Module 2
Module 2
1
29-07-2023
2
29-07-2023
Physical Entity
Device
Virtual Entity
Sensors
Actuators
Tags
Information ModelSpecification
• Information Model defines the structure of all the
information in the IoT system
• Attributes of Virtual Entities, relations, etc.
• To define the information model, we first list the
Virtual Entities defined in the Domain Model
• Information model adds more details to the Virtual
Entities by defining their attributes and relations
• Important meta-information is, e.g., at what time a value
was measured (i.e. time stamp), the location where a
measurement took place, or the quality of the
measurement.
3
29-07-2023
Functional Model
4
29-07-2023
IoT service
For a sensor type of a resource, the IoT service FC includes Services that receive
requests from a User and returns the Sensor Resource value in synchronous or
asynchronous (e.g. subscription/notification) fashion.
5
29-07-2023
6
29-07-2023
Communication Model
7
29-07-2023
Publisher-Subscriber Model
Push-Pull Model
The push-pull model constitutes data publishers, data consumers, and data queues.
•Publishers and Consumers are not aware of each other.
•Publishers publish the message/data and push it into the queue. The consumers, present on the other side,
pull the data out of the queue. Thus, the queue acts as the buffer for the message when the difference
occurs in the rate of push or pull of data on the side of a publisher and consumer.
•Queues help in decoupling the messaging between the producer and consumer. Queues also act as a
buffer which helps in situations where there is a mismatch between the rate at which the producers push
the data and consumers pull the data.
8
29-07-2023
Exclusive Pair
Security model
Safety
the can only provide IoT-related guidelines for ensuring a safe system to the extent possible and
controllable by a system designer.
Eg: smart grid.
Privacy
Because interactions with the physical world may often include humans, protecting the User privacy is of utmost
importance for an IoT system. The IoT-A Privacy Model depends on the following functional components:
Identity Management, Authentication, Authorization, and Trust & Reputation
Trust
Generally, an entity is said to ‘trust’ a second entity when the first entity makes the assumption that the second
entity will behave exactly as the first entity expects.”
Security
The Security Model for IoT consists of communication security that focuses mostly on the confidentiality and
integrity protection of interacting entities and functional components such as Identity Management,
Authentication, Authorization, and Trust & Reputation.