Internet of Things Architecture
Build variation points into the software, Use standard extension points: By using standardised protocols and gateways, even le ...
Tactics Optimize repeated processing Replication Prioritize processing Distribute processing over time Minimize the use of share ...
complexity PS.13) deployed (DC PS.15) Functional component with reduced capabilities (DC PS.14) Distribute processing over time ...
rollback functionality (DC PS.30) Use asynchronous processing Asynchronous- aware functional component (DC PS.35) No impact No i ...
federated infrastructure, in which Virtual Entities are clustered based on similarity. Dedicated places are in charge of the IoT ...
be secured too with either the same S&P policies as the original IoT Resource or different policies. A history resource in t ...
Functional Information Deployment and Operation Harden root of trust The security policy defines how the root of trust may be ac ...
does not affect the remainder nodes in the network and thus preserves data integrity and freshness. In the context of the Inform ...
global system design Although this aspect is related to the deployment view, it has impacts on the design of the overall system ...
(DC S.13) transmission channel between device and application is secured (DC S.14) Communication FC, Network Communication FC an ...
Communication FC. For wireless communication security the implementation of an end-to-end security protocol which ensures confid ...
Avoid transmitting identifiers in clear Encryption mechanisms for wireless connections (DC P.3) No impact Integration of a wirel ...
Unauthorized access to implicit information (e.g. deriving location information from service access requests) must be restricted ...
Desired Quality The ability of the system to be fully or partly operational as and when required and to effectively handle failu ...
Log transactions Apply circular logging strategy (DC A.6) [De 2012] Information model needs concepts for transactions with uniqu ...
recovery strategy Preventive measures (DC A.15) Requires data- replication functionality Requires consistency among replicated d ...
through distribution and redundancy; the framework evolves with the number of things connected [De 2012b]. For design choice ̳VE ...
Design for failure The overall tactic can be further devided into more specific tacticts that are presented as design choices he ...
The choice ̳Virtual synchrony (DC A.13)‘ is especially suitable for systems in which information evolves extremely rapidly. Appl ...
configurations. The system correction process needs to be operated independently of the system to be restored. Some of the tacti ...
«
7
8
9
10
11
12
13
14
15
16
»
Free download pdf