Internet of Things Architecture

(Elliott) #1

4.2.2.7 Security


The Security FG (see Figure 38 ) is responsible for ensuring the security and
privacy of IoT-A-compliant systems.


It consists of five functional components:


 Authorisation;

 Key Exchange & Management;

 Trust & Reputation;

 Identity Management;

 Authentication.

VE Service

Service MonitoringVE & IoT
VE Resolution

IoT ServiceResolution IoT Service

Authorisation
Key Exchange &Management

Trust & Reputation
Identity Management

Authentication

OrchestrationService

Service
Composition

Management Security

Application

Communication

Configuration
Fault

Device

Reporting
Member

State

Process Management IoT
ModelingProcess
Process
Execution

Service
Choreography

OrganisationService

Network
Communication
End To End
Communication
Hop to Hop
Communication

Virtual Entity IoT Service

Figure 38 : Security FG

The Authorization FC is a front end for managing policies and performing
access control decisions based on access control policies. This access control
decision can be called whenever access to a restricted resource is requested.
For example, this function is called inside the IoT Service Resolution FC, to
check if a user is allowed to perform a lookup on the requested resource. This is
an important part of the privacy protection mechanisms


The two default functionalities offered by the Authorization FC are 1/ to
determine whether an action is authorized or not -the decision is made based
on the information provided from the assertion, service description and action
type- and 2/ to manage policies. This refers to adding, updating or deleting an
access policy.

Free download pdf