Device life cycle management requirements for identity and access management in the factory of future environment

Jari Partanen, Markku Kylänpää (Corresponding Author), Sanna Loukusa, Markku Korkiakoski, Jarno Salonen

Research output: Contribution to journalArticle in a proceedings journalScientificpeer-review

1 Citation (Scopus)

Abstract

Future factories will contain a huge number of interconnected systems and various Internet of Things (IoT) devices. Due to the increased complexity, the identity and access management of these systems during their entire device life cycle is a challenging task. At the same time, there is a shift from legacy automation protocols to the use of Internet protocols. This development is
increasing connectivity that will also expose more subsystems to new kinds of attacks. This article presents the typical device life cycle requirements for identity and access management in future industrial automation context also known as the factory of the future (FoF). We have considered two architecture candidates, namely the cloud and web-based architectures. The requirements
for a device life cycle management system called PROSE are given as an example use case. The article describes our research by presenting a practical example of the requirements that have been used to build a device life cycle management system.
Original languageEnglish
Pages (from-to)235-244
Number of pages10
JournalProcedia Computer Science
Volume204
DOIs
Publication statusPublished - 2022
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Industry Sciences and Computer Science Innovation, iSCSi’22 - Polytechnic Institute of Management and Technology (ISLA) / Online, Vila Nova de Gaia, Portugal
Duration: 9 Mar 202211 Mar 2022
https://iscsi-conference.org/

Keywords

  • Access Control
  • IAM
  • Industrial IoT
  • IT-OT Convergence
  • Access control
  • IT-OT convergence

Fingerprint

Dive into the research topics of 'Device life cycle management requirements for identity and access management in the factory of future environment'. Together they form a unique fingerprint.

Cite this