Book Image

Architecting the Industrial Internet

By : Robert Stackowiak, Shyam Varan Nath, Carla Romano
Book Image

Architecting the Industrial Internet

By: Robert Stackowiak, Shyam Varan Nath, Carla Romano

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (19 chapters)
Title Page
About the Authors
About the Reviewers
Customer Feedback

Planning for security in the supply chain example

You will recall from the generic supply chain example and the CEMENTruck Inc. example that data is captured from sensors on equipment in the plants and from vehicles in transit. This data is transmitted to cloud-based backend systems for real-time streaming analytics processing and for batch processing in a data lake and data warehouse infrastructure.

The following diagram represents such a scenario:

Figure 8.7: IIoT End-to-End Security

To ensure a secure infrastructure, we will need to put in place many of the security measures that we previously discussed in this chapter in the devices and vehicles, across the networks, and in the backend engines. We'll also need to be able to assess the ability of our infrastructure to prevent compromised security proactively and detect and respond to security threats on an ongoing basis.

In the preceding diagram, we noted that device-to-device communications use CoAP and DTLS for secure WSN transmissions...