Enabling Things to Talk : : Designing IoT Solutions with the IoT Architectural Reference Model.

This volume presents the results of a flagship European Commission project to map the conceptual reference model for the Internet of Things. It sets out an agreed IoT architecture of maximal interoperability, ready for use in real-world network development.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Berlin, Heidelberg : : Springer Berlin / Heidelberg,, 2013.
©2013.
Year of Publication:2013
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (352 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006422783
ctrlnum (MiAaPQ)5006422783
(Au-PeEL)EBL6422783
(OCoLC)1231606599
collection bib_alma
record_format marc
spelling Bassi, Alessandro.
Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
1st ed.
Berlin, Heidelberg : Springer Berlin / Heidelberg, 2013.
©2013.
1 online resource (352 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Intro -- Foreword -- Acknowledgements -- Contents -- Chapter 1: Introduction to the Internet of Things -- Part I: General Concepts of the Architecture Reference Model (ARM) -- Chapter 2: The Need for a Common Ground for the IoT: The History and Reasoning Behind the IoT-A Project -- Chapter 3: The IoT Architectural Reference Model as Enabler -- 3.1 Using the IoT ARM -- 3.1.1 Cognitive Aid -- 3.1.2 Reference Model as a Common Ground -- 3.1.3 Generating Architectures -- 3.1.4 Identifying Differences in Derived Architectures -- 3.1.5 Achieving Interoperability -- 3.1.6 System Roadmaps and Product Life Cycles -- 3.1.7 Benchmarking -- 3.2 Architecture Development Process Based on the IoT ARM -- 3.2.1 Reference Model and Reference Architecture -- 3.2.2 Generating Architectures -- 3.2.3 Choice of Design and Development Methodology -- Chapter 4: IoT in Practice: Examples: IoT in Logistics and Health -- 4.1 Storyline of the IoT-A Use Case ``IoT in Retail and Logistics ́́-- 4.2 Introducing the ARM with a Recurring Example (Logistics) -- 4.3 Use of the ARM in the Scene ``Sensor-Based Quality Control ́́(Retail) -- 4.4 Storyline of the IoT-A Use Case ``IoT in Health and Home ́́-- 4.5 Use of the ARM in the Scene ``Remote Patient Notification ́́(Homecare) -- 4.6 Reverse Mapping of the ARM in the Scene ``In-Surgery Tracking of RFID-Tagged Stomach Towels ́́(Hospital) -- Part II: A Guidance to the Architecture Reference Model (ARM) -- Chapter 5: Guidance to the ARM: Overview -- 5.1 Chapter Structure -- 5.1.1 Chapter 6 ``A Process for Generating Concrete Architectures Process ́́-- 5.1.2 Chapter 7 ``IoT Reference Model ́́-- 5.1.3 Chapter 8 ``IoT Reference Architecture ́́-- 5.1.4 Chapter 9 ``Reference Manual ́́-- 5.1.5 Chapter 10 ``Concrete Architecture ́́-- 5.1.6 Chapter 11 ``Interactions ́́-- 5.1.7 Chapter 12 ``Testimonials ́́-- 5.2 ARM History and Evolution.
Chapter 6: A Process for Generating Concrete Architectures -- 6.1 Process Steps to Generate IoT Architectures -- 6.2 Compatibility with Other Architecting Methodologies -- 6.3 IoT Architecture Generation and Related Activities -- 6.3.1 Physical Entity View -- 6.3.2 IoT Context View -- 6.4 Requirements Process and ``Other Views ́́-- 6.4.1 Requirements Process -- 6.4.2 View Derivation -- 6.5 IoT ARM Contributions to the Generation of Architectures -- 6.6 Minimum Set of Functionality Groups -- 6.7 Usage of Unified Requirements -- 6.7.1 Introduction -- 6.7.2 Using Unified Requirements -- 6.7.2.1 Requirement Elicitation -- 6.7.2.2 System Specification -- 6.8 Threat Analysis -- 6.8.1 Elements to Protect -- 6.8.2 Risk Sources -- 6.8.3 Risk Assessment -- 6.8.4 Discussion -- 6.9 Design Choices -- 6.9.1 Introduction -- 6.9.2 Design Choices Addressing Evolution and Interoperability -- 6.9.3 Design Choices Addressing Performance and Scalability -- 6.9.3.1 Replication -- 6.9.3.2 Prioritize Processing -- 6.9.3.3 Partition and Parallelize -- 6.9.3.4 Reduce Computational Complexity -- 6.9.3.5 Distribute Processing Over Time -- 6.9.3.6 Minimize Used of Shared Resources -- 6.9.3.7 Reuse Resources and Results -- 6.9.3.8 Scale Up or Scale Out -- 6.9.3.9 Degrade Gracefully -- 6.9.3.10 Use Asynchronous Processing -- 6.9.4 Design Choices Addressing Trust -- 6.9.4.1 Harden Root of Trust -- 6.9.4.2 Ensure High Quality of Data -- 6.9.4.3 Infrastructural Trust and Reputation Agents -- 6.9.4.4 Provide High System Integrity -- 6.9.4.5 Avoid Leap of Faith -- 6.9.5 Design Choices Addressing Security -- 6.9.5.1 Subject Authentication -- 6.9.5.2 Use Access Policies -- 6.9.5.3 Secure Communication Infrastructure -- 6.9.5.4 Secure Peripheral Networks (Link Layer Security, Secure Routing) -- 6.9.6 Design Choices Addressing Privacy -- 6.9.6.1 Pseudonymisation.
6.9.6.2 Avoid Transmitting Identifiers in Clear -- 6.9.6.3 Minimize Unauthorized Access to Implicit Information -- 6.9.6.4 Enable the User to Control the Privacy Settings -- 6.9.6.5 Privacy-Aware Identification -- 6.9.7 Design Choices Addressing Availability and Resilience -- 6.9.7.1 Use High Availability Clustering -- 6.9.7.2 Load Balancing -- Logging Transactions -- Design for Failure -- Allowing Component Replication -- Relaxing Transactional Consistency -- Backup and Disaster Recovery Strategy -- 6.9.8 Design Choices Conclusion -- Chapter 7: IoT Reference Model -- 7.1 Introduction -- 7.2 Interaction of All Sub-Models -- 7.3 Domain Model -- 7.3.1 Definition and Purpose -- 7.3.2 Main Abstractions and Relationships -- 7.3.2.1 Interpreting the Model Diagram -- 7.3.2.2 The Concepts of the IoT Domain Model -- 7.3.3 Detailed Explanations and Related Concepts -- 7.3.3.1 Devices and Device Capabilities -- 7.3.3.2 Resources -- 7.3.3.3 Services -- 7.3.3.4 Identification of Physical Entities -- 7.3.3.5 Context and Location -- 7.4 Information Model -- 7.4.1 Definition of the IoT Information Model -- 7.4.2 Modelling of Example Scenario -- 7.4.3 Relation of Information Model to Domain Model -- 7.4.4 Other Information-Related Models in IoT-A -- 7.5 Functional Model -- 7.5.1 Functional Decomposition -- 7.5.2 Functional Model Diagram -- 7.5.2.1 IoT Process Management -- 7.5.2.2 Service Organisation -- 7.5.2.3 Virtual Entity and IoT Service -- Virtual Entity -- IoT Service -- 7.5.2.4 Communication -- 7.5.2.5 Management -- 7.5.2.6 Security -- 7.6 Communication Model -- 7.6.1 IoT Domain Model Element Communications -- 7.6.1.1 User-Service / Service-Service Interactions -- 7.6.1.2 Service / Resource / Device Interactions -- 7.6.2 Communication Interoperability Aspects -- 7.6.3 Composed Modelling Options -- 7.6.3.1 Gateway Configuration -- 7.6.3.2 Virtual Configuration.
7.6.4 Channel Model for IoT Communication -- 7.7 Trust, Security, Privacy -- 7.7.1 Trust -- 7.7.2 Security -- 7.7.2.1 Communication Security -- 7.7.2.2 Application Security: System Safety and Reliability -- 7.7.3 Privacy -- 7.7.4 Contradictory Aspects in IoT-A Security -- 7.8 Conclusion -- Chapter 8: IoT Reference Architecture -- 8.1 Short Definition of Architectural Views and Perspectives -- 8.2 Architectural Views -- 8.2.1 Usage of Views and Perspectives in the IoT Reference Architecture -- 8.2.2 Functional View -- 8.2.2.1 Devising the Functional View -- 8.2.2.2 IoT Process Management -- 8.2.2.3 Service Organisation -- 8.2.2.4 Virtual Entity -- 8.2.2.5 IoT Service -- 8.2.2.6 Communication -- 8.2.2.7 Security -- 8.2.2.8 Management -- 8.2.2.9 Mapping of Functional View to the Red Thread Example -- 8.2.3 Information View -- 8.2.3.1 Information Description -- Description of Virtual Entities -- Viewpoint for Modelling entityType Hierarchies -- Service Descriptions -- Associations Between Virtual Entities and Services -- 8.2.3.2 Information Handling -- 8.2.3.3 Information Handling by Functional Components -- General Information Flow Concepts -- Push -- Subscribe/Notify -- Publish/Subscribe -- Information Flow Through Functional Components -- User Requests Information from IoT Service -- User Gets Information from Virtual Entity-Level Service -- Service Gets Sensor Value from Device -- Sensor Information Storage -- IoT Service Resolution -- VE Resolution -- 8.2.3.4 Information Life Cycle -- 8.2.4 Deployment and Operation View -- 8.2.4.1 Deployment Example -- 8.3 Perspectives -- 8.3.1 Evolution and Interoperability -- 8.3.2 Performance and Scalability -- 8.3.3 Trust, Security and Privacy -- 8.3.3.1 Trust -- 8.3.3.2 Security -- 8.3.3.3 Privacy -- 8.3.4 Availability and Resilience -- 8.4 Conclusion -- Chapter 9: The IoT ARM Reference Manual.
9.1 Usage of the IoT Domain Model -- 9.1.1 Identification of Main Concept Instances -- 9.1.2 Modelling of Non-IoT-Specific Aspects -- 9.1.3 Identifiers and Addresses -- 9.1.4 Granularity of Concepts -- 9.1.5 Common Patterns -- 9.1.5.1 Augmented Entities -- 9.1.5.2 Multiple Virtual Entities -- 9.1.5.3 Smart Phones and Other Mobile User Devices -- 9.1.5.4 IoT Interactions -- 9.1.5.5 Simple Mediated Interactions -- 9.1.5.6 M2M Interaction -- 9.1.6 Examples for IoT Domain Model Concepts -- 9.1.6.1 User -- Application -- Human User -- 9.1.6.2 Physical Entity -- Environment -- Living Being -- Structural Asset -- 9.1.6.3 Resource -- On-Device Resource -- Network Resource -- 9.1.6.4 Service -- Interacting Services -- Service Associated with a Virtual Entity -- Service Accessing a Resource -- 9.1.6.5 Device -- Devices -- Hierarchical Devices -- 9.1.6.6 Deployment Configurations -- 9.1.7 Generating a Specific IoT Domain Model -- 9.2 Usage of the IoT Information Model -- 9.3 Usage of the IoT Communication Model -- 9.3.1 Guidelines for Using the IoT Communication Model -- 9.4 Usage of Perspectives -- Chapter 10: Interactions -- 10.1 Management-Centric Scenarios -- 10.1.1 Configuration of the System When Adding a Device -- 10.1.2 Changing the Device Configuration -- 10.2 Service-Centred Scenarios -- 10.2.1 Discovering Relevant Services Using IoT Service Resolution and VE Resolution -- 10.2.2 Managing Service Choreography -- Chapter 11: Toward a Concrete Architecture -- 11.1 Objective and Scope -- 11.2 Physical Entity View and IoT Context View -- 11.2.1 Physical Entity View -- 11.2.2 IoT Context View -- 11.2.2.1 Business Goals Revisited -- Pay-and-Display Machines (PDM) -- Today: Parking Ticket Identification -- Enhancement: Pay-by-License Plate -- Control Center -- Today: PDMs Monitoring Centre -- Enhancement: Connection to Web, and to the Registry Office.
Registry Office.
This volume presents the results of a flagship European Commission project to map the conceptual reference model for the Internet of Things. It sets out an agreed IoT architecture of maximal interoperability, ready for use in real-world network development.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Bauer, Martin.
Fiedler, Martin.
Kramp, Thorsten.
van Kranenburg, Rob.
Lange, Sebastian.
Meissner, Stefan.
Print version: Bassi, Alessandro Enabling Things to Talk Berlin, Heidelberg : Springer Berlin / Heidelberg,c2013 9783642404023
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422783 Click to View
language English
format eBook
author Bassi, Alessandro.
spellingShingle Bassi, Alessandro.
Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
Intro -- Foreword -- Acknowledgements -- Contents -- Chapter 1: Introduction to the Internet of Things -- Part I: General Concepts of the Architecture Reference Model (ARM) -- Chapter 2: The Need for a Common Ground for the IoT: The History and Reasoning Behind the IoT-A Project -- Chapter 3: The IoT Architectural Reference Model as Enabler -- 3.1 Using the IoT ARM -- 3.1.1 Cognitive Aid -- 3.1.2 Reference Model as a Common Ground -- 3.1.3 Generating Architectures -- 3.1.4 Identifying Differences in Derived Architectures -- 3.1.5 Achieving Interoperability -- 3.1.6 System Roadmaps and Product Life Cycles -- 3.1.7 Benchmarking -- 3.2 Architecture Development Process Based on the IoT ARM -- 3.2.1 Reference Model and Reference Architecture -- 3.2.2 Generating Architectures -- 3.2.3 Choice of Design and Development Methodology -- Chapter 4: IoT in Practice: Examples: IoT in Logistics and Health -- 4.1 Storyline of the IoT-A Use Case ``IoT in Retail and Logistics ́́-- 4.2 Introducing the ARM with a Recurring Example (Logistics) -- 4.3 Use of the ARM in the Scene ``Sensor-Based Quality Control ́́(Retail) -- 4.4 Storyline of the IoT-A Use Case ``IoT in Health and Home ́́-- 4.5 Use of the ARM in the Scene ``Remote Patient Notification ́́(Homecare) -- 4.6 Reverse Mapping of the ARM in the Scene ``In-Surgery Tracking of RFID-Tagged Stomach Towels ́́(Hospital) -- Part II: A Guidance to the Architecture Reference Model (ARM) -- Chapter 5: Guidance to the ARM: Overview -- 5.1 Chapter Structure -- 5.1.1 Chapter 6 ``A Process for Generating Concrete Architectures Process ́́-- 5.1.2 Chapter 7 ``IoT Reference Model ́́-- 5.1.3 Chapter 8 ``IoT Reference Architecture ́́-- 5.1.4 Chapter 9 ``Reference Manual ́́-- 5.1.5 Chapter 10 ``Concrete Architecture ́́-- 5.1.6 Chapter 11 ``Interactions ́́-- 5.1.7 Chapter 12 ``Testimonials ́́-- 5.2 ARM History and Evolution.
Chapter 6: A Process for Generating Concrete Architectures -- 6.1 Process Steps to Generate IoT Architectures -- 6.2 Compatibility with Other Architecting Methodologies -- 6.3 IoT Architecture Generation and Related Activities -- 6.3.1 Physical Entity View -- 6.3.2 IoT Context View -- 6.4 Requirements Process and ``Other Views ́́-- 6.4.1 Requirements Process -- 6.4.2 View Derivation -- 6.5 IoT ARM Contributions to the Generation of Architectures -- 6.6 Minimum Set of Functionality Groups -- 6.7 Usage of Unified Requirements -- 6.7.1 Introduction -- 6.7.2 Using Unified Requirements -- 6.7.2.1 Requirement Elicitation -- 6.7.2.2 System Specification -- 6.8 Threat Analysis -- 6.8.1 Elements to Protect -- 6.8.2 Risk Sources -- 6.8.3 Risk Assessment -- 6.8.4 Discussion -- 6.9 Design Choices -- 6.9.1 Introduction -- 6.9.2 Design Choices Addressing Evolution and Interoperability -- 6.9.3 Design Choices Addressing Performance and Scalability -- 6.9.3.1 Replication -- 6.9.3.2 Prioritize Processing -- 6.9.3.3 Partition and Parallelize -- 6.9.3.4 Reduce Computational Complexity -- 6.9.3.5 Distribute Processing Over Time -- 6.9.3.6 Minimize Used of Shared Resources -- 6.9.3.7 Reuse Resources and Results -- 6.9.3.8 Scale Up or Scale Out -- 6.9.3.9 Degrade Gracefully -- 6.9.3.10 Use Asynchronous Processing -- 6.9.4 Design Choices Addressing Trust -- 6.9.4.1 Harden Root of Trust -- 6.9.4.2 Ensure High Quality of Data -- 6.9.4.3 Infrastructural Trust and Reputation Agents -- 6.9.4.4 Provide High System Integrity -- 6.9.4.5 Avoid Leap of Faith -- 6.9.5 Design Choices Addressing Security -- 6.9.5.1 Subject Authentication -- 6.9.5.2 Use Access Policies -- 6.9.5.3 Secure Communication Infrastructure -- 6.9.5.4 Secure Peripheral Networks (Link Layer Security, Secure Routing) -- 6.9.6 Design Choices Addressing Privacy -- 6.9.6.1 Pseudonymisation.
6.9.6.2 Avoid Transmitting Identifiers in Clear -- 6.9.6.3 Minimize Unauthorized Access to Implicit Information -- 6.9.6.4 Enable the User to Control the Privacy Settings -- 6.9.6.5 Privacy-Aware Identification -- 6.9.7 Design Choices Addressing Availability and Resilience -- 6.9.7.1 Use High Availability Clustering -- 6.9.7.2 Load Balancing -- Logging Transactions -- Design for Failure -- Allowing Component Replication -- Relaxing Transactional Consistency -- Backup and Disaster Recovery Strategy -- 6.9.8 Design Choices Conclusion -- Chapter 7: IoT Reference Model -- 7.1 Introduction -- 7.2 Interaction of All Sub-Models -- 7.3 Domain Model -- 7.3.1 Definition and Purpose -- 7.3.2 Main Abstractions and Relationships -- 7.3.2.1 Interpreting the Model Diagram -- 7.3.2.2 The Concepts of the IoT Domain Model -- 7.3.3 Detailed Explanations and Related Concepts -- 7.3.3.1 Devices and Device Capabilities -- 7.3.3.2 Resources -- 7.3.3.3 Services -- 7.3.3.4 Identification of Physical Entities -- 7.3.3.5 Context and Location -- 7.4 Information Model -- 7.4.1 Definition of the IoT Information Model -- 7.4.2 Modelling of Example Scenario -- 7.4.3 Relation of Information Model to Domain Model -- 7.4.4 Other Information-Related Models in IoT-A -- 7.5 Functional Model -- 7.5.1 Functional Decomposition -- 7.5.2 Functional Model Diagram -- 7.5.2.1 IoT Process Management -- 7.5.2.2 Service Organisation -- 7.5.2.3 Virtual Entity and IoT Service -- Virtual Entity -- IoT Service -- 7.5.2.4 Communication -- 7.5.2.5 Management -- 7.5.2.6 Security -- 7.6 Communication Model -- 7.6.1 IoT Domain Model Element Communications -- 7.6.1.1 User-Service / Service-Service Interactions -- 7.6.1.2 Service / Resource / Device Interactions -- 7.6.2 Communication Interoperability Aspects -- 7.6.3 Composed Modelling Options -- 7.6.3.1 Gateway Configuration -- 7.6.3.2 Virtual Configuration.
7.6.4 Channel Model for IoT Communication -- 7.7 Trust, Security, Privacy -- 7.7.1 Trust -- 7.7.2 Security -- 7.7.2.1 Communication Security -- 7.7.2.2 Application Security: System Safety and Reliability -- 7.7.3 Privacy -- 7.7.4 Contradictory Aspects in IoT-A Security -- 7.8 Conclusion -- Chapter 8: IoT Reference Architecture -- 8.1 Short Definition of Architectural Views and Perspectives -- 8.2 Architectural Views -- 8.2.1 Usage of Views and Perspectives in the IoT Reference Architecture -- 8.2.2 Functional View -- 8.2.2.1 Devising the Functional View -- 8.2.2.2 IoT Process Management -- 8.2.2.3 Service Organisation -- 8.2.2.4 Virtual Entity -- 8.2.2.5 IoT Service -- 8.2.2.6 Communication -- 8.2.2.7 Security -- 8.2.2.8 Management -- 8.2.2.9 Mapping of Functional View to the Red Thread Example -- 8.2.3 Information View -- 8.2.3.1 Information Description -- Description of Virtual Entities -- Viewpoint for Modelling entityType Hierarchies -- Service Descriptions -- Associations Between Virtual Entities and Services -- 8.2.3.2 Information Handling -- 8.2.3.3 Information Handling by Functional Components -- General Information Flow Concepts -- Push -- Subscribe/Notify -- Publish/Subscribe -- Information Flow Through Functional Components -- User Requests Information from IoT Service -- User Gets Information from Virtual Entity-Level Service -- Service Gets Sensor Value from Device -- Sensor Information Storage -- IoT Service Resolution -- VE Resolution -- 8.2.3.4 Information Life Cycle -- 8.2.4 Deployment and Operation View -- 8.2.4.1 Deployment Example -- 8.3 Perspectives -- 8.3.1 Evolution and Interoperability -- 8.3.2 Performance and Scalability -- 8.3.3 Trust, Security and Privacy -- 8.3.3.1 Trust -- 8.3.3.2 Security -- 8.3.3.3 Privacy -- 8.3.4 Availability and Resilience -- 8.4 Conclusion -- Chapter 9: The IoT ARM Reference Manual.
9.1 Usage of the IoT Domain Model -- 9.1.1 Identification of Main Concept Instances -- 9.1.2 Modelling of Non-IoT-Specific Aspects -- 9.1.3 Identifiers and Addresses -- 9.1.4 Granularity of Concepts -- 9.1.5 Common Patterns -- 9.1.5.1 Augmented Entities -- 9.1.5.2 Multiple Virtual Entities -- 9.1.5.3 Smart Phones and Other Mobile User Devices -- 9.1.5.4 IoT Interactions -- 9.1.5.5 Simple Mediated Interactions -- 9.1.5.6 M2M Interaction -- 9.1.6 Examples for IoT Domain Model Concepts -- 9.1.6.1 User -- Application -- Human User -- 9.1.6.2 Physical Entity -- Environment -- Living Being -- Structural Asset -- 9.1.6.3 Resource -- On-Device Resource -- Network Resource -- 9.1.6.4 Service -- Interacting Services -- Service Associated with a Virtual Entity -- Service Accessing a Resource -- 9.1.6.5 Device -- Devices -- Hierarchical Devices -- 9.1.6.6 Deployment Configurations -- 9.1.7 Generating a Specific IoT Domain Model -- 9.2 Usage of the IoT Information Model -- 9.3 Usage of the IoT Communication Model -- 9.3.1 Guidelines for Using the IoT Communication Model -- 9.4 Usage of Perspectives -- Chapter 10: Interactions -- 10.1 Management-Centric Scenarios -- 10.1.1 Configuration of the System When Adding a Device -- 10.1.2 Changing the Device Configuration -- 10.2 Service-Centred Scenarios -- 10.2.1 Discovering Relevant Services Using IoT Service Resolution and VE Resolution -- 10.2.2 Managing Service Choreography -- Chapter 11: Toward a Concrete Architecture -- 11.1 Objective and Scope -- 11.2 Physical Entity View and IoT Context View -- 11.2.1 Physical Entity View -- 11.2.2 IoT Context View -- 11.2.2.1 Business Goals Revisited -- Pay-and-Display Machines (PDM) -- Today: Parking Ticket Identification -- Enhancement: Pay-by-License Plate -- Control Center -- Today: PDMs Monitoring Centre -- Enhancement: Connection to Web, and to the Registry Office.
Registry Office.
author_facet Bassi, Alessandro.
Bauer, Martin.
Fiedler, Martin.
Kramp, Thorsten.
van Kranenburg, Rob.
Lange, Sebastian.
Meissner, Stefan.
author_variant a b ab
author2 Bauer, Martin.
Fiedler, Martin.
Kramp, Thorsten.
van Kranenburg, Rob.
Lange, Sebastian.
Meissner, Stefan.
author2_variant m b mb
m f mf
t k tk
k r v kr krv
s l sl
s m sm
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Bassi, Alessandro.
title Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
title_sub Designing IoT Solutions with the IoT Architectural Reference Model.
title_full Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
title_fullStr Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
title_full_unstemmed Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
title_auth Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
title_new Enabling Things to Talk :
title_sort enabling things to talk : designing iot solutions with the iot architectural reference model.
publisher Springer Berlin / Heidelberg,
publishDate 2013
physical 1 online resource (352 pages)
edition 1st ed.
contents Intro -- Foreword -- Acknowledgements -- Contents -- Chapter 1: Introduction to the Internet of Things -- Part I: General Concepts of the Architecture Reference Model (ARM) -- Chapter 2: The Need for a Common Ground for the IoT: The History and Reasoning Behind the IoT-A Project -- Chapter 3: The IoT Architectural Reference Model as Enabler -- 3.1 Using the IoT ARM -- 3.1.1 Cognitive Aid -- 3.1.2 Reference Model as a Common Ground -- 3.1.3 Generating Architectures -- 3.1.4 Identifying Differences in Derived Architectures -- 3.1.5 Achieving Interoperability -- 3.1.6 System Roadmaps and Product Life Cycles -- 3.1.7 Benchmarking -- 3.2 Architecture Development Process Based on the IoT ARM -- 3.2.1 Reference Model and Reference Architecture -- 3.2.2 Generating Architectures -- 3.2.3 Choice of Design and Development Methodology -- Chapter 4: IoT in Practice: Examples: IoT in Logistics and Health -- 4.1 Storyline of the IoT-A Use Case ``IoT in Retail and Logistics ́́-- 4.2 Introducing the ARM with a Recurring Example (Logistics) -- 4.3 Use of the ARM in the Scene ``Sensor-Based Quality Control ́́(Retail) -- 4.4 Storyline of the IoT-A Use Case ``IoT in Health and Home ́́-- 4.5 Use of the ARM in the Scene ``Remote Patient Notification ́́(Homecare) -- 4.6 Reverse Mapping of the ARM in the Scene ``In-Surgery Tracking of RFID-Tagged Stomach Towels ́́(Hospital) -- Part II: A Guidance to the Architecture Reference Model (ARM) -- Chapter 5: Guidance to the ARM: Overview -- 5.1 Chapter Structure -- 5.1.1 Chapter 6 ``A Process for Generating Concrete Architectures Process ́́-- 5.1.2 Chapter 7 ``IoT Reference Model ́́-- 5.1.3 Chapter 8 ``IoT Reference Architecture ́́-- 5.1.4 Chapter 9 ``Reference Manual ́́-- 5.1.5 Chapter 10 ``Concrete Architecture ́́-- 5.1.6 Chapter 11 ``Interactions ́́-- 5.1.7 Chapter 12 ``Testimonials ́́-- 5.2 ARM History and Evolution.
Chapter 6: A Process for Generating Concrete Architectures -- 6.1 Process Steps to Generate IoT Architectures -- 6.2 Compatibility with Other Architecting Methodologies -- 6.3 IoT Architecture Generation and Related Activities -- 6.3.1 Physical Entity View -- 6.3.2 IoT Context View -- 6.4 Requirements Process and ``Other Views ́́-- 6.4.1 Requirements Process -- 6.4.2 View Derivation -- 6.5 IoT ARM Contributions to the Generation of Architectures -- 6.6 Minimum Set of Functionality Groups -- 6.7 Usage of Unified Requirements -- 6.7.1 Introduction -- 6.7.2 Using Unified Requirements -- 6.7.2.1 Requirement Elicitation -- 6.7.2.2 System Specification -- 6.8 Threat Analysis -- 6.8.1 Elements to Protect -- 6.8.2 Risk Sources -- 6.8.3 Risk Assessment -- 6.8.4 Discussion -- 6.9 Design Choices -- 6.9.1 Introduction -- 6.9.2 Design Choices Addressing Evolution and Interoperability -- 6.9.3 Design Choices Addressing Performance and Scalability -- 6.9.3.1 Replication -- 6.9.3.2 Prioritize Processing -- 6.9.3.3 Partition and Parallelize -- 6.9.3.4 Reduce Computational Complexity -- 6.9.3.5 Distribute Processing Over Time -- 6.9.3.6 Minimize Used of Shared Resources -- 6.9.3.7 Reuse Resources and Results -- 6.9.3.8 Scale Up or Scale Out -- 6.9.3.9 Degrade Gracefully -- 6.9.3.10 Use Asynchronous Processing -- 6.9.4 Design Choices Addressing Trust -- 6.9.4.1 Harden Root of Trust -- 6.9.4.2 Ensure High Quality of Data -- 6.9.4.3 Infrastructural Trust and Reputation Agents -- 6.9.4.4 Provide High System Integrity -- 6.9.4.5 Avoid Leap of Faith -- 6.9.5 Design Choices Addressing Security -- 6.9.5.1 Subject Authentication -- 6.9.5.2 Use Access Policies -- 6.9.5.3 Secure Communication Infrastructure -- 6.9.5.4 Secure Peripheral Networks (Link Layer Security, Secure Routing) -- 6.9.6 Design Choices Addressing Privacy -- 6.9.6.1 Pseudonymisation.
6.9.6.2 Avoid Transmitting Identifiers in Clear -- 6.9.6.3 Minimize Unauthorized Access to Implicit Information -- 6.9.6.4 Enable the User to Control the Privacy Settings -- 6.9.6.5 Privacy-Aware Identification -- 6.9.7 Design Choices Addressing Availability and Resilience -- 6.9.7.1 Use High Availability Clustering -- 6.9.7.2 Load Balancing -- Logging Transactions -- Design for Failure -- Allowing Component Replication -- Relaxing Transactional Consistency -- Backup and Disaster Recovery Strategy -- 6.9.8 Design Choices Conclusion -- Chapter 7: IoT Reference Model -- 7.1 Introduction -- 7.2 Interaction of All Sub-Models -- 7.3 Domain Model -- 7.3.1 Definition and Purpose -- 7.3.2 Main Abstractions and Relationships -- 7.3.2.1 Interpreting the Model Diagram -- 7.3.2.2 The Concepts of the IoT Domain Model -- 7.3.3 Detailed Explanations and Related Concepts -- 7.3.3.1 Devices and Device Capabilities -- 7.3.3.2 Resources -- 7.3.3.3 Services -- 7.3.3.4 Identification of Physical Entities -- 7.3.3.5 Context and Location -- 7.4 Information Model -- 7.4.1 Definition of the IoT Information Model -- 7.4.2 Modelling of Example Scenario -- 7.4.3 Relation of Information Model to Domain Model -- 7.4.4 Other Information-Related Models in IoT-A -- 7.5 Functional Model -- 7.5.1 Functional Decomposition -- 7.5.2 Functional Model Diagram -- 7.5.2.1 IoT Process Management -- 7.5.2.2 Service Organisation -- 7.5.2.3 Virtual Entity and IoT Service -- Virtual Entity -- IoT Service -- 7.5.2.4 Communication -- 7.5.2.5 Management -- 7.5.2.6 Security -- 7.6 Communication Model -- 7.6.1 IoT Domain Model Element Communications -- 7.6.1.1 User-Service / Service-Service Interactions -- 7.6.1.2 Service / Resource / Device Interactions -- 7.6.2 Communication Interoperability Aspects -- 7.6.3 Composed Modelling Options -- 7.6.3.1 Gateway Configuration -- 7.6.3.2 Virtual Configuration.
7.6.4 Channel Model for IoT Communication -- 7.7 Trust, Security, Privacy -- 7.7.1 Trust -- 7.7.2 Security -- 7.7.2.1 Communication Security -- 7.7.2.2 Application Security: System Safety and Reliability -- 7.7.3 Privacy -- 7.7.4 Contradictory Aspects in IoT-A Security -- 7.8 Conclusion -- Chapter 8: IoT Reference Architecture -- 8.1 Short Definition of Architectural Views and Perspectives -- 8.2 Architectural Views -- 8.2.1 Usage of Views and Perspectives in the IoT Reference Architecture -- 8.2.2 Functional View -- 8.2.2.1 Devising the Functional View -- 8.2.2.2 IoT Process Management -- 8.2.2.3 Service Organisation -- 8.2.2.4 Virtual Entity -- 8.2.2.5 IoT Service -- 8.2.2.6 Communication -- 8.2.2.7 Security -- 8.2.2.8 Management -- 8.2.2.9 Mapping of Functional View to the Red Thread Example -- 8.2.3 Information View -- 8.2.3.1 Information Description -- Description of Virtual Entities -- Viewpoint for Modelling entityType Hierarchies -- Service Descriptions -- Associations Between Virtual Entities and Services -- 8.2.3.2 Information Handling -- 8.2.3.3 Information Handling by Functional Components -- General Information Flow Concepts -- Push -- Subscribe/Notify -- Publish/Subscribe -- Information Flow Through Functional Components -- User Requests Information from IoT Service -- User Gets Information from Virtual Entity-Level Service -- Service Gets Sensor Value from Device -- Sensor Information Storage -- IoT Service Resolution -- VE Resolution -- 8.2.3.4 Information Life Cycle -- 8.2.4 Deployment and Operation View -- 8.2.4.1 Deployment Example -- 8.3 Perspectives -- 8.3.1 Evolution and Interoperability -- 8.3.2 Performance and Scalability -- 8.3.3 Trust, Security and Privacy -- 8.3.3.1 Trust -- 8.3.3.2 Security -- 8.3.3.3 Privacy -- 8.3.4 Availability and Resilience -- 8.4 Conclusion -- Chapter 9: The IoT ARM Reference Manual.
9.1 Usage of the IoT Domain Model -- 9.1.1 Identification of Main Concept Instances -- 9.1.2 Modelling of Non-IoT-Specific Aspects -- 9.1.3 Identifiers and Addresses -- 9.1.4 Granularity of Concepts -- 9.1.5 Common Patterns -- 9.1.5.1 Augmented Entities -- 9.1.5.2 Multiple Virtual Entities -- 9.1.5.3 Smart Phones and Other Mobile User Devices -- 9.1.5.4 IoT Interactions -- 9.1.5.5 Simple Mediated Interactions -- 9.1.5.6 M2M Interaction -- 9.1.6 Examples for IoT Domain Model Concepts -- 9.1.6.1 User -- Application -- Human User -- 9.1.6.2 Physical Entity -- Environment -- Living Being -- Structural Asset -- 9.1.6.3 Resource -- On-Device Resource -- Network Resource -- 9.1.6.4 Service -- Interacting Services -- Service Associated with a Virtual Entity -- Service Accessing a Resource -- 9.1.6.5 Device -- Devices -- Hierarchical Devices -- 9.1.6.6 Deployment Configurations -- 9.1.7 Generating a Specific IoT Domain Model -- 9.2 Usage of the IoT Information Model -- 9.3 Usage of the IoT Communication Model -- 9.3.1 Guidelines for Using the IoT Communication Model -- 9.4 Usage of Perspectives -- Chapter 10: Interactions -- 10.1 Management-Centric Scenarios -- 10.1.1 Configuration of the System When Adding a Device -- 10.1.2 Changing the Device Configuration -- 10.2 Service-Centred Scenarios -- 10.2.1 Discovering Relevant Services Using IoT Service Resolution and VE Resolution -- 10.2.2 Managing Service Choreography -- Chapter 11: Toward a Concrete Architecture -- 11.1 Objective and Scope -- 11.2 Physical Entity View and IoT Context View -- 11.2.1 Physical Entity View -- 11.2.2 IoT Context View -- 11.2.2.1 Business Goals Revisited -- Pay-and-Display Machines (PDM) -- Today: Parking Ticket Identification -- Enhancement: Pay-by-License Plate -- Control Center -- Today: PDMs Monitoring Centre -- Enhancement: Connection to Web, and to the Registry Office.
Registry Office.
isbn 9783642404030
9783642404023
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.76 A65
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422783
illustrated Not Illustrated
oclc_num 1231606599
work_keys_str_mv AT bassialessandro enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT bauermartin enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT fiedlermartin enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT krampthorsten enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT vankranenburgrob enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT langesebastian enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
AT meissnerstefan enablingthingstotalkdesigningiotsolutionswiththeiotarchitecturalreferencemodel
status_str n
ids_txt_mv (MiAaPQ)5006422783
(Au-PeEL)EBL6422783
(OCoLC)1231606599
carrierType_str_mv cr
is_hierarchy_title Enabling Things to Talk : Designing IoT Solutions with the IoT Architectural Reference Model.
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
marc_error Info : To few letters in translations, choosing MARC8 --- [ 856 : z ]
_version_ 1792331059290963969
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11448nam a22005173i 4500</leader><controlfield tag="001">5006422783</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073838.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2013 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642404030</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783642404023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006422783</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6422783</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1231606599</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.A65</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bassi, Alessandro.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enabling Things to Talk :</subfield><subfield code="b">Designing IoT Solutions with the IoT Architectural Reference Model.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg :</subfield><subfield code="b">Springer Berlin / Heidelberg,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (352 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword -- Acknowledgements -- Contents -- Chapter 1: Introduction to the Internet of Things -- Part I: General Concepts of the Architecture Reference Model (ARM) -- Chapter 2: The Need for a Common Ground for the IoT: The History and Reasoning Behind the IoT-A Project -- Chapter 3: The IoT Architectural Reference Model as Enabler -- 3.1 Using the IoT ARM -- 3.1.1 Cognitive Aid -- 3.1.2 Reference Model as a Common Ground -- 3.1.3 Generating Architectures -- 3.1.4 Identifying Differences in Derived Architectures -- 3.1.5 Achieving Interoperability -- 3.1.6 System Roadmaps and Product Life Cycles -- 3.1.7 Benchmarking -- 3.2 Architecture Development Process Based on the IoT ARM -- 3.2.1 Reference Model and Reference Architecture -- 3.2.2 Generating Architectures -- 3.2.3 Choice of Design and Development Methodology -- Chapter 4: IoT in Practice: Examples: IoT in Logistics and Health -- 4.1 Storyline of the IoT-A Use Case ``IoT in Retail and Logistics ́́-- 4.2 Introducing the ARM with a Recurring Example (Logistics) -- 4.3 Use of the ARM in the Scene ``Sensor-Based Quality Control ́́(Retail) -- 4.4 Storyline of the IoT-A Use Case ``IoT in Health and Home ́́-- 4.5 Use of the ARM in the Scene ``Remote Patient Notification ́́(Homecare) -- 4.6 Reverse Mapping of the ARM in the Scene ``In-Surgery Tracking of RFID-Tagged Stomach Towels ́́(Hospital) -- Part II: A Guidance to the Architecture Reference Model (ARM) -- Chapter 5: Guidance to the ARM: Overview -- 5.1 Chapter Structure -- 5.1.1 Chapter 6 ``A Process for Generating Concrete Architectures Process ́́-- 5.1.2 Chapter 7 ``IoT Reference Model ́́-- 5.1.3 Chapter 8 ``IoT Reference Architecture ́́-- 5.1.4 Chapter 9 ``Reference Manual ́́-- 5.1.5 Chapter 10 ``Concrete Architecture ́́-- 5.1.6 Chapter 11 ``Interactions ́́-- 5.1.7 Chapter 12 ``Testimonials ́́-- 5.2 ARM History and Evolution.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 6: A Process for Generating Concrete Architectures -- 6.1 Process Steps to Generate IoT Architectures -- 6.2 Compatibility with Other Architecting Methodologies -- 6.3 IoT Architecture Generation and Related Activities -- 6.3.1 Physical Entity View -- 6.3.2 IoT Context View -- 6.4 Requirements Process and ``Other Views ́́-- 6.4.1 Requirements Process -- 6.4.2 View Derivation -- 6.5 IoT ARM Contributions to the Generation of Architectures -- 6.6 Minimum Set of Functionality Groups -- 6.7 Usage of Unified Requirements -- 6.7.1 Introduction -- 6.7.2 Using Unified Requirements -- 6.7.2.1 Requirement Elicitation -- 6.7.2.2 System Specification -- 6.8 Threat Analysis -- 6.8.1 Elements to Protect -- 6.8.2 Risk Sources -- 6.8.3 Risk Assessment -- 6.8.4 Discussion -- 6.9 Design Choices -- 6.9.1 Introduction -- 6.9.2 Design Choices Addressing Evolution and Interoperability -- 6.9.3 Design Choices Addressing Performance and Scalability -- 6.9.3.1 Replication -- 6.9.3.2 Prioritize Processing -- 6.9.3.3 Partition and Parallelize -- 6.9.3.4 Reduce Computational Complexity -- 6.9.3.5 Distribute Processing Over Time -- 6.9.3.6 Minimize Used of Shared Resources -- 6.9.3.7 Reuse Resources and Results -- 6.9.3.8 Scale Up or Scale Out -- 6.9.3.9 Degrade Gracefully -- 6.9.3.10 Use Asynchronous Processing -- 6.9.4 Design Choices Addressing Trust -- 6.9.4.1 Harden Root of Trust -- 6.9.4.2 Ensure High Quality of Data -- 6.9.4.3 Infrastructural Trust and Reputation Agents -- 6.9.4.4 Provide High System Integrity -- 6.9.4.5 Avoid Leap of Faith -- 6.9.5 Design Choices Addressing Security -- 6.9.5.1 Subject Authentication -- 6.9.5.2 Use Access Policies -- 6.9.5.3 Secure Communication Infrastructure -- 6.9.5.4 Secure Peripheral Networks (Link Layer Security, Secure Routing) -- 6.9.6 Design Choices Addressing Privacy -- 6.9.6.1 Pseudonymisation.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.9.6.2 Avoid Transmitting Identifiers in Clear -- 6.9.6.3 Minimize Unauthorized Access to Implicit Information -- 6.9.6.4 Enable the User to Control the Privacy Settings -- 6.9.6.5 Privacy-Aware Identification -- 6.9.7 Design Choices Addressing Availability and Resilience -- 6.9.7.1 Use High Availability Clustering -- 6.9.7.2 Load Balancing -- Logging Transactions -- Design for Failure -- Allowing Component Replication -- Relaxing Transactional Consistency -- Backup and Disaster Recovery Strategy -- 6.9.8 Design Choices Conclusion -- Chapter 7: IoT Reference Model -- 7.1 Introduction -- 7.2 Interaction of All Sub-Models -- 7.3 Domain Model -- 7.3.1 Definition and Purpose -- 7.3.2 Main Abstractions and Relationships -- 7.3.2.1 Interpreting the Model Diagram -- 7.3.2.2 The Concepts of the IoT Domain Model -- 7.3.3 Detailed Explanations and Related Concepts -- 7.3.3.1 Devices and Device Capabilities -- 7.3.3.2 Resources -- 7.3.3.3 Services -- 7.3.3.4 Identification of Physical Entities -- 7.3.3.5 Context and Location -- 7.4 Information Model -- 7.4.1 Definition of the IoT Information Model -- 7.4.2 Modelling of Example Scenario -- 7.4.3 Relation of Information Model to Domain Model -- 7.4.4 Other Information-Related Models in IoT-A -- 7.5 Functional Model -- 7.5.1 Functional Decomposition -- 7.5.2 Functional Model Diagram -- 7.5.2.1 IoT Process Management -- 7.5.2.2 Service Organisation -- 7.5.2.3 Virtual Entity and IoT Service -- Virtual Entity -- IoT Service -- 7.5.2.4 Communication -- 7.5.2.5 Management -- 7.5.2.6 Security -- 7.6 Communication Model -- 7.6.1 IoT Domain Model Element Communications -- 7.6.1.1 User-Service / Service-Service Interactions -- 7.6.1.2 Service / Resource / Device Interactions -- 7.6.2 Communication Interoperability Aspects -- 7.6.3 Composed Modelling Options -- 7.6.3.1 Gateway Configuration -- 7.6.3.2 Virtual Configuration.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.6.4 Channel Model for IoT Communication -- 7.7 Trust, Security, Privacy -- 7.7.1 Trust -- 7.7.2 Security -- 7.7.2.1 Communication Security -- 7.7.2.2 Application Security: System Safety and Reliability -- 7.7.3 Privacy -- 7.7.4 Contradictory Aspects in IoT-A Security -- 7.8 Conclusion -- Chapter 8: IoT Reference Architecture -- 8.1 Short Definition of Architectural Views and Perspectives -- 8.2 Architectural Views -- 8.2.1 Usage of Views and Perspectives in the IoT Reference Architecture -- 8.2.2 Functional View -- 8.2.2.1 Devising the Functional View -- 8.2.2.2 IoT Process Management -- 8.2.2.3 Service Organisation -- 8.2.2.4 Virtual Entity -- 8.2.2.5 IoT Service -- 8.2.2.6 Communication -- 8.2.2.7 Security -- 8.2.2.8 Management -- 8.2.2.9 Mapping of Functional View to the Red Thread Example -- 8.2.3 Information View -- 8.2.3.1 Information Description -- Description of Virtual Entities -- Viewpoint for Modelling entityType Hierarchies -- Service Descriptions -- Associations Between Virtual Entities and Services -- 8.2.3.2 Information Handling -- 8.2.3.3 Information Handling by Functional Components -- General Information Flow Concepts -- Push -- Subscribe/Notify -- Publish/Subscribe -- Information Flow Through Functional Components -- User Requests Information from IoT Service -- User Gets Information from Virtual Entity-Level Service -- Service Gets Sensor Value from Device -- Sensor Information Storage -- IoT Service Resolution -- VE Resolution -- 8.2.3.4 Information Life Cycle -- 8.2.4 Deployment and Operation View -- 8.2.4.1 Deployment Example -- 8.3 Perspectives -- 8.3.1 Evolution and Interoperability -- 8.3.2 Performance and Scalability -- 8.3.3 Trust, Security and Privacy -- 8.3.3.1 Trust -- 8.3.3.2 Security -- 8.3.3.3 Privacy -- 8.3.4 Availability and Resilience -- 8.4 Conclusion -- Chapter 9: The IoT ARM Reference Manual.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">9.1 Usage of the IoT Domain Model -- 9.1.1 Identification of Main Concept Instances -- 9.1.2 Modelling of Non-IoT-Specific Aspects -- 9.1.3 Identifiers and Addresses -- 9.1.4 Granularity of Concepts -- 9.1.5 Common Patterns -- 9.1.5.1 Augmented Entities -- 9.1.5.2 Multiple Virtual Entities -- 9.1.5.3 Smart Phones and Other Mobile User Devices -- 9.1.5.4 IoT Interactions -- 9.1.5.5 Simple Mediated Interactions -- 9.1.5.6 M2M Interaction -- 9.1.6 Examples for IoT Domain Model Concepts -- 9.1.6.1 User -- Application -- Human User -- 9.1.6.2 Physical Entity -- Environment -- Living Being -- Structural Asset -- 9.1.6.3 Resource -- On-Device Resource -- Network Resource -- 9.1.6.4 Service -- Interacting Services -- Service Associated with a Virtual Entity -- Service Accessing a Resource -- 9.1.6.5 Device -- Devices -- Hierarchical Devices -- 9.1.6.6 Deployment Configurations -- 9.1.7 Generating a Specific IoT Domain Model -- 9.2 Usage of the IoT Information Model -- 9.3 Usage of the IoT Communication Model -- 9.3.1 Guidelines for Using the IoT Communication Model -- 9.4 Usage of Perspectives -- Chapter 10: Interactions -- 10.1 Management-Centric Scenarios -- 10.1.1 Configuration of the System When Adding a Device -- 10.1.2 Changing the Device Configuration -- 10.2 Service-Centred Scenarios -- 10.2.1 Discovering Relevant Services Using IoT Service Resolution and VE Resolution -- 10.2.2 Managing Service Choreography -- Chapter 11: Toward a Concrete Architecture -- 11.1 Objective and Scope -- 11.2 Physical Entity View and IoT Context View -- 11.2.1 Physical Entity View -- 11.2.2 IoT Context View -- 11.2.2.1 Business Goals Revisited -- Pay-and-Display Machines (PDM) -- Today: Parking Ticket Identification -- Enhancement: Pay-by-License Plate -- Control Center -- Today: PDMs Monitoring Centre -- Enhancement: Connection to Web, and to the Registry Office.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Registry Office.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This volume presents the results of a flagship European Commission project to map the conceptual reference model for the Internet of Things. It sets out an agreed IoT architecture of maximal interoperability, ready for use in real-world network development.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bauer, Martin.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fiedler, Martin.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kramp, Thorsten.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">van Kranenburg, Rob.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lange, Sebastian.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meissner, Stefan.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bassi, Alessandro</subfield><subfield code="t">Enabling Things to Talk</subfield><subfield code="d">Berlin, Heidelberg : Springer Berlin / Heidelberg,c2013</subfield><subfield code="z">9783642404023</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422783</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>