A Process for Generating Concrete Architectures

This chapter addresses the question of how to generate concrete architectures with the IoT ARM, which is one of the many uses to which an architectural reference model can be put (see Chaps. 3 and 4). This topic was already touched upon in Section “Generation of Architectures” in Chap. 3, but it is covered in greater depth in this section.

[1]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[2]  Klaus Pohl,et al.  Requirements Engineering - Fundamentals, Principles, and Techniques , 2010 .

[3]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[4]  Eoin Woods,et al.  Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives , 2005 .

[5]  Anne Marsden,et al.  International Organization for Standardization , 2014 .

[6]  Udo W. Pooch,et al.  A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[7]  Juan E. Tapiador,et al.  Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[8]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[9]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[10]  M. Erder,et al.  QFD in the architecture development process , 2003 .

[11]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[12]  W. W. Royce,et al.  Managing the development of large software systems , 1970 .

[13]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[14]  Patrick Schaumont,et al.  Design methods for Security and Trust , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[15]  Eoin Woods,et al.  The system context architectural viewpoint , 2009, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture.

[16]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[17]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[18]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[19]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[20]  Kerry Raymond Reference Model of Open Distributed Processing (RM-ODP): Introduction , 1995 .