Book Image

Industrial Internet Application Development

By : Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
Book Image

Industrial Internet Application Development

By: Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli

Overview of this book

The Industrial Internet refers to the integration of complex physical machines with networked sensors and software. The growth in the number of sensors used in industrial machinery has led to an exponential increase in data being captured for predictive analytics. Industrial Internet Application Development is a practical guide for developers who want to create applications that leverage the full capabilities of IIoT. You will get started by learning how to develop your first IIoT application and understanding its deployment and security. Once you’re familiar with what IIoT is, you will move on to exploring Edge Development along with the analytics aspect of the IIoT stack. In later chapters, you’ll get to grips with the deployment of IIoT applications on the Predix platform. As you cover these concepts, you’ll be able to identify key elements of the development framework and understand their importance while considering architecture and design for IIoT applications. By the end of this book, you will have the skills you need to deploy IIoT applications on the Predix platform and incorporate best practices for developing fault-tolerant and reliable IIoT systems.
Table of Contents (13 chapters)
Free Chapter
IIoT Fundamentals and Components
Future Direction of the IIoT

IIoT security practices

Consider the Distributed Denial of Service (DDoS) attack of October 16th, 2016, which almost brought down the internet on the east coast of the USA due to its attack on DYN's servers. This was later identified as having been due to a Mirai botnet attack using Internet of Things (IoT) devices, such as cameras, home routers, and so on. The Mirai bot targeted devices that used a stripped-down Linux OS by scanning the internet for open Telnet ports and logging into the device using one of the default passwords, thereby taking over the devices and using them for the DDoS. This is a very clever and effective way to implement a bot that rides on IoT devices. With billions of IoT devices around, these types of attacks have become common and it is natural that some of these attacks will be targeted toward IIoT devices as well, which could have a devastating...