Communication and Security in Machine-to-Machine Systems Date │ 2016 02 03 Reporter │ 李雅樺 1.

Slides:



Advertisements
Similar presentations
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
Advertisements

Expanding LTE for Devices European Commission Information Society and Media The aim of EXATED is to realise the vision of a new scalable.
Encrypting Wireless Data with VPN Techniques
Internet of Things (IoT) Work Group
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
Bundubox ITU IOT IOT APPLICATION CHALLENGE. Proposal ▫Main idea ▫Local Communication Issues, Involved Solution ▫Bundubox: Local off the grid ip communication.
Distributed Systems 1 Topics  What is a Distributed System?  Why Distributed Systems?  Examples of Distributed Systems  Distributed System Requirements.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
ETSI M2M / TIA architecture harmonization O. Elloumi.
Example for SCL resource usage according to ETSI TC M2M March 2011 Josef Blanz, Qualcomm Inc.
Ch. 7. Architecture Standardization for WoT
SIP roaming solution amongst different WLAN-based service providers Julián F. Gutiérrez 1, Alessandro Ordine 1, Luca Veltri 2 1 DIE, University of Rome.
8.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
CURRENT STANDARDIZATION ACTIVITIES – ONEM2M GSC-18 Meeting, July 2014, Sophia Antipolis, France Document No: GSC(14)18_012 Source: ETSI Contact:
A Gateway For SIP Event Interworking - Sasu Tarkoma & Thalainayar Balasubramanian Ramya.
OneM2M Draft proposal for slide set. This is not intended to be a oneM2M presentation. It is a collection of source material slides which can be used.
Omniran ZigBee SEP2 Smart Grid Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Authors list to be completed.
Presentation of ETSI TC M2M security features Group Name: WG4 Securtity Source: Francois Ennesser, Gemalto Meeting Date: Agenda Item: SEC.
Omniran ZigBee SEP2 Smart Grid Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Computation for Physics 計算物理概論 Introduction to Linux.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Common Devices Used In Computer Networks
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
1 EEEM048- Internet of Things Lecture 1- Introduction Dr Payam Barnaghi, Dr Chuan H Foh Centre for Communication Systems Research Electronic Engineering.
Machine to Machine communications
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Completing the Convergence Puzzle: A Survey and A Roadmap IEEE Wireless Communications ‧ June 2009 DJAMAL-EDDINE MEDDOUR, USMAN JAVAID, AND NICOLAS BIHANNIC,
1 Secure User Plane Location Ileana Leuca Director Technology Architecture & Standards.
Group Meeting Ming Hong Tsai Date : Toward Ubiquitous Massive Accesses in 3GPP Machine-to- Machine Communications 2.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Work Group / Work Item Proposal Slide 1 © 2012 oneM2M Partners oneM2M-TP oneM2M_Work_Group_Work_Item_Proposal Group name: Technical Plenary Source:
Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent.
An introduction to oneM2M
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
OneM2M Challenges of M2M Security and Privacy
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Routing Problem of the Current Architecture Group Name: ARC Source: Hongbeom Ahn, LG Electronics, Meeting Date: Agenda.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Realizing Ms Interface with OMA DM Group Name: MAS WG Source: Seungkyu Park, LG Meeting Date:
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Technology Architecture & Standards Group © 2002 AT&T Wireless Services, Inc. AT&T WIRELESS — CONFIDENTIAL & PROPRIETARY Use pursuant to Company instructions.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Internet of Things. Creating Our Future Together.
Association of Competitive Telecom Operators IPv6 & TELCOs Workshop On IPv6 New Delhi 21 st July 2009.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Developing IoT endpoints with mbed Client
3GPP interworking in R3 Group Name: ARC
Chapter 24: Internet of Things (IoT): Growth, Challenges and Security
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
An introduction to oneM2M
Presentation transcript:

Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1

Outline 2 Introduction M2M architecture defined by ETSI Communication establishment Research opportunities and standardization challenges in M2M systems Conclusions Architecture and functionality in M2M standards

Introduction 3 oneM2M – Goal is to develop technical specifications which address the need for a common M2M service layer, which can be realized through various hardware and software implementations, to connect diverse M2M devices with M2M servers. ETSI – One of the most influential standardization organizations involved in creating common standards for M2M communication.

M2M architecture defined by ETSI 4 Work with – 3GPP : 3rd Generation Partnership Project – 3GPP2 – OMA : Open Mobile Alliance – BBF : Broadband Forum Work on – They define a high-level architecture view that identifies all constituents of M2M systems. – They also define a functional architecture view together with reference points between different entities in M2M systems.

High-level Architecture 5 M2M Device It runs DA using DSCL

High-level Architecture 6 M2M Gateway It runs GA using GSCL

High-level Architecture 7 M2M Area Network It provides connectivity base on Personal or local area network tech (e.g. Zigbee, Bluetooth)

High-level Architecture 8 Access Network It allows M2M devices and gateways to communicate with core network.

High-level Architecture 9 Core Network It enables interconnection with other networks. It provides IP connectivity or other connectivity options, service and control functions, and roaming.

High-level Architecture 10 M2M Management Functions They consist of all the functions required to manage M2M service capabilities in the network domain.

High-level Architecture 11 Network Management Functions They consist of all the functions required to manage access and core networks.

Functional Architecture 12 One of the main M2M standardization objectives is the development of functionalities that will allow efficient deployment for M2M applications. Each M2M domain has its own SCL, which provides functions that are exposed on the mIa, dIa, mId, and mIm reference points. mIm reference point extends the reachability of services offered over mId reference point.

13 xAEApplication enablement xGCGeneric communication xRARReachability, addressing, and repository xCSCommunication selection xREMRemote entity management xSECSecurity xHDRHistory and data retention xTMTransaction management xIPInterworking proxy xCBCompensation brokerage NTOETelco operator exposure Functional Architecture

Communication establishment 14 M2M Device Implement ETSI M2M service capabilities ( => D ) Not ( => D’ ) Connect to the network domain through gateway Directly (via M2M access network) Indirectly (via M2M area network)

Communication establishment 15 Device 1 ( D ) Directly through mId to NSCL

Communication establishment 16 Device 2 ( D’) Indirectly through dIa to GSCL

Communication establishment 17 Device 3 ( D’) Directly through dIa to NSCL

Communication establishment 18 However, an M2M device may not support IP protocol for communication. A legacy device can be connected to M2M network domain by three ways. M2M Device Implement ETSI M2M service capabilities ( => D ) Not ( => D’ ) Legacy device

Communication establishment 19 Device 4 (legacy) Indirectly through GIP on G Gateway Interworking Proxy

Communication establishment 20 Device 5 (legacy) Indirectly through DIP on D

Communication establishment 21 Device 6 (legacy) Directly through NIP

Application Registration 22 Involves local registration of an M2M application with the local SCL. Purpose : allow the M2M application to use M2M services offered by the local SCL. As a result, the local SCL obtains context information on the registered applications. Kmc obtained from the Kmr root key after mutual authentication may be used to protect application registration.

Application Registration 23 Network Bootstrap & Network Registration – Purpose of Bootstrap : configure an M2M device or gateway in order to connect and register to the access network. – Registration involves the registration of the M2M device/gateway with the access network, based on the corresponding access network standards. M2M Service bootstrap & M2M Service connection Entity A Entity B Entity Z

Application Registration 24 Network Bootstrap & Network Registration – Purpose of Bootstrap : configure and M2M device or gateway in order to connect and register to the access network. – Registration involves the registration of the M2M device/gateway with the access network, based on the corresponding access network standards. M2M Service bootstrap & M2M Service connection Entity A Entity B Entity Z Unique identifier

Identifiers used during M2M service bootstrap and connection 25 Pre-provisioned Identifier – Needs to be pre-provisioned by the M2M device/gateway manufacturer M2M Node Identifier (Node-ID) – Uniquely identifies a particular M2M entity on a global level. M2M Service Connection Identifier (Connection-ID) – Identifies an M2M service connection. NSCLD/GSCL authenticated authorized

M2M connection establishment 26

Application Registration 27 Bit 0 : Bluetooth Bit 1 : Wi-Fi Bit 2 : Wireless M-Bus Bit 3 : ZigBee Value 0 – M2M device does not support that communication tech. Last bit value 1 – expand the header with other bytes. Those identifiers/ addresses are of different lengths

SCL Registration 28 The architecture defines three ways the mId may be secured Via access network layer security – if the underlying access network is already physically secured. Via channel security – It can be established after the M2M service connection procedure takes place. Via object security – M2M implementation may also rely on object security by applying security at the protocol payload level.

Research opportunities and standardization challenges in M2M systems 29 Research opportunities: Communication and identification – IP protocol may be too complex for small devices. GIP allows communication between IP and non-IP devices by providing interfaces. Developing simplified IP stacks over existing low energy protocol suites. (6LoWPAN) – May applications in distributed system rely on flat because of different communication tech. Without an M2M gateway regardless of communication tech Modify current applications in such a way that they work – Always accessible Switch between sleep and job mode – Rich Presence Information (RPI) Gateway needs to wake up the sleeping device – trigger – Management functionalities due to a huge number of entities.

Research opportunities and standardization challenges in M2M systems 30 Research opportunities: Communication and identification – IP protocol may be too complex for small devices. GIP allows communication between IP and non-IP devices by providing interfaces. Developing simplified IP stacks over existing low energy protocol suites. (6LoWPAN) – May applications in distributed system rely on flat because of different communication tech. Without an M2M gateway regardless of communication tech Modify current applications in such a way that they work – Always accessible Switch between sleep and job mode – Rich Presence Information (RPI) Gateway needs to wake up the sleeping device – trigger – Management functionalities due to a huge number of entities.

Research opportunities and standardization challenges in M2M systems 31 Research opportunities: Communication and identification – IP protocol may be too complex for small devices. GIP allows communication between IP and non-IP devices by providing interfaces. Developing simplified IP stacks over existing low energy protocol suites. (6LoWPAN) – May applications in distributed system rely on flat because of different communication tech. Without an M2M gateway regardless of communication tech Modify current applications in such a way that they work – Always accessible Switch between sleep and job mode – Rich Presence Information (RPI) Gateway needs to wake up the sleeping device – trigger – Management functionalities due to a huge number of entities.

Research opportunities and standardization challenges in M2M systems 32 Research opportunities: Communication and identification – IP protocol may be too complex for small devices. GIP allows communication between IP and non-IP devices by providing interfaces. Developing simplified IP stacks over existing low energy protocol suites. (6LoWPAN) – May applications in distributed system rely on flat because of different communication tech. Without an M2M gateway regardless of communication tech Modify current applications in such a way that they work – Always accessible Switch between sleep and job mode – Rich Presence Information (RPI) Gateway needs to wake up the sleeping device – trigger – Management functionalities due to a huge number of entities.

Research opportunities and standardization challenges in M2M systems 33 Research opportunities: Security and privacy – Given the limitations on the computational capabilities of many sensing and actuating platforms, security tech must be developed to cope with heterogeneous devices, some of which may be very limited. – As distributed and autonomous trust mechanisms will be required, trust must be established on an M2M device from the start. Trusted computing group has proposed autonomous and remote validation models. – Anonymity and liability are two interrelated security requirements for M2M applications.

Research opportunities and standardization challenges in M2M systems 34 Research opportunities: Security and privacy – Given the limitations on the computational capabilities of many sensing and actuating platforms, security tech must be developed to cope with heterogeneous devices, some of which may be very limited. – As distributed and autonomous trust mechanisms will be required, trust must be established on an M2M device from the start. Trusted computing group has proposed autonomous and remote validation models. – Anonymity and liability are two interrelated security requirements for M2M applications.

Research opportunities and standardization challenges in M2M systems 35 Research opportunities: Security and privacy – Given the limitations on the computational capabilities of many sensing and actuating platforms, security tech must be developed to cope with heterogeneous devices, some of which may be very limited. – As distributed and autonomous trust mechanisms will be required, trust must be established on an M2M device from the start. Trusted computing group has proposed autonomous and remote validation models. – Anonymity and liability are two interrelated security requirements for M2M applications.

Research opportunities and standardization challenges in M2M systems 36 Standardization challenges – M2M can replace proprietary tech such as SCADA in the future. Unlike SCADA, M2M devices are able to push data to a server and M2M also works with standardized tech. Such factors will push towards the replacement of proprietary tech with M2M solutions in the long term. – The security co-processor may enable efficient cryptographic operations in low-end sensing and actuating platforms, and more complete hardware-based security solutions can also be used, such as the one currently proposed with Trustchip.

Research opportunities and standardization challenges in M2M systems 37 Standardization challenges – M2M can replace proprietary tech such as SCADA in the future. Unlike SCADA, M2M devices are able to push data to a server and M2M also works with standardized tech. Such factors will push towards the replacement of proprietary tech with M2M solutions in the long term. – The security co-processor may enable efficient cryptographic operations in low-end sensing and actuating platforms, and more complete hardware-based security solutions can also be used, such as the one currently proposed with Trustchip.

Conclusions 38 Because M2M systems are primarily characterized by heterogeneity, we propose a new pre-provisioned device identifier, transparent of the underlying communication tech. As in the current Internet architecture, security will remain of prime important and will in fact represent a fundamental enabling factor of most of the current applications of M2M communication.

Pros and Cons 39 To overview, this document integrated and arranged the introduction of M2M works and challenges clearly. However, it didn’t provide something new of communication and security tech in M2M system.

2014 previous research 40

2015 future research 41

Architecture and Functionality in M2M Standards 42 The paper investigates current standards in M2M. The architecture of ETSI M2M and OneM2M are compared. Because OneM2M is based on ETSI M2M, nodes and other parts of architecture have different name but denotes similar entities. The functional comparison shows similar results. Only Open MTC has supported connectivity by Web socket, Diameter and MQTT. In the future work, authors will concentrate on analysis of OneM2M platforms.

Reference 43 Communication and Security in Machine-to-Machine Systems Journal papers list of Gordan Jezic Architecture and Functionality in M2M Standards M2M Service Capabilities - Full Scale Technologies TCG (trusted computing group) TrustChip

44 Thank you.