O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Device to gateway connections

Devices might be paired with field gateways at the edge or directly to cloud gateways. Authorization and authentication of devices requires recognition of their identities. Device identities are typically stored behind cloud gateways in IoT hub databases. Indexes of these devices enabling rapid look-up are sometimes maintained in separate locations for enhanced security.

To fight spoofing, device identification and authentication typically uses TLS or IPSec. PSKs are used when devices do not support cryptography. Other directory services might be leveraged for authentication (such as Active Directory). IP filtering can be used to accept or reject specific IP addresses.

Devices commonly use their own pre-existing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required