Page 156 - Unleashing the potenti al of the Internet of Things
P. 156
3 Unleashing the potential of the Internet of Things
8.5 Autonomic services provisioning
The services may be provided by capturing, communicating and processing automatically the data of
things based on the rules configured by operators or customized by subscribers. Autonomic services
may depend on the techniques of automatic data fusion and data mining. Some things may be
equipped with actuators to act on the surrounding environment.
8.6 Location-based capabilities
The IoT as a whole supports location-based services. Location-based capabilities may be optionally
supported by IoT applications. Certain types of communications and services will depend on the
location information of things and/or users. It is required to sense and track the location information
automatically, unless security and/or privacy concerns dictate otherwise, when location information
is necessary for an IoT application.
8.7 Security
Generally accepted measures for providing confidentiality, authenticity and integrity of data are
required to be provided to the things and servers after a proper threat-analysis is performed. The
proper threat-analysis is required to pay attention the characteristics of an IoT application in particular
(see clause 7.14)
8.8 Privacy protection
Privacy protection is required to be supported in the IoT. IoT applications are required to support
privacy protection during data transmission, aggregation, storage, mining and processing. Privacy
protection is recommended to strike a balance and not to impose an undue a barrier to data source
authentication provided by the authentication requirement.
8.9 Plug and play
Plug and play capability is an important feature to be supported in the IoT in order to enable on-the-
fly generation for seamless integration and cooperation of interconnected things with applications,
and for improving responsiveness of things to application requirements. IoT applications are
recommended to support plug and play features (see clauses 7.8 and 7.13).
8.10 Manageability
Manageability is required to be supported in the IoT in order to ensure normal network operations.
IoT applications usually work automatically without people's participation, but their whole operation
process should be manageable by the relevant parties.
8.11 Compliance with laws and regulations
Communications and services may be constrained by laws and regulations. Such constraints are often
found in location-based services (see clause 8.6), and services related to human body.
Often security and privacy requirements are imposed by laws and regulations (see clauses 8.7
and 8.8). These are required to be obeyed in a global manner and IoT applications must meet local
requirements as well.
8.12 Awareness of service
Even though IoT services are generally available without human intervention, humans (the users of
IoT services) may need to be aware of IoT services surrounding them. When IoT services are provided
to a user, it is recommended that the user be able to notice (discover) their presence. This has
implication for security and privacy protection (for example surveillance, see clauses 8.7 and 8.8)
[b-EC-PRIVACY].
142 Rec. ITU-T Y.4103/F.748.0 (10/2014)