ISO/IEC30141:####(X)
ISO/IECJTC1/WG10
Secretariat:KATS
Informationtechnology—InternetofThingsReferenceArchitecture(IoTRA)
WDstage
WarningforWDsandCDs
Thisdocument isnotan ISO InternationalStandard. It isdistributed for reviewandcomment. It is subject tochangewithoutnoticeandmaynotbereferredtoasanInternationalStandard.
Recipientsofthisdraftareinvitedtosubmit,withtheircomments,notificationofanyrelevantpatentrightsofwhichtheyareawareandtoprovidesupportingdocumentation.
ISO/IEC30141:####(X)
2 ©ISO/IEC30141–Allrightsreserved
©ISO2015
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced orutilizedotherwiseinanyformorbyanymeans,electronicormechanical,includingphotocopying,orpostingontheinternetoranintranet,withoutpriorwrittenpermission.PermissioncanberequestedfromeitherISOattheaddressbeloworISO'smemberbodyinthecountryoftherequester.
ISOcopyrightofficeCasepostale56•CH-1211Geneva20Tel.+41227490111Fax+41227490947E-mailcopyright@iso.orgWebwww.iso.org
PublishedinSwitzerland.
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 3
Contents
1 Scope.........................................................................................................................................................................8
2 Normativereferences.........................................................................................................................................8
3 Termsanddefinitions........................................................................................................................................8
4 Symbolsandabbreviatedterms......................................................................................................................8
5 IoTReferencearchitecturegoalsandobjectives...................................................................................10
6 CharacteristicsofIoTsystems......................................................................................................................12
6.1 IoTSystemCharacteristics..........................................................................................................................................13
6.2 IoTServiceCharacteristics.........................................................................................................................................13
6.3 IoTComponentCharacteristics................................................................................................................................15
6.4 Compatibility.....................................................................................................................................................................18
6.5 Usability..............................................................................................................................................................................18
6.6 Reliability............................................................................................................................................................................20
6.7 Security&Privacy...........................................................................................................................................................21
6.8 OtherCharacteristics.....................................................................................................................................................23
7 IoTConceptualmodel......................................................................................................................................27
7.1 Mainpurpose....................................................................................................................................................................27
7.2 Interpretingmodeldiagram.......................................................................................................................................27
7.3 Thebigpicture.................................................................................................................................................................29
7.4 Concept................................................................................................................................................................................30
8 InternetofThingsreferencemodels (IoT RM) and reference architecturesviews(IoTRA).......39
8.1 Relation between CM, RMs and RAs........................................................................................................................39
8.2 IoT Reference models......................................................................................................................................................40
8.3 IoTReferencearchitecture(IoTRA)views.........................................................................................................47
AnnexA........................................................................................................................................................................65
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 5
Foreword1
ISO (the International Organization for Standardization) is a worldwide federation of2national standards bodies (ISOmember bodies). Thework of preparing International3StandardsisnormallycarriedoutthroughISOtechnicalcommittees.Eachmemberbody4interested in a subject for which a technical committee has been established has the5right to be represented on that committee. International organizations, governmental6andnon-governmental, in liaisonwithISO,alsotakepart inthework. ISOcollaborates7closely with the International Electrotechnical Commission (IEC) on all matters of8electrotechnicalstandardization.9
The procedures used to develop this document and those intended for its further10maintenancearedescribed in the ISO/IECDirectives,Part1. Inparticular thedifferent11approvalcriterianeededforthedifferenttypesofISOdocumentsshouldbenoted.This12documentwasdraftedinaccordancewiththeeditorialrulesoftheISO/IECDirectives,13Part2.www.iso.org/directives 14
Attentionisdrawntothepossibilitythatsomeoftheelementsofthisdocumentmaybe15thesubjectofpatentrights. ISOshallnotbeheldresponsible for identifyinganyorall16suchpatentrights.Detailsofanypatentrightsidentifiedduringthedevelopmentofthe17document will be in the Introduction and/or on the ISO list of patent declarations18received.www.iso.org/patents19
Anytradenameusedinthisdocumentisinformationgivenfortheconvenienceofusers20anddoesnotconstituteanendorsement.21
For an explanation on the meaning of ISO specific terms and expressions related to22conformity assessment, as well as information about ISO's adherence to the WTO23principles in theTechnicalBarriers toTrade (TBT)see the followingURL:Foreword -24Supplementaryinformation25
ThecommitteeresponsibleforthisdocumentisISO/IECJTC1/WG10.26
27
ISO/IEC30141:####(X)
6 ©ISO/IEC30141–Allrightsreserved
Introduction28
InternetofThings(IoT)hasbroaduse inthe industryandsocietytoday,anditwillbe29further studied and developed for many years to come. Various applications and30services have been adopting and adapting are IoT technology to provide innovative31solutions for users, which weren’t possible a few years ago. There are a number of32possibleapplicationssuchassmartcity,smartgrid,smarthome/building,smartfactory,33digital agriculture, manufacturing, intelligent transportation and traffic, logistics and34asset/inventory management, retail transactions, e-Health, public safety, e-Learning,35environmentmonitoring. Thus, IoT is an enabling technology that consists ofmany36supporting technologies, for example, different type of communication networking37technology, information technology, sensing and control technologies, software38technology,device/hardwaretechnology,andsoon.39
IndesigninganddevelopingIoTsystems,threekeytechnologiesshouldbeconsidered:40(1)systemtechnology;(2)communicationstechnology;and(3)informationtechnology.41In a different perspective, IoT systems are composed of physical objects and virtual42objectswherebothobjectstogethermean“things”in“InternetofThings.”Thephysical43andvirtualobjectstogethercollect,process,extract,andexchangedata. Theyalsocan44decide, and/or act/react to environments autonomously or upon user’s request. The45dataand informationgeneratedbyIoTsystemsare likelysensitive innature;yet,data46andinformationexchangeisanessentialandimperativeprocessofIoTsystemswhich47enable to provide various applications and services. Therefore, data/information48security and user privacy is the other major technology area of importance for IoT49systems.SecurityandprivacyinIoTsystemsaredictatedbyinternationalandnational50legislations, and IoT systems should comply with the local security/privacy laws and 51regulations. Additionally, reliability, dependability, and data validation and associated52requirementsaretheotherareasthatthedevelopersofIoTSystemsshouldconsider.53
ISO/IEC30141identifiesandspecifiesIoTsystems’ConceptualModel(CM),Reference54Model (RM), and Reference Architecture (RA). The RA is described by different55architectural views, namely, systems view, communications view, information view,56functional view, and usage view. These views generically represent the IoT systems.57These RA views provide various types of architectural elements (e.g., subsystem58platforms, functional entities) as well as base building blocks to develop application-59specific(ortarget)architectures.60
In this IoTRA InternationalStandard (IS), the referencemodel isgiven todescribean61abstract framework for understanding significant relationships among the entities of62some environment, and for the development of consistent standards or specifications63supporting that environment. Thus, the IoT RA is described from the aforementioned64threemaintechnologyviewsinthisinternationalstandard(IS):65
⎯ IoTRASystemsView:DescribestheIoTSystemsfromsystemperspective66
⎯ IoTRACommunicationsView:Describes the IoTSystems fromcommunication67technologyperspective68
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 7
⎯ IoT RA Information View: Describes the IoT Systems from information69technologyperspective70
Inadditiontotheabovethreearchitectureviews,thefollowingtwoarchitectureviews71aredescribedinthisIS:72
⎯ IoTRAFunctionalView73
⎯ IoT RA UsageView74
⎯ The architecture entities defined in the SystemsView, CommunicationsViews,75InformationView,FunctionalViewandUsageViewarerelatedacrossthesefive76IoT reference architecture views. Describing the IoT RA using these five77differentviewswillbenefitnotonlytheIoTstandarddevelopersbutalsotheIoT78Systems developers. For example, developing IoT Security Architecture or79implementing IoT security, the developers can do theirwork in accordance to80the three technology views (e.g., systems, communications, and information)81describingphysical security, communication security, and information security82while theeffectivenessof security features inarchitecture canbeevaluatedby83FunctionalandUsageViews.84
TheobjectivesofthisISO/IEC30141ofstandardare:85
⎯ provideguidancetofacilitatethedesignanddevelopmentofIoTSystems,86
⎯ promote open and common guiding architecture leading to seamless87interoperabilityofIoTSystems.88
IoT covers awide rangeof applications, for example, applications in smart city, in89smartenergy,insmartmobility,insmarthome,insmartbuilding,insmartfactory,90insmarthealth,insmartlogisticetc.Eachapplicationareahasitsown,whichleads91todifferentrequirementsonIoTsystemarchitecture.Inordertodevelopageneric92IoT reference architecture which is applicable for all application areas, it is93necessary to investigate its common concepts and relationships at abstract level.94Such investigationhelps to establish a solid grounding for further development of95thereferencearchitecture.96
97
ISO/IEC30141:####(X)
8 ©ISO/IEC30141–Allrightsreserved
Informationtechnology—InternetofThingsReference98
Architecture(IoTRA)99
1 Scope100
This International Standard specifies IoT Conceptual Model, Reference Model, and101ReferenceArchitecture fromdifferent architectural views, common entities, and high-102levelinterfacesconnectingtheentities.103
2 Normativereferences104
The following documents, in whole or in part, are normatively referenced in this105document and are indispensable for its application. For dated references, only the106edition cited applies. For undated references, the latest edition of the referenced107document(includinganyamendments)applies.108
ISO#####-#:20##,Generaltitle—Part#:Titleofpart109
3 Termsanddefinitions110
Editors´Note:ISO/IECJTC1/WG10agreedtotransfertheclause3,Termsand111definitionsinISO/IEC30141toISO/IECNP20924intheShanghaimeeting.WG10112instructstheProjectEditorsofISO/IECNP20924toreviewthedispositionofcomments113onclause3inISO/IEC30141(WG10_N0315)andforwardtheresulttotheProject114EditorsofISO/IEC30141afterseparatingoutthedefinitionsforISO/IEC30141and115ISO/IECNP20924nolaterthan2016-02-21.TheupdatedrevisedWDwithclause3will116bepublishedtotheexpertsforcommentsandcontributionsafter2016-02-21.117Editor’sNote:Continuetocallforthenewcommentsandcontributionsespeciallyfor118theupdatedcontentsofclause4-8.119
4 Symbolsandabbreviatedterms120
5Vs Volume,Velocity,Veracity,Variability,andVariety121
6LoWPAN IPv6overLowpowerWirelessPersonalAreaNetwork122
AL ApplicationLayer123
ASL ApplicationSupportLayer124
CAN ControlAreaNetwork125
CM ConceptualModel126
CRA CommunicationReferenceArchitecture127
DHCP DynamicHostConfigurationProtocol128
EPDL End-PointDeviceLayer129
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 9
FQDNs FullyQualifiedDomainNames130
FTP FileTransferProtocol131
HAN HomeAreaNetwork132
HTTP HypertextTransferProtocol133
IEEE InstituteofElectricalandElectronicsEngineers134
IETF InternetEngineeringTaskForce135
IPv4 InternetProtocolversion4136
IPv6 InternetProtocolversion6137
IS InternationalStandard138
IoT InternetofThings139
IRA InformationReferenceArchitecture140
LAN LocalAreaNetwork141
LoA LevelofAssurance142
NGO Non-GovernmentalOrganization143
NL NetworkLayer144
ObD ObjectDomain145
OMD Operation&ManagementDomain146
PAN PersonalAreaNetwork147
QoS QualityofService148
RA ReferenceArchitecture149
RID ResourceInterchangeDomain150
RM ReferenceModel151
SCD Sensing&ControllingDomain152
ASD ApplicationServiceDomain153
SPI SerialPeripheralInterface154
SRA SystemsReferenceArchitecture155
ISO/IEC30141:####(X)
10 ©ISO/IEC30141–Allrightsreserved
TCP/IP TransmissionControlProtocol/InternetProtocol156
UML UniversalModellingLanguage157
UrD UserDomain158
URI UniformResourceIdentifier159
USB UniversalSerialBus160
VPN VirtualPrivateNetwork161
WAN WideAreaNetwork162
WLAN WirelessLocalAreaNetwork163
5 IoTReferencearchitecturegoalsandobjectives164
IoT is defined as an infrastructure of interconnected objects, people, systems and165information resources together with intelligent services to allow them to process166informationofthephysicalandthevirtualworldandreact.167
The IoT Reference Architecture (IoT RA) represented in this International Standard168providesaconceptualmodel,referencemodelandreferencearchitecturefromdifferent169architecturalviews,commonentities,high-levelinterfacesconnectingtheentities. The170IoTRAnotonlyoutlines“what”theoverallstructuredapproachfortheconstructionof171IoT systems by the architectural structure description, but also indicates “how” the172architectureand itsdomains/entitieswilloperate. Inshort, the IoTRAprovidesrules173andguidancefordevelopinganIoTsystemarchitecture.174
TheIoTRAservesthefollowinggoals:175
⎯ todescribethecharacteristicsandgeneralrequirementsofIoTsystems;176
⎯ todefinetheIoTsystem’sdomains;177
⎯ to describe the conceptual model (CM) and reference model (RM) of IoT178systems;and179
⎯ todescribeinteroperabilityofIoTsystem’sentities.180
Each IoT systemwill have specific system requirements that should be met, and the181specific system requirements can vary from one IoT system to next per user group182and/ordomain.TheIoTRAprovidesthegenericpartsasastartingpointwiththesame183rulesandguidancewhenthedevelopersreusetheIoTRA.184
TheIoTRAsupportsthefollowingimportantstandardizationobjectives:185
⎯ toenabletheproductionofacoherentsetofinternationalstandardsforIoT;186
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 11
⎯ toprovidea technology-neutral referencepoint fordefining standards for IoT;187and188
⎯ to encourage openness and transparency in thedevelopment of a target IoT189systemarchitecturedevelopmentandintheimplementationoftheIoTsystem.190
TheIoTRAisalsointendedto:191
⎯ facilitatetheunderstandingoftheoverallintricaciesofIoTsystems;192
⎯ illustrate and provide understanding of IoT reference architectures from193differentarchitecturalviews;194
⎯ provide a technical reference to enable the international community to195understand,discuss,categorizeandcompareIoTsystems;196
⎯ facilitate the analysis of candidate use cases/applications including197data/informationflows;and198
⎯ facilitatetheidentifyingofgapsinIoT-relatedstandardsinordertoinitiatethe199standardizationprojects.200
201
ISO/IEC30141:####(X)
12 ©ISO/IEC30141–Allrightsreserved
6 CharacteristicsofIoTsystems202
Editor’sNote:According to the shanghaimeeting, the following table shows thedraft203structure of listed characteristics, further comments and proposals from experts are204required.205
Grouping 1stLevel
6.1IoTSystemCharacteristics 6.1.1Auto-configurations
(including autonomic networking, autonomicservicecapabilities,plugandplay)
6.2IoTServiceCharacteristics 6.2.1Content-Awareness
6.2.2Context-Awareness
(Including:locationawareness,timeawareness)
6.2.3Timeliness
6.3IoTComponentCharacteristics 6.3.1Composability
6.3.2Discoverability
6.3.3Modularity
6.3.4Networkconnectivity
6,3,5Shareability
6.3.6Uniqueidentification
6.4Compatibility 6.4.1Legacysupport
6.5Usability 6.5.1Manageability
6.5.2Well-definedcomponents
6.5.4Flexibility
6.6Reliability
6.6.1Reliability
6.6.2Resilience
6.6.3Availability
6.7Security&Privacy 6.7.1Confidentiality
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 13
6.7.2Privacy
6.7.3Integrity
6.7.4Trust/trustworthiness
6.8OtherCharacteristics 6.8.1Data5Vs–Volume,Velocity,Veracity,VariabilityandVariety
6.8.2Heterogeneity
6.8.3Scalability
6.8.4RegulationCompliance
6.8.5Consumerprotection
206
6.1 IoTSystemCharacteristics207
6.1.1 Auto-configurations208
6.1.1.1 Description209
Auto-configurationistheautomaticconfigurationofdevicesbasedontheinterworking210of predefined rules (associated algorithms based on data inputs). Auto-configuration211includes automatic networking, automatic service capabilities and plug & play. Auto-212configuration allows an IoT system to react on conditions and add and remove213components such as devices and networks. Auto-configuration needs security and214handshake mechanisms to make sure that only authorised components can be auto-215configured into the system. Security and handshake mechanism shall be arranged216appropriateforeachmarketsegments..217
6.1.1.2 RelevancetoIoTsystems218
Auto-configurationisneededformissioncriticalsystemsandbenefitsthoseuserswho219expectrobustsystems.Itcanbesetupwithhardwarestandbyormanuallyintroduced.220
6.1.1.3 Examples221
Exampleofauto-configuringdevicesandprotocols:DHCP,ZeroConfiguration222Networking(Zeroconf),etc.223
6.2 IoTServiceCharacteristics224
6.2.1 Content-Awareness225
ISO/IEC30141:####(X)
14 ©ISO/IEC30141–Allrightsreserved
6.2.1.1 Description226
Thepropertyofbeingawareofthecontentanditsassociatedmetadata.Content-aware227devices and services are able to adapt interfaces, abstract application data, improve228information retrieval precision, discover services, and enable appropriate user229interactions.230
6.2.1.2 RelevancetoIoTsystems231
Content awareness facilitates network service operations, such as path selection,232routing,andserviceinitiation,basedoninformationsuchaslocation,qualityofservice233requirementsandactivityawareness.234
6.2.1.3 Examples235
This capability can be essential in many applications including health services,236broadcasting, surveillance systems and emergency services where some types of237information or data flows have specific requirements with respect to timeliness,238security,privacyetc.239
6.2.2 Context-Awareness(locationawareness,timeawareness)240
6.2.2.1 Description241
Thepropertyofbeingawareofthecontextwithwhichinformationisassociatedsuchas242when(timeawareness)orwhere(locationawareness)anobservationoccurred in the243physicalworld.244
6.2.2.2 RelevancetoIoTsystems245
Context-Awarenessenables flexible,user-customizedandautonomicservicesbasedon246therelatedcontextofIoTcomponentsand/orusers.Contextinformationisusedasthe247basisfortakingactionsinresponsetoobservations,possiblythroughtheuseofsensor248informationandactuators.ContextinIoTmeans,amongstotherthings,anawarenessof249time,place,andthing(when,where,what).Tofullyutilizeanobservationandaffectan250action,thisunderstandingiscritical.251
6.2.2.3 Examples252
Support of location-based service which provides different services according to the253locationonauser.254
In cases of emergency like fire at the arrival of the fire brigade the doors shall be255unlocked. The security policy that governs the door’s access can be enhanced with256context.Thecontexthereisthatanemergencysituationiscurrentlyhappeningandfirst257responders are in the vicinity. Based on these two contextual inputs the policy could258unlockthedoorandprovideaccesswithouttheneedtobeproperlyauthorized.259
TheabilitytoblendGPSinformation(date,time,altitude,andlocation)withsensordata260(e.g.environmentalmonitoring,surveillance,etc.)willenableself-describingcontextto261sensoroutput.262
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 15
6.2.3 Timeliness263
6.2.3.1 Description264
Thepropertyofperforminganaction, function,or servicewithina specifiedperiodof265time.266
6.2.3.2 RelevancetoIoTsystems267
BecauseIoTsystemsactonthephysicalworld,eventsneedtooccuratcertaintimes.To268achievethis, theactions, functions,andservicesthat leadtotheactionneedtohappen269within specific time constraints. Timeliness in IoT includes not only latency related270issues,butjitter,frequency/samplingrate,andphase.271
6.2.3.3 Examples272
IoT system for smartmeterneeds to collect energy consumptiondata at specific time273constraintsinordertoperformdemandandresponsecapabilitiesatgridsystem.274
In an industrial manufacturing process, multiple production elements such as inputs,275personnel,machinesandsupportservicesareengagedandtimelyresponseamongthem276is critical for order execution and dispatch, resource scheduling, production277performanceanalysis,safetymanagementandsoon.278
6.3 IoTComponentCharacteristics279
6.3.1 Composability280
6.3.1.1 Description281
Theabilitytocomposethediscretecomponents intoasystemtoachieveasetofgoals282andobjectives.283
6.3.1.2 RelevancetoIoTsystems284
System integration, interoperability and composability deals with how the functional285building blocks are assembled to form a complete system and how the functional286buildingblocksinterfacewitheachotherviawhatbindingmechanisms(e.g.dynamicor287static, agent-based or peer-to-peer). Interoperability and composability are important288topics in both the cyber and physical spaces. Composability imposes a stronger289requirementthaninteroperabilityinthatitrequiresbuildingblocksnotonlycompatible290intheirinterfacesbutexchangeablebyotherbuildingblocksofthesamekindthatshare291thesamesetcharacteristicsandpropertiessuchasintimingbehaviours,performance,292scalabilityandsecurity.Whenabuildingblockisreplacedbyanotherofthesamekind293thatiscomposable,theoverallsystemfunctionsandcharacteristicsareunchanged.294
6.3.1.3 Examples295
Editor’sNote:Contributionrequested.296
6.3.2 Discoverability297
ISO/IEC30141:####(X)
16 ©ISO/IEC30141–Allrightsreserved
6.3.2.1 Description298
Discoverability allows users, services, and other devices, to find both devices on the299network and the capabilities and services they offer at any particular time. Discovery300services allow IoT users, services, devices and data from devices to be discovered301accordingtodifferentcriteria,suchasgeographiclocation,security,safetyandprivacy.302
6.3.2.2 RelevancetoIoTsystems303
Services (and information providing services) connected with the IoT system can304indicatewhat information canbe foundby aDiscovery/Lookup service in accordance305with predefined different security classification / authentication for each market306segments. Discovery and lookup service of IoT systems allow the locating physical307entitiesbasedongeographicalparametersandthedynamicdiscoveryofrelevantvirtual308andphysicalentitiesandtheirrelatedservicesbasedonrespectivespecifications.309
6.3.2.3 Example310
Networkmappingdiscoversthedevicesonthenetworkandtheirconnectivity.Itisnottobe311confusedwithnetworkdiscoveryornetworkenumeratingwhichdiscoversdevicesonthe312networkandtheircharacteristicssuchasoperatingsystem,openports,listeningnetwork313services,etc.314
6.3.3 Modularity315
6.3.3.1 Description316
The property of a component to be a distinct unit that can be combined with other317components.318
6.3.3.2 RelevancetoIoTsystems319
Modularity allows components to be combined in different configurations to form320systems as needed. By focusing on standardized interfaces and not specifying the321internal workings of each component, implementers have flexibility in the design of322componentsandIoTsystems.323
6.3.3.3 Examples324
Editor’sNote:Contributionrequested.325
6.3.4 Networkconnectivity326
6.3.4.1 Description327
In IoT networks, networked devices (objects/things) pass data to each other along328physical links. The connections between nodes are established using either wired or329wireless media. Networked IoT devices (objects/things) that originate, route and330terminate the data are described as (network) nodes. Endpoint network devices331(objects/things) are the source or destination of any kind of information. Any IoT332relatednetworkingcommunicationsprotocolshall/shouldbelayeredonto(other)more333
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 17
specific or more general communications protocols, down to the physical layer that334directly deals with the transmission media at every node/endpoint of a devices335(objects/things).336
6.3.4.2 RelevancetoIoTsystems337
IoT systems rely on the ability to exchange information units in a structuredmanner338based upon different but interoperable kind of Network Topologies – all within a339physical,wiredorwirelessnetwork–withtheIoTdevices(objects/things)tobecalled340“networked”(together)whenonedeviceisabletoexchangeinformationwiththeother341device(objects/things),whetherornottheyhaveadirectconnectiontoeachother.IoT342Networkstructurecan/shouldbeabletobestatic/dynamicatanytimeofitsexistence,343and(consider)structuralelements like:QoS,resilience,encryption,authenticationand344authorisation.345
6.3.4.3 Examples346
IoTNetworkconsistsofPhysicaldefined:801.xx803.xx802.11.yy-withelementslike:347repeaters, hubs, bridges, switches, routers, modems, firewalls – (Classical) or newer348Technologieslike:ZigBee,6LoWPAN,802.15.4.xx./Topologiescanbe:Mesh,Ring,Star,349Fullyconnected,Line,Tree,Bus.350
TheScaleof an IoTNetwork (and theirelements) canbe:Nanoscale,PAN,LAN,WAN,351HAN,VPN352
Organisational IoT Network can be: Inter- and intra-network, Internetwork (in the353meaningofnetworksofdifferentkindofanarchitecture/structureconnectingtogether).354
6.3.5 Shareability355
6.3.5.1 Description356
Theabilitytouseindividualcomponentsinmultipleinterconnectedsystems.357
6.3.5.2 RelevancetoIoTsystems358
ManyIoTcomponentsareunderutilized–asinglesystemoftenusesonlyafractionofa359components’ capabilities. By providing functionality for components to be shared360amongmultiplesystemstheseresourcescanbemoreefficientlyused.361
6.3.5.3 Examples362
Motion detection capabilities of a lighting control system would be leveraged by the363securitysystemtoincreasethesecuritysystemscapability.364
6.3.6 Uniqueidentification365
6.3.6.1 Description366
Unique identification is the characteristic of a system to enable the entities to be367identifiableandtraceable.368
ISO/IEC30141:####(X)
18 ©ISO/IEC30141–Allrightsreserved
6.3.6.2 RelevancetoIoTsystems369
TheentitiesintheIoTsystemsuchasthedevices,physicalandvirtualobjects,andend-370users are essentially to be distinguished by each other, which enables the371interoperability and global services across the heterogeneous IoT systems.372Standardised unique identification associated with each entity in IoT systems (e.g.,373devicesandservices)allowsforinteroperabilityandsupportservicessuchasdiscovery,374traceandtrack,andauthenticationacrossheterogeneousnetworks.375
Theuniqueidentificationisauniversalconstructforanyentity.ItisusedinIoTsystems376that need to track or refer to entities. It is intended for use with any identification377scheme.378
6.3.6.3 Examples379
IPv4, IPv6, URI, and Fully Qualified Domain Names (FQDNs) are used as unique,380unambiguous identification in the Internet applications. These identifications may381guarantee and allow routing to and accessing devices of interest. Additionally, the382identificationscanprovideeffectivemanagingofphysicalandvirtualobjects.All these383allowedbyidentificationistosatisfyend-usersbyIoTsystem’sservicesprovided.384
6.4 Compatibility385
6.4.1 Legacysupport386
6.4.1.1 Description387
Aservice,protocol,device,system,component,technology,orstandardthatisoutdated388butwhichiscurrentuseandthusneedstobeincorporatedintoanIoTsystem..389
6.4.1.2 RelevancetoIoTsystems390
Support of legacy component integration and migration can be important. When391supporting legacy components it is important to ensure that the design of new392componentsandsystemsdonotunnecessarilylimitfuturesystemevolution.Toprevent393prematurelystrandinglegacyinvestment,aplanforadaptationandmigrationoflegacy394systems is important. Care ought to be takenwhen integrating legacy components to395ensure that security andotheressentialperformanceand functional requirementsare396met.Legacycomponentsincreaseriskandvulnerabilities.Sincecurrenttechnologywill397become legacy technology in the future it is important to have a process in place for398managing legacy aspects of IoT. The different lifecycles of physical systems and399information systems also creates additional challenges formanaging legacy aspects in400IoT.401
6.4.1.3 Examples402
Editor’sNote:Contributionrequested.403
6.5 Usability404
6.5.1 Manageability405
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 19
6.5.1.1 Description406
Manageability addressing aspects such as device management, network407management, system management, and interface maintenance and alerts is408important tomeet IoT system requirements.Manageability needsmonitoring and409reactingcomponentstobeconfiguredintotheIoTdevice,networkandsystem.410
6.5.1.2 RelevancetoIoTsystems411
Many IoT devices, networks, and systems are unmanned and run automatically.412Special care must be taken to ensure that the systems remain manageable even413when the system malfunctions on certain areas of operation or is unstable or414miscalibratedincertainareasofoperation.415
6.5.1.3 Examples416
Devicesincludingsmokesensorsaredeployedinvariouslocationsofbuildings. These417devicesarehard tomaintainbecauseof their locations.Any typeofmalfunctioncould418cause undesirable events and consequences. Thus, the manageability should be419configured from the system design and throughout development of the system. The420configuredmanageability componentmay includedevice statemonitoringcomponent,421thelinkmonitoringcomponent,thecalibrationcomponent,etc.422
6.5.2 Well-definedcomponents423
6.5.2.1 Description424
Components that can provide an accurate description of the component capabilities425includingassociateduncertainties.Capabilityinformationincludesnotonlyinformation426aboutthespecificcomponentfunctionality,butconfiguration,communication,security,427reliabilityandotherrelevantinformation.428
6.5.2.2 RelevancetoIoTsystems429
ThecomponentsareusedtoassembleanIoTsystem.Theywillbediscoveredthrough430an information system interface and information about the component may not be431available. Withoutunderstandingthecapabilitiesofeachcomponentthatwillbeused432withinasystemitwillbedifficulttounderstandwhetherthesystemwillmeetitsdesign433goals.434
6.5.2.3 Examples435
Editor’sNote:Contributionrequested.436
6.5.3 Flexibility437
6.5.3.1 Description438
Editor’sNote:Contributionrequested.439
6.5.3.2 RelevancetoIoTsystems440
ISO/IEC30141:####(X)
20 ©ISO/IEC30141–Allrightsreserved
Editor’sNote:Contributionrequested.441
6.5.3.3 Examples442
Editor’sNote:Contributionrequested.443
6.6 Reliability444
6.6.1 Reliability445
6.6.1.1 Description446
Appropriate levelof reliability incapabilitiessuchascommunication, serviceanddata447managementcapabilitiesisimportanttomeetsystemrequirements.448
6.6.1.2 RelevancetoIoTsystems449
Appropriate level of reliability is essential in diverse IoT system deployments and450applications. Itcanbehighlycritical insomeapplications,e.g. forspecifichumanbody451relatedapplicationsandindustrialmanufacturingoperations.452
6.6.1.3 Examples453
Supportofintegritycheckingtechniques.Datareliabilityisofutmostimportanceforthe454decisionmaking processes of IoT systems. Communication reliability is important for455ensuringtheavailabilityofdata/devices.456
6.6.2 Resilience457
6.6.2.1 Description458
Resilienceistheabilityofthesystemtorecoverfromfaultsandfailures.459
6.6.2.2 RelevancetoIoTsystems460
Communication, device or software failures are relative commonplace in IoT systems461andcanescalatequicklycausingtheglobalfailureofthesystem.Thus,IoTsystemshave462to incorporate self-monitoring and self-healing techniques to improve the system463resilience.464
6.6.2.3 Examples465
TheIoTsystemhastoberesilienttogatewayfailurestoensurethedataavailability.466
6.6.3 Availability467
6.6.3.1 Description468
Availabilityistheabilityofthesystemtofunctionasrequiredduringaperiodoftime.469
6.6.3.2 RelevancetoIoTsystems470
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 21
In IoT systems, availability can be seen in terms of devices, data and services.471Availabilityofdevicesisrelatedwiththeirnetworklifetimeandthereliableconnectivity472ofthedevices.Availabilityofthedataisrelatedwiththeabilityofthesystemtogetthe473requested data from a system component. Availability of services is related with the474abilityof thesystemtoprovidetherequestedservice touserswithapre-definedQoS.475[RERUMD2.2]476
6.6.3.3 Examples477
In somecritical applications, i.e. healthmonitoringor intrusiondetection,devicesand478datahavetobealwaysavailablesothatalarmscanbesenttothesystemimmediately479whenraised.480
6.7 Security&Privacy481
6.7.1 Confidentiality482
6.7.1.1 Description483
Theproperty,thatinformationisnotmadeavailableordisclosedtounauthorized484individuals,entities,orprocesses.(ExcerptfromISO27000)485
6.7.1.2 RelevancetoIoTsystems486
InanIoTsystemtheconfidentialityprotectionisresponsibletoprohibitothernetwork487participantstoreaddataorcontrolmessageswhentheyarenottheintendedrecipients.488Apartfromitbeingapre-requisiteforasecureoperationespeciallywhenthedatatobe489transmittedcontainssecrettokens,e.g.foraccesscontrol,confidentialityisrequiredto490enableprivacy:ConfidentialityofPIImustbeconfidentialityprotectedbeforesentover491thepotentiallyinsecurechannels(manyIoTcommunicationaredonewirelessorover492theInternet)toreachonlytheintended(andconsented)recipient.493
6.7.1.3 Examples494
Theneighbouroraburglarisnotabletoreadtheactualvalueoftheroomtemperature495sensorstoinferifsomebodyishome.Alltheattackerseesisrandomlookingdatathat496mightstillbeidentifiableasoriginatingfromatemperaturesensor(protectionfromthis497wouldrequireanonymouscommunication).498
6.7.2 Privacy499
6.7.2.1 Description500
Privacy protection, a.k.a, as ‘privacy’ and ‘data protection’ is a legal/regulatory501requirementwhenever an IoT system involves ‘personal information’ anywhere in its502operation.503
Privacyistheabilityofanindividualhumantobeleftalone,outofpublicview,andin504control of information about oneself. The concept of privacy overlaps, but does not505coincide,withtheconceptofdataprotection.Withrespecttodataprotectionitensures506that PII is not gathered or processed or disclosed to unauthorized entities. In this507
ISO/IEC30141:####(X)
22 ©ISO/IEC30141–Allrightsreserved
context, entities include both individuals and processes. If PII is disclosed it must be508basedonpriorinformedconsentgivenbythePIIprincipal.509
6.7.2.2 RelevancetoIoTsystems510
Many IoT systems do not collect or interchange recorded information, i.e., data on or511about an identifiable individual, i.e., personal information. However, any `IoT system512which does collect, receive and/or interchange personal information needs to ensure513thatinsuchIoTsystems(andtheirinteractions)withotherIoTsystems(orITsystems514in general) are in full compliance with privacy protection requirements of applicable515jurisdictionaldomains.Privacyprotectionisarightofanindividualandanobligationon516anorganization(orpublicadmonition)wherethelattercollects,receives,interchanges,517etc.personalinformation.Fromninternationalcommonrequirementsperspectivethat518areeleven(11)commonprivacyprotectionprinciples.1.Inadditiontothekeyprinciple519of “Informed Consent”, privacy protection requirements also require that timeliness,520accuracy,relevanceandintegrityofpersonalinformationbemaintainedthroughoutits521lifecycle.522
Whatconstituteeachindividual’sprivacymightbedifferentamongindividuals.Itmight523bedifferentdue to legal, socialorculturalnorms.Howeverwhenend-usersgiveaway524data about themselves and it is used for a different purpose than for which they525understooditbeingusedatthetimeofrelease,thanthisisabreachofprivacy.526
Being able to fully respect the privacy is thus essential for the societal and legal527acceptationofIoTsystemsbythepublic.528
6.7.2.3 Examples529
A key target market for the application and use of things in IoT are those where an530individual is the end-point linked to a “thing” in an IoT context. Here the use of a531smartphone(andassociatedapps)usedbyanindividualrepresentakeyexample.This532is in addition, to existing use of computers, tablets. And other smart devices by533individuals. One notes that there is a continuing dynamic between ensuring privacy534protection on the onehand, andon the other that of organization (public andprivate535sector)wantingaccessanduseofpersonal information forbusiness,nationalsecurity,536lawenforcement,etc.purposes.Addressingissuesofthisnatureisoutsideofthescope537ofthisstandard.HowevertheIoT-RAsisdesignedtobeablesupportsthererealworld538requirements.539
The end-user wants to share his monthly energy consumption data with his energy540provider for billing purposes, he also needs to share – in a more timely manner e.g.541everyhour– the current load toallow thegridprovider tomaintain thegrid’shealth.542Thisdatacouldbeemittedbyseparateservicesandwouldcomewithdifferentaccess543controlpoliciesduetodifferentconsentsgivenbythePIIprincipal.544
Different example, the end-userwants toparticipate inparticipatory sensingof traffic545jams, obviously he does not want the IoT to detect his whereabouts in any detail546unnecessaryfortheapplicationtowork.547
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 23
6.7.3 Integrity548
6.7.3.1 Description549
Data integrity is the property that data has not been altered or destroyed in an550unauthorizedmanner[ISO_27040:2015--3.9]551
6.7.3.2 RelevancetoIoTsystems552
DataintegrityishighlyrelatedtoIoTtoensurethatthedatathatareusedfordecision553making processes of the system have not been altered by unauthorized or malicious554users/devices.Theprotectionoftheintegrityofthedataisakeyrequirementtoensure555thesecurityoftheIoTsystem.556
6.7.3.3 Examples557
In IoT deployments that comprise of multi hop wireless sensor networks there is a558threat that intermediate nodes may alter the data and this can have impact on the559decisionsof the system.For example, an intermediatenodemay increase thevalueof560the temperature of a roomwhichwillmake the air-conditioning system towork in a561highermode.562
6.7.4 Trust/trustworthiness563
6.7.4.1 Description564
Trustworthiness is degree towhich a user or other stakeholder has confidence that a565productorsystemwillbehaveasintended[ISO25010:2011,4.1.3.2].566
6.7.4.2 RelevancetoIoTsystems567
Editor’sNote:Contributionandcommentsrequested.568
device, data and service trustworthiness is of utmost importance for IoT systems to569ensure thatonly trusteddeviceswillparticipate in thedecisionmakingprocessof the570system,resultingintheprovisionoftrustworthyapplications.571
6.7.4.3 Examples572
Editor’sNote:Contributionrequested.573
IfthereisanIoTapplicationthatgivestheaveragemeasurementofaroomconsidering574themeanvaluereportedby5sensors, if2sensorsreport falsevalues(either theyare575misbehaving/faulty or malicious) the resulting mean measurement will be false. By576having mechanisms that evaluate the trustworthiness of the data/devices the false577measurementswillnotbetakenintoaccount.578
6.8 OtherCharacteristics579
6.8.1 Data5Vs–Volume,Velocity,Veracity,VariabilityandVariety580
6.8.1.1 Description581
ISO/IEC30141:####(X)
24 ©ISO/IEC30141–Allrightsreserved
Datacharacteristicsofvolume,velocity,veracity,variability,andvariety thatrequirea582scalablearchitectureforefficientstorage,manipulation,andanalysis.583
6.8.1.2 RelevancetoIoTsystems584
IoT Systems and devices are also expected to generate large amounts of data from585diverselocationsthat isaggregatedveryquickly,therebyincreasingtheneedtobetter586index,storeandprocesssuchdata.587
6.8.1.3 Examples588
Logistic company is using big data is for On-Road Integrated Optimization and589Navigation.The tooluseshundredsofmillionsof addressdatapoints, plusotherdata590collectedonthedeliveries,tooptimizedeliveryroutesforefficiency.591
6.8.2 Heterogeneity592
6.8.2.1 Description593
An IoT system typically is composed of a diverse set of components/entities that594interactinvariousmanners.595
6.8.2.2 RelevancetoIoTsystems596
IoT iscross-system,cross-product,andcross-domain.Realizing the fullpromiseof IoT597willrequireinteroperabilityamongheterogeneouscomponentsandsystems,supported598by new reference architectures using shared vocabularies and definitions. This599heterogeneitywillcreateseveralchallengesfortheresultingIoTsystems.600
6.8.2.3 Examples601
Smart container using RFID tags and sensors needs interaction of RFID systems and602sensornetworksystems.603
6.8.3 Scalability604
6.8.3.1 Description605
Scalabilityisthecharacteristicofasystemtocontinuetoworkeffectivelyasthesizeof606thesystemorthevolumeofworkperformedbythesystemisincreased.607
6.8.3.2 RelevancetoIoTsystems608
IoT systems involve various elements such as devices, services, applications, users,609storeddata,datatraffic,eventreports.Thenumbers/volumesofeachoftheseelements610can change over time and it is important that the IoT system continues to function611effectivelywhenthenumbers/volumesincrease.612
6.8.3.3 Examples613
Oneexampleofscalabilityisthecasewherethenumberofsensordevicesattachedtoan614IoT system is increased, for example, increasing the number of temperature sensors615
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 25
fromthoseattachedtoasinglebuildingtothoseattachedtoallbuildingsinacity.The616consequenceofincreasingthenumberofsensorsinthiswayisthatthereareincreases617in the volume of sensor data flowing in the system, in the volume of historical data618storedindatabases,inthenumberofdeviceshandledbythemanagementsystem,inthe619numberoftemperaturereadingsprocessedbyservicesandapplications.620
6.8.4 RegulationCompliance621
6.8.4.1 Description622
Editor’sNote:Contributionrequested.623
6.8.4.2 RelevancetoIoTsystems624
Editor’sNote:Contributionrequested.625
6.8.4.3 Examples626
Editor’sNote:Contributionrequested.627
6.8.5 Consumerprotection628
6.8.5.1 Description629
“Consumer protection” pertains to the need to support applicable legal/regulatory630requirements whenever an IoT system (or interconnected IT systems) involves a631consumeranywhereinitsoperation.632
NOTE1:Inmanyjurisdictionaldomains,consumerprotectionrequirementsapplyonly633to individuals. In some jurisdictional domains “consumer protection “also applies to634organizations,i.e.,legalorartificialPersons.635
NOTE2:Inthosejurisdictionaldomainswhichdefineconsumerprotectionfocussedon636individuals that is an overlap, i.e. complimentary between consumer protection and637privacyprotectionrequirementswithrespectto“personalinformation”638
6.8.5.2 RelevancetoIoTsystems639
Amajor development and one of the driving forces in the expansion of IoT is that of640manufacturersofphysicalproductsimbedding“things”withInternetWiFicapabilityto641connectviaanIoTsystemintheproductswhichtheysell.642
Asuchtheseembeddeddevices inproductscollect,receive,and/ortransmitdatawith643respect to thedevice bought by a consumer and as such shall complywith applicable644consumerprotectionrequirements.Hereisrecognizedthatwithrespecttocollect,use,645EDI of personal information,many of the legal/regulatory requirements pertaining to646consumerprotectionaresimilarinnaturetothoseofprivacyprotectionrequirements,647therearedifferences(HoweverthesearebeyondthescopeofthisIoTstandard.)648
NeverthelessthereareconsumerprotectionissueswhichanIoTmustbeabletoaddress649Exampleshereincludewhetherornotaconsumeragreestotheactivation/useofanIoT650
ISO/IEC30141:####(X)
26 ©ISO/IEC30141–Allrightsreserved
device imbedded in theproductpurchased,whetherornothaving/usingan thing in651IoTandallowingittobeconnectedtotheproduct/serviceproviderisaconditionorsale652orlease,etc.653
6.8.5.3 Examples654
Anindividualpurchasesa(high-end)refrigerator/freezer.Itincludesanimbeddedchip655withWi-Fi capabilities andwhich is automatically activatedwhen the fridge is turned656one.Thecustomerisinformedthatitspurposeistomonitortheeffectivefunctioningof657the fridgewhich in turn is linked to thewarranty&maintenance contract associated658withthepurchaseofthefridge.Ifthecustomerwisheshe/shecanlinkthis“thing”tothe659home Wi-Fi network in order to establish a direct Internet connection between the660fridgeoperationandthemanufacturer(orwarranty/maintenanceserviceprovider).661
However, the customerneeds tobe fully informedof this servicebeforeagreeing that662thisdeviceinitshomeislinkedtoIoT.Acustomermayrefusetohaveoneormoreofits663devicestobelinkedtoanIoT.Manyotherexamplesofasimilarnaturecanbeprovided.664
665
666
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 27
7 IoTConceptualmodel667
Editors’note: all diagrams and texts havebeenupdatedbasedon thediscussion and668consensus made at meeting in shanghai. WG10 decided to move security related669description to entity based reference model in architecture chapter. Further670contributionsorsuggestionsofproposedchangearerequired671
7.1 Mainpurpose672
Theconceptualmodel (CM)providescommonstructureanddefinitions fordescribing673the concepts of and relationships among the entities within IoT systems. It must be674generic,abstractandsimple. Inordertoachievethisgoal, it is importanttoclarify the675fundamentaloftheIoTsystemsbyaskingfollowingquestions:676
1. WhatisthebigpictureoftheoverallIoTentitiesandtheirrelationships?677
2. WhatarethekeyconceptsinatypicalIoTsystem?678
3. Whatistherelationshipbetweentheentities,especiallybetweendigitalentities679andtheirphysicalentities?680
4. Whoandwherearetheactors?681
5. Howthethingsandservicesarecollaboratedthroughnetwork?682
The following clausesdescribe the conceptual referencemodel focusingon above five683points.ThemodelspresentedhereusesimplifiedUnifiedModellingLanguageTM(UML®,684hereafter“UML”).Clause7.2providesashortdescriptionofthesimplifiedUMLinorder685tohelpreaderstobetterunderstandCRMdiagramspresentedinthisstandard.686
7.2 Interpretingmodeldiagram687
Inthisstandard,UML1Classdiagramshavethefollowingrestrictions:688
⎯ ConceptsarerepresentedasUMLClasseswithnoattributes.689
⎯ Thedocumentationforeachconceptisthedefinitionoftheconcept.690
Onlytwokindsofassociationsareused:691
1. Generalization(an“is-a”relationship):Forexample,sensorisaIoTdevice.This692generalizationrelationshipcanbeexpressedasshowninFigure7-1:693
1ISO/IEC 19501:2005(en) Information technology — Open Distributed Processing — UnifiedModelingLanguage(UML)
ISO/IEC30141:####(X)
28 ©ISO/IEC30141–Allrightsreserved
694
Figure7-1.Generalization.695
2. Directedassociation(expressesrelationshipbetweenconcepts.These696associationnamesareverbs.).Figure7-2expressestheassociationrelationship697thatSensormonitorsPhysicalEntity(thething).698
699Figure7-2.Association.700
Cardinality constrainsonassociationendsarenot shown.Theyvary fromonekindof701associationtoanother,butcanbeinferredfromtheDescriptionsinfollowingclauses.702
Ifaconcept,whichisageneralizationofaconceptonthediagram,isnotitselfshownon703the diagram, the name of that generalized concept appears in italics at the top right704corneroftheboxasshowninFigure7-1(“PhysicalEntity”)andFigure7-2(“IoTdevice”).705
Sensor IOT Dev iceis a
IOT DeviceSensor
EntityPhysicalEntity
containscontains
monitors
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 29
7.3 Thebigpicture706
707
Figure7-3.BigPictureforIoTConceptsoftheCM.708
ThemodeldiagraminFigure7-3Error!Referencesourcenotfound.providesthebig709picture of all key IoT entities defined in this CM, their relationships and their710interactions.IoT-Usercanbehuman(humanuser)ornon-human(digitaluser)suchas711roboter or automation services, which act on behalf of human user. Digital user712consumes remote services through endpoint,which is attached to the communication713network,whilehumanuserinteractsthroughapplications,whichcancommunicatewith714services via network. Physical entity here is the thing which is to be controlled or715monitoredbyactuatorandsensor.VirtualentityrepresentsphysicalentityinITworld.716Both actuator and sensor are kind of IoT device. IoT devices may interacts through717endpoint to have network communicate directly or needs to be connected with IoT718gateway first if itself does not have communication capabilities. Services are719implemented by components and they can be located everywhere. Services can be720discoveredandconsumedviadifferenttypesofnetworksthroughendpoint.721
Thefollowingclausesdescribemoredetailsofentityanditsrelationshipwithfocuson722itskeyconcepts.723
Actuator
IOT Dev iceEndpoint
EntityPhysicalEntity
Sensor
Serv ice
EntityIOT-User
EntityNetwork
EntityDigital Entity
Digital User
IOT Gateway
Component Virtual Entity
Application
Human User
connects
is amonitorsacts
on
interactsthru
interactsthru
implementedby
interactsthru
1..*
connects
represents
interactsthru
is a
contains
contains
build by
from endpointto endpoint
fromnetwork
is ais a
defines networkinterface andexposed by
contains networkinterface
tonetwork
exposes
implemented by
is a
ISO/IEC30141:####(X)
30 ©ISO/IEC30141–Allrightsreserved
7.4 Concept724
7.4.1 IoTEntitiesanddomains725
726
Figure7-4.EntityandDomainConceptsoftheCM.727
Figure7-4showsthewholeIoTfamilyofentities.Athingwithdistinctandindependent728existenceiscalledentity,forexample,aperson,anorganization,adevice,asubsystem,729oragroupofsuchitems.WecanconsiderthateverythinginIoTworldisakindofentity.730Actuallyeveryentityisphysical.InordertohaveasimpleconceptaboutIoTentitiesand731itsrelationship, four fundamentalentitiesaredefinedhere, thething(PhysicalEntity),732theuser(IoT-User),ITsystems(DigitalEntity)andthenetworks(Network).733
Digital entity is any computational ordata elementof an IT-based system,whichmay734existasaservicebasedinadatacentreorcloud,oranetworkelement,oragateway,or735sometimesavirtualentitywhichrepresentsaphysicalentityetc. IoT-User isanentity736which can be human or non-human,while physical entity is discrete, identifiable and737observable,whichisinterestedbyIoT-User.NetworkisanotherimportantentityinIoT738world, through which the other entities can be communicated with each other. Any739entitymaycontainan identitywithwhich it canbe identifiedandcommunicatedwith740eachotherthroughthenetwork.741
Whenasystemevolvesandbecomesmorecomplextomanageortodevelopasawhole,742thereisaneedtodecomposethesystemintosmallerelementsandgrouptheelements743withsimilarorcommoncharacteristicintoaspecificdomain.Eachdomainhasitsown744boundary.Showinginteractionamongdomainsinsteadofthoseamongalltheentitiesin745
Entity
Digital Entity
PhysicalEntity Network
Domain
Identity
IOT-User
contains
includes
is a
is a
interacts
has
contains
contains
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 31
asystemcanprovideasimplerhighlevelviewofhowthecomplexsystemworks.Figure7467-5showsthatoneIoTdomainAinteractswithanotherIoTdomainB.Ofcourse,oneIoT747domaincanalsointeractwithmultipleIoTdomains.748
749
Figure7-5.DomainInteractionsoftheCM.750
Domain is composed of various types of entity. Sometimes one large domain can be751segmented intomore sub-domains. Figure 7-6shows that Domain A contains two sub752domains,DomainCandDomainD.753
754Figure7-6.DomainCompositionoftheCM.755
Following sub clauses provide a short text description regarding corresponding756associationshowninabovediagramsintableform.Toavoidduplicationdescriptionof757relationship between two entities, only entities with outgoing relationship will be758described.759
7.4.1.1 Entity760
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.761
Nr RelationshipType
RelatedConcept
Description
1 Association Identity Entityhasidentity.762
7.4.1.2 Domain763
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.764
Domain A Domain Binteracts
Domain A
Domain C Domain D
containscontains
ISO/IEC30141:####(X)
32 ©ISO/IEC30141–Allrightsreserved
Nr RelationshipType
RelatedConcept
Description
1 Association Entity ADomainincludesoneormoreentities.2 Association Domain ADomainmaycontainsubDomains
3 Association DomainADomainmayinteractwithotherDomains
765
7.4.1.3 Digitalentity766
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.767
Nr RelationshipType
RelatedConcept Description
1 Generalization Entity ADigitalEntityisaspecializationofEntity.
2 Association DigitalEntity ADigitalEntitymaycontainsotherDigitalEntities
768
7.4.1.4 Physicalentity769
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.770
Nr RelationshipType
RelatedConcept Description
1 Generalization Entity APhysicalEntityisaspecializationofEntity.
2 Association PhysicalEntity APhysicalEntitymaycontainsotherPhysicalEntities
771
7.4.1.5 IoT-User772
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.773
Nr RelationshipType
RelatedConcept Description
1 Generalization Entity AnIoT-UserisspecializationofEntityrepresentingahumanuserordigitaluser.
774
7.4.1.6 Network775
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.776
Nr Relationship RelatedConcept Description
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 33
Type1 Generalization Entity ANetworkisaspecializationofEntity.
777
7.4.2 Identity778
779
Figure7-7.IdentityConceptoftheCM780
Figure 7-7 shows the identity concept. Most entities in IoT especially physical entity781(“Thing”) need identity. Identifiers can be understood as a dedicated, publicly known782attribute or name for an identity, a person or a device. Typically, identifiers are valid783withinaspecificcontext.Thingcanhavemorethanoneidentifier,butitrequiresatleast784one unique identifier within any environment or context through which it can be785accessed. For example, identity information from a Tag can be used as Identifier to786identifythePhysicalEntitytowhichitisattached.787
Following sub clauses provide a short text description regarding corresponding788associationshown inabovediagram in table form.Toavoidduplicationdescriptionof789relationship between two entities, only entities with outgoing relationship will be790described.791
7.4.2.1 Identifier792
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.793
Nr RelationshipType
RelatedConcept
Description
Identity Context
Identifier
Entity
Identity
1..*
distinguishes
1
has
identifiedwithin
identifies
ISO/IEC30141:####(X)
34 ©ISO/IEC30141–Allrightsreserved
1 Association Entity IdentifieridentifiesEntity.2 Association Identity Identifierdistinguishedidentity.
Identitymayhavemorethanoneidentifiers
3 Association IdentityContext Identifieridentifiedwithagivenidentitycontext
794
7.4.3 Services,components,andendpoints795
796
Figure7-8.Service,Component,andEndpointConceptsoftheCM.797
Figure 7-8 shows how services and components are collaborated through network.798Serviceisanabstractconcept.Aserviceisrealizedbyoneormorecomponents.There799could bemultiple alternative realizations of the same service. An endpointmust exist800somewhereonsomenetwork.Acomponentexposeszeroormoreendpointsbywhich801theycanbeinvoked.AnEndpointhasoneormorenetworkinterfaces.Services,which802arelocatedremotely,canbereachedbyendpointthroughnetworkinterfaceacrossthe803communicationnetwork. Local interfaces are part of the internal implementation of a804component, but are not subject to the requirements of an interface exposed on a805network.806
Following sub clauses provide a short text description regarding corresponding807associationshown inabovediagram in table form.Toavoidduplicationdescriptionof808relationship between two entities, only entities with outgoing relationship will be809described.810
7.4.3.1 Components811
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.812
Endpoint
Serv ice
EntityNetwork
IOT GatewayComponent
exposes
tonetwork
contains network interface
defines network interface andexposed by from network
to endpoint
from endpoint
1..*
connects
1..*
implemented by
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 35
Nr RelationshipType
RelatedConcept Description
1 Association Endpoint AComponentexposesendpoint.813
7.4.3.2 Endpoint814
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.815
Nr RelationshipType
RelatedConcept Description
1 Association Endpoint AnEndpointmaycontainmorethanonenetworkInterface.
816
7.4.3.3 IoTGateway817
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.818
Nr RelationshipType
RelatedConcept
Description
1 Association Network Thenetworkfromwhichinteractionsareforwarded.
2 Association Network Thenetworkthatinteractionsareforwardedto
3 Association Endpoint AnEndpointfromwhichinteractionsareforwarded
4 Association Endpoint AnEndpointthatinteractionsareforwardedto
819
7.4.3.4 Service820
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.821
Nr RelationshipType
RelatedConcept Description
1 Association Component AServiceisimplementedbyoneormorecomponents.
2 Association Endpoint AServicedefinesNetworkInterfacesofanEndpoint.
822
ISO/IEC30141:####(X)
36 ©ISO/IEC30141–Allrightsreserved
7.4.4 IoTUser823
824
Figure7-9.IoTUserConceptsoftheCM.825
As shown in Figure 7-9, actors of IoT systems are IoT users. IoT user can be either826human (Human User) or digital component (Digital User). A digital user includes827automationservicesthatactonbehalfofhumanusers,forexamplemachinetomachine.828Digitaluserinteractswithaphysicalentitydirectlyorindirectlythroughtheendpoint.829IoT user also uses endpoint to communicate with other IoT user or services in the830network.831
Following sub clauses provide a short text description regarding corresponding832associationshown inabovediagram in table form.Toavoidduplicationdescriptionof833relationship between two entities, only entities with outgoing relationship will be834described.835
7.4.4.1 Humanuser836
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.837
Nr RelationshipType
RelatedConcept
Description
1 Generalization IoTUser AHumanUserisalsoaspecializationofanIoTuser
2 Association Application AHumanUserinteractsacrossthe
EntityIOT-User
Endpoint
EntityDigital Entity
Human User Digital User
Component
Application
implemented by
exposes
contains network interface
is ais a
build by
contains
interacts thru
interacts thru
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 37
Networkthruanapplication.838
7.4.4.2 Digitaluser839
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.840
Nr RelationshipType
RelatedConcept
Description
1 Generalization IoT-User ADigitalUserisaspecializationofIoT-User
2 Association Endpoint DigitaluserinteractswithanEndpointthroughlocal(non-networked)interfacestoutilizefunctionsofferedbytheIoTsystemacrossthenetwork.AcomponentimplementationcouldcombinetheendpointcapabilitieswiththeDigitalusercapabilities.
841
7.4.5 Virtualentities,digitalentities,andIoTdevices842
843
Figure7-10.VirtualEntity,DigitalEntity,andIoTdeviceConceptsoftheCM.844
Figure 7-10 shows the relationship between virtual entity, physical entity and IoT845device.Digitalentitycanbeconsideredasanassemblyofcertaincomponents.Actuator846and Sensor are the components which have direct or indirect contact with Physical847Entity.Actuatorexecutesdigitalinformationtoaltersomepropertyofaphysicalentity.848Sensor perceives certain characteristics of the real world and transfers them into a849digital representation. Actuator and Sensor are kind of IoT device, which converts850variationsinonephysicalquantity,quantitativelyintovariationsinanother.851
EntityPhysicalEntity
IOT Dev ice
Actuator Sensor
Endpoint
Digital EntityVirtual Entity
contains networkinterface
interactsthru
represents
contains
1..*
interactsthru
0..* actson
monitors
is ais a
ISO/IEC30141:####(X)
38 ©ISO/IEC30141–Allrightsreserved
Using a smartphone for example, it has a sensor to detect temperature of a physical852object. A Bluetooth app on a smartphone communicates with an air conditioner to853control the room temperature, where the air conditioner can be considered as an854actuator. A smartphone may have locally installed database (local component) to855retrieve the barcode information of the scanned object, or it may communicate with856hosted catalogue system viamobile network using endpoint component at the phone857(modemunit).858
Following sub clauses provide a short text description regarding corresponding859associationshown inabovediagram in table form.Toavoidduplicationdescriptionof860relationship between two entities, only entities with outgoing relationship will be861described.862
7.4.5.1 IoTdevice863
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.864
Nr RelationshipType
RelatedConcept Description
1 Association Endpoint AIoTdeviceinteractsonthenetwork,thruanEndpoint,whichitinteractswithusinglocal(non-networked)interfaces.AcomponentimplementationcouldcombinetheendpointcapabilitieswiththeIoTdevicecapabilities.
865
7.4.5.2 Sensor866
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.867
Nr RelationshipType
RelatedConcept
Description
1 Generalization IoTdevice aSensorisaspecializationofIoTdevice2 Association PhysicalEntity ASensormonitorsaPhysicalEntity
868
7.4.5.3 Actuator869
TheConceptualModeldefinesthefollowingrelationshipsfromthisconcept.870
Nr RelationshipType
RelatedConcept
Description
1 Generalization IoTdevice AnActuatorisaspecializationofIoTdevice
2 Association PhysicalEntity AnActuatoractsonaPhysicalEntity. 871
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 39
8 InternetofThingsreferencemodels (IoT RM) and reference 872architecturesviews(IoTRA)873
EditorNotes:Thetexthasbeendiscussedandupdated inShanghaimeetingbasedon874thedispositionofcomments.Continuetocallforthenewcontributionandcomments.875
Editor’sNote:Recommendation65 fromWG104thMeeting in Shanghai, ISO/IEC JTC8761/WG 10 approves the establishment of an ad-hoc group for reviewing the different877views of RA on IoT based on the new revised WD of ISO/IEC 30141. The Terms of878Referenceofad-hocgrouparetodeterminethenumberofviews,purposeandcontents.879
8.1 Relation between CM, RMs and RAs 880
A reference model (RM) is an abstract framework for understanding significant881relationships among the entities of some environment, and for the development of882consistentstandardsorspecificationssupportingthatenvironment.Areferencemodel883is based on a small number of unifying concepts and may be used as a basis for884educationandexplainingstandardstoanon-specialist.Areferencemodelisnotdirectly885tiedtoanystandards,technologiesorotherconcreteimplementationdetails,butitdoes886seek to provide a common semantics that can be used unambiguously across and887betweendifferentimplementations.[4]888
Thereareanumberofconceptsrolledupintothatofareferencemodel(RM).ARMis889abstract, and it provides information about environments of a certain kind. A RM890describes the type or kind of entities thatmay occur in such an environment, not the891particularentitiesthatactuallydooccurinaspecificenvironment.ARMdescribesboth892typesofentities or domains(thingsthatexist)andtheirrelationships(howtheyconnect,893interactwithoneanother,andexhibit jointproperties).A listofentity types,by itself,894doesn't provide enough information to serve as a reference model. A RM does not895attempttodescribe"allthings."ARMisusedtoclarify"thingswithinanenvironment"896oraproblemspace.Tobeuseful,aRMshouldincludeacleardescriptionoftheproblem897that it solves, and the concerns of the stakeholderswho need to see the problem get898solved.ARMistechnologyagnostic.ARM'susefulnessislimitedifitmakesassumptions899aboutthetechnologyorplatformsinplaceinaparticularcomputingenvironment.ARM900typically is intended to promote understanding a class of problems, not specific901solutions for those problems. As such, it must aid the process of imagining and902evaluatingavarietyofpotentialsolutionsinordertoassistthepractitioner.RMisuseful903to: (a) to create standards for both the objects that inhabit the model and their904relationships to one another; (b) to educate; (c) to improve communication between905people;(d)tocreateclearrolesandresponsibilities;and(e)toallowthecomparisonof906differentthings.[5]907
Reference architecture canbeunderstood as contextsprovidedwith common feature,908vocabulary,requirementstogetherwithsupportingartefactstoenabletheiruse,where909theartefactsarethedescriptionofthemajorfoundationalarchitecturecomponents,that910provide guidelines and constrains for instantiating solution architectures, that can be911definednotonlyfromadifferentemphasisorviewpointbutalsoatmanydifferentlevels912of detail and abstraction, and that consist of a list of entities and functions and some913
ISO/IEC30141:####(X)
40 ©ISO/IEC30141–Allrightsreserved
indicationoftheirconnections,interrelationsandinteractionswitheachotherandwith914functions locatedoutsideof predefined architecturepatterns representing the entities915andfunctions.2916
Figure 8-1 shows the architecture continuum from the CM, entity-based RM, domain-based 917RM, finally to a number of different views of RA. The consistent architecture continuum 918should be maintained not only in this hierarchy (e.g., CM à RM à RA) but also in 919evolutionary updates over time and it should be clearly understood through effective way of 920documenting the architecture descriptions. 921
IoTReferenceModel(DomainBased)
IoTRA(Functional
View)
IoTRA(SystemView)
IoTRA(Communication
View)
IoTRA(UsageView)
IoTRA(Information
View)
IoTReferenceModel(EntityBased)
IoTConceptModel
922
Figure 8-1. Relation betweenIoTconcept model, reference model, and reference 923architectures. 924
Inthisstandard,afterexaminingvariouskindsofdeployedIoTsystemsanddeveloped925IoT Conceptual Model (CM) through IoT system decomposition, common and926representative domains of IoT systems are identified by focusing on the IoT systems’927stakeholders and hardware/software. Using these common and representative domains 928provides an effective and representative Reference Model (RM) of the IoT systems for the 929various purposes and uses of the RM. 930
8.2 IoT Reference models 931
8.2.1 Entity-basedreferencemodel932
A composite entity-based referencemodel of IoT systems is shown in Figure 8-2. This 933figure illustrates the activity interaction using arrowhead lines between the entities.934Eacharrowhead line isdescribedwithaconcise, representativeactivitydescription to935conveytheactivityrelationshipsin Figure 8-2. 936
2BasedonthedescriptionsfromISO/IECJTC1/WG10;IoT-A;http://dodcio.defense.gov/Portals/0/Documents/DIEA/Ref_Archi_Description_Final_v1_18Jun10.pdf.ReferenceArchitectureDescription,OfficeoftheDoDCIO,June2010;https://en.wikipedia.org/wiki/Reference_architecture;http://www.ibm.com/developerworks/rational/library/2774.html;http://www.liteea.com/wordpress/horizongtal/what-is-reference-architecture,RationalUnifiedProcess;andTheintroductiontotheIBM’sMasterDataManagementReferenceArchitecture.
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 41
Physical Entity(Includes human too!)
IoT Devices(Include sensors, actuators, and tags)
IoT Gateway(Include local services and data)
Resource & Interchange
System
Application Service System
Operation & Management
System
IoT Users(Include Human, Devices/HMI)
Networks
Security & Privacy
937
Figure8-2.IoTreferencemodel(Entity-based).938
Based on the study of system decomposition of various IoT systems in different939applicationscenarios,Figure 8-3 extractstheidentified,representative,andcommonIoT940entitiesfoundinmostoftheIoTsystems.Additionally,thisfigureprovidesaveryhigh941levelrelationshipbetweenDomainandEntity.942
Domain
Entity
includes ApplicationServiceSystemisa
isa
Operation&ManagementSystemisa
Resource&InterchangeSystemisa
IoTUserisa
Networkisa
PhysicalEntityisa
IoTGateway
IoTDeviceisa
943
Figure8-3.Domainandentityrelationship,andrepresentativeconceptual944entitiesintheIoTsystems.945
8.2.1.1 IoT device 946
EditorNote:Tag/Tag reader has been removed, and looking for further contribution947fromSC31.948
An IoT device is the technical artefact for bridging the realworld of physical entities949with the digital world of the Internet. This is done by providingmonitoring, sensing,950actuation,computation,storage,communicatingandprocessingcapabilities[3].AnIoT951deviceisattachedtoorinproximitytophysicalentity.Incertainsituations,IoTdevices952can be structurally embedded in physical entity. In other situations, IoT devices,953especiallySensor,canbelocatedawayfromphysicalentityandmonitoringthePhysical954entitiesfromadistance.955
ISO/IEC30141:####(X)
42 ©ISO/IEC30141–Allrightsreserved
IntheIoTsystems,therearesomebasictypesofIoT devices,andtheyareidentifiedin 956Figure 8-4. These devices take vital role in the IoT systems for providing the957technologicalconnection for interactingwith,orgaining informationaboutthephysical958entity, enhancing the physical entity and allowing the latter to be part of the digital959world [3].The IoT device canbeaggregationofseveraldevicesofdifferent types. Figure 9608-4 shows the key IoT devices in an IoT system. Meanwhile, Table 8-1 provides the 961description for each type of IoT Devices.962
IoTDevice
Sensorisa
Actuatorisa 963
Figure8-4.ThekeyIoTdevices.964
Table8-1.DescriptionoftheIoTdevicesshowninFigure8-4.965
IoTDevice Description
Sensor
Sensor provides the data and/or information about the physical entitybeingmonitored. Informationinthiscontextrangesfromthe identityofthephysicalentitytomeasuresofthephysicalstateofthephysicalentity.Sensors can be attached or embedded in the physical structure of thephysicalentity.Or,sensorscanbeplacedintheenvironmentawayfromthephysicalentityperformingnon-contactorremotesensing.
Actuator
Actuatorsmanipulate or alter physical entities’ state in an IoT system’senvironment. For example, they can manipulate own sensor or othersensorsinitsnetwork(e.g.,pan,tilt,zoom,etc.)oralterasensorplatformpassage (e.g., toengage thrusters ina satellite)oralter itsenvironmentbycertaintypesofactuators. Someactuatorscanactivateordeactivatefunctionalitiesofaphysicalentityoragroupofphysicalentities. Thereare three types of actuators: (1) mechanical actuator; (2) electronicactuator;(3)virtualactuator.
966
8.2.1.2 Network 967
Various types of networks are used in the IoT systems. All types of networks are represented 968by the Network entity. This entity represents various types of devices that allow the 969connectivity from one network to another network, from one domain to another domain, and 970so on. The devices belonging to this entity are routers, endpoint, etc. 971
8.2.1.3 IoT Gateway 972
IoT Gateway is a forwarding device enabling the connections between the sensing or 973actuating subsystem in the real environment and other subsystems. 974
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 43
8.2.1.4 Physical Entity (Things) 975
A physical entity that is within the purview of an IoT system, that forms an environment for 976which the IoT system is responsible and whose characteristics, function, status, or behavior is 977sensed, monitored or controlled by the IoT system. 978
8.2.1.5 Operations & Management System 979
The Operations & Management System is an integrated physical/virtual entity system which 980observes, operates, maintains, and manages all IoT system assets including, but not limited to, 981networks, IoT environments, IoT devices, etc. 982
8.2.1.6 Resource & Interchange System 983
The Resource & Interchange System is an integrated physical/virtual entity system supporting 984IoT system’s external connectivity with 3rd party suppliers, markets, and temporary 985stakeholders of the IoT system. 986
8.2.1.7 Application Service System 987
The application service system is an integrated physical/virtual entity having various 988applications in order to provide IoT services to IoT User. 989
8.2.1.8 IoT User 990
The IoT User is an individual human user or various sizes of organizations made of from 991humans, who requests IoT services and who is provided the requested service fulfilled by a 992service provider in an IoT system.993
8.2.2 Domain-basedreferencemodel 9948.2.2.1 Introduction 995
Figure 8-5 shows the domain representation of the IoT system reference model. The domain-996based RM is composed of User Domain (UD), Operations & Management Domain (OMD), 997Application Service Domain (ASD), Resource & Interchange Domain (RID), Sensing & 998Controlling Domain (SCD), and Physical Entity Domain (PED). 999
Operations&Management
Domain(OMD)
Resource&InterchangeDomain(RID)
ApplicationServiceDomain(ASD)
Sensing&ControllingDomain(SCD)
PhysicalEntityDomain(PED)-Things
UserDomain(UD)
1000
ISO/IEC30141:####(X)
44 ©ISO/IEC30141–Allrightsreserved
Figure8-5. IoT reference model (Domain-based).1001
Each identified domain ismutually exclusive from the other domains. The IoT system’s 1002environment is mainly formed by the PED, but in certain situations, part of the SCD entities 1003can be allotted as a part of the environment. Hardware (i.e. physical entities) and software1004(i.e. virtual entities) appear in the domains other than the PED and the SCD. These1005hardware and software in theses domains other than the PED and the SCD support1006functions and capability of thedomain towhich theybelong, and theydonot interact1007(e.g.,senseandactuate)withanenvironmentforwhichanIoTsystemisresponsibleand1008monitoring. 1009
The IoT domain-based RM supportsplanningandorganizationof thediverse,expanding1010collection of interconnected networks. Interconnected networks provide1011communicationconnectivity(includingdata linkwhichcanbeapoint-to-point link) in1012IoT systems (e.g., inter- and intra-domain), between IoT systems, and with other1013systems and organizations. The connected networks shouldmaintain interoperability1014fromonenetworktoanother.1015
The network mainly provides pathways for communication and data/information1016exchange.Thus,thekeyroleofthenetworksistosupportandprovideanIoTsystem’s1017required networks for communication and data/information exchange activities and1018interactions.Typesoftheactivitiesandinteractionsbetweentwoentities,betweentwo1019domains, or between two IoT systems determine their relationships between the1020entities,domains,andIoTsystems,respectively.1021
Thenetworksandcommunicationconnectivityisaccomplishedbywire-lineorwireless1022connections. There are various types of networks (e.g., local area network, cellular1023network, sensor network, control network, home area network, etc.) and1024communication connectivity (e.g., a point-to-point communication link, etc.). Thus,1025various network/communication components and protocols form the1026network/communicationinfrastructureofanIoTsystem.1027
Although the inter-domain communication/data networks are not specifically designated as 1028one of the six domains, these networks play a critical role in an IoT system. Depending on the 1029infrastructure of IoT systems, the inter-domain communication/data networks can be Internet, 1030Intranet, enterprise backbone network, wide area network, etc. Business-to-business (B2B) 1031networks are also considered as inter-domain communication/data network. 1032
8.2.2.1.1 The user domain (UD) 1033
Users are the stakeholder/actor of the User Domain (UD). User can be an individual person, a 1034group of persons (e.g., a household), industry (e.g., a company, a corporation, or an 1035enterprise); or local/state/provincial/federal governments’ organizations (e.g., transportation 1036department, agricultural department, water department, etc.).1037
8.2.2.1.2 Thephysical entity domain (PED) - Things 1038
The physical entity domain (PED) is constituted of physical entities that are “the things within 1039the purview of an IoT system.” Therefore, the PED is the primary environment that an IoT 1040
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 45
system is responsible for its given tasks or functions such as monitoring, sensing, controlling, 1041manipulating, etc. Therefore, the objects in the PED can be a myriad of different kinds of 1042physical and virtual entities. 1043
The stakeholder is an owner or owners of the PED, yet, this stakeholder may not show up as 1044an entity in the PED. A person or persons can be one of the objects in the PED. 1045
8.2.2.1.3 The sensing & controlling domain (SCD) 1046
Sensing and controlling domain (SCD) is the most essential domain of an IoT system because 1047the SCD provides critical data and information about an environment (i.e. physical entity 1048domain, PED) to all other domains of an IoT system. 1049
8.2.2.1.4 The operations & management domain (OMD) 1050
System operators and managers are the stakeholders/actors of the OMD. The operators and 1051managers maintain overall health of IoT system(s). 1052
The OMD represents the collection of functions responsible for the provisioning, managing, 1053monitoring and optimizing the systems’ operational performance in real-time. 1054
The OMD includes several functional components for the IoT system operations: 1055Provisioning and Deployment functional component consists of a set of functions1056required to configure, on-board, register, track assets, and to deploy and withdraw1057assets from operations. These functions must be able to provision and bring assets1058onlineremotely,securelyandatscale.1059
Management functional component consists of a set of functions that enable1060managementcentrestoissueasuiteofmanagementcommandstothecontrolsystems,1061and from the control systems to theassets inwhich the control systemsare installed,1062andthecontrolsystemsandtheassetstorespondtothesecommands.1063
Monitoring and Diagnostics functional component consists of functions that enable1064detectionandidentificationofproblemsbeforetheyoccur.1065
Prognostics functional component consists of the set of functions that serves as a1066predictive analytics engine of the IoT system. The main goal is to identify potential1067issuesbeforetheyoccurandproviderecommendationsontheirmitigation.1068
Optimization functional component consists of a set of functions that improves asset1069reliabilityandperformance,reducesenergyconsumption,andincreaseavailabilityand1070outputincorrespondencetohowtheassetsareused.1071
8.2.2.1.5 The Resource & Interchange domain (RID) 1072
Non-permanent/temporary organizations that participate in an IoT system voluntarily or 1073involuntarily are the stakeholders of the RID. These organizations range from a coffee shop to 1074utility companies to governmental organizations. 1075
ISO/IEC30141:####(X)
46 ©ISO/IEC30141–Allrightsreserved
The RID interacts with the external entities, applications/services, and/or systems in terms of 1076“resources.” The resource can be physical, monetary, and digital (e.g., data/information) 1077depending on transactions executed through the RID. 1078
From the perspective of the digital resources (e.g., data), the domain-based RM has an 1079underlying data layer covering all six domains because the data is generated and consumed in 1080a distributed fashion by all domains in the RM. In order to achieve its role, the RID needs 1081access to the digital resources (e.g., data) by permission of other domains (e.g., the UD, the 1082OMD, the ASD, and the SCD). Thus, this particular RID role can be viewed as the RID 1083having a pseudo-information database domain. The actual data processing such as data 1084“analytics” are performed typically in the ASD, and the results of the processing is stored in 1085the service providers’ database. In the RID, if required, additional data processing is 1086performed to accommodate the external organizations. These additional processing may 1087include ensuring quality of data, data transformation, distribution and storage. 1088
8.2.2.1.6 The Application Service Domain (ASD) 1089
Application service providers are the stakeholder/actor of the ASD. Application service 1090provider organizations provide services to the users in the UD. The ASD has a set of 1091applications that forms an application domain within the ASD. 1092
The ASD is mainly for all types of service providers involved in an IoT system. Thus, the 1093service providers interact not only with the users (i.e. Users) in the UD to fulfil the users’ 1094requests, but also with the sensors/actuators/readers in the SCD to gain data from objects (i.e. 1095environment that an IoT system is responsible for) in the PED. Additionally, the ASD 1096interacts with the OMD if an OMD stakeholder becomes a client of a service provider in the 1097ASD directly or indirectly (e.g., through a user’s request). The service providers in the ASD 1098are likely to interact with the external organizations (e.g., other IoT systems, IoT platform, 1099law enforcement, utility, financial institutions, government, etc.) via the RID. 1100
The application service providers form a business domain within the ASD. The business 1101domain functions enable end-to-end service operations of the IoT systems by integrating those 1102functions with traditional or new types of IoT specific business functions. 1103
8.2.3 Relation between the two reference models 1104
Based on the entity-based RM in Figure 8-2 and the domain-based RM in Figure 8-5, a 1105mapping relation between these two RMs can be achieved as shown in Figure 8-6, Where 1106these two RMs are consistent with each other. 1107
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 47
Application Service Domain
User Domain
Sensing and Controlling Domain
Resource & Interchange domain
Operation & Management Domain
Physical Entity Domain
IoT-Users
IoTGateway
IoTDevices
PhysicalEntity
Operation&Management
Systems
ApplicationServiceSystems
Resource&InterchangeSystems
Network
Network
Network
Network
1108
Figure 8-6. Relation between the concept model and the reference model. 1109
Following Figure 8-6, the corresponding relationship between the entities in the entity-based 1110RM and the domains in the domain-based RM is listed in Table 8-2. 1111
Table 8-2. The corresponding relationship between the entities in the entity-based RM 1112and the domains in the domain-based RM. 1113
EntitiesinEntity-basedRM DomainsinDomain-basedRMIoTUser UserDomain(EUD)
ApplicationServiceSystem ApplicationServiceDomain(APD)Operations&ManagementSystem Operations&ManagementDomain(OMD)Resource&InterchangeSystem Resource&InterchangeDomain(RID)
IoTDeviceSensing&ActuatingDomain(SAD)
IoTGatewayPhysicalentity PhysicalentityDomain(PED)
Networks Communicationandinteractionsamongthedomains
1114
8.3 IoTReferencearchitecture(IoTRA)views1115
Editors’Note:AccordingtothecommentfromWG104thShanghaimeeting,thesimple1116introductions for different reference architecture views are added here. Call for1117commentsandcontributionaboutcurrentfiveviews.1118
Editors’Note:Callforcommentstoreviewalltheviewsanddecidewhichviewsshould1119beincluded.1120
TheIoTRAisdescribedbythefollowingfivereferencearchitectureviews:1121
ISO/IEC30141:####(X)
48 ©ISO/IEC30141–Allrightsreserved
a) IoTRAFunctionalView.Thefunctionalviewisatechnology-neutralviewofthe1122functions necessary to form a system. The functional view describes the1123distributionof,anddependenciesbetween, functionsnecessaryforthesupport1124ofactivitiesdescribedintheuserview;1125
b) IoTRASystemView.Thesystemviewdescribes thegeneric functionaldevices1126andsystemsineachdomaintoformanIoTecosystemandsupportoffunctions1127components in the functional view. The entities in each domain can be very1128generalandoptionalbasedonspecificapplication;1129
c) IoT RA Communications View. IoT RA Communications view introduces1130concepts for handling the complexity of communication in heterogeneous IoT1131environments;1132
d) IoT RA Information View. IoT RA Information view describes the physical1133entities(datacarrier)ineachdomainfromdataperspectivewhichgeneratedata,1134process data (data classification), transmit data (data source) or receive data1135(data destination). Beginning with this, the entities as data carrier, data1136classification within the entities and data transmission between entities are1137neededtobedefined.IoTRAInformationviewinformsthedataattributesthatis1138handled in an IoT system. It provides necessary information to various1139informationconsumers,whichutilizesthecommunicationlinksdescribedbythe1140communicationview;1141
e) IoTRAUsageView.IoTRAUsageviewprovidesaspectsofIoTsystemsthatare1142ofinteresttoaspecificuserorusergrouptogetherwiththerelevantinformation,1143represented by a corresponding collection of data. It describes from user1144perspective how the IoT systemsor applications canbe developed, tested and1145used;1146
TheIoTRAsbecomeanapplication-orservice-specificsystemarchitectureora target1147systemarchitecture(e.g.,agriculturalsystem,environmentalsystem,smartgridsystem,1148smart home/building, smart city, etc.) when the RA is tailored to a specific set of1149requirements.1150
8.3.1 IoT RA Functional view 1151
The functional view is a technology-neutral viewof the functionsnecessary to forma1152system. The functional view describes the distribution of, and dependencies between,1153functions for support of activities described in the usage view, and addresses the1154followingconcepts:1155
⎯ functionalcomponents;1156
⎯ functionallayers;and1157
⎯ multi-layerfunctions.1158
Eachfunctionalcomponentisrealizedbyoneormoreimplementationsofactualsystem1159components,whichmaybedeployedtoformaworkingsystem.1160
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 49
8.3.1.1 Decomposition of the IoTRAfunctional domains 1161
Figure 8-7 shows the decomposition of the IoT Functional Domains into Functional 1162Components. 1163
Application Services Domain
User Domain
Actuation
Network accessSensing and Controlling
Domain
Resource & Interchange domain
Logic & Rules
Operation & Management Domain
Monitoring
Human HMI
Sensing
Asset management Executor
Physical Entity Domain Actuated EntitySensed Entity
Prognostics
Optimization
DiagnosticsManagement
Data
Cloud
API & Portal
Regulation Billing & Payment, etc.
Analytics
Market resource
interchange
Infromation resource
interchangeEPR
DeploymentProvisioning
Tag Reading
1164
Figure 8-7. IoT Functional View - Functional Domain Decomposition. 11658.3.1.1.1 The application service domain (ASD) 1166
The ASD domain represents the collection of functions implementing application logic that 1167realizes specific business functionalities for the service providers in the ASD. The application 1168service domain has components such as logic and rules functional component, application 1169programming interfaces (APIs) and portal functional component. 1170
8.3.1.1.2 The sensing & controlling domain (SCD) 1171
The SCD is comprised of a set of common functional components whose implementation 1172complexity depending on the infrastructure of IoT systems. For a specific IoT system, some 1173components may not exist at all. 1174
Sensing is the functional component that reads sensor data from sensors. Its implementation 1175spans hardware, firmware, device drivers and software elements. Note that recursive sensing, 1176requires control and actuation, and thus have a more tight connection to the rest of the control 1177system, for example, an attention element to tell the sensor what is needed. 1178
Actuation is the functional component that writes data and control signals to an actuator to 1179enact the actuation. Its implementation spans hardware, firmware, device drivers and software 1180elements. 1181
ISO/IEC30141:####(X)
50 ©ISO/IEC30141–Allrightsreserved
Executor is the functional component that executes control logic to the understanding of the 1182states, conditions and behaviour of the system under control and its environment in 1183accordance with control objectives. 1184
The stakeholder is an owner or owners of the SCD, yet, this stakeholder may not show up as 1185an entity in the SCD. No human type actor is expected in the SCD. The SCD consists of 1186sensors (including sensor networks), controllers, actuators, and tag readers. It could have 1187data/processing platform. It also has various kinds of virtual objects supporting the entities in 1188the SCD. Thus, actors in the SCD can be physical entities (e.g., sensors, controllers, actuators, 1189computers, etc.) or virtual entities (e.g., software). 1190
8.3.1.1.3 The operation & management domain (OMD) 1191
System operators and managers are the stakeholders/actors of the OMD. The operators and 1192managers maintain the overall health of IoT system(s). 1193
The OMD represents the collection of functions responsible for the provisioning, managing, 1194monitoring and optimizing the systems’ operational performance in real-time. 1195
• The OMD includes several types of functional components for the IoT system operations: 1196Provisioning and Deployment functional component consists of a set of functions 1197required to configure, on-board, register, and track assets, and to deploy and retire 1198assets from operations. These functions must be able to provision and bring assets 1199online remotely, securely and at scale. 1200
• Management functional component consists of a set of functions that enable 1201management centres to issue a suite of management commands to the control systems, 1202and from the control systems to the assets in which the control systems are installed, 1203and the control systems and the assets to respond to these commands. 1204
• Monitoring and Diagnostics functional component consists of functions that enable 1205detection and identification of problems before they occur. 1206
• Prognostics functional component consists of the set of functions that serves as a 1207predictive analytics engine of the IoT system. The main goal is to identify potential 1208issues before they occur and provide recommendations on their mitigation. 1209
• Optimization functional component consists of a set of functions that improves asset 1210reliability and performance, reduces energy consumption, and increase availability 1211and output in correspondence to how the assets are used. 1212
8.3.1.2 Cross-Domain Functions 1213
Figure8-8isanoverviewoftheIoTFunctionalView,showingfunctionaldomainsanda1214highlevelviewofcrossdomainfunctions.1215
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 51
Operation&Management
Domain
ApplicationServicesDomain
UserDomain
Resource&Interchangedomain
PhysicalEntityDomain
Sensing&ControllingDomain
Security
IoT Reference Model (Domain Based) Cross-Domain Functions
Safety&Resilien
ce
Conn
ectiv
ity
DataIn
terope
rability
Dyna
micco
mpo
sition&Autom
ated
Interope
rability
Trust&
Priv
acy
1216
Figure 8-8. IoT Functional View – Cross-Domain Functions. 1217
8.3.2 IoT RA System View 1218
Thesystemviewdescribesthegenericfunctionaldevicesandsystemsineachdomainto1219formanIoTecosystemandsupportoffunctionscomponentsinthefunctionalview.The1220entities ineachdomaincanbeverygeneralandoptionalbasedonspecificapplication.1221Thesystemviewaddressesthefollowingconcepts:1222
⎯ genericphysicalentitiesfromsystemcomponents;1223
⎯ Connectionrelationshipsbetweentheentities.1224
InFigure8-9,IoTRASystemsviewisshownalongwithalltheentitiesinvolvedineach1225domain and the connections among them from the viewpoint of system functional 1226composition.ItisbasedonIoTconceptualmodel and reference model. 1227
1228
ISO/IEC30141:####(X)
52 ©ISO/IEC30141–Allrightsreserved
SensingandControllingsystem
PhysicalEntityDomain(PED)-Things
Sensing&ControllingDomain(SCD)
Operations&ManagementDomain(OMD)
ApplicationServiceDomain
(SPD)
Resource&InterchangeDomain(RID)
UserDomain(UD)
Sensedphysicalentity
Basicdataservicesystem&logicrules
Informationresourceinterchangesystem
1
5
14
8
12
18
10
15
Marketresourceinterchangesystem
Businessservicesystem
operationandmanagementsystem
RulesMonitoringsystem
Controlledphysicalentity
3
IoTgatewayornetworks
Userinterfacedevice
1113
Governmentuser Publichumanuser Enterpriseuser
Sensornetworksystems Controllers&ActuatorsRFID/Barcode/2DBarcode
4
2
16919
7
6
17 20
1229
Figure8-9.IoTRASystemview.1230
TheentitydescriptionsarepresentedinTable8-3.1231
Table8-3. Description of Entities in the IoTRASystem view.1232
IoTDomains
DomainEntities
Entitydescriptions
User Domain
User interface device
User interface device is the connection device to support user access to the Internet of things, and to use of service of the Internet of things. Form the general viewpoint the user can be classified as government user, enterprise user, the public user, etc.
Physical entity
Domain
Sensed physical
entity
Sensed physical entity is a physical entity which is related to IoT application, interested by users, and acquired information by sensing equipment.
Controlled physical
entity
Controlled physical entity is a physical entity which is related to IoT application, interested by users, and controlled by controlling equipment.
Sensing & controlling
Domain
IoT gateway or networks
IoT gateway is the entity to support controlling system to connect with other systems, and to manage sensing and controlling Domain. IoT gateway can provide the function of protocol conversion, address mapping, data processing, information fusion, certification, equipment management, etc. IoT gateway is either an independent equipment or it can be integrated with other with sensing and controlling devices. Networks include kinds of communication networks to enable the IoT device accessible for other system.
Sensing & Controlling
Sensing and Controlling system can acquire information and perform operations on related objects through different sensing and controlling
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 53
System function units which achieves a certain local data processing and data fusion. Sensing and controlling system includes sensor network system, label automatic identification system, position information system, audio and video system and intelligent device connection system, etc. It senses and controls objects independently or collaboratively. Meanwhile, it may hold the capabilities of local data acquisition, local data processing, local data analysing, local data storage, etc.
Application Service Domain
Business service system
Business service system provides IoT business services according to the requirement of a particular user. Business service includes information query, analysis and comparison, alarm warning, operation control, joint coordination, etc. Moreover, this system may have functions such as services creation, services execution, service orchestration, service monitoring, etc.
Basic data service
system & logic rules
Basic service system provides foundational service for business service system, which includes data access, data processing, data fusion, data storage, identity resolution, geographic information service and user management, inventory management, etc.
Operation & Managemen
t Domain
Operation & Management
system
Operation and Management system is to guarantee the equipment and systems to operate safely and reliably. It includes system access management, system security management, system operation and system maintenance, etc.
Rules monitoring
system
Rules monitoring system is to guarantee the IoT application system in line with relevant laws It provides inquiry, supervision and execution of the relevant laws and regulations.
Resource & Interchange
Domain
Information Resource & Interchange
system
Information resource & interchange system is to provide or obtain information resource to meet the service requirements of users. It mainly achieves exchange and sharing of resource information between different systems.
Market Resource & Interchange
system
Market resource & interchange system is to provide effective support for IoT application system. It achieves the exchange of information flow, service flow, and capital flow.
1233
TheconnectionsarelistedinTable8-4belowaccordingtotheconnectionnumbersfound1234inFigure8-9above. These connections are generic and optional.1235
Table8-4. Description of the connections between the entities in theIoTRASystem 1236view.1237
# Entity1 Entity2 Descriptions
01Sensed
physical entitySensorNetwork
System
Sensor node acquired physical, chemical,biological properties of Sensed physical entitythroughthisconnection.
02Sensed
physical entityRFID/Barcode/2D
barcode
This connection is the binding relationshipbetween tag and object. The tag reader canautomatically readandwrite thecontent relatedto particular physical entities through the labelattached on the target object. Existing labelsystemgenerallyincludesRFID,barcodeand2D
ISO/IEC30141:####(X)
54 ©ISO/IEC30141–Allrightsreserved
barcode,etc.
03 Controlledphysical entity
Controllers& Actuators
The controllers generate control command and let the actuator act on the controlled physical entity.
04Sensingandcontrolling
systemIoTgateway
IoT gateway adapts and connect to differentsensing and controlling systems through thisconnection,whichrealizesinformationinteractionandsystemmanagement,etc.
05 IoTgatewayBasicdata
servicesystem & logic rules
Basic data service system can connect to IoTgateway through this connection, which realizessharing and interacting of sensing objectinformation and control command information s under permissions.
06 IoTgatewayOperationand
managementsystem
Operation and management system obtains the IoT gateway operation and management state,and sends system and equipment controlcommand,etc.
07 IoTgateway Userinterface device
User interface device obtains local service ofsensingandcontrollingdomain.
08 IoTGateway
Information Resource& Interchangesystem
Information of sensing data can be interchanged with external information systems.
09Basicdata
servicesystem & logic rules
Business servicesystem
The processed data in basic data service system and relevant logic rules are delivered to business service system.
10Business
servicesystemUser interface
deviceUser interface device obtains the relevant IoT services through this connection.
11 Business
service system
MarketResource&Interchange
system
Business service is traded through this connection
12
Information Resource & Interchange
system
Basicdataservicesystem&
logicrules
The information from external system can be transmitted and used.
13 Business
service system
Operationandmanagementsystem
Business service can be operated and managed such as service provision, monitoring, diagnostics, and optimization.
14 Basic data
service system & logic rules
Rulesmonitoringsystem
Rules monitoring system monitors and controls the running state of the basic service system through this connection, which ensures that the operation of basic service system is in compliance with relevant laws and regulations.
15
Market Resource & Interchange
system
Userinterfacedevice
User interface device obtains information on market resource and interchange information.
16
Information Resource & Interchange
system
MarketResource&Interchange
system
Information Resource & Interchange and monetization.
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 55
17
Information Resource & Interchange
system
Rulesmonitoringsystem
The interchanging data is stored and monitored to ensure obedience of the regulations.
18 Operation and management
system
Userinterfacedevice
Some manage user accesses service in operation and management system.
19 Rules
monitoring system
OperationandManagementsystem
Rules monitoring system monitors all the management data and ensures obedience of the regulations.
20
Information Resource & Interchange
system
OperationandManagementsystem
Operation and management system can monitors and controls the running state of the Resource & Interchange system, and ensures that the operation of Resource & Interchange system is in compliance with relevant laws and regulations.
1238
8.3.3 IoT RA Communications view 1239
IoT RA Communications view utilized by the IoT system links the entities for1240data/informationtransmission.1241
IoT RA communications describes the communication relation of each entity of IoT1242system, toprovide thecommunicationsupportandguarantee for IoTservice, suchas1243information collection, information aggregation, information processing, information1244resourcesharing,informationserviceandsystemoperationandcontrol.1245
IoTRACommunicationsviewaddressesfollowingconcepts:1246
⎯ Generic physical entity (device or infrastructure network) capable of building1247
communicationlinksandcommunicationnetworks;1248
⎯ Communication relation between these physical entities,whichmight be physical1249
communicationlink.1250
1251
ISO/IEC30141:####(X)
56 ©ISO/IEC30141–Allrightsreserved
Application Service Domain
User Domain
Intelligent device interface
system
IoT Gateway
Sensing & Controlling Domain
Resource & Interchange Domain
Business service system network
Basicservice system network
CRAI-23
CRAI-01
CRAI-22
CRAI-18
CRAI-11
CRAI-17
CRAI-20
CRAI-13
CRAI-16
CRAI-21
CRAI-12
Operation & Management Domain
Resource interchange system network
Operation and maintenance System
network
CRAI-15
Mobileterminal
Internetterminal
Specialterminal
WLANterminal
Userterminal
Sensornetworknode
Sensornetworknode
CRAI-02
LabelR/Ddevice
CRAI-03
CRAI-04
None-IP Audio and video device
CRAI-05
IP Audio and video
device
CRAI-06
CRAI-07
Position information
system
CRAI-10
Physical Entity Domain Smart controlled
entitySmart sensed
entity
CRAI-08 CRAI-09
Regulation system network
CRAI-14
Label
Domain
Entity
InterfaceCRAI-X
User terminal access network
CRAI-25
CRAI-24CRAI-19
1252Figure8-10.IoTRACommunicationsview.1253
The entities related to the Internet of things communications reference architecture as1254shownin Table 8-5. These connections are optional.1255
Table8-5. Descriptions of entities in theIoTRACommunicationview.1256
IoTDomains
DomainEntities
Entitydescriptions
User domain
User terminal
User terminal is the interactive device to support the user access and use IoT services. From the communication access method point of view, the user terminal includes mobile terminal, internet terminal, WLAN terminal and special terminal.
User terminal access
network
For user terminal to access the network that provides IoT services.
Physical Entity
domain
Smart sensed entity
Smart sensed entity is a physical entity relating to the IoT application, and users’ interest, which obtains relevant information through digital or analogue connection. The sensed entity have direct communication connection with intelligent device interface system.
Smart controlled
entity
Smart controlled entity is a physical entity relating to the IoT application and users interest, which obtains relevant information through digital connection. The smart controlled entity has direct communication connection with intelligent device interface system.
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 57
Sensing & controlling
domain
IoT gateway
From the perspective of network communication, IoT gateway mainly realizes the connection between sensing control system and other IoT service system, including protocol translation, address mapping, security authentication, network management and other functions. At the same time, as the interaction centre of service related sensing and control system, the IoT gateway coordinates and manages different sensing control systems. When the sensing control system uses the IP address, IoT gateway can be designed as an application logic device.
Sensor network node
Sensor network nodes are generic terms of various function units in sensor network, including sensor node, sensor network gateway, etc. It mainly completes the information collection and controlling, information processing, network communication and network management.
Label R/D device
Label R/D device is an electronic equipment to access data and (or) write data to label.
Label The label has information storage and read/write functions, which is used to identify and describe the characteristics of an object. It mainly includes RFID, bar code, two-dimensional code label.
IP audio and video system
IP audio and video system is to get audio and video information of object based on IP network device.
Non-IP audio and video
system
Non-IP audio and video system is to get audio and video information of object based on non-IP network device.
Intelligent device
connection system
Intelligent device connection system is used to connect smart sensing entity and smart control entity, and implement data interaction. It provides network communication, data processing and protocol transition function.
Position information
system
Position information system obtains sensing object position information based on the localization technologies.
Application service domain
Basic service system
network
Basic service system network is a communication network to support interconnection and interworking between entities in the basic service system and interaction with other external entities. Generally it adopts local area network construction and implements interconnection and interworking with external network according to some level of security.
Business service system
network
Business service system network is a communication network to support interconnection and interworking between entities in the business service system and interaction with other external entities. It supports multi-communication access method for different terminals.
Operation & Managemen
t domain
Operation and maintenance
system network
Operation and maintenance system network is a communication network to support interconnection and interworking between the entities in operation and maintenance system and interaction with other external entities. Generally it adopts local area network construction and implements interconnection and interworking with external network according to some level of security.
ISO/IEC30141:####(X)
58 ©ISO/IEC30141–Allrightsreserved
Regulation system
network
Regulation system is a communication network to support interconnection and interworking between entities in the regulation system and interaction with other external entities. Generally it adopts local area network construction and implements interconnection and interworking with external network according to some level of security.
Resource & Interchange
domain
Resource & Interchange
system network
Resource & interchange system network is a communication network to support interconnection and interworking between entities in the resource & interchange system and interaction with other external entities. Resource & interchange system also provides the interconnection and interworking between the IoT application systems with other IoT application systems or information resource networks.
Table8-5providestheconnectiondescriptionsforIoTRACommunication1257technologyview.1258
8.3.4 IoT RA Information view 1259
IoTRA Informationviewdescribes thephysical entities (data carrier) in eachdomain1260fromdataperspective,whichgeneratedata,processdata(dataclassification),transmit1261data(datasource)orreceivedata(datadestination).Beginningwiththis,theentitiesas1262data carrier, data classification within the entities and data transmission between1263entitiesareneededtobedefined. IoTRAInformationviewinformsthedataattributes1264that is handled in an IoT system. It provides necessary information to various1265information consumers, which utilizes the communication links described by the1266communicationview.1267
IoTRAInformationviewaddressesthefollowingconcepts:1268
⎯ Generic physical entities that fromdata perspectivewhich generate data, process1269
data (data classification), transmit data (data source) or receive data (data1270
destination);1271
⎯ Datatransmissionrelationsbetweenthesephysicalentities,whichemphasizedata1272
transmissiontypes,suchasbusinessdata,managementdata,etc.1273
InFigure8-11,IoTRAinformationviewisshownwiththegeneric, representative entities1274involvedandtheconnectionsbetweenthem.1275
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 59
UserDomain
Operation&ManagementDomain
Sensing&ControllingDomain
ApplicationServiceDomain
PhysicalEntityDomain
RegulationManagement
OperationandMaintenanceManagement
BusinessServiceSystemInformationResourceInterchangeManagement
MarketResourceInterchangeManagement
Sensedentity
IoTGateway
SensingandControllingSystem
Controlledentity
BasicServiceSystem
IRAI-09
IRAI-04
IRAI-03
IRAI-01 IRAI-02
IRAI-05
IRAI-15
IRAI-11
IRAI-06
Domain
Entity
InterfaceIRAI-X
IRAI-14
IRAI-16
BusinessUserSystem
IRAI-07
IRAI-17
IRAI-08
IRAI-18
IRAI-19
IRAI-13
IRAI-12
IRAI-20
IRAI-10IRAI-21
IRAI-22
ManagementUserSystem
Resource&InterchangeDomain
1276
Figure8-11.IoTRAInformationview.1277
The entities found in IoT RA information view are described in Table 8-6 below. The1278connectionsbetweenthemareoptional.1279
Table8-6Descriptions of the entities in the IoT RA information view.1280
IoTDomains DomainEntities Entitydescriptions
User Domain
Business User System
Business User System is a system of end users to invoke or request IoT services. Users also receive the service results through this system, e.g., data or information.
Management User System
Management User System is for the end users to inquire, obtain, and manage devices of an IoT system and system operating status.
Physical Entity Domain
Sensed entity Sensed entities, e.g., sensors, are physical entities related to IoT applications which acquire data by sensing equipment. Smart sensed entities generate, store and process local object information.
Controlled entity
Controlled entities are entities related to IoT applications and they are manipulated by controlling equipment which receives control signals from Sensing and Controlling System.
Sensing & Controlling
Domain
Sensing and Controlling
System
Sensing and Controlling System performs information collection, information processing, information transmission, and object control. From the information point of view, it generates sensing data and/or information about the object of interest. It also generates or receives control data and performs control operations.
IoT Gateway IoT Gateway achieves the collection, processing, and encapsulation of the sensing data, including format and application conversion of heterogeneous sensing data along with protocol translation for
ISO/IEC30141:####(X)
60 ©ISO/IEC30141–Allrightsreserved
IoTDomains DomainEntities Entitydescriptions
interoperability in a heterogeneous device and network environment.
Application Service Domain
Basic Service System
Basic Service System performs basic service and supports the services provided by Business Service System. For example, the basic services include data processing, data sharing, data storage, identity resolution, geographic information, etc.
Business Service System
Business Service System achieves IoT application service by calling basic service and external data and provides IoT service for end users.
Operation &Management
Domain
Operation and Maintenance Management
Operation and Maintenance Management is to guarantee the reliability and security of IoT systems via management and maintenance of the devices and system data. From the information point of view, it detects the system failure so as to guarantee the stability, reliability, and security of the information transmission for each communication/data link in the IoT systems.
Regulation Management
Regulation Management provides the data connection for the data storage, sort management, and quick reference of relevant laws and regulations. It performs supervision to check if the data from the IoT systems and their business services comply with regulations. Regulation Management also provides comparison analysis of the information data between the IoT application systems and the relevant regulations so that any regulatory violation can be prevented, or if the violation occurs, it can be properly handled.
Resource & Interchange
Domain
Information Resource & Interchange
Management
Information Resource & Interchange System is to manage resource sharing and interchange between the IoT system and other systems. Its realizable functions include, but not limited to, information classification management, information interchange security certification, and information interchange mode management.
Market Resource & Interchange
Management
Market Resource & Interchange Management is to manage the shared information and service transaction relevant to the IoT systems so as to achieve the transaction information generation, transaction information management, and transaction user management.
1281
8.3.5 IoT RA Usage view 1282
During the functional view shows the necessary function and dependency of the IoT1283system, theusageviewsets the focusonhow the IoT systembeingdeveloped, tested,1284operatedandusedfromuserperspective.Thisviewaddressesthefollowingconcepts:1285
⎯ activities;1286
⎯ rolesandsub-roles;1287
⎯ parties;1288
⎯ services;and1289
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 61
⎯ cross-cuttingaspects.1290
8.3.5.1 Description of the Roles 1291
• A Business Manager is leading a business of existing and new products, who wants to 1292understand how to leverage the data and connectivity of devices to create new 1293streams of revenue. He will discover industry content on company web site and act on 1294solution proposals from Architect. Business manager is generally a funder for IoT 1295applications. 1296
• A Solution Architect proposes, proves and deploys the IoT enabled platform to the 1297LOB. He decides in integration strategies and architectures for the new IoT enabled 1298platform, existing business systems and devices in production. 1299
• A DevOps Manager configures and operates the IoT enabled platform, relevant 1300services and supporting IT services for LOB operations and development. 1301
• An Application Developer works in the LOB, in IT or with a 3rd party. He develops 1302IoT industry applications for the LOB. He uses DevOps capabilities to develop, 1303deploy and fix applications that integrate IoT device data and services. 1304
• A Chip Engineer develops silicon devices and sensors. He delivers chips, devices and 1305boards for industry and consumer products. 1306
• A Device Developer integrates HW and SW into devices and appliances. He develops 1307and maintains 1308
• device firmware that securely connects devices to IoT enabled platform. 1309• A Systems Engineer with the chip provider integration partner works with Device 1310
Developer to integrate chips and sensors into the product line. 1311• A System Operator handles the day to day system operations on customer by on-1312
boarding new users, and makes sure that new device types and devices are registered, 1313are behaving, and are up to date with recent secure firmware. 1314
• A Security Analyst ensures security by proactively by creating rules that detects 1315threats and prevents breaches. He creates automation that acts on misbehaving 1316devices and users. And he ensures compliance through audits. 1317
• A Data Scientist knows all about the industry data delivered from devices and the 1318algorithms that provide meaningful analytics. He implements advanced algorithms as 1319services to be used by the LOB analysts and LOB industry applications. 1320
• An Operations Analyst is responsible for the availability of specific assets in the LOB 1321product line and uses deeper analytics provides by Analytics in the IoT Foundation 1322platform and Ryan’s algorithmic service extensions. 1323
• A Service Delivery Manager is responsible for a SLA with a client to the LOB. He 1324and his team of maintenance engineers are on or near the client site and managed 1325equipment and uses the IoT enabled platform and LOB industry applications to 1326monitor, plan and service equipment. 1327
ISO/IEC30141:####(X)
62 ©ISO/IEC30141–Allrightsreserved
8.3.5.2 Roles and activities during the product life cycle 1328
13298.3.5.3 Roles & Sub-Roles for IoT Service Development and Operations 1330
1331
1332 1333
8.3.6 IoT Business view 1334
Editors’ Note: The text for IoT business view is not updated since the initial1335contribution fromCanadianexpert. Itshouldbedeterminedwhetherdeletedornot in1336theadhocgroupforRAviewswhichisestablishedafterShanghaimeeting.1337
1338
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 63
The following businessmodel reflects the emerging division of service providers and1339stakeholdersfoundinthebusinessecosystemoftheIoT.1340
1341
Figure8-13.IoTBusinessModel.1342
Table8-7.HorizontallayersintheIoTbusinessmodelinFigure8-13.1343
Horizontalelement Definition
Endpoint Theelementswhichcollect/sense/receivedatafromusersorthephysicalworld.
Gateways Deviceswhichfacilitatethetransmissionofthedatafromendpointstobackhaulnetworksconnectedendpointtocentralizedservices.
Networks Standards-based,backhaulnetworksdesignedtoverywiderangesofservicelevels,andtransmitdataovermediumtogreatdistances.
DataCentre/Cloud Theaggregationpointsfordatafromtheendpoints,andlocationofeithercentralizedapplicationsprocessingorapplicationmanagementandmonitoring.Bigdatarepositories.
1344
Table8-8.VerticalIoTstakeholdersinthebusinessmodelinFigure8-13.1345
Verticalelement Definition
Usersandowners ThebeneficialoperatorofthedeviceintheIoT.
Applications Thesystemandprocessesspecificallyconfiguredforthebeneficialusersandoperators/owners.
ApplicationPlatformServiceprovider
Aflexible,configurable,multi-tenantedplatformsuponwhichdistinctapplicationscanbeconfigured,installedordeveloped.ManyIoTsystemswillbebuiltfromcomponentelements,notasingle,monolithicdesign.Requirementsestablishedforthesystemshouldbeviableinthecontextofthedifferentvendors’platformssolutionsthatmustbeintegrated.
ISO/IEC30141:####(X)
64 ©ISO/IEC30141–Allrightsreserved
InfrastructureService-providersandOperators
Whoismanagingthebasicphysicalandlogicalelementsattheendpoint,inthenetworkandDCorCloud?Telecommunicationscarrierswillfrequentlybepartofthismix,butsotoomayentirelyprivateordedicatednetworks.Theconnectionpointsbetweeneachoftheassethorizontals”mayhavetheirownindependentbrokersandaggregators,inadditiontotheprovidersthemselves.
DeviceManufacturers Theproducersofthephysicalandlogicalelementsofend-point,networkanddatacentre/clouddevices.Whoisbuildingthephysicaldevicesthatcomposethesolutionattheendpoint,gateway,insidethenetworkandwithintheDCorCloud?Theywillbebuildingthesameequipmenttosupportmanydifferentclientsandapplications.Theyareseekingtomaximizeutilityoffeaturesandfunctionsand(probably)minimizecosts.
SupplychainandInterdependentthirdparties
Whoisprovidingcritical(minutetominute)inputsonadirectbasislikeenergy,physicalsecurity,water,physicalspace,manpower?Whoisprovidingcriticalinputstothecriticalinputs?(Secondarydependencies/cascadedependencies?)Forinstance:publicsecurityandemergencyservices,utilities,shippingandlogistics,out-of-bandcommunicationsandnetworking?WhoisdependingontheUsers,andtheirabilitywithintheIoTandthegivenIoTsystemunderassessment?WhoaretheUsersdependingontoprovidenecessarygoodsorservices(information)requiredfortheoperationoftheIoTsystemunderconsideration?
Regulators Fromlocaletolocaleregulationmaydiffer.InsomelocaletheparticularapplicationorsystemwithintheIoTmayberegulated,andinotherslaissez-faire.Whatlevelofgovernmenthasoversight?Whatsanctionscantheyexerciseforregulatorybreech?Whataretheconditionsoflicensure?
1346
1347
1348
1349
1350
1351
1352
ISO/IEC30141:####(X)
©ISO/IEC30141–Allrightsreserved 65
AnnexA.1353
Editor’sNote:CommentsfromWG104thmeetinginShanghai,thedescriptionof‘overall1354IoTinfrastructureathigh-level’ismovedfromclause8toAnnexA.1355
OverallIoTinfrastructureatHigh-level 1356
Figure Annex-1 shows the way of combining one IoT system to another IoT system. The 1357arrows in the figure represent the communication and data exchange between the IoT systems, 1358which is enabled by the Resource & Interchange domain (RID) in each IoT systems. The 1359combining approaches are show with an IoT System connecting to another IoT system, e.g., 1360IoT System A and IoT System B and System C in figure 8-6. 1361
Operations&Management
Domain(OMD)
Resource&InterchangeDomain(RID)
ApplicationServiceDomain(ASD)
Sensing&ControllingDomain(SCD)
PhysicalEntityDomain(PED)-Things
UserDomain(UD)
IoTSystemA
Operations&Management
Domain(OMD)
Resource&InterchangeDomain(RID)
ApplicationServiceDomain(ASD)
Sensing&ControllingDomain(SCD)
PhysicalEntityDomain(PED)-Things
UserDomain(UD)
IoTSystemB
Operations&ManagementDomain(OMD)
Resource&InterchangeDomain(RID)
ApplicationServiceDomain(ASD)
Sensing&Con
trollin
gDo
main(SCD
)
PhysicalEntity
Dom
ain
(PED
)-Things
UserD
omain(UD)
IoTSystemC 1362
Figure Annex-1. IoT system to IoT system integration types. 1363
In Figure Annex-1, an overall IoT infrastructure from systems point of view which illustrates 1364how various types of IoT systems in vertical application/service domains are integrated for 1365interoperability through the IoT platform(s) at different organizational levels (e.g. national, 1366provincial, corporation/enterprise-wide, etc.). Additionally, one IoT system can also directly 1367interact with other IoT systems when both IoT systems mutually benefit from the direct 1368interaction. Furthermore, an IoT system can have the third party organization supports which 1369are not within its IoT system such as banking/financial service, medical service, billing 1370service, etc. The lines in Figure Annex-1 represent network connectivity, and the grey circles 1371represent interoperable access points (e.g. IoT gateways). 1372