Machine-to-Machine communications (M2M); mIa, dIa and mId interfaces




Yüklə 7.15 Mb.
səhifə1/106
tarix20.04.2016
ölçüsü7.15 Mb.
  1   2   3   4   5   6   7   8   9   ...   106





ETSI TS 102 921 V2.0.9 (2013-05)


Machine-to-Machine communications (M2M);

mIa, dIa and mId interfaces






<













Technical Specification


Reference

DTS/M2M-00010ed111

Keywords

interface, M2M, protocol, service






ETSI

650 Route des Lucioles

F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C

Association à but non lucratif enregistrée à la

Sous-Préfecture de Grasse (06) N° 7803/88






Important notice

Individual copies of the present document can be downloaded from:


http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp

If you find errors in the present document, please send your comment to one of the following services:


http://portal.etsi.org/chaircor/ETSI_support.asp

Copyright Notification

No part may be reproduced except as authorized by written permission.


The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2012.

All rights reserved.



DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.



Contents


Contents 3

Intellectual Property Rights 7

Foreword 7

1 Scope 8

2 References 8

2.1 Normative references 8

2.2 Informative references 11

3 Definitions, symbols, abbreviations and conventions 12

3.1 Definitions 12

3.2 Symbols 12

3.3 Abbreviations 12

3.4 Conventions 12

4 Overview 12

5 General security aspects 13

5.1 Key provisioning and hierarchy derivation 13

5.2 Security Assumptions 14

6 M2M Service Bootstrapping 15

6.1 General Principles 15

6.2 Access Network Assisted M2M Service Bootstrap Procedure 15

6.3 Bootstrapping using other methods 19

6.4 M2M Service Bootstrap Parameter Delivery Procedure For Procedures using HTTP 34

7 M2M Service Connection Procedures 39

7.1 General principles 39

7.2 M2M Service Connection Procedures leveraging access network credentials 39

7.3 M2M Service Connection Procedures using EAP/PANA 42

7.4 M2M Service Connection Procedure based on TLS-PSK 45

7.5 IVal security attributes in connection establishment 53

7.6 Secure Channel with UICC 53

8 M2M Secure Communication over mId 54

8.1 Access Network Based Security 54

8.2 Channel Security 54

8.3 Object Security 56

9 Resources 57

10 SCL Primitives 58

10.1 Introduction 58

10.2 General aspects 58

10.3 Common operations 59

10.4 resource and management procedures 85

10.5 scls resource and management procedures 89

10.6 resource and management procedures 93

10.7 applications resource and management procedures 103

10.8 resource and management procedures 107

10.9 resource and management procedures 114

10.10 accessRights resource and management procedures 118

10.11 accessRight Resource and Management Procedures 122

10.12 resource and management procedures 127

10.13 containers resource and management procedures 132

10.14 resource and management procedures 136

10.15 resource and management procedures 142

10.16 locationContainer resources and management procedures 147

10.17 resource and management procedures 153

10.18 contentInstances resource and management procedures 158

10.19 resource and management procedures 162

10.20 groups resource and management procedures 168

10.21 resource and management procedures 171

10.22 resource and management procedures 178

10.23 membersContent resource and management procedures 182

10.24 subscriptions resource and management procedures 192

10.25 resource and management procedures 195

10.26 m2mPoCs resource and management procedures 207

10.27 m2mPoc Resource and Management Procedures 209

10.28 mgmtObjs resources and management procedures 216

10.29 resources and management procedures 220

10.30
resources and management procedures 228

10.31 resource and management procedures 236

10.32 execInstances resource and management procedures 244

10.33 resource and management procedures 246

10.34 attachedDevices resource and management procedures 251

10.35 attachedDevice resources and management procedures 254

10.36 notificationChannels resource and management procedures 260

10.37 resource and management procedures 262

10.38 discovery resource and management procedures 274

10.39 Partial Addressing 276

10.40 Subcontainers resource and management procedures 283

10.41 communicationChannels resource and management procedures 286

10.42 resource and management procedures 288

10.43 device replacement procedures 299

11 Data types and attributes for resources and messages 301

11.1 Assumptions 301

11.2 Basic data types 302

11.3 Enumeration types 303

11.4 Complex data types 306

11.5 Resource Attributes 316

11.6 Primitive Attributes 325

12 Security Message Definitions 326

12.1 PANA AVPs 326

12.2 Security Resource Attributes 331

12.3 Security Primitive Attributes 334

13 Charging Message Definitions 335

13.1 Common charging AVPs 335

13.2 M2M charging AVPs 339

A.1 Introduction 345

A.2 Architectural model 345

A.3 Primitives modelling 346

A.4 Mapping directives for request primitives 346

A.5 Mapping directives for indication primitives 347

A.6 Mapping directives for response primitives 347

A.7 Mapping directives for confirm primitives 347

B.1 Resource mapping to XML 348

B.1.1 Principles 348

B.1.2 XSD files 348

B.2 Data mapping to JSON 351

B.3 Binary XML serialisation 351

B.4 Content type 351

C.1 General 352

C.1.1 Resource Representation 352

C.1.2 Content-type negotiation 352

C.1.3 Content-encoding 353

C.1.4 Content-Location 353

C.1.5 Conditional requests 353

C.1.6 Caching 353

C.1.7 HTTP method mapping 355

C.1.8 HTTP version 355

C.1.9 HTTP requestURI 355

C.2 Primitive mapping 356

C.2.1 Outgoing RequestIndication primitive to HTTP request 356

C.2.2 Incoming HTTP response to responseConfirm primitive 357

C.2.3 Incoming HTTP request to requestIndication primitive 357

C.2.4 Outgoing responseConfirm primitive to HTTP response 358

C.3 Partial addressing 359

C.4 Semi-asynchronous and asynchronous communication 360

C.4.1 Incoming RequestIndication Primitive and outgoing HTTP request 360

C.4.2 Incoming HTTP request and outgoing RequestIndication primitive 360

C.4.3 Incoming accept ResponseConfirm and outgoing HTTP response 361

C.4.4 Incoming HTTP accept response and outgoing ResponseConfirm 361

C.4.5 Outgoing HTTP polling request 361

C.4.6 Incoming HTTP polling request 361

C.4.7 Incoming final ResponseConfirm 362

C.4.8 Mapping a ResponseConfirm to a notify POST 362

C.4.9 Mapping a notify POST to a ResponseConfirm 363

C.4.10 ResponseNotify entity 363

C.5 Service layer NAT traversal for mId 363

D.1 Resource representation 367

D.1.1 Content-type negotiation 367

D.1.2 Conditional requests 368

D.1.3 Caching 368

D.1.4 Method mapping 368

D.1.5 URI Options 368

D.1.6 Blockwise Transfers 369

D.2 Primitive mapping 370

D.2.1 Outgoing Request primitive to CoAP 370

D.2.2 Incoming CoAP response to responseConfirm primitive 371

D.2.3 Incoming CoAP request to Request primitive 371

D.2.4 Outgoing responseConfirm primitive to CoAP response 372

D.2.5 Mapping of primitive attributes 373

D.2.6 Partial addressing 374

D.3 Semi-asynchronous and asynchronous communication 375

E.1 Introduction 376

E.2 Data Types only used for attributes in resources 376

E.2.1 Purpose 376

E.2.2 Complex data types 376

E.2.3 Enumeration data types 379

E.3 Mapping for Management Objects to their equivalents in OMA DM and BBF 379

E.3.1 References and general mapping assumptions 379

E.3.2 Resource etsiSclMo 380

E.3.3 Resource etsiDeviceInfo 383

E.3.4 Resource etsiDeviceCapability 383

E.3.5 Resource etsiBattery 385

E.3.6 Resource etsiMemory 386

E.3.7 Resource etsiTrapEvent 387

E.3.8 Resource etsiPerformanceLog 388

E.3.9 Resource etsiFirmware 389

E.3.10 Resource etsiSoftware 390

E.3.11 Resource etsiReboot 392

E.3.12 Resource etsiAreaNwkInfo 393

E.3.13 Resource etsiAreaNwkDeviceInfo 394

F.1 Application Usage of XDMS for Management of M2M Service Capabilities Resources 395

F.1.1 High level Architectural Principles 395

F.1.2 M2M Service Capabilities Application Usages 396

F.1.3 M2M to XDMS URI Mapping Principles 474

F.2 NSCL Procedures 478

F.2.1 Resource Creation 478

F.2.2 Update an existing Collection with a new Resource 511

F.2.3 Writing/Updating data from an existing resource (not in a Collection) 511

F.2.4 Deleting an existing resource 511

F.3 NSCL Support for Delegation of M2M Subscriptions to the XDMS Subscription framework 512

F.3.1 Creating a subscription 512

F.3.2 Terminating a subscription 514

F.4 Interworking between Gateways and XDMS 515

F.5 Support for Managed Objects 517

F.5.1 Architectural View to Support M2M Management Objects 517

F.5.2 M2M Management Objects Application Usages 518

F.5.3 Impacts on existing Application Usage due to M2M Management Objects 541

F.6 Network Procedures in Support of M2M Management Objects 545

F.6.1 Resource Creation In support of M2M Managed Objects 546

G.1 Start-up and configuration operations 558

J.1 Access Network UICC-based M2M Service Framework 561

J.1.2 M2M Service Framework discovery for Access Network UICC 562

J.1.3 Content of files at the DFM2M level 563

J.2 M2M Service Module application on UICC (M2MSM) 569

K.1 Suggested content of the EFs at pre-personalization 572

K.2 EF changes via Data Download or CAT applications 573

K.3 List of SFI values at the ADFM2MSM or DFM2M level 573

K.4 UICC related tags defined in Annex J 573

History 574



  1   2   3   4   5   6   7   8   9   ...   106


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azrefs.org 2016
rəhbərliyinə müraciət

    Ana səhifə