Internet of Things Architecture

(Elliott) #1

Internet of Things – Architecture © 24


Table 19: Tactics identified as not relevant for evolution and interoperability in IoT
Systems. ............................................................................................................ - 221 -


Table 20 Tactics adressing performance and scalability .................................... - 222 -


Table 21: Tactics and corresponding Design Choices for Performance and
Scalability. .......................................................................................................... - 224 -


Table 22: Tactics and corresponding Design Choices for Trust. ........................ - 227 -


Table 23: Omitted tactics for the Trust Perspective. ........................................... - 229 -


Table 24: Tactics and corresponding Design Choices for Security. ................... - 230 -


Table 25: Omitted tactics for the Security Perspective. ...................................... - 231 -


Table 26: Tactics and corresponding Design Choices for Privacy. .................... - 232 -


Table 27: Omitted tactics for the Privacy Perspective. ....................................... - 233 -


Table 28 Tactics addressing Availability and Resilience .................................... - 234 -


Table 29: Design Choices addressing availability and resilience ....................... - 236 -


Table 30: Types of parkers and the services to be offered................................. - 245 -


Table 31: Overview of what components and interfaces in the context diagram (see
Figure 73) are part of the architecture to be devised. ......................................... - 246 -


Table 32: Mapping ETSI M2M concepts to the IoT-A Domain Model. ................ - 306 -


Table 33: Mapping ETSI M2M threat analysis to the IoT-A risk analysis. ........... - 311 -


Table 34: Mapping EPCglobal concepts to the IoT Domain Model .................... - 315 -


Table 35: Mapping of the EPCglobal information model to the IoT Information Model -
319 -


Table 36: Mapping of uID concepts to the IoT Reference Model ....................... - 322 -


Table 37: Usage of standardised architecture methodologies for the development of
the IoT ARM. ...................................................................................................... - 492 -

Free download pdf