- Practical Industrial Internet of Things Security
- Sravani Bhattacharjee
- 82字
- 2021-07-23 18:56:13
Authentication and authorization frameworks for IIoT
While evaluating the practical applicability of IT-based authentication and authorization techniques for IIoT use cases, it is important that we keep in perspective the unique demands of the cyber-physical world (discussed in the Distinguishing features of IAM for IIoT section).
Note: This section and all subsequent sections of this chapter assume that the reader has a basic familiarity with modern cryptography.
Figure 3.2 summarizes the three main approaches of authentication:
Figure 3.2: Examples of authentication factors