SlideShare a Scribd company logo
1 of 19
1
May 19th, 2013
OMA Lightweight M2M Tutorial
Zach Shelby, Chief Nerd
©Sensinode 2013
2
Tutorial Overview
• Why Lightweight Device Management
• OMA Lightweight M2M Standard
• Benefits
• Architecture
• Features
• Object Model
• Security
• Interfaces
©Sensinode 2013
3
• Traditional Device Management is widely used in Mobile Devices
 Used by Operators and Enterprises for managing mobile devices
 Some M2M use today with Cellular devices, mostly proprietary
 OMA DM the only standard, however fragmented by handset vendors
using proprietary mechanisms
• Lightweight Device Management provides the ideal M2M solution
 OMA LWM2M standard suitable for the whole M2M market
Only fragmented, proprietary solutions on the market today
 Applicable to both Cellular devices and WSN devices
Much larger accessible market, often 500x more devices
 Extensible Object Model open to the whole M2M industry
 Enables both Management and Application data with the same solution
Why Lightweight Device Management?
©Sensinode 2013
4
• Open Mobile Alliance is well known for Device Management (DM)
• OMA Lightweight M2M (LWM2M) is a new standard from the alliance
 Focused on constrained Cellular and other M2M devices
 Sensinode is a member of OMA and is dedicated to LWM2M
• The standard defines
 Efficient Device-Server interface based on open IETF standards
CoAP and DTLS bound to UDP or SMS
 Extensible Object and Resource model for application semantics
 Public registry of Objects from OMA, other SDOs or enterprises
• Timeline
 Requirements & architecture was completed 3Q/2012
 Technical specification was stable 2Q/2013
 Standard to be published July 2013
OMA Lightweight M2M
©Sensinode 2013
5
• Simple, efficient protocol, interfaces and payload formats
• Banking class security based on DTLS
 With Pre-shared and Public Key modes, Provisioning and Bootstrapping
• Powerful Object and Resource model
 Global registry and public lookup of all Objects
 Provides application semantics that are easy to use and re-use
 Standard device management Objects already defined by OMA
• Applicable to Cellular, 6LoWPAN, WiFi and ZigBee IP or any other IP
based constrained devices or networks
• Ideal time-to-market for the standard
 LWM2M is commercially deployable in 2013
 Can be combined with existing DM offerings
 Will be supported in OneM2M and can be integrated with ETSI M2M
Benefits of OMA Lightweight M2M
©Sensinode 2013
6
Architecture
©Sensinode 2013
7
• Based on efficient, secure IETF standards
 CoAP and DTLS with UDP and SMS bindings
• Interfaces
 Bootstrapping – Pre-provisioned or Client/Server Initiated
 Registration – Register the Client and its Objects
 Management & Service – Server access to Object or Resource
 Information Reporting – Notifications with new Resource values
• Object Model
 Object defines Resources, each can have Instances
 OMA, other SDOs or enterprises can define & register Objects
• Efficient Payloads
 Plain text for individual resources
 Binary TLV or JSON for resource batches (Object or Resource arrays)
Features
©Sensinode 2013
8
• A Client has one or more Object Instances
• An Object is a collection of Resources
• A Resource is an atomic piece of information
that can be
 Read, Written or Executed
• Resources can have multiple instances
• Objects and Resources are identified by a 16-
bit Integer, Instances by an 8-bit Integer
• Objects/Resources are accessed with simple
URIs:
/{Object ID}/{Object Instance}/{Resource ID}
e.g.
/3/0/1 (Device Object, Manufacturer Resource)
Object Model
©Sensinode 2013
9
• The LWM2M Technical Specification defines six normative Objects
Standard Device Management Objects
©Sensinode 2013
Object Name ID Multiple Instances? Description
LWM2M Server 1 Yes This LWM2M objects provides the data related
to a LWM2M server, the initial access rights,
and security related data.
Access Control 2 Yes Access Control Object is used to check
whether the LWM2M Server has access right
for performing an operation.
Device 3 No This LWM2M Object provides a range of
device related information which can be
queried by the LWM2M Server, and a device
reboot and factory reset function.
Connectivity Monitoring 4 No This LWM2M objects enables monitoring of
parameters related to network connectivity.
Firmware 5 No This Object includes installing firmware
package, updating firmware, and performing
actions after updating firmware.
Location 6 No The GPS location of the device.
10
• Example of the LWM2M Location Object, which has 6 Resources
Object Example
©Sensinode 2013
11
• Defining a new Object is straightforward
• Object IDs are registered with the OMA Naming Authority (OMNA)
• Who can register an Object?
 OMA working groups
 3rd
party organizations
 Enterprises
• How to register an Object?
 Write a specification filling out the Object template tables:
Object Name, Description and if it can have Multiple Instances
The list of resources the Object defines
Resource Name, ID, Operations, Multiple Instances?,
Mandatory?, Data Type, Range, Units and Description
 Fill out the Lightweight Object form on-line (starting 3Q/2013)
Defining new Objects
©Sensinode 2013
12
• Lightweight M2M defines a strong, holistic security solution
• DTLS v1.2 security for all CoAP communication
• Three DTLS security modes are defined
 Pre-Shared Key, Raw Public Key and Certificate mode
• Interoperable TLS Cipher suites for each mode are defined
• Per Server and Object Instance access control using Objects
• Bootstrapping for complete provisioning and key management
 Pre-configured Bootstrapping (from e.g. Flash)
 Smart Card Bootstrapping (from e.g. a SIM card)
 Use of a Bootstrap Server for initial setup or re-configuration and keying
Client-initiated Bootstrapping
Server-initiated Bootstrapping
Security
©Sensinode 2013
13
• Bootstrap Interface
 Configure Servers & Keying
 Pre-Configuration, Smart Card, Client
and Server Initiated Bootstrap
• Registration Interface
 RFC6690 based Resource Directory
• Management Interface
 Access to Object Instances and
Resources
• Reporting Interface
 Subscription to Object Instances and
Resources
 Asynchronous notification
Interfaces
©Sensinode 2013
14
Interface Flows
©Sensinode 2013
15
Registration
©Sensinode 2013
16
Object Access
©Sensinode 2013
17
Notification
©Sensinode 2013
18
Bootstrapping
©Sensinode 2013
19
Queue Mode (Sleeping Devices)
©Sensinode 2013

More Related Content

What's hot

Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatHamdamboy (함담보이)
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolBen Hardill
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionPrem Sanil
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPDai Yang
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationGerardo Pardo-Castellote
 
Micro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollersMicro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollerseProsima
 
Introduction to WebSockets Presentation
Introduction to WebSockets PresentationIntroduction to WebSockets Presentation
Introduction to WebSockets PresentationJulien LaPointe
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon
 

What's hot (20)

Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
MQTT security
MQTT securityMQTT security
MQTT security
 
AMQP
AMQPAMQP
AMQP
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IP
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
Ns3
Ns3Ns3
Ns3
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
Micro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollersMicro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollers
 
Amqp Basic
Amqp BasicAmqp Basic
Amqp Basic
 
Introduction to WebSockets Presentation
Introduction to WebSockets PresentationIntroduction to WebSockets Presentation
Introduction to WebSockets Presentation
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 

Similar to OMA Lightweight M2M Tutorial Overview

OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOpen Mobile Alliance
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understandRahulBhole12
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...mfrancis
 
Cloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoCloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoPaul Pajo
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDevice Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDuncan Purves
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management ProtocolsLeo Dumov
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystmfrancis
 

Similar to OMA Lightweight M2M Tutorial Overview (20)

OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
 
Cloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoCloud Computing Nist Paul Pajo
Cloud Computing Nist Paul Pajo
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
ITM711-M2.pdf
ITM711-M2.pdfITM711-M2.pdf
ITM711-M2.pdf
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDevice Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 

Recently uploaded

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Recently uploaded (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

OMA Lightweight M2M Tutorial Overview

  • 1. 1 May 19th, 2013 OMA Lightweight M2M Tutorial Zach Shelby, Chief Nerd ©Sensinode 2013
  • 2. 2 Tutorial Overview • Why Lightweight Device Management • OMA Lightweight M2M Standard • Benefits • Architecture • Features • Object Model • Security • Interfaces ©Sensinode 2013
  • 3. 3 • Traditional Device Management is widely used in Mobile Devices  Used by Operators and Enterprises for managing mobile devices  Some M2M use today with Cellular devices, mostly proprietary  OMA DM the only standard, however fragmented by handset vendors using proprietary mechanisms • Lightweight Device Management provides the ideal M2M solution  OMA LWM2M standard suitable for the whole M2M market Only fragmented, proprietary solutions on the market today  Applicable to both Cellular devices and WSN devices Much larger accessible market, often 500x more devices  Extensible Object Model open to the whole M2M industry  Enables both Management and Application data with the same solution Why Lightweight Device Management? ©Sensinode 2013
  • 4. 4 • Open Mobile Alliance is well known for Device Management (DM) • OMA Lightweight M2M (LWM2M) is a new standard from the alliance  Focused on constrained Cellular and other M2M devices  Sensinode is a member of OMA and is dedicated to LWM2M • The standard defines  Efficient Device-Server interface based on open IETF standards CoAP and DTLS bound to UDP or SMS  Extensible Object and Resource model for application semantics  Public registry of Objects from OMA, other SDOs or enterprises • Timeline  Requirements & architecture was completed 3Q/2012  Technical specification was stable 2Q/2013  Standard to be published July 2013 OMA Lightweight M2M ©Sensinode 2013
  • 5. 5 • Simple, efficient protocol, interfaces and payload formats • Banking class security based on DTLS  With Pre-shared and Public Key modes, Provisioning and Bootstrapping • Powerful Object and Resource model  Global registry and public lookup of all Objects  Provides application semantics that are easy to use and re-use  Standard device management Objects already defined by OMA • Applicable to Cellular, 6LoWPAN, WiFi and ZigBee IP or any other IP based constrained devices or networks • Ideal time-to-market for the standard  LWM2M is commercially deployable in 2013  Can be combined with existing DM offerings  Will be supported in OneM2M and can be integrated with ETSI M2M Benefits of OMA Lightweight M2M ©Sensinode 2013
  • 7. 7 • Based on efficient, secure IETF standards  CoAP and DTLS with UDP and SMS bindings • Interfaces  Bootstrapping – Pre-provisioned or Client/Server Initiated  Registration – Register the Client and its Objects  Management & Service – Server access to Object or Resource  Information Reporting – Notifications with new Resource values • Object Model  Object defines Resources, each can have Instances  OMA, other SDOs or enterprises can define & register Objects • Efficient Payloads  Plain text for individual resources  Binary TLV or JSON for resource batches (Object or Resource arrays) Features ©Sensinode 2013
  • 8. 8 • A Client has one or more Object Instances • An Object is a collection of Resources • A Resource is an atomic piece of information that can be  Read, Written or Executed • Resources can have multiple instances • Objects and Resources are identified by a 16- bit Integer, Instances by an 8-bit Integer • Objects/Resources are accessed with simple URIs: /{Object ID}/{Object Instance}/{Resource ID} e.g. /3/0/1 (Device Object, Manufacturer Resource) Object Model ©Sensinode 2013
  • 9. 9 • The LWM2M Technical Specification defines six normative Objects Standard Device Management Objects ©Sensinode 2013 Object Name ID Multiple Instances? Description LWM2M Server 1 Yes This LWM2M objects provides the data related to a LWM2M server, the initial access rights, and security related data. Access Control 2 Yes Access Control Object is used to check whether the LWM2M Server has access right for performing an operation. Device 3 No This LWM2M Object provides a range of device related information which can be queried by the LWM2M Server, and a device reboot and factory reset function. Connectivity Monitoring 4 No This LWM2M objects enables monitoring of parameters related to network connectivity. Firmware 5 No This Object includes installing firmware package, updating firmware, and performing actions after updating firmware. Location 6 No The GPS location of the device.
  • 10. 10 • Example of the LWM2M Location Object, which has 6 Resources Object Example ©Sensinode 2013
  • 11. 11 • Defining a new Object is straightforward • Object IDs are registered with the OMA Naming Authority (OMNA) • Who can register an Object?  OMA working groups  3rd party organizations  Enterprises • How to register an Object?  Write a specification filling out the Object template tables: Object Name, Description and if it can have Multiple Instances The list of resources the Object defines Resource Name, ID, Operations, Multiple Instances?, Mandatory?, Data Type, Range, Units and Description  Fill out the Lightweight Object form on-line (starting 3Q/2013) Defining new Objects ©Sensinode 2013
  • 12. 12 • Lightweight M2M defines a strong, holistic security solution • DTLS v1.2 security for all CoAP communication • Three DTLS security modes are defined  Pre-Shared Key, Raw Public Key and Certificate mode • Interoperable TLS Cipher suites for each mode are defined • Per Server and Object Instance access control using Objects • Bootstrapping for complete provisioning and key management  Pre-configured Bootstrapping (from e.g. Flash)  Smart Card Bootstrapping (from e.g. a SIM card)  Use of a Bootstrap Server for initial setup or re-configuration and keying Client-initiated Bootstrapping Server-initiated Bootstrapping Security ©Sensinode 2013
  • 13. 13 • Bootstrap Interface  Configure Servers & Keying  Pre-Configuration, Smart Card, Client and Server Initiated Bootstrap • Registration Interface  RFC6690 based Resource Directory • Management Interface  Access to Object Instances and Resources • Reporting Interface  Subscription to Object Instances and Resources  Asynchronous notification Interfaces ©Sensinode 2013
  • 19. 19 Queue Mode (Sleeping Devices) ©Sensinode 2013