Internet of Things Architecture

(Elliott) #1
VE Service

VE & IoT
Service Monitoring
VE Resolution

IoT ServiceResolution IoT Service

OrchestrationService

CompositionService

CommunicationEnd To End CommunicationNetwork CommunicationHop to Hop

Management Security

Application

Virtual Entity IoT Service

Communication

Fault

Authorisation
Key Exchange &Management

Trust & Reputation

Identity Management
Authentication

Device

Reporting

Member

State

Process Management IoT
ModelingProcess
ExecutionProcess

ChoreographyService

OrganisationService

On-board
Logistics

Temperature Sensor

Configuration

Figure 40 : ―Red Thread‖ example

In that figure, Functional Components which are used only once, such as during
the instantiation of the process model or configuration of devices are indicated
in light yellow.


Functional Components which are used at runtime of the use case are indicated
in orange.


The example of this section can be described only at a high level, since a
concrete architecture and implementation are needed to go into further detail.
Also the design choices of the concrete architecture need to be considered.


In this example, the embedded sensors (Temperature Sensor) continuously
measure the environmental conditions within the truck. The measurement data
is available to ―Ted‖ ‘s IoT-Phone (On-board Logistics Application) since the
IoT-Phone is subscribed to the service exposing the measurement data (IoT
Service). In order to subscribe to the data, the association between the service
exposing the data and the Load carrier needs to be resolved (VE Resolution
and IoT Service Resolution). The communication from sensor to IoT-Phone
makes use of the network protocol stack of the IoT Communication Model (End
To End Communication, Network Communication, Hop to Hop Communication,
Key Exchange & Management). All transactions take place in a secure way,
meaning that no operations are allowed unless authentication (Authentication)
took place and explicit authorisation is obtained for the particular operation
(Authorisation).


It is beyond the scope of this section but an illustration of the adaption of the
ARM to a specific case and implementation can be found in [Meyer 2013].

Free download pdf