Authentication and authorization frameworks for IIoT
While evaluating the practical applicability of IT-based authentication and authorization techniques for IIoT use cases, it is important that we keep in perspective the unique demands of the cyber-physical world (discussed in the Distinguishing features of IAM for IIoT section).
Note
Note: This section and all subsequent sections of this chapter assume that the reader has a basic familiarity with modern cryptography.
Figure 3.2 summarizes the three main approaches of authentication:
Figure 3.2: Examples of authentication factors
Password-based authentication
Password-based authentication is the most widely used proof of identity for people to interact with a device or a system. It belongs to the "something I know" bucket as shown in Figure 3.2, and allows managing multiple levels of account privileges. In addition to the client-server applications, passwords are also used as secrets for securing access to operating system resources.
Many consumer...