SlideShare a Scribd company logo
1 of 19
1
May 19th, 2013
OMA Lightweight M2M Tutorial
Zach Shelby, Chief Nerd
©Sensinode 2013
2
Tutorial Overview
• Why Lightweight Device Management
• OMA Lightweight M2M Standard
• Benefits
• Architecture
• Features
• Object Model
• Security
• Interfaces
©Sensinode 2013
3
• Traditional Device Management is widely used in Mobile Devices
 Used by Operators and Enterprises for managing mobile devices
 Some M2M use today with Cellular devices, mostly proprietary
 OMA DM the only standard, however fragmented by handset vendors
using proprietary mechanisms
• Lightweight Device Management provides the ideal M2M solution
 OMA LWM2M standard suitable for the whole M2M market
Only fragmented, proprietary solutions on the market today
 Applicable to both Cellular devices and WSN devices
Much larger accessible market, often 500x more devices
 Extensible Object Model open to the whole M2M industry
 Enables both Management and Application data with the same solution
Why Lightweight Device Management?
©Sensinode 2013
4
• Open Mobile Alliance is well known for Device Management (DM)
• OMA Lightweight M2M (LWM2M) is a new standard from the alliance
 Focused on constrained Cellular and other M2M devices
 Sensinode is a member of OMA and is dedicated to LWM2M
• The standard defines
 Efficient Device-Server interface based on open IETF standards
CoAP and DTLS bound to UDP or SMS
 Extensible Object and Resource model for application semantics
 Public registry of Objects from OMA, other SDOs or enterprises
• Timeline
 Requirements & architecture was completed 3Q/2012
 Technical specification was stable 2Q/2013
 Standard to be published July 2013
OMA Lightweight M2M
©Sensinode 2013
5
• Simple, efficient protocol, interfaces and payload formats
• Banking class security based on DTLS
 With Pre-shared and Public Key modes, Provisioning and Bootstrapping
• Powerful Object and Resource model
 Global registry and public lookup of all Objects
 Provides application semantics that are easy to use and re-use
 Standard device management Objects already defined by OMA
• Applicable to Cellular, 6LoWPAN, WiFi and ZigBee IP or any other IP
based constrained devices or networks
• Ideal time-to-market for the standard
 LWM2M is commercially deployable in 2013
 Can be combined with existing DM offerings
 Will be supported in OneM2M and can be integrated with ETSI M2M
Benefits of OMA Lightweight M2M
©Sensinode 2013
6
Architecture
©Sensinode 2013
7
• Based on efficient, secure IETF standards
 CoAP and DTLS with UDP and SMS bindings
• Interfaces
 Bootstrapping – Pre-provisioned or Client/Server Initiated
 Registration – Register the Client and its Objects
 Management & Service – Server access to Object or Resource
 Information Reporting – Notifications with new Resource values
• Object Model
 Object defines Resources, each can have Instances
 OMA, other SDOs or enterprises can define & register Objects
• Efficient Payloads
 Plain text for individual resources
 Binary TLV or JSON for resource batches (Object or Resource arrays)
Features
©Sensinode 2013
8
• A Client has one or more Object Instances
• An Object is a collection of Resources
• A Resource is an atomic piece of information
that can be
 Read, Written or Executed
• Resources can have multiple instances
• Objects and Resources are identified by a 16-
bit Integer, Instances by an 8-bit Integer
• Objects/Resources are accessed with simple
URIs:
/{Object ID}/{Object Instance}/{Resource ID}
e.g.
/3/0/1 (Device Object, Manufacturer Resource)
Object Model
©Sensinode 2013
9
• The LWM2M Technical Specification defines six normative Objects
Standard Device Management Objects
©Sensinode 2013
Object Name ID Multiple Instances? Description
LWM2M Server 1 Yes This LWM2M objects provides the data related
to a LWM2M server, the initial access rights,
and security related data.
Access Control 2 Yes Access Control Object is used to check
whether the LWM2M Server has access right
for performing an operation.
Device 3 No This LWM2M Object provides a range of
device related information which can be
queried by the LWM2M Server, and a device
reboot and factory reset function.
Connectivity Monitoring 4 No This LWM2M objects enables monitoring of
parameters related to network connectivity.
Firmware 5 No This Object includes installing firmware
package, updating firmware, and performing
actions after updating firmware.
Location 6 No The GPS location of the device.
10
• Example of the LWM2M Location Object, which has 6 Resources
Object Example
©Sensinode 2013
11
• Defining a new Object is straightforward
• Object IDs are registered with the OMA Naming Authority (OMNA)
• Who can register an Object?
 OMA working groups
 3rd
party organizations
 Enterprises
• How to register an Object?
 Write a specification filling out the Object template tables:
Object Name, Description and if it can have Multiple Instances
The list of resources the Object defines
Resource Name, ID, Operations, Multiple Instances?,
Mandatory?, Data Type, Range, Units and Description
 Fill out the Lightweight Object form on-line (starting 3Q/2013)
Defining new Objects
©Sensinode 2013
12
• Lightweight M2M defines a strong, holistic security solution
• DTLS v1.2 security for all CoAP communication
• Three DTLS security modes are defined
 Pre-Shared Key, Raw Public Key and Certificate mode
• Interoperable TLS Cipher suites for each mode are defined
• Per Server and Object Instance access control using Objects
• Bootstrapping for complete provisioning and key management
 Pre-configured Bootstrapping (from e.g. Flash)
 Smart Card Bootstrapping (from e.g. a SIM card)
 Use of a Bootstrap Server for initial setup or re-configuration and keying
Client-initiated Bootstrapping
Server-initiated Bootstrapping
Security
©Sensinode 2013
13
• Bootstrap Interface
 Configure Servers & Keying
 Pre-Configuration, Smart Card, Client
and Server Initiated Bootstrap
• Registration Interface
 RFC6690 based Resource Directory
• Management Interface
 Access to Object Instances and
Resources
• Reporting Interface
 Subscription to Object Instances and
Resources
 Asynchronous notification
Interfaces
©Sensinode 2013
14
Interface Flows
©Sensinode 2013
15
Registration
©Sensinode 2013
16
Object Access
©Sensinode 2013
17
Notification
©Sensinode 2013
18
Bootstrapping
©Sensinode 2013
19
Queue Mode (Sleeping Devices)
©Sensinode 2013

More Related Content

What's hot

What's hot (20)

Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview
 
Understanding of MQTT for IoT Projects
Understanding of MQTT for IoT ProjectsUnderstanding of MQTT for IoT Projects
Understanding of MQTT for IoT Projects
 
Nokia 5G Workshop Taiwan Oct 2016
Nokia 5G Workshop Taiwan Oct 2016Nokia 5G Workshop Taiwan Oct 2016
Nokia 5G Workshop Taiwan Oct 2016
 
LoRaWAN roaming
LoRaWAN roamingLoRaWAN roaming
LoRaWAN roaming
 
Multi-layer Control Plane
Multi-layer Control Plane Multi-layer Control Plane
Multi-layer Control Plane
 
ZXSDR Trainning
ZXSDR TrainningZXSDR Trainning
ZXSDR Trainning
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Radio Network Design & Roll Out
Radio Network Design & Roll OutRadio Network Design & Roll Out
Radio Network Design & Roll Out
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional Analysis
 
Mqtt
MqttMqtt
Mqtt
 
Cloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5GCloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5G
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
MPLS
MPLSMPLS
MPLS
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
 

Similar to OMA Lightweight M2M Tutorial

Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
mfrancis
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
mfrancis
 

Similar to OMA Lightweight M2M Tutorial (20)

OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
 
Cloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoCloud Computing Nist Paul Pajo
Cloud Computing Nist Paul Pajo
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
ITM711-M2.pdf
ITM711-M2.pdfITM711-M2.pdf
ITM711-M2.pdf
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDevice Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

OMA Lightweight M2M Tutorial

  • 1. 1 May 19th, 2013 OMA Lightweight M2M Tutorial Zach Shelby, Chief Nerd ©Sensinode 2013
  • 2. 2 Tutorial Overview • Why Lightweight Device Management • OMA Lightweight M2M Standard • Benefits • Architecture • Features • Object Model • Security • Interfaces ©Sensinode 2013
  • 3. 3 • Traditional Device Management is widely used in Mobile Devices  Used by Operators and Enterprises for managing mobile devices  Some M2M use today with Cellular devices, mostly proprietary  OMA DM the only standard, however fragmented by handset vendors using proprietary mechanisms • Lightweight Device Management provides the ideal M2M solution  OMA LWM2M standard suitable for the whole M2M market Only fragmented, proprietary solutions on the market today  Applicable to both Cellular devices and WSN devices Much larger accessible market, often 500x more devices  Extensible Object Model open to the whole M2M industry  Enables both Management and Application data with the same solution Why Lightweight Device Management? ©Sensinode 2013
  • 4. 4 • Open Mobile Alliance is well known for Device Management (DM) • OMA Lightweight M2M (LWM2M) is a new standard from the alliance  Focused on constrained Cellular and other M2M devices  Sensinode is a member of OMA and is dedicated to LWM2M • The standard defines  Efficient Device-Server interface based on open IETF standards CoAP and DTLS bound to UDP or SMS  Extensible Object and Resource model for application semantics  Public registry of Objects from OMA, other SDOs or enterprises • Timeline  Requirements & architecture was completed 3Q/2012  Technical specification was stable 2Q/2013  Standard to be published July 2013 OMA Lightweight M2M ©Sensinode 2013
  • 5. 5 • Simple, efficient protocol, interfaces and payload formats • Banking class security based on DTLS  With Pre-shared and Public Key modes, Provisioning and Bootstrapping • Powerful Object and Resource model  Global registry and public lookup of all Objects  Provides application semantics that are easy to use and re-use  Standard device management Objects already defined by OMA • Applicable to Cellular, 6LoWPAN, WiFi and ZigBee IP or any other IP based constrained devices or networks • Ideal time-to-market for the standard  LWM2M is commercially deployable in 2013  Can be combined with existing DM offerings  Will be supported in OneM2M and can be integrated with ETSI M2M Benefits of OMA Lightweight M2M ©Sensinode 2013
  • 7. 7 • Based on efficient, secure IETF standards  CoAP and DTLS with UDP and SMS bindings • Interfaces  Bootstrapping – Pre-provisioned or Client/Server Initiated  Registration – Register the Client and its Objects  Management & Service – Server access to Object or Resource  Information Reporting – Notifications with new Resource values • Object Model  Object defines Resources, each can have Instances  OMA, other SDOs or enterprises can define & register Objects • Efficient Payloads  Plain text for individual resources  Binary TLV or JSON for resource batches (Object or Resource arrays) Features ©Sensinode 2013
  • 8. 8 • A Client has one or more Object Instances • An Object is a collection of Resources • A Resource is an atomic piece of information that can be  Read, Written or Executed • Resources can have multiple instances • Objects and Resources are identified by a 16- bit Integer, Instances by an 8-bit Integer • Objects/Resources are accessed with simple URIs: /{Object ID}/{Object Instance}/{Resource ID} e.g. /3/0/1 (Device Object, Manufacturer Resource) Object Model ©Sensinode 2013
  • 9. 9 • The LWM2M Technical Specification defines six normative Objects Standard Device Management Objects ©Sensinode 2013 Object Name ID Multiple Instances? Description LWM2M Server 1 Yes This LWM2M objects provides the data related to a LWM2M server, the initial access rights, and security related data. Access Control 2 Yes Access Control Object is used to check whether the LWM2M Server has access right for performing an operation. Device 3 No This LWM2M Object provides a range of device related information which can be queried by the LWM2M Server, and a device reboot and factory reset function. Connectivity Monitoring 4 No This LWM2M objects enables monitoring of parameters related to network connectivity. Firmware 5 No This Object includes installing firmware package, updating firmware, and performing actions after updating firmware. Location 6 No The GPS location of the device.
  • 10. 10 • Example of the LWM2M Location Object, which has 6 Resources Object Example ©Sensinode 2013
  • 11. 11 • Defining a new Object is straightforward • Object IDs are registered with the OMA Naming Authority (OMNA) • Who can register an Object?  OMA working groups  3rd party organizations  Enterprises • How to register an Object?  Write a specification filling out the Object template tables: Object Name, Description and if it can have Multiple Instances The list of resources the Object defines Resource Name, ID, Operations, Multiple Instances?, Mandatory?, Data Type, Range, Units and Description  Fill out the Lightweight Object form on-line (starting 3Q/2013) Defining new Objects ©Sensinode 2013
  • 12. 12 • Lightweight M2M defines a strong, holistic security solution • DTLS v1.2 security for all CoAP communication • Three DTLS security modes are defined  Pre-Shared Key, Raw Public Key and Certificate mode • Interoperable TLS Cipher suites for each mode are defined • Per Server and Object Instance access control using Objects • Bootstrapping for complete provisioning and key management  Pre-configured Bootstrapping (from e.g. Flash)  Smart Card Bootstrapping (from e.g. a SIM card)  Use of a Bootstrap Server for initial setup or re-configuration and keying Client-initiated Bootstrapping Server-initiated Bootstrapping Security ©Sensinode 2013
  • 13. 13 • Bootstrap Interface  Configure Servers & Keying  Pre-Configuration, Smart Card, Client and Server Initiated Bootstrap • Registration Interface  RFC6690 based Resource Directory • Management Interface  Access to Object Instances and Resources • Reporting Interface  Subscription to Object Instances and Resources  Asynchronous notification Interfaces ©Sensinode 2013
  • 19. 19 Queue Mode (Sleeping Devices) ©Sensinode 2013