Page 551 - 5G Basics - Core Network Aspects
P. 551
Applications 1
– Location-based capabilities: Location-based capabilities need to be supported in the IoT. Something-
related communications and services will depend on the location information of things and/or users.
It is needed to sense and track the location information automatically. Location-based
communications and services may be constrained by laws and regulations, and should comply with
security requirements.
– Security: In the IoT, every 'thing' is connected which results in significant security threats, such as
threats towards confidentiality, authenticity and integrity of both data and services. A critical
example of security requirements is the need to integrate different security policies and techniques
related to the variety of devices and user networks in the IoT.
– Privacy protection: Privacy protection needs to be supported in the IoT. Many things have their
owners and users. Sensed data of things may contain private information concerning their owners
or users. The IoT needs to support privacy protection during data transmission, aggregation, storage,
mining and processing. Privacy protection should not set a barrier to data source authentication.
– High quality and highly secure human body related services: High quality and highly secure human
body related services needs to be supported in the IoT. Different countries have different laws and
regulations on these services.
NOTE – Human body related services refer to the services provided by capturing, communicating and
processing the data related to human static features and dynamic behaviour with or without human
intervention.
– Plug and play: Plug and play capability needs to be supported in the IoT in order to enable on-the-
fly generation, composition or the acquiring of semantic-based configurations for seamless
integration and cooperation of interconnected things with applications, and responsiveness to
application requirements.
– Manageability: Manageability needs to be supported in the IoT in order to ensure normal network
operations. IoT applications usually work automatically without the participation of people, but their
whole operation process should be manageable by the relevant parties.
8 IoT reference model
Figure 4 shows the IoT reference model. It is composed of four layers as well as management capabilities and
security capabilities which are associated with the four layers.
The four layers are as follows:
– application layer
– service support and application support layer
– network layer
– device layer.
541