Book Image

Architecting the Industrial Internet

By : Robert Stackowiak, Shyam Varan Nath, Carla Romano
Book Image

Architecting the Industrial Internet

By: Robert Stackowiak, Shyam Varan Nath, Carla Romano

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (19 chapters)
Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Chapter 8. Securing the Industrial Internet

One aspectof architecture planning for an IIoT implementation that requires special attention is defining a secure Industrial Internet solution. This topic seems to spring to  mind whenever reports of hacking these solutions are prevalent. The downside to not considering protective and proactive security measures and their impact upon the architecture is the potential failure of the entire infrastructure at critical times. The resulting implications can include negative impact to the business, danger to safety, and exposure to ransomware.

The IIC defines IIoT security as simply protecting the Industrial Internet solution from unintended or unauthorized access, change, or destruction. Data and infrastructure confidentiality, integrity, and availability must be maintained to assure trustworthiness of the solution. Proper security can be measured in the reliability, resilience, privacy, and safety provided by the solution.

Designing a secure solution...