O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing devices and the edge to the cloud gateway

Devices on the edge are typically located some distance from the backend data center and require unique physical, software-related, and data-security precautions. The data the devices gather is sometimes transmitted to other devices or is transmitted directly to cloud gateways or via field gateways onto the cloud.

In the following diagram, the shaded area indicates the components and networks that we will discuss securing in this section of the chapter:

Figure 8.3: Device to cloud security 

Connections and routes are established when peering occurs between the devices and the gateways. Secure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required