Internet of Things Architecture

(Elliott) #1

Internet of Things – Architecture © 23


Table of tables


Table 1: ARM-related work from other IoT-A Work Packages .................................. 31


Table 2: Relation of model in the IoT Reference Model to features in the IoT
Reference Architecture. ........................................................................................ - 48 -


Table 3: Example of Privacy threats mitigation within IoT-A ............................... - 102 -


Table 4: Mapping of the high-level roles of the Management FG onto FCs. ...... - 129 -


Table 5: Evolution and Interoperability (adopted from [Rozanski 2005]), extended
with IoT specific aspects .................................................................................... - 160 -


Table 6: Performance and Scalability (adopted from [Rozanski 2005]), extended
with IoT specific aspects .................................................................................... - 161 -


Table 7: Trust Perspective (extended from [Rozanski 2005]) ...................... - 162 -


Table 8: Security perspective (adopted from [Rozanski 2005], extended with IoT
specific aspects) ................................................................................................. - 164 -


Table 9: Privacy perspective (adopted from [Rozanski 2005], extended with IoT
specific aspects) ................................................................................................. - 164 -


Table 10: Availability and resilience (adopted from [Rozanski 2005], extended
with IoT specific aspects) ................................................................................... - 165 -


Table 11: Overview of IoT architecting activities and actions (left columns) and what
relevant input one derives from other IoT architecting activities and actions
(horizontal). See Figure 67 for a depiction of these activities and actions. ......... - 188 -


Table 12: Overview of IoT architecting activities and actions ............................. - 194 -


Table 13: Translation table for UNI requirement types from and to IoT ARM
requirement types................................................................................................... 197


Table 14: STRIDE classification (horizontal) of the identified risks broken down by
the elements to be protected (vertical). .................................................................. 205


Table 15: DREAD assessment of the identified risks (see Table 14). .................... 214


Table 16: Typical View and Perspective Applicability [Rozanski 2011] ........ - 218 -


Table 17: Focus on high perspective to view ability ........................................... - 219 -


Table 18: Tactics addressing evolution and interoperability. .............................. - 220 -

Free download pdf