Internet of Things Architecture

(Elliott) #1

Use Case 2: Secure Direct Discovery of IoT-Services


The discovery of IoT Services that may reveal personal information, e.g. those
used for health monitoring, needs to be secured also in those cases, in which
the discovery is not able to access additional security information on the fly.
Thus the related credentials have to be processed prior to the discovery.


Figure 150 : Secure Direct Discovery of IoT Services.

The actor in the uses case shown in Figure 150 is again a user who utilises a
service client. In a first phase, during which the related components are
available, the following actions take place:


 Authenticate the user: The user is authenticated and an assertion of this
identity is provided.

 Retrieve credentials: Based on the identity of the user, a list of
credentials is provided, which prove the privileges of the user in a self-
Free download pdf