Internet of Things – Architecture © 23
Table of tables
Table 1: ARM-related work from other IoT-A Work Packages .................................. 31
Table 2: Relation of model in the IoT Reference Model to features in the IoT
Reference Architecture. ........................................................................................ - 48 -
Table 3: Example of Privacy threats mitigation within IoT-A ............................... - 102 -
Table 4: Mapping of the high-level roles of the Management FG onto FCs. ...... - 129 -
Table 5: Evolution and Interoperability (adopted from [Rozanski 2005]), extended
with IoT specific aspects .................................................................................... - 160 -
Table 6: Performance and Scalability (adopted from [Rozanski 2005]), extended
with IoT specific aspects .................................................................................... - 161 -
Table 7: Trust Perspective (extended from [Rozanski 2005]) ...................... - 162 -
Table 8: Security perspective (adopted from [Rozanski 2005], extended with IoT
specific aspects) ................................................................................................. - 164 -
Table 9: Privacy perspective (adopted from [Rozanski 2005], extended with IoT
specific aspects) ................................................................................................. - 164 -
Table 10: Availability and resilience (adopted from [Rozanski 2005], extended
with IoT specific aspects) ................................................................................... - 165 -
Table 11: Overview of IoT architecting activities and actions (left columns) and what
relevant input one derives from other IoT architecting activities and actions
(horizontal). See Figure 67 for a depiction of these activities and actions. ......... - 188 -
Table 12: Overview of IoT architecting activities and actions ............................. - 194 -
Table 13: Translation table for UNI requirement types from and to IoT ARM
requirement types................................................................................................... 197
Table 14: STRIDE classification (horizontal) of the identified risks broken down by
the elements to be protected (vertical). .................................................................. 205
Table 15: DREAD assessment of the identified risks (see Table 14). .................... 214
Table 16: Typical View and Perspective Applicability [Rozanski 2011] ........ - 218 -
Table 17: Focus on high perspective to view ability ........................................... - 219 -
Table 18: Tactics addressing evolution and interoperability. .............................. - 220 -