System Model and Network Model Sample Clauses
System Model and Network Model. Gateway Industrial server Industrial manufacture Awareness nodes/devices Internet Gateway User Gateway Awareness nodes/devices Industrial manufacture Industrial manufacture The system model shown in the fig. 1 is composed of industrial devices, industrial gateways, industrial servers and legitimate users. In an indus- trial environment, the underlying terminal device is used to collect real-time information, detect and monitor the real-time situation of the industry. In- dustrial devices are terminal devices in various IIoT working environments, such as sensor nodes and smart devices. These devices have low computing resources and storage resources. Because these devices are susceptible to physical capture, they are considered semi-trusted entities. The industrial gateway is a cluster head node in a specific IIoT area. The gateway is re- sponsible for controlling network data, network interoperability and security management. The gateway and the terminal device in the area are only func- tionally different. The gateway is also a special terminal device. Industrial servers are fully trusted entities in industrial environments. The server is responsible for managing the relevant information of the devices and users in the entire industrial environment. A legitimate user refers to the man- agement and operation personnel of a specific industrial area. Users are also semi-trusted entities. If a user needs to access a specific industrial device (including gateways and smart industrial devices) to obtain the status and data of the device, the user first needs to register himself as a legitimate user on a trusted industrial server. Similarly, all industrial devices and industrial gateways need to be registered on the industrial server before being deployed to the entire IIoT environment. There are three types of communication in the network model of this scheme: 1) the communication between the user and the server; 2) the com- munication between the server and the device; 3) the communication be- tween the device and the user. To achieve secure communication, secure key management between different devices is required. Only after the key management process has been successfully executed can keys for secure com- munication be established between entities. For example the user and the accessed device should authenticate each other with the help of the server. After the mutual authentication between the user and the device is successful, the two parties will establi...
