consideration and discussion about “overview of iot ”

16
1 Consideration and discussion about “overview of ioT” China Communications Standards Association Haihua Li [email protected] Tel: +86-10-62300013 Fax: +86-10-62300034 21th CJK UNIOT-WG meeting July 11th ~ 13th, 2011 Beijing, China

Upload: noah

Post on 25-Feb-2016

46 views

Category:

Documents


2 download

DESCRIPTION

Consideration and discussion about “overview of ioT ”. China Communications Standards Association. Haihua Li [email protected] Tel: +86-10-62300013 Fax: +86-10-62300034. 21th CJK UNIOT-WG meeting July 11th ~ 13th , 2011 Beijing, China. Table of Contents. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Consideration and discussion about  “overview of  ioT ”

1

Consideration and discussion about “overview of ioT”

China Communications Standards Association

Haihua [email protected]: +86-10-62300013Fax: +86-10-62300034

21th CJK UNIOT-WG meetingJuly 11th ~ 13th, 2011

Beijing, China

Page 2: Consideration and discussion about  “overview of  ioT ”

Table of Contents

1 、 General introduction and analysis about IoT

2 、 Some views about IoT

Page 3: Consideration and discussion about  “overview of  ioT ”

IoT application domainsIoT is a very big umbrella and covers lots of technologies. These technologies not only could be used in the telecommunication domain, but also could be used in the industrial application domains

The main identified IoT application domains are : Aerospace and aviation, Automotive, Telecommunications, Intelligent Buildings, Medical Technology,

Healthcare, Independent Living, Pharmaceutical, Retail, Logistics, Supply Chain

Management, Manufacturing, Product

Lifecycle Management,

Oil and Gas Safety, Security and Privacy, Environment Monitoring, People and Goods Transportation, Food traceability, Agriculture and Breeding, Media, entertainment and

Ticketing, Insurance, Recycling

( Reference : Internet of Things strategic research Roadmap , 2009 )

Page 4: Consideration and discussion about  “overview of  ioT ”

Example: Smart Grid

In TSAG meeting held in February 2011, it suggests that Smart Grid-related things can be considered by JCA-IoT and JCA-HN in their ToR

Page 5: Consideration and discussion about  “overview of  ioT ”

Example: Smart Grid

Reference architecture for Smart Grid( Reference :“ Smart Grid overview” deliverable of FG Smart )

Power Utility equipments

Power Utility application systems

Interaction &openness of Information &

Service

Page 6: Consideration and discussion about  “overview of  ioT ”

Example: ITS(Intelligent Transport

Systems )C2C CC

R&D projectsCVIS/SAFESPOT

COOPERS/GeoNet

COMeSafety

ERTICO

ISO TC 204

IEEE 802.11and 1609

IETF MEXT

ITU Telemov

CEN TC 278 TISAPre-DriveiTETRIS

ITS

Other ETSI TCLI – HF-ERM

ETSI TC ITS

Page 7: Consideration and discussion about  “overview of  ioT ”

ITS station reference architecture

Facilities

Station-externalinterfaces

MI

IN

Man

agem

ent I

nfor

mat

ion

Bas

e (M

IB)

Station-internalinterfaces

ITS Local

Network

IN

MN

Networking & Transport

Access

...IPv6 +Mobility

extensions

NF

Geo-Routing

MI

MN

MF

Man

agem

ent

Application support

NF

MF

Otherprotocols

e.g.GPS

e.g.2G/3G/...

e.g.BlueTooth

e.g.Ethernet

e.g.IR, MM, M5

Secu

rity

SISI

SNSN

SFSF

Sec

urity

Man

agem

ent I

nfor

mat

ion

Base

(S-M

IB)

(Iden

tity,

cry

pto-

key

and

certi

ficat

e m

anag

men

t)

Session / communication support

MS

ITS Transport TCP/UDP

Information support

ApplicationsTraffic

efficiencyRoadsafety

Otherapplications

FA

SA

SAMA

MA FAM

S

Hardware Security Module (HSM)

Aut

hent

icat

ion,

aut

horiz

atio

n, p

rofil

e m

anag

emen

t

Fire

wal

l and

Intru

sion

man

agem

ent

Reg

ulat

ory

man

agem

ent

Cro

ss-la

yer

man

agem

ent

Appl

icat

ion

man

agem

ent

Sta

tion

man

agem

ent

(Reference:ETSI EN 302 665 )

‘Access’ representing OSI layers 1 and 2

‘Networking & Transport’ representing layers 3 and 4

‘Facilities’ representing layers 5, 6 and 7

‘Applications’

‘Security’

‘Management’

Page 8: Consideration and discussion about  “overview of  ioT ”

Cooperation of CEN/ETSI

Applications

Facilities

Network & Transport(Protocols)

Access(Interface definition)

Cross

layer data exchanging

Configuration management

V2V

V2V

V2I

V2I

I2I

I2IManagement

Security

Ad Hoc Network transport security

E2E Data transmission security

The Contents: in blue font belong to ETSI

ToR In red font belong to CEN ToR In green font belong to

ETSI&CEN together

This part is unique to the standardization of ITS areas, which need to be defined by ETSI ITS TC &CEN TC278

This part (such as 3G, WiFi, Blue Tooth, IPv6 ,etc) can be defined by other SDOs, specific protocols and interfaces could be selected while developing and deploying ITS facilities

Page 9: Consideration and discussion about  “overview of  ioT ”

Example: IoT application provided by operator

“Elevator Bodyguard” service

Elevator

GPRS network

internet Server

Elevator Bodyguard service platform

Operator

Subscribers accessing from internetSubscribers accessing using

mobile phone

Elevator monitoring terminal

Terminals status monitoringdata collecting

related to elevator

Page 10: Consideration and discussion about  “overview of  ioT ”

Table of Contents

1 、 General introduction and analysis about IoT

2 、 Some views about IoT

Page 11: Consideration and discussion about  “overview of  ioT ”

Some Considerations and views of IoT For specific applications domains, the relevant industrial roles will deploy

their own facilities (for data collecting and device controlling) and application systems (for data processing, internal services and applications). As different application domains have different requirements and service features, special standardizations for these applications are usually required.

The industry specific facilities and application systems can be deployed by industrial roles directly, such as power utility, or be deployed by telecom operators or service providers, depending on the business models,

Even though these facilities and application systems are deployed by telecom operators, the industrial roles will be in charge of the data processing, controlling, applications and services, while considering security, professional knowledge and so on.

Telecom operators generally provide basic capabilities such as data transmission, storage, facilities status monitoring.

Telecom operators can also deploy some facilities in order to collect information for IoT applications, such as video surveillance equipments at home, Vehicle gateways, Personal equipments with extended information collection capabilities.

For access, transport and networking technologies, they can be used in different application domains to provide information transmission path.

Page 12: Consideration and discussion about  “overview of  ioT ”

service integration and delivery environment

NGN-SIDE is aimed to support Ubiquitous Network (UN) applications including M2M applications.

main functionalities provided by SIDE: integration of resources from different domains (e.g.

telecommunication domain (fixed and mobile networks), broadcasting domain, internet domain, content provider domain etc.) over NGN

provision of mechanisms for the support of diverse applications including cloud services, machine to machine, and ubiquitous sensor network applications;

….

(Reference : CJK-UNIOT19-

014_CCSA_NGN-SIDE_Features)

Page 13: Consideration and discussion about  “overview of  ioT ”

IDM: Identity Management

Users & Subscribers

Organizations, Business Enterprises, Government Enterprises

User Devices

Network Elements and

Objects

Network and Service Providers

Virtual Objects

Entities

Identity Lifecycle ManagementIdentity Information Correlation and Binding

Identity Information Authentication, Assurance and AssertionsDiscovery and Exchange of Identity Information

IdM Functions and Capabilities

Identifiers (e.g., UserID, Email address, Telephone

Number, URI, IP address)

Credentials (e.g., Digital Certificates, Tokens, and Biometrics)

Attributes (e.g., Roles, Claims, Context, Privileges,

Location)Identity

Information

Federated ServicesApplication Services Access Control (e.g., Multimedia and IPTV)

Single Sign-on/Sign-offRole-based Access to Information, Resources and Assets

Protection of Personally Identifiable InformationSecurity Protection of Information and Network Infrastructure

Business and Security Applications including Identity-based Services

Iden

tity

Man

agem

ent

Enables

IdM overview (Reference:Y.2720)

IdM enables various applications to be developed. Example applications are, but not limited to: business applications–single sign-on and sign-off (e.g., access to multiple applications and services without having to individually authenticate each application or service platform)– federated services (e.g., access to services across different service providers or NGN providers)identity-based servicessecurity applications– role-based access control to information, resources and assets

Page 14: Consideration and discussion about  “overview of  ioT ”

Some Considerations about IoT under the umbrella of IoT, there’re lots of applications and

resources belonging to different application domains. In order to support service discovery, service component, and etc, the functional component like SIDE is required

Identifiers can be used by different application domains, to support access to services across different domains, role-based access control and etc, the functional component like IDM is required.

We can call these kinds of functional components as collaboration components, which support the interaction between applications, the interaction between application and diverse resources in networks, devices.

Page 15: Consideration and discussion about  “overview of  ioT ”

Vision of IoT

Page 16: Consideration and discussion about  “overview of  ioT ”

Thanks for your Attention!