diff options
Diffstat (limited to 'doc/rfc/rfc6574.txt')
-rw-r--r-- | doc/rfc/rfc6574.txt | 1795 |
1 files changed, 1795 insertions, 0 deletions
diff --git a/doc/rfc/rfc6574.txt b/doc/rfc/rfc6574.txt new file mode 100644 index 0000000..f6dde35 --- /dev/null +++ b/doc/rfc/rfc6574.txt @@ -0,0 +1,1795 @@ + + + + + + +Internet Architecture Board (IAB) H. Tschofenig +Request for Comments: 6574 J. Arkko +Category: Informational April 2012 +ISSN: 2070-1721 + + + Report from the Smart Object Workshop + +Abstract + + This document provides an overview of a workshop held by the Internet + Architecture Board (IAB) on 'Interconnecting Smart Objects with the + Internet'. The workshop took place in Prague on 25 March 2011. The + main goal of the workshop was to solicit feedback from the wider + community on their experience with deploying IETF protocols in + constrained environments. This report summarizes the discussions and + lists the conclusions and recommendations to the Internet Engineering + Task Force (IETF) community. + + Note that this document is a report on the proceedings of the + workshop. The views and positions documented in this report are + those of the workshop participants and do not necessarily reflect IAB + views and positions. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Architecture Board (IAB) + and represents information that the IAB has deemed valuable to + provide for permanent record. Documents approved for publication by + the IAB are not a candidate for any level of Internet Standard; see + Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6574. + + + + + + + + + + + + + +Tschofenig & Arkko Informational [Page 1] + +RFC 6574 Smart Object Workshop Report April 2012 + + +Copyright Notice + + Copyright (c) 2012 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Constrained Nodes and Networks . . . . . . . . . . . . . . . . 5 + 3. Workshop Structure . . . . . . . . . . . . . . . . . . . . . . 6 + 3.1. Architecture . . . . . . . . . . . . . . . . . . . . . . . 6 + 3.1.1. One Internet vs. Islands . . . . . . . . . . . . . . . 6 + 3.1.2. Domain-Specific Stacks and Profiles . . . . . . . . . 8 + 3.1.3. Which Layer? . . . . . . . . . . . . . . . . . . . . . 9 + 3.2. Sleeping Nodes . . . . . . . . . . . . . . . . . . . . . . 10 + 3.3. Security . . . . . . . . . . . . . . . . . . . . . . . . . 13 + 3.4. Routing . . . . . . . . . . . . . . . . . . . . . . . . . 14 + 4. Conclusions and Next Steps . . . . . . . . . . . . . . . . . . 16 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 19 + 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 20 + 7. Informative References . . . . . . . . . . . . . . . . . . . . 20 + Appendix A. Program Committee . . . . . . . . . . . . . . . . . . 25 + Appendix B. Workshop Materials . . . . . . . . . . . . . . . . . 25 + Appendix C. Accepted Position Papers . . . . . . . . . . . . . . 25 + Appendix D. Workshop Participants . . . . . . . . . . . . . . . . 30 + Appendix E. IAB Members at the Time of Approval . . . . . . . . . 32 + + + + + + + + + + + + + + + + + + +Tschofenig & Arkko Informational [Page 2] + +RFC 6574 Smart Object Workshop Report April 2012 + + +1. Introduction + + The Internet Architecture Board (IAB) holds occasional workshops + designed to consider long-term issues and strategies for the Internet + and to suggest future directions for the Internet architecture. This + long-term planning function of the IAB is complementary to the + ongoing engineering efforts performed by working groups of the + Internet Engineering Task Force (IETF), under the leadership of the + Internet Engineering Steering Group (IESG) and area directorates. + + Today's Internet is experienced by users as a set of applications, + such as email, instant messaging, and services on the Web. While + these applications do not require users to be present at the time of + service execution, in many cases they are. There are also + substantial differences in performance among the various end devices, + but in general end devices participating in the Internet are + considered to have high performance. + + There are, however, a large number of deployed embedded devices, and + there is substantial value in interconnecting them with the Internet. + The term "Internet of Things" denotes a trend where a large number of + devices employ communication services offered by the Internet + protocols. Many of these devices are not directly operated by + humans, but exist as components in buildings or vehicles, or are + spread out in the environment. There is a large variation in the + computing power, available memory, (electrical) power, and + communications bandwidth between different types of devices. + + Many of these devices offer a range of new possibilities or provide + additional value for previously unconnected devices. Some devices + have been connected using proprietary communication networks in the + past but are now migrating to the use of the Internet Protocol suite + in order to share the same communication network between all + applications and to enable rich communications services. + + Much of this development can simply run on existing Internet + protocols. For instance, home entertainment and monitoring systems + often offer a Web interface to the end user. In many cases the new, + constrained environments can benefit from additional protocols and + protocol extensions that help optimize the communications and lower + the computational requirements. Examples of currently ongoing + standardization efforts targeted for these environments include the + Constrained RESTful Environments (CoRE), IPv6 over Low power WPAN + (6LoWPAN), Routing Over Low power and Lossy networks (ROLL), and the + Light-Weight Implementation Guidance (LWIG) working groups of the + IETF. + + + + + +Tschofenig & Arkko Informational [Page 3] + +RFC 6574 Smart Object Workshop Report April 2012 + + + This workshop explored the experiences of researchers and developers + when considering the characteristics of constrained devices. + Engineers know that many design considerations need to be taken into + account when developing protocols and architecture. Balancing + between the conflicting goals of code size, economic incentives, + power consumption, usability, and security is often difficult, as + illustrated by Clark et al. in "Tussle in Cyberspace: Defining + Tomorrow's Internet" [Tussle]. + + Participants at the workshop discussed the experience and approaches + taken when designing protocols and architectures for interconnecting + smart objects to the Internet. The scope of the investigations + included constrained nodes as well as constrained networks. + + The call for position papers suggested investigating the area of + integration with the Internet in the following categories: + + o Scalability + + o Power efficiency + + o Interworking between different technologies and network domains + + o Usability and manageability + + o Security and privacy + + The goals of the workshop can be summarized as follows: + + As many deployed smart objects demonstrate, running protocols like + the Internet Protocol Version 4 [RFC0791] and Version 6 [RFC2460], + the User Datagram Protocol (UDP) [RFC0768], the Transmission + Control Protocol (TCP) [RFC0793], the Hypertext Transfer Protocol + (HTTP) [RFC2616], etc., on constrained devices is clearly + possible. Still, protocol designers, system architects, and + developers have to keep various limitations in mind. The + organizers were interested to discuss the experience with + deploying IETF protocols in different constrained environments. + + Furthermore, the organizers were seeking to identify issues either + where current implementers do not yet have solutions or where + researchers predict potential issues. + + The workshop served as a venue to identify problems and to + discover common interests that may turn into new work or into + changes in direction of already ongoing work at the IETF and or + the Internet Research Task Force (IRTF). + + + + +Tschofenig & Arkko Informational [Page 4] + +RFC 6574 Smart Object Workshop Report April 2012 + + +2. Constrained Nodes and Networks + + The workshop was spurred by the increasing presence of constrained + devices on the network. It is quite natural to ask how these + limitations impact the design of the affected nodes. Note that not + all nodes suffer from the same set of limitations. + + Energy constraints: + + Since wireless communication can be a large portion of the power + budget for wireless devices, reducing unnecessary communication + can significantly increase the battery life of a low-end device. + The choice of low-power radio can also significantly impact the + overall energy consumption, as can sleeping periodically, when the + device is not in use. In some cases, these nodes will only wake + periodically to handle needed communications. This constraint is + quite in contrast to the "always on" paradigm found in regular + Internet hosts. Even in the case of non-battery operated devices, + power is a constraint with respect to energy efficiency goals. + + Bandwidth constraints: + + Various low-power radio networks offer only limited bandwidth, and + show high packet loss as well as high link quality variability. + The data transmission rates vary from 20 to 900 kilobits per + second (e.g., in the case of IEEE 802.15.4). Nodes may be used in + usually highly unstable radio environments. The physical-layer + packet size may be limited (~100 bytes). + + Memory constraints: + + The amount of volatile and persistent storage impacts the program + execution and has important implications for the functionality of + the protocol stack. The Arduino UNO board, for example, provides + a developer with 2 KB RAM and 32 KB flash memory (without any + extensions, such as microSD cards). + + A system designer also needs to consider CPU constraints, which often + relate to energy constraints: a processor with lower performance + consumes less energy. As described later in this document, the + design of the mainboard may allow certain components to be put to + sleep to further lower energy consumption. In general, embedded + systems are often purpose built with only the hardware components + needed for the given task, while general-purpose personal computers + are less constrained with regard to their mainboard layout and + typically offer a huge number of optional plug-in peripherals to be + connected. A factor that also has to be taken into consideration is + the intended usage environment. For example, a humidity sensor + + + +Tschofenig & Arkko Informational [Page 5] + +RFC 6574 Smart Object Workshop Report April 2012 + + + deployed outside a building may need to deal with temperatures from + -50 degrees C to +85 degrees C. There are often physical size + limitations for smart objects. While traditional mainboards are + rather large, such as the Advanced Technology eXtended (ATX) design + with a board size of 305 x 244 mm available in many PCs or the mini- + ITX design typically found in home theater PCs with 170 x 170 mm, + mainboard layouts for embedded systems are typically much smaller, + such as the CoreExpress layout with 58 x 65 mm, or even smaller. In + addition to the plain mainboard, additional sensors, peripherals, a + power adapter/battery, and a case have to be taken into + consideration. Finally, there are cost restrictions as well. + + The situation becomes more challenging when not only the hosts are + constrained but also the network nodes themselves. + + While there are constantly improvements being made, Moore's law tends + to be less effective in the embedded system space than in personal + computing devices: gains made available by increases in transistor + count and density are more likely to be invested in reductions of + cost and power requirements than into continual increases in + computing power. + +3. Workshop Structure + + With the ongoing work on connecting smart objects to the Internet, + there are many challenges the workshop participants raised in more + than 70 accepted position papers. With a single workshop day, + discussions had to be focused, and priority was given to those topics + that had been raised by many authors. A summary of the identified + issues are captured in the subsections below. + +3.1. Architecture + + A number of architectural questions were brought up in the workshop. + This is natural, as the architectural choices affect the required + technical solutions and the need for standards. At this workshop, + questions regarding the separation of traffic, the need for profiling + for application-specific domains, the demand for data-model-specific + standardization, as well as the design choices regarding the layer at + which functionality should be put were discussed and are briefly + summarized below. + +3.1.1. One Internet vs. Islands + + Devices that used to be in proprietary or application-specific + networks are today migrating to IP networks. There is, however, the + question of whether these smart objects are now on the same IP + network as any other application. Controlled applications, like the + + + +Tschofenig & Arkko Informational [Page 6] + +RFC 6574 Smart Object Workshop Report April 2012 + + + fountains in front of the Bellagio hotel in Las Vegas that are + operated as a distributed control system [Dolin], probably are not + exchanging their control messages over the same network that is also + used by hotel guests for their Internet traffic. The same had been + argued for smart grids, which are described as follows in + [SmartGrid]: + + A smart grid is a digitally enabled electrical grid that gathers, + distributes, and acts on information about the behavior of all + participants (suppliers and consumers) in order to improve the + efficiency, reliability, economics, and sustainability of + electricity services. + + The question that was raised during the workshop is, therefore, in + what sense are we talking about one Internet or about using IP + technology for a separate, "walled garden" network that is + independent of the Internet? + + Cullen Jennings compared the current state of smart object deployment + with the evolution of Voice over IP (VoIP): "Initially, many vendors + recommended to run VoIP over a separate VLAN or a separate + infrastructure. Nobody could imagine how to make the type of real- + time guarantees, how to debug it, and how to get it to work because + the Internet is not ideally suited for making any types of guarantees + for real-time systems. As time went on, people got better at making + voice work across that type of IP network. They suddenly noticed + that having voice running on a separate virtual network than their + other applications was a disaster. They couldn't decide if a PC was + running a softphone and whether it went on a voice or a data network. + At that point, people realized that they needed a converged network + and all moved to one. I wouldn't be surprised to see the same happen + here. Initially, we will see very separated networks. Then, those + will be running over the same hardware to take advantage of the cost + benefits of not having to deploy multiple sets of wires around + buildings. Over time, there will be strong needs to directly + communicate with each other. We need to be designing the system for + the long run. Assume everything will end up on the same network even + if you initially plan to run it in separate networks." + + It is clearly possible to let sensors in a building communicate + through the wireless access points and through the same + infrastructure used for Internet access, if you want to. Those who + want separation at the physical layer can do so as well. What is + important is to make sure that these different deployment + philosophies do not force loss of interoperability. + + + + + + +Tschofenig & Arkko Informational [Page 7] + +RFC 6574 Smart Object Workshop Report April 2012 + + + The level of interoperability that IP accomplished fostered + innovation at the application layer. Ralph Droms reinforced this + message by saying: "Bright people will take a phone, build an + application and connect it, with the appropriate security controls in + place, to the things in my house in ways we have never thought about + before. Otherwise, we are just building another telephone network." + +3.1.2. Domain-Specific Stacks and Profiles + + Imagine a building network scenario where a new light bulb is + installed that should, out of the box without further configuration, + interoperate with the already present light switch from a different + vendor in the room. For many, this is the desired level of + interoperability in the area of smart object design. To accomplish + this level of interoperability, it is not sufficient to provide + interoperability only at the network layer. Even running the same + transport protocol and application-layer protocol (e.g., HTTP) is + insufficient since both devices need to understand the semantics of + the payloads for "Turn the light on" as well. + + Standardizing the entire protocol stack for this specific "light + switch / light bulb" scenario is possible. A possible stack would, + for example, use IPv6 with a specific address configuration mechanism + (such as stateless address autoconfiguration), a network access + authentication security mechanism such as Protocol for carrying + Authentication for Network Access (PANA) [RFC5191], a service + discovery mechanism (e.g., multicast DNS with DNS-Based Service + Discovery [DNS-SD]), an application-layer protocol, for example, + Constrained Application Protocol (CoAP) [CoAP] (which uses UDP), and + the syntax and semantic for the light on/off functionality. + + As this list shows, there is already some amount of protocol + functionality that has to be agreed on by various stakeholders to + make this scenario work seamlessly. As we approach more complex + protocol interactions, the functionality quickly becomes more + complex: IPv4 and IPv6 on the network layer, various options at the + transport layer (such as UDP, TCP, the Stream Control Transmission + Protocol (SCTP) [RFC4960], and the Datagram Congestion Control + Protocol (DCCP) [RFC4340]), and there are plenty of choices at the + application layer with respect to communication protocols, data + formats and data models. Different requirements have led to the + development of a variety of communication protocols: client-server + protocols in the style of the original HTTP, publish-subscribe + protocols (like the Session Initiation Protocol (SIP) [RFC3261] or + Extensible Messaging and Presence Protocol (XMPP) [RFC6121]), and + store-and-forward messaging (borrowed from the delay tolerant + + + + + +Tschofenig & Arkko Informational [Page 8] + +RFC 6574 Smart Object Workshop Report April 2012 + + + networking community). Along with the different application-layer + communication protocols come various identity and security + mechanisms. + + With the smart object constraints, it feels natural to develop these + stacks since each application domain (e.g., healthcare, smart grids, + building networking) will have their unique requirements and their + own community involved in the design process. How likely are these + profiles going to be the right match for the future, specifically for + the new innovations that will come? How many of these stacks are we + going to have? Will the differences in the profiles purely be the + result of different requirements coming from the individual + application domains or will these mismatches reflect the spirit, + understanding, and preferences of the community designing them? How + many stacks will multipurpose devices have to implement? + + Standardizing profiles independently for each application is not the + only option. Another option is to let many different applications + utilize a common foundation, i.e., a protocol stack that is + implemented and utilized by every device. This, however, requires + various application domains to be analyzed for their common + characteristics and to identify requirements that are common across + all of them. The level of difficulty for finding an agreement of how + such a foundation stack should look depends on how many layers it + covers and how lightweight it has to be. + + From the discussions at the workshop, it was clear that the available + options are not ideal and further discussions are needed. + +3.1.3. Which Layer? + + The end-to-end principle states that functionality should be put into + the end points instead of into the networks. An additional + recommendation, which is equally important, is to put functionality + higher up in the protocol stack. While it is useful to make common + functionality available as building blocks to higher layers, the wide + range of requirements by different applications led to a model where + lower layers provide only very basic functionality and more + sophisticated features were made available by various applications. + Still, there has been the desire to put application-layer + functionality into the lower layers of the networking stack. A + common belief is that performance benefits can be gained if + functionality is placed at the lower layers of the protocol stack. + This new functionality may be offered in the form of a gateway, which + bridges different communication technologies, acts on behalf of other + nodes, and offers more generic functionality (such as name-based + routing and caching). + + + + +Tschofenig & Arkko Informational [Page 9] + +RFC 6574 Smart Object Workshop Report April 2012 + + + Two examples of functionality offered at the network layer and + discussed during the workshops were location and name-based routing: + + Location: + + The notion of location gives each network node the understanding + of proximity (e.g., 'I am a light bulb and in the same room as the + light switch.'). Today, a router may provide information as to + whether other nodes belong to the same subnet or they may provide + location information (for example, in the form of GPS-based + coordinates). However, providing a sense of the specific + environment (e.g., a room, building, campus, etc.) is not possible + without manual configuration. While it has been a desirable + feature for many ubiquitous computing applications to know this + type of information and to use it for richer application-layer + interactions, widespread deployment has not happened yet. + + + Name-Based Routing: + + With the work on recent "clean slate" architecture proposals, such + as named data networking, flexible naming concepts are being + researched to allow application developers to express their + application-layer concepts in a way that they can be used natively + by the underlying networking stack without translation. For + example, Jeff Burke provided the example of his work in a theater + with a distributed control system of technical equipment (such as + projectors, dimmers, and light systems). Application developers + name their equipment with human-readable identifiers, which may + change after the end of a rehearsal, and address them using these + names. These naming concepts based on variable-length strings + raise questions regarding scalability. + + The workshop participants were not able to come to an agreement about + what functionality should be moved from the application layer to the + network layer. + +3.2. Sleeping Nodes + + One limitation of smart objects is their available energy. To extend + battery life, for example, of a watch battery or single AAA battery + for months, these low-power devices have to sleep 99% to 99.5% of + their time. For example, a light sensor may only wake up to check + whether it is nighttime to turn on light bulbs. Most parts of the + system, particularly communication components, are put into a + sleeping state (e.g., WLAN radio interface) and selected components, + + + + + +Tschofenig & Arkko Informational [Page 10] + +RFC 6574 Smart Object Workshop Report April 2012 + + + such as sensors, periodically check for relevant events and, if + necessary, turn on other hardware modules. Every bit is precious, as + is every round trip and every millisecond of radio activity. + + Many IETF protocols are implicitly designed to be always on, i.e., + the protocol implementation waits for and reacts to incoming + messages, and may maintain session state (at various layers of the + stack). These protocols work well when energy consumption is not a + concern and when receiving and sending messages happen at a low cost. + It should be understood that energy is consumed both in transmitting + messages (and often more importantly) in keeping the receiver awake. + Allowing devices to sleep most of the time preserves energy but + creates challenges for protocol designs. + + The inherent issue encountered by a stationary node resuming from + sleep is that another node may have chosen the same address while the + node was asleep. A number of steps have to be taken before sending a + packet. A new address may have to be obtained, for example using the + Dynamic Host Configuration Protocol (DHCP) or stateless address + autoconfiguration. Optionally, Detecting Network Attachment (DNA) + procedures (see [RFC4436] and [RFC6059]) can be used to shorten the + setup time by noticing that the node is using the same default + gateway. + + The issue with a mobile node that is sleeping is that the node may + have been moved to another network (e.g., a sleeping laptop being + transported to a new environment) where on resumption it may discover + that its address has become invalid. + + The following design considerations should be taken into account when + energy efficiency is a concern: + + 1. Rethink the Always-On Assumption + + When designing a protocol that assumes that the nodes are always + on, alternatives need to be considered. This could involve + eliminating functionality (e.g., not implementing DNA or + duplicate address detection) or considering the use of a sleep + proxy. While sleep proxies (e.g., proxZzzy(TM) [proxZzzy]) + enable periodic messages to be sent on behalf of sleeping nodes, + this approach assumes that energy management constraints do not + apply to the sleep proxy, which may not always be the case (e.g., + if the entire network is deployed in the field without access to + power). Yet another option is for devices to explicitly + communicate sleep cycles so that they can only check for messages + periodically (be it measured in milliseconds, seconds, or hours). + + + + + +Tschofenig & Arkko Informational [Page 11] + +RFC 6574 Smart Object Workshop Report April 2012 + + + This is the approach taken in IEEE 802.11, which supports + multiple energy conservation mechanisms designed to enable a + station to spend a large fraction of the time sleeping. + + 2. Reduce Network Attachment Costs + + As noted above, the procedures for obtaining an address and + assuring its uniqueness can be costly. In a network where nodes + spend a large fraction of the time sleeping, but are not + necessarily mobile, are all of these procedures really necessary? + + Can we find ways to reduce the number of protocol interactions + without sacrificing correctness? The main focus of past + investigations has been on IPv6 and ND, but other protocols do + also deserve a deeper investigation, such as DNS and DHCP. + + 3. Avoid Verbose Protocols + + Protocols involving multiple roundtrips and/or lengthy messages + with verbose encodings (e.g., XML) are not always well-suited for + constrained environments. Low-power nodes utilizing verbose + protocols have to use more energy in sending messages and have to + stay powered on for a longer period of time as they wait for the + multi-roundtrip protocol exchanges to complete. + + The best way to address these problems is to ensure that the + simplest possible protocol exchanges are used when the protocols + in question are designed. In some cases, alternative encoding + formats and compression may also help. + + 4. Think about System-Wide Efficiency + + While energy efficiency is critical for low-power devices running + on batteries, it is also beneficial for other devices as well, + including notebook computers, desktop computers, and smartphones. + However, if the goal is energy efficiency as opposed to battery + life extension for low-power devices, then it is important to + consider the total energy consumption of all the elements of the + system. + + For example, consider energy consumption in a home environment. + In these scenarios it is important to evaluate the energy usage + of the entire system. A light bulb utilizing Internet technology + described in this document may use less power but there is also + the device that controls the bulb that may consume a lot of + energy. If the goal is to reduce overall energy usage, then it + is important to consider these two devices (and potentially many + others) together. + + + +Tschofenig & Arkko Informational [Page 12] + +RFC 6574 Smart Object Workshop Report April 2012 + + +3.3. Security + + In the development of smart object applications, as with any other + protocol application solution, security has to be considered early in + the design process. As such, the recommendations currently provided + to IETF protocol architects, such as RFC 3552 [RFC3552] and RFC 4101 + [RFC4101], apply also to the smart object space. + + While there are additional constraints, as described in Section 2, + security has to be a mandatory part of the solution. The hope is + that this will lead to implementations that provide security + features, deployments that utilize them, and finally use of better + security mechanisms. It is important to point out that the lack of + direct user interaction will place hard requirements on deployment + models, configuration mechanisms, and software upgrade / + crypto-agility mechanisms. + + Since many of the security mechanisms allow for customization, + particularly with regard to the cryptographic primitives utilized, + many believe that IETF security solutions are usable without + modifications in a large part of the smart object domain. Others + call for new work on cryptographic primitives that make use of a + single primitive (such as the Advanced Encryption Standard (AES) + [AES]) as a building block for all cryptographic functions. The + benefit would be a smaller footprint of the overall solution, + specifically with respect to hardware limitations (e.g., the hardware + architecture of certain embedded devices prevents pipelining from + being used). In the excitement for new work on optimizations of + cryptographic primitives, other factors have to be taken into + consideration that influence successful deployment, such as + widespread support in libraries, as well as intellectual property + rights (IPR). As an example of the latter aspect, the struggle of + Elliptic Curve Cryptography (ECC)-based cryptographic algorithms + [ECC] to find deployment can partially be attributed to its IPR + situation. The reuse of libraries providing cryptographic functions + is clearly an important way to use available memory resources in a + more efficient way. To deal with the performance and footprint + concerns, investigations into offloading certain resource-hungry + functions to parties that possess more cryptographic power have been + considered. For example, the ability to delegate certificate + validation to servers has been standardized in the IETF before, for + the support of the Online Certificate Status Protocol (OCSP) in the + Internet Key Exchange protocol version 2 (IKEv2) and in Transport + Layer Security (TLS); see [RFC4806] and [RFC5246], respectively. + + Focusing only on the cryptographic primitives would be shortsighted; + many would argue that this is the easy part of a smart object + security solution. Key management and credential enrollment, + + + +Tschofenig & Arkko Informational [Page 13] + +RFC 6574 Smart Object Workshop Report April 2012 + + + however, are considered a big challenge by many, particularly when + usability requirements have to be taken into account. Another group + of challenges concern privacy; with smart grids, for example, some + have voiced concerns regarding the ability of third parties to keep + track of an individual's energy consumption (and draw associated + conclusions). As another example, it is easy to see how a scale that + is connected to the Internet for uploading weight information to a + social network could lead to privacy concerns. While security + mechanisms that are used to offer protection of the communication + between different parties also provide a certain degree of privacy + protection, they are clearly not enough to address all concerns. + Even with the best communication security and access control + mechanisms in place, one still needs additional safeguards against + the concerns mentioned in the examples. + + While better deployment of security protocols on the entire Internet + would be very desirable, practical considerations regarding usability + and the incentives of the stakeholders involved have often lead to + slower adoption. + +3.4. Routing + + A smart object network environment may also employ routers under + similar constraints as the end devices. Currently two approaches to + routing in these low-power and lossy networks are under consideration + -- namely, mesh-under and route-over. The so-called "mesh-under" + approach places routing functions at the link layer, and consequently + all devices appear as immediate neighbors at the network layer. With + the "route-over" approach, routing is done in the IP layer and not at + all in the link layer. Each physical hop appears as a single IP hop + (ignoring devices that just extend the physical range of signaling, + such as repeaters). Routing in this context means running a routing + protocol. The IPv6 Routing Protocol for Low-power and Lossy Networks + (RPL) [RPL], for example, belongs to the route-over category. + + From an architectural point of view there are several questions that + arise from where routing is provided, for example: + + o Protocols often assume that link characteristics are predictable + when communicating with any device attached to the same link. + Latency, throughput, and reliability may vary considerably between + different devices that are multiple link-layer hops away. What + timeout should be used? What happens if a device is unreachable? + In case of default router selection, two advertised routers may be + a different number of hops away. Should a device have visibility + into the path to make a decision, and what path characteristics + would be useful to have? + + + + +Tschofenig & Arkko Informational [Page 14] + +RFC 6574 Smart Object Workshop Report April 2012 + + + o Scoped message delivery to a neighboring IP hop (via link-local + addressing) allows certain types of IP protocols to communicate + with their immediate neighbors and to therefore scope their + recipients. A link-local multicast message will be received by + all nodes in the same IP link-local realm unless some special + optimizations are provided by the link layer. + + o When path computations are done at the link layer as well as on + the network layer, then what coordination needs to take place? + + When multiple different link-layer technologies are involved in a + network design, routing at layer 3 has to be provided in any case. + [IoT-ARCH] talks about these tradeoffs between route-over and mesh- + under in detail. Furthermore, those who decide about the deployment + have to determine how to connect smart objects to the Internet + infrastructure, and a number of wired and wireless technologies may + be suitable for a specific deployment. Depending on the chosen + technologies the above-mentioned mesh-under vs. route-over approach + will have to be decided, and further decisions will have to be made + about the choice of a specific routing protocol. + + In 2008, the IETF formed the Routing Over Low power and Lossy + networks (ROLL) working group to specify a routing solution for smart + object environments. During its first year of existence, the working + group studied routing requirements in detail (see [RFC5867], + [RFC5826], [RFC5673], and [RFC5548]), and it worked on a protocol + survey comparing a number of existing routing protocols, including Ad + hoc On-Demand Distance Vector (AODV)-style protocols [RFC3561], + against the identified requirements. The protocol survey + [PROT-SURVEY] was inconclusive and abandoned without giving rise to + publication of an RFC. + + The ROLL WG concluded that a new routing protocol satisfying the + documented requirements has to be developed and the work on RPL was + started as the IETF routing protocol for smart object networks. + Nevertheless, controversial discussions at the workshop about which + routing protocols is best in a given environment are still ongoing. + Thomas Clausen, for example, argued for using an AODV-like routing + protocol in [Clausen]. + + + + + + + + + + + + +Tschofenig & Arkko Informational [Page 15] + +RFC 6574 Smart Object Workshop Report April 2012 + + +4. Conclusions and Next Steps + + The workshop allowed the participants to be exposed to interesting + applications and their requirements (buildings, fountains, theater, + etc.), to have discussions about radically different architectures + and their issues (e.g., information centric networking), to look at + existing technology from a new angle (sleeping nodes, energy + consumption), to focus on some details of the protocol stack + (neighbor discovery, security, routing) and to learn about + implementation experience. + + One goal of the workshop was to identify areas that require further + investigation. The list below reflects the thoughts of the workshop + participants as expressed on the day of the workshop. Note that the + suggested items concern potential work by the IETF and the IRTF, and + the order does not imply a particular preference. + + Security: + + A discussion of security is provided in Section 3.3. In general, + security-related protocol exchanges and the required amount of + computational resource requirements can contribute significantly + to the overall processing. Therefore, it remains a challenge to + accomplish performance improvements without sacrificing the + overall security level, taking the usability of the entire system + into consideration. + + Another challenge is how to balance the security and performance + needs of smart objects with the interoperability requirements of + hosts on the Internet since different suites of algorithms tend to + be chosen for these different environments. This involves trade- + offs between performance on the smart objects versus end-to-end + security. Solutions that mandate a "trusted" middlebox whose only + role is to terminate security associations tend to be frowned upon + from the security perspective, especially since end users of + challenged devices (where those exist) are unlikely to understand + the security consequences of such middleboxes. + + The discussion concluded with the following recommendations: + + * Investigate usability in cryptographic protocol design with + regard to credential management. As an example, the Bluetooth + pairing mechanism was mentioned as a simple and yet reasonably + secure method of introducing devices into a new environment. + In fact, the IETF working group Credential and Provisioning + (ENROLL) was established years ago to deal with residential + + + + + +Tschofenig & Arkko Informational [Page 16] + +RFC 6574 Smart Object Workshop Report April 2012 + + + networks but was terminated prematurely due to lack of + progress. The email archive still exists and is available + [ENROLL] and may provide useful historical information. + + * Standardized authentication and key exchange mechanisms should + be surveyed for suitability in smart object environments with + respect to message size, computational performance, number of + messages, code size, and main memory requirements. A starting + point of such an investigation (in the case of IKEv2) was + provided by Tero Kivinen with [MINIMAL-IKEv2], and a suitable + venue for discussion could be the recently established Light- + Weight Implementation Guidance (LWIG) working group [LWIG]. + + * Research has to be done in the area of lightweight + cryptographic primitives -- namely, block ciphers, stream + ciphers, and cryptographic hash functions. It's worthwhile to + mention the early work with the National Institute of Standards + and Technology (NIST) new cryptographic hash algorithm 'SHA-3' + competition [SHA3]. A suitable forum for discussion is the + IRTF Crypto Forum Research Group (CFRG) [CFRG]. + + The difficulty and impact of choosing specialized algorithms for + smart objects should not be underestimated. Issues that arise + include the additional specification complexity (e.g., TLS already + has hundreds of ciphersuites defined, most of which are unused in + practice), the long latency in terms of roll out (many hosts are + still using deprecated algorithms 5-10 years after those + algorithms were deprecated), and the barriers that IPR-encumbered + schemes present to widespread deployment. While research on this + topic within CFRG and the cryptographic research community is a + very worthwhile goal, any such algorithms will likely have to + offer very significant benefits before they will be broadly + adopted. 20% less CPU usage is unlikely to be a winning argument + no matter what an algorithm inventor believes. + + Energy Design Considerations: + + One part of the workshop was focused on the discussion of energy + implications for IETF protocol design with proposals being made + about how to extend protocols to better support nodes that are + mostly sleeping. Discussions are encouraged to take place on the + RECIPE mailing list [RECIPE]. The workshop position paper + [Wasserman] by Margaret Wasserman provides a good starting point + for further investigations. + + + + + + + +Tschofenig & Arkko Informational [Page 17] + +RFC 6574 Smart Object Workshop Report April 2012 + + + Information-/Content-Centric Networking: + + Information/Content Centric Networking is about accessing named + content, and a number of research projects have emerged around + this theme. At this point in time, the work is not yet ready for + standardization in the IETF. Instead, the formation of an IRTF + research group has been proposed, and more details are available + on the IRTF DISCUSS mailing list [irtf-discuss]. + + Architectural Guidelines: + + Participants suggested developing an architectural write-up about + what can be done with the IETF protocols we have today and how + these different elements may be combined to offer an explanation + for the broader community. This would be a task for the IAB. An + example of prior work that serves as input is [RFC6272]. + + Network Management: + + While this topic did not make it onto the workshop agenda, it was + considered useful to start a discussion about how to implement + network management protocols, such as Network Configuration + Protocol (NETCONF) [RFC6241], on smart objects. The following + position papers may be useful as a starting point for further + discussions: [Ersue] and [Schoenwaelder]. An IETF draft document + is also available: [SNMP-OPT]. + + Congestion Control: + + When smart objects transmit sensor readings to some server on the + Internet, these protocol interactions often carry a small amount + of data and happen infrequently, although regularly. With the + work on new application protocols, like CoAP [CoAP], the question + of whether a congestion control mechanism should be used at the + underlying transport protocol or by the application protocol + itself arises. [CoAP-CC] is a starting point for CoAP, but + further work is needed. + + Data Models: + + Standardization of application-layer protocols is important but + does not ensure that, for example, a light switch and a light bulb + are able to interact with each other. One area where participants + saw the need for further work was in the area of data models. + While prior IETF standardization work on, for example, location + [GEOPRIV] can be reused, the question was raised where the IETF + + + + + +Tschofenig & Arkko Informational [Page 18] + +RFC 6574 Smart Object Workshop Report April 2012 + + + should focus its standardization efforts since domain expertise in + each area will be needed. As a potential example, energy pricing + was discussed, with an example provided by [ENERGY-PRICING]. + + Building Networking: + + Network architectures in residential as well as commercial + buildings should take the presence of smart objects and dedicated + subnetworks focusing on smart objects into account. A new working + group, Home Networking (HOMENET) [HOMENET], was created after the + workshop to look at this topic. + + Discovery: + + Additional extensions to developed discovery protocols, such as + multicast DNS (mDNS), may be needed for the smart object + environment. For instance, the HOMENET working group wants to + extend current discovery protocols to work across multiple + subnets. Smart object networks are often organized in separate + subnets, so these extensions may be useful in that environment as + well. + + Routing: + + Changing radio conditions and link fluctuation may lead to the + need for renumbering. Workshop participants argued that work + should be started on the multi-link subnetworks to mitigate this + problem, i.e., to extend the notion of a subnet to be able to span + multiple links. With the publication of RFC 4903 [RFC4903], the + Internet Architecture Board had looked into this topic already and + provided pros and cons. + + The applicability of specific routing protocols designed for smart + object networks needs further investigation. The ROLL working + group is chartered with the task of constructing an applicability + document for RPL, for instance. + +5. Security Considerations + + The workshop discussions covered a range of potential engineering + activities, each with its own security considerations. As the IETF + community begins to pursue specific avenues arising out of this + workshop, addressing relevant security requirements will be crucial. + + As described in this report, part of the agenda was focused on the + discussion of security; see Section 3.3. + + + + + +Tschofenig & Arkko Informational [Page 19] + +RFC 6574 Smart Object Workshop Report April 2012 + + +6. Acknowledgements + + We would like to thank all the participants for their position + papers. The authors of the accepted position papers were invited to + the workshop. + + Big thanks to Elwyn Davies for helping us to fix language bugs. We + would also like to thank Andrei Robachevsky, Ulrich Herberg, Thomas + Clausen, Bruce Nordman, Alissa Cooper, Dave Thaler, Bernard Aboba, + and Henning Schulzrinne for their review comments. + + Additionally, we would like to thank Ericsson and Nokia Siemens + Networks for their financial support. + +7. Informative References + + [AES] Wikipedia, "Advanced Encryption Standard", + December 2011, <http://en.wikipedia.org/w/ + index.php?title=Advanced_Encryption_Standard& + oldid=481153988>. + + [CFRG] McGrew (Chair), D., "IRTF Crypto Forum Research + Group (CFRG)", June 2011, <http://irtf.org/cfrg>. + + [Clausen] Clausen, T. and U. Herberg, "Some Considerations on + Routing in Particular and Lossy Environments", IAB + Interconnecting Smart Objects with the Internet + Workshop, Prague, Czech Republic, March 2011, + <http://www.iab.org/wp-content/IAB-uploads/ + 2011/03/Herberg.pdf>. + + [CoAP] Shelby, Z., Hartke, K., Bormann, C., and B. Frank, + "Constrained Application Protocol (CoAP)", Work + in Progress, October 2011. + + [CoAP-CC] Eggert, L., "Congestion Control for the Constrained + Application Protocol (CoAP)", Work in Progress, + January 2011. + + [DNS-SD] Cheshire, S. and M. Krochmal, "DNS-Based Service + Discovery", Work in Progress, December 2011. + + [Dolin] Dolin, B., "Application Communications Requirements + for 'The Internet of Things'", IAB Interconnecting + Smart Objects with the Internet Workshop, Prague, + Czech Republic, March 2011, <http://www.iab.org/ + wp-content/IAB-uploads/2011/03/Dolin.pdf>. + + + + +Tschofenig & Arkko Informational [Page 20] + +RFC 6574 Smart Object Workshop Report April 2012 + + + [ECC] Wikipedia, "Elliptic Curve Cryptography", + December 2011, <http://en.wikipedia.org/w/ + index.php?title=Elliptic_curve_cryptography& + oldid=480053167>. + + [ENERGY-PRICING] Jennings, C. and B. Nordman, "Communication of + Energy Price Information", Work in Progress, + July 2011. + + [ENROLL] "The ietf-enroll Archives", + <http://mailman.mit.edu/pipermail/ietf-enroll/>. + + [Ersue] Ersue, M. and J. Korhonen, "Position Paper on + 'Interconnecting Smart Objects with the Internet'", + IAB Interconnecting Smart Objects with the Internet + Workshop, Prague, Czech Republic, February 2011, + <http://www.iab.org/wp-content/IAB-uploads/2011/03/ + Ersue.pdf>. + + [GEOPRIV] IETF, "Geographic Location/Privacy (geopriv) + Working Group", + <http://datatracker.ietf.org/wg/geopriv/>. + + [HOMENET] "Home Networking (homenet) Working Group", + <http://datatracker.ietf.org/wg/homenet>. + + [IoT-ARCH] Hui, J. and J. Vasseur, "Routing Architecture in + Low-Power and Lossy Networks (LLNs)", Work + in Progress, March 2011. + + [LWIG] IETF, "Light-Weight Implementation Guidance (lwig) + Working Group", June 2011, + <http://datatracker.ietf.org/wg/lwig/charter/>. + + [MINIMAL-IKEv2] Kivinen, T., "Minimal IKEv2", Work in Progress, + February 2011. + + [PROT-SURVEY] Tavakoli, A., Dawson-Haggerty, S., and P. Levis, + "Overview of Existing Routing Protocols for Low + Power and Lossy Networks", Work in Progress, + April 2009. + + [RECIPE] "Reducing Energy Consumption with Internet + Protocols Exploration (RECIPE) Mailing List", + <https://www.ietf.org/mailman/listinfo/recipe>. + + [RFC0768] Postel, J., "User Datagram Protocol", STD 6, + RFC 768, August 1980. + + + +Tschofenig & Arkko Informational [Page 21] + +RFC 6574 Smart Object Workshop Report April 2012 + + + [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC0793] Postel, J., "Transmission Control Protocol", STD 7, + RFC 793, September 1981. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, + Version 6 (IPv6) Specification", RFC 2460, + December 1998. + + [RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., + Masinter, L., Leach, P., and T. Berners-Lee, + "Hypertext Transfer Protocol -- HTTP/1.1", + RFC 2616, June 1999. + + [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., + Johnston, A., Peterson, J., Sparks, R., Handley, + M., and E. Schooler, "SIP: Session Initiation + Protocol", RFC 3261, June 2002. + + [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing + RFC Text on Security Considerations", BCP 72, + RFC 3552, July 2003. + + [RFC3561] Perkins, C., Belding-Royer, E., and S. Das, "Ad hoc + On-Demand Distance Vector (AODV) Routing", + RFC 3561, July 2003. + + [RFC4101] Rescorla, E. and IAB, "Writing Protocol Models", + RFC 4101, June 2005. + + [RFC4340] Kohler, E., Handley, M., and S. Floyd, "Datagram + Congestion Control Protocol (DCCP)", RFC 4340, + March 2006. + + [RFC4436] Aboba, B., Carlson, J., and S. Cheshire, "Detecting + Network Attachment in IPv4 (DNAv4)", RFC 4436, + March 2006. + + [RFC4806] Myers, M. and H. Tschofenig, "Online Certificate + Status Protocol (OCSP) Extensions to IKEv2", + RFC 4806, February 2007. + + [RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, + June 2007. + + [RFC4960] Stewart, R., "Stream Control Transmission + Protocol", RFC 4960, September 2007. + + + +Tschofenig & Arkko Informational [Page 22] + +RFC 6574 Smart Object Workshop Report April 2012 + + + [RFC5191] Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., + and A. Yegin, "Protocol for Carrying Authentication + for Network Access (PANA)", RFC 5191, May 2008. + + [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer + Security (TLS) Protocol Version 1.2", RFC 5246, + August 2008. + + [RFC5548] Dohler, M., Watteyne, T., Winter, T., and D. + Barthel, "Routing Requirements for Urban Low-Power + and Lossy Networks", RFC 5548, May 2009. + + [RFC5673] Pister, K., Thubert, P., Dwars, S., and T. Phinney, + "Industrial Routing Requirements in Low-Power and + Lossy Networks", RFC 5673, October 2009. + + [RFC5826] Brandt, A., Buron, J., and G. Porcu, "Home + Automation Routing Requirements in Low-Power and + Lossy Networks", RFC 5826, April 2010. + + [RFC5867] Martocci, J., De Mil, P., Riou, N., and W. + Vermeylen, "Building Automation Routing + Requirements in Low-Power and Lossy Networks", + RFC 5867, June 2010. + + [RFC6059] Krishnan, S. and G. Daley, "Simple Procedures for + Detecting Network Attachment in IPv6", RFC 6059, + November 2010. + + [RFC6121] Saint-Andre, P., "Extensible Messaging and Presence + Protocol (XMPP): Instant Messaging and Presence", + RFC 6121, March 2011. + + [RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J., and A. + Bierman, "Network Configuration Protocol + (NETCONF)", RFC 6241, June 2011. + + [RFC6272] Baker, F. and D. Meyer, "Internet Protocols for the + Smart Grid", RFC 6272, June 2011. + + [RPL] Brandt, A., Vasseur, J., Hui, J., Pister, K., + Thubert, P., Levis, P., Struik, R., Kelsey, R., + Clausen, T., and T. Winter, "RPL: IPv6 Routing + Protocol for Low-Power and Lossy Networks", Work + in Progress, March 2011. + + + + + + +Tschofenig & Arkko Informational [Page 23] + +RFC 6574 Smart Object Workshop Report April 2012 + + + [SHA3] NIST, "Cryptographic Hash Algorithm Competition", + December 2010, <http://csrc.nist.gov/groups/ST/ + hash/sha-3/index.html>. + + [SNMP-OPT] Schoenwaelder, J., Mukhtar, H., Joo, S., and K. + Kim, "SNMP Optimizations for Constrained Devices", + Work in Progress, October 2010. + + [Schoenwaelder] Schoenwaelder, J., Tsou, T., and B. Sarikaya, + "Protocol Profiles for Constrained Devices", IAB + Interconnecting Smart Objects with the Internet + Workshop, Prague, Czech Republic, February 2011, + <http://www.iab.org/wp-content/IAB-uploads/2011/03/ + Schoenwaelder.pdf>. + + [SmartGrid] Wikipedia, "Smart Grid", December 2011, + <http://en.wikipedia.org/w/ + index.php?title=Smart_grid&oldid=479750548>. + + [Tussle] Clark, D., Wroclawski, J., Sollins, K., and R. + Braden, "Tussle in Cyberspace: Defining Tomorrow's + Internet", In Proc. ACM SIGCOMM, 2002, + <http://conferences.sigcomm.org/sigcomm/2002/ + papers/tussle.html>. + + [Wasserman] Wasserman, M., "It's Not Easy Being 'Green'", IAB + Interconnecting Smart Objects with the Internet + Workshop, Prague, Czech Republic, March 2011, + <http://www.iab.org/wp-content/IAB-uploads/2011/03/ + Wasserman.pdf>. + + [irtf-discuss] Ohlman, B., "Draft ICN RG Charter", message to IRTF + DISCUSS Mailing List, May 2011, + <http://www.ietf.org/mail-archive/web/irtf-discuss/ + current/msg00041.html>. + + [proxZzzy] ECMA, "proxZzzy(TM) for sleeping hosts", + Standard ECMA-393, February 2010, + <http://www.ecma-international.org/publications/ + standards/Ecma-393.htm>. + + + + + + + + + + + +Tschofenig & Arkko Informational [Page 24] + +RFC 6574 Smart Object Workshop Report April 2012 + + +Appendix A. Program Committee + + The following persons are responsible for the organization of the + associated workshop and are responsible also for this event: Jari + Arkko, Hannes Tschofenig, Bernard Aboba, Carsten Bormann, David + Culler, Lars Eggert, JP. Vasseur, Stewart Bryant, Adrian Farrel, + Ralph Droms, Geoffrey Mulligan, Alexey Melnikov, Peter Saint-Andre, + Marcelo Bagnulo, Zach Shelby, Isidro Ballesteros Laso, Fred Baker, + Cullen Jennings, Manfred Hauswirth, and Lukas Kencl. + +Appendix B. Workshop Materials + + Main page: + http://www.iab.org/about/workshops/smartobjects/ + + Position papers: + http://www.iab.org/about/workshops/smartobjects/papers/ + + Slides: + http://www.iab.org/about/workshops/smartobjects/agenda/ + + Minutes: + http://www.iab.org/activities/workshops/smartobjects/ + smartobjectworkshopmeetingminutes/ + +Appendix C. Accepted Position Papers + + 1. Deployment Experience with Low Power Lossy Wireless Sensor + Networks" by C. Adjih, E. Baccelli, P. Jacquet, P. Minet, M. + Philipp, and G. Wittenburg + + 2. CoAP improvements to meet embedded device hardware constraints" + by Davide Barbieri + + 3. "Unified Device Networking Protocols for Smart Objects" by + Daniel Barisic and Anton Pfefferseder + + 4. "Simplified neighbour cache implementation in RPL/6LoWPAN" by + Dominique Barthel + + 5. "Home Control in a consumer's perspective" by Anders Brandt + + 6. "Authoring Place-based Experiences with an Internet of Things: + Tussles of Expressive, Operational, and Participatory Goals" by + Jeff Burke + + + + + + +Tschofenig & Arkko Informational [Page 25] + +RFC 6574 Smart Object Workshop Report April 2012 + + + 7. "A Dynamic Distributed Federated Approach for the Internet of + Things" by Diego Casado Mansilla, Juan Ramon Velasco Perez, and + Mario Lopez-Ramos + + 8. "Quickly interoperable Internet of Things using simple + transparent gateways" by Angelo P. Castellani, Salvatore Loreto, + Nicola Bui, and Michele Zorzi + + 9. "Position Paper of the Brno University of Technology Department + of Telecommunications" by Vladimir Cervenka, Lubomir Mraz, Milan + Simek, and Karel Pavlata + + 10. "Secure Access to IOT Network: An Application-based Group Key + Approach" by Samita Chakrabarti and Wassim Haddad + + 11. "Domain-Insulated Autonomous Network Architecture (DIANA)" by W. + Chun + + 12. "Yet Another Definition on Name, Address, ID, and Locator + (YANAIL)" by W. Chun + + 13. "The Challenge of Mobility in Low Power Networks" by E. Davies + + 14. "If the routing protocol is so smart, why should neighbour + discovery be so dumb?" by Nicolas Dejean + + 15. "Making Smart Objects IPv6 Ready: Where are we?" by M. Durvy and + M. Valente + + 16. "Position Paper on 'Interconnecting Smart Objects with the + Internet'" by Mehmet Ersue and Jouni Korhonen + + 17. "The Real-time Enterprise: IoT-enabled Business Processes" by + Stephan Haller and Carsten Magerkurth + + 18. "Making Internet-Connected Objects readily useful" by Manfred + Hauswirth, Dennis Pfisterer, and Stefan Decker + + 19. "Some Considerations on Routing in Particular and Lossy + Environments" by Thomas Clausen and Ulrich Herberg + + 20. "A Security Protocol Adaptation Layer for the IP-based Internet + of Things" by Rene Hummen, Tobias Heer, and Klaus Wehrle + + 21. "Simplified SIP Approach for the Smart Object" by Ryota + Ishibashi, Takumi Ohba, Arata Koike, and Akira Kurokawa + + + + + +Tschofenig & Arkko Informational [Page 26] + +RFC 6574 Smart Object Workshop Report April 2012 + + + 22. "Mobility support for the small and smart Future Internet + devices" by Antonio J. Jara and Antonio F. G. Skarmeta + + 23. "The Need for Efficient Reliable Multicast in Smart Grid + Networks" by J. Jetcheva, D. Popa, M.G. Stuber, and H. Van Wyk + + 24. "Lightweight Cryptography for the Internet of Things" by + Masanobu Katagi and Shiho Moriai + + 25. "Thoughts on Reliability in the Internet of Things" by James + Kempf, Jari Arkko, Neda Beheshti, and Kiran Yedavalli + + 26. "IKEv2 and Smart Objects" by Tero Kivinen + + 27. "Position Paper on Thing Name Service (TNS) for the Internet of + Things (IoT)" by Ning Kong and Shuo Shen + + 28. "Connecting Smart Objects to Wireless WANs" by Suresh Krishnan + + 29. "Towards an Information-Centric Internet with more Things" by D. + Kutscher and S. Farrell + + 30. "Application of 6LoWPAN for the Real-Time Positioning of + Manufacturing Assets" by Jaacan Martinez and Jose L. M. Lastra + + 31. "Lighting interface to wireless network" by Jaroslav Meduna + + 32. "Social-driven Internet of Connected Objects" by Paulo Mendes + + 33. "Protocols should go forward that are required by non IP based + protocols" by Tsuyoshi Momose + + 34. "Web services for Wireless Sensor and Actuator Networks" by + Guido Moritz + + 35. "Connecting BT-LE sensors to the Internet using Ipv6" by Markus + Isomaki, Kanji Kerai, Jari Mutikainen, Johanna Nieminen, + Basavaraj Patil, Teemu Savolainen, and Zach Shelby + + 36. "Building Networks" by Bruce Nordman + + 37. "Issues and Challenges in Provisioning Keys to Smart Objects" by + Yoshihiro Ohba and Subir Das + + 38. "Challenges and Solutions of Secure Smart Environments" by Eila + Ovaska and Antti Evesti + + + + + +Tschofenig & Arkko Informational [Page 27] + +RFC 6574 Smart Object Workshop Report April 2012 + + + 39. "Research Experiences about Internetworking Mechanisms to + Integrate Embedded Wireless Networks into Traditional Networks" + by Jose F. Martinez, Ivan Corredor, and Miguel S. Familiar + + 40. "Scalable Video Coding in Networked Environment" by Naeem + Ramzan, Tomas Piatrik, and Ebroul Izquierdo + + 41. "Challenges in Opportunistic Networking" by Mikko Pitkaenen and + Teemu Kaerkkaeinen + + 42. "Position Statement" by Neeli R. Prasad and Sateesh Addepalli + + 43. "A Gateway Architecture for Interconnecting Smart Objects to the + Internet" by Akbar Rahman, Dorothy Gellert, Dale Seed + + 44. "Routing Challenges and Directions for Smart Objects in Future + Internet of Things" by T. A. Ramrekha, E. Panaousis, and C. + Politis + + 45. "6LoWPAN Extension for IPsec" by Shahid Raza, Thiemo Voigt, and + Utz Roedig + + 46. "Connected Vehicle as Smart Object(s)" by Ryuji Wakikawa + + 47. "Problem and possible approach of development and operation of + Smart Objects" by Shoichi Sakane + + 48. "Connecting Passive RFID Tags to the Internet of Things" by + Sandra Dominikus and Joern-Marc Schmidt + + 49. "Protocol Profiles for Constrained Devices" by Juergen + Schoenwaelde, Tina Tsou, and Behcet Sarikaya + + 50. "Multihoming for Sensor Networks" by J. Soininen + + 51. "Internet Objects for Building Control" by Peter van der Stok + and Nicolas Riou + + 52. "Optimal information placement for Smart Objects" by Shigeya + Suzuki + + 53. "Multi-National Initiative for Cloud Computing in Health Care + (MUNICH)" by Christoph Thuemmler + + 54. "The time of the hourglass has elapsed" by Laurent Toutain, + Nicolas Montavont, and Dominique Barthel + + + + + +Tschofenig & Arkko Informational [Page 28] + +RFC 6574 Smart Object Workshop Report April 2012 + + + 55. "Sensor and Actuator Resource Architecture" by Vlasios Tsiatsis, + Jan Hoeller, and Richard Gold + + 56. "IT'S NOT EASY BEING 'GREEN'" by Margaret Wasserman + + 57. "Trustworthy Wireless Industrial Sensor Networks" by Markus + Wehner, Thomas Bartzsch, Dirk Burggraf, Sven Zeisberg, Alexis + Olivereau, and Oualha Nouha + + 58. "Interconnecting smart objects through an overlay networking + architecture" by Anastasios Zafeiropoulos, Athanassios + Liakopoulos and Panagiotis Gouvas + + 59. "Building trust among Virtual Interconnecting Smart Objects in + the Future Internet" by Theodore Zahariadic, Helen C. Leligou, + Panagiotis Trakadas, and Mischa Dohler + + 60. "Experience and Challenges of Integrating Smart Devices with the + Mobile Internet" by Zhen Cao and Hui Deng + + 61. "The 'mesh-under' versus 'route over' debate in IP Smart Objects + Networks" by JP. Vasseur and Jonathan Hui + + 62. "Identification and Authentication of IoT Devices" by Alper + Yegin + + 63. "Security Challenges For the Internet of Things" by Tim Polk and + Sean Turner + + 64. "Application Communications Requirements for 'The Internet of + Things'" by Bob Dolin + + 65. "Interoperability Concerns in the Internet of Things" by Jari + Arkko + + 66. "Privacy in Ubiquitous Computing" by Ivan Gudymenko and Katrin + Borcea-Pfitzmann + + 67. "The 10 Laws of Smart Object Security Design" by Hannes + Tschofenig and Bernard Aboba + + 68. "Position Paper on 'In-Network Object Cloud' Architecture and + Design Goals" by Alex Galis and Stuart Clayman + + 69. "Temptations and Difficulties of Protocols for Smart Objects and + the Internet" by Alexandru Petrescu + + + + + +Tschofenig & Arkko Informational [Page 29] + +RFC 6574 Smart Object Workshop Report April 2012 + + + 70. "The Internet of Things - Challenge for a New Architecture from + Problems" by Gyu Myoung Lee and Noel Crespi + + 71. "Garrulity and Fluff" by Carsten Bormann and Klaus Hartke + +Appendix D. Workshop Participants + + We would like to than the following workshop participants for + attending the workshop: + + Adrian Farrel + Akbar Rahman + Alissa Cooper + Alper Yegin + Anastasios Zafeiropoulos + Anders Brandt + Angelo P. Castellani + Antonio F. G. Skarmeta + Antonio Jara + Arvind Ramrekha + Behcet Sarikaya + Bernard Aboba + Bruce Nordman + Carsten Bormann + Cullen Jennings + Daniel Barisic + Dave Thaler + Davide Barbieri + Diego Casado Mansilla + Dirk Kutscher + Dominique Barthel + Dorothy Gellert + Elwyn Davis + Emmanuel Baccelli + Fred Baker + Guido Moritz + Gyu Myoung Lee + Hannes Tschofenig + Hui Deng + Ivan Gudymenko + Jaacan Martinez + Jari Arkko + Jaroslav Meduna + Jeff Burke + Johanna Nieminen + Jonathan Hui + Jonne Soininen + Jouni Korhonen + + + +Tschofenig & Arkko Informational [Page 30] + +RFC 6574 Smart Object Workshop Report April 2012 + + + JP. Vasseur + Karel Pavlata + Klaus Hartke + Lars Eggert + Laura Gheorghe + Laurent Toutain + Lukas Kencl + Marcelo Bagnulo + Marco Valente + Margaret Wasserman + Markus Isomaki + Markus Wehner + Masanobu Katagi + Mathilde Durvy + Mehmet Ersue + Mikko Pitkaenen + Milan Simek + Neeli R. Prasad + Nicolas Dejean + Ning Kong + Pascal Thubert + Paulo Mendes + Pete Resnick + Peter van der Stok + Ralph Droms + Rene Hummen + Ross Callon + Ruediger Martin + Russ Housley + Ryota Ishibashi + Ryuji Wakikawa + Samita Chakrabarti + Sandra Dominikus + Sean Shen + Sean Turner + Shahid Raza + Shoichi Sakane + Spencer Dawkins + Stephan Haller + Stephen Farrell + Stewart Bryant + Subir Das + Suresh Krishnan + Tea Sang Choi + Tero Kivinen + Theodore Zahariadis + Thomas Clausen + Tim Polk + + + +Tschofenig & Arkko Informational [Page 31] + +RFC 6574 Smart Object Workshop Report April 2012 + + + Tina Tsou + Tsuyoshi Momose + Vladimir Cervenka + Wassim Haddad + Woojik Chun + Zach Shelby + +Appendix E. IAB Members at the Time of Approval + + Bernard Aboba + Ross Callon + Alissa Cooper + Spencer Dawkins + Joel Halpern + Russ Housley + David Kessens + Olaf Kolkman + Danny McPherson + Jon Peterson + Andrei Robachevsky + Dave Thaler + Hannes Tschofenig + +Authors' Addresses + + Hannes Tschofenig + Nokia Siemens Networks + Linnoitustie 6 + Espoo 02600 + Finland + + Phone: +358 (50) 4871445 + EMail: Hannes.Tschofenig@gmx.net + URI: http://www.tschofenig.priv.at + + + Jari Arkko + Ericsson + Jorvas 02420 + Finland + + EMail: jari.arkko@piuha.net + + + Internet Architecture Board + + EMail: iab@iab.org + + + + +Tschofenig & Arkko Informational [Page 32] + |