Practical Industrial Internet of Things Security
上QQ阅读APP看书,第一时间看更新

 Usage viewpoint

The activities and workflows involved in the usage of an IIoT system to achieve the key system and business objectives are analyzed in this viewpoint. An example workflow would be:

  1. Register new device to the edge gateway
  2. Register the new device in the cloud-based management platform by automatic discovery and querying of all gateways
  3. Run remote test procedure appropriate for this device type and verify that values generated are within expected range and consistent with similar devices in the proximity

This analysis maps the usage elements to their functional and implementation counterparts in the overall architecture. Safety is an important trustworthiness factor of IIoT system usage—in addition to data integrity, data confidentiality, and resilience—that needs to be factored in across the usage cycle.