addMapping It is a function of the Resolution Functional
Component called by the IM upon the creation
of a pseudonym. It maps the newly created ID
to a URL.
C6.2.2
resolvePseudonym Resolves a given pseudo ID (root identity,
secondary identity, pseudonym or group
identity) to the respective real ServiceID. The
resolution occurs only after the legitimacy of
the requester is verified, i.e., its authentication.
C6.2.2
Key Exchange and Management (KEM)
Description The Key Exchange and Management component is involved
to enable secure communications between two or more IoT-A
peers that do not have initial knowledge of each other or
whose interoperability is not guaranteed, ensuring integrity
and confidentiality.
Additional
description
The component is described in detail in deliverable D4.2
Pertaining
requirements
UNI.022, UNI.047, UNI.501, UNI.503, UNI.504, UNI.507,
UNI.607, UNI.608, UNI.609
Default function set
Function
name
Function description
Securely
distribute
keys
Upon request, this function finds out a common security
framework supported by the issuing node and a remote target,
creates a key (or key pair) in this framework and then
distributes it (them) securely. Security parameters, including the
type of secure communications enablement, are provided.
Register
security
capabilities
This function is called by nodes and gateways that want to
benefit from the mediation of the KEM in the process of
establishing secure connections. In this way the KEM registers
their capabilities and then can provide keys in the right
framework.