ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Session 4 – IoT data platform based on oneM2M Dr.

Slides:



Advertisements
Similar presentations
Eclipse, M2M and the Internet of Things
Advertisements

Eclipse, M2M and the Internet of Things
A global Service layer platform for M2M communications
oneM2M and AllJoyn Interworking
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
IoT in ODL Lionel Florit, Principal Engineer, ODL ID lflorit
Facing the Challenges of M2M Security and Privacy
TAKING A LOOK INSIDE Nicolas Damour
CURRENT STANDARDIZATION ACTIVITIES – ONEM2M GSC-18 Meeting, July 2014, Sophia Antipolis, France Document No: GSC(14)18_012 Source: ETSI Contact:
OneM2M Draft proposal for slide set. This is not intended to be a oneM2M presentation. It is a collection of source material slides which can be used.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Consolidated M2M standards boost the industry Li Li (Thomas) CCSA(Huawei) Document No: GSC16-PLEN-73.
Authors list to be completed.
On Management, Abstraction & Semantics
Authors list to be completed.
RoA and SoA Integration for Message Brokers Group Name: WG2-ARC Source: ALU Meeting Date: Agenda Item:
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
SWIM-SUIT Information Models & Services
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
3GPP Rel-13 Interworking discussions
Workshop with IEEE P2413 oneM2M Other suggested titles:
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Work Group / Work Item Proposal Slide 1 © 2012 oneM2M Partners oneM2M-TP oneM2M_Work_Group_Work_Item_Proposal Group name: Technical Plenary Source:
Customized Resource Types MAS Group Name: MAS + ARC + PRO WGs Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date:
Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent.
Step by step approach Group Name: WG2 Source: Michael hs. Yang, LG uplus, Jaeseung Song, NEC Europe, Meeting.
An introduction to oneM2M
1 HGI MESSAGE TO ONEM2M TECHNICAL PLENARY HANS WERNER BITZER, DEUTSCHE TELEKOM VICE CHAIR, HGI ONEM2M TP#19, SOPHIA ANTIPOLS, FRANCE.
OneM2M Challenges of M2M Security and Privacy
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Streaming Session Support in oneM2M Framework Group Name: WG2 Source: George Foti, Ericsson Meeting Date: Work Item :WI GPP_Rel13_IWK.
Status of Active Work Items Level of Completeness Group Name: WPM Source: Roland Hechwartner, WPM Convenor Updated:
Introduction to oneM2M OMA - oneM2M Meeting, San Diego, Jan. 19th 2016
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
What is oneM2M? 2 Covers: Requirements Architecture API specifications Security Interoperability Facilitate, implement and promote IoT.
THE ROLE OF oneM2M in UNLOCKING the IOT potential
ONEM2M RELEASE 2: SETTING THE STANDARD FOR IOT INTEROPERABILITY
© 2017 InterDigital, Inc. All Rights Reserved.
Internet Of Things (IoT)
Developing IoT endpoints with mbed Client
Ian Deakin, iconectiv 3rd July 2017
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
Consolidated M2M standards boost the industry
3GPP interworking in R3 Group Name: ARC
Possible options of using DDS in oneM2M
GRUPPO TELECOM ITALIA The IoT 5G Network Infrastructures and the IoT Data Store & Share Platform: challenges and opportunities Roberto Gavazzi – TIM Technology.
WPM ad-hoc group report TP#24
Solving the IoT Platform Challenge
Proximal IoT Interworking solution discussion
oneM2M Work on IoT Semantic and Data Model Interoperability
Overview onem2m.org.
Overview onem2m.org.
Development Guideline for oneM2M Products and Services
ETSI Standardization Activities on M2M Communications
An introduction to oneM2M
ETSI Standardization Activities on M2M Communications
Current standardization activities – oneM2m
Presentation transcript:

ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Session 4 – IoT data platform based on oneM2M Dr. Omar Elloumi, Technical Plenary Chair, Alcatel-Lucent (oneM2M member) oneM2M

Over 200 member organizations in oneM2M The Partnership Project

Purpose To specify and promote an M2M Common Service Layer Deliverables Technical Reports and Technical Specifications Purpose & Deliverables

M2M Common Service Layer in a nutshell It is a software layer It sits between M2M applications and communication HW/SW that provides data transport It normally rides on top of IP It provides functions that M2M applications across different industry segments commonly need. Those functions are exposed to Applications via IT-friendly APIs. It allows for distributed intelligence (device, gateway, cloud apps)

Use cases Requirements Architecture APIs and protocols Architecture APIs and protocols Test and Interop Standardization approach Automotive Home Energy E-Health Security & privacy Device Management Data exchange Interworking IP communications Restful webservices APIs Reuse of existing protocols Semantics framework (future) Reference points Device certification Open source

oneM2M Architecture approach Horizontal framework, Restful API Objects represented as resource Access control policy to access resource IoT will be based on ontologies (formal description of concepts and relationships, e.g. W3C Semantic Sensor Network) as well as big data frameworks Currently developed solutions are similar are vertically integrated, with limited integration of data models (Zigbee, DLMS for smart meters, etc.). Automotive Application Energy Application Home Application Automotive Application Energy Application Home Application Communication Technologies & Protocols Communication Networks Common Service Layer Communication Devices & Hardware TOMORROW IoT enabled IoT ready

Registration Group Management Security Discovery Data Management & Repository Application & Service Management Device Management Subscription & Notification Communication Management Service Charging & Accounting Location Network Service Exposure Common Service Functions

Why does it matter Healthy eco-system with economies of scale More partnering choices and opportunities for M2M/IOT industry stakeholders Combat fragmentation Standardized protocols / APIs -> simplifies application development/deployment Cross-vertical standards -> same devices and back-ends in different industries Lower CAPEX Standard features to use networks more efficiently -> get better tariffs Flexibility for verticals -> utilize best transport network meeting business needs Lower OPEX Reduced development, test and deployment lifecycles through focusing on core business (application logic) Time to Market oneM2M is IoT ready

Service Components TS-0007 (WI-0011) Service Components TS-0007 (WI-0011) Security Solutions TS-0003 (WI-0007) MQTT Protocol Binding TS-0010 (WI-0014) Service Layer Core Protocols TS-0004 (WI-0009) Service Layer Core Protocols TS-0004 (WI-0009) Functional Architecture TS-0001 (WI-0002) Functional Architecture TS-0001 (WI-0002) Definitions & Acronyms TS-0011 (WI-0003) Definitions & Acronyms TS-0011 (WI-0003) Requirements TS-0002 (WI-0001) Technical Specifications ftp://ftp.onem2m.org/Work Programme/ Management Enabl nt - BBF TS-0006 (WI-0010) Management Enabl nt - OMA TS-0005 (WI-0010) CoAP Protocol Binding TS-0008 (WI-0012) HTTP Protocol Binding TS-0009 (WI-0013)

Patient E-Health Web-application Medicalized support M2M Platform Blood Pressure Meter Scales Bluetooth Smart Network Tech support Application Doctor Cellular Network Pill dispenser with integrated comm. gateway Example Scenario – E-Health

IP-based, but interworks with specific IP and non IP technologies in the M2M Area networks RESTful resource oriented APIs, resources are representations of devices, applications, things and related descriptions, etc. Distributed intelligence (device, gateway, edge, cloud) Reuse of existing device management frameworks Reuse of existing data exchange protocols Reuse of existing security Reuse of underlying network capabilities such as location, triggering, etc. Resource access control policies allows many to many communications framework Future proof – ready to add semantics support No mandated implementation (Database choice, intelligence location, etc.) Design principles

Underlying Network AE NSE AE NSE Application Service NodeMiddle NodeInfrastructure Node Application Layer Network Layer Architecture AE Application EntityProvides application logic for the end-to-end M2M solutions Network Services EntityProvides services to the CSEs besides the pure data transport NodeLogical equivalent of a physical (or possibly virtualized, especially on the server side) device

Underlying Network CSE AE NSE CSE AE NSE CSE AE NSE Application Service NodeMiddle NodeInfrastructure Node Application Layer Service Layer Network Layer Mca Mcn Mca Mcn Mcc Reference PointOne or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers) Common Services EntityProvides the set of "service functions" that are common to the M2M environments Application EntityProvides application logic for the end-to-end M2M solutions Network Services EntityProvides services to the CSEs besides the pure data transport NodeLogical equivalent of a physical (or possibly virtualized, especially on the server side) device Architecture CSE Mcc’ Inf. Node

Concrete example New measurement value availableWrite to //MN-CSE/AMN-CSE notifies aggregation app about new data, MN-CSE keep a copy of the data for subsequent use New measurement value availableWrite to //MN-CSE/AMN-CSE notifies aggregation app about new data, MN-CSE keep a copy of the data for subsequent use … etc, etc …Ask MN-CSE to write aggregated/transformed data to //IN-CSE/B…. and BTW, this is low priority and you got 12 h time for that! MN-CSE checks with policies and when time is good gets connected…..and writes aggregated data to //IN-CSE/BIN-CSE notifies network app (DB, HRN) about new data.Measurement app can simply keep on delivering its data to the MN-CSE Aggregation app gets always notified about the new bits coming in MN-CSE will store-and-forward aggregated/transformed data at a good time IN-CSE will notify DB app when new data arrived => Very little effort to synch the different apps M2M Gateway MN-CSE Aggregation & format conversion IN-CSE M2M Device Local Connectivity 3G Network Measurement App. M2M customer’s application A B Resources Starting assumptions: - Bootstrapping / DM is done (provisioning of credentials/apps) - MN-CSE and IN-CSE have logically connected (authentication, binding, encryption) - Apps have authenticated to xCSE and access right were established

Resource-based information model Information is stored in the system as Resources A given Resource can be identified with a Uniform Resource Identifier A given Resource is of one of the defined Resource Types The Resource Type determines the semantics of the information in the Resource Resources can be Created, Read, Updated or Deleted to manipulate the information Resources are organized in a tree-like structure and connected by links Information Modelling

Communication Protocols Reuse IP-based existing protocols Service Layer Core Protocols TS-0004 Service Layer Core Protocols TS-0004 CoAP Binding TS-0008 MQTT Binding TS-0010 HTTP Binding TS-0009 XML or JSON Content serialization HTTP Example REQUEST GET HTTP/1.1 Host: provider.net From: //provider.net/CSE-1234/WeatherApp42 X-M2M-RI: Accept: application/onem2m-resource+json RESPONSE HTTP/ OK X-M2M-RI: Content-Type: application/onem2m-resource+json Content-Length: 107 {"typeOfContent":"application/json", "encoding":1, "content": "{'timestamp': ,'value':25.32}" }

Security Challenges & Solutions 1.Large variety of scenarios 2.Any device in any deployment 3.A device cannot make “judgment calls” on privacy A.Secure communication various authentication options B.Remote provisioning various authentication options C.Access Control Policy express wide variety of rules

oneM2M Domain DM Domain Interworking – OMA & BBF Reuse existing Device Management technologies Application Entity IN-CSE Mca OMA DM 2.0 OMA DM 1.3 OMA LWM2M BBF TR-069 BBF Server BBF CPE BBF Device DM Server DM Client

Privacy principles System allows tracing and history of all interactions Accountability Each resource has an Access Control Policy (ACP) which specifies who (which entity) can access the resource, R/W permissions and under which context (time of the day, etc) Applications link published data to ACP according to user consented purpose Use limitation Collected data is assigned a time-stamp and linked to a producer entity Expiration time ensures old data is removed – could be used to enforce data retention policy Data quality Authentication and authorization, secure communications Security safeguards PI owner provides prior consent about the intended use of data – applications set Access Control Policy accordingly Participation oneM2M technology answer examples

Thank You! Q&A