September 2017
Intermediate to advanced
360 pages
9h 43m
English
Devices might be paired with field gateways at the edge or directly to cloud gateways. Authorization and authentication of devices requires recognition of their identities. Device identities are typically stored behind cloud gateways in IoT hub databases. Indexes of these devices enabling rapid look-up are sometimes maintained in separate locations for enhanced security.
To fight spoofing, device identification and authentication typically uses TLS or IPSec. PSKs are used when devices do not support cryptography. Other directory services might be leveraged for authentication (such as Active Directory). IP filtering can be used to accept or reject specific IP addresses.
Devices commonly use their own pre-existing ...