![Practical Industrial Internet of Things Security](https://wfqqreader-1252317822.image.myqcloud.com/cover/616/36699616/b_36699616.jpg)
上QQ阅读APP看书,第一时间看更新
Authentication and authorization frameworks for IIoT
While evaluating the practical applicability of IT-based authentication and authorization techniques for IIoT use cases, it is important that we keep in perspective the unique demands of the cyber-physical world (discussed in the Distinguishing features of IAM for IIoT section).
Note: This section and all subsequent sections of this chapter assume that the reader has a basic familiarity with modern cryptography.
Figure 3.2 summarizes the three main approaches of authentication:
![](https://epubservercos.yuewen.com/E70E39/19470390608870106/epubprivate/OEBPS/Images/a647e088-3648-449a-86eb-a62b3a5c2a68.png?sign=1739283189-jEPq0hg5ktqXHLR6zCsEYgPOJZ3OLYPf-0-9b4c7ee3fa8d93b88d4f3faab259d6be)
Figure 3.2: Examples of authentication factors