4.2.2.7 Security
The Security FG (see Figure 38 ) is responsible for ensuring the security and
privacy of IoT-A-compliant systems.
It consists of five functional components:
Authorisation; Key Exchange & Management; Trust & Reputation; Identity Management; Authentication.VE ServiceService MonitoringVE & IoT
VE ResolutionIoT ServiceResolution IoT ServiceAuthorisation
Key Exchange &ManagementTrust & Reputation
Identity ManagementAuthenticationOrchestrationServiceService
CompositionManagement SecurityApplicationCommunicationConfiguration
FaultDeviceReporting
MemberStateProcess Management IoT
ModelingProcess
Process
ExecutionService
ChoreographyOrganisationServiceNetwork
Communication
End To End
Communication
Hop to Hop
CommunicationVirtual Entity IoT ServiceFigure 38 : Security FGThe Authorization FC is a front end for managing policies and performing
access control decisions based on access control policies. This access control
decision can be called whenever access to a restricted resource is requested.
For example, this function is called inside the IoT Service Resolution FC, to
check if a user is allowed to perform a lookup on the requested resource. This is
an important part of the privacy protection mechanisms
The two default functionalities offered by the Authorization FC are 1/ to
determine whether an action is authorized or not -the decision is made based
on the information provided from the assertion, service description and action
type- and 2/ to manage policies. This refers to adding, updating or deleting an
access policy.