< draft-greevenbosch-coman-candidate-tech-02.txt   draft-greevenbosch-coman-candidate-tech-03.txt >
coman B. Greevenbosch coman B. Greevenbosch
Internet-Draft K. Li Internet-Draft K. Li
Intended status: Informational Huawei Technologies Intended status: Informational Huawei Technologies
Expires: November 25, 2013 P. van der Stok Expires: January 04, 2014 P. van der Stok
vanderstok consultancy vanderstok consultancy
May 24, 2013 July 03, 2013
Candidate Technologies for COMAN Candidate Technologies for COMAN
draft-greevenbosch-coman-candidate-tech-02 draft-greevenbosch-coman-candidate-tech-03
Abstract Abstract
This draft identifies candidate technologies and considerations for This draft identifies candidate technologies and considerations for
the COMAN use cases and requirements. the COMAN use cases and requirements.
Note Note
Discussion and suggestions for improvement are requested, and should Discussion and suggestions for improvement are requested, and should
be sent to coman@ietf.org. be sent to coman@ietf.org.
skipping to change at page 1, line 38 skipping to change at page 1, line 38
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 25, 2013. This Internet-Draft will expire on January 04, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Requirements notation . . . . . . . . . . . . . . . . . . . . 2 1. Requirements notation . . . . . . . . . . . . . . . . . . . . 2
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Identified candidate technologies for the requirements . . . 3 3. Identified candidate technologies for the requirements . . . 3
3.1. OMA-LwM2M . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1. OMA-LwM2M . . . . . . . . . . . . . . . . . . . . . . . . 3
3.2. OMA Device Management . . . . . . . . . . . . . . . . . . 3 3.2. OMA Device Management . . . . . . . . . . . . . . . . . . 4
3.2.1. OMA-DM Management Objects . . . . . . . . . . . . . . 4 3.2.1. OMA-DM Management Objects . . . . . . . . . . . . . . 4
3.2.2. ACL mechanism in OMA-DM . . . . . . . . . . . . . . . 5 3.2.2. ACL mechanism in OMA-DM . . . . . . . . . . . . . . . 5
3.3. CoAP . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.3. CoAP . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3.1. CoAP main specification . . . . . . . . . . . . . . . 6 3.3.1. CoAP main specification . . . . . . . . . . . . . . . 6
3.3.2. CoAP capability discovery specifications . . . . . . 6 3.3.2. CoAP capability discovery specifications . . . . . . 6
3.3.3. CoAP group communication . . . . . . . . . . . . . . 7 3.3.3. CoAP group communication . . . . . . . . . . . . . . 7
3.3.4. CoAP energy saving technology . . . . . . . . . . . . 7 3.3.4. CoAP energy saving technology . . . . . . . . . . . . 7
3.3.5. Congestion avoidance in CoAP . . . . . . . . . . . . 7 3.3.5. Congestion avoidance in CoAP . . . . . . . . . . . . 8
3.4. Cryptography considerations . . . . . . . . . . . . . . . 8 3.4. Cryptography considerations . . . . . . . . . . . . . . . 8
3.5. MANET . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.5. MANET . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.6. BACnet . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.6. BACnet . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.7. Other requirements and candidate technologies . . . . . . 12 3.7. SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4. High level requirements that need to be observed continuously 13 3.8. NETCONF . . . . . . . . . . . . . . . . . . . . . . . . . 15
5. Table of requirements and related technologies . . . . . . . 14 3.9. Other requirements and candidate technologies . . . . . . 15
6. Conclusion and recommendations . . . . . . . . . . . . . . . 19 4. High level requirements that need to be observed continuously 16
7. Security Considerations . . . . . . . . . . . . . . . . . . . 19 5. Table of requirements and related technologies . . . . . . . 16
8. IANA considerations . . . . . . . . . . . . . . . . . . . . . 19 6. Conclusion and recommendations . . . . . . . . . . . . . . . 21
9. Change Log . . . . . . . . . . . . . . . . . . . . . . . . . 19 7. Security Considerations . . . . . . . . . . . . . . . . . . . 21
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 8. IANA considerations . . . . . . . . . . . . . . . . . . . . . 21
10.1. Normative References . . . . . . . . . . . . . . . . . . 19 9. Change Log . . . . . . . . . . . . . . . . . . . . . . . . . 21
10.2. Informative References . . . . . . . . . . . . . . . . . 19 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 10.1. Normative References . . . . . . . . . . . . . . . . . . 22
10.2. Informative References . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 26
1. Requirements notation 1. Requirements notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
2. Introduction 2. Introduction
In [I-D.ersue-constrained-mgmt], several use cases and associated In [I-D.ersue-constrained-mgmt], several use cases and associated
skipping to change at page 9, line 19 skipping to change at page 9, line 25
Keysize TBD. Keysize TBD.
o Candidates for hashing: o Candidates for hashing:
* SHA-1 * SHA-1
* SHA-256 * SHA-256
* SHA-512 * SHA-512
o For CoAP [I-D.ietf-core-coap], the following choices have been
made:
* Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 specified in
[I-D.mcgrew-tls-aes-ccm-ecc], [RFC5246], [RFC4492]
* Hash: SHA-256
* ECC with curve secp256r1 (equivalent to NIST P-256) [RFC4492]
* AES-128 in CCM mode [RFC5116], [CCM]
4.6.008 Select cryptographic algorithms that are to be supported in 4.6.008 Select cryptographic algorithms that are to be supported in
hardware hardware
o TBD o TBD
3.5. MANET 3.5. MANET
TBD. TBD.
3.6. BACnet 3.6. BACnet
skipping to change at page 11, line 26 skipping to change at page 11, line 41
o 4.4.001 Device status monitoring - BACnet provides extensive tools o 4.4.001 Device status monitoring - BACnet provides extensive tools
for network and device status monitoring, specified in the Alarm for network and device status monitoring, specified in the Alarm
and Event services section. BACnet supports a very flexible event and Event services section. BACnet supports a very flexible event
and alarm reporting. Clients can subscribe to generators of and alarm reporting. Clients can subscribe to generators of
events and alarms, which can be changes of values in objects or events and alarms, which can be changes of values in objects or
status changes. Classes of events can be specified with status changes. Classes of events can be specified with
appropriate handling by the clients. appropriate handling by the clients.
o 4.4.002 Energy status monitoring - This can be provided in BACnet o 4.4.002 Energy status monitoring - This can be provided in BACnet
by creating a binary value object type connected to the energy by creating a binary value object type connected to the energy
c.q. power attributes to monitor and specify a change of state c.q. power attributes to monitor and specify a change of state
with an appropriate client. with an appropriate client.
o 4.4.003 Monitoring of current and estimated device availability - o 4.4.003 Monitoring of current and estimated device availability -
See text in 4.4.002. See text in 4.4.002.
o 4.4.004 Network status monitoring - BACnet provides facilities to o 4.4.004 Network status monitoring - BACnet provides facilities to
configure and install routers on the BACnet network. BACnet configure and install routers on the BACnet network. BACnet
specifies the MS/TP and PTP link protocols with the possibility to specifies the MS/TP and PTP link protocols with the possibility to
monitor link status. monitor link status.
skipping to change at page 12, line 30 skipping to change at page 12, line 45
configuration purposes. configuration purposes.
o 4.11.001 Avoid complex application layer transactions requiring o 4.11.001 Avoid complex application layer transactions requiring
large application messages - BACnet has a finite set of large application messages - BACnet has a finite set of
application message constructs in which application messages application message constructs in which application messages
should fit. should fit.
o 4.11.002 Avoid reassembly of messages at multiple layers in the o 4.11.002 Avoid reassembly of messages at multiple layers in the
protocol stack - BACnet avoids reassembly by contruction. protocol stack - BACnet avoids reassembly by contruction.
3.7. Other requirements and candidate technologies 3.7. SNMP
The Simple Network Management Protocol (SNMP) can be used to monitor
and manage various network entities. It is the most popular network
management protocol today based on IETF standards. In [RFC3410] an
introduction and overview of SNMP is presented. The architecture of
the Internet Standard management framework consists of:
o A data definition language, referred to as Structure of Management
Information (SMI), is defined in [RFC2578], [RFC2579], [RFC2580].
o The Management Information Base (MIB) which contains the
information to be managed and is defined for each specific
function to be managed [RFC3418].
o A protocol definition referred to as Simple Network Management
Protocol. Version 3 (SNMPv3) is defined in [RFC3411], [RFC3412],
[RFC3413], [RFC3416], and [RFC3417].
o Security and administration that provides SNMP message based
security on the basis of the user-based security model, discussed
in [RFC3414] and [RFC3415].
Separation in modules was motivated by the wish to respond to the
evolution of Internet. The protocol part (SNMP) and data definition
part (MIB) are independent of each other. The separation has enabled
the progressive passage from SNMPv1 via SNMPv2 to SNMPv3. The SNMP
protocol supports seven types of access supported by as many Protocol
Data Unit (PDU) types. Two types of message exchange are used:
o The SNMP client sends out a request message after which the SNMP
server returns a Response message.
o The SNMP server sends a confirmed or unconfirmed notification
message with a list of (OBJECT-IDENTIFIERs, value) pairs to a
notification requesting end-point.
The MIB objects are defined in ASN.1, for various protocols, at
different layers. For example, [RFC4113] defines a MIB for UDP,
whereas the draft [I-D.schoenw-6lowpan-mib] defines a MIB module for
6LoWPAN [RFC4944].
The interesting part of SNMP is that it provides a framework that
enables request/response and notification type message exchanges.
The purpose of the message exchange is defined by the contents of the
MIBs which are declared independently for many different purposes.
Related requirements are:
o 4.1.001 Multiple device classes, SNMP and MIB are class
independent.
o 4.1.002 Management scalability, SNMP can be the basis for extended
management functionality.
o 4.2.001 Modular implementation, Separation between MIB and SNMP
provides basic modularity. Separation in MIBs and SNMP entities
provides a second level of modularity.
o 4.2.005 Consistency between data and information model, Encouraged
by separation of MIBs.
o 4.2.007 Protocol Extensibility, Supported by design, but lacks in
message PDU type extensibility.
o 4.3.004 Network reconfiguration, Several MIBs support network
configuration but not in an automatic network state driven
fashion.
o 4.4.001 Device status monitoring, Appropriate MIB is specified.
o 4.4.002 Energy state monitoring, MIB specified by Eman.
o 4.4.004 Network status monitoring, Appropriate MIB is specified
o 4.4.006 Performance monitoring, Appropriate MIBs may be specified
outside IETF
o 4.4.007 Fault detection monitoring, Appropriate MIBs are
specified.
o 4.4.011 Notifications, Basic SNMP function.
o 4.6.001 Authentication of management system and devices, supported
by SNMPv3.
o 4.6.003 Access control on management system and devices, supported
by SNMPv3.
o 4.7.001 Management of Energy Resources, supported by Eman MIBs.
o 4.11.001 Avoid large messages, SNMP supports progessive transport
of data in self contained chunks.
o 4.11.002 Avoid reassembly at multiple layers, SNMP request
specifies data size per message.
Since much MIB creation effort can be done offline through macros,
and BER encoding is not extremely complex, it is feasible to
implement SNMP in constrained environments. Sharing the security
code between SNMP and DTLS/CoAP makes the inclusion of SNMP even more
attractive.
3.8. NETCONF
Cover at least:
o The NETCONF protocol is defined in [RFC6241]
o The YANG module is defined in [RFC6022]
o NETCONF is based on XML
3.9. Other requirements and candidate technologies
4.1.005 Automatic re-synchronisation with eventual consistency 4.1.005 Automatic re-synchronisation with eventual consistency
4.1.006 Support for lossy links and unreachable devices 4.1.006 Support for lossy links and unreachable devices
o Mechanisms for devices that are not sleepy, but have unstable o Mechanisms for devices that are not sleepy, but have unstable
network connections (e.g. mobile devices) are needed. network connections (e.g. mobile devices) are needed.
4.1.008 Distributed management 4.1.008 Distributed management
4.2.006 Loss-less mapping of management data models 4.2.006 Loss-less mapping of management data models
4.3.002 Capability discovery 4.3.002 Capability discovery
4.3.004 Network reconfiguration 4.3.004 Network reconfiguration
4.4.009 Recovery 4.4.009 Recovery
skipping to change at page 14, line 4 skipping to change at page 16, line 35
o A binary format would be most compact. o A binary format would be most compact.
o TLV could be considered. o TLV could be considered.
o XML would be counter productive. o XML would be counter productive.
o JSON may be counter productive. o JSON may be counter productive.
4.2.003 Compression of management data or complete messages 4.2.003 Compression of management data or complete messages
o When the messages are designed compact enough, compression will be o When the messages are designed compact enough, compression will be
unnecessary. unnecessary.
4.2.007 Protocol extensibility 4.2.007 Protocol extensibility
5. Table of requirements and related technologies 5. Table of requirements and related technologies
The Table 1 summarises the requirements and related or possible The Table 1 summarises the requirements and related or possible
candidate technologies. candidate technologies.
+-----------+----------------+--------------------------------------+ +-----------+----------------+--------------------------------------+
| Requireme | Name | Associated technology | | Requireme | Name | Associated technology |
| nt number | | | | nt number | | |
+-----------+----------------+--------------------------------------+ +-----------+----------------+--------------------------------------+
| 4.1.001 | Support | [I-D.ietf-core-coap], [ISO16484-5] | | 4.1.001 | Support | [I-D.ietf-core-coap], [ISO16484-5], |
| | multiple | | | | multiple | [RFC3410] |
| | device classes | | | | device classes | |
| | within a | | | | within a | |
| | single network | | | | single network | |
| | | | | | | |
| 4.1.002 | Management | [ISO16484-5] | | 4.1.002 | Management | [ISO16484-5], [RFC3410] |
| | scalability | | | | scalability | |
| | | | | | | |
| 4.1.003 | Hierarchical | [ISO16484-5] | | 4.1.003 | Hierarchical | [ISO16484-5] |
| | management | | | | management | |
| | | | | | | |
| 4.1.004 | Minimise state | [I-D.ietf-core-coap], [ISO16484-5] | | 4.1.004 | Minimise state | [I-D.ietf-core-coap], [ISO16484-5] |
| | maintained on | | | | maintained on | |
| | constrained | | | | constrained | |
| | devices | | | | devices | |
| | | | | | | |
skipping to change at page 15, line 4 skipping to change at page 17, line 36
| | and | resource-directory], [I-D.ietf-core- | | | and | resource-directory], [I-D.ietf-core- |
| | unreachable | observe] | | | unreachable | observe] |
| | devices | | | | devices | |
| | | | | | | |
| 4.1.007 | Network-wide | [OMA-DM], [ISO16484-5] | | 4.1.007 | Network-wide | [OMA-DM], [ISO16484-5] |
| | configuration | | | | configuration | |
| | | | | | | |
| 4.1.008 | Distributed | [ISO16484-5] | | 4.1.008 | Distributed | [ISO16484-5] |
| | management | | | | management | |
| | | | | | | |
| 4.2.001 | Modular | [ISO16484-5] | | 4.2.001 | Modular | [ISO16484-5], [RFC3410] |
| | implementation | | | | implementation | |
| | of management | | | | of management | |
| | protocols | | | | protocols | |
| | | | | | | |
| 4.2.002 | Compact | [OMA-LwM2M-TS], [ISO16484-5] | | 4.2.002 | Compact | [OMA-LwM2M-TS], [ISO16484-5] |
| | encoding of | | | | encoding of | |
| | management | | | | management | |
| | data | | | | data | |
| | | | | | | |
| 4.2.003 | Compression of | | | 4.2.003 | Compression of | |
| | management | | | | management | |
| | data or | | | | data or | |
| | complete | | | | complete | |
| | messages | | | | messages | |
| | | | | | | |
| 4.2.004 | Mapping of | [I-D.ietf-core-coap] | | 4.2.004 | Mapping of | [I-D.ietf-core-coap] |
| | management | | | | management | |
| | protocol | | | | protocol | |
| | interactions | | | | interactions | |
| | | | | | | |
| 4.2.005 | Consistency of | [ISO16484-5] | | 4.2.005 | Consistency of | [ISO16484-5], [RFC3410] |
| | data models | | | | data models | |
| | with the | | | | with the | |
| | underlying | | | | underlying | |
| | information | | | | information | |
| | model | | | | model | |
| | | | | | | |
| 4.2.006 | Loss-less | | | 4.2.006 | Loss-less | |
| | mapping of | | | | mapping of | |
| | management | | | | management | |
| | data models | | | | data models | |
| | | | | | | |
| 4.2.007 | Protocol | [I-D.ietf-core-coap], [ISO16484-5] | | 4.2.007 | Protocol | [I-D.ietf-core-coap], [ISO16484-5], |
| | extensibility | | | | extensibility | [RFC3410] |
| | | | | | | |
| 4.3.001 | Self- | [ISO16484-5] | | 4.3.001 | Self- | [ISO16484-5] |
| | configuration | | | | configuration | |
| | capability | | | | capability | |
| | | | | | | |
| 4.3.002 | Capability | [RFC6690], [I-D.greevenbosch-core- | | 4.3.002 | Capability | [RFC6690], [I-D.greevenbosch-core- |
| | discovery | profile-description], [I-D.shelby- | | | discovery | profile-description], [I-D.shelby- |
| | | core-resource-directory], [I-D.lynn- | | | | core-resource-directory], [I-D.lynn- |
| | | core-discovery-mapping], [I-D | | | | core-discovery-mapping], [I-D |
| | | .vanderstok-core-dna], [ISO16484-5] | | | | .vanderstok-core-dna], [ISO16484-5] |
| | | | | | | |
| 4.3.003 | Asynchronous | [I-D.ietf-core-coap] | | 4.3.003 | Asynchronous | [I-D.ietf-core-coap] |
| | transaction | | | | transaction | |
| | support | | | | support | |
| | | | | | | |
| 4.3.004 | Network reconf | [ISO16484-5] | | 4.3.004 | Network reconf | [ISO16484-5], [RFC3410] |
| | iguration | | | | iguration | |
| | | | | | | |
| 4.4.001 | Device status | [OMA-LwM2M-TS], [ISO16484-5] | | 4.4.001 | Device status | [OMA-LwM2M-TS], [ISO16484-5], |
| | monitoring | | | | monitoring | [RFC3410] |
| | | | | | | |
| 4.4.002 | Energy status | [OMA-LwM2M-TS], [ISO16484-5] | | 4.4.002 | Energy status | [OMA-LwM2M-TS], [ISO16484-5], |
| | monitoring | | | | monitoring | [RFC3410] |
| | | | | | | |
| 4.4.003 | Monitoring of | [OMA-DiagMon-MO], [ISO16484-5] | | 4.4.003 | Monitoring of | [OMA-DiagMon-MO], [ISO16484-5] |
| | current and | | | | current and | |
| | estimated | | | | estimated | |
| | device | | | | device | |
| | availability | | | | availability | |
| | | | | | | |
| 4.4.004 | Network status | [OMA-DiagMon-MO], [ISO16484-5] | | 4.4.004 | Network status | [OMA-DiagMon-MO], [ISO16484-5], |
| | monitoring | | | | monitoring | [RFC3410] |
| | | | | | | |
| 4.4.005 | Self- | [OMA-DiagMon-MO], [ISO16484-5] | | 4.4.005 | Self- | [OMA-DiagMon-MO], [ISO16484-5] |
| | monitoring | | | | monitoring | |
| | | | | | | |
| 4.4.006 | Performance | [OMA-DiagMon-MO], [ISO16484-5] | | 4.4.006 | Performance | [OMA-DiagMon-MO], [ISO16484-5], |
| | monitoring | | | | monitoring | [RFC3410] |
| | | | | | | |
| 4.4.007 | Fault | [I-D.ietf-core-coap], [OMA-DiagMon- | | 4.4.007 | Fault | [I-D.ietf-core-coap], [OMA-DiagMon- |
| | detection | MO], [ISO16484-5] | | | detection | MO], [ISO16484-5], [RFC3410] |
| | monitoring | | | | monitoring | |
| | | | | | | |
| 4.4.008 | Passive and | [OMA-DiagMon-MO] | | 4.4.008 | Passive and | [OMA-DiagMon-MO] |
| | reactive | | | | reactive | |
| | monitoring | | | | monitoring | |
| | | | | | | |
| 4.4.009 | Recovery | [ISO16484-5] | | 4.4.009 | Recovery | [ISO16484-5] |
| | | | | | | |
| 4.4.010 | Network | [ISO16484-5] | | 4.4.010 | Network | [ISO16484-5] |
| | topology | | | | topology | |
| | discovery | | | | discovery | |
| | | | | | | |
| 4.4.011 | Notifications | [OMA-DiagMon-MO], [ISO16484-5] | | 4.4.011 | Notifications | [OMA-DiagMon-MO], [ISO16484-5], |
| | | [RFC3410] |
| | | | | | | |
| 4.4.012 | Logging | [OMA-LwM2M-TS], [ISO16484-5] | | 4.4.012 | Logging | [OMA-LwM2M-TS], [ISO16484-5] |
| | | | | | | |
| 4.5.001 | Self- | [OMA-DiagMon-MO], [OMA-Scheduling- | | 4.5.001 | Self- | [OMA-DiagMon-MO], [OMA-Scheduling- |
| | management - | MO] | | | management - | MO] |
| | Self-healing | | | | Self-healing | |
| | | | | | | |
| 4.6.001 | Authentication | [OMA-LwM2M-TS], [I-D.ietf-tls-oob- | | 4.6.001 | Authentication | [OMA-LwM2M-TS], [I-D.ietf-tls-oob- |
| | of management | pubkey], [I-D.greevenbosch-tls-ocsp- | | | of management | pubkey], [I-D.greevenbosch-tls-ocsp- |
| | system and | lite], [ISO16484-5] | | | system and | lite], [ISO16484-5], [RFC3410] |
| | devices | | | | devices | |
| | | | | | | |
| 4.6.002 | Support | [OMA-LwM2M-TS], [OMA-DM], [I-D | | 4.6.002 | Support | [OMA-LwM2M-TS], [OMA-DM], [I-D |
| | suitable | .jennings-core-transitive-trust- | | | suitable | .jennings-core-transitive-trust- |
| | security | enrollment] | | | security | enrollment] |
| | bootstrapping | | | | bootstrapping | |
| | mechanisms | | | | mechanisms | |
| | | | | | | |
| 4.6.003 | Access control | [OMA-LwM2M-TS], [OMA-DM] | | 4.6.003 | Access control | [OMA-LwM2M-TS], [OMA-DM], [RFC3410] |
| | on management | | | | on management | |
| | system and | | | | system and | |
| | devices | | | | devices | |
| | | | | | | |
| 4.6.004 | Select | | | 4.6.004 | Select | |
| | cryptographic | | | | cryptographic | |
| | algorithms | | | | algorithms | |
| | that are | | | | that are | |
| | efficient in | | | | efficient in | |
| | both code | | | | both code | |
| | space and | | | | space and | |
| | execution time | | | | execution time | |
| | | | | | | |
| 4.7.001 | Management of | [IEEE-802.15.4], [I-D.rahman-core- | | 4.7.001 | Management of | [IEEE-802.15.4], [I-D.rahman-core- |
| | energy | sleepy], | | | energy | sleepy], [RFC3410] |
| | resources | | | | resources | |
| | | | | | | |
| 4.7.002 | Support of | [I-D.ietf-core-coap], [RFC4944], | | 4.7.002 | Support of | [I-D.ietf-core-coap], [RFC4944], |
| | energy- | [I-D.rahman-core-sleepy], [I-D.ietf- | | | energy- | [I-D.rahman-core-sleepy], [I-D.ietf- |
| | optimized | core-observe], [I-D.shelby-core- | | | optimized | core-observe], [I-D.shelby-core- |
| | communication | resource-directory] | | | communication | resource-directory] |
| | protocols | | | | protocols | |
| | | | | | | |
| 4.7.003 | Support for | [IEEE-802.15.4] | | 4.7.003 | Support for | [IEEE-802.15.4] |
| | layer 2 | | | | layer 2 | |
skipping to change at page 18, line 28 skipping to change at page 21, line 13
| 4.10.002 | Reliable | | | 4.10.002 | Reliable | |
| | unicast | | | | unicast | |
| | transport | | | | transport | |
| | | | | | | |
| 4.10.003 | Best-effort | [ISO16484-5] | | 4.10.003 | Best-effort | [ISO16484-5] |
| | multicast | | | | multicast | |
| | | | | | | |
| 4.10.004 | Secure message | | | 4.10.004 | Secure message | |
| | transport | | | | transport | |
| | | | | | | |
| 4.11.001 | Avoid complex | | | 4.11.001 | Avoid complex | [RFC3410] |
| | application | | | | application | |
| | layer | | | | layer | |
| | transactions | | | | transactions | |
| | requiring | | | | requiring | |
| | large | | | | large | |
| | application | | | | application | |
| | layer messages | | | | layer messages | |
| | | | | | | |
| 4.11.002 | Avoid | [ISO16484-5] | | 4.11.002 | Avoid | [ISO16484-5], [RFC3410] |
| | reassembly of | | | | reassembly of | |
| | messages at | | | | messages at | |
| | multiple | | | | multiple | |
| | layers in the | | | | layers in the | |
| | protocol stack | | | | protocol stack | |
+-----------+----------------+--------------------------------------+ +-----------+----------------+--------------------------------------+
Table 1: Requirements and technologies Table 1: Requirements and technologies
6. Conclusion and recommendations 6. Conclusion and recommendations
skipping to change at page 19, line 24 skipping to change at page 22, line 4
7. Security Considerations 7. Security Considerations
TBD TBD
8. IANA considerations 8. IANA considerations
TBD TBD
9. Change Log 9. Change Log
v00 -> v01: v00 -> v01:
o Added text about BACnet. o Added text about BACnet.
v01 -> v02: v01 -> v02:
o Updated text about BACnet. o Updated text about BACnet.
o Updated to match new requirements numbering in I-D.ersue- o Updated to match new requirements numbering in I-D.ersue-
constrained-mgmt v04. constrained-mgmt v04.
v02 -> v03:
o Added text about SNMP.
o Added bullets about security choices in CoAP.
10. References 10. References
10.1. Normative References 10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
10.2. Informative References 10.2. Informative References
[RFC2578] McCloghrie, K., Ed., Perkins, D., Ed., and J.
Schoenwaelder, Ed., "Structure of Management Information
Version 2 (SMIv2)", STD 58, RFC 2578, April 1999.
[RFC2579] McCloghrie, K., Ed., Perkins, D., Ed., and J.
Schoenwaelder, Ed., "Textual Conventions for SMIv2", STD
58, RFC 2579, April 1999.
[RFC2580] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
"Conformance Statements for SMIv2", STD 58, RFC 2580,
April 1999.
[RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
"Introduction and Applicability Statements for Internet-
Standard Management Framework", RFC 3410, December 2002.
[RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
Architecture for Describing Simple Network Management
Protocol (SNMP) Management Frameworks", STD 62, RFC 3411,
December 2002.
[RFC3412] Case, J., Harrington, D., Presuhn, R., and B. Wijnen,
"Message Processing and Dispatching for the Simple Network
Management Protocol (SNMP)", STD 62, RFC 3412, December
2002.
[RFC3413] Levi, D., Meyer, P., and B. Stewart, "Simple Network
Management Protocol (SNMP) Applications", STD 62, RFC
3413, December 2002.
[RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model
(USM) for version 3 of the Simple Network Management
Protocol (SNMPv3)", STD 62, RFC 3414, December 2002.
[RFC3415] Wijnen, B., Presuhn, R., and K. McCloghrie, "View-based
Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)", STD 62, RFC 3415, December
2002.
[RFC3416] Presuhn, R., "Version 2 of the Protocol Operations for the
Simple Network Management Protocol (SNMP)", STD 62, RFC
3416, December 2002.
[RFC3417] Presuhn, R., "Transport Mappings for the Simple Network
Management Protocol (SNMP)", STD 62, RFC 3417, December
2002.
[RFC3418] Presuhn, R., "Management Information Base (MIB) for the
Simple Network Management Protocol (SNMP)", STD 62, RFC
3418, December 2002.
[RFC4113] Fenner, B. and J. Flick, "Management Information Base for
the User Datagram Protocol (UDP)", RFC 4113, June 2005.
[RFC4492] Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B.
Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS)", RFC 4492, May 2006.
[RFC4604] Holbrook, H., Cain, B., and B. Haberman, "Using Internet [RFC4604] Holbrook, H., Cain, B., and B. Haberman, "Using Internet
Group Management Protocol Version 3 (IGMPv3) and Multicast Group Management Protocol Version 3 (IGMPv3) and Multicast
Listener Discovery Protocol Version 2 (MLDv2) for Source- Listener Discovery Protocol Version 2 (MLDv2) for Source-
Specific Multicast", RFC 4604, August 2006. Specific Multicast", RFC 4604, August 2006.
[RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler, [RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler,
"Transmission of IPv6 Packets over IEEE 802.15.4 "Transmission of IPv6 Packets over IEEE 802.15.4
Networks", RFC 4944, September 2007. Networks", RFC 4944, September 2007.
[RFC5116] McGrew, D., "An Interface and Algorithms for Authenticated
Encryption", RFC 5116, January 2008.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008.
[RFC6022] Scott, M. and M. Bjorklund, "YANG Module for NETCONF
Monitoring", RFC 6022, October 2010.
[RFC6130] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc [RFC6130] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc
Network (MANET) Neighborhood Discovery Protocol (NHDP)", Network (MANET) Neighborhood Discovery Protocol (NHDP)",
RFC 6130, April 2011. RFC 6130, April 2011.
[RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J., and A.
Bierman, "Network Configuration Protocol (NETCONF)", RFC
6241, June 2011.
[RFC6690] Shelby, Z., "Constrained RESTful Environments (CoRE) Link [RFC6690] Shelby, Z., "Constrained RESTful Environments (CoRE) Link
Format", RFC 6690, August 2012. Format", RFC 6690, August 2012.
[I-D.ietf-core-coap] [I-D.ietf-core-coap]
Shelby, Z., Hartke, K., and C. Bormann, "Constrained Shelby, Z., Hartke, K., and C. Bormann, "Constrained
Application Protocol (CoAP)", draft-ietf-core-coap-16 Application Protocol (CoAP)", draft-ietf-core-coap-18
(work in progress), May 2013. (work in progress), June 2013.
[I-D.ietf-core-groupcomm] [I-D.ietf-core-groupcomm]
Rahman, A. and E. Dijk, "Group Communication for CoAP", Rahman, A. and E. Dijk, "Group Communication for CoAP",
draft-ietf-core-groupcomm-07 (work in progress), May 2013. draft-ietf-core-groupcomm-09 (work in progress), May 2013.
[I-D.ietf-core-observe] [I-D.ietf-core-observe]
Hartke, K., "Observing Resources in CoAP", draft-ietf- Hartke, K., "Observing Resources in CoAP", draft-ietf-
core-observe-08 (work in progress), February 2013. core-observe-08 (work in progress), February 2013.
[I-D.ietf-tls-oob-pubkey] [I-D.ietf-tls-oob-pubkey]
Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., and Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., and
T. Kivinen, "Out-of-Band Public Key Validation for T. Kivinen, "Out-of-Band Public Key Validation for
Transport Layer Security (TLS)", draft-ietf-tls-oob- Transport Layer Security (TLS)", draft-ietf-tls-oob-
pubkey-07 (work in progress), February 2013. pubkey-07 (work in progress), February 2013.
skipping to change at page 20, line 48 skipping to change at page 25, line 9
"Management of Networks with Constrained Devices: Problem "Management of Networks with Constrained Devices: Problem
Statement, Use Cases and Requirements", draft-ersue- Statement, Use Cases and Requirements", draft-ersue-
constrained-mgmt-03 (work in progress), February 2013. constrained-mgmt-03 (work in progress), February 2013.
[I-D.greevenbosch-core-minimum-request-interval] [I-D.greevenbosch-core-minimum-request-interval]
Greevenbosch, B., "CoAP Minimum Request Interval", draft- Greevenbosch, B., "CoAP Minimum Request Interval", draft-
greevenbosch-core-minimum-request-interval-01 (work in greevenbosch-core-minimum-request-interval-01 (work in
progress), April 2013. progress), April 2013.
[I-D.greevenbosch-core-profile-description] [I-D.greevenbosch-core-profile-description]
Greevenbosch, B., Hoebeke, J., and I. Ishaq, "CoAP Profile Greevenbosch, B., Hoebeke, J., Ishaq, I., and F. Abeele,
Description Format", draft-greevenbosch-core-profile- "CoAP Profile Description Format", draft-greevenbosch-
description-01 (work in progress), October 2012. core-profile-description-02 (work in progress), June 2013.
[I-D.greevenbosch-tls-ocsp-lite] [I-D.greevenbosch-tls-ocsp-lite]
Greevenbosch, B., "OCSP-lite - Revocation of raw public Greevenbosch, B., "OCSP-lite - Revocation of raw public
keys", draft-greevenbosch-tls-ocsp-lite-00 (work in keys", draft-greevenbosch-tls-ocsp-lite-01 (work in
progress), December 2012. progress), June 2013.
[I-D.jennings-core-transitive-trust-enrollment] [I-D.jennings-core-transitive-trust-enrollment]
Jennings, C., "Transitive Trust Enrollment for Constrained Jennings, C., "Transitive Trust Enrollment for Constrained
Devices", draft-jennings-core-transitive-trust- Devices", draft-jennings-core-transitive-trust-
enrollment-01 (work in progress), October 2012. enrollment-01 (work in progress), October 2012.
[I-D.li-core-conditional-observe] [I-D.li-core-conditional-observe]
Li, S., Hoebeke, J., and A. Jara, "Conditional observe in Li, S., Hoebeke, J., Abeele, F., and A. Jara, "Conditional
CoAP", draft-li-core-conditional-observe-03 (work in observe in CoAP", draft-li-core-conditional-observe-04
progress), October 2012. (work in progress), June 2013.
[I-D.lynn-core-discovery-mapping] [I-D.lynn-core-discovery-mapping]
Lynn, K. and Z. Shelby, "CoRE Link-Format to DNS-Based Lynn, K. and Z. Shelby, "CoRE Link-Format to DNS-Based
Service Discovery Mapping", draft-lynn-core-discovery- Service Discovery Mapping", draft-lynn-core-discovery-
mapping-02 (work in progress), October 2012. mapping-02 (work in progress), October 2012.
[I-D.mcgrew-tls-aes-ccm-ecc]
McGrew, D., Bailey, D., Campagna, M., and R. Dugal, "AES-
CCM ECC Cipher Suites for TLS", draft-mcgrew-tls-aes-ccm-
ecc-06 (work in progress), February 2013.
[I-D.rahman-core-sleepy] [I-D.rahman-core-sleepy]
Rahman, A., "Enhanced Sleepy Node Support for CoAP", Rahman, A., "Enhanced Sleepy Node Support for CoAP",
draft-rahman-core-sleepy-02 (work in progress), February draft-rahman-core-sleepy-02 (work in progress), February
2013. 2013.
[I-D.schoenw-6lowpan-mib]
Schoenwaelder, J., Sehgal, A., Tsou, T., and C. Zhou,
"Definition of Managed Objects for IPv6 over Low-Power
Wireless Personal Area Networks (6LoWPANs)", draft-
schoenw-6lowpan-mib-03 (work in progress), February 2013.
[I-D.shelby-core-resource-directory] [I-D.shelby-core-resource-directory]
Shelby, Z., Krco, S., and C. Bormann, "CoRE Resource Shelby, Z., Krco, S., and C. Bormann, "CoRE Resource
Directory", draft-shelby-core-resource-directory-05 (work Directory", draft-shelby-core-resource-directory-05 (work
in progress), February 2013. in progress), February 2013.
[I-D.vanderstok-core-dna] [I-D.vanderstok-core-dna]
Stok, P., Lynn, K., and A. Brandt, "CoRE Discovery, Stok, P., Lynn, K., and A. Brandt, "CoRE Discovery,
Naming, and Addressing", draft-vanderstok-core-dna-02 Naming, and Addressing", draft-vanderstok-core-dna-02
(work in progress), July 2012. (work in progress), July 2012.
[CCM] , "Recommendation for Block Cipher Modes of Operation: The
CCM Mode for Authentication and Confidentiality ",
National Institute of Standards and Technology SP 800-38C,
May 2004.
[IEEE-802.15.4] [IEEE-802.15.4]
IEEE Computer Society, , "IEEE std. 802.15.4-2003", IEEE Computer Society, ., "IEEE std. 802.15.4-2003",
October 2003. October 2003.
[ISO16484-5] [ISO16484-5]
, "Building automation and control systems -- Part 5: Data , "Building automation and control systems -- Part 5: Data
communication protocol", ISO 16484-5, 2012. communication protocol", ISO 16484-5, 2012.
[OMA-DM] , "OMA Device Management 1.3", OMA-ERP-DM-V1_3-20121213-C [OMA-DM] , "OMA Device Management 1.3", OMA-ERP-DM-V1_3-20121213-C
, December 2012. , December 2012.
[OMA-DiagMon-MO] [OMA-DiagMon-MO]
skipping to change at page 22, line 18 skipping to change at page 27, line 4
[OMA-Scheduling-MO] [OMA-Scheduling-MO]
, "OMA DM Scheduling Management Object", OMA-ERP- , "OMA DM Scheduling Management Object", OMA-ERP-
DM_Scheduling-V1_0-20110614-C , June 2011. DM_Scheduling-V1_0-20110614-C , June 2011.
[OMA-LwM2M-TS] [OMA-LwM2M-TS]
, "OMA Lightweight M2M", OMA-TS-LightweightM2M- , "OMA Lightweight M2M", OMA-TS-LightweightM2M-
V1_0-20130123-D (work in progress), January 2013. V1_0-20130123-D (work in progress), January 2013.
Authors' Addresses Authors' Addresses
Bert Greevenbosch Bert Greevenbosch
Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd.
Huawei Industrial Base Huawei Industrial Base
Bantian, Longgang District Bantian, Longgang District
Shenzhen 518129 Shenzhen 518129
P.R. China P.R. China
Phone: +86-755-28979133
Email: bert.greevenbosch@huawei.com Email: bert.greevenbosch@huawei.com
Kepeng Li Kepeng Li
Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd.
Huawei Industrial Base Huawei Industrial Base
Bantian, Longgang District Bantian, Longgang District
Shenzhen 518129 Shenzhen 518129
P.R. China P.R. China
Phone: +86-755-28971807 Phone: +86-755-28971807
 End of changes. 47 change blocks. 
60 lines changed or deleted 278 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/