NIST Releases Networks of Things Model to Understand IoT Challenges | Practical Law

NIST Releases Networks of Things Model to Understand IoT Challenges | Practical Law

The National Institute of Standards and Technology (NIST) announced that it has released NIST Special Publication 800-183, Networks of 'Things', which provides a basic model—called the Network of Things (NoT) model—to help researchers understand the Internet of Things (IoT) and its security challenges.

NIST Releases Networks of Things Model to Understand IoT Challenges

Practical Law Legal Update w-002-9095 (Approx. 4 pages)

NIST Releases Networks of Things Model to Understand IoT Challenges

by Practical Law Intellectual Property & Technology
Published on 01 Aug 2016USA (National/Federal)
The National Institute of Standards and Technology (NIST) announced that it has released NIST Special Publication 800-183, Networks of 'Things', which provides a basic model—called the Network of Things (NoT) model—to help researchers understand the Internet of Things (IoT) and its security challenges.
On July 28, 2016, the National Institute of Standards and Technology (NIST) announced that it has released NIST Special Publication 800-183, Networks of 'Things', which provides a basic model—called the Network of Things (NoT) model—to help researchers understand the Internet of Things (IoT) and its security challenges.
The NoT model is based on the four fundamentals at the core of IoT:
  • Sensing.
  • Computing.
  • Communication.
  • Actuation.
The model presents a distributed computing system with five building blocks or "primitives," including the:
  • Sensor, an electronic utility that measures physical properties.
  • Aggregator, a software implementation based on mathematical functions that transforms groups of raw data into intermediate, aggregated data.
  • Communication channel, a medium by which data is transmitted.
  • External utility or eUtility, a software or hardware product or service.
  • Decision trigger, which creates the final result needed to satisfy the purpose, specification, and requirements of a specific NoT.
The report addresses vulnerabilities in each of these NoT system elements in terms of the two key dimensions of reliability and security.
Interested parties may send feedback on the NoT model to [email protected].