Internet of Things Architecture
201 Smart factory; Retail; eHealth; Energy (Smart Grid). The following elements to be protected were identified: Physi ...
202 Backend services: Backend services represent server-side applicative elements (for instance data-collection server communi ...
203 wherein the attacked service can be altered, e.g. making a search service return false results, without the legitimate users ...
204 Spoofing Identity Tampering with Data Repudiation Information Disclosure Denial of Service Elevation of Privilege Physical p ...
205 Entity. Attacker alters sensor device so that monitoring of a Physical Entity fails. actuator. Loss or theft of device conta ...
206 5.2.9.3 Risk Assessment Identified risks were assessed using the DREAD methodology based on (simplified) metrics. DREAD, def ...
207 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
208 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
209 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
210 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
211 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
212 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
213 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
214 Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see Secti ...
Internet of Things – Architecture © - 215 - 5.2.9.4 Discussion Assessing the risks that relate to the Internet of Things and put ...
layer, the Host Identity Protocol Base Exchange (HIP BEX) and Internet Key Exchange (IKE) are AKE protocols and IPsec is the cor ...
which non-repudiation has to be provided are part of highly specific applications (e.g. inter-bank communications of aggregated ...
Figure 71 : Applying Perspectives to Views (see Figure 4-1 in [Rozanski 2011] While applying perspectives to views not every vie ...
Performance & Scalability Deployment Trust, Security & Privacy Deployment Table 17 : Focus on high perspective to view a ...
such flexibility Tactics Create extensible interfaces Apply design techniques that facilitate change Apply metamodel-based archi ...
«
6
7
8
9
10
11
12
13
14
15
»
Free download pdf