Device Management with OMA Lightweight M2M

Slides:



Advertisements
Similar presentations
1Proprietary and Confidential AirVantage API – Getting started David SCIAMMA – June 13th 2014.
Advertisements

Software Frame Simulator (SFS) Technion CS Computer Communications Lab (236340) in cooperation with ECI telecom Uri Ferri & Ynon Cohen January 2007.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Example for SCL resource usage according to ETSI TC M2M March 2011 Josef Blanz, Qualcomm Inc.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Rev A8/8/021 ABC Networks
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Authors list to be completed.
© 2011 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Device Management using mgmtCmd resource
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
LLDP-MED Location Identification for Emergency Services Emergency Services Workshop, NY Oct 5-6, 2006 Manfred Arndt
1 Design Patterns for Connected Devices Hannes Tschofenig Michael Koster.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Authors list to be completed.
Home Control Protocol for Smart Devices Hojin Park WG!-N1505.
IEEE R lmap 23 Feb 2015.
App-ID Use Cases, Syntax and Attributes SEC App-ID_Use_Cases,_Syntax_and_Attributes Group Name: Architecture Source: Darold Hemphill, iconectiv,
ANSTO E-Science workshop Romain Quilici University of Sydney CIMA CIMA Instrument Remote Control Instrument Remote Control Integration with GridSphere.
Call Control with SIP Brian Elliott, Director of Engineering, NMS.
© ABB University - 1 Revision C E x t e n d e d A u t o m a t i o n S y s t e m x A Chapter 5 OPC Connectivity Course T314.
Web Services Kanda Runapongsa Dept. of Computer Engineering Khon Kaen University.
Introducing CoMI Aligned with RestCONF (draft-ietf-netconf-restconf-04) Common data modeling language (YANG defined in RFC 6020) Protocol (CoAP instead.
Secure Credential Manager Claes Nilsson - Sony Ericsson
IoTivity.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Jini Architecture Introduction System Overview An Example.
OneM2M Challenges of M2M Security and Privacy
System/SDWG Update Management Council Face-to-Face Flagstaff, AZ August 22-23, 2011 Sean Hardman.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Linux Operations and Administration
© 2008 by Wind River; made available under the EPL v1.0 | 19-Nov-2008 TCF The Target Communication Framework Michael Scharf, Wind River wiki.eclipse.org/DSDP/TM/TCF_FAQ.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
MDB Motorola Internal Use Only 1 21-August-2006 DM/FOTA Component Overview Elliot Stewart.
Copyright © 2004, Keith D Swenson, All Rights Reserved. OASIS Asynchronous Service Access Protocol (ASAP) Tutorial Overview, OASIS ASAP TC May 4, 2004.
Current Topic – EPP - TWNIC Jeff Yeh
Introduction to IETF CoRE Link Format Soumya Kanti Datta Mobile Communications Department
1 Server Business Logic & OAuth Beta Overview October 4, 2010 Alan Hantke Product Development Server Business Logic Intuit Partner Platform Diane Weiss.
What problems are we trying to solve? Hannes Tschofenig.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Redmond Protocols Plugfest 2016 Ron Starr, Paul Bartos, Hagit Galatzer, Stephen Guty New and Modified Windows Protocol Documents.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Eclipse Vorto Alexander Edelmann.
Developing IoT endpoints with mbed Client
By Sachin Kumar Korenga & Rochita Thakkallapally
IoT Integration Patterns, REST, and CoAP
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
IEEE 802 OmniRAN Study Group: SDN Use Case
2018 Real Cisco Dumps IT-Dumps
WEB API.
JINI ICS 243F- Distributed Systems Middleware, Spring 2001
(Authentication / Authorization)
Presentation transcript:

Device Management with OMA Lightweight M2M Simon Lemay and Hannes Tschofenig

Overview Why Lightweight Device Management OMA Lightweight M2M Standard Bootstrapping Interface Object Model Access Control Model Application Server Interaction Example Flows ©Sensinode 2013

Why Lightweight Device Management

Why Lightweight Device Management? Traditional Device Management (DM) is widely used in mobile devices Used by operators and enterprises for managing smart phones, tablets and laptops Some M2M DM use today with cellular devices, mostly proprietary OMA DM was one of the first standards for device management in the mobile handset sector. In the meanwhile various standards exist that provide similar functionality, such as TR 69, or IEEE 802.1AR. OMA Lightweight M2M (LWM2M) created to serve the IoT market with a focus on lightweight nature: Applicable to various radio technologies (devices just need IP connectivity) Extensible object model and registry open to the whole industry Enables both management and application data handling with the same solution Addresses security need for software updates and device re-configuration. Re-uses IETF specifications. ©Sensinode 2013

Features Mobile Device Management Key management Service provisioning Access Control Bootstrapping Device Management Changes to settings Changes to parameters of the device Device Configuration Mobile Device Management Firmware Update Update application and system software Bug fixes Fault Management Report Errors from devices Query about status of devices Application Configuration & Control Configure settings of the application Send control commands Reporting Notify changes in sensor values Notify alarms and events

OMA LWM2M Architecture M2M Applications LWM2M Server Application abstraction through REST API Resource Discovery and Linking LWM2M Server Reuses IETF technologies, such as the CoAP protocol, DTLS, Resource Directory. Deployable on gateways and in the cloud LWM2M Clients are Devices Device abstraction through CoAP LWM2M Clients are CoAP Servers Any IP network connection

LWM2M Interfaces Bootstrap Interface Registration Interface Configure Servers & Keys & ACLs Pre-Configured, Smart Card, or Server Initiated Bootstrap CoAP REST API Registration Interface RFC 6690 and Resource Directory Management Interface Using Objects Management Objects and Resources Reporting Interface Object Instances and Resources Report Asynchronous notification using CoAP Observe

Bootstrap Interface

Bootstrapping Architecture

Bootstrapping ©Sensinode 2013

Bootstrapping Features OMA LWM2M supports different credential provisioning procedures: Pre-shared Secrets Raw Public Keys Certificates These credentials are provisioned by the Bootstrap Server for use with LWM2M servers. It is possible to mix credentials for use with different servers and even to use different credentials in a single client/server interaction. The LWM2M client is assumed to possess credentials for authentication to the Bootstrap Server. These credentials are typically pre-provisioned during manufacturing time.

Pre-Shared Key Mode

Raw Public Key Mode

Certificate Mode

A few more details LWM2M Client may be pre-provisioned with information about the LWM2M Server (rather than distributing credentials with the bootstrapping protocol) LWM2M Client MUST have a LWM2M Bootstrap Server Account (+Bootstrap Server URI, Endpoint Client Name) LWM2M Security Object Security Mode (PSK, raw public key, certificate, no-sec) Public Key or Identity (certificate, public key, or PSK identity) Server Public Key or Identity (LWM2M server or bootstrap server certificate, public key or PSK identity) Secret Key (secret key or private key) LWM2M Server URI (bootstrap server or LWM2M server) Bootstrap Server (true – false)

Object Model

Object Model A LWM2M Client has one or more Object Instances An Object is a collection of Resources A Resource is an atomic piece of information that can be Read, Written or Executed Resources can have multiple instances Access control list (ACL) objects control access to objects accessed by LWM2M Servers Objects and Resources are identified by a 16-bit Integer, Instances by an 8-bit Integer Objects/Resources are accessed with simple URIs: /{Object ID}/{Object Instance}/{Resource ID} Example: /3/0/1 = 3 = Device Object, 0 = Object Instance #0, 1 = Manufacturer Resource ©Sensinode 2013

Standard Device Management Objects The LWM2M Technical Specification defines eight normative Objects Object Name ID Multiple Instances? Description LWM2M Security Yes This LWM2M Object provides the keying material of a LWM2M Client appropriate to access a specified LWM2M Server. LWM2M Server 1 This LWM2M objects provides the data related to a LWM2M server. Access Control 2 Access Control Object is used to check whether the LWM2M Server has access right for performing an operation. Device 3 No This LWM2M Object provides a range of device related information which can be queried by the LWM2M Server, and a device reboot and factory reset function. Connectivity Monitoring 4 This LWM2M objects enables monitoring of parameters related to network connectivity. Firmware 5 This Object includes installing firmware package, updating firmware, and performing actions after updating firmware. Location 6 The GPS location of the device. Connectivity Statistics 7 This LWM2M Objects enables client to collect statistical information and enables the LWM2M Server to retrieve these information, set the collection duration and reset the statistical parameters. ©Sensinode 2013

Object Example Example of the LWM2M Location Object, which has 6 Resources ©Sensinode 2013

Defining new Objects Defining a new Object is straightforward Object IDs are registered with the OMA Naming Authority (OMNA) Who can register an Object? OMA working groups 3rd party organizations Enterprises How to register an Object? Write a specification filling out the Object template tables: Object Name, Description and if it can have Multiple Instances The list of resources the Object defines Fill out the Lightweight Object form on-line. IPSO Alliance has created additional objects, which are documented here (Starter Pack) and here (Expansion Pack). ©Sensinode 2013

Access Control Model

Overview Bootstrap servers distribute access control lists to LWM2M clients. Example from Appendix F of the OMA LWM2M technical specification: (Table shows example objects provisioned at a LWM2M client by the Bootstrap server.)

Overview, cont. Luminaire Light Switch LWM2M Client LWM2M Server 1 Registration and resource access LWM2M Server 1 ACL: <Server 1, RW> Light Switch Application Registration and resource access LWM2M Bootstrap Server LWM2M Client 3 LWM2M Server 2 ACL: <Server 2, RW>

Discussion ACLs work well when a Bootstrap Server is aware of the future interactions between LWM2M servers and LWM2M clients. Real-time provisioning of ACLs by the Bootstrap Server is also possible. During registration a LWM2M client is a CoAP client; afterwards it becomes a CoAP server waiting for incoming CoAP requests. Notes: LWM2M clients can become LWM2M servers in another communication setup and may therefore also receive ACLs from the Bootstrap Server. In our example light switches and luminaires are LWM2M clients in different communication scenarios. Different LWM2M clients may also use different Bootstrap Servers. A single LWM2M client may also have more than one Bootstrap Server (e.g., for redundancy/ purpose)

Application Server Interaction

LWM2M Application Server Web Server App Soft Endpoints DISCOVER /domain/endpoints/3303/0/5700 LWM2M Server /3303/0/5700 REGISTER IP Device IP Device LWM2M Clients

LWM2M Application Server Web Server App /domain/endpoints/3303/0/5700 1. GET 4. REPLY LWM2M Server /3303/0/5700 2. GET 3. REPLY IP Device IP Device LWM2M Clients

LWM2M Application Server Web Server App 2. NOTIFY LWM2M Server 1. NOTIFY IP Device IP Device LWM2M Clients

LWM2M Supports Sleeping Endpoints “b=uq” Client uses the registration refresh to inform LWM2M server that it is awake, and listens for any queued operations

Observe Parameters LWM2M provides a mechanism to control Observation “Write Attributes” Interface using query parameters to set observe attributes: Pmin – minimum observation quiet period, to limit notification frequency Pmax – maximum observation quiet period, to guarantee notifications Lt – low limit measurement notification, like low alarm, in engineering units Gt – high limit measurement notification, like a high alarm, in engineering units Step – Minimum delta change required to notify, in engineering units

LWM2M Bulk Read Returns TLV or JSON based on requested content-format   {“e”:[ {"n":"0","sv":"Open Mobile Alliance"}, {"n":"1","sv":"Lightweight M2M Client"}, {"n":"2","sv":"345000123"}, {"n":"3","sv":"1.0"}, {"n":"6/0","v":"1"}, {"n":"6/1","v":"5"}, {"n":"7/0","v":"3800"}, {"n":"7/1","v":"5000"}, {"n":"8/0","v":"125"}, {"n":"8/1","v":"900"}, {"n":"9","v":"100"}, {"n":"10","v":"15"}, {"n":"11/0","v":"0"}, {"n":"13","v":"1367491215"}, {"n":"14","sv":"+02:00"}, {"n":"15","sv":"U"}] } Returns TLV or JSON based on requested content-format CBOR needs to be added Linked Objects are supported

LWM2M Uses CoRE RD Resource Links (RFC 6690) <4001/0/9002>;rt=“oma.lwm2m”;ct=50;obs=1 Resource Type Content Type Observable Links are uploaded during registration to inform the LWM2M server about resources on the endpoint Links are discovered using GET with content type “application/link-format” JSON representation using content type “application/link-format+json”

Example Flows

Interface Flows ©Sensinode 2013

Registration ©Sensinode 2013

Object Access ©Sensinode 2013

Notification ©Sensinode 2013

Queue Mode (Sleeping Devices) ©Sensinode 2013

Summary LWM2M re-uses many IETF specifications. Specifications are publically available for download here. Implementations and products are available. Example: Leshan (as an open source implementation) Several plugfests took place already and there the issue list can be found here. Work on a bugfix release is in progress and the Version 1.1 specification work will be started soon to specification with ongoing IETF work.

Using LWM2M with ARM Create your application with mbed Client. Examples: mbed client (Linux) mbed client (mbed OS) Connect your IoT devices to the mbed Device Connector at https://connector.mbed.com Create your web application with example code or REST API Links: Example code Documentation