Already a subscriber?
MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
IEEE Standard for an Architectural Framework for the Internet of Things (IoT), 2019
- IEEE Std 2413™-2019 Front cover
- Title page
- Important Notices and Disclaimers Concerning IEEE Standards Documents
- Participants
- Introduction
- Contents
- 1. Overview [Go to Page]
- 1.1 Scope
- 1.2 Purpose
- 1.3 Introduction to the Internet of Things (IoT)
- 1.4 Architecture method
- 2. Normative reference
- 3. Definitions, acronyms, and abbreviations [Go to Page]
- 3.1 Definitions
- 3.2 Acronyms and abbreviations
- 4. IoT domains [Go to Page]
- 4.1 Abstract IoT Domain
- 4.2 Smart Manufacturing
- 4.3 Smart Grid
- 4.4 Smart buildings
- 4.5 Intelligent Transport Systems [Go to Page]
- 4.5.1 General
- 4.5.2 EVs as an element of the ITS domain
- 4.6 Smart Cities [Go to Page]
- 4.6.1 General
- 4.6.2 Intelligent Operation Center as an element of a Smart Cities domain
- 4.7 Healthcare
- 5. Domain commonalities and common concerns [Go to Page]
- 5.1 Stakeholders
- 5.2 Common concerns
- 6. Architecture framework [Go to Page]
- 6.1 General information
- 6.2 Viewpoints and model kinds
- 6.3 Architecture development
- 6.4 Rationale for key decisions
- 6.5 Stakeholders and concerns
- 6.6 Viewpoint catalogue [Go to Page]
- 6.6.1 Overview
- 6.6.2 Conceptual viewpoint [Go to Page]
- 6.6.2.1 General information and key features
- 6.6.2.2 Stakeholders and concerns
- 6.6.2.3 Anti-concerns for this viewpoint
- 6.6.2.4 Model kinds [Go to Page]
- 6.6.2.4.1 General
- 6.6.2.4.2 Entity model kind [Go to Page]
- 6.6.2.4.2.1 Objective
- 6.6.2.4.2.2 Conventions
- 6.6.2.4.2.3 Correspondence rules
- 6.6.2.4.3 System model kind [Go to Page]
- 6.6.2.4.3.1 Objective
- 6.6.2.4.3.2 Conventions
- 6.6.2.4.3.3 Operations
- 6.6.2.4.3.4 Correspondence rules
- 6.6.2.4.4 Intent model kind [Go to Page]
- 6.6.2.4.4.1 Objective
- 6.6.2.4.4.2 Conventions
- 6.6.2.4.4.3 Operations
- 6.6.2.4.4.4 Correspondence rules
- 6.6.2.4.5 IoT component model kind [Go to Page]
- 6.6.2.4.5.1 Objective
- 6.6.2.4.5.2 Conventions
- 6.6.2.4.6 IoT component capability model kind [Go to Page]
- 6.6.2.4.6.1 Objective
- 6.6.2.4.6.2 Conventions
- 6.6.2.4.7 Representation model kind [Go to Page]
- 6.6.2.4.7.1 Objective
- 6.6.2.4.7.2 Conventions
- 6.6.2.4.7.3 Correspondence rules
- 6.6.2.4.7.4 Notes
- 6.6.3 Compatibility viewpoint [Go to Page]
- 6.6.3.1 General information and key features
- 6.6.3.2 Stakeholders and concerns
- 6.6.3.3 Model kind: compatibility level [Go to Page]
- 6.6.3.3.1 Compatibility level conventions [Go to Page]
- 6.6.3.3.1.1 General
- 6.6.3.3.1.2 Model kind languages or notations
- 6.6.3.3.1.3 Model kind meta-model
- 6.6.3.4 Operations on views
- 6.6.3.5 Correspondence rules
- 6.6.4 Lifecycle viewpoint [Go to Page]
- 6.6.4.1 General information and key features
- 6.6.4.2 Stakeholders and concerns
- 6.6.4.3 Anti-concerns
- 6.6.4.4 Model kind: lifecycle sequence [Go to Page]
- 6.6.4.4.1 General
- 6.6.4.4.2 Model kind languages or notations
- 6.6.4.4.3 Lifecycle sequence correspondence rules
- 6.6.4.5 Correspondence rules
- 6.6.5 Communication viewpoint [Go to Page]
- 6.6.5.1 General information and key features
- 6.6.5.2 Stakeholders and concerns [Go to Page]
- 6.6.5.2.1 Typical stakeholders
- 6.6.5.2.2 Concerns
- 6.6.5.2.3 Anti-concerns
- 6.6.5.3 The mathematics of communication model kind [Go to Page]
- 6.6.5.3.1 General
- 6.6.5.3.2 The mathematics of communication model kind conventions
- 6.6.5.3.3 The mathematics of communication model kind languages or notations
- 6.6.5.3.4 The mathematics of communication model kind meta-model
- 6.6.5.3.5 The mathematics of communication model kind templates
- 6.6.5.3.6 The mathematics of communication model kind operations
- 6.6.5.3.7 The mathematics of communication model kind correspondence rules
- 6.6.5.4 OSI reference model kind [Go to Page]
- 6.6.5.4.1 General
- 6.6.5.4.2 OSI reference model kind conventions [Go to Page]
- 6.6.5.4.2.1 General
- 6.6.5.4.2.2 OSI reference model kind languages or notations
- 6.6.5.4.2.3 OSI reference model kind meta-model
- 6.6.5.4.2.4 OSI reference model kind templates
- 6.6.5.4.3 OSI reference model kind operations
- 6.6.5.4.4 OSI reference model kind correspondence rules
- 6.6.5.5 Operations on views [Go to Page]
- 6.6.5.5.1 General
- 6.6.5.5.2 Data layer [Go to Page]
- 6.6.5.5.2.1 Application-aware communication
- 6.6.5.5.2.2 Network-aware communication
- 6.6.5.5.2.3 Topologies and hierarchies for IoT
- 6.6.5.5.3 Information and knowledge layers
- 6.6.5.6 Correspondence rules
- 6.6.6 Information viewpoint [Go to Page]
- 6.6.6.1 General information and key features [Go to Page]
- 6.6.6.1.1 General
- 6.6.6.1.2 Information, knowledge, and wisdom
- 6.6.6.1.3 Semantic interoperability
- 6.6.6.1.4 Ontologies
- 6.6.6.2 Stakeholders and concerns [Go to Page]
- 6.6.6.2.1 Typical stakeholders
- 6.6.6.2.2 Concerns
- 6.6.6.3 Model kinds [Go to Page]
- 6.6.6.3.1 General
- 6.6.6.3.2 Data model kind [Go to Page]
- 6.6.6.3.2.1 General
- 6.6.6.3.2.2 Data model conventions
- 6.6.6.3.2.3 Data model operations
- 6.6.6.3.2.4 Data model correspondence rules
- 6.6.6.3.3 Semantic model kind [Go to Page]
- 6.6.6.3.3.1 General
- 6.6.6.3.3.2 Data model conventions
- 6.6.6.3.3.3 Data model operations
- 6.6.6.3.3.4 Data model correspondence rules
- 6.6.6.3.4 Information structure model kind [Go to Page]
- 6.6.6.3.4.1 General
- 6.6.6.3.4.2 Data model conventions
- 6.6.6.3.4.3 Data model operations
- 6.6.6.3.4.4 Data model correspondence rules
- 6.6.6.3.5 Information flow model kind [Go to Page]
- 6.6.6.3.5.1 General
- 6.6.6.3.5.2 Data model conventions
- 6.6.6.3.5.3 Data model operations
- 6.6.6.3.5.4 Data model correspondence rules
- 6.6.6.3.6 Information lifecycle model kind [Go to Page]
- 6.6.6.3.6.1 Data model conventions
- 6.6.6.3.6.2 Data model operations
- 6.6.6.3.6.3 Data model correspondence rules
- 6.6.7 Function viewpoint [Go to Page]
- 6.6.7.1 General information and key features
- 6.6.7.2 Stakeholder and concerns [Go to Page]
- 6.6.7.2.1 Typical stakeholders
- 6.6.7.2.2 Concerns
- 6.6.7.3 Model kind: function [Go to Page]
- 6.6.7.3.1 Function conventions [Go to Page]
- 6.6.7.3.1.1 General
- 6.6.7.3.1.2 Model kind languages or notations
- 6.6.7.3.1.3 Model kind meta-model
- 6.6.7.3.2 FB type
- 6.6.7.3.3 FB execution
- 6.6.7.3.4 UML specification of the device model
- 6.6.7.3.5 Classification of the algorithms
- 6.6.7.3.6 Algorithm description
- 6.6.7.3.7 Input and output variables and parameter definition
- 6.6.7.3.8 Choice of variables and parameters
- 6.6.7.3.9 Mode, status, and diagnosis
- 6.6.7.3.10 Sensing channel
- 6.6.7.3.11 Actuation channel
- 6.6.7.3.12 Application
- 6.6.7.4 Operations on views
- 6.6.7.5 Correspondence rules
- 6.6.7.6 Notes
- 6.6.8 Threat model viewpoint [Go to Page]
- 6.6.8.2 General information and key features
- 6.6.8.3 Stakeholders and concerns [Go to Page]
- 6.6.8.3.1 Typical stakeholders
- 6.6.8.3.2 Concerns
- 6.6.8.4 Model kinds [Go to Page]
- 6.6.8.4.1 General
- 6.6.8.4.2 Attack tree model kind [Go to Page]
- 6.6.8.4.2.1 General
- 6.6.8.4.2.2 Attack tree model kind conventions
- 6.6.8.4.2.3 Attack tree model kind operations
- 6.6.8.4.2.4 Attack tree model kind correspondence rules
- 6.6.8.4.3 Typical threat list model kind [Go to Page]
- 6.6.8.4.3.1 General
- 6.6.8.4.3.2 Typical threat list model kind operations
- 6.6.8.4.3.3 Typical threat list model kind correspondence rules
- 6.6.8.5 Operations on views
- 6.6.8.6 Correspondence rules
- 6.6.9 Security and safety monitoring viewpoint [Go to Page]
- 6.6.9.1 General information and key features
- 6.6.9.2 Stakeholders and concerns [Go to Page]
- 6.6.9.2.1 Typical stakeholders
- 6.6.9.2.2 Concerns
- 6.6.9.3 Monitoring system module model kind [Go to Page]
- 6.6.9.3.1 General
- 6.6.9.3.2 Signature detection [Go to Page]
- 6.6.9.3.2.1 General
- 6.6.9.3.2.2 Conventions
- 6.6.9.3.3 Anomaly detection [Go to Page]
- 6.6.9.3.3.1 General
- 6.6.9.3.3.2 Conventions
- 6.6.9.4 Operations on views [Go to Page]
- 6.6.9.4.1 General
- 6.6.9.4.2 Construction [Go to Page]
- 6.6.9.4.2.1 General
- 6.6.9.4.2.2 Signature construction
- 6.6.9.4.2.3 Anomaly detection profile construction
- 6.6.9.4.3 Analysis
- 6.6.9.4.4 Implementation
- 6.6.9.5 Correspondence rules
- 6.6.10 Access control viewpoint [Go to Page]
- 6.6.10.1 General
- 6.6.10.2 Overview
- 6.6.10.3 Concerns and stakeholders [Go to Page]
- 6.6.10.3.1 Typical stakeholders
- 6.6.10.3.2 Concerns
- 6.6.10.4 Model kinds [Go to Page]
- 6.6.10.4.1 Identification and authentication
- 6.6.10.4.2 Access control model [Go to Page]
- 6.6.10.4.2.1 General
- 6.6.10.4.2.2 Discretionary access control
- 6.6.10.4.2.3 Role-based access control
- 6.6.10.4.2.4 Attribute-based access control
- 6.6.10.5 Operations on views [Go to Page]
- 6.6.10.5.1 General
- 6.6.10.5.2 Construction [Go to Page]
- 6.6.10.5.2.1 General
- 6.6.10.5.2.2 DAC model construction
- 6.6.10.5.2.3 RBAC model construction
- 6.6.10.5.2.4 ABAC model construction
- 6.6.10.5.3 Analysis
- 6.6.10.5.4 Implementation [Go to Page]
- 6.6.10.5.4.1 Identification and authentication implementation: authentication protocols
- 6.6.10.5.4.2 Access control implementation
- 6.6.10.6 Correspondence rules [Go to Page]
- 6.6.11.4.1 General
- 6.6.11.5.1 General
- 6.6.12 Privacy and trust viewpoint [Go to Page]
- 6.6.12.1 General information and key features [Go to Page]
- 6.6.12.1.1 General
- 6.6.12.1.2 Privacy by design
- 6.6.12.1.3 Privacy legislation
- 6.6.12.2 Stakeholders and concerns [Go to Page]
- 6.6.12.2.1 Typical stakeholders
- 6.6.12.2.2 Concerns
- 6.6.12.2.3 Anti-concerns
- 6.6.12.3 Privacy design strategy model
- 6.6.12.4 Basic privacy terms, concepts, and models [Go to Page]
- 6.6.12.4.1 General
- 6.6.12.4.2 Basic terminology, concepts, and models for privacy in communication scenarios
- 6.6.12.4.3 Basic terminology, concepts, and models for privacy in resource access scenarios
- 6.6.12.5 Trust models [Go to Page]
- 6.6.12.5.1 General
- 6.6.12.5.2 Direct trust model
- 6.6.12.5.3 Indirect trust model [Go to Page]
- 6.6.12.5.3.1 General
- 6.6.12.5.3.2 Hierarchical trust models
- 6.6.12.5.3.3 Web of trust
- 6.6.12.5.4 Trust elevation
- 6.6.12.5.5 Trust frameworks
- 6.6.13 Collaboration viewpoint [Go to Page]
- 6.6.13.1 General information and key features
- 6.6.13.2 Stakeholders and concerns [Go to Page]
- 6.6.13.2.1 General
- 6.6.13.2.2 Concerns
- 6.6.13.3 Model kind: Collaboration [Go to Page]
- 6.6.13.3.1 Conventions [Go to Page]
- 6.6.13.3.1.1 General
- 6.6.13.3.2 Collaboration operations
- 6.6.13.3.3 Collaboration correspondence rules
- 6.6.13.4 Correspondence rules
- 6.6.14 Computing resource viewpoint [Go to Page]
- 6.6.14.1 General information and key features
- 6.6.14.2 Stakeholders and concerns [Go to Page]
- 6.6.14.2.1 Typical stakeholders
- 6.6.14.2.2 Concerns
- 6.6.14.3 Computing resource model kinds [Go to Page]
- 6.6.14.3.1 General
- 6.6.14.3.2 Computing components type model
- 6.6.14.3.3 Centralized computing resources model
- 6.6.14.3.4 Distributed computing resources model
- 6.6.14.4 Operations on views
- 6.6.14.5 Correspondence rules
- 6.6.14.6 Examples
- 7. Architecture examples [Go to Page]
- 7.1 General
- 7.2 Example architecture of system A [Go to Page]
- 7.2.1 General
- 7.2.2 Framed concerns and their stakeholders
- 7.2.3 Architecture view
- 7.3 Example architecture of adequate design for required security [Go to Page]
- 7.3.1 General
- 7.3.2 Framed concerns and their stakeholders
- 7.3.3 Architecture view [Go to Page]
- 7.3.3.1 General
- 7.3.3.2 Considerations for H-ARC operation layer
- 7.4 Example architecture of edge computing [Go to Page]
- 7.4.1 General
- 7.4.2 Framed concerns and their stakeholders
- 7.4.3 Architecture view [Go to Page]
- 7.4.3.1 Conceptual model: IoT component capability model
- 7.4.3.2 Function model
- 7.4.3.3 Computing resource model
- 7.5 Example architecture of IoT platform for Smart Cities [Go to Page]
- 7.5.1 General information and key features [Go to Page]
- 7.5.1.1 General relation to viewpoints according to 6.6
- 7.5.1.2 IoT Platform for a vertical industry
- 7.5.1.3 IoT Platform for cross-industries
- 7.5.1.4 Smart City platform
- 7.5.2 Framed concerns and their stakeholders [Go to Page]
- 7.5.2.1 Typical stakeholders
- 7.5.2.2 Concerns
- 7.5.3 Architecture view [Go to Page]
- 7.5.3.1 Model kinds [Go to Page]
- 7.5.3.1.1 Function model
- 7.5.3.1.2 Data access, storage, and sharing model
- 7.5.3.2 Correspondence rules
- 7.6 Example architecture of OPC Unified Architecture (UA) [Go to Page]
- 7.6.1 General Information and key features [Go to Page]
- 7.6.1.1 Introduction
- 7.6.1.2 Relationship to viewpoint catalogue
- 7.6.2 Framed concerns and their stakeholders
- 7.6.3 Architecture view [Go to Page]
- 7.6.3.1 Model kinds [Go to Page]
- 7.6.3.1.1 Conceptual model: component capability model
- 7.6.3.1.2 Compatibility model
- 7.6.3.1.3 Communication model: OSI reference model kind meta-model
- 7.6.3.1.4 Information and function models: semantic interoperability
- 7.6.3.1.5 Access control and privacy and trust model
- 7.6.3.1.6 Computing resource model
- 7.7 Example architecture of a distributed computing architecture for a chemical process in a Smart Manufacturing Ecosystem using BATCH control [Go to Page]
- 7.7.1 General
- 7.7.2 Framed concerns and their stakeholders
- 7.7.3 Architecture views [Go to Page]
- 7.7.3.1 Conceptual view
- 7.7.3.2 Compatibility view
- 7.7.3.3 Lifecycle view
- 7.7.3.4 Communication view
- 7.7.3.5 Information view
- 7.7.3.6 Function view
- 7.7.3.7 Computing resource view
- 7.7.4 Architecture and models with their descriptions [Go to Page]
- 7.7.4.1 Process stages
- 7.7.4.2 Process operations
- 7.7.4.3 Process actions
- 7.7.4.4 Physical model [Go to Page]
- 7.7.4.4.1 General
- 7.7.4.4.2 Connected enterprise level
- 7.7.4.4.3 Enterprise level
- 7.7.4.4.4 Site level
- 7.7.4.4.5 Area level
- 7.7.4.4.6 Process cell level
- 7.7.4.4.7 Unit level
- 7.7.4.4.8 Equipment module level
- 7.7.4.4.9 Control module level
- 7.7.4.5 Process cell classification [Go to Page]
- 7.7.4.5.1 General
- 7.7.4.5.2 Classification by number of products
- 7.7.4.5.3 Classification by physical structure
- 7.7.4.6 Batch control concept [Go to Page]
- 7.7.4.6.1 General
- 7.7.4.6.2 Structure for batch control [Go to Page]
- 7.7.4.6.2.1 General
- 7.7.4.6.2.2 Basic control
- 7.7.4.6.2.3 Procedural control
- 7.7.4.6.2.4 Coordination control
- 7.7.4.6.3 Equipment entities [Go to Page]
- 7.7.4.6.3.1 General
- 7.7.4.6.3.2 Procedural control model/physical model/process model relationship
- 7.7.4.6.3.3 Equipment control in equipment entities
- 7.7.4.6.3.4 Structuring of equipment entities
- 7.7.4.6.4 Recipes [Go to Page]
- 7.7.4.6.4.1 General
- 7.7.4.6.4.2 Recipe types
- 7.7.4.6.4.3 Recipe contents
- 7.7.4.6.4.4 Control recipe procedure/equipment control relationship
- 7.7.4.6.4.5 Recipe transportability
- 7.7.4.6.5 Production plans and schedules
- 7.7.4.6.6 Production information [Go to Page]
- 7.7.4.6.6.1 General
- 7.7.4.6.6.2 Batch-specific information
- 7.7.4.6.6.3 Common (non-batch-specific) batch information
- 7.7.4.6.6.4 Batch history
- 7.7.4.6.6.5 Batch reports
- 7.7.4.6.7 Allocation and arbitration [Go to Page]
- 7.7.4.6.7.1 General
- 7.7.4.6.7.2 Allocation
- 7.7.4.6.7.3 Arbitration
- 7.7.4.6.8 Modes and states [Go to Page]
- 7.7.4.6.8.1 General
- 7.7.4.6.8.2 Modes
- 7.7.4.6.8.3 States
- 7.8 Example architecture of oneM2M [Go to Page]
- 7.8.1 General information and key features [Go to Page]
- 7.8.1.1 Introduction
- 7.8.1.2 Relationship to viewpoint catalogue
- 7.8.2 Framed concerns and their stakeholders
- 7.8.3 Architecture view [Go to Page]
- 7.8.3.1 Model kinds [Go to Page]
- 7.8.3.1.1 Conceptual viewpoint: component capability model
- 7.8.3.1.2 Compatibility viewpoint: compatibility-level model
- 7.8.3.1.3 Communication model: OSI reference model
- 7.8.3.1.4 Information ciewpoint: data and semantic model
- 7.8.3.1.5 Access control viewpoint: access control model
- 7.8.3.1.6 Collaboration viewpoint: collaboration model
- 7.8.3.1.7 Computing resource viewpoint: computing resource model
- 7.9 Example architecture of Industrial Value Chain Initiative—reference architecture (IVI-RA) [Go to Page]
- 7.9.1 General information and key features [Go to Page]
- 7.9.1.1 Relationship to viewpoint catalogue [Go to Page]
- 7.9.1.1.1 Level of relevance of viewpoints
- 7.9.1.1.2 Summary of IVI’s activities related to viewpoint catalogue
- 7.9.2 Conceptual viewpoint model and IVI’s AS-IS and TO-BE models [Go to Page]
- 7.9.2.1 General
- 7.9.2.2 Models of conceptual viewpoint
- 7.9.2.3 AS-IS and TO-BE models in IVI
- 7.9.2.4 Method of activity scenario modeling in IVI
- 7.9.3 Lifecycle viewpoint and IVI’s exploration, recognition, orchestration, realization (EROR) cycle [Go to Page]
- 7.9.3.1 General
- 7.9.3.2 Model kind: lifecycle sequence
- 7.9.3.3 IVI’s EROR cycle
- Annex A (informative) Examples of system collaboration based on collaboration viewpoint [Go to Page]
- A.1 Introduction
- A.2 Symbiotic ADS
- A.3 Examples
- Annex B (informative) Common concerns and stakholder mapping [Go to Page]
- B.1 Common concerns mapping
- B.2 IoT stakeholder mapping
- Annex C (informative) An example based on threat model viewpoint
- Annex D (informative) An example based on an adequate design for required security viewpoint [Go to Page]
- D.1 Example
- D.2 Information for better understanding of this viewpoint
- Annex E (informative) Bibliography [Go to Page]