Shopping Cart

No products in the cart.

IEEE 2413-2019

$118.63

IEEE Standard for an Architectural Framework for the Internet of Things (IoT)

Published By Publication Date Number of Pages
IEEE 2019 269
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. An architecture framework description for the Internet of Things (IoT) which conforms to the international standard ISO/IEC/IEEE 42010:2011 is defined. The architecture framework description is motivated by concerns commonly shared by IoT system stakeholders across multiple domains (transportation, healthcare, Smart Grid, etc.). A conceptual basis for the notion of things in the IoT is provided and the shared concerns as a collection of architecture viewpoints is elaborated to form the body of the framework description.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 2413™-2019 Front cover
2 Title page
6.6.11.5.1 General
4 Important Notices and Disclaimers Concerning IEEE Standards Documents
8 Participants
10 Introduction
11 Contents
13 1. Overview
1.1 Scope
1.2 Purpose
14 1.3 Introduction to the Internet of Things (IoT)
17 1.4 Architecture method
18 2. Normative reference
3. Definitions, acronyms, and abbreviations
3.1 Definitions
23 3.2 Acronyms and abbreviations
26 4. IoT domains
4.1 Abstract IoT Domain
27 4.2 Smart Manufacturing
28 4.3 Smart Grid
29 4.4 Smart buildings
4.5 Intelligent Transport Systems
4.5.1 General
30 4.5.2 EVs as an element of the ITS domain
31 4.6 Smart Cities
4.6.1 General
35 4.6.2 Intelligent Operation Center as an element of a Smart Cities domain
36 4.7 Healthcare
37 5. Domain commonalities and common concerns
5.1 Stakeholders
5.2 Common concerns
41 6. Architecture framework
6.1 General information
42 6.2 Viewpoints and model kinds
45 6.3 Architecture development
6.4 Rationale for key decisions
6.5 Stakeholders and concerns
6.6 Viewpoint catalogue
6.6.1 Overview
6.6.2 Conceptual viewpoint
6.6.2.1 General information and key features
46 6.6.2.2 Stakeholders and concerns
6.6.2.3 Anti-concerns for this viewpoint
6.6.2.4 Model kinds
6.6.2.4.1 General
47 6.6.2.4.2 Entity model kind
6.6.2.4.2.1 Objective
6.6.2.4.2.2 Conventions
48 6.6.2.4.2.3 Correspondence rules
6.6.2.4.3 System model kind
6.6.2.4.3.1 Objective
6.6.2.4.3.2 Conventions
6.6.2.4.3.3 Operations
49 6.6.2.4.3.4 Correspondence rules
50 6.6.2.4.4 Intent model kind
6.6.2.4.4.1 Objective
6.6.2.4.4.2 Conventions
51 6.6.2.4.4.3 Operations
6.6.2.4.4.4 Correspondence rules
6.6.2.4.5 IoT component model kind
6.6.2.4.5.1 Objective
6.6.2.4.5.2 Conventions
53 6.6.2.4.6 IoT component capability model kind
6.6.2.4.6.1 Objective
6.6.2.4.6.2 Conventions
56 6.6.2.4.7 Representation model kind
6.6.2.4.7.1 Objective
57 6.6.2.4.7.2 Conventions
58 6.6.2.4.7.3 Correspondence rules
59 6.6.2.4.7.4 Notes
60 6.6.3 Compatibility viewpoint
6.6.3.1 General information and key features
6.6.3.2 Stakeholders and concerns
61 6.6.3.3 Model kind: compatibility level
6.6.3.3.1 Compatibility level conventions
6.6.3.3.1.1 General
6.6.3.3.1.2 Model kind languages or notations
6.6.3.3.1.3 Model kind meta-model
64 6.6.3.4 Operations on views
6.6.3.5 Correspondence rules
6.6.4 Lifecycle viewpoint
6.6.4.1 General information and key features
65 6.6.4.2 Stakeholders and concerns
6.6.4.3 Anti-concerns
6.6.4.4 Model kind: lifecycle sequence
6.6.4.4.1 General
66 6.6.4.4.2 Model kind languages or notations
6.6.4.4.3 Lifecycle sequence correspondence rules
6.6.4.5 Correspondence rules
67 6.6.5 Communication viewpoint
6.6.5.1 General information and key features
6.6.5.2 Stakeholders and concerns
6.6.5.2.1 Typical stakeholders
6.6.5.2.2 Concerns
70 6.6.5.2.3 Anti-concerns
6.6.5.3 The mathematics of communication model kind
6.6.5.3.1 General
6.6.5.3.2 The mathematics of communication model kind conventions
71 6.6.5.3.3 The mathematics of communication model kind languages or notations
6.6.5.3.4 The mathematics of communication model kind meta-model
6.6.5.3.5 The mathematics of communication model kind templates
6.6.5.3.6 The mathematics of communication model kind operations
72 6.6.5.3.7 The mathematics of communication model kind correspondence rules
6.6.5.4 OSI reference model kind
6.6.5.4.1 General
6.6.5.4.2 OSI reference model kind conventions
6.6.5.4.2.1 General
6.6.5.4.2.2 OSI reference model kind languages or notations
73 6.6.5.4.2.3 OSI reference model kind meta-model
6.6.5.4.2.4 OSI reference model kind templates
6.6.5.4.3 OSI reference model kind operations
74 6.6.5.4.4 OSI reference model kind correspondence rules
6.6.5.5 Operations on views
6.6.5.5.1 General
6.6.5.5.2 Data layer
6.6.5.5.2.1 Application-aware communication
75 6.6.5.5.2.2 Network-aware communication
76 6.6.5.5.2.3 Topologies and hierarchies for IoT
6.6.5.5.3 Information and knowledge layers
77 6.6.5.6 Correspondence rules
6.6.6 Information viewpoint
6.6.6.1 General information and key features
6.6.6.1.1 General
78 6.6.6.1.2 Information, knowledge, and wisdom
79 6.6.6.1.3 Semantic interoperability
80 6.6.6.1.4 Ontologies
6.6.6.2 Stakeholders and concerns
6.6.6.2.1 Typical stakeholders
81 6.6.6.2.2 Concerns
6.6.6.3 Model kinds
6.6.6.3.1 General
82 6.6.6.3.2 Data model kind
6.6.6.3.2.1 General
6.6.6.3.2.2 Data model conventions
6.6.6.3.2.3 Data model operations
83 6.6.6.3.2.4 Data model correspondence rules
6.6.6.3.3 Semantic model kind
6.6.6.3.3.1 General
6.6.6.3.3.2 Data model conventions
6.6.6.3.3.3 Data model operations
6.6.6.3.3.4 Data model correspondence rules
6.6.6.3.4 Information structure model kind
6.6.6.3.4.1 General
84 6.6.6.3.4.2 Data model conventions
6.6.6.3.4.3 Data model operations
6.6.6.3.4.4 Data model correspondence rules
6.6.6.3.5 Information flow model kind
6.6.6.3.5.1 General
6.6.6.3.5.2 Data model conventions
6.6.6.3.5.3 Data model operations
6.6.6.3.5.4 Data model correspondence rules
6.6.6.3.6 Information lifecycle model kind
85 6.6.6.3.6.1 Data model conventions
6.6.6.3.6.2 Data model operations
6.6.6.3.6.3 Data model correspondence rules
6.6.7 Function viewpoint
6.6.7.1 General information and key features
86 6.6.7.2 Stakeholder and concerns
6.6.7.2.1 Typical stakeholders
6.6.7.2.2 Concerns
6.6.7.3 Model kind: function
6.6.7.3.1 Function conventions
6.6.7.3.1.1 General
87 6.6.7.3.1.2 Model kind languages or notations
6.6.7.3.1.3 Model kind meta-model
88 6.6.7.3.2 FB type
90 6.6.7.3.3 FB execution
91 6.6.7.3.4 UML specification of the device model
92 6.6.7.3.5 Classification of the algorithms
93 6.6.7.3.6 Algorithm description
6.6.7.3.7 Input and output variables and parameter definition
94 6.6.7.3.8 Choice of variables and parameters
6.6.7.3.9 Mode, status, and diagnosis
95 6.6.7.3.10 Sensing channel
96 6.6.7.3.11 Actuation channel
6.6.7.3.12 Application
97 6.6.7.4 Operations on views
6.6.7.5 Correspondence rules
98 6.6.7.6 Notes
6.6.8 Threat model viewpoint
6.6.8.2 General information and key features
99 6.6.8.3 Stakeholders and concerns
6.6.8.3.1 Typical stakeholders
100 6.6.8.3.2 Concerns
101 6.6.8.4 Model kinds
6.6.8.4.1 General
102 6.6.8.4.2 Attack tree model kind
6.6.8.4.2.1 General
6.6.8.4.2.2 Attack tree model kind conventions
104 6.6.8.4.2.3 Attack tree model kind operations
105 6.6.8.4.2.4 Attack tree model kind correspondence rules
106 6.6.8.4.3 Typical threat list model kind
6.6.8.4.3.1 General
6.6.8.4.3.2 Typical threat list model kind operations
107 6.6.8.4.3.3 Typical threat list model kind correspondence rules
6.6.8.5 Operations on views
6.6.8.6 Correspondence rules
6.6.9 Security and safety monitoring viewpoint
6.6.9.1 General information and key features
108 6.6.9.2 Stakeholders and concerns
6.6.9.2.1 Typical stakeholders
6.6.9.2.2 Concerns
109 6.6.9.3 Monitoring system module model kind
6.6.9.3.1 General
110 6.6.9.3.2 Signature detection
6.6.9.3.2.1 General
111 6.6.9.3.2.2 Conventions
112 6.6.9.3.3 Anomaly detection
6.6.9.3.3.1 General
6.6.9.3.3.2 Conventions
113 6.6.9.4 Operations on views
6.6.9.4.1 General
6.6.9.4.2 Construction
6.6.9.4.2.1 General
6.6.9.4.2.2 Signature construction
114 6.6.9.4.2.3 Anomaly detection profile construction
6.6.9.4.3 Analysis
6.6.9.4.4 Implementation
116 6.6.9.5 Correspondence rules
117 6.6.10 Access control viewpoint
6.6.10.1 General
118 6.6.10.2 Overview
119 6.6.10.3 Concerns and stakeholders
6.6.10.3.1 Typical stakeholders
6.6.10.3.2 Concerns
120 6.6.10.4 Model kinds
6.6.10.4.1 Identification and authentication
121 6.6.10.4.2 Access control model
6.6.10.4.2.1 General
122 6.6.10.4.2.2 Discretionary access control
125 6.6.10.4.2.3 Role-based access control
128 6.6.10.4.2.4 Attribute-based access control
131 6.6.10.5 Operations on views
6.6.10.5.1 General
6.6.10.5.2 Construction
6.6.10.5.2.1 General
6.6.10.5.2.2 DAC model construction
6.6.10.5.2.3 RBAC model construction
132 6.6.10.5.2.4 ABAC model construction
6.6.10.5.3 Analysis
133 6.6.10.5.4 Implementation
6.6.10.5.4.1 Identification and authentication implementation: authentication protocols
134 6.6.10.5.4.2 Access control implementation
136 6.6.10.6 Correspondence rules
138 6.6.11.4.1 General
142 6.6.12 Privacy and trust viewpoint
6.6.12.1 General information and key features
6.6.12.1.1 General
143 6.6.12.1.2 Privacy by design
144 6.6.12.1.3 Privacy legislation
6.6.12.2 Stakeholders and concerns
6.6.12.2.1 Typical stakeholders
145 6.6.12.2.2 Concerns
147 6.6.12.2.3 Anti-concerns
6.6.12.3 Privacy design strategy model
148 6.6.12.4 Basic privacy terms, concepts, and models
6.6.12.4.1 General
6.6.12.4.2 Basic terminology, concepts, and models for privacy in communication scenarios
149 6.6.12.4.3 Basic terminology, concepts, and models for privacy in resource access scenarios
152 6.6.12.5 Trust models
6.6.12.5.1 General
6.6.12.5.2 Direct trust model
6.6.12.5.3 Indirect trust model
6.6.12.5.3.1 General
153 6.6.12.5.3.2 Hierarchical trust models
6.6.12.5.3.3 Web of trust
154 6.6.12.5.4 Trust elevation
6.6.12.5.5 Trust frameworks
155 6.6.13 Collaboration viewpoint
6.6.13.1 General information and key features
6.6.13.2 Stakeholders and concerns
6.6.13.2.1 General
156 6.6.13.2.2 Concerns
157 6.6.13.3 Model kind: Collaboration
6.6.13.3.1 Conventions
6.6.13.3.1.1 General
159 6.6.13.3.2 Collaboration operations
6.6.13.3.3 Collaboration correspondence rules
6.6.13.4 Correspondence rules
6.6.14 Computing resource viewpoint
6.6.14.1 General information and key features
160 6.6.14.2 Stakeholders and concerns
6.6.14.2.1 Typical stakeholders
6.6.14.2.2 Concerns
161 6.6.14.3 Computing resource model kinds
6.6.14.3.1 General
6.6.14.3.2 Computing components type model
162 6.6.14.3.3 Centralized computing resources model
6.6.14.3.4 Distributed computing resources model
163 6.6.14.4 Operations on views
6.6.14.5 Correspondence rules
6.6.14.6 Examples
164 7. Architecture examples
7.1 General
7.2 Example architecture of system A
7.2.1 General
7.2.2 Framed concerns and their stakeholders
7.2.3 Architecture view
7.3 Example architecture of adequate design for required security
7.3.1 General
165 7.3.2 Framed concerns and their stakeholders
7.3.3 Architecture view
7.3.3.1 General
167 7.3.3.2 Considerations for H-ARC operation layer
169 7.4 Example architecture of edge computing
7.4.1 General
170 7.4.2 Framed concerns and their stakeholders
171 7.4.3 Architecture view
7.4.3.1 Conceptual model: IoT component capability model
173 7.4.3.2 Function model
174 7.4.3.3 Computing resource model
7.5 Example architecture of IoT platform for Smart Cities
7.5.1 General information and key features
7.5.1.1 General relation to viewpoints according to 6.6
175 7.5.1.2 IoT Platform for a vertical industry
177 7.5.1.3 IoT Platform for cross-industries
179 7.5.1.4 Smart City platform
181 7.5.2 Framed concerns and their stakeholders
7.5.2.1 Typical stakeholders
7.5.2.2 Concerns
186 7.5.3 Architecture view
7.5.3.1 Model kinds
7.5.3.1.1 Function model
187 7.5.3.1.2 Data access, storage, and sharing model
188 7.5.3.2 Correspondence rules
189 7.6 Example architecture of OPC Unified Architecture (UA)
7.6.1 General Information and key features
7.6.1.1 Introduction
7.6.1.2 Relationship to viewpoint catalogue
7.6.2 Framed concerns and their stakeholders
190 7.6.3 Architecture view
7.6.3.1 Model kinds
7.6.3.1.1 Conceptual model: component capability model
192 7.6.3.1.2 Compatibility model
7.6.3.1.3 Communication model: OSI reference model kind meta-model
193 7.6.3.1.4 Information and function models: semantic interoperability
194 7.6.3.1.5 Access control and privacy and trust model
7.6.3.1.6 Computing resource model
195 7.7 Example architecture of a distributed computing architecture for a chemical process in a Smart Manufacturing Ecosystem using BATCH control
7.7.1 General
7.7.2 Framed concerns and their stakeholders
7.7.3 Architecture views
7.7.3.1 Conceptual view
196 7.7.3.2 Compatibility view
197 7.7.3.3 Lifecycle view
7.7.3.4 Communication view
7.7.3.5 Information view
198 7.7.3.6 Function view
7.7.3.7 Computing resource view
7.7.4 Architecture and models with their descriptions
7.7.4.1 Process stages
7.7.4.2 Process operations
199 7.7.4.3 Process actions
200 7.7.4.4 Physical model
7.7.4.4.1 General
201 7.7.4.4.2 Connected enterprise level
7.7.4.4.3 Enterprise level
7.7.4.4.4 Site level
7.7.4.4.5 Area level
7.7.4.4.6 Process cell level
202 7.7.4.4.7 Unit level
7.7.4.4.8 Equipment module level
7.7.4.4.9 Control module level
7.7.4.5 Process cell classification
7.7.4.5.1 General
203 7.7.4.5.2 Classification by number of products
7.7.4.5.3 Classification by physical structure
205 7.7.4.6 Batch control concept
7.7.4.6.1 General
7.7.4.6.2 Structure for batch control
7.7.4.6.2.1 General
7.7.4.6.2.2 Basic control
206 7.7.4.6.2.3 Procedural control
208 7.7.4.6.2.4 Coordination control
7.7.4.6.3 Equipment entities
7.7.4.6.3.1 General
209 7.7.4.6.3.2 Procedural control model/physical model/process model relationship
7.7.4.6.3.3 Equipment control in equipment entities
213 7.7.4.6.3.4 Structuring of equipment entities
214 7.7.4.6.4 Recipes
7.7.4.6.4.1 General
7.7.4.6.4.2 Recipe types
216 7.7.4.6.4.3 Recipe contents
219 7.7.4.6.4.4 Control recipe procedure/equipment control relationship
220 7.7.4.6.4.5 Recipe transportability
7.7.4.6.5 Production plans and schedules
221 7.7.4.6.6 Production information
7.7.4.6.6.1 General
7.7.4.6.6.2 Batch-specific information
222 7.7.4.6.6.3 Common (non-batch-specific) batch information
7.7.4.6.6.4 Batch history
223 7.7.4.6.6.5 Batch reports
7.7.4.6.7 Allocation and arbitration
7.7.4.6.7.1 General
7.7.4.6.7.2 Allocation
224 7.7.4.6.7.3 Arbitration
7.7.4.6.8 Modes and states
7.7.4.6.8.1 General
225 7.7.4.6.8.2 Modes
226 7.7.4.6.8.3 States
228 7.8 Example architecture of oneM2M
7.8.1 General information and key features
7.8.1.1 Introduction
229 7.8.1.2 Relationship to viewpoint catalogue
7.8.2 Framed concerns and their stakeholders
231 7.8.3 Architecture view
7.8.3.1 Model kinds
7.8.3.1.1 Conceptual viewpoint: component capability model
233 7.8.3.1.2 Compatibility viewpoint: compatibility-level model
7.8.3.1.3 Communication model: OSI reference model
234 7.8.3.1.4 Information ciewpoint: data and semantic model
7.8.3.1.5 Access control viewpoint: access control model
235 7.8.3.1.6 Collaboration viewpoint: collaboration model
236 7.8.3.1.7 Computing resource viewpoint: computing resource model
237 7.9 Example architecture of Industrial Value Chain Initiative—reference architecture (IVI-RA)
7.9.1 General information and key features
7.9.1.1 Relationship to viewpoint catalogue
7.9.1.1.1 Level of relevance of viewpoints
238 7.9.1.1.2 Summary of IVI’s activities related to viewpoint catalogue
7.9.2 Conceptual viewpoint model and IVI’s AS-IS and TO-BE models
7.9.2.1 General
239 7.9.2.2 Models of conceptual viewpoint
7.9.2.3 AS-IS and TO-BE models in IVI
240 7.9.2.4 Method of activity scenario modeling in IVI
242 7.9.3 Lifecycle viewpoint and IVI’s exploration, recognition, orchestration, realization (EROR) cycle
7.9.3.1 General
243 7.9.3.2 Model kind: lifecycle sequence
7.9.3.3 IVI’s EROR cycle
245 Annex A (informative) Examples of system collaboration based on collaboration viewpoint
A.1 Introduction
A.2 Symbiotic ADS
249 A.3 Examples
254 Annex B (informative) Common concerns and stakholder mapping
B.1 Common concerns mapping
256 B.2 IoT stakeholder mapping
257 Annex C (informative) An example based on threat model viewpoint
260 Annex D (informative) An example based on an adequate design for required security viewpoint
D.1 Example
D.2 Information for better understanding of this viewpoint
262 Annex E (informative) Bibliography
IEEE 2413-2019
$118.63