Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Concepts of the IoT functional framework  
        6.1     Openness and interoperability of the IoT capabilities  
        6.2     Completeness, implementability and applicability of the IoT capabilities             
        6.3     The different views of the IoT functional framework   
 7     The IoT functional framework           
        7.1     The IoT functional framework in functional view           
        7.2     The IoT functional framework in implementation view               
        7.3     The IoT functional framework in deployment view       
 8     The IoT basic capabilities     
        8.1     Service provision capabilities  
        8.2     Communication capabilities     
        8.3     Application support capabilities             
        8.4     Data management capabilities               
        8.5     Management capabilities         
        8.6     Connectivity capabilities           
        8.7     Security and privacy protection capabilities      
 9     IoT capabilities for integration of key emerging technologies              
        9.1     Capabilities for integration of cloud computing technologies    
        9.2     Capabilities for integration of big data technologies     
10     Security considerations      
Annex A – The IoT capabilities list    
Appendix I – Matching analysis between requirements and capabilities of the IoT    
        I.1     Matching analysis of non-functional requirements of the IoT   
        I.2     Matching analysis of application support requirements of the IoT          
        I.3     Matching analysis of service requirements of the IoT   
        I.4     Matching analysis of communication requirements of the IoT  
        I.5     Matching analysis of device requirements of the IoT    
        I.6     Matching analysis of data management requirements of the IoT            
        I.7     Matching analysis of security and privacy protection requirements of the IoT