SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
최종석
2015.11.11
목차
목차
I. Introduction
of OneM2M
II. OneM2M Security III. OneM2M Identifiers
IV. Accessing Resource V. Other Protocols
Introduction
Detailed of CSE
Security Framework
Security Procedures
Blocking Mode
Non-Blocking Mode in Synchronous
Non-Blocking Mode in Asynchronous
Device Triggering
Location Request
Notification of Re-Targeting
AllJoyn Internetworking
LWM2M Internetworking
VI. OneM2M
Internetworking
3
1. Introduction
2. Detailed of CSE
I. Introduction of OneM2M
oneM2M 기술은 다양한 제품간 연결성을 바탕으로 새로운 제품 및 서비스로 손쉽게 확장 가능
IoT 플랫폼 보안 - OneM2M 플랫폼
WLAN
PAN
(Bluetooth)
Mobile Network
(LTE)WLAN/ZigBee
“내 손안의 우리 집” “즐겁고 편한 운전 환경”“편리한 건강 관리”
Smart Home Smart CarHealthcare
Common Service Layer
“플랫폼 공통화 à 고객의 가치 창조하는 새로운 M2M 서비스 창출 가능”
Module
Module Module Module Module Module
Module
Module
Module
Module
Module
Module
Module
Module
Module
I. Introduction of OneM2M
oneM2M Common Service Function oneM2M 핵심 요소 기술
스마트폰스마트가전
Access Networks (2G/3G/LTE/WiFi/ZigBee)
Common Service Functions
스마트
그리드
헬스케어스마트홈
보안
스마트카
자동차센서
식별 체계
Delivery
Handling
자원 탐색 데이터 관리 그룹 관리
위치 정보 네트워크 연동 장치 관리
데이터 서비스
부가 서비스
네트워크 서비스
• 데이터 탐색/저장/접근제어 기술
• 데이터 분석 기술 (Big Data)
• 위치 정보 제공 기술
• 원격 장치 관리 기술
• 액세스 네트워크 (3GPP) 연동 기술
• QoS, Multicast/Broadcast 제어 기술
공통 서비스
• 어플리케이션 보안성 제공
• 글로벌 식별 체계 및 Delivery Handling
Application
M2M
서비스
플랫폼
Access
Network
Device/
Module
M2M
주요 서비스
• 스마트 홈, 스마트 카
• 스마트 그리드, 헬스케어
WAN /
HAN
• Cellular Network (2G / 3G / LTE)
• Wi-Fi / ZigBee / Bluetooth
M2M Device/
Gateway
• Smart TV, Smart Phone
• Smart Meter, Health Sensor
• Smart Gateway
IoT 플랫폼 보안 - OneM2M 플랫폼
I. Introduction of OneM2M
Common Service Functions
6
Application
Entity (AE)
Mca Reference Point
Mcn Reference Point
Common Services Entity (CSE)
Application and
Service Layer
Management
Device
Management
Discovery
Group
Management
Location
Network Service
Exposure/Service
Ex+Triggering
Registration Security
Underlying Network
Service Entity (NSE)
Mcc Reference Point
The services provided by the Common Services Layer in the M2M System.
Reside within a CSE and are referred to as Common Services Functions (CSFs).
The CSFs provide services to the AEs via the Mca Reference Point and to other CSEs via
Mcc reference point.
CSEs interact with the NSE via the Mcn reference point.
Communication
Management/
Delivery Handling
Data Management
& Repository
Service Charging &
Accounting
Subscription and
Notification
I. Introduction of OneM2M
Common Service Functions - ASM
7
The ASM CSF provides management capabilities for CSEs and AEs.
This includes capabilities to configure, troubleshoot and upgrade the functions of the
CSE, as well as to upgrade the AEs.
The management functions include :
• ConfigurationFunction (CF): This function enables the configuration of the capabilities and
features of the CSE.
• Software Management Function (SMF): This function provides lifecyclemanagement for
software components and associatedartifacts (e.g. configurationfiles) for different entities suchas
CSE andAE.
Application and ServiceLayer Management(ASM)
I. Introduction of OneM2M
Common Service Functions ­ CMDH, DMR
8
• The CMDH CSF provides communications with other CSEs, AEs and NSEs.
• The CMDH CSF decides at what time to use which communication connection for
delivering communications and, when needed and allowed, to buffer communication
requests so that they can be forwarded at a later time. This processing in the CMDH
CSF is carried out per the provisioned CMDH policies and delivery handling
parameters that can be specific to each request for communication.
The Communication Management and DeliveryHandling(CMDH)
Data Management and Repository(DMR)
• DMR CSF is responsible for providing data storage and mediation functions.
• Ability to store data in an organized fashion so it is discernible.
• Provides the means to aggregate data received from different entities.
• Ability to grant access to data from remote CSEs and AEs based on defined access
control policies, and trigger data processing based on data access.
• Ability to provide the means to perform data analytics on large amount of data to
allow service providers to provide value-added services.
I. Introduction of OneM2M
Common Service Functions ­ DMG
9
Device Management(DMG)
• The DMG CSF provides management of device capabilities on MNs (e.g. M2M
Gateways), ASNs and ADNs (e.g. M2M Devices), as well as devices that reside
within an M2M Area Network.
Discovery (DIG)
• The DIS CSF searches information about applications and services as contained in
attributes and resources.
I. Introduction of OneM2M
Common Service Functions ­ DIS, GMG, LOC
10
• The DIS CSF searches information about applications and services as contained in
attributes and resources.
• The result of a discovery request from an Originator depends upon the filter
criteria(e.g. a combination of keywords, identifiers, location and semantic
information) and is subject to access control policy allowed by M2M Service
Subscription.
Discovery (DIG)
Group Management (GMG)
• The GMG CSF is responsible for handling group related requests.
• The GMG CSF enables the M2M System to perform bulk operations on multiple devices,
applications or resources that are part of a group. In addition, the GMG CSF supports
bulk operations to multiple resources of interest and aggregates the results.
• The Location (LOC) CSF allows AEs to obtain geographical location information of
Nodes (e.g. ASN, MN) for location-based services.
Location (LOC)
I. Introduction of OneM2M
Network Service Exposure, ServiceExecution and Triggering (NSSE)
Common Service Functions ­ NSSE, REG, SEC
11
• The NSSE CSF manages communication with the Underlying Networks for
obtaining network service functions on behalf of other CSFs, remote CSEs or AEs.
• The NSSE CSF uses the Mcn reference point for communicating with the Underlying
Networks.
Registration(REG)
• The Registration (REG) CSF processes a request from an AE or another CSE to
register with a Registrar CSE in order to allow the registered entities to use the
services offered by the Registrar CSE.
The Security (SEC) CSF comprises the following functionalities:
• Sensitive data handling
• Security administration
• Security association establishment
• Access control including identification, authentication and authorization
• Identity management
Security (SEC)
I. Introduction of OneM2M
• The Service Charging and Accounting (SCA) CSF provides charging functions for the
Service Layer.
• The SCA CSF performs information recording corresponding to a chargeable event
based on the configured charging policies.
• The SCA CSF sends the charging information transformed from the specific recorded
information to the billing domain by the use of a standard or proprietary interface for
charging purposes.
Common Service Functions ­ SCA, SUB
12
Subscription and Notification (SUB)
• The SUB CSF manages subscriptions to resources, subject to access control policies,
and sends corresponding notifications to the address(es) where the resource
subscribers want to receive them.
Service Charging andAccounting (SCA)
I. Introduction of OneM2M
II. OneM2M Security
13
1. Security Framework
2. Security Procedures
IoT 플랫폼 보안
14
사물인터넷 플랫폼 보안 기술 정의 사례 2
§ OneM2M 보안 기술
– Privacy/Trust 관리 기술
– 인증/인가 기술
– 안전한 데이터 전송 기술
– 시스템 보안 기술
– Security Association 기술
Infrastructure
domain
Field
domain
Non-oneM2
M
Device
Non-oneM2
M
Device
Non-oneM2
M
Device
Non-oneM2
M
Device
To an
Infrastructure
Node of other
M2M Service
Providers
IN-AE Mca
Infrastructure
Node(IN)
IN-AE
IN-CSE
Mca
Middle
Node(IN)
MN-CSE
MN-AE
Mca
Middle
Node(IN)
Mca
Mca
Mca
MN-CSE
MN-AE
Application
Dedicated
Node
(ADN)
ADN-AE
Mca
Application
Service
Node
(ASN)
ASN-AE
ASN-CSE
Application
Dedicated
Node
(ADN)
ADN-AE
Mca
Application
Service
Node
(ASN)
ASN-AE
ASN-CSE
Mcc’
Mcn
Mcc
Mcc
Mcc
McnMcn Mcc
Mcc
Mcn Mcn
Link is out of scope
Application
Entity (AE)
Mca Reference Point
Mcn Reference Point
Common Services Entity (CSE)
Application and
Service Layer
Management
Communication
Management/
Delivery Handling
Data Management
& Repository
Device
Management
Discobery
Group
Management
Location
Network Service
Exposure/Service
Ex+Triggering
Registration Security
Service Charging &
Accounting
Subscription and
Notification
Underlying Network
Service Entity (NSE)
II. OneM2M Security
IoT 플랫폼 보안
15
사물인터넷 플랫폼 보안 기술 정의 사례 3
§ OneM2M Security Architecture
Security Services
Security API (Mca, Mcc) (not specified in the present document)
Security Functions Layer
Identification
And
Authentication
Authorization Identity
Management
Security
Association
Sensitive Data
Handling
Security
Administration
Secure Environment Abstraction Layer (not specified in the present document)
Secure Environments Layer
Secure Environment n
Sensitive Data Sensitive Functions
현재 표준 문서에는
components가 정의되어 있
지 않은 계층
OneM2M 보안 핵심계층
II. OneM2M Security
IoT 플랫폼 보안
16
OneM2M Security Functions Layer
§ Authentication
• UN-SP : UnderlyingNetwork Service provider
• GBA : Generic BootstrappingArchitecture
• MEF : M2M enrolment function
• BSF : Bootstrap service function
• MAF : m2mauthentication function
• RSPF : remote security provisioning framework
• SAEF : security association establishment framework
① Provisioned Symmetric Key Security
Association Establishment
Framework
ü 미리 제공된 대칭키를 이용하
여 end-points간의 association
진행
② Certificate-Based Security security
Association Establishment
Framework
ü 개인 서명키와 인증서, 공개키
를 이용하여 association
③ MAF Security security Association
Establishment Framework
ü 3rd party service provider에 의
해서 진행됨
셋 중에 하나 사용
Certificate-Based SAEF와 Symmetric Key-
Based SAEF는 Entity 간의 인증을 수행
MAF-Based SAEF는 3자간
인증을 수행
II. OneM2M Security
IoT 플랫폼 보안
17
OneM2M Security Functions Layer
§ Authorization Procedure
Policy Enforcement Point(PEP)
Policy Decision Point(PDP)
Policy Retrieval Point(PRP)
Policy Information Point(PIP)
PDP 가 인가를 하기 위
해 PRP,PIP에게 정보를
언어오는 단계
PDP 가 접근 허용여부
를 결정하는 단계
II. OneM2M Security
IoT 플랫폼 보안
18
OneM2M Security Framework
§ General Introductions to the Security Frameworks
– the Symmetric Key Security Framework
– the Certificate-Based Security Framework
– the Generic Bootstrapping Architecture(GBA) Framework
§ Security Association Establishment Frameworks
– Provisioned Symmetric Key Security Association Establishment Frameworks
– Certificate-Based Security Association Establishment Frameworks
– MAF(M2M Authentication Function)-Based Symmetric Key Security Association
Establishment Frameworks
§ Remote Security Provisioning Frameworks
– Pre-Provisioned Symmetric Enrolee Key Remote Security Provisioning Framework
– Certificate-Based Remote Security Provisioning Framework
– GBA-based Remote Security Provisioning Framework
II. OneM2M Security
IoT 플랫폼 보안
19
OneM2M Security Framework
§ Security Association Establishment Frameworks
– Credential Configuration
• 사전 파라미터 설정 단계
– Association Configuration
• 상대방 정보 송수신
– Association Security Handshake
• 상호 인증
II. OneM2M Security
IoT 플랫폼 보안
20
OneM2M Security Framework
§ Remote Security Provisioning Frameworks
– Bootstrap Credential Configuration
– Bootstrap Instruction Configuration
– Bootstrap Enrolment Handshake
– Enrolment Key Generation
– Enrolment Phase
II. OneM2M Security
III. OneM2M Identifiers
21
1. AllJoyn Internetworking
2. LWM2M Internetworking
M2M Identifiers on OneM2M
22
M2M Identifiers
§ Application Entity Identifier(AE-ID)
§ Application Identifier(App-ID)
§ CSE-Identifier(CSE-ID)
§ M2M Node Identifier(M2M-Node-ID)
§ M2M Service Subscription Identifier(M2M-Sub-ID)
§ M2M Request Identifier(M2M-Request-ID)
§ M2M External Identifier(M2M-Ext-ID)
§ Underlying Network Identifier(UNetwork-ID)
§ Trigger Recipient Identifier(Trigger-Recipient-ID)
§ M2M Service Identifier(M2M-Sev-ID)
§ Service Role Identifier(SRole-ID)
§ M2M Service Profile Identifier(M2M-Service-Profile-ID)
III. OneM2M Identifiers
M2M Identifiers on OneM2M
23
Application Entity Identifier(AE-ID)
§ An Application Entity Identifier(AE-ID) uniquely identifies anAE
resident on an M2M Node.
§ AE-ID is globally unique within/outside M2MSPdomain
Application Identifier(App-ID)
§ An Application Identifier(App-ID) uniquely identifies an M2M
Application in a given context.
§ Two Type
§ App-ID(RegisteredApp-ID) : guarantee to be globally unique.
§ Non-RegisteredApp-ID : not guarantee to be globally unique.
III. OneM2M Identifiers
M2M Identifiers on OneM2M
24
CSE-Identifier(CSE-ID)
§ A CSE shall be identified by a globally unique identifier, the CSE-ID,
when instantiated within an M2M Node in the M2M System.
§ The CSE-ID is globally unique, when used internally within/outsidea
specific M2M SPdomain.
§ The CSE-ID shall identify the CSE for the purpose of all interactions
from/to the CSE within the M2M System.
M2M Node Identifier(M2M-Node-ID)
§ An M2M Node, hosting a CSE and/orApplication(s) shall be identified
by a globally unique identifier, the M2M-Node-ID.
§ The M2M System shall allow the M2M Service Providerto set the CSE-
ID and the M2M-Node-IDto the same value.
§ The M2M-Node-ID enables the M2M Service Providerto bind a CSE-
ID to a specific M2M Node.
§ Examples of allocating a globally unique M2M-Node-IDinclude the use
of Object Identity (OID) and IMEI. For details on OID,
III. OneM2M Identifiers
M2M Identifiers on OneM2M
25
M2M Service Subscription Identifier(M2M-Sub-ID)
§ The M2M-Sub-ID enables the M2M SPto bind application(s) to a
particular M2M ServiceSubscription between an M2M subscriberand
the M2M Service Provider.
§ The M2M-Sub-ID is unique for every M2Msubscriber.
§ Characteristics:
§ belongs to the M2M Service Provider;
§ identifies the subscription to an M2M Service Provider;
§ enables communication with the M2M Service Provider;
§ can differ from the M2M Underlying Network Subscription Identifier.
§ There can be multiple M2M Service SubscriptionIdentifiers perM2M
Underlying Network subscription. TheM2M-Sub-IDshall not be
exposed over any interface.
III. OneM2M Identifiers
M2M Identifiers on OneM2M
26
M2M Request Identifier(M2M-Request-ID)
§ The M2M-Request-ID tracks a Request initiated by anAE over the
Mca referencepoint, and by a CSE over the Mcc referencepoint
§ To enable an AE to track Requests and corresponding Responses over
the Mca referencepoint, AEs shall includea distinct M2M Request
Identifier per request
M2M External Identifier(M2M-Ext-ID)
§ The M2M-Ext-ID is used by an M2M SP when services are
requested from the Underlying Network.
§ allows the Underlying Network to identify the M2M Device (e.g.
ASN, MN) associated with the CSE-ID.
§ For each CSE-ID, there is only one M2M-Ext-ID for a specific UNetwork-ID.
§ The mapping by the Underlying Network of the M2M-Ext-ID to the M2M Device
is Underlying Network specific.
§ The Underlying Network provider and the M2M SP collaborate for the
assignment of an M2M-Ext-ID to each CSE.
III. OneM2M Identifiers
M2M Identifiers on OneM2M
27
Underlying Network Identifier(UNetwork-ID)
§ The UNetwork-ID is used for identifying an Underlying Network.
UNetwork-ID is a static value and unique within a M2M Service
Provider domain.
§ For example, based on "policy", scheduling of traffic triggered by
a certain event category in certain time periods may be allowed
over Underlying Network "WLAN”.
Trigger Recipient Identifier(Trigger-Recipient-ID)
§ The Trigger-Recipient-IDis used to identify an instance of an
ASN/MN-CSE on an execution environment.
§ For example, when 3GPP device triggering is used, the Trigger-
Recipient-ID maps to the AppID
§ For pre-provisioned M2M-Ext-IDs, Trigger-Recipient-ID is provisioned at the
Infrastructure Node along with the M2M-Ext-ID and the associated CSE-ID.
§ For dynamic M2M-Ext-IDs, Trigger-Recipient-ID specific to the Underlying
Network is provisioned at each M2M device in the Field Domain. Such Trigger-
Recipient-ID is conveyed to the IN-CSE during CSE Registration
III. OneM2M Identifiers
M2M Identifiers on OneM2M
28
M2M Service Identifier(M2M-Sev-ID)
§ The M2M-Serv-ID is an identifier of a M2M Service offered by an
M2M SP.
§ It is an essential part of the M2M Service Subscription which
stores a set of M2M-Serv-IDs pertaining to the set of subscribed
services.
Service Role Identifier(SRole-ID)
§ The Service Role Identifier shall be used for service access
authorization.
§ In each M2M Service, one or multiple M2M Service Role(s) shall
be defined by the M2M Service Provider.
§ An M2M Service Role is defined as a create permission pertaining
to resource types which are associated with M2M Service.
III. OneM2M Identifiers
M2M Identifiers on OneM2M
29
M2M Service Profile Identifier(M2M-Service-Profile-ID)
§ An M2M Service Profile Identifier defines M2M Service Roles as
well as applicable rules governing the AEs registering with M2M
Nodes and the AEs residing on these nodes.
§ Every M2M Service Profile is allocated an identifier so it can be
retrieved for verification purposes.
§ belongs to the M2M Service Provider;
§ identifies the M2M Service Roles as well as applicable rules governing AEs
registering with an M2M node. The M2M Service Roles define the M2M Services
authorized for the M2M Service Profile
III. OneM2M Identifiers
IV. Accessing Resources
30
1. Blocking Mode
2. Non-Blocking Mode in Synchronous
3. Non-Blocking Mode in ASynchronous
Accessing Resources in CSEs
Types of accessing resources
– No Hop
– 1 Hop
– Multi Hops
Non blocking accessing resources
– Synchrous mode
– Asynchrous mode
31
IV. Accessing Resources
Accessing Resouces in CSEs ­ No Hop
32
IV. Accessing Resources
Accessing Resouces in CSEs ­ 1 Hop
33
IV. Accessing Resources
Accessing Resouces in CSEs ­ Multi Hop
34
IV. Accessing Resources
Accessing Resources in Synchronous mode
35
IV. Accessing Resources
Accessing Resources in Asynchronous mode
36
IV. Accessing Resources
V. Other Protocols
37
1. Device Triggering
2. Location Request
3. Notification of Re-Targeting
Device Triggering
38
V. Other Protocols
Location Request
39
V. Other Protocols
Notification of Re-Targeting
40
V. Other Protocols
VI. OneM2M Internetworking
41
1. AllJoyn Internetworking
2. LWM2M Internetworking
oneM2M Interworking ­ Non oneM2M Entity
42
Non oneM2M Entity Interworking
§ oneM2M 에서는 non oneM2M Entity와의 연동을 위해 IPE(Interworking
Proxy Entity)를 정의
§ 타플랫폼의 Specific Data Model을 IPE에서 oneM2M에서 정의된 Common
Data Model으로 Mapping
• oneM2M Entity는 IPE에서 Mapping한 Common Data Model에 접근하여 연동
Non-oneM2M
specific data model
Common data model
VI. OneM2M Internetworking
oneM2M Interworking - AllJoyn
43
AllJoyn Interworking
§ 연동 시나리오
Field Domain Infrastructure Domain
Infrastructure
Domain of oneM2M
Service Provider
AllJoyn Network
in the field
domain
AllJoyn
enabled
mobile
device
Field Domain Infrastructure Domain
Infrastructure
Domain of oneM2M
Service Provider
AllJoyn Network
in the field
domain
oneM2M
enabled
mobile
device
Field Domain Infrastructure Domain
Infrastructure
Domain of oneM2M
Service Provider
AllJoyn Network
in the field
domain
AllJoyn Network
in the field
domain
Field Domain Infrastructure Domain
Infrastructure
Domain of oneM2M
Service Provider
oneM2M Field
Domain Network
AllJoyn Network
in the field
domain
Field Domain Infrastructure Domain
Infrastructure
Domain of oneM2M
Service Provider
oneM2M Field
Domain Network
AllJoyn Network
in the field
domain
1
2
3
4
5
AllJoyn enabledmobile device controls AllJoyn NetworkthroughoneM2M
oneM2M enabledmobile device controls AllJoyn Network
Two AllJoyn communicates witheach other through oneM2M
AllJoyn Networkcommunicates with oneM2M through oneM2M
AllJoyn Networkdirectlycommunicates with oneM2Mfield domainNetwork
VI. OneM2M Internetworking
oneM2M Interworking - AllJoyn
44
AllJoyn Interworking
§ Service Mapping
– 기존 <container> Resource Type Mapping
• AllJoyn의 methods, signals, properties까지 접근제어 정책을 적용할 수 없음
è <containerInstance>는 container의 accessControlPolicy를 따름
VI. OneM2M Internetworking
oneM2M Interworking - AllJoyn
45
AllJoyn Interworking
§ Service Mapping
– Newly defined Resource Type
• AllJoyn 연동을 위한 새로운 oneM2M Resource Type 정의
à 새로운 Resource Type 정의에 대한 비용 발생
VI. OneM2M Internetworking
oneM2M Interworking ­ LWM2M
46
LWM2M Interworking
§ 연동 시나리오
– LWM2M Interworking Proxy Entity(IPE) 를 통한 연동
• 기본적으로 TS-0001에 정의된 non-oneM2M Entity 와 CSE 간의 연동을 참조
VI. OneM2M Internetworking
oneM2M Interworking ­ LWM2M
47
LWM2M Interworking
§ 연동 방법
– LWM2M IPE를 통해 LWM2M Object를 <container> 리소스로 encapsulates
– IPE가 생성한 <container> 에 접근을 통해 연동 가능
VI. OneM2M Internetworking
oneM2M Interworking ­ LWM2M
48
LWM2M Interworking
§ Interworking Proxy Entity(IPE)
– LWM2M Server와 AE로 구성된 Entity
• LWM2M Server
: LWM2M Client와 LWM2M 프로토콜을 통해 LWM2M Object를 전달 받음
• AE(Application Entity)
: CSE 등과 통신하기 위한 Entity
VI. OneM2M Internetworking
oneM2M Interworking ­ LWM2M
49
LWM2M Interworking
§ LWM2M IPE 에서 지원하는 프로토콜
– Device and Endpoint Lifecycle
– Object Discovery
– Object Transport and Interworking
– Object Subscription and Notification
– Object Security
– Client Pre-provisioning
– IPE Administration
§ 프로토콜에 대한 oneM2M Mapping
VI. OneM2M Internetworking
oneM2M Introduction and security

Contenu connexe

Tendances

허준환 One m2m-protocol binding
허준환   One m2m-protocol binding허준환   One m2m-protocol binding
허준환 One m2m-protocol binding
JunHwan Huh
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15
embeijlen
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
Sen Nathan
 

Tendances (20)

A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...
 
One m2m 2. requirements
One m2m 2. requirements One m2m 2. requirements
One m2m 2. requirements
 
Eclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platformEclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platform
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
 
oneM2M overview
oneM2M overviewoneM2M overview
oneM2M overview
 
허준환 One m2m-protocol binding
허준환   One m2m-protocol binding허준환   One m2m-protocol binding
허준환 One m2m-protocol binding
 
One m2m
One m2mOne m2m
One m2m
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
 
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra WirelessIoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
 
Lightweight M2M
Lightweight M2MLightweight M2M
Lightweight M2M
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorial
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
 
Smart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint managementSmart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint management
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15
 
5G Americas_Network Slicing
5G Americas_Network Slicing5G Americas_Network Slicing
5G Americas_Network Slicing
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
 
Management for CPS
Management for CPSManagement for CPS
Management for CPS
 

Similaire à oneM2M Introduction and security

Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
Future Cities Project
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
Javier Guillermo, MBA, MSc, PMP
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
mfrancis
 
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
Shameer KC
 

Similaire à oneM2M Introduction and security (20)

One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
 
Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
Workshop on Large-scale Sensing For Future Cities'13 / Jorge Sousa: "SMART2M"
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
 
Resume
ResumeResume
Resume
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingEnd-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
 
Cap interface
Cap interfaceCap interface
Cap interface
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Computer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU LectureComputer Port IT Solutions JNTU Lecture
Computer Port IT Solutions JNTU Lecture
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
 
CDMA Wireless Intelligent Network for advanced SMS
CDMA Wireless Intelligent Network for advanced SMSCDMA Wireless Intelligent Network for advanced SMS
CDMA Wireless Intelligent Network for advanced SMS
 
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
 
F5_and_Azure_v3.pptx
F5_and_Azure_v3.pptxF5_and_Azure_v3.pptx
F5_and_Azure_v3.pptx
 
Bhadale group of companies cpsos services catalogue
Bhadale group of companies cpsos services catalogueBhadale group of companies cpsos services catalogue
Bhadale group of companies cpsos services catalogue
 
20240
2024020240
20240
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 

Plus de Jongseok Choi

Plus de Jongseok Choi (17)

Hyperledger 구조 분석
Hyperledger 구조 분석Hyperledger 구조 분석
Hyperledger 구조 분석
 
Blockchain trends and research
Blockchain trends and researchBlockchain trends and research
Blockchain trends and research
 
블록체인 개요
블록체인 개요블록체인 개요
블록체인 개요
 
Bitcoin and Ethereum
Bitcoin and EthereumBitcoin and Ethereum
Bitcoin and Ethereum
 
Effective Go
Effective GoEffective Go
Effective Go
 
Case Study on Intelligent IoT Platform
Case Study on Intelligent IoT PlatformCase Study on Intelligent IoT Platform
Case Study on Intelligent IoT Platform
 
IoT Introduction and Security
IoT Introduction and SecurityIoT Introduction and Security
IoT Introduction and Security
 
Gitlab.key
Gitlab.keyGitlab.key
Gitlab.key
 
Usage of GDB
Usage of GDBUsage of GDB
Usage of GDB
 
Basic of Exploitation
Basic of ExploitationBasic of Exploitation
Basic of Exploitation
 
Web penetration
Web penetrationWeb penetration
Web penetration
 
Svn
SvnSvn
Svn
 
Trend briefs security
Trend briefs securityTrend briefs security
Trend briefs security
 
wordpress with nginx on virtualization, jail
wordpress with nginx on virtualization, jailwordpress with nginx on virtualization, jail
wordpress with nginx on virtualization, jail
 
Web hacking 개요
Web hacking 개요Web hacking 개요
Web hacking 개요
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Forensic 2
Forensic 2Forensic 2
Forensic 2
 

Dernier

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Dernier (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 

oneM2M Introduction and security

  • 2. 목차 목차 I. Introduction of OneM2M II. OneM2M Security III. OneM2M Identifiers IV. Accessing Resource V. Other Protocols Introduction Detailed of CSE Security Framework Security Procedures Blocking Mode Non-Blocking Mode in Synchronous Non-Blocking Mode in Asynchronous Device Triggering Location Request Notification of Re-Targeting AllJoyn Internetworking LWM2M Internetworking VI. OneM2M Internetworking
  • 3. 3 1. Introduction 2. Detailed of CSE I. Introduction of OneM2M
  • 4. oneM2M 기술은 다양한 제품간 연결성을 바탕으로 새로운 제품 및 서비스로 손쉽게 확장 가능 IoT 플랫폼 보안 - OneM2M 플랫폼 WLAN PAN (Bluetooth) Mobile Network (LTE)WLAN/ZigBee “내 손안의 우리 집” “즐겁고 편한 운전 환경”“편리한 건강 관리” Smart Home Smart CarHealthcare Common Service Layer “플랫폼 공통화 à 고객의 가치 창조하는 새로운 M2M 서비스 창출 가능” Module Module Module Module Module Module Module Module Module Module Module Module Module Module Module I. Introduction of OneM2M
  • 5. oneM2M Common Service Function oneM2M 핵심 요소 기술 스마트폰스마트가전 Access Networks (2G/3G/LTE/WiFi/ZigBee) Common Service Functions 스마트 그리드 헬스케어스마트홈 보안 스마트카 자동차센서 식별 체계 Delivery Handling 자원 탐색 데이터 관리 그룹 관리 위치 정보 네트워크 연동 장치 관리 데이터 서비스 부가 서비스 네트워크 서비스 • 데이터 탐색/저장/접근제어 기술 • 데이터 분석 기술 (Big Data) • 위치 정보 제공 기술 • 원격 장치 관리 기술 • 액세스 네트워크 (3GPP) 연동 기술 • QoS, Multicast/Broadcast 제어 기술 공통 서비스 • 어플리케이션 보안성 제공 • 글로벌 식별 체계 및 Delivery Handling Application M2M 서비스 플랫폼 Access Network Device/ Module M2M 주요 서비스 • 스마트 홈, 스마트 카 • 스마트 그리드, 헬스케어 WAN / HAN • Cellular Network (2G / 3G / LTE) • Wi-Fi / ZigBee / Bluetooth M2M Device/ Gateway • Smart TV, Smart Phone • Smart Meter, Health Sensor • Smart Gateway IoT 플랫폼 보안 - OneM2M 플랫폼 I. Introduction of OneM2M
  • 6. Common Service Functions 6 Application Entity (AE) Mca Reference Point Mcn Reference Point Common Services Entity (CSE) Application and Service Layer Management Device Management Discovery Group Management Location Network Service Exposure/Service Ex+Triggering Registration Security Underlying Network Service Entity (NSE) Mcc Reference Point The services provided by the Common Services Layer in the M2M System. Reside within a CSE and are referred to as Common Services Functions (CSFs). The CSFs provide services to the AEs via the Mca Reference Point and to other CSEs via Mcc reference point. CSEs interact with the NSE via the Mcn reference point. Communication Management/ Delivery Handling Data Management & Repository Service Charging & Accounting Subscription and Notification I. Introduction of OneM2M
  • 7. Common Service Functions - ASM 7 The ASM CSF provides management capabilities for CSEs and AEs. This includes capabilities to configure, troubleshoot and upgrade the functions of the CSE, as well as to upgrade the AEs. The management functions include : • ConfigurationFunction (CF): This function enables the configuration of the capabilities and features of the CSE. • Software Management Function (SMF): This function provides lifecyclemanagement for software components and associatedartifacts (e.g. configurationfiles) for different entities suchas CSE andAE. Application and ServiceLayer Management(ASM) I. Introduction of OneM2M
  • 8. Common Service Functions ­ CMDH, DMR 8 • The CMDH CSF provides communications with other CSEs, AEs and NSEs. • The CMDH CSF decides at what time to use which communication connection for delivering communications and, when needed and allowed, to buffer communication requests so that they can be forwarded at a later time. This processing in the CMDH CSF is carried out per the provisioned CMDH policies and delivery handling parameters that can be specific to each request for communication. The Communication Management and DeliveryHandling(CMDH) Data Management and Repository(DMR) • DMR CSF is responsible for providing data storage and mediation functions. • Ability to store data in an organized fashion so it is discernible. • Provides the means to aggregate data received from different entities. • Ability to grant access to data from remote CSEs and AEs based on defined access control policies, and trigger data processing based on data access. • Ability to provide the means to perform data analytics on large amount of data to allow service providers to provide value-added services. I. Introduction of OneM2M
  • 9. Common Service Functions ­ DMG 9 Device Management(DMG) • The DMG CSF provides management of device capabilities on MNs (e.g. M2M Gateways), ASNs and ADNs (e.g. M2M Devices), as well as devices that reside within an M2M Area Network. Discovery (DIG) • The DIS CSF searches information about applications and services as contained in attributes and resources. I. Introduction of OneM2M
  • 10. Common Service Functions ­ DIS, GMG, LOC 10 • The DIS CSF searches information about applications and services as contained in attributes and resources. • The result of a discovery request from an Originator depends upon the filter criteria(e.g. a combination of keywords, identifiers, location and semantic information) and is subject to access control policy allowed by M2M Service Subscription. Discovery (DIG) Group Management (GMG) • The GMG CSF is responsible for handling group related requests. • The GMG CSF enables the M2M System to perform bulk operations on multiple devices, applications or resources that are part of a group. In addition, the GMG CSF supports bulk operations to multiple resources of interest and aggregates the results. • The Location (LOC) CSF allows AEs to obtain geographical location information of Nodes (e.g. ASN, MN) for location-based services. Location (LOC) I. Introduction of OneM2M
  • 11. Network Service Exposure, ServiceExecution and Triggering (NSSE) Common Service Functions ­ NSSE, REG, SEC 11 • The NSSE CSF manages communication with the Underlying Networks for obtaining network service functions on behalf of other CSFs, remote CSEs or AEs. • The NSSE CSF uses the Mcn reference point for communicating with the Underlying Networks. Registration(REG) • The Registration (REG) CSF processes a request from an AE or another CSE to register with a Registrar CSE in order to allow the registered entities to use the services offered by the Registrar CSE. The Security (SEC) CSF comprises the following functionalities: • Sensitive data handling • Security administration • Security association establishment • Access control including identification, authentication and authorization • Identity management Security (SEC) I. Introduction of OneM2M
  • 12. • The Service Charging and Accounting (SCA) CSF provides charging functions for the Service Layer. • The SCA CSF performs information recording corresponding to a chargeable event based on the configured charging policies. • The SCA CSF sends the charging information transformed from the specific recorded information to the billing domain by the use of a standard or proprietary interface for charging purposes. Common Service Functions ­ SCA, SUB 12 Subscription and Notification (SUB) • The SUB CSF manages subscriptions to resources, subject to access control policies, and sends corresponding notifications to the address(es) where the resource subscribers want to receive them. Service Charging andAccounting (SCA) I. Introduction of OneM2M
  • 13. II. OneM2M Security 13 1. Security Framework 2. Security Procedures
  • 14. IoT 플랫폼 보안 14 사물인터넷 플랫폼 보안 기술 정의 사례 2 § OneM2M 보안 기술 – Privacy/Trust 관리 기술 – 인증/인가 기술 – 안전한 데이터 전송 기술 – 시스템 보안 기술 – Security Association 기술 Infrastructure domain Field domain Non-oneM2 M Device Non-oneM2 M Device Non-oneM2 M Device Non-oneM2 M Device To an Infrastructure Node of other M2M Service Providers IN-AE Mca Infrastructure Node(IN) IN-AE IN-CSE Mca Middle Node(IN) MN-CSE MN-AE Mca Middle Node(IN) Mca Mca Mca MN-CSE MN-AE Application Dedicated Node (ADN) ADN-AE Mca Application Service Node (ASN) ASN-AE ASN-CSE Application Dedicated Node (ADN) ADN-AE Mca Application Service Node (ASN) ASN-AE ASN-CSE Mcc’ Mcn Mcc Mcc Mcc McnMcn Mcc Mcc Mcn Mcn Link is out of scope Application Entity (AE) Mca Reference Point Mcn Reference Point Common Services Entity (CSE) Application and Service Layer Management Communication Management/ Delivery Handling Data Management & Repository Device Management Discobery Group Management Location Network Service Exposure/Service Ex+Triggering Registration Security Service Charging & Accounting Subscription and Notification Underlying Network Service Entity (NSE) II. OneM2M Security
  • 15. IoT 플랫폼 보안 15 사물인터넷 플랫폼 보안 기술 정의 사례 3 § OneM2M Security Architecture Security Services Security API (Mca, Mcc) (not specified in the present document) Security Functions Layer Identification And Authentication Authorization Identity Management Security Association Sensitive Data Handling Security Administration Secure Environment Abstraction Layer (not specified in the present document) Secure Environments Layer Secure Environment n Sensitive Data Sensitive Functions 현재 표준 문서에는 components가 정의되어 있 지 않은 계층 OneM2M 보안 핵심계층 II. OneM2M Security
  • 16. IoT 플랫폼 보안 16 OneM2M Security Functions Layer § Authentication • UN-SP : UnderlyingNetwork Service provider • GBA : Generic BootstrappingArchitecture • MEF : M2M enrolment function • BSF : Bootstrap service function • MAF : m2mauthentication function • RSPF : remote security provisioning framework • SAEF : security association establishment framework ① Provisioned Symmetric Key Security Association Establishment Framework ü 미리 제공된 대칭키를 이용하 여 end-points간의 association 진행 ② Certificate-Based Security security Association Establishment Framework ü 개인 서명키와 인증서, 공개키 를 이용하여 association ③ MAF Security security Association Establishment Framework ü 3rd party service provider에 의 해서 진행됨 셋 중에 하나 사용 Certificate-Based SAEF와 Symmetric Key- Based SAEF는 Entity 간의 인증을 수행 MAF-Based SAEF는 3자간 인증을 수행 II. OneM2M Security
  • 17. IoT 플랫폼 보안 17 OneM2M Security Functions Layer § Authorization Procedure Policy Enforcement Point(PEP) Policy Decision Point(PDP) Policy Retrieval Point(PRP) Policy Information Point(PIP) PDP 가 인가를 하기 위 해 PRP,PIP에게 정보를 언어오는 단계 PDP 가 접근 허용여부 를 결정하는 단계 II. OneM2M Security
  • 18. IoT 플랫폼 보안 18 OneM2M Security Framework § General Introductions to the Security Frameworks – the Symmetric Key Security Framework – the Certificate-Based Security Framework – the Generic Bootstrapping Architecture(GBA) Framework § Security Association Establishment Frameworks – Provisioned Symmetric Key Security Association Establishment Frameworks – Certificate-Based Security Association Establishment Frameworks – MAF(M2M Authentication Function)-Based Symmetric Key Security Association Establishment Frameworks § Remote Security Provisioning Frameworks – Pre-Provisioned Symmetric Enrolee Key Remote Security Provisioning Framework – Certificate-Based Remote Security Provisioning Framework – GBA-based Remote Security Provisioning Framework II. OneM2M Security
  • 19. IoT 플랫폼 보안 19 OneM2M Security Framework § Security Association Establishment Frameworks – Credential Configuration • 사전 파라미터 설정 단계 – Association Configuration • 상대방 정보 송수신 – Association Security Handshake • 상호 인증 II. OneM2M Security
  • 20. IoT 플랫폼 보안 20 OneM2M Security Framework § Remote Security Provisioning Frameworks – Bootstrap Credential Configuration – Bootstrap Instruction Configuration – Bootstrap Enrolment Handshake – Enrolment Key Generation – Enrolment Phase II. OneM2M Security
  • 21. III. OneM2M Identifiers 21 1. AllJoyn Internetworking 2. LWM2M Internetworking
  • 22. M2M Identifiers on OneM2M 22 M2M Identifiers § Application Entity Identifier(AE-ID) § Application Identifier(App-ID) § CSE-Identifier(CSE-ID) § M2M Node Identifier(M2M-Node-ID) § M2M Service Subscription Identifier(M2M-Sub-ID) § M2M Request Identifier(M2M-Request-ID) § M2M External Identifier(M2M-Ext-ID) § Underlying Network Identifier(UNetwork-ID) § Trigger Recipient Identifier(Trigger-Recipient-ID) § M2M Service Identifier(M2M-Sev-ID) § Service Role Identifier(SRole-ID) § M2M Service Profile Identifier(M2M-Service-Profile-ID) III. OneM2M Identifiers
  • 23. M2M Identifiers on OneM2M 23 Application Entity Identifier(AE-ID) § An Application Entity Identifier(AE-ID) uniquely identifies anAE resident on an M2M Node. § AE-ID is globally unique within/outside M2MSPdomain Application Identifier(App-ID) § An Application Identifier(App-ID) uniquely identifies an M2M Application in a given context. § Two Type § App-ID(RegisteredApp-ID) : guarantee to be globally unique. § Non-RegisteredApp-ID : not guarantee to be globally unique. III. OneM2M Identifiers
  • 24. M2M Identifiers on OneM2M 24 CSE-Identifier(CSE-ID) § A CSE shall be identified by a globally unique identifier, the CSE-ID, when instantiated within an M2M Node in the M2M System. § The CSE-ID is globally unique, when used internally within/outsidea specific M2M SPdomain. § The CSE-ID shall identify the CSE for the purpose of all interactions from/to the CSE within the M2M System. M2M Node Identifier(M2M-Node-ID) § An M2M Node, hosting a CSE and/orApplication(s) shall be identified by a globally unique identifier, the M2M-Node-ID. § The M2M System shall allow the M2M Service Providerto set the CSE- ID and the M2M-Node-IDto the same value. § The M2M-Node-ID enables the M2M Service Providerto bind a CSE- ID to a specific M2M Node. § Examples of allocating a globally unique M2M-Node-IDinclude the use of Object Identity (OID) and IMEI. For details on OID, III. OneM2M Identifiers
  • 25. M2M Identifiers on OneM2M 25 M2M Service Subscription Identifier(M2M-Sub-ID) § The M2M-Sub-ID enables the M2M SPto bind application(s) to a particular M2M ServiceSubscription between an M2M subscriberand the M2M Service Provider. § The M2M-Sub-ID is unique for every M2Msubscriber. § Characteristics: § belongs to the M2M Service Provider; § identifies the subscription to an M2M Service Provider; § enables communication with the M2M Service Provider; § can differ from the M2M Underlying Network Subscription Identifier. § There can be multiple M2M Service SubscriptionIdentifiers perM2M Underlying Network subscription. TheM2M-Sub-IDshall not be exposed over any interface. III. OneM2M Identifiers
  • 26. M2M Identifiers on OneM2M 26 M2M Request Identifier(M2M-Request-ID) § The M2M-Request-ID tracks a Request initiated by anAE over the Mca referencepoint, and by a CSE over the Mcc referencepoint § To enable an AE to track Requests and corresponding Responses over the Mca referencepoint, AEs shall includea distinct M2M Request Identifier per request M2M External Identifier(M2M-Ext-ID) § The M2M-Ext-ID is used by an M2M SP when services are requested from the Underlying Network. § allows the Underlying Network to identify the M2M Device (e.g. ASN, MN) associated with the CSE-ID. § For each CSE-ID, there is only one M2M-Ext-ID for a specific UNetwork-ID. § The mapping by the Underlying Network of the M2M-Ext-ID to the M2M Device is Underlying Network specific. § The Underlying Network provider and the M2M SP collaborate for the assignment of an M2M-Ext-ID to each CSE. III. OneM2M Identifiers
  • 27. M2M Identifiers on OneM2M 27 Underlying Network Identifier(UNetwork-ID) § The UNetwork-ID is used for identifying an Underlying Network. UNetwork-ID is a static value and unique within a M2M Service Provider domain. § For example, based on "policy", scheduling of traffic triggered by a certain event category in certain time periods may be allowed over Underlying Network "WLAN”. Trigger Recipient Identifier(Trigger-Recipient-ID) § The Trigger-Recipient-IDis used to identify an instance of an ASN/MN-CSE on an execution environment. § For example, when 3GPP device triggering is used, the Trigger- Recipient-ID maps to the AppID § For pre-provisioned M2M-Ext-IDs, Trigger-Recipient-ID is provisioned at the Infrastructure Node along with the M2M-Ext-ID and the associated CSE-ID. § For dynamic M2M-Ext-IDs, Trigger-Recipient-ID specific to the Underlying Network is provisioned at each M2M device in the Field Domain. Such Trigger- Recipient-ID is conveyed to the IN-CSE during CSE Registration III. OneM2M Identifiers
  • 28. M2M Identifiers on OneM2M 28 M2M Service Identifier(M2M-Sev-ID) § The M2M-Serv-ID is an identifier of a M2M Service offered by an M2M SP. § It is an essential part of the M2M Service Subscription which stores a set of M2M-Serv-IDs pertaining to the set of subscribed services. Service Role Identifier(SRole-ID) § The Service Role Identifier shall be used for service access authorization. § In each M2M Service, one or multiple M2M Service Role(s) shall be defined by the M2M Service Provider. § An M2M Service Role is defined as a create permission pertaining to resource types which are associated with M2M Service. III. OneM2M Identifiers
  • 29. M2M Identifiers on OneM2M 29 M2M Service Profile Identifier(M2M-Service-Profile-ID) § An M2M Service Profile Identifier defines M2M Service Roles as well as applicable rules governing the AEs registering with M2M Nodes and the AEs residing on these nodes. § Every M2M Service Profile is allocated an identifier so it can be retrieved for verification purposes. § belongs to the M2M Service Provider; § identifies the M2M Service Roles as well as applicable rules governing AEs registering with an M2M node. The M2M Service Roles define the M2M Services authorized for the M2M Service Profile III. OneM2M Identifiers
  • 30. IV. Accessing Resources 30 1. Blocking Mode 2. Non-Blocking Mode in Synchronous 3. Non-Blocking Mode in ASynchronous
  • 31. Accessing Resources in CSEs Types of accessing resources – No Hop – 1 Hop – Multi Hops Non blocking accessing resources – Synchrous mode – Asynchrous mode 31 IV. Accessing Resources
  • 32. Accessing Resouces in CSEs ­ No Hop 32 IV. Accessing Resources
  • 33. Accessing Resouces in CSEs ­ 1 Hop 33 IV. Accessing Resources
  • 34. Accessing Resouces in CSEs ­ Multi Hop 34 IV. Accessing Resources
  • 35. Accessing Resources in Synchronous mode 35 IV. Accessing Resources
  • 36. Accessing Resources in Asynchronous mode 36 IV. Accessing Resources
  • 37. V. Other Protocols 37 1. Device Triggering 2. Location Request 3. Notification of Re-Targeting
  • 41. VI. OneM2M Internetworking 41 1. AllJoyn Internetworking 2. LWM2M Internetworking
  • 42. oneM2M Interworking ­ Non oneM2M Entity 42 Non oneM2M Entity Interworking § oneM2M 에서는 non oneM2M Entity와의 연동을 위해 IPE(Interworking Proxy Entity)를 정의 § 타플랫폼의 Specific Data Model을 IPE에서 oneM2M에서 정의된 Common Data Model으로 Mapping • oneM2M Entity는 IPE에서 Mapping한 Common Data Model에 접근하여 연동 Non-oneM2M specific data model Common data model VI. OneM2M Internetworking
  • 43. oneM2M Interworking - AllJoyn 43 AllJoyn Interworking § 연동 시나리오 Field Domain Infrastructure Domain Infrastructure Domain of oneM2M Service Provider AllJoyn Network in the field domain AllJoyn enabled mobile device Field Domain Infrastructure Domain Infrastructure Domain of oneM2M Service Provider AllJoyn Network in the field domain oneM2M enabled mobile device Field Domain Infrastructure Domain Infrastructure Domain of oneM2M Service Provider AllJoyn Network in the field domain AllJoyn Network in the field domain Field Domain Infrastructure Domain Infrastructure Domain of oneM2M Service Provider oneM2M Field Domain Network AllJoyn Network in the field domain Field Domain Infrastructure Domain Infrastructure Domain of oneM2M Service Provider oneM2M Field Domain Network AllJoyn Network in the field domain 1 2 3 4 5 AllJoyn enabledmobile device controls AllJoyn NetworkthroughoneM2M oneM2M enabledmobile device controls AllJoyn Network Two AllJoyn communicates witheach other through oneM2M AllJoyn Networkcommunicates with oneM2M through oneM2M AllJoyn Networkdirectlycommunicates with oneM2Mfield domainNetwork VI. OneM2M Internetworking
  • 44. oneM2M Interworking - AllJoyn 44 AllJoyn Interworking § Service Mapping – 기존 <container> Resource Type Mapping • AllJoyn의 methods, signals, properties까지 접근제어 정책을 적용할 수 없음 è <containerInstance>는 container의 accessControlPolicy를 따름 VI. OneM2M Internetworking
  • 45. oneM2M Interworking - AllJoyn 45 AllJoyn Interworking § Service Mapping – Newly defined Resource Type • AllJoyn 연동을 위한 새로운 oneM2M Resource Type 정의 à 새로운 Resource Type 정의에 대한 비용 발생 VI. OneM2M Internetworking
  • 46. oneM2M Interworking ­ LWM2M 46 LWM2M Interworking § 연동 시나리오 – LWM2M Interworking Proxy Entity(IPE) 를 통한 연동 • 기본적으로 TS-0001에 정의된 non-oneM2M Entity 와 CSE 간의 연동을 참조 VI. OneM2M Internetworking
  • 47. oneM2M Interworking ­ LWM2M 47 LWM2M Interworking § 연동 방법 – LWM2M IPE를 통해 LWM2M Object를 <container> 리소스로 encapsulates – IPE가 생성한 <container> 에 접근을 통해 연동 가능 VI. OneM2M Internetworking
  • 48. oneM2M Interworking ­ LWM2M 48 LWM2M Interworking § Interworking Proxy Entity(IPE) – LWM2M Server와 AE로 구성된 Entity • LWM2M Server : LWM2M Client와 LWM2M 프로토콜을 통해 LWM2M Object를 전달 받음 • AE(Application Entity) : CSE 등과 통신하기 위한 Entity VI. OneM2M Internetworking
  • 49. oneM2M Interworking ­ LWM2M 49 LWM2M Interworking § LWM2M IPE 에서 지원하는 프로토콜 – Device and Endpoint Lifecycle – Object Discovery – Object Transport and Interworking – Object Subscription and Notification – Object Security – Client Pre-provisioning – IPE Administration § 프로토콜에 대한 oneM2M Mapping VI. OneM2M Internetworking