Internet of Things Architecture
End Message Communication parameters, payload Output : Functionality Output Impacted Components Return value Exception The messa ...
Hop To Hop Communication FC FC Output: Functionality Output Impacted Components Return value Exception The frame is transmitted ...
C.6 Security C.6.1 Functional Components Authorization (AuthZ) Description The authorization component is a front end for managi ...
description Pertaining requirements UNI.411, UNI.501, UNI.503, UNI.504, UNI.610, UNI.612, UNI.617, UNI.618, UNI.619, UNI.626 Tec ...
addMapping It is a function of the Resolution Functional Component called by the IM upon the creation of a pseudonym. It maps th ...
Trust and Reputation Architecture (TRA) Description (^) The Trust and Reputation Architecture component collects user reputation ...
The actor in the use case shown in Figure 149 is a user who utilises a service client to discover an IoT Service or a high-level ...
Figure 149 : Secure discovery of IoT services. ...
Use Case 2: Secure Direct Discovery of IoT-Services The discovery of IoT Services that may reveal personal information, e.g. tho ...
contained manner. This proof can also be based on simultaneously deployed information. During a second phase, the service client ...
User Interactions)(from WP4 IoT -Service Client Interactions)(from WP4 Authentication IoT ServiceResolution Authorization Pseudo ...
component verifies the Assertion at the Authentication component and – in case of positive result – the actual look-up process c ...
C.6.2.3 Interface Definitions In this subsection we present the operations of the security-related functional components that ar ...
verify Input Illustrative Action Calling Component Called Component Name of the functionality Parameters Prerequisite ―Restricte ...
―Restricted Discovery/ Lookup‖ Use Cases IoT Service Resolution Pseudony- mization createPseudo nym: create a Pseudonym for a Se ...
Output Functionality Output Impacted Components Return value Exception Returns the ID corrensponding to the pseudonym ServiceID ...
C.7 Management C.7.1 Functional Components Configuration Description The tasks of the Configuration FC include Initialising th ...
Fault logs are one input used for compiling error statistics. Such statistics can be used for identifying fragile functional com ...
FG, namely the Authorisation and Identity Management FCs. Pertaining requirements UNI.015, UNI.066, UNI.319, UNI.505, UNI.704, U ...
Default function set Function name Function description retrieveReport Generates reports about the system. Can either return an ...
«
16
17
18
19
20
21
22
23
24
25
»
Free download pdf