Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Do we need a special identitfier or is there already an “Identifier" for the Internet of Things”?

When there is no dedicated identifier for the IoT, how can things with different identifier from different standards, protocols and domains communicate with each other?


What is special about privacy in the IoT?

...

see details in our paper published in the proceedings of the IEEE World Forum on Internet of Things (WF-IoT) 2014:  Challenges from the Identities of Things

 

Anchor
2
2

 


Do we need a special identitfier or is there already

...

“the Identifier" for the Internet of Things”?

There are many standards, protocols and existing solutions in the area of IoT. (see a There is no special identifier for IoT. And there won't be one kind of Identifier.

 

 

mapping and discovery become important services of larger IoT deployments. Let's give an example: A street lamp might have a field bus address consisting of 2 bytes. It is connected with a gateway. Within the gateway the lamp is mapped to "lamp Many standards defacto standards, protocols and solutions exist in the area of IoT. There are variuos kinds of identifier with diffent characteristics suitable for specific purposes. (for details see our Identifier Survey).

Anchor
3
3

When there is no dedicated identifier for the IoT, how can things with different identifier from different standards, protocols and domains communicate with each other?

Due to diffferent identifier, protocols and domains mapping and discovery become important services in large IoT deployments with differnt systems, standards and domains. Let's give an example: A street lamp might have a field bus address consisting of 2 bytes. It is connected with a gateway. Within the gateway the lamp is mapped to "lamp 123". A lamp management system can switch on and off "lamp123" intertnally. Via a REST interface the lamp management system exposes the lamp for example as oneM2M "application entity". So other management systems can switch the lamp by sending messages to a specific oneM2M URL. In this example a thing (lamp) is identified with different identifiers that are maped to each other.

Policy controled mapping

The mapping process consists of different steps. In every step can be controlled by access policiesare mapped to each other (field bus address, internal ID, oneM2M-URL).

Anchor
4
4

The lack of an IoT identitfier makes IoT architectures more complicate?

It takes more effort to find and map various identifier but the mapping process gives also the possibility to implement access control mechanisms. Only entitled service or user are able to rersolve or discover the identifier of a thing.This way its possible to control whether an identifier is visible or not or who can "see" a certain thing or not. In our example the policy check could be implemented in the lamp management system or with the REST API.

...

(see an example of a universal mapping and discovery service IMaDS of the EU project "reTHINK" published in the proceedings of EuCNC 2017 (tbd in July2017))

Anchor
5
5

Is the classic Domain Name Service obsolete in the IoT?

In most cases DNS (Domain Name Service) can't be used directly. DNS was designed to map between IP-addresses and human readable domain names. DNS is not able to handle identifier formats from various IoT protocols. It is also not possible to propagate changes in a very short time.But DNS has a outstanding governance process that ensures world-wide unique identifiers. So DNS is at least part of most mapping processes. In our example DNS might be used to find the company domain of the lamp management or the address of the REST API.

 

Anchor33 

What is special about privacy in the IoT?

...