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to
publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials
or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material repro-
duced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any
form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming,
and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copy-
right.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400.
CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have
been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identifica-
tion and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
To everyone who truly loves people, to everyone who uses their skills to serve others,
to everyone who seeks and upholds truth, I dedicate this book to you. For all
the technology in the world could never serve a better purpose.
— Damilare D. Fagbemi
vii
Contents
Dedication vii
Contents ix
Foreword by Dr. James Ransome xvii
Foreword by Erv Comer xxiii
Preface xxv
Acknowledgments xxvii
About the Authors xxix
Part One 1
Chapter 1 How We Got Here 3
Damilare Fagbemi, Dave Wheeler, and JC Wheeler
1.1 We Forgot Security When Building the Internet 3
1.2 What’s This Book About and Who’s It For? 4
1.3 Let’s Break Down the Book 4
1.4 What’s an IoT System? 6
1.4.1 Everyone Needs to Know the Location of the Nearest Pizza 7
1.4.2 Computing Everywhere 7
1.5 An IoT System’s Major Components 8
1.5.1 The Human IoT System 9
1.6 Shall We Just Connect Everything? 9
1.7 Wait! We Need to Add Security! 10
References 11
ix
x The IoT Architect’s Guide to Attainable Security and Privacy
2.2 “Full Disclosure,” Ethics, and “Hacking Buildings for Fun and Profit” 16
2.3 Defending IoT Castles 17
2.3.1 Know Thine Enemy 21
2.4 Attacking the IoT Castle 22
2.5 A Closer Look at IoT Attack Surfaces and Breach Consequences 23
2.6 The Road Ahead 25
References 26
Part Two 43
Chapter 4 Architecting IoT Systems That Scale Securely 45
Dave Wheeler
4.1 The IoT System Architecture 45
4.1.1 The Cloud Layer 48
4.1.2 The Gateway Layer 49
4.1.3 The Devices Layer 50
4.2 IoT Must Be a Low-Cost System 53
4.2.1 IoT Gateway Layer: Reason 1—Client Volume 53
4.2.2 IoT Gateway Layer: Reason 2—Energy Costs 54
4.2.3 IoT Gateway Layer: Reason 3—Long-Haul
Communications Costs 55
4.2.4 IoT Gateway Layer: Reason 4—Security 56
4.2.5 IoT Gateway Layer: Reason 5—Scaling 57
Contents xi
Epilogue 287
Index 289
Foreword
xvii
xviii The IoT Architect’s Guide to Attainable Security and Privacy
and the gap for these professionals grow on a daily basis. The IoT Architect’s Guide to Attainable
Security and Privacy was written to help fill this gap. The responsibility falls on all of us who
are security professionals associated with IoT to rethink how we design and build secure prod-
ucts that respond to and defend our IoT infrastructure against aggressive adversaries, as well as
preserve the privacy and build the kind of life we want in our society.
design requirements, and architectural principles broken up by lively discussions and story-
telling surrounding issues related to IoT security design flaws and architectural issues based
on real-world experiences. This book doesn’t bog you down in complex theories and descrip-
tions but is rather practical and just “what you need to know.” It provides both general and
detailed overviews of IoT security design and architecture principles but also leads the reader
to other books and reference materials for deep dives into complex areas. If you only had one
space on your shelf for a practical reference book for IoT Security Design, this is the book you
need to have.
I thoroughly enjoyed the authors’ holistic and entertaining approach to educating the
reader on the principles of designing secure IoT. Some of the key areas covered that I found of
particular interest that will likely be of interest to you as the reader include:
multiple data sets of personal information and PII together to represent a different class
of information known as personal knowledge. The two chapters on privacy could be a
privacy book in itself.
• Security design principles as they relate to usability. There is an existential tension
between usability and good security. The purpose of security usability is the alleviation
of that tension. If we strive for the utmost security, the system becomes unusable. If
we are too lax with security for the benefit of the greatest usability, the system is soon
compromised and everyone is up in arms. We must find a balance, ensuring that the
security that is implemented is usable.
• Challenges in the provision of usable IoT security controls.
• Eight principles that help you address the security usability challenges that they have
outlined. The principles are not an exhaustive list, but rather a foundation that provides
you with the necessary insight and starter fuel required to build usable IoT security. An
invitation to the reader to extend their list is included.
• How to future proof your security designs in IoT with some forecasted views for some key
sectors such as healthcare, agriculture, smart cities, energy, and transportation as well as
projected future advances and challenges as a result of the evolution of cloud computing,
serverless architecture, infrastructure as code, and autoscaling.
This is done by leveraging the evidence outlined by current trends and technological
advancements to envision future trends and their impact on IoT solutions and their users.
The expectation that artificial intelligence (AI) and machine learning (ML) systems will
emerge as a new form of attacker is also discussed.
I will certainly be recommending this book to all I meet in the technology sector, whether
it be on advisory boards, speaking at conferences, or to clients. The IoT Architect’s Guide to
Attainable Security and Privacy is destined to be a “have-to-have” reference book for all who are
interested in this topic.
— Dr. James Ransome
Epsilon, the International Honor Society for the Computing and Information Disciplines,
and he is a Certified Information Security Manager (CISM), a Certified Information Systems
Security Professional (CISSP), and a Ponemon Institute Distinguished Fellow.
James is the author of several published books, including Wireless Operational Security, VoIP
Security, Instant Messaging (IM) Security, Business Continuity Planning and Disaster Recovery
Guide for Information Security Managers; Wireless Security: Know It All; Cloud Computing:
Implementation, Management, and Security; Defending the Cloud: Waging Warfare in Cyberspace;
and Core Software Security: Security at the Source. He also developed the initial wireless net-
work architecture, SCADA, Cryptography, and VoIP security leading practices for the Federal
Communications Commission Network Reliability and Interoperability Council Focus Group
on Cybersecurity—Homeland Defense.
Foreword
by Erv Comer, Zebra Technologies
I first became aware of the quality of Dave’s work in security in the mid-1990s. I was lead-
ing a security analysis team at Motorola’s Government Electronics Group in Scottsdale (AZ)
developing cutting-edge “stuff ” for our three-lettered friends when we first met. The com-
munity of security practitioners and designers was a small crowd, and we followed strict
need-to-know protocols, which limited interaction, but things always seemed to be happening
when Dave was involved. Happening for the better. A few years later designing the Internet
in the Sky, I had the immense pleasure of working alongside a remarkable engineer with a
devout passion for security—Mrs. JC Wheeler. I’d connected at a professional level with a
couple holding a passion for security that I thought only I possessed. Our friendship has never
waned over the years. We continue to pursue the engineering discipline of security that we so
intensely enjoy.
Although I was honored to be asked to write this Foreword, I honestly didn’t believe I’d
learn much from the book. However, experience had taught me that Dave and JC had some-
thing robust otherwise they would not be seeking the scrutiny of a security practitioner. I’ve
worked with the National Security Agency (NSA) in the development of their System Security
Engineering CMM, obtained my Master’s Degree in Engineering with a thesis on security
for product development, reduced all the academia and theory to practice at Motorola across
nine global business units within the past 15 years, and recently reincarnated the whole thing
at Zebra Technologies—a leader in the IoT mobile computing space.
This book conveys to the reader a great understanding of IoT security methods and prac-
tices that must occur in order to properly account for security within the IoT operational
environment. The IoT space is large, but the concepts and methods revealed are applicable
across the entire space. End points, edge services, and clouds all come into play. The archi-
tectural views, in combination with the iterative security/privacy threat analyses, reveal abuse
and misuse cases not easily recognized when analyzing from a single point of view. The robust-
ness of the design is strengthened as the process builds upon itself, with designers becoming
security conscious of their own designs. Toss in concerns over privacy, regulatory constraints,
and analytic feedback channels and the security analyses will take a different route, yielding
more insight. Change a few technology or environmental variables and completely different
results emerge.
xxiii
xxiv The IoT Architect’s Guide to Attainable Security and Privacy
There is an absolute treasure trove of information within this book that will benefit anyone,
not just the engineering community. This book has earned a permanent spot on my office
bookshelf because of the wealth of content it provides.
— Erv Comer, Fellow of Engineering, Office of Chief Architect
Zebra Technologies
Preface
This book describes how to architect and design Internet of Things (IoT) solutions that provide
end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis,
protocol analysis, secure design principles, intelligent IoT’s impact on privacy, and the effect of
usability on security. The book also unveils the impact of digital currency and the dark web on
the IoT security economy.
We wrote this book not only to be a valuable security and IoT architectural resource for
you but also to be an enjoyable read. With that in mind, we’ve added personal experiences,
scenarios, and examples designed to draw you in and keep you engaged.
xxv
xxvi The IoT Architect’s Guide to Attainable Security and Privacy
architects), and IoT strategic marketing. Executive managers and policy makers will also bene-
fit from its insights.
Topics at a Glance
• The fundamental components of an IoT system.
• The architecture of IoT systems, how they differ from other client-server and cloud-
based systems, and why are they architected the way they are.
• The security-mindset and secure design principles required to build secure systems
and communicate effectively with customers, architects, and designers.
• The motivation and methods of cybercriminals.
• The IoT Security Economy, dark web, dark money, and digital currency.
• IoT attack vectors—how IoT systems are attacked.
• How to perform a threat analysis and construct countermeasures to protect a system,
whether that is an IoT, cloud, or some other system—including detailed examples.
• A broad survey of common and not-so-common IoT communications protocols, and
the roles of wired and wireless communications in IoT system.
• How to perform a protocol analysis—analyzing a protocol for security and finding
security vulnerabilities in protocols, including a detailed example.
• Artificial Intelligence and Digital Privacy—the privacy impacts of combining AI and
IoT; featuring scenarios for an autonomous vehicle ecosystem and smart refrigerator.
• Digital privacy laws and regulations and how they impact IoT architectures.
• A Privacy Playbook to mitigate unnecessary exposure of personal data.
• Designing Usable IoT Security—principles for building user-friendly security controls
into IoT systems.
• The future evolution of the Internet of Things and AI, the impact on our lives, the
security consequences we must prevent . . . starting now, and the responsibilities we all
share.
Acknowledgments
We humbly acknowledge that we could not have written this book alone. Writing is a journey
that can often be fun, and at other times, it can be grueling. It is a journey that is only possible
with the help and support of family, friends, mentors, and colleagues.
First and in every sense above all, both authors would like to start by thanking God, with-
out whom we truly believe we would not be.
We would like to thank our editor John Wyzalek at Taylor & Francis, who shared our
vision for this book and was a patient and supportive advocate throughout the project. We
would also like to thank the stellar production team at DerryField Publishing Services who
have worked tirelessly to make our vision a reality: Theron Shreve and Marje Pollack.
Many thanks to James Ransome (Senior Director of Security Development Lifecycle [SDL]
Engineering at Intel), Brook Schoenfield (Director of Advisory Services at IOActive, previ-
ously Master Security Architect at McAfee, and author of Securing Systems: Applied Security
Architecture and Threat Models), and Erv Comer (Fellow of Engineering, Office of Chief
Architect at Zebra Technologies), for their support with this project. We are also very grateful
to JC Wheeler who through a fascinating chapter contribution, shed new light on the digital
privacy debate and the privacy risks of a world powered by the IoT, as well acted as a technical
reviewer and editor for many other chapters.
Finally, we would like to thank our mentors and peers in the engineering and security com-
munities who we so deeply appreciate. As that wonderful saying teaches, “If you want to go
fast, go alone. If you want to go far, go together.”
— Damilare D. Fagbemi and David M. Wheeler
It is with a joyful grin that I say these heartfelt thanks to my beloved wife, AtTIyah, Papa and
Mama, and the famous five: AtTIyah, you were a loving stalwart even before you were mine.
You said, “I’m waiting for Chapter 1,” and with that, we were on our way. Papa and Mama,
somehow you kept me alive, continually investing in my education so I could learn to read and
. . . write. The famous five, our famous five, we could scarcely have known that all those novels
we shared and all those precious moments we enjoyed would take us down these paths, and
into the stories and tales of far far away.
xxvii
xxviii The IoT Architect’s Guide to Attainable Security and Privacy
A special thanks to James Ransome, Brook Schoenfield, Rotimi Akinyele, Antonio Martin,
and Marcus Lindholm. It is because of priceless people like you that I find myself believing that
all security professionals must be wonderful people.
— Damilare D. Fagbemi
Thanks to my family for their support and patience while I was consumed with this long and,
at times, arduous project! To my wife, you always bring out the best in me and enable me to
achieve more than I could have imagined—I am so blessed to “do life” with you.
Thank you to my mentors at Intel—Brendan Traw, Baiju Patel, Lori Wigle. I value the time
you gift to me and your examples of integrity and selfless leadership. I have learned as much
from watching you as I have from our conversations. And to Dr. Jesse Walker, thank you for
imparting your invaluable insights in protocol analysis and cryptography to me; you may never
really know how that reignited the researcher in me.
A heartfelt thanks to all my technical peers and colleagues at Intel. Through our inter-
actions and work each day, I learn so much. There is insufficient space to adequately thank each
of you. Among these, I must acknowledge Geoffrey Cooper, Tony Martin, Brent Sherman, and
the late and beloved George Cox.
To my friend (and JC’s mentor) Dr. William T. Scott, thank you for the many lunches and,
of course, evenings shared over good wine with you and Sue, talking about security and com-
munications. That has shaped this book in ways you could not have imagined.
— David M. Wheeler
Another random document with
no related content on Scribd:
The processes in so far as lead enters can best be divided into—
(1) Glaze; (2) decorative.
1. Glaze Processes.—The charge of glaze is made by weighing
out and mixing carbonate of lead with the necessary silicates and
silico-borates in the lead house or mixing-room, where wet grinding
prepares the mixture for the dipping-tub. “Putters-up” hand the ware
to the dipper, from whom “takers-off” place it on boards for removal
to the drying still, or place it (in large works) directly on to the shelf of
an appliance known as a “mangle,” in which an endless chain carries
the ware through a heated chamber. Subsequently superfluous glaze
has to be removed from the base, rims, and not infrequently also
other parts of the articles. This ware cleaning is performed with a wet
sponge or flannel, either while the ware is still moist or by scraping,
the particles removed dropping into a vessel of water; or, if the glaze
is dry, over a grating provided with exhaust draught. The ware is next
removed by the glost-placer on boards, and each piece is separately
placed by him in the sagger (fireclay receptacle) and carried into an
oven to be fired.
2. Decorative Processes.—Majolica painting is the application of a
coloured glaze rich in lead by means of a brush. Ground-laying
consists in dusting powdered enamel colour on to a pattern first
printed on glazed ware with an oily medium. Colour dusting differs
from the same only in detail.
Aerographing (colour blowing) is the blowing on to the ware, by
means of a jet of compressed air, coloured glaze, or enamel colour
held in suspension in oil or other liquid in a glaze kettle or aerograph
instrument.
Dangers.—Apart from risk inseparable from, and increased by,
defective lighting, uneven floors of wood or brick, collection of dust
on benches and floors, and the risk entailed in the sweeping of these
even when watering is practised, and lack of care and attention to
detail on the part of the worker, the following special dangers are
incidental to the various processes: In dipping the glaze (except in
tiles, where the surface only is allowed to touch the liquid), splashes
on to the face and overalls of the dipper, “hander-up,” and “taker-off”
(dipper’s assistants), and “threader-up” (in the case of china
furniture), especially when, as with plates, there is much shaking of
the ware. These splashes dry, and the overalls may become so
coated with glaze that every movement, such as carrying boards or
leaning against the mangle, crumbles it off as dust into the air. As the
dipper shakes the ware, some of the drops are disseminated into the
atmosphere as a fine spray. In ware cleaning the work may have to
be done so rapidly that it is difficult always to observe proper care,
and the worker is tempted to withdraw the article from the range of
the exhaust. Sometimes a ware cleaner is seen blowing away with
her mouth dust lying on the ware.
Dipping-boards, unless freed from adherent glaze by washing after
use, create dust whenever ware is placed on, or removed from,
them, when they are handled and placed on or taken off the stillage
bars, and when they are stacked. Persons gathering at the mangle
are exposed to dust if there is any outward current of air from it. The
glost-placer raises a slight amount of dust as he takes the ware from
the board and places it in the sagger. The dangerous practice
formerly almost universal of rubbing the bottoms and rims of cups,
etc., either together (without use of an exhaust) or rubbing them on a
piece of leather fixed round the chest, is generally replaced by
removal of the glaze on a moist piece of flannel, but it is still possible
to find men doing it in outlying potteries. In majolica dipping and
painting (apart from the obvious risk of splashing and contamination
of the hands), danger arises mostly from scraping the edges and
under surfaces of the tiles on to which glaze, when applying the
background, has overflowed. The amount of glaze so removed is
considerable, and if it is not all caught in the trough of water, the floor
becomes an added source of danger.
In all the decorative processes—ground-laying, aerographing,
colour-dusting, and grinding of colours for aerographing, etc., the
danger is one solely arising from dust.
Prevention.—Meticulous attention to detail, not only in the
provision, but also in the maintenance, of the locally-applied exhaust
ventilation, alone can allay the danger in the processes to which dust
is incidental, such as ware cleaning, gathering at the mangle, glost-
placing, and the decorative processes. The Lead Committee
considered that, as there was no rapid method of testing the actual
degree of moisture, exhaust ventilation might be required in the case
of ware that was not cleaned within fifteen minutes of the application
of the glaze. Such a requirement would prevent the practice now
prevalent of painting as many as three dozen tiles, piling them one
on top of another, and then proceeding to the operation of scraping.
No danger attaches to removal of glaze with a damp sponge or
flannel, but means must always be at hand for washing and damping
them. In the dipping-house, (a) impervious floors should be provided,
which could be washed down so as to prevent the risks from
sweeping, and from glaze drying, and being raised as dust; (b)
partial covering of the dipping-tub to prevent splashing and spray;
and (c) substitution for the overalls at present worn by persons in the
dipping-house, glost-placers, millers and mixers of glaze, majolica
paintresses, and others, of overalls of some light waterproof material
which could be sponged, or of aprons of waterproof material worn in
front of the overalls. Dipping-tubs and walls and floors in close
proximity to them can with advantage be painted red. Dipping-boards
should be washed with clean water after every time of use.
Automatic machines for washing and scrubbing boards are in use in
some factories.
To reduce risk or remove the danger of lead poisoning in this
industry, use of low solubility glazes or of leadless glazes are
advocated. On this point the Lead Committee say: “The effect of
melting the lead with silicious matter amounts to imprisoning it in
such a manner as to render it less liable to the action of the acids
which it meets in passing through the human body, and in
consequence largely reduces the likelihood of its absorption into the
blood. If the frit is properly compounded, all but a small fraction of
the lead is rendered insoluble, and glazes so made are spoken of as
‘low solubility glazes.’ The finished glaze generally contains from 12
to 22 per cent., or more, of lead oxide, but after the process of fritting
with sufficient silicious material only from 2 to 5 per cent. remains
soluble.”[A]
[A] Raw lead comprises red lead, white lead, and litharge. If introduced in
this form as a constituent of glaze it is soluble in dilute acids. If, however,
the raw lead is fluxed by heating with a part or the whole of the silica, it is
converted into “fritted lead.” The solubility of the frit depends upon the
relative proportions of material taken. Thorpe[23], as a result of numerous
analyses of lead silicates (after determining their solubility as regards lead),
both simple and complex, in use in the potteries and on the Continent,
found that the quantity of lead dissolved had no necessary relation to the
quantity of lead in the silicate. “Primarily and in the main the insolubility of
the lead depends not upon any one oxide or group of oxides, but upon the
maintenance of a certain proportion between the whole of the basic oxides
on the one hand and the whole of the acidic oxides on the other. If the value
of ratio bases/acids is higher than, or approximately equal to, two, the
amount of the lead extracted is small, but if it fall much below two, the
quantity of lead dissolved begins rapidly to increase.”
PLATE IV
White enamel powders free from lead are used entirely by some
firms, but the black and coloured enamels on stove grates contain
lead. A frit analyzed in the Government Laboratory was found to
contain 26·66 per cent. of lead oxide. The fact that all the lead used
is in the form of a silicate, even although the silicate is readily soluble
in dilute acid, tends, we believe, to cause incidence of poisoning to
be less than might have been expected from the amount of dust
often present in the air, and attacks, when they occur, to be less
severe, as a rule, than they would be were raw carbonate of lead
alone used. For the arduous work entailed the men are specially
selected. Despite their exposure to lead dust, the majority continue
to work for many years without marked signs of lead absorption. The
management should provide a suitable room for the men to cool
themselves in the intervals of dusting.
Fig. 14.—The cabinet is shown when dry dusting is being done. The casting is
worked by tongs through a slot in the side of the cabinet (not seen), while the
worker dusts the casting with his arms through the two front holes. He can see
his work through the square pane of glass. (Photographs kindly made by Mr. F.
W. Hunt, Leeds.)
In this small industry in the past the poisoning must have been
considerable. In 1898 nineteen cases were reported. Reference to
the table on p. 47 shows that the number now is greatly reduced.
Those reported are generally cases which have ended fatally from
the sequelæ of lead poisoning contracted many years previously.
Stained-glass painting—a form of vitreous enamelling—very rarely
gives rise to poisoning, as no dust is generated (see vitreous
enamelling for use of aerograph in glass-painting).
Paints and Colours.[33]—Most of the cases have occurred in
the manufacture of white-lead paint, although manufacture of
chromate of lead and of Brunswick greens (barytes with which
Prussian blue and chrome yellows are mixed) account for several.
The following table shows the precise occupation of persons
affected, the number of cases distributed according to precise
occupation, and the proportion of these to the total in 225 cases
which were closely examined:
[A] Fig. 15 shows the arrangement for preventing dust at every point where
it is produced in a factory where dry colours are ground, sifted, and packed
on a large scale. On the upper floor, the chamber is shown in which the
contents of a cask are tipped down a shoot leading in the one case to the
burr stone mill on the left, and in the other into the Blackstone sifters.
Exhaust is arranged at two levels to catch the dust arising from the
displacement of air. After grinding in the closed-in burr stone mill, a hood
and duct is arranged over the point where the material is discharged into
the barrel. Similarly, the casing of the two Blackstone sifters is connected
with the exhaust fan, and also the cover of the barrel into which the ground
material falls. Inside the edge-runner (the door of which is shown open) a
negative pressure is maintained, and one branch duct controls the dust in
the scooping out of the material from the barrel, while another is connected
to the cover of the receptacle into which the ground material is discharged.
Tapering of the ducts, tangential entry of branches, fan-box, and collecting
filters, are all shown. In the factory in question there are four edge-runners,
three burr stone mills, and two Blackstone sifters. Altogether exhaust
ventilation is applied at twenty-five points. (Drawing kindly supplied by the
Sturtevant Engineering Company, Limited, London.)