Page 156 - Unleashing the potenti al of the Internet of Things
P. 156

3                                     Unleashing the potential of the Internet of Things

            8.5     Autonomic services provisioning

            The services may be provided by capturing, communicating and processing automatically the data of
            things based on the rules configured by operators or customized by subscribers. Autonomic services
            may  depend  on  the  techniques  of  automatic  data  fusion  and  data  mining.  Some  things  may  be
            equipped with actuators to act on the surrounding environment.

            8.6     Location-based capabilities
            The IoT as a whole supports location-based services. Location-based capabilities may be optionally
            supported by IoT applications. Certain types of communications and services will depend on the
            location information of things and/or users. It is required to sense and track the location information
            automatically, unless security and/or privacy concerns dictate otherwise, when location information
            is necessary for an IoT application.


            8.7     Security
            Generally  accepted  measures  for  providing  confidentiality,  authenticity  and  integrity  of  data  are
            required to be provided to the things and servers after a proper threat-analysis is performed. The
            proper threat-analysis is required to pay attention the characteristics of an IoT application in particular
            (see clause 7.14)


            8.8     Privacy protection
            Privacy protection is required to be supported in the IoT. IoT applications are required to support
            privacy protection during data transmission, aggregation, storage, mining and processing. Privacy
            protection is recommended to strike a balance and not to impose an undue a barrier to data source
            authentication provided by the authentication requirement.

            8.9     Plug and play

            Plug and play capability is an important feature to be supported in the IoT in order to enable on-the-
            fly generation for seamless integration and cooperation of interconnected things with applications,
            and  for  improving  responsiveness  of  things  to  application  requirements.  IoT  applications  are
            recommended to support plug and play features (see clauses 7.8 and 7.13).

            8.10    Manageability

            Manageability is required to be supported in the IoT in order to ensure normal network operations.
            IoT applications usually work automatically without people's participation, but their whole operation
            process should be manageable by the relevant parties.

            8.11    Compliance with laws and regulations

            Communications and services may be constrained by laws and regulations. Such constraints are often
            found in location-based services (see clause 8.6), and services related to human body.

            Often  security  and  privacy  requirements  are  imposed  by  laws  and  regulations  (see  clauses  8.7
            and 8.8). These are required to be obeyed in a global manner and IoT applications must meet local
            requirements as well.


            8.12    Awareness of service
            Even though IoT services are generally available without human intervention, humans (the users of
            IoT services) may need to be aware of IoT services surrounding them. When IoT services are provided
            to  a  user,  it  is  recommended  that  the  user  be  able  to  notice  (discover)  their  presence.  This  has
            implication for security and privacy protection (for example surveillance, see clauses 8.7 and 8.8)
            [b-EC-PRIVACY].



            142      Rec. ITU-T Y.4103/F.748.0 (10/2014)
   151   152   153   154   155   156   157   158   159   160   161