ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf

上传人:diecharacter305 文档编号:736527 上传时间:2019-01-12 格式:PDF 页数:36 大小:783.77KB
下载 相关 举报
ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf_第1页
第1页 / 共36页
ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf_第2页
第2页 / 共36页
ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf_第3页
第3页 / 共36页
ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf_第4页
第4页 / 共36页
ETSI TR 118 518-2016 oneM2M Industrial Domain Enablement (V2 0 0 oneM2M TR-0018 version 2 0 0 Release 2)《oneM2M(物联网协议联盟) 工业领域启用(V2 0 0 oneM2M TR-0018 版本2 0 0 发行版本2)》.pdf_第5页
第5页 / 共36页
点击查看更多>>
资源描述

1、 ETSI TR 118 518 V2.0.0 (2016-09) oneM2M; Industrial Domain Enablement (oneM2M TR-0018 version 2.0.0 Release 2) TECHNICAL REPORT ETSI ETSI TR 118 518 V2.0.0 (2016-09) 2oneM2M TR-0018 version 2.0.0 Release 2Reference DTR/oneM2M-000018 Keywords IoT, M2M ETSI 650 Route des Lucioles F-06921 Sophia Antip

2、olis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present do

3、cument may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions an

4、d/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current

5、status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part m

6、ay be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing

7、 restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benef

8、it of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 118 518 V2.0.0 (2016-09) 3oneM2M TR-0018 version 2.0.0 Release 2Contents Intellectual Property Rights 5g3Foreword . 5g31 Scope 6g32 References 6g3

9、2.1 Normative references . 6g32.2 Informative references 6g33 Abbreviations . 7g34 Conventions 8g35 Introduction to Industrial Domain 8g35.1 Industrial Domain Overview 8g35.2 Technology Trends in Industrial Domain . 9g36 Use Cases . 11g36.1 An Industrial Use Case for On-demand Data Collection for Fa

10、ctories 11g36.1.1 Description 11g36.1.2 Source . 11g36.1.3 Actors 12g36.1.4 Pre-conditions . 12g36.1.5 Triggers . 12g36.1.6 Normal Flow . 12g36.1.7 High Level Illustration 13g36.1.8 Potential Requirements . 13g36.2 Integrity of Data Collection Monitoring . 13g36.2.1 Description 13g36.2.2 Source . 14

11、g36.2.3 Actors 14g36.2.4 Pre-conditions . 14g36.2.5 Triggers . 14g36.2.6 Normal Flow . 14g36.2.7 High Level Illustration 15g36.2.8 Potential Requirements . 15g36.3 Data Process for Inter-factory Manufacturing 16g36.3.1 Description 16g36.3.2 Source . 16g36.3.3 Actors 16g36.3.4 Pre-conditions . 16g36.

12、3.5 Triggers . 16g36.3.6 Normal Flow . 17g36.3.7 Post-conditions . 17g36.3.8 High Level Illustration 17g36.3.9 Potential Requirements . 17g36.4 Aircraft Construction and Maintenance . 18g36.4.1 Description 18g36.4.2 Source . 18g36.4.3 Actors 18g36.4.4 Pre-conditions . 19g36.4.5 Triggers . 19g36.4.6

13、Normal Flow . 19g36.4.7 High Level Illustration 20g36.4.8 Potential Requirements . 20g36.5 Real Time Data Collection . 21g36.5.1 Description 21g36.5.2 Source . 21g36.5.3 Actors 21g36.5.4 Pre-conditions . 22g3ETSI ETSI TR 118 518 V2.0.0 (2016-09) 4oneM2M TR-0018 version 2.0.0 Release 26.5.5 Triggers

14、. 22g36.5.6 Normal Flow . 22g36.5.7 Alternative flow 22g36.5.8 Post-conditions . 22g36.5.9 High Level Illustration 23g36.5.10 Potential Requirements . 23g36.6 Data Encryption in Industrial Domain 23g36.6.1 Description 23g36.6.2 Source . 24g36.6.3 Actors 24g36.6.4 Pre-conditions . 25g36.6.5 Normal Fl

15、ow. 25g36.6.6 Post-conditions . 25g36.6.7 High Level Illustration 26g36.6.8 Potential Requirements . 26g36.7 Qos/QoI Monitoring in Industrial Domain . 26g36.7.1 Description 26g36.7.2 Source . 27g36.7.3 Actors 27g36.7.4 Pre-conditions . 27g36.7.5 Triggers . 27g36.7.6 Normal Flow . 28g36.7.7 Alternati

16、ve flow 28g36.7.8 Post-conditions . 28g36.7.9 High Level Illustration 28g36.7.10 Potential Requirements . 28g37 Overview of Potential Requirements . 29g38 High Level Architecture . 30g38.1 Introduction 30g38.2 Deployment Mapping Using IPE . 30g38.3 Deployment Mapping Using Peer-to-Peer Communication

17、 . 31g38.4 Conclusion 32g39 Security Analysis 32g39.1 Introduction 32g39.2 Identification and Authentication . 32g39.3 Use Control 33g39.3.1 Introduction. 33g39.3.2 Authorization 33g39.3.3 Session Lock Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is

18、 available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETS

19、I SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Partnership Project oneM2M (oneM2M). ETSI ETSI TR 118 518 V2.0.0 (2016-09) 6oneM2M TR-0018 version 2.0.0 Release

20、21 Scope The present document collects the use cases of the industrial domain and the requirements needed to support the use cases collectively. In addition it identifies the necessary technical work needed to be addressed while enhancing future oneM2M specifications. 2 References 2.1 Normative refe

21、rences References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. R

22、eferenced documents which are not found to be publicly available in the expected location might be found at https:/docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following refer

23、enced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. F

24、or non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary

25、 for the application of the present document but they assist the user with regard to a particular subject area. i.1 oneM2M Drafting Rules. NOTE: Available at http:/www.onem2m.org/images/files/oneM2M-Drafting-Rules.pdf. i.2 ETSI TS 118 111: “oneM2M; Common Terminology (oneM2M TS-0011)“. i.3 IEC TC Ne

26、ws, http:/www.iec.ch/tcnews/2014/tcnews_0214.htm. i.4 http:/www.is-inotek.or.jp/archive/05_Ishikuma_Smart_Manufacturing.pdf, Dec 2014. i.5 IIC website, http:/www.industrialinternetconsortium.org/. i.6 IIC document Engineering: The First Steps, Sep 2014. i.7 IIC report Engineering Update: November 20

27、14, Nov 2014. i.8 IEEE P2413 website, http:/grouper.ieee.org/groups/2413/. i.9 IEEE P2413 presentation Standard for an Architectural Framework for the Internet of Things (IoT), Sep 2014. i.10 IEEE P2413 report oneM2M Specification Comment Collection, Oct 2014. i.11 SMLC website, https:/smartmanufact

28、uringcoalition.org/. ETSI ETSI TR 118 518 V2.0.0 (2016-09) 7oneM2M TR-0018 version 2.0.0 Release 2i.12 SMLC presentation, March 2014. NOTE: Available at https:/smartmanufacturingcoalition.org/sites/default/files/savannah_rivers_03-10-2014.pdf. i.13 Article “First European testbed for the Industrial

29、Internet Consortium“ in Boschs ConnectedWorld Blog http:/blog.bosch- i.14 ETSI TS 118 102: “oneM2M; Requirements (oneM2M TS-0002)“. i.15 ETSI TS 118 101: “oneM2M; Functional Architecture (oneM2M TS-0001)“. i.16 IEC 62443 series: “Industrial communication networks - Network and system security“. i.17

30、 ETSI TS 118 103: “ oneM2M; Security Solutions (oneM2M TS-0003)“. i.18 NIST Special Publications (SP)800-57: “Guidelines for Derived Personal Identity Verification (PIV) Credentials“. i.19 Draft Recommendation ITU-T X.iotsec-1: “Simple encryption procedure for Internet of Things (IoT) environments“.

31、 i.20 ETSI TR 118 518: “oneM2M; Industrial Domain Enablement (oneM2M TR-0018)“. i.21 IEC TC 65: “Industrial-process measurement, control and automation“. i.22 Reference Architecture Model Industrie 4.0 (RAMI4.0), July 2015. NOTE: Available at https:/www.vdi.de/fileadmin/vdi_de/redakteur_dateien/gma_

32、dateien/5305_Publikation_GMA_Status_Report_ZVEI_Reference_Architecture_Model.pdf 3 Abbreviations For the purposes of the present document, the terms and definitions given in ETSI TS 118 111 i.2 and the following apply. A term defined in the present document takes precedence over the definition of th

33、e same term, if any, in i.2. ACP Access Control Policy AES Advanced Encryption Standard CR Change Request CSE Common Services Entity DCS Distributed Control Systems DMZ Demilitarized Zones DoS Denial of ServiceDSL Digital Subscriber Line DTLS Datagram Transport Layer Security FIPS Federal Informatio

34、n Processing StandardizationGPS Global Positioning System GSM Global System for Mobile Communication IACS Industrial Automation raw materials will be programmed to record standard process and their customer to realize automatic customization. Technical Keywords Representative use case areas include

35、connectivity, logistics, transportation, and healthcare. Key capabilities system characteristics including resilience, safety and security. (such as key system characteristic, intelligent and resilient control, operations support, connectivity, integration and orchestration, security, trust and priv

36、acy, and business viewpoint). Data management and analytics. Security: endpoint security, secure communications and security management and monitoring (currently focused on general security use case). ETSI ETSI TR 118 518 V2.0.0 (2016-09) 10oneM2M TR-0018 version 2.0.0 Release 2IEEE P2413 defines an

37、 architectural framework for the Internet of Things (IoT), which includes descriptions of various IoT domains including the industrial domain and is sponsored by the IEEE-SA i.8. Table 5.2-3: Industrial Domain Research in IEEE P2413 i.9 and i.10 Mission sensitive data includes such as: - Confidentia

38、l commercial secrets (e.g. customer information, intellectual properties, etc.). - Confidential data from infrastructure manufacturers (e.g. waveform data to diagnose, which is collected from devices in the power grid). - Data for industrial control systems (including filed bus, SCADA/Supervisory Co

39、ntrol And Data Acquisition, controllers as PLC or DCS. - Keys transmitted for encryption algorithms. Normal data: encryption is recommended (optional) and proper applicable schemes should be adopted which are dependent on the capabilities of the devices; normal data includes such as: - Status data f

40、or product line and device monitoring (e.g. device availability) in normal products manufacture which do not include any commercial secrets. - Data for human resources monitoring and employee performance assessment (e.g. GPS information of workers collected from carried mobile tablets). When various

41、 levels of application data in industrial domain is encrypted /decrypted based on its associated encryption scheme, the essential data is secured and the loads caused by normal data encryption are acceptable for constrained devices. 6.6.2 Source REQ-2015-0603R03: Data encryption in industrial domain

42、. 6.6.3 Actors M2M Device: Machines, sensors, controllers etc. located in factories which measure and generate data. PLC /DCS control machines and sensors in production lines according to embedded programs. Intra-factory Network: In this use case, the intra-factory network is assumedg3to be managed

43、by factory owners (different from the Underlying Network operated by external parties). oneM2M MN: The MN collects data from the intra-factory network and sends the data to the oneM2M services platform through underlying network. oneM2M Services Platform: Support secure data transmission and mapping

44、 of application data levels to applicable encryption schemes. oneM2M Application: Classify data based on sensitivity. ETSI ETSI TR 118 518 V2.0.0 (2016-09) 25oneM2M TR-0018 version 2.0.0 Release 26.6.4 Pre-conditions The oneM2M Services Platform and security CSE inside M2M devices/MNs support variou

45、s application data levels and mapping these levels to applicable encryption schemes. 6.6.5 Normal Flow 1) The M2M application classifies data into various levels (e.g. into sensitive data and normal data). 2) The oneM2M Services Platform or security CSE inside M2M devices/MNs maps these levels to ap

46、plicable encryption schemes. 3) Each pair of transmitter and receiver performs preparation procedure (e.g. share symmetric key and store it in respective storage inside nodes) before sending encrypted data. 4) The transmitter (e.g. a server located at one end of the application) prepares the data fo

47、r sending; encrypts the data based on its associated security level (with respective encryption algorithm, key length etc.). 5) The encrypted data is sent to the receiver through intra-factory network and public underlying networks. 6) The receiver (e.g. a machine located at the other end of the app

48、lication) receives the data from transmitter and decrypts the data. 6.6.6 Post-conditions The M2M application utilizes the decrypted data for smart manufacturing, such as executing orders, monitoring devices and diagnosis, monitoring workers location, etc. ETSI ETSI TR 118 518 V2.0.0 (2016-09) 26one

49、M2M TR-0018 version 2.0.0 Release 26.6.7 High Level Illustration Figure 6.6.7-1: High-level Illustration of Real Time Data Collection 6.6.8 Potential Requirements 1) The oneM2M system shall support classification of application data by oneM2M applications into various security levels that are specified by oneM2M and support the mapping of these levels to applicable security capabilities. 6.7

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1