consideration and discussion about “overview of iot ”
DESCRIPTION
Consideration and discussion about “overview of ioT ”. China Communications Standards Association. Haihua Li [email protected] Tel: +86-10-62300013 Fax: +86-10-62300034. 21th CJK UNIOT-WG meeting July 11th ~ 13th , 2011 Beijing, China. Table of Contents. - PowerPoint PPT PresentationTRANSCRIPT
1
Consideration and discussion about “overview of ioT”
China Communications Standards Association
Haihua [email protected]: +86-10-62300013Fax: +86-10-62300034
21th CJK UNIOT-WG meetingJuly 11th ~ 13th, 2011
Beijing, China
Table of Contents
1 、 General introduction and analysis about IoT
2 、 Some views about IoT
IoT application domainsIoT is a very big umbrella and covers lots of technologies. These technologies not only could be used in the telecommunication domain, but also could be used in the industrial application domains
The main identified IoT application domains are : Aerospace and aviation, Automotive, Telecommunications, Intelligent Buildings, Medical Technology,
Healthcare, Independent Living, Pharmaceutical, Retail, Logistics, Supply Chain
Management, Manufacturing, Product
Lifecycle Management,
Oil and Gas Safety, Security and Privacy, Environment Monitoring, People and Goods Transportation, Food traceability, Agriculture and Breeding, Media, entertainment and
Ticketing, Insurance, Recycling
( Reference : Internet of Things strategic research Roadmap , 2009 )
Example: Smart Grid
In TSAG meeting held in February 2011, it suggests that Smart Grid-related things can be considered by JCA-IoT and JCA-HN in their ToR
Example: Smart Grid
Reference architecture for Smart Grid( Reference :“ Smart Grid overview” deliverable of FG Smart )
Power Utility equipments
Power Utility application systems
Interaction &openness of Information &
Service
Example: ITS(Intelligent Transport
Systems )C2C CC
R&D projectsCVIS/SAFESPOT
COOPERS/GeoNet
COMeSafety
ERTICO
ISO TC 204
IEEE 802.11and 1609
IETF MEXT
ITU Telemov
CEN TC 278 TISAPre-DriveiTETRIS
ITS
Other ETSI TCLI – HF-ERM
ETSI TC ITS
ITS station reference architecture
Facilities
Station-externalinterfaces
MI
IN
Man
agem
ent I
nfor
mat
ion
Bas
e (M
IB)
Station-internalinterfaces
ITS Local
Network
IN
MN
Networking & Transport
Access
...IPv6 +Mobility
extensions
NF
Geo-Routing
MI
MN
MF
Man
agem
ent
Application support
NF
MF
Otherprotocols
e.g.GPS
e.g.2G/3G/...
e.g.BlueTooth
e.g.Ethernet
e.g.IR, MM, M5
Secu
rity
SISI
SNSN
SFSF
Sec
urity
Man
agem
ent I
nfor
mat
ion
Base
(S-M
IB)
(Iden
tity,
cry
pto-
key
and
certi
ficat
e m
anag
men
t)
Session / communication support
MS
ITS Transport TCP/UDP
Information support
ApplicationsTraffic
efficiencyRoadsafety
Otherapplications
FA
SA
SAMA
MA FAM
S
Hardware Security Module (HSM)
Aut
hent
icat
ion,
aut
horiz
atio
n, p
rofil
e m
anag
emen
t
Fire
wal
l and
Intru
sion
man
agem
ent
Reg
ulat
ory
man
agem
ent
Cro
ss-la
yer
man
agem
ent
Appl
icat
ion
man
agem
ent
Sta
tion
man
agem
ent
(Reference:ETSI EN 302 665 )
‘Access’ representing OSI layers 1 and 2
‘Networking & Transport’ representing layers 3 and 4
‘Facilities’ representing layers 5, 6 and 7
‘Applications’
‘Security’
‘Management’
Cooperation of CEN/ETSI
Applications
Facilities
Network & Transport(Protocols)
Access(Interface definition)
Cross
layer data exchanging
Configuration management
V2V
V2V
V2I
V2I
I2I
I2IManagement
Security
Ad Hoc Network transport security
E2E Data transmission security
The Contents: in blue font belong to ETSI
ToR In red font belong to CEN ToR In green font belong to
ETSI&CEN together
This part is unique to the standardization of ITS areas, which need to be defined by ETSI ITS TC &CEN TC278
This part (such as 3G, WiFi, Blue Tooth, IPv6 ,etc) can be defined by other SDOs, specific protocols and interfaces could be selected while developing and deploying ITS facilities
Example: IoT application provided by operator
“Elevator Bodyguard” service
Elevator
GPRS network
internet Server
Elevator Bodyguard service platform
Operator
Subscribers accessing from internetSubscribers accessing using
mobile phone
Elevator monitoring terminal
Terminals status monitoringdata collecting
related to elevator
Table of Contents
1 、 General introduction and analysis about IoT
2 、 Some views about IoT
Some Considerations and views of IoT For specific applications domains, the relevant industrial roles will deploy
their own facilities (for data collecting and device controlling) and application systems (for data processing, internal services and applications). As different application domains have different requirements and service features, special standardizations for these applications are usually required.
The industry specific facilities and application systems can be deployed by industrial roles directly, such as power utility, or be deployed by telecom operators or service providers, depending on the business models,
Even though these facilities and application systems are deployed by telecom operators, the industrial roles will be in charge of the data processing, controlling, applications and services, while considering security, professional knowledge and so on.
Telecom operators generally provide basic capabilities such as data transmission, storage, facilities status monitoring.
Telecom operators can also deploy some facilities in order to collect information for IoT applications, such as video surveillance equipments at home, Vehicle gateways, Personal equipments with extended information collection capabilities.
For access, transport and networking technologies, they can be used in different application domains to provide information transmission path.
service integration and delivery environment
NGN-SIDE is aimed to support Ubiquitous Network (UN) applications including M2M applications.
main functionalities provided by SIDE: integration of resources from different domains (e.g.
telecommunication domain (fixed and mobile networks), broadcasting domain, internet domain, content provider domain etc.) over NGN
provision of mechanisms for the support of diverse applications including cloud services, machine to machine, and ubiquitous sensor network applications;
….
(Reference : CJK-UNIOT19-
014_CCSA_NGN-SIDE_Features)
IDM: Identity Management
Users & Subscribers
Organizations, Business Enterprises, Government Enterprises
User Devices
Network Elements and
Objects
Network and Service Providers
Virtual Objects
Entities
Identity Lifecycle ManagementIdentity Information Correlation and Binding
Identity Information Authentication, Assurance and AssertionsDiscovery and Exchange of Identity Information
IdM Functions and Capabilities
Identifiers (e.g., UserID, Email address, Telephone
Number, URI, IP address)
Credentials (e.g., Digital Certificates, Tokens, and Biometrics)
Attributes (e.g., Roles, Claims, Context, Privileges,
Location)Identity
Information
Federated ServicesApplication Services Access Control (e.g., Multimedia and IPTV)
Single Sign-on/Sign-offRole-based Access to Information, Resources and Assets
Protection of Personally Identifiable InformationSecurity Protection of Information and Network Infrastructure
Business and Security Applications including Identity-based Services
Iden
tity
Man
agem
ent
Enables
IdM overview (Reference:Y.2720)
IdM enables various applications to be developed. Example applications are, but not limited to: business applications–single sign-on and sign-off (e.g., access to multiple applications and services without having to individually authenticate each application or service platform)– federated services (e.g., access to services across different service providers or NGN providers)identity-based servicessecurity applications– role-based access control to information, resources and assets
Some Considerations about IoT under the umbrella of IoT, there’re lots of applications and
resources belonging to different application domains. In order to support service discovery, service component, and etc, the functional component like SIDE is required
Identifiers can be used by different application domains, to support access to services across different domains, role-based access control and etc, the functional component like IDM is required.
We can call these kinds of functional components as collaboration components, which support the interaction between applications, the interaction between application and diverse resources in networks, devices.
Vision of IoT
Thanks for your Attention!