Iot Arch Overview
Iot Arch Overview
B.Tech CSE-603
Topic :
IoT-An Architectural
Overview (Arch & Design)
Amity School of Engineering & Technology
Contents
• Building An Architecture,
• Design Principles
<SELO:
1,9>
<Reference No.: 1> 2
Amity School of Engineering & Technology
BUILDING AN ARCHITECTURE
3. Problem to solution
BUILDING AN ARCHITECTURE
DESIGN PRINCIPLES
Main design principles and needed capabilities (design
objective and principles) main desired characteristics of an
M2M or IoT solution
<SELO:
1,9>
<Reference No.: 1> 5
Amity School of Engineering & Technology
DESIGN PRINCIPLES
1. Design for reuse of deployed IoT resources across application
domains.
2. Design for a set of support services that provide open service-
oriented capabilities and can be used for application
development and execution.
DESIGN PRINCIPLES
3. Design for sensing and actors taking on different roles of
providing and using services across different business
domains and value chains.
• technologies,
• data and service representation
• service : information and services, & aggregation of
information
4. Design for sensing and actors taking on different roles of
providing and using services across different business
domains and value chains.
• Needs to be provided is a set of mechanisms that ensure security and
trust
• Need to be authentication and authorization of access to use services
as well as to be able to provide services
• Requirement is the capability to be able to do auditing and to provide
accountability so that stakeholders
<SELO:
can enforce liability if the need
occurs 1,9>
<Reference No.: 1> 7
DESIGN PRINCIPLES
4. Design for ensuring trust, security, and privacy.
<SELO:
1,9>
<Reference No.: 1> 9
Amity School of Engineering & Technology
<SELO:
1,9>
<Reference No.: 1> 12
Amity School of Engineering & Technology
Security measures are usually required across all layers, for instance,
providing communication security and information security.
<SELO:
1,9>
<Reference No.: 1> 13
Amity School of Engineering & Technology
More advanced processing is, for instance, data mining and data
analytics that can be done in near real-time.
This functional group thus represents the vertical flow of data into
knowledge,
<SELO:
1,9>
<Reference No.: 1> 14
Amity School of Engineering & Technology
Reference Books:
<SELO:
1,9>
<Reference No.: 1> 16
Amity School of Engineering & Technology
Thank You