Internet of Things – Architecture © 29
Appendix C on use-cases, interfaces, function descriptions and Message
Sequence Charts has been completed.
1.2 Structure of the document
The structure of this document follows:
Chapter 1 gives a short and general introduction to the document and shows how it
positions it-self with regards to its previous version D1.4.
Chapter 2 gives a more complete introduction to the IoT-A vision and philosophy. It
provides the reader with some elements of discourse and general concerns about
what is the ARM, how it was elaborated (elements of methodology), how it can be
used (usage, benefits of using it) and where it potentially can apply (business
scenarios, field of application) and envisioned impacts.
Chapter 3 gives the full detail about the updated Reference Model, starting with an
informal discourse about the IoT domain, emphasising specific challenges coming
with the IoT field and giving explanations about how the sub-models interact. Then
this section introduces the Domain model. The rest of section is dedicated to the
Communication model, IoT Information Model, Functional model and model relating
to Trust, Security and Privacy.
Chapter 4 is dedicated to the Reference Architecture (which found its grounding in
Chapter 3). Following the element of methodology explained in Chapter 2 and
Section 3.1, this chapter provides a set of Views (Functional Decomposition,
Information, Deployment & Operation) and Perspectives (Security & Privacy,
Evolution & Interoperability, Performance & Scalability and Availability & Resilience).
Chapter 5 is dedicated to Guidelines and Design Choices and can be considered as
a ―Cookbook‖ for the IoT system architects to use. It provides lot of information about
the process of deriving a concrete architecture out of the ARM and gives indications
and modelling rules on how to use the IoT ARM, all illustrated with concrete
examples (Section 5.3). Then this chapter explains how to use the IoT Reference
Architecture. For that purpose it provides a large number of Design Choices that can
be used by an architect to build up a concrete architecture, depending on various
aspects and properties of the targeted system. This chapter also provides a Risk
Analysis that guides the architects in making their IoT-system secure. Finally Section
5.4 proposes a reverse mapping exercise applied to a few existing IoT architectures,
in order to check the completeness of the IoT-A approach as far as those existing
IoT systems are concerned.
Then follow some appendixes: Appendix A gives a glossary of terms along with their
definitions. Appendix B gives details about the Requirement methodology; Appendix
C gives Use Cases with associated sequences diagrams and interfaces that
correspond to the functional groups identified in Chapter 4; Appendix D focuses on