IIoT device communication and encryption

An IIoT device should always authenticate and authorize before starting communication with the gateway.

In addition, it is recommended that data processing at edge devices, and the exchange of data between devices, are covered by data encryption both at rest and in motion. However, with the variety of devices and connections available, standardization of protocols and processes becomes very challenging, not to mention the challenges of providing a complete key life cycle management solution.

Secure communication using TLS can be achieved by using a X.509 digital certificate and cryptographic key with life cycle capabilities, including public/private key generation (PKI), distribution, management, ...

Get Industrial Internet Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.