Book Image

Architecting the Industrial Internet

By : Robert Stackowiak, Shyam Varan Nath, Carla Romano
Book Image

Architecting the Industrial Internet

By: Robert Stackowiak, Shyam Varan Nath, Carla Romano

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (19 chapters)
Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Securing devices and the edge to the cloud gateway


Devices on the edge are typically located some distance from the backend data center and require unique physical, software-related, and data-security precautions. The data the devices gather is sometimes transmitted to other devices or is transmitted directly to cloud gateways or via field gateways onto the cloud.

In the following diagram, the shaded area indicates the components and networks that we will discuss securing in this section of the chapter:

Figure 8.3: Device to cloud security 

Connections and routes are established when peering occurs between the devices and the gateways. Secure devices never accept unsolicited network connections. They might be peered directly with cloud gateways or first with field gateways that are then peered with cloud gateways. Transmissions are secured at the transport and application-level protocol layers and authenticated to the services or gateways that they are connected to.

Device considerations

When...