Page 29 - Unleashing the potenti al of the Internet of Things
P. 29

Unleashing the potential of the Internet of Things                         1

            8.5     Management capabilities

            In  a  similar  way  to  traditional  communication  networks,  IoT  management  capabilities  cover  the
            traditional fault, configuration, accounting, performance  and  security  (FCAPS)  classes,  i.e., fault
            management, configuration management, accounting management, performance management and
            security management.
            The  IoT  management  capabilities  can  be  categorized  into  generic  management  capabilities  and
            specific management capabilities.
            Essential generic management capabilities in the IoT include:

            –       device  management,  such  as  remote  device  activation  and  de-activation,  diagnostics,
                    firmware and/or software updating, device working status management;

            –       local network topology management;
            –       traffic and congestion management, such as the detection of network overflow conditions
                    and  the  implementation  of  resource  reservation  for  time-critical  and/or  life-critical  data
                    flows.

            Specific management capabilities are closely coupled with application-specific requirements, e.g.,
            smart grid power transmission line monitoring requirements.

            8.6     Security capabilities
            There  are  two  kinds  of  security  capabilities:  generic  security  capabilities  and  specific  security
            capabilities. Generic security capabilities are independent of applications. They include:
            –       at the application layer: authorization, authentication, application data confidentiality and
                    integrity protection, privacy protection, security audit and anti-virus;
            –       at  the  network  layer:  authorization,  authentication,  use  data  and  signalling  data
                    confidentiality, and signalling integrity protection;
            –       at the device layer: authentication, authorization, device integrity validation, access control,
                    data confidentiality and integrity protection.
            Specific  security  capabilities  are  closely  coupled  with  application-specific  requirements,  e.g.,
            mobile payment, security requirements.




































                                                                  Rec. ITU-T Y.4000/Y.2060 (06/2012)       15
   24   25   26   27   28   29   30   31   32   33   34