Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
76 страница из 122
3 Availability: The data must be available to authorized parties at all point of time. Partial resources, functionalities, or other services produced or attained by the network may be endangered and it is not accessible within the peers of the network.
4 Authenticity: This indicates that the system is not accessed by unauthorized users. Authentication mechanism helps establishing proof of identities without which fabrication is possible.
5 Non-repudiation: It does not permit the sender of a specific message to refute the claim of not directing that message.
2.3 Security Challenges of IoT
There are three classes of IoT related risks encompassing the risks that are as follows:
1 Characteristic to any web oriented system
2 Pertaining to devices dedicated to IoT systems
3 Critical to implement safety such that no danger is posed by misusing devices, for example, industrial actuators.
Customary ways such as securing of open port(s) on units fit in the first group. The second type comprises of issues particularly relevant to IoT computer hardware. Also, any scheme that can link to Internet holds an operating system—embedded positioned in respective firmware and most of these are not intended with security as their main concern.