As more connected devices come into use across the industrial IoT (IIoT), traditional cloud computing architectures are no longer sufficient. Current centralized systems simply don’t hold up to the scale and security requirements of so many billions of IoT devices, including the secure storage, availability over intermittent network connections, access control, authentication, and real-time analysis of a near-constant data stream. The traditional approach involves moving data from the edge to a central server for processing, which increases latency and reduces available bandwidth across the network. Most importantly, however, the transfer of massive amounts of data from devices at the edge to a central system greatly increases the chance for a security breach, resulting in lost and compromised information.... Read more →
04/30/2018
Redesigning Security for Fog Computing with Blockchain
Posted at 8:04 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Innovation,OpenFog,Security, | Permalink
Tags: BLOCKCHAIN, FOG, IIOT, IOT, OPENFOG, SECURITY,
04/12/2017
A real world, multi-vendor, single security solution on display in Hannover Messe
The Industrial Internet of Things (IIoT) is driving the addition of more connected devices. Cybersecurity is critical to the success of IIOT. The demonstration illustrates how the IIC’s recently released Industrial Internet Security Framework can be applied to solve this challenging problem. Mimicking a real-world, multi-vendor, distributed environment, the demonstration integrates existing Hannover Messe demos from 24 IIC and Plattform Industrie 4.0 member companies into a single security solution. It spans multiple booths at Hannover Messe and remote sites around the world.... Read more →
Posted at 9:19 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards, | Permalink
Tags: CYBERSECURITY, IIOT, IOT, SECURITY,