Internet of Things – Architecture © 24
Table 19: Tactics identified as not relevant for evolution and interoperability in IoT
Systems. ............................................................................................................ - 221 -
Table 20 Tactics adressing performance and scalability .................................... - 222 -
Table 21: Tactics and corresponding Design Choices for Performance and
Scalability. .......................................................................................................... - 224 -
Table 22: Tactics and corresponding Design Choices for Trust. ........................ - 227 -
Table 23: Omitted tactics for the Trust Perspective. ........................................... - 229 -
Table 24: Tactics and corresponding Design Choices for Security. ................... - 230 -
Table 25: Omitted tactics for the Security Perspective. ...................................... - 231 -
Table 26: Tactics and corresponding Design Choices for Privacy. .................... - 232 -
Table 27: Omitted tactics for the Privacy Perspective. ....................................... - 233 -
Table 28 Tactics addressing Availability and Resilience .................................... - 234 -
Table 29: Design Choices addressing availability and resilience ....................... - 236 -
Table 30: Types of parkers and the services to be offered................................. - 245 -
Table 31: Overview of what components and interfaces in the context diagram (see
Figure 73) are part of the architecture to be devised. ......................................... - 246 -
Table 32: Mapping ETSI M2M concepts to the IoT-A Domain Model. ................ - 306 -
Table 33: Mapping ETSI M2M threat analysis to the IoT-A risk analysis. ........... - 311 -
Table 34: Mapping EPCglobal concepts to the IoT Domain Model .................... - 315 -
Table 35: Mapping of the EPCglobal information model to the IoT Information Model -
319 -
Table 36: Mapping of uID concepts to the IoT Reference Model ....................... - 322 -
Table 37: Usage of standardised architecture methodologies for the development of
the IoT ARM. ...................................................................................................... - 492 -