Академический Документы
Профессиональный Документы
Культура Документы
Mohsen Sarraf
|
Agenda 1
What is M2M
Benefits and challenges
Components
Generic framework
Example applications
Standards
ETSI
Eclipse
ITU-T
Weightless
TIA, etc.
Architecture
General
ETSI
M2M in 3GPP
M2M security ETSI and others
Enabling Core Communication Technologies
Backbone
Wired
Wireless
Access
Wired
Wireless
|
Agenda 2
|
What is M2M 1
|
What is M2M 2
|
Benefits of M2M
Operational efficiency Cost-effective preventive
New opportunities maintenance
Compliance Improved Quality of Service
Customer satisfaction Fast response through
Sustainability outsourcing troubleshooting
Stay connected with any of your Centralized service support and
systems data management
Monitoring On-going revenues throughout
product lifecycle
Automate processes
Increased revenues from
Optimize processes minimized downtime
Identify critical situations in a Remote diagnostics
timely manner
Real-time statistics
There are, of course, more benefits
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Challenges in M2M
Large number of
communication protocols used in today's industries used
to send this data to a server in the Cloud
Industrial protocols used to collect temperature data on a
sensor, the communication protocols, the device
management protocols; too many protocols to master for
building an end-to-end M2M solution.
|
Overcoming challenges: The way forward
|
Components of an M2M System
|
Components of an ETSI compliant M2M System
|
Generic framework for uploading data (as per
ETSIs viewpoint)
|
Generic framework for downloading data (as per
ETSIs viewpoint)
|
High level ETSI viewpoint of remote control of home
appliances
|
M2M Applications
|
An application example: Inventory management
|
Standards 1
ETSI now has a comprehensive set of standards as shown below
Standard Description
TS 102 921 M2M; mIa, dIa and mId interfaces
TR 102 857 M2M; Use Cases of M2M applications for Connected Consumer
TS 103 104 M2M; Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives
TR 102 898 M2M; Use cases of Automotive Applications in M2M capable networks
TS 103 093 M2M; BBF TR-069 compatible Management Objects for ETSI M2M
TS 103 092 M2M; OMA DM compatible Management Objects for ETSI M2M
TR 102 935 M2M; Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform
TR 103 167 M2M; Threat analysis and counter measures to M2M service layer
TR 102 691 M2M; Smart Metering Use CasesP. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Standards 2
Eclipse M2M
Open Source implementations of standard M2M protocols
The M2M Industry Working Group is supporting lightweight protocols for two-way
communications between devices and server
Currently focusing on providing first-class Open Source implementations for the MQTT
messaging protocol, and the OMA-DA device management protocol
Message Queuing Telemetry Transport (MQTT) is a protocol designed to connect the physical world
devices and networks, with applications and middleware used in IT and Web development, making it
an ideal connectivity protocol for M2M and Internet of Things
OMA-DM is a standard communication protocol widely used in the telecommunications industry to
monitor and synchronize the state of communications devices such as mobile phones or the kind of
radio modules that can be found in M2M solutions
ITU-T: FG M2M
FG M2M will identify a minimum set of common requirements of vertical markets, focusing
initially on the health-care market and application programming interfaces (APIs) and
protocols supporting e-health applications and services, and draft technical reports in these
areas
Weightless
primarily dealing with PHY, MAC and security issues
proprietary open wireless protocol
Mainly from UK (mostly from Neul and CSR companies in Cambridge)
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Standards 3
BiTXml
TIA: TR-50
M2MXML: An XML based protocol for M2M
communications. The M2MXML project includes a
Java API for parsing M2MXML, but is intended to be
language agnostic
Others
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Architecture General
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
High level architecture ETSI
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
ETSI M2M functional architecture Intra
Service Provider
|
ETSI M2M functional architecture Inter-
M2M Service Provider
|
ETSI architecture: Mapping of reference points to different
deployment scenarios
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Security in M2M
32 |
ETSI TC M2M Secure connection (mId Interface)
33 |
Encryption / Decryption
Encryption/decryption is a security mechanism in which cipher algorithm are
applied together with a secret key to encrypt data to make it unreadable if
intercepted.
There are different types of encryption/decryption mechanisms
However, the network performance (capacity and/or delay) may be degraded
due to overhead
| 34
Common Encryption/Decryption Methods
Symmetric Key: Between two parties. Examples are DES, Triple-DES, AES, and
CBC (Cypher Block Chaining)
Public/Private Key: Example are Diffie-Hellman Key Exchange and RSA public
key encryption.
The public key is published and made available to receive encrypted
data.
Private key can be used to encrypt, authenticate and for digital
signatures
Public private key (Diffie-Hellman) can be used to establish symmetric
key, e.g., DES for symmetric key exchange.
Private Key: Private Keys are only known to specific key users in the enterprise
for encryption/decryption.
Public Key Infrastructure (PKI) is a security infrastructure that uses one or more
trusted Certification Authorities (CA) for managing, distributing, publishing the
keys and authenticating the key holders.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
| 35
Diffie-Hellman Algorithm
Used to set up a shared session secret, from which cryptographic
keys are derived
Used to set up a security association (SA) in the IPsec protocol
suite
Note:
Alice picks a, g, and a large prime p; g need not be large, in practice it is usually either 2
or 5.
Alice derives A as in the figure. Keeping a private, Alice sends g, p, A to Bob.
Bob picks a b which is private to Bob and computes B and K as in the figure using g, b,
p and A. Bob then sends B to Alice.
Alice computes K using B it received, and P. 2/3a |and p.
01/01/11 2011 Stevens Institute of Technology
K.is then the shared key they use for encrypting and decrypting.
| 36
Diffie-Hellman Example
Alice and Bob agree to use a prime number p=23 and base g=5.
| 37
RSA Public and Private Key
1. Choose two distinct prime numbers p and q (preferably at random and of similar bit-
length)
2. Compute n = p * q
3. Compute = (p 1) * (q 1)
4. Choose an integer e such that 1 < e < and gcd(e, ) = 1: Then (n,e) is the Public
Key released.
5. Find d = e-1 mod(); i.e., d is multiplicative inverse of e, i.e., ed mod() = 1. Then (n,d)
is the Private Key
Encryption:
Alice sends public key (n, e) to Bob and keeps d secret
Bob want to send a message to Alice; Bob converts the message into an integer m where
0< m<n
using padding for extra security
Bob computes c = me mod(n) and transmits c to Alice
Decryption:
Alice computes m = cd mod(n) from which she can get the original message m.
Example:
P = 61, q = 53 => n = 3233 and = 3120. Choose e = 17 => d = 2753
Say the message after padding is 01000001 => m = 65:
Sender sends c = 6517 mod (3233) = 2790
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
LAN Network
MAN Network
WAN Backbone network
Cellular systems: LTE,LTE-A, WiMAX, etc.
VPN
|
Enabling Wired Access Technologies
xDSL
Fiber
Verizon
Coax
Proprietary
|
Enabling Wireless Access Technologies
WiFi
Bluetooth
ZigBee
UWB
Z-Wave
DASH7
6LoWPAN
IrDA
Cellular (e.g., GPRS, WCDMA, LTE, WiMAX, LTE-A, etc.)
Other wireless technologies:
LMDS: Typically expensive and not easy to deploy, only used for very specific
applications
Satellite (e.g., VSAT, LEO, MEO, GEO): Typically expensive and not easy to deploy, only
used for very specific applications
Tactical (tactical radios, traditional tactical telemetry, INET, etc.): Not relevant here
|
IrDA
Industry standard since 1993 comprising about 50 companies
Used in portable devices such as cell phones laptops, cameras, etc.
Provides physically secure wireless data transfer with low bit error rate
Standard and solutions provide PHY to Session Layer specifications (and higher)
Achievable data rates vary as per specific PHY used (all baseband transmissions)
SIR: 9.6 115.2 kbps
MIR: 576 kbps 1.152 Mbps
FIR: 16 Mbps
UFIR: 96 Mbps partially meets our requirements
GigaIR: 512 Mbps 1 Gbps fully meets our requirements
5/10GigaIR: Newest standard version:
Requires Line-of-Sight (LOS)
A minimum cone 15 angle can be an implementation/ease-of-use impediment!
In practice scintillation causes interruptions in service especially over longer distances
Effects of environment temperature, humidity, body temperature and sweating have not been fully tested
for short distances
Effects of extreme body motions (e.g., rolling on ground) must be considered/studied as well
|
IrDA: 5/10GigaIR
Simultaneous send/receive
Range of a few centimeters to many meters, Beaming: to 50 cm, Spotting: to 3m or more; wider
angles available Least susceptibility to LPI and LPD
new compatibility stacks (e.g., IrUSB, IrHDMI, etc.)
830-1550 nm wavelengths, eye-safe
power consumption of <5 mW to 1 W
BER < 10^-9
Provisioned versions of MIMO: Multiple two-way, and Shower: multiple receivers (e.g., warfighters
in proximity) possible
|
WiFi: IEEE 802.11 network standards
Other IEEE 802.11 standards exist and deal with other issues such as security, etc.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
WiFi and IEEE 802.11ac
IEEE 802.11ac is known as the 5th generation of WiFi
The standard was developed from 2011 through 2013 with approval and publication in 2014
Released in two steps: Wave-1 and Wave-2
Although the project title specifies enhancements for very high throughput for operation in
bands below 6 GHz but currently only operational in 5 GHz band
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
IEEE 802.11ac available frequency bands
Max EIRP Max EIRP
23 dBm; UNII-1 UNII-2
30 dBm;
Indoor only Power Control if > 27 dBm
UNII-2 extended
Summary:
UNII-1,2: 5150-5350 MHz
UNII-3 UNII-2ext: 5470-5725 MHZ
UNII3: 5725-5825 MHz
Max EIRP
P. 2/3 | 01/01/11 36 dBm 2011 Stevens Institute of Technology
|
IEEE 802.11ac
IEEE 802.11ac provides many PHY layer advances that increases the data
rate considerably to 1.3 Gbps in wave 1 currently available commercially; it
provides
Higher bit rate up to 6.93 Gbps (wave 2) (Also available now but not with 8
antennas yet)
Up to 8 data streams using MIMO; APs up to 8 antennas
Multi-User-MIMO (MU-MIMO) on the downlink
Beamforming
20, 40, 80, 160 and 80+80 MHz bandwidths
An enhanced encryption technique for high bit rate real-time applications
Little change made to MAC layer which already is well-established
A change to RTS/CTS technique provides for dynamic channel allocation
IEEE 802.11ac provides a maximum of 866.7 Mbps (over 160 MHz) with
one antenna; using two antennas increases this rate to 1.733 Gbps
|
IEEE 802.11ac sample data rates
|
Bluetooth Basics 1
Standardized short range wireless technology operating in the 2.4 GHz ISM band (2400 MHz
2483.5 MHz)
Standardized as IEEE 802.15.1, with backing from Ericsson, IBM, Intel, Toshiba and Nokia; V2.0 released
in 2004; V3.0 in 2009; V4.0 in June 2010
Patent licenses are required for implementation
Managed by Bluetooth Special Interest Group (SIG) with more than 19000 members
Versions and data rates
Ver1.2: 1 Mbps
Ver2.0+EDR (Enhanced Data Rate): 2 or 3 Mbps
Ver3.0+HS (High Speed): uses other air interfaces (IEEE 802.11; UWB dropped in 2009; others being
studied) to achieve 24 Mbps (only initiates sessions, a.k.a, AMP: Alternative MAC/PHY); Also includes
Core Specification Addendum 1
Ver4.0: Bluetooth Smart superset of Bluetooth Low Energy (BLE) previously known as WiBree
Range, depends on environment (multipath, etc.) and class of devices
Class 1: Max Tx power of 100 mW about a 100 m range; Min power 0 dBm
Class 2: Max Tx power of 2.5mW about a 10 m range; Min power -6 dBm
Class 3: MaxTx power 1 mW about a 1 m range; Min power N/A
An optional 1 W minimum Tx power is possible for all classes
Many chip manufacturers have Bluetooth chips in various forms, including Qualcomm,
Broadcom, TI, LS Research, Infineon, Nordic Semiconductor, NXP, Hitachi, etc.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Bluetooth Basics 2
Uses frequency-hopping spread spectrum
Each channel is 1 MHz wide
Hopping over 79 channels (from 2402 MHz to 2480 MHz) at 1600 hops/sec
AFH (Adaptive Frequency Hopping): Avoids bad frequencies
Modulation scheme:
Ver1.2: 1 Mbps, GFSK, Modulation index = 0.321%, BT = 0.5
Ver2.0 and later: /4-Shifted-DQPSK (2 Mbps) and 8DPSK (3 Mbps)
Packet-based protocol (based on IEEE 802.3) with a Master-Slave
structure
One master can communicate with up to 7 slaves (a piconet)
Master/slave can switch roles
A device can be master in one piconet and slave in another to form a
scatternet, formed by bridging two or more piconets:
Bluetooth Profiles: Definitions of possible applications and general
specification of behaviors. Settings of parameters, etc. to save time for
setting up bidirectional links
Many useful profiles already defined in three categories: Generic Attribute
(GATT) profiles, BR/EDR ProfilesP. 2/3
and| 01/01/11
BE/EDR Protocols 2011 Stevens Institute of Technology
|
Bluetooth Basics Pairing and Bonding
Pairing used to join two devices together (e.g., for the first time) established
by
A users explicit request dedicated
Automatically generated general
During pairing the devices create a shared secret known as Link Key upon
successful exchange of which a bond is formed
Link key can be deleted by any device without the other(s) knowing
Bonded devices can authenticate the identity of each other and may encrypt
the data exchanged between each other
Pairing mechanisms
Legacy: V2.0 and before; Each device must enter PIN code
Secure Simple Pairing (SSP): V2.1 and above; can use PIN code for pairing with legacy
devices; Uses Public Key Cryptography and can guard against Man-in-the-middle
attacks
May work without user input
May use external links to establish pairing, such as NFC
With V2.1 and above encryption is required for all connections other than
Service Discovery Protocol
Prior versions had a weak security scheme
Encryption key is refreshed before expiration (not done in prior versions)
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Bluetooth Basics Partial list of profiles
Below are some example useful profiles
Profile Full Profile Name Description
BLP Blood Pressure Profile Enables a device to connect and interact with a Blood
Pressure Sensor device for use in consumer and
professional health care applications.
HRP Heart Rate Profile Enables a Collector device to connect and interact with a
Heart Rate Sensor for use in fitness applications.
VDP Video Distribution Profile Defines how a Bluetooth enabled device streams video
over Bluetooth wireless technology.
AVCTP Audio/Video Control Transport Protocol Describes the transport mechanisms to exchange messages
for controlling A/V devices.
AVDTP Audio/Video Distribution Transport Protocol Defines A/V stream negotiation, establishment and
transmission procedures
RFCOMM RFCOMM with TS 07.10
emulates the serial cable line settings and status of an RS-
232 serial port and is used for providing serial data transfer.
|
DASH7
Open source wireless sensing standard originally funded by US DoD; in
March 2009 DASH7 Alliance was formed and has more than 50
participants in 23 countries
Follows the ISO 18000-7 for the license-free 433 MHz ISM band which
is available internationally; contends with proprietary standards like
ZigBee
Provides for multi-year battery life
Range: up to 2 Km; depends on Tx power and data rate; nominally
250 m at 1 mW transmit power and 100 kbps data rate
Indoor location accuracy of 1 meter
AES 128 shared key encryption
Data rate: up to 200 kbps
Designed primarily for BLAST applications: Bursty, Light-data,
ASynchronous, Transitive Fine for ancillary data but NOT for media
applications
Packet sizes are limited to 256 Bytes with multiple packet allowed but
discouraged
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Various Capabilities from DASH7 Viewpoint
ZigBee
|
Z-Wave
Developed by Danish start-up Zen-Sys and acquired by Sigma
Designs in 2008
Supported by over 250 manufacturers worldwide
Examples: GE/Jasco, Ingersol-Rand,Sigma Design, and more
Low-power wireless technology optimized for reliable, low-latency
communication of small data packets
Specifically designed for home and light commercial environment
automation, e.g., appliances, home electronics, access control, etc.
Operates in the 900 MHz band (908.42 MHz in US)
Competes with cordless phones
Avoids WiFi, Bluetooth and other 2.4 GHz ISM band devices
Bandwidth: 9.6 or 40 kbps
Range: ~ 100 ft, possibly less indoors depending on
building material
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology
|
Z-Wave Contd.
|
ZigBee
|
IEEE 802.15.4 Contd.
|
IEEE 802.15.4 Contd.
|
Various ZigBee Specs.
|
A Prototypical ZigBee System Diagram
|
ZigBee on Amazon
|
6LoWPAN
|
Ultra-Wideband (UWB)
Radio technologies using a bandwidth of the lesser of 500
MHz or 20% of the center frequency
FCC now allows unlicensed use of UWB in the 3.1 GHz to
10.6 GHz range of spectrum provided that the emitted
power spectral density is at or below 41.3 dBm/MHz
this translates to an output power limit of about 74 pico-Watts per
MHz
This translates to about 37 micro-Watts of total output power over 500
MHz!!
|
UWB Cont.d
|
UWB Cont.d
|
Other Technologies
Many other wireless technologies exist that can be used
for M2M communications. However, most of these
technologies are more bulky, expensive or power
consuming and are used only in specific circumstances
for niche applications, such as satellite for very remote
locations in commercial or tactical applications.
Examples of these technologies are:
LMDS
MMDS
TV White Space
Satellite
67 | 11/9/2017
Other Technologies 2
LMDS: Local Multipoint Distribution Service is a broadband
wireless access technology conceived as a fixed wireless, point-to-
multipoint technology for the last mile. It commonly operates 9.4" x 9.4" x 5.25"
on frequencies across the 26 GHz and 29 GHz bands. In USA, frequencies
from 31.0 GHz through 31.3 GHz are also used. The device shown provides
full-duplex Ethernet up to 630 Mbps.
MMDS: Multichannel Multipoint Distribution Service (a.k.a., AWS)
another wireless technology most commonly used in sparsely
populated areas, where laying cables is not economically viable. It
uses licensed frequencies from 2.5 GHz to 2.7 GHz. In US there are 31
channels each 6 MHz wide with throughputs of up to 38 Mbps
68 | 11/9/2017
PRACTICE PROBLEMS
69 | 11/9/2017