diff options
Diffstat (limited to 'doc/rfc/rfc8376.txt')
-rw-r--r-- | doc/rfc/rfc8376.txt | 2411 |
1 files changed, 2411 insertions, 0 deletions
diff --git a/doc/rfc/rfc8376.txt b/doc/rfc/rfc8376.txt new file mode 100644 index 0000000..2cbc3ab --- /dev/null +++ b/doc/rfc/rfc8376.txt @@ -0,0 +1,2411 @@ + + + + + + +Internet Engineering Task Force (IETF) S. Farrell, Ed. +Request for Comments: 8376 Trinity College Dublin +Category: Informational May 2018 +ISSN: 2070-1721 + + + Low-Power Wide Area Network (LPWAN) Overview + +Abstract + + Low-Power Wide Area Networks (LPWANs) are wireless technologies with + characteristics such as large coverage areas, low bandwidth, possibly + very small packet and application-layer data sizes, and long battery + life operation. This memo is an informational overview of the set of + LPWAN technologies being considered in the IETF and of the gaps that + exist between the needs of those technologies and the goal of running + IP in LPWANs. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8376. + +Copyright Notice + + Copyright (c) 2018 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + +Farrell Informational [Page 1] + +RFC 8376 LPWAN Overview May 2018 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 + 2. LPWAN Technologies . . . . . . . . . . . . . . . . . . . . . 3 + 2.1. LoRaWAN . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 2.1.1. Provenance and Documents . . . . . . . . . . . . . . 4 + 2.1.2. Characteristics . . . . . . . . . . . . . . . . . . . 4 + 2.2. Narrowband IoT (NB-IoT) . . . . . . . . . . . . . . . . . 10 + 2.2.1. Provenance and Documents . . . . . . . . . . . . . . 10 + 2.2.2. Characteristics . . . . . . . . . . . . . . . . . . . 11 + 2.3. Sigfox . . . . . . . . . . . . . . . . . . . . . . . . . 15 + 2.3.1. Provenance and Documents . . . . . . . . . . . . . . 15 + 2.3.2. Characteristics . . . . . . . . . . . . . . . . . . . 16 + 2.4. Wi-SUN Alliance Field Area Network (FAN) . . . . . . . . 20 + 2.4.1. Provenance and Documents . . . . . . . . . . . . . . 20 + 2.4.2. Characteristics . . . . . . . . . . . . . . . . . . . 21 + 3. Generic Terminology . . . . . . . . . . . . . . . . . . . . . 24 + 4. Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . 26 + 4.1. Naive Application of IPv6 . . . . . . . . . . . . . . . . 26 + 4.2. 6LoWPAN . . . . . . . . . . . . . . . . . . . . . . . . . 26 + 4.2.1. Header Compression . . . . . . . . . . . . . . . . . 27 + 4.2.2. Address Autoconfiguration . . . . . . . . . . . . . . 27 + 4.2.3. Fragmentation . . . . . . . . . . . . . . . . . . . . 27 + 4.2.4. Neighbor Discovery . . . . . . . . . . . . . . . . . 28 + 4.3. 6lo . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 + 4.4. 6tisch . . . . . . . . . . . . . . . . . . . . . . . . . 29 + 4.5. RoHC . . . . . . . . . . . . . . . . . . . . . . . . . . 29 + 4.6. ROLL . . . . . . . . . . . . . . . . . . . . . . . . . . 30 + 4.7. CoAP . . . . . . . . . . . . . . . . . . . . . . . . . . 30 + 4.8. Mobility . . . . . . . . . . . . . . . . . . . . . . . . 31 + 4.9. DNS and LPWAN . . . . . . . . . . . . . . . . . . . . . . 31 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 31 + 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 32 + 7. Informative References . . . . . . . . . . . . . . . . . . . 32 + Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 39 + Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 40 + Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 43 + +1. Introduction + + This document provides background material and an overview of the + technologies being considered in the IETF's IPv6 over Low Power Wide- + Area Networks (LPWAN) Working Group (WG). It also provides a gap + analysis between the needs of these technologies and currently + available IETF specifications. + + + + + + +Farrell Informational [Page 2] + +RFC 8376 LPWAN Overview May 2018 + + + Most technologies in this space aim for a similar goal of supporting + large numbers of very low-cost, low-throughput devices with very low + power consumption, so that even battery-powered devices can be + deployed for years. LPWAN devices also tend to be constrained in + their use of bandwidth, for example, with limited frequencies being + allowed to be used within limited duty cycles (usually expressed as a + percentage of time per hour that the device is allowed to transmit). + As the name implies, coverage of large areas is also a common goal. + So, by and large, the different technologies aim for deployment in + very similar circumstances. + + While all constrained networks must balance power consumption / + battery life, cost, and bandwidth, LPWANs prioritize power and cost + benefits by accepting severe bandwidth and duty cycle constraints + when making the required trade-offs. This prioritization is made in + order to get the multiple-kilometer radio links implied by "Wide + Area" in LPWAN's name. + + Existing pilot deployments have shown huge potential and created much + industrial interest in these technologies. At the time of writing, + essentially no LPWAN end devices (other than for Wi-SUN) have IP + capabilities. Connecting LPWANs to the Internet would provide + significant benefits to these networks in terms of interoperability, + application deployment, and management (among others). The goal of + the LPWAN WG is to, where necessary, adapt IETF-defined protocols, + addressing schemes, and naming conventions to this particular + constrained environment. + + This document is largely the work of the people listed in the + Contributors section. + +2. LPWAN Technologies + + This section provides an overview of the set of LPWAN technologies + that are being considered in the LPWAN WG. The text for each was + mainly contributed by proponents of each technology. + + Note that this text is not intended to be normative in any sense; it + simply exists to help the reader in finding the relevant Layer 2 (L2) + specifications and in understanding how those integrate with IETF- + defined technologies. Similarly, there is no attempt here to set out + the pros and cons of the relevant technologies. + + + + + + + + + +Farrell Informational [Page 3] + +RFC 8376 LPWAN Overview May 2018 + + +2.1. LoRaWAN + +2.1.1. Provenance and Documents + + LoRaWAN is a wireless technology based on Industrial, Scientific, and + Medical (ISM) that is used for long-range low-power low-data-rate + applications developed by the LoRa Alliance, a membership consortium + <https://www.lora-alliance.org/>. This document is based on Version + 1.0.2 of the LoRa specification [LoRaSpec]. That specification is + publicly available and has already seen several deployments across + the globe. + +2.1.2. Characteristics + + LoRaWAN aims to support end devices operating on a single battery for + an extended period of time (e.g., 10 years or more), extended + coverage through 155 dB maximum coupling loss, and reliable and + efficient file download (as needed for remote software/firmware + upgrade). + + LoRaWAN networks are typically organized in a star-of-stars topology + in which Gateways relay messages between end devices and a central + "network server" in the backend. Gateways are connected to the + network server via IP links while end devices use single-hop LoRaWAN + communication that can be received at one or more Gateways. + Communication is generally bidirectional; uplink communication from + end devices to the network server is favored in terms of overall + bandwidth availability. + + Figure 1 shows the entities involved in a LoRaWAN network. + + +----------+ + |End Device| * * * + +----------+ * +---------+ + * | Gateway +---+ + +----------+ * +---------+ | +---------+ + |End Device| * * * +---+ Network +--- Application + +----------+ * | | Server | + * +---------+ | +---------+ + +----------+ * | Gateway +---+ + |End Device| * * * * +---------+ + +----------+ + Key: * LoRaWAN Radio + +---+ IP connectivity + + Figure 1: LoRaWAN Architecture + + + + + +Farrell Informational [Page 4] + +RFC 8376 LPWAN Overview May 2018 + + + o End Device: a LoRa client device, sometimes called a "mote". + Communicates with Gateways. + + o Gateway: a radio on the infrastructure side, sometimes called a + "concentrator" or "base station". Communicates with end devices + and, via IP, with a network server. + + o Network Server: The Network Server (NS) terminates the LoRaWAN + Medium Access Control (MAC) layer for the end devices connected to + the network. It is the center of the star topology. + + o Join Server: The Join Server (JS) is a server on the Internet side + of an NS that processes join requests from an end devices. + + o Uplink message: refers to communications from an end device to a + network server or application via one or more Gateways. + + o Downlink message: refers to communications from a network server + or application via one Gateway to a single end device or a group + of end devices (considering multicasting). + + o Application: refers to application-layer code both on the end + device and running "behind" the NS. For LoRaWAN, there will + generally only be one application running on most end devices. + Interfaces between the NS and the application are not further + described here. + + In LoRaWAN networks, end device transmissions may be received at + multiple Gateways, so, during nominal operation, a network server may + see multiple instances of the same uplink message from an end device. + + The LoRaWAN network infrastructure manages the data rate and Radio + Frequency (RF) output power for each end device individually by means + of an Adaptive Data Rate (ADR) scheme. End devices may transmit on + any channel allowed by local regulation at any time. + + LoRaWAN radios make use of ISM bands, for example, 433 MHz and 868 + MHz within the European Union and 915 MHz in the Americas. + + The end device changes channels in a pseudorandom fashion for every + transmission to help make the system more robust to interference and/ + or to conform to local regulations. + + + + + + + + + +Farrell Informational [Page 5] + +RFC 8376 LPWAN Overview May 2018 + + + Figure 2 shows that after a transmission slot, a Class A device turns + on its receiver for two short receive windows that are offset from + the end of the transmission window. End devices can only transmit a + subsequent uplink frame after the end of the associated receive + windows. When a device joins a LoRaWAN network, there are similar + timeouts on parts of that process. + + |----------------------------| |--------| |--------| + | Tx | | Rx | | Rx | + |----------------------------| |--------| |--------| + |---------| + Rx delay 1 + |------------------------| + Rx delay 2 + + Figure 2: LoRaWAN Class A Transmission and Reception Window + + Given the different regional requirements, the detailed specification + for the LoRaWAN Physical layer (PHY) (taking up more than 30 pages of + the specification) is not reproduced here. Instead, and mainly to + illustrate the kinds of issue encountered, Table 1 presents some of + the default settings for one ISM band (without fully explaining those + here); Table 2 describes maxima and minima for some parameters of + interest to those defining ways to use IETF protocols over the + LoRaWAN MAC layer. + + +-----------------------+-------------------------------------------+ + | Parameters | Default Value | + +-----------------------+-------------------------------------------+ + | Rx delay 1 | 1 s | + | | | + | Rx delay 2 | 2 s (must be RECEIVE_DELAY1 + 1 s) | + | | | + | join delay 1 | 5 s | + | | | + | join delay 2 | 6 s | + | | | + | 868MHz Default | 3 (868.1,868.2,868.3), data rate: 0.3-50 | + | channels | kbit/s | + +-----------------------+-------------------------------------------+ + + Table 1: Default Settings for EU 868 MHz Band + + + + + + + + + +Farrell Informational [Page 6] + +RFC 8376 LPWAN Overview May 2018 + + + +------------------------------------------------+--------+---------+ + | Parameter/Notes | Min | Max | + +------------------------------------------------+--------+---------+ + | Duty Cycle: some but not all ISM bands impose | 1% | no | + | a limit in terms of how often an end device | | limit | + | can transmit. In some cases, LoRaWAN is more | | | + | restrictive in an attempt to avoid congestion. | | | + | | | | + | EU 868 MHz band data rate/frame size | 250 | 50000 | + | | bits/s | bits/s | + | | : 59 | : 250 | + | | octets | octets | + | | | | + | US 915 MHz band data rate/frame size | 980 | 21900 | + | | bits/s | bits/s | + | | : 19 | : 250 | + | | octets | octets | + +------------------------------------------------+--------+---------+ + + Table 2: Minima and Maxima for Various LoRaWAN Parameters + + Note that, in the case of the smallest frame size (19 octets), 8 + octets are required for LoRa MAC layer headers, leaving only 11 + octets for payload (including MAC layer options). However, those + settings do not apply for the join procedure -- end devices are + required to use a channel and data rate that can send the 23-byte + Join-Request message for the join procedure. + + Uplink and downlink higher-layer data is carried in a MACPayload. + There is a concept of "ports" (an optional 8-bit value) to handle + different applications on an end device. Port zero is reserved for + LoRaWAN-specific messaging, such as the configuration of the end + device's network parameters (available channels, data rates, ADR + parameters, Rx Delay 1 and 2, etc.). + + In addition to carrying higher-layer PDUs, there are Join-Request and + Join-Response (aka Join-Accept) messages for handling network access. + And so-called "MAC commands" (see below) up to 15 bytes long can be + piggybacked in an options field ("FOpts"). + + There are a number of MAC commands for link and device status + checking, ADR and duty cycle negotiation, and managing the RX windows + and radio channel settings. For example, the link check response + message allows the NS (in response to a request from an end device) + to inform an end device about the signal attenuation seen most + recently at a Gateway and to tell the end device how many Gateways + received the corresponding link request MAC command. + + + + +Farrell Informational [Page 7] + +RFC 8376 LPWAN Overview May 2018 + + + Some MAC commands are initiated by the network server. For example, + one command allows the network server to ask an end device to reduce + its duty cycle to only use a proportion of the maximum allowed in a + region. Another allows the network server to query the end device's + power status with the response from the end device specifying whether + it has an external power source or is battery powered (in which case, + a relative battery level is also sent to the network server). + + In order to operate nominally on a LoRaWAN network, a device needs a + 32-bit device address, which is assigned when the device "joins" the + network (see below for the join procedure) or that is pre-provisioned + into the device. In case of roaming devices, the device address is + assigned based on the 24-bit network identifier (NetID) that is + allocated to the network by the LoRa Alliance. Non-roaming devices + can be assigned device addresses by the network without relying on a + NetID assigned by the LoRa Alliance. + + End devices are assumed to work with one or quite a limited number of + applications, identified by a 64-bit AppEUI, which is assumed to be a + registered IEEE EUI64 value [EUI64]. In addition, a device needs to + have two symmetric session keys, one for protecting network artifacts + (port=0), the NwkSKey, and another for protecting application-layer + traffic, the AppSKey. Both keys are used for 128-bit AES + cryptographic operations. So, one option is for an end device to + have all of the above plus channel information, somehow + (pre-)provisioned; in that case, the end device can simply start + transmitting. This is achievable in many cases via out-of-band means + given the nature of LoRaWAN networks. Table 3 summarizes these + values. + + +---------+---------------------------------------------------------+ + | Value | Description | + +---------+---------------------------------------------------------+ + | DevAddr | DevAddr (32 bits) = device-specific network address | + | | generated from the NetID | + | | | + | AppEUI | IEEE EUI64 value corresponding to the join server for | + | | an application | + | | | + | NwkSKey | 128-bit network session key used with AES-CMAC | + | | | + | AppSKey | 128-bit application session key used with AES-CTR | + | | | + | AppKey | 128-bit application session key used with AES-ECB | + +---------+---------------------------------------------------------+ + + Table 3: Values Required for Nominal Operation + + + + +Farrell Informational [Page 8] + +RFC 8376 LPWAN Overview May 2018 + + + As an alternative, end devices can use the LoRaWAN join procedure + with a join server behind the NS in order to set up some of these + values and dynamically gain access to the network. To use the join + procedure, an end device must still know the AppEUI and a different + (long-term) symmetric key that is bound to the AppEUI (this is the + application key (AppKey), and it is distinct from the application + session key (AppSKey)). The AppKey is required to be specific to the + device; that is, each end device should have a different AppKey + value. Finally, the end device also needs a long-term identifier for + itself, which is syntactically also an EUI-64 and is known as the + device EUI or DevEUI. Table 4 summarizes these values. + + +---------+----------------------------------------------------+ + | Value | Description | + +---------+----------------------------------------------------+ + | DevEUI | IEEE EUI64 naming the device | + | | | + | AppEUI | IEEE EUI64 naming the application | + | | | + | AppKey | 128-bit long-term application key for use with AES | + +---------+----------------------------------------------------+ + + Table 4: Values Required for Join Procedure + + The join procedure involves a special exchange where the end device + asserts the AppEUI and DevEUI (integrity protected with the long-term + AppKey, but not encrypted) in a Join-Request uplink message. This is + then routed to the network server, which interacts with an entity + that knows that AppKey to verify the Join-Request. If all is going + well, a Join-Accept downlink message is returned from the network + server to the end device. That message specifies the 24-bit NetID, + 32-bit DevAddr, and channel information and from which the AppSKey + and NwkSKey can be derived based on knowledge of the AppKey. This + provides the end device with all the values listed in Table 3. + + All payloads are encrypted and have data integrity. MAC commands, + when sent as a payload (port zero), are therefore protected. + However, MAC commands piggybacked as frame options ("FOpts") are sent + in clear. Any MAC commands sent as frame options and not only as + payload, are visible to a passive attacker, but they are not + malleable for an active attacker due to the use of the Message + Integrity Check (MIC) described below. + + For LoRaWAN version 1.0.x, the NwkSKey session key is used to provide + data integrity between the end device and the network server. The + AppSKey is used to provide data confidentiality between the end + device and network server, or to the application "behind" the network + server, depending on the implementation of the network. + + + +Farrell Informational [Page 9] + +RFC 8376 LPWAN Overview May 2018 + + + All MAC-layer messages have an outer 32-bit MIC calculated using AES- + CMAC with the input being the ciphertext payload and other headers + and using the NwkSkey. Payloads are encrypted using AES-128, with a + counter-mode derived from [IEEE.802.15.4] using the AppSKey. + Gateways are not expected to be provided with the AppSKey or NwkSKey, + all of the infrastructure-side cryptography happens in (or "behind") + the network server. When session keys are derived from the AppKey as + a result of the join procedure, the Join-Accept message payload is + specially handled. + + The long-term AppKey is directly used to protect the Join-Accept + message content, but the function used is not an AES-encrypt + operation, but rather an AES-decrypt operation. The justification is + that this means that the end device only needs to implement the AES- + encrypt operation. (The counter-mode variant used for payload + decryption means the end device doesn't need an AES-decrypt + primitive.) + + The Join-Accept plaintext is always less than 16 bytes long, so + Electronic Code Book (ECB) mode is used for protecting Join-Accept + messages. The Join-Accept message contains an AppNonce (a 24-bit + value) that is recovered on the end device along with the other Join- + Accept content (e.g., DevAddr) using the AES-encrypt operation. Once + the Join-Accept payload is available to the end device, the session + keys are derived from the AppKey, AppNonce, and other values, again + using an ECB mode AES-encrypt operation, with the plaintext input + being a maximum of 16 octets. + +2.2. Narrowband IoT (NB-IoT) + +2.2.1. Provenance and Documents + + Narrowband Internet of Things (NB-IoT) has been developed and + standardized by 3GPP. The standardization of NB-IoT was finalized + with 3GPP Release 13 in June 2016, and further enhancements for + NB-IoT are specified in 3GPP Release 14 in 2017 (for example, in the + form of multicast support). Further features and improvements will + be developed in the following releases, but NB-IoT has been ready to + be deployed since 2016; it is rather simple to deploy, especially in + the existing LTE networks with a software upgrade in the operator's + base stations. For more information of what has been specified for + NB-IoT, 3GPP specification 36.300 [TGPP36300] provides an overview + and overall description of the Evolved Universal Terrestrial Radio + Access Network (E-UTRAN) radio interface protocol architecture, while + specifications 36.321 [TGPP36321], 36.322 [TGPP36322], 36.323 + [TGPP36323], and 36.331 [TGPP36331] give more detailed descriptions + + + + + +Farrell Informational [Page 10] + +RFC 8376 LPWAN Overview May 2018 + + + of MAC, Radio Link Control (RLC), Packet Data Convergence Protocol + (PDCP), and Radio Resource Control (RRC) protocol layers, + respectively. Note that the description below assumes familiarity + with numerous 3GPP terms. + + For a general overview of NB-IoT, see [nbiot-ov]. + +2.2.2. Characteristics + + Specific targets for NB-IoT include: module cost that is Less than US + $5, extended coverage of 164 dB maximum coupling loss, battery life + of over 10 years, ~55000 devices per cell, and uplink reporting + latency of less than 10 seconds. + + NB-IoT supports Half Duplex Frequency Division Duplex (FDD) operation + mode with 60 kbit/s peak rate in uplink and 30 kbit/s peak rate in + downlink, and a Maximum Transmission Unit (MTU) size of 1600 bytes, + limited by PDCP layer (see Figure 4 for the protocol structure), + which is the highest layer in the user plane, as explained later. + Any packet size up to the said MTU size can be passed to the NB-IoT + stack from higher layers, segmentation of the packet is performed in + the RLC layer, which can segment the data to transmission blocks with + a size as small as 16 bits. As the name suggests, NB-IoT uses + narrowbands with bandwidth of 180 kHz in both downlink and uplink. + The multiple access scheme used in the downlink is Orthogonal + Frequency-Division Multiplex (OFDMA) with 15 kHz sub-carrier spacing. + In uplink, Sub-Carrier Frequency-Division Multiplex (SC-FDMA) single + tone with either 15kHz or 3.75 kHz tone spacing is used, or + optionally multi-tone SC-FDMA can be used with 15 kHz tone spacing. + + NB-IoT can be deployed in three ways. In-band deployment means that + the narrowband is deployed inside the LTE band and radio resources + are flexibly shared between NB-IoT and normal LTE carrier. In Guard- + band deployment, the narrowband uses the unused resource blocks + between two adjacent LTE carriers. Standalone deployment is also + supported, where the narrowband can be located alone in dedicated + spectrum, which makes it possible, for example, to reframe a GSM + carrier at 850/900 MHz for NB-IoT. All three deployment modes are + used in licensed frequency bands. The maximum transmission power is + either 20 or 23 dBm for uplink transmissions, while for downlink + transmission the eNodeB may use higher transmission power, up to 46 + dBm depending on the deployment. + + A Maximum Coupling Loss (MCL) target for NB-IoT coverage enhancements + defined by 3GPP is 164 dB. With this MCL, the performance of NB-IoT + in downlink varies between 200 bps and 2-3 kbit/s, depending on the + deployment mode. Stand-alone operation may achieve the highest data + + + + +Farrell Informational [Page 11] + +RFC 8376 LPWAN Overview May 2018 + + + rates, up to a few kbit/s, while in-band and guard-band operations + may reach several hundreds of bps. NB-IoT may even operate with an + MCL higher than 170 dB with very low bit rates. + + For signaling optimization, two options are introduced in addition to + the legacy LTE RRC connection setup; mandatory Data-over-NAS (Control + Plane optimization, solution 2 in [TGPP23720]) and optional RRC + Suspend/Resume (User Plane optimization, solution 18 in [TGPP23720]). + In the control-plane optimization, the data is sent over Non-Access + Stratum (NAS), directly to/from the Mobile Management Entity (MME) + (see Figure 3 for the network architecture) in the core network to + the User Equipment (UE) without interaction from the base station. + This means there is no Access Stratum security or header compression + provided by the PDCP layer in the eNodeB, as the Access Stratum is + bypassed, and only limited RRC procedures. Header compression based + on Robust Header Compression (RoHC) may still optionally be provided + and terminated in the MME. + + The RRC Suspend/Resume procedures reduce the signaling overhead + required for UE state transition from RRC Idle to RRC Connected mode + compared to a legacy LTE operation in order to have quicker user- + plane transaction with the network and return to RRC Idle mode + faster. + + In order to prolong device battery life, both Power-Saving Mode (PSM) + and extended DRX (eDRX) are available to NB-IoT. With eDRX, the RRC + Connected mode DRX cycle is up to 10.24 seconds; in RRC Idle, the + eDRX cycle can be up to 3 hours. In PSM, the device is in a deep + sleep state and only wakes up for uplink reporting. After the + reporting, there is a window (configured by the network) during which + the device receiver is open for downlink connectivity or for + periodical "keep-alive" signaling (PSM uses periodic TAU signaling + with additional reception windows for downlink reachability). + + Since NB-IoT operates in a licensed spectrum, it has no channel + access restrictions allowing up to a 100% duty cycle. + + 3GPP access security is specified in [TGPP33203]. + + + + + + + + + + + + + +Farrell Informational [Page 12] + +RFC 8376 LPWAN Overview May 2018 + + + +--+ + |UE| \ +------+ +------+ + +--+ \ | MME |------| HSS | + \ / +------+ +------+ + +--+ \+--------+ / | + |UE| ----| eNodeB |- | + +--+ /+--------+ \ | + / \ +--------+ + / \| | +------+ Service Packet + +--+ / | S-GW |----| P-GW |---- Data Network (PDN) + |UE| | | +------+ e.g., Internet + +--+ +--------+ + + Figure 3: 3GPP Network Architecture + + Figure 3 shows the 3GPP network architecture, which applies to + NB-IoT. The MME is responsible for handling the mobility of the UE. + The MME tasks include tracking and paging UEs, session management, + choosing the Serving Gateway for the UE during initial attachment and + authenticating the user. At the MME, the NAS signaling from the UE + is terminated. + + The Serving Gateway (S-GW) routes and forwards the user data packets + through the access network and acts as a mobility anchor for UEs + during handover between base stations known as eNodeBs and also + during handovers between NB-IoT and other 3GPP technologies. + + The Packet Data Network Gateway (P-GW) works as an interface between + the 3GPP network and external networks. + + The Home Subscriber Server (HSS) contains user-related and + subscription-related information. It is a database that performs + mobility management, session-establishment support, user + authentication, and access authorization. + + E-UTRAN consists of components of a single type, eNodeB. eNodeB is a + base station that controls the UEs in one or several cells. + + The 3GPP radio protocol architecture is illustrated in Figure 4. + + + + + + + + + + + + +Farrell Informational [Page 13] + +RFC 8376 LPWAN Overview May 2018 + + + +---------+ +---------+ + | NAS |----|-----------------------------|----| NAS | + +---------+ | +---------+---------+ | +---------+ + | RRC |----|----| RRC | S1-AP |----|----| S1-AP | + +---------+ | +---------+---------+ | +---------+ + | PDCP |----|----| PDCP | SCTP |----|----| SCTP | + +---------+ | +---------+---------+ | +---------+ + | RLC |----|----| RLC | IP |----|----| IP | + +---------+ | +---------+---------+ | +---------+ + | MAC |----|----| MAC | L2 |----|----| L2 | + +---------+ | +---------+---------+ | +---------+ + | PHY |----|----| PHY | PHY |----|----| PHY | + +---------+ +---------+---------+ +---------+ + LTE-Uu S1-MME + UE eNodeB MME + + Figure 4: 3GPP Radio Protocol Architecture for the Control Plane + + The radio protocol architecture of NB-IoT (and LTE) is separated into + the control plane and the user plane. The control plane consists of + protocols that control the radio-access bearers and the connection + between the UE and the network. The highest layer of control plane + is called the Non-Access Stratum (NAS), which conveys the radio + signaling between the UE and the Evolved Packet Core (EPC), passing + transparently through the radio network. The NAS is responsible for + authentication, security control, mobility management, and bearer + management. + + The Access Stratum (AS) is the functional layer below the NAS; in the + control plane, it consists of the Radio Resource Control (RRC) + protocol [TGPP36331], which handles connection establishment and + release functions, broadcast of system information, radio-bearer + establishment, reconfiguration, and release. The RRC configures the + user and control planes according to the network status. There exist + two RRC states, RRC_Idle or RRC_Connected, and the RRC entity + controls the switching between these states. In RRC_Idle, the + network knows that the UE is present in the network, and the UE can + be reached in case of an incoming call/downlink data. In this state, + the UE monitors paging, performs cell measurements and cell + selection, and acquires system information. Also, the UE can receive + broadcast and multicast data, but it is not expected to transmit or + receive unicast data. In RRC_Connected state, the UE has a + connection to the eNodeB, the network knows the UE location on the + cell level, and the UE may receive and transmit unicast data. An RRC + connection is established when the UE is expected to be active in the + network, to transmit or receive data. The RRC connection is + released, switching back to RRC_Idle, when there is no more traffic; + this is in order to preserve UE battery life and radio resources. + + + +Farrell Informational [Page 14] + +RFC 8376 LPWAN Overview May 2018 + + + However, as mentioned earlier, a new feature was introduced for + NB-IoT that allows data to be transmitted from the MME directly to + the UE and then transparently to the eNodeB, thus bypassing AS + functions. + + The PDCP's [TGPP36323] main services in the control plane are + transfer of control-plane data, ciphering, and integrity protection. + + The RLC protocol [TGPP36322] performs transfer of upper-layer PDUs + and, optionally, error correction with Automatic Repeat reQuest + (ARQ), concatenation, segmentation, and reassembly of RLC Service + Data Units (SDUs), in-sequence delivery of upper-layer PDUs, + duplicate detection, RLC SDU discarding, RLC-re-establishment, and + protocol error detection and recovery. + + The MAC protocol [TGPP36321] provides mapping between logical + channels and transport channels, multiplexing of MAC SDUs, scheduling + information reporting, error correction with Hybrid ARQ (HARQ), + priority handling, and transport format selection. + + The PHY [TGPP36201] provides data-transport services to higher + layers. These include error detection and indication to higher + layers, Forward Error Correction (FEC) encoding, HARQ soft-combining, + rate-matching, mapping of the transport channels onto physical + channels, power-weighting and modulation of physical channels, + frequency and time synchronization, and radio characteristics + measurements. + + The user plane is responsible for transferring the user data through + the Access Stratum. It interfaces with IP and the highest layer of + the user plane is the PDCP, which, in the user plane, performs header + compression using RoHC, transfer of user-plane data between eNodeB + and the UE, ciphering, and integrity protection. Similar to the + control plane, lower layers in the user plane include RLC, MAC, and + the PHY performing the same tasks as they do in the control plane. + +2.3. Sigfox + +2.3.1. Provenance and Documents + + The Sigfox LPWAN is in line with the terminology and specifications + being defined by ETSI [etsi_unb]. As of today, Sigfox's network has + been fully deployed in 12 countries, with ongoing deployments in 26 + other countries, giving in total a geography of 2 million square + kilometers, containing 512 million people. + + + + + + +Farrell Informational [Page 15] + +RFC 8376 LPWAN Overview May 2018 + + +2.3.2. Characteristics + + Sigfox LPWAN autonomous battery-operated devices send only a few + bytes per day, week, or month, in principle, allowing them to remain + on a single battery for up to 10-15 years. Hence, the system is + designed as to allow devices to last several years, sometimes even + buried underground. + + Since the radio protocol is connectionless and optimized for uplink + communications, the capacity of a Sigfox base station depends on the + number of messages generated by devices, and not on the actual number + of devices. Likewise, the battery life of devices depends on the + number of messages generated by the device. Depending on the use + case, devices can vary from sending less than one message per device + per day to dozens of messages per device per day. + + The coverage of the cell depends on the link budget and on the type + of deployment (urban, rural, etc.). The radio interface is compliant + with the following regulations: + + Spectrum allocation in the USA [fcc_ref] + + Spectrum allocation in Europe [etsi_ref1] [etsi_ref2] + + Spectrum allocation in Japan [arib_ref] + + The Sigfox radio interface is also compliant with the local + regulations of the following countries: Australia, Brazil, Canada, + Kenya, Lebanon, Mauritius, Mexico, New Zealand, Oman, Peru, + Singapore, South Africa, South Korea, and Thailand. + + The radio interface is based on Ultra Narrow Band (UNB) + communications, which allow an increased transmission range by + spending a limited amount of energy at the device. Moreover, UNB + allows a large number of devices to coexist in a given cell without + significantly increasing the spectrum interference. + + Both uplink and downlink are supported, although the system is + optimized for uplink communications. Due to spectrum optimizations, + different uplink and downlink frames and time synchronization methods + are needed. + + The main radio characteristics of the UNB uplink transmission are: + + o Channelization mask: 100 Hz / 600 Hz (depending on the region) + + o Uplink baud rate: 100 baud / 600 baud (depending on the region) + + + + +Farrell Informational [Page 16] + +RFC 8376 LPWAN Overview May 2018 + + + o Modulation scheme: DBPSK + + o Uplink transmission power: compliant with local regulation + + o Link budget: 155 dB (or better) + + o Central frequency accuracy: not relevant, provided there is no + significant frequency drift within an uplink packet transmission + + For example, in Europe, the UNB uplink frequency band is limited to + 868.00 to 868.60 MHz, with a maximum output power of 25 mW and a duty + cycle of 1%. + + The format of the uplink frame is the following: + + +--------+--------+--------+------------------+-------------+-----+ + |Preamble| Frame | Dev ID | Payload |Msg Auth Code| FCS | + | | Sync | | | | | + +--------+--------+--------+------------------+-------------+-----+ + + Figure 5: Uplink Frame Format + + The uplink frame is composed of the following fields: + + o Preamble: 19 bits + + o Frame sync and header: 29 bits + + o Device ID: 32 bits + + o Payload: 0-96 bits + + o Authentication: 16-40 bits + + o Frame check sequence: 16 bits (Cyclic Redundancy Check (CRC)) + + The main radio characteristics of the UNB downlink transmission are: + + o Channelization mask: 1.5 kHz + + o Downlink baud rate: 600 baud + + o Modulation scheme: GFSK + + o Downlink transmission power: 500 mW / 4W (depending on the region) + + o Link budget: 153 dB (or better) + + + + +Farrell Informational [Page 17] + +RFC 8376 LPWAN Overview May 2018 + + + o Central frequency accuracy: the center frequency of downlink + transmission is set by the network according to the corresponding + uplink transmission. + + For example, in Europe, the UNB downlink frequency band is limited to + 869.40 to 869.65 MHz, with a maximum output power of 500 mW with 10% + duty cycle. + + The format of the downlink frame is the following: + + +------------+-----+---------+------------------+-------------+-----+ + | Preamble |Frame| ECC | Payload |Msg Auth Code| FCS | + | |Sync | | | | | + +------------+-----+---------+------------------+-------------+-----+ + + Figure 6: Downlink Frame Format + + The downlink frame is composed of the following fields: + + o Preamble: 91 bits + + o Frame sync and header: 13 bits + + o Error Correcting Code (ECC): 32 bits + + o Payload: 0-64 bits + + o Authentication: 16 bits + + o Frame check sequence: 8 bits (CRC) + + The radio interface is optimized for uplink transmissions, which are + asynchronous. Downlink communications are achieved by devices + querying the network for available data. + + A device willing to receive downlink messages opens a fixed window + for reception after sending an uplink transmission. The delay and + duration of this window have fixed values. The network transmits the + downlink message for a given device during the reception window, and + the network also selects the BS for transmitting the corresponding + downlink message. + + Uplink and downlink transmissions are unbalanced due to the + regulatory constraints on ISM bands. Under the strictest + regulations, the system can allow a maximum of 140 uplink messages + + + + + + +Farrell Informational [Page 18] + +RFC 8376 LPWAN Overview May 2018 + + + and 4 downlink messages per device per day. These restrictions can + be slightly relaxed depending on system conditions and the specific + regulatory domain of operation. + + +---+ + |DEV| * +------+ + +---+ * | RA | + * +------+ + +---+ * | + |DEV| * * * * | + +---+ * +----+ | + * | BS | \ +--------+ + +---+ * +----+ \ | | + DA -----|DEV| * * * | SC |----- NA + +---+ * / | | + * +----+ / +--------+ + +---+ * | BS |/ + |DEV| * * * * +----+ + +---+ * + * + +---+ * + |DEV| * * + +---+ + + Figure 7: Sigfox Network Architecture + + Figure 7 depicts the different elements of the Sigfox network + architecture. + + Sigfox has a "one-contract one-network" model allowing devices to + connect in any country, without any need or notion of either roaming + or handover. + + The architecture consists of a single cloud-based core network, which + allows global connectivity with minimal impact on the end device and + radio access network. The core network elements are the Service + Center (SC) and the Registration Authority (RA). The SC is in charge + of the data connectivity between the BS and the Internet, as well as + the control and management of the BSs and End Points (EPs). The RA + is in charge of the EP network access authorization. + + The radio access network is comprised of several BSs connected + directly to the SC. Each BS performs complex L1/L2 functions, + leaving some L2 and L3 functionalities to the SC. + + The Devices (DEVs) or EPs are the objects that communicate + application data between local Device Applications (DAs) and Network + Applications (NAs). + + + +Farrell Informational [Page 19] + +RFC 8376 LPWAN Overview May 2018 + + + Devices (or EPs) can be static or nomadic, as they associate with the + SC and they do not attach to any specific BS. Hence, they can + communicate with the SC through one or multiple BSs. + + Due to constraints in the complexity of the Device, it is assumed + that Devices host only one or very few device applications, which + most of the time communicate each to a single network application at + a time. + + The radio protocol authenticates and ensures the integrity of each + message. This is achieved by using a unique device ID and an + AES-128-based message authentication code, ensuring that the message + has been generated and sent by the device with the ID claimed in the + message. Application data can be encrypted at the application level + or not, depending on the criticality of the use case, to provide a + balance between cost and effort versus risk. AES-128 in counter mode + is used for encryption. Cryptographic keys are independent for each + device. These keys are associated with the device ID and separate + integrity and confidentiality keys are pre-provisioned. A + confidentiality key is only provisioned if confidentiality is to be + used. At the time of writing, the algorithms and keying details for + this are not published. + +2.4. Wi-SUN Alliance Field Area Network (FAN) + + Text here is via personal communication from Bob Heile + (bheile@ieee.org) and was authored by Bob and Sum Chin Sean. Paul + Duffy (paduffy@cisco.com) also provided additional comments/input on + this section. + +2.4.1. Provenance and Documents + + The Wi-SUN Alliance <https://www.wi-sun.org/> is an industry alliance + for smart city, smart grid, smart utility, and a broad set of general + IoT applications. The Wi-SUN Alliance Field Area Network (FAN) + profile is open-standards based (primarily on IETF and IEEE 802 + standards) and was developed to address applications like smart + municipality/city infrastructure monitoring and management, Electric + Vehicle (EV) infrastructure, Advanced Metering Infrastructure (AMI), + Distribution Automation (DA), Supervisory Control and Data + Acquisition (SCADA) protection/management, distributed generation + monitoring and management, and many more IoT applications. + Additionally, the Alliance has created a certification program to + promote global multi-vendor interoperability. + + The FAN profile is specified within ANSI/TIA as an extension of work + previously done on Smart Utility Networks [ANSI-4957-000]. Updates + to those specifications intended to be published in 2017 will contain + + + +Farrell Informational [Page 20] + +RFC 8376 LPWAN Overview May 2018 + + + details of the FAN profile. A current snapshot of the work to + produce that profile is presented in [wisun-pressie1] and + [wisun-pressie2]. + +2.4.2. Characteristics + + The FAN profile is an IPv6 wireless mesh network with support for + enterprise-level security. The frequency-hopping wireless mesh + topology aims to offer superior network robustness, reliability due + to high redundancy, good scalability due to the flexible mesh + configuration, and good resilience to interference. Very low power + modes are in development permitting long-term battery operation of + network nodes. + + The following list contains some overall characteristics of Wi-SUN + that are relevant to LPWAN applications. + + o Coverage: The range of Wi-SUN FAN is typically 2 - 3 km in line of + sight, matching the needs of neighborhood area networks, campus + area networks, or corporate area networks. The range can also be + extended via multi-hop networking. + + o High-bandwidth, low-link latency: Wi-SUN supports relatively high + bandwidth, i.e., up to 300 kbit/s [FANOV], enables remote update + and upgrade of devices so that they can handle new applications, + extending their working life. Wi-SUN supports LPWAN IoT + applications that require on-demand control by providing low link + latency (0.02 s) and bidirectional communication. + + o Low-power consumption: FAN devices draw less than 2 uA when + resting and only 8 mA when listening. Such devices can maintain a + long lifetime, even if they are frequently listening. For + instance, suppose the device transmits data for 10 ms once every + 10 s; theoretically, a battery of 1000 mAh can last more than 10 + years. + + o Scalability: Tens of millions of Wi-SUN FAN devices have been + deployed in urban, suburban, and rural environments, including + deployments with more than 1 million devices. + + A FAN contains one or more networks. Within a network, nodes assume + one of three operational roles. First, each network contains a + Border Router providing WAN connectivity to the network. The Border + Router maintains source-routing tables for all nodes within its + network, provides node authentication and key management services, + and disseminates network-wide information such as broadcast + schedules. Second, Router nodes, which provide upward and downward + packet forwarding (within a network). A Router also provides + + + +Farrell Informational [Page 21] + +RFC 8376 LPWAN Overview May 2018 + + + services for relaying security and address management protocols. + Finally, Leaf nodes provide minimum capabilities: discovering and + joining a network, sending/receiving IPv6 packets, etc. A low-power + network may contain a mesh topology with Routers at the edges that + construct a star topology with Leaf nodes. + + The FAN profile is based on various open standards developed by the + IETF (including [RFC768], [RFC2460], [RFC4443], and [RFC6282]). + Related IEEE 802 standards include [IEEE.802.15.4] and + [IEEE.802.15.9]. For Low-Power and Lossy Networks (LLNs), see ANSI/ + TIA [ANSI-4957-210]. + + The FAN profile specification provides an application-independent + IPv6-based transport service. There are two possible methods for + establishing IPv6 packet routing: the Routing Protocol for Low-Power + and Lossy Networks (RPL) at the Network layer is mandatory, and + Multi-Hop Delivery Service (MHDS) is optional at the Data Link layer. + Figure 8 provides an overview of the FAN network stack. + + The Transport service is based on UDP (defined in [RFC768]) or TCP + (defined in [RFC793]. + + The Network service is provided by IPv6 as defined in [RFC2460] with + an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) + adaptation as defined in [RFC4944] and [RFC6282]. ICMPv6, as defined + in [RFC4443], is used for the control plane during information + exchange. + + The Data Link service provides both control/management of the PHY and + data transfer/management services to the Network layer. These + services are divided into MAC and Logical Link Control (LLC) sub- + layers. The LLC sub-layer provides a protocol dispatch service that + supports 6LoWPAN and an optional MAC sub-layer mesh service. The MAC + sub-layer is constructed using data structures defined in + [IEEE.802.15.4]. Multiple modes of frequency hopping are defined. + The entire MAC payload is encapsulated in an [IEEE.802.15.9] + Information Element to enable LLC protocol dispatch between upper- + layer 6LoWPAN processing and MAC sub-layer mesh processing, etc. + These areas will be expanded once [IEEE.802.15.12] is completed. + + The PHY service is derived from a subset of the SUN FSK specification + in [IEEE.802.15.4]. The 2-FSK modulation schemes, with a channel- + spacing range from 200 to 600 kHz, are defined to provide data rates + from 50 to 300 kbit/s, with FEC as an optional feature. Towards + enabling ultra-low-power applications, the PHY layer design is also + extendable to low-energy and critical infrastructure-monitoring + networks. + + + + +Farrell Informational [Page 22] + +RFC 8376 LPWAN Overview May 2018 + + + +----------------------+--------------------------------------------+ + | Layer | Description | + +----------------------+--------------------------------------------+ + | IPv6 protocol suite | TCP/UDP | + | | | + | | 6LoWPAN Adaptation + Header Compression | + | | | + | | DHCPv6 for IP address management | + | | | + | | Routing using RPL | + | | | + | | ICMPv6 | + | | | + | | Unicast and Multicast forwarding | + +----------------------+--------------------------------------------+ + | MAC based on | Frequency hopping | + | [IEEE.802.15.4e] + | | + | IE extensions | Discovery and Join | + | | | + | | Protocol Dispatch ([IEEE.802.15.9]) | + | | | + | | Several Frame Exchange patterns | + | | | + | | Optional Mesh Under routing | + | | ([ANSI-4957-210]) | + +----------------------+--------------------------------------------+ + | PHY based on | Various data rates and regions | + | [IEEE.802.15.4g] | | + +----------------------+--------------------------------------------+ + | Security | [IEEE.802.1x]/EAP-TLS/PKI Authentication | + | | TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 | + | | required for EAP-TLS | + | | | + | | 802.11i Group Key Management | + | | | + | | Frame security is implemented as AES-CCM* | + | | as specified in [IEEE.802.15.4] | + | | | + | | Optional [ETSI-TS-102-887-2] Node 2 Node | + | | Key Management | + +----------------------+--------------------------------------------+ + + Figure 8: Wi-SUN Stack Overview + + + + + + + + +Farrell Informational [Page 23] + +RFC 8376 LPWAN Overview May 2018 + + + The FAN security supports Data Link layer network access control, + mutual authentication, and establishment of a secure pairwise link + between a FAN node and its Border Router, which is implemented with + an adaptation of [IEEE.802.1x] and EAP-TLS as described in [RFC5216] + using secure device identity as described in [IEEE.802.1AR]. + Certificate formats are based upon [RFC5280]. A secure group link + between a Border Router and a set of FAN nodes is established using + an adaptation of the [IEEE.802.11] Four-Way Handshake. A set of four + group keys are maintained within the network, one of which is the + current transmit key. Secure node-to-node links are supported + between one-hop FAN neighbors using an adaptation of + [ETSI-TS-102-887-2]. FAN nodes implement Frame Security as specified + in [IEEE.802.15.4]. + +3. Generic Terminology + + LPWAN technologies, such as those discussed above, have similar + architectures but different terminology. We can identify different + types of entities in a typical LPWAN network: + + o End devices are the devices or the "things" (e.g., sensors, + actuators, etc.); they are named differently in each technology + (End Device, User Equipment, or EP). There can be a high density + of end devices per Radio Gateway. + + o The Radio Gateway, which is the EP of the constrained link. It is + known as: Gateway, Evolved Node B or base station. + + o The Network Gateway or Router is the interconnection node between + the Radio Gateway and the Internet. It is known as the Network + Server, Serving GW, or Service Center. + + o LPWAN-AAA server, which controls user authentication. It is known + as the Join-Server, Home Subscriber Server, or Registration + Authority. (We use the term LPWAN-AAA server because we're not + assuming that this entity speaks RADIUS or Diameter as many/most + AAA servers do; but, equally, we don't want to rule that out, as + the functionality will be similar.) + + o At last we have the Application Server, known also as Packet Data + Node Gateway or Network Application. + + + + + + + + + + +Farrell Informational [Page 24] + +RFC 8376 LPWAN Overview May 2018 + + + +---------------------------------------------------------------------+ + | Function/ | | | | | | + |Technology | LoRaWAN | NB-IoT | Sigfox | Wi-SUN | IETF | + +-----------+-----------+-----------+------------+--------+-----------+ + |Sensor, | | | | | | + |Actuator, | End | User | End | Leaf | Device | + |device, | Device | Equipment | Point | Node | (DEV) | + |object | | | | | | + +-----------+-----------+-----------+------------+--------+-----------+ + |Transceiver| | Evolved | Base | Router | Radio | + |Antenna | Gateway | Node B | Station | Node | Gateway | + +-----------+-----------+-----------+------------+--------+-----------+ + |Server | Network | PDN GW/ | Service | Border | Network | + | | Server | SCEF* | Center | Router | Gateway | + | | | | | | (NGW) | + +-----------+-----------+-----------+------------+--------+-----------+ + |Security | Join | Home |Registration|Authent.| LPWAN- | + |Server | Server | Subscriber| Authority | Server | AAA | + | | | Server | | | Server | + +-----------+-----------+-----------+------------+--------+-----------+ + |Application|Application|Application| Network |Appli- |Application| + | | Server | Server | Application| cation | (App) | + +---------------------------------------------------------------------+ + + * SCEF = Service Capability Exposure Function + + Figure 9: LPWAN Architecture Terminology + + +------+ + () () () | |LPWAN-| + () () () () / \ +---------+ | AAA | +() () () () () () / \========| /\ |====|Server| +-----------+ + () () () | | <--|--> | +------+ |APPLICATION| +() () () () / \============| v |==============| (App) | + () () () / \ +---------+ +-----------+ + DEV Radio Gateways NGW + + Figure 10: LPWAN Architecture + + In addition to the names of entities, LPWANs are also subject to + possibly regional frequency-band regulations. Those may include + restrictions on the duty cycle, for example, requiring that hosts + only transmit for a certain percentage of each hour. + + + + + + + + +Farrell Informational [Page 25] + +RFC 8376 LPWAN Overview May 2018 + + +4. Gap Analysis + + This section considers some of the gaps between current LPWAN + technologies and the goals of the LPWAN WG. Many of the generic + considerations described in [RFC7452] will also apply in LPWANs, as + end devices can also be considered to be a subclass of (so-called) + "smart objects". In addition, LPWAN device implementers will also + need to consider the issues relating to firmware updates described in + [RFC8240]. + +4.1. Naive Application of IPv6 + + IPv6 [RFC8200] has been designed to allocate addresses to all the + nodes connected to the Internet. Nevertheless, the header overhead + of at least 40 bytes introduced by the protocol is incompatible with + LPWAN constraints. If IPv6 with no further optimization were used, + several LPWAN frames could be needed just to carry the IP header. + Another problem arises from IPv6 MTU requirements, which require the + layer below to support at least 1280 byte packets [RFC2460]. + + IPv6 has a configuration protocol: Neighbor Discovery Protocol (NDP) + [RFC4861]). For a node to learn network parameters, NDP generates + regular traffic with a relatively large message size that does not + fit LPWAN constraints. + + In some LPWAN technologies, L2 multicast is not supported. In that + case, if the network topology is a star, the solution and + considerations from Section 3.2.5 of [RFC7668] may be applied. + + Other key protocols (such as DHCPv6 [RFC3315], IPsec [RFC4301] and + TLS [RFC5246]) have similarly problematic properties in this context. + Each protocol requires relatively frequent round-trips between the + host and some other host on the network. In the case of + cryptographic protocols (such as IPsec and TLS), in addition to the + round-trips required for secure session establishment, cryptographic + operations can require padding and addition of authenticators that + are problematic when considering LPWAN lower layers. Note that mains + powered Wi-SUN mesh router nodes will typically be more resource + capable than the other LPWAN technologies discussed. This can enable + use of more "chatty" protocols for some aspects of Wi-SUN. + +4.2. 6LoWPAN + + Several technologies that exhibit significant constraints in various + dimensions have exploited the 6LoWPAN suite of specifications + ([RFC4944], [RFC6282], and [RFC6775]) to support IPv6 [USES-6LO]. + However, the constraints of LPWANs, often more extreme than those + typical of technologies that have (re-)used 6LoWPAN, constitute a + + + +Farrell Informational [Page 26] + +RFC 8376 LPWAN Overview May 2018 + + + challenge for the 6LoWPAN suite in order to enable IPv6 over LPWAN. + LPWANs are characterized by device constraints (in terms of + processing capacity, memory, and energy availability), and + especially, link constraints, such as: + + o tiny L2 payload size (from ~10 to ~100 bytes), + + o very low bit rate (from ~10 bit/s to ~100 kbit/s), and + + o in some specific technologies, further message rate constraints + (e.g., between ~0.1 message/minute and ~1 message/minute) due to + regional regulations that limit the duty cycle. + +4.2.1. Header Compression + + 6LoWPAN header compression reduces IPv6 (and UDP) header overhead by + eliding header fields when they can be derived from the link layer + and by assuming that some of the header fields will frequently carry + expected values. 6LoWPAN provides both stateless and stateful header + compression. In the latter, all nodes of a 6LoWPAN are assumed to + share compression context. In the best case, the IPv6 header for + link-local communication can be reduced to only 2 bytes. For global + communication, the IPv6 header may be compressed down to 3 bytes in + the most extreme case. However, in more practical situations, the + smallest IPv6 header size may be 11 bytes (one address prefix + compressed) or 19 bytes (both source and destination prefixes + compressed). These headers are large considering the link-layer + payload size of LPWAN technologies, and in some cases, are even + bigger than the LPWAN PDUs. 6LoWPAN was initially designed for + [IEEE.802.15.4] networks with a frame size up to 127 bytes and a + throughput of up to 250 kbit/s, which may or may not be duty cycled. + +4.2.2. Address Autoconfiguration + + Traditionally, Interface Identifiers (IIDs) have been derived from + link-layer identifiers [RFC4944]. This allows optimizations such as + header compression. Nevertheless, recent guidance has given advice + on the fact that, due to privacy concerns, 6LoWPAN devices should not + be configured to embed their link-layer addresses in the IID by + default. [RFC8065] provides guidance on better methods for + generating IIDs. + +4.2.3. Fragmentation + + As stated above, IPv6 requires the layer below to support an MTU of + 1280 bytes [RFC8200]. Therefore, given the low maximum payload size + of LPWAN technologies, fragmentation is needed. + + + + +Farrell Informational [Page 27] + +RFC 8376 LPWAN Overview May 2018 + + + If a layer of an LPWAN technology supports fragmentation, proper + analysis has to be carried out to decide whether the fragmentation + functionality provided by the lower layer or fragmentation at the + adaptation layer should be used. Otherwise, fragmentation + functionality shall be used at the adaptation layer. + + 6LoWPAN defined a fragmentation mechanism and a fragmentation header + to support the transmission of IPv6 packets over IEEE.802.15.4 + networks [RFC4944]. While the 6LoWPAN fragmentation header is + appropriate for the 2003 version of [IEEE.802.15.4] (which has a + frame payload size of 81-102 bytes), it is not suitable for several + LPWAN technologies, many of which have a maximum payload size that is + one order of magnitude below that of the 2003 version of + [IEEE.802.15.4]. The overhead of the 6LoWPAN fragmentation header is + high, considering the reduced payload size of LPWAN technologies, and + the limited energy availability of the devices using such + technologies. Furthermore, its datagram offset field is expressed in + increments of eight octets. In some LPWAN technologies, the 6LoWPAN + fragmentation header plus eight octets from the original datagram + exceeds the available space in the layer two payload. In addition, + the MTU in the LPWAN networks could be variable, which implies a + variable fragmentation solution. + +4.2.4. Neighbor Discovery + + 6LoWPAN Neighbor Discovery [RFC6775] defines optimizations to IPv6 ND + [RFC4861], in order to adapt functionality of the latter for networks + of devices using [IEEE.802.15.4] or similar technologies. The + optimizations comprise host-initiated interactions to allow for + sleeping hosts, replacement of multicast-based address resolution for + hosts by an address registration mechanism, multihop extensions for + prefix distribution and duplicate address detection (note that these + are not needed in a star topology network), and support for 6LoWPAN + header compression. + + 6LoWPAN ND may be used in not so severely constrained LPWAN networks. + The relative overhead incurred will depend on the LPWAN technology + used (and on its configuration, if appropriate). In certain LPWAN + setups (with a maximum payload size above ~60 bytes and duty-cycle- + free or equivalent operation), an RS/RA/NS/NA exchange may be + completed in a few seconds, without incurring packet fragmentation. + + In other LPWANs (with a maximum payload size of ~10 bytes and a + message rate of ~0.1 message/minute), the same exchange may take + hours or even days, leading to severe fragmentation and consuming a + significant amount of the available network resources. 6LoWPAN ND + behavior may be tuned through the use of appropriate values for the + default Router Lifetime, the Valid Lifetime in the PIOs, and the + + + +Farrell Informational [Page 28] + +RFC 8376 LPWAN Overview May 2018 + + + Valid Lifetime in the 6LoWPAN Context Option (6CO), as well as the + address Registration Lifetime. However, for the latter LPWANs + mentioned above, 6LoWPAN ND is not suitable. + +4.3. 6lo + + The 6lo WG has been reusing and adapting 6LoWPAN to enable IPv6 + support over link-layer technologies such as Bluetooth Low Energy + (BTLE), ITU-T G.9959 [G9959], Digital Enhanced Cordless + Telecommunications (DECT) Ultra Low Energy (ULE), MS/TP-RS485, Near + Field Communication (NFC) IEEE 802.11ah. (See + <https://datatracker.ietf.org/wg/6lo/> for details on the 6lo WG.) + These technologies are similar in several aspects to [IEEE.802.15.4], + which was the original 6LoWPAN target technology. + + 6lo has mostly used the subset of 6LoWPAN techniques best suited for + each lower-layer technology and has provided additional optimizations + for technologies where the star topology is used, such as BTLE or + DECT-ULE. + + The main constraint in these networks comes from the nature of the + devices (constrained devices); whereas, in LPWANs, it is the network + itself that imposes the most stringent constraints. + +4.4. 6tisch + + The IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch) solution is + dedicated to mesh networks that operate using [IEEE.802.15.4e] MAC + with a deterministic slotted channel. Time-Slotted Channel Hopping + (TSCH) can help to reduce collisions and to enable a better balance + over the channels. It improves the battery life by avoiding the idle + listening time for the return channel. + + A key element of 6tisch is the use of synchronization to enable + determinism. TSCH and 6tisch may provide a standard scheduling + function. The LPWAN networks probably will not support + synchronization like the one used in 6tisch. + +4.5. RoHC + + RoHC is a header compression mechanism [RFC3095] developed for + multimedia flows in a point-to-point channel. RoHC uses three levels + of compression, each level having its own header format. In the + first level, RoHC sends 52 bytes of header; in the second level, the + header could be from 34 to 15 bytes; and in the third level, header + size could be from 7 to 2 bytes. The level of compression is managed + by a Sequence Number (SN), which varies in size from 2 bytes to 4 + bits in the minimal compression. SN compression is done with an + + + +Farrell Informational [Page 29] + +RFC 8376 LPWAN Overview May 2018 + + + algorithm called Window-Least Significant Bits (W-LSB). This window + has a 4-bit size representing 15 packets, so every 15 packets, RoHC + needs to slide the window in order to receive the correct SN, and + sliding the window implies a reduction of the level of compression. + When packets are lost or errored, the decompressor loses context and + drops packets until a bigger header is sent with more complete + information. To estimate the performance of RoHC, an average header + size is used. This average depends on the transmission conditions, + but most of the time is between 3 and 4 bytes. + + RoHC has not been adapted specifically to the constrained hosts and + networks of LPWANs: it does not take into account energy limitations + nor the transmission rate. Additionally, RoHC context is + synchronized during transmission, which does not allow better + compression. + +4.6. ROLL + + Most technologies considered by the LPWAN WG are based on a star + topology, which eliminates the need for routing at that layer. + Future work may address additional use cases that may require + adaptation of existing routing protocols or the definition of new + ones. As of the time of writing, work similar to that done in the + Routing Over Low-Power and Lossy Network (ROLL) WG and other routing + protocols are out of scope of the LPWAN WG. + +4.7. CoAP + + The Constrained Application Protocol (CoAP) [RFC7252] provides a + RESTful framework for applications intended to run on constrained IP + networks. It may be necessary to adapt CoAP or related protocols to + take into account the extreme duty cycles and the potentially + extremely limited throughput of LPWANs. + + For example, some of the timers in CoAP may need to be redefined. + Taking into account CoAP acknowledgments may allow the reduction of + L2 acknowledgments. On the other hand, the current work in progress + in the CoRE WG where the Constrained Management Interface (COMI) / + Constrained Objects Language (CoOL) network management interface + which, uses Structured Identifiers (SIDs) to reduce payload size over + CoAP may prove to be a good solution for the LPWAN technologies. The + overhead is reduced by adding a dictionary that matches a URI to a + small identifier and a compact mapping of the YANG data model into + the Concise Binary Object Representation (CBOR). + + + + + + + +Farrell Informational [Page 30] + +RFC 8376 LPWAN Overview May 2018 + + +4.8. Mobility + + LPWAN nodes can be mobile. However, LPWAN mobility is different from + the one specified for Mobile IP. LPWAN implies sporadic traffic and + will rarely be used for high-frequency, real-time communications. + The applications do not generate a flow; they need to save energy + and, most of the time, the node will be down. + + In addition, LPWAN mobility may mostly apply to groups of devices + that represent a network; in which case, mobility is more a concern + for the Gateway than the devices. Network Mobility (NEMO) [RFC3963] + or other mobile Gateway solutions (such as a Gateway with an LTE + uplink) may be used in the case where some end devices belonging to + the same network Gateway move from one point to another such that + they are not aware of being mobile. + +4.9. DNS and LPWAN + + The Domain Name System (DNS) [RFC1035], enables applications to name + things with a globally resolvable name. Many protocols use the DNS + to identify hosts, for example, applications using CoAP. + + The DNS query/answer protocol as a precursor to other communication + within the Time-To-Live (TTL) of a DNS answer is clearly problematic + in an LPWAN, say where only one round-trip per hour can be used, and + with a TTL that is less than 3600 seconds. It is currently unclear + whether and how DNS-like functionality might be provided in LPWANs. + +5. Security Considerations + + Most LPWAN technologies integrate some authentication or encryption + mechanisms that were defined outside the IETF. The LPWAN WG may need + to do work to integrate these mechanisms to unify management. A + standardized Authentication, Authorization, and Accounting (AAA) + infrastructure [RFC2904] may offer a scalable solution for some of + the security and management issues for LPWANs. AAA offers + centralized management that may be of use in LPWANs, for example + [LoRaWAN-AUTH] and [LoRaWAN-RADIUS] suggest possible security + processes for a LoRaWAN network. Similar mechanisms may be useful to + explore for other LPWAN technologies. + + Some applications using LPWANs may raise few or no privacy + considerations. For example, temperature sensors in a large office + building may not raise privacy issues. However, the same sensors, if + deployed in a home environment, and especially if triggered due to + human presence, can raise significant privacy issues: if an end + device emits a (encrypted) packet every time someone enters a room in + a home, then that traffic is privacy sensitive. And the more that + + + +Farrell Informational [Page 31] + +RFC 8376 LPWAN Overview May 2018 + + + the existence of that traffic is visible to network entities, the + more privacy sensitivities arise. At this point, it is not clear + whether there are workable mitigations for problems like this. In a + more typical network, one would consider defining padding mechanisms + and allowing for cover traffic. In some LPWANs, those mechanisms may + not be feasible. Nonetheless, the privacy challenges do exist and + can be real; therefore, some solutions will be needed. Note that + many aspects of solutions in this space may not be visible in IETF + specifications but can be, e.g., implementation or deployment + specific. + + Another challenge for LPWANs will be how to handle key management and + associated protocols. In a more traditional network (e.g., the Web), + servers can "staple" Online Certificate Status Protocol (OCSP) + responses in order to allow browsers to check revocation status for + presented certificates [RFC6961]. While the stapling approach is + likely something that would help in an LPWAN, as it avoids an RTT, + certificates and OCSP responses are bulky items and will prove + challenging to handle in LPWANs with bounded bandwidth. + +6. IANA Considerations + + This document has no IANA actions. + +7. Informative References + + [ANSI-4957-000] + ANSI/TIA, "Architecture Overview for the Smart Utility + Network", ANSI/TIA-4957.0000 , May 2013. + + [ANSI-4957-210] + ANSI/TIA, "Multi-Hop Delivery Specification of a Data Link + Sub-Layer", ANSI/TIA-4957.210 , May 2013. + + [arib_ref] ARIB, "920MHz-Band Telemeter, Telecontrol and Data + Transmission Radio Equipment", ARIB STD-T108 Version 1.0, + February 2012. + + [ETSI-TS-102-887-2] + ETSI, "Electromagnetic compatibility and Radio spectrum + Matters (ERM); Short Range Devices; Smart Metering + Wireless Access Protocol; Part 2: Data Link Layer (MAC + Sub-layer)", ETSI TS 102 887-2, Version V1.1.1, September + 2013. + + + + + + + +Farrell Informational [Page 32] + +RFC 8376 LPWAN Overview May 2018 + + + [etsi_ref1] + ETSI, "Short Range Devices (SRD) operating in the + frequency range 25 MHz to 1 000 MHz; Part 1: Technical + characteristics and methods of measurement", Draft ETSI + EN 300-220-1, Version V3.1.0, May 2016. + + [etsi_ref2] + ETSI, "Short Range Devices (SRD) operating in the + frequency range 25 MHz to 1 000 MHz; Part 2: Harmonised + Standard covering the essential requirements of article + 3.2 of Directive 2014/53/EU for non specific radio + equipment", Final draft ETSI EN 300-220-2 P300-220-2, + Version V3.1.1, November 2016. + + [etsi_unb] ETSI ERM, "System Reference document (SRdoc); Short Range + Devices (SRD); Technical characteristics for Ultra Narrow + Band (UNB) SRDs operating in the UHF spectrum below 1 + GHz", ETSI TR 103 435, Version V1.1.1, February 2017. + + [EUI64] IEEE, "Guidelines for 64-bit Global Identifier + (EUI),Organizationally Unique Identifier (OUI), and + Company ID (CID)", August 2017, + <http://standards.ieee.org/develop/regauth/tut/eui.pdf>. + + [FANOV] IETF, "Wi-SUN Alliance Field Area Network (FAN) Overview", + IETF 97, November 2016, + <https://www.ietf.org/proceedings/97/slides/ + slides-97-lpwan-35-wi-sun-presentation-00.pdf>. + + [fcc_ref] "Telecommunication Radio Frequency Devices - Operation + within the bands 902-928 MHz, 2400-2483.5 MHz, and + 5725-5850 MHz.", FCC CFR 47 15.247, June 2016. + + [G9959] ITU-T, "Short range narrow-band digital radiocommunication + transceivers - PHY, MAC, SAR and LLC layer + specifications", ITU-T Recommendation G.9959, January + 2015, <http://www.itu.int/rec/T-REC-G.9959>. + + [IEEE.802.11] + IEEE, "IEEE Standard for Information technology-- + Telecommunications and information exchange between + systems Local and metropolitan area networks--Specific + requirements Part 11: Wireless LAN Medium Access Control + (MAC) and Physical Layer (PHY) Specifications", + IEEE 802.11. + + + + + + +Farrell Informational [Page 33] + +RFC 8376 LPWAN Overview May 2018 + + + [IEEE.802.15.12] + IEEE, "Upper Layer Interface (ULI) for IEEE 802.15.4 Low- + Rate Wireless Networks", IEEE 802.15.12. + + [IEEE.802.15.4] + IEEE, "IEEE Standard for Low-Rate Wireless Networks", + IEEE 802.15.4, <https://standards.ieee.org/findstds/ + standard/802.15.4-2015.html>. + + [IEEE.802.15.4e] + IEEE, "IEEE Standard for Local and metropolitan area + networks--Part 15.4: Low-Rate Wireless Personal Area + Networks (LR-WPANs) Amendment 1: MAC sublayer", + IEEE 802.15.4e. + + [IEEE.802.15.4g] + IEEE, "IEEE Standard for Local and metropolitan area + networks--Part 15.4: Low-Rate Wireless Personal Area + Networks (LR-WPANs) Amendment 3: Physical Layer (PHY) + Specifications for Low-Data-Rate, Wireless, Smart Metering + Utility Networks", IEEE 802.15.4g. + + [IEEE.802.15.9] + IEEE, "IEEE Recommended Practice for Transport of Key + Management Protocol (KMP) Datagrams", IEEE Standard + 802.15.9, 2016, <https://standards.ieee.org/findstds/ + standard/802.15.9-2016.html>. + + [IEEE.802.1AR] + ANSI/IEEE, "IEEE Standard for Local and metropolitan area + networks - Secure Device Identity", IEEE 802.1AR. + + [IEEE.802.1x] + IEEE, "Port Based Network Access Control", IEEE 802.1x. + + [LoRaSpec] LoRa Alliance, "LoRaWAN Specification Version V1.0.2", + July 2016, <https://lora-alliance.org/sites/default/ + files/2018-05/lorawan1_0_2-20161012_1398_1.pdf>. + + [LoRaWAN] Farrell, S. and A. Yegin, "LoRaWAN Overview", Work in + Progress, draft-farrell-lpwan-lora-overview-01, October + 2016. + + [LoRaWAN-AUTH] + Garcia, D., Marin, R., Kandasamy, A., and A. Pelov, + "LoRaWAN Authentication in Diameter", Work in Progress, + draft-garcia-dime-diameter-lorawan-00, May 2016. + + + + +Farrell Informational [Page 34] + +RFC 8376 LPWAN Overview May 2018 + + + [LoRaWAN-RADIUS] + Garcia, D., Lopez, R., Kandasamy, A., and A. Pelov, + "LoRaWAN Authentication in RADIUS", Work in Progress, + draft-garcia-radext-radius-lorawan-03, May 2017. + + [LPWAN-GAP] + Minaburo, A., Ed., Gomez, C., Ed., Toutain, L., Paradells, + J., and J. Crowcroft, "LPWAN Survey and GAP Analysis", + Work in Progress, draft-minaburo-lpwan-gap-analysis-02, + October 2016. + + [NB-IoT] Ratilainen, A., "NB-IoT characteristics", Work in + Progress, draft-ratilainen-lpwan-nb-iot-00, July 2016. + + [nbiot-ov] IEEE, "NB-IoT Technology Overview and Experience from + Cloud-RAN Implementation", Volume 24, Issue 3 Pages 26-32, + DOI 10.1109/MWC.2017.1600418, June 2017. + + [RFC768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, + DOI 10.17487/RFC0768, August 1980, + <https://www.rfc-editor.org/info/rfc768>. + + [RFC793] Postel, J., "Transmission Control Protocol", STD 7, + RFC 793, DOI 10.17487/RFC0793, September 1981, + <https://www.rfc-editor.org/info/rfc793>. + + [RFC1035] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, + November 1987, <https://www.rfc-editor.org/info/rfc1035>. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, + December 1998, <https://www.rfc-editor.org/info/rfc2460>. + + [RFC2904] Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., + Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., and + D. Spence, "AAA Authorization Framework", RFC 2904, + DOI 10.17487/RFC2904, August 2000, + <https://www.rfc-editor.org/info/rfc2904>. + + [RFC3095] Bormann, C., Burmeister, C., Degermark, M., Fukushima, H., + Hannu, H., Jonsson, L-E., Hakenberg, R., Koren, T., Le, + K., Liu, Z., Martensson, A., Miyazaki, A., Svanbro, K., + Wiebke, T., Yoshimura, T., and H. Zheng, "RObust Header + Compression (ROHC): Framework and four profiles: RTP, UDP, + ESP, and uncompressed", RFC 3095, DOI 10.17487/RFC3095, + July 2001, <https://www.rfc-editor.org/info/rfc3095>. + + + + +Farrell Informational [Page 35] + +RFC 8376 LPWAN Overview May 2018 + + + [RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, + C., and M. Carney, "Dynamic Host Configuration Protocol + for IPv6 (DHCPv6)", RFC 3315, DOI 10.17487/RFC3315, July + 2003, <https://www.rfc-editor.org/info/rfc3315>. + + [RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. + Thubert, "Network Mobility (NEMO) Basic Support Protocol", + RFC 3963, DOI 10.17487/RFC3963, January 2005, + <https://www.rfc-editor.org/info/rfc3963>. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, + December 2005, <https://www.rfc-editor.org/info/rfc4301>. + + [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet + Control Message Protocol (ICMPv6) for the Internet + Protocol Version 6 (IPv6) Specification", STD 89, + RFC 4443, DOI 10.17487/RFC4443, March 2006, + <https://www.rfc-editor.org/info/rfc4443>. + + [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, + "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, + DOI 10.17487/RFC4861, September 2007, + <https://www.rfc-editor.org/info/rfc4861>. + + [RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler, + "Transmission of IPv6 Packets over IEEE 802.15.4 + Networks", RFC 4944, DOI 10.17487/RFC4944, September 2007, + <https://www.rfc-editor.org/info/rfc4944>. + + [RFC5216] Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS + Authentication Protocol", RFC 5216, DOI 10.17487/RFC5216, + March 2008, <https://www.rfc-editor.org/info/rfc5216>. + + [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security + (TLS) Protocol Version 1.2", RFC 5246, + DOI 10.17487/RFC5246, August 2008, + <https://www.rfc-editor.org/info/rfc5246>. + + [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., + Housley, R., and W. Polk, "Internet X.509 Public Key + Infrastructure Certificate and Certificate Revocation List + (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, + <https://www.rfc-editor.org/info/rfc5280>. + + + + + + + +Farrell Informational [Page 36] + +RFC 8376 LPWAN Overview May 2018 + + + [RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6 + Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, + DOI 10.17487/RFC6282, September 2011, + <https://www.rfc-editor.org/info/rfc6282>. + + [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. + Bormann, "Neighbor Discovery Optimization for IPv6 over + Low-Power Wireless Personal Area Networks (6LoWPANs)", + RFC 6775, DOI 10.17487/RFC6775, November 2012, + <https://www.rfc-editor.org/info/rfc6775>. + + [RFC6961] Pettersen, Y., "The Transport Layer Security (TLS) + Multiple Certificate Status Request Extension", RFC 6961, + DOI 10.17487/RFC6961, June 2013, + <https://www.rfc-editor.org/info/rfc6961>. + + [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained + Application Protocol (CoAP)", RFC 7252, + DOI 10.17487/RFC7252, June 2014, + <https://www.rfc-editor.org/info/rfc7252>. + + [RFC7452] Tschofenig, H., Arkko, J., Thaler, D., and D. McPherson, + "Architectural Considerations in Smart Object Networking", + RFC 7452, DOI 10.17487/RFC7452, March 2015, + <https://www.rfc-editor.org/info/rfc7452>. + + [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., + Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low + Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, + <https://www.rfc-editor.org/info/rfc7668>. + + [RFC8065] Thaler, D., "Privacy Considerations for IPv6 Adaptation- + Layer Mechanisms", RFC 8065, DOI 10.17487/RFC8065, + February 2017, <https://www.rfc-editor.org/info/rfc8065>. + + [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", STD 86, RFC 8200, + DOI 10.17487/RFC8200, July 2017, + <https://www.rfc-editor.org/info/rfc8200>. + + [RFC8240] Tschofenig, H. and S. Farrell, "Report from the Internet + of Things Software Update (IoTSU) Workshop 2016", + RFC 8240, DOI 10.17487/RFC8240, September 2017, + <https://www.rfc-editor.org/info/rfc8240>. + + + + + + + +Farrell Informational [Page 37] + +RFC 8376 LPWAN Overview May 2018 + + + [Sigfox] Zuniga, J. and B. PONSARD, "Sigfox System Description", + Work in Progress, + draft-zuniga-lpwan-sigfox-system-description-04, December + 2017. + + [TGPP23720] + 3GPP, "Study on architecture enhancements for Cellular + Internet of Things", 3GPP TS 23.720 13.0.0, 2016. + + [TGPP33203] + 3GPP, "3G security; Access security for IP-based + services", 3GPP TS 23.203 13.1.0, 2016. + + [TGPP36201] + 3GPP, "Evolved Universal Terrestrial Radio Access + (E-UTRA); LTE physical layer; General description", 3GPP + TS 36.201 13.2.0, 2016. + + [TGPP36300] + 3GPP, "Evolved Universal Terrestrial Radio Access (E-UTRA) + and Evolved Universal Terrestrial Radio Access Network + (E-UTRAN); Overall description; Stage 2", 3GPP TS 36.300 + 13.4.0, 2016, + <http://www.3gpp.org/ftp/Specs/2016-09/Rel-14/36_series/>. + + [TGPP36321] + 3GPP, "Evolved Universal Terrestrial Radio Access + (E-UTRA); Medium Access Control (MAC) protocol + specification", 3GPP TS 36.321 13.2.0, 2016. + + [TGPP36322] + 3GPP, "Evolved Universal Terrestrial Radio Access + (E-UTRA); Radio Link Control (RLC) protocol + specification", 3GPP TS 36.322 13.2.0, 2016. + + [TGPP36323] + 3GPP, "Evolved Universal Terrestrial Radio Access + (E-UTRA); Packet Data Convergence Protocol (PDCP) + specification (Not yet available)", 3GPP TS 36.323 13.2.0, + 2016. + + [TGPP36331] + 3GPP, "Evolved Universal Terrestrial Radio Access + (E-UTRA); Radio Resource Control (RRC); Protocol + specification", 3GPP TS 36.331 13.2.0, 2016. + + + + + + +Farrell Informational [Page 38] + +RFC 8376 LPWAN Overview May 2018 + + + [USES-6LO] Hong, Y., Gomez, C., Choi, Y-H., and D-Y. Ko, "IPv6 over + Constrained Node Networks(6lo) Applicability & Use cases", + Work in Progress, draft-hong-6lo-use-cases-03, October + 2016. + + [wisun-pressie1] + Beecher, P., "Wi-SUN Alliance", March 2017, + <http://indiasmartgrid.org/event2017/10-03-2017/4.%20Round + table%20on%20Communication%20and%20Cyber%20Security/1.%20P + hil%20Beecher.pdf>. + + [wisun-pressie2] + Heile, B., "Wi-SUN Alliance Field Area Network + (FAN)Overview", As presented at IETF 97, November 2016, + <https://www.ietf.org/proceedings/97/slides/ + slides-97-lpwan-35-wi-sun-presentation-00.pdf>. + +Acknowledgments + + Thanks to all those listed in the Contributors section for the + excellent text. Errors in the handling of that are solely the + editor's fault. + + In addition to those in the Contributors section, thanks are due to + (in alphabetical order) the following for comments: + + Abdussalam Baryun + Andy Malis + Arun (arun@acklio.com) + Behcet SariKaya + Dan Garcia Carrillo + Jiazi Yi + Mirja Kuhlewind + Paul Duffy + Russ Housley + Samita Chakrabarti + Thad Guidry + Warren Kumari + + Alexander Pelov and Pascal Thubert were the LPWAN WG Chairs while + this document was developed. + + Stephen Farrell's work on this memo was supported by Pervasive + Nation, the Science Foundation Ireland's CONNECT centre national IoT + network <https://connectcentre.ie/pervasive-nation/>. + + + + + + +Farrell Informational [Page 39] + +RFC 8376 LPWAN Overview May 2018 + + +Contributors + + As stated above, this document is mainly a collection of content + developed by the full set of contributors listed below. The main + input documents and their authors were: + + o Text for Section 2.1 was provided by Alper Yegin and Stephen + Farrell in [LoRaWAN]. + + o Text for Section 2.2 was provided by Antti Ratilainen in [NB-IoT]. + + o Text for Section 2.3 was provided by Juan Carlos Zuniga and Benoit + Ponsard in [Sigfox]. + + o Text for Section 2.4 was provided via personal communication from + Bob Heile and was authored by Bob and Sum Chin Sean. There is no + Internet-Draft for that at the time of writing. + + o Text for Section 4 was provided by Ana Minabiru, Carles Gomez, + Laurent Toutain, Josep Paradells, and Jon Crowcroft in + [LPWAN-GAP]. Additional text from that document is also used + elsewhere above. + + The full list of contributors is as follows: + + Jon Crowcroft + University of Cambridge + JJ Thomson Avenue + Cambridge, CB3 0FD + United Kingdom + + Email: jon.crowcroft@cl.cam.ac.uk + + + Carles Gomez + UPC/i2CAT + C/Esteve Terradas, 7 + Castelldefels 08860 + Spain + + Email: carlesgo@entel.upc.edu + + + + + + + + + + +Farrell Informational [Page 40] + +RFC 8376 LPWAN Overview May 2018 + + + Bob Heile + Wi-Sun Alliance + 11 Robert Toner Blvd, Suite 5-301 + North Attleboro, MA 02763 + United States of America + + Phone: +1-781-929-4832 + Email: bheile@ieee.org + + + Ana Minaburo + Acklio + 2bis rue de la Chataigneraie + 35510 Cesson-Sevigne Cedex + France + + Email: ana@ackl.io + + + Josep PAradells + UPC/i2CAT + C/Jordi Girona, 1-3 + Barcelona 08034 + Spain + + Email: josep.paradells@entel.upc.edu + + + Charles E. Perkins + Futurewei + 2330 Central Expressway + Santa Clara, CA 95050 + United States of America + + Email: charliep@computer.org + + + Benoit Ponsard + Sigfox + 425 rue Jean Rostand + Labege 31670 + France + + Email: Benoit.Ponsard@sigfox.com + URI: http://www.sigfox.com/ + + + + + + +Farrell Informational [Page 41] + +RFC 8376 LPWAN Overview May 2018 + + + Antti Ratilainen + Ericsson + Hirsalantie 11 + Jorvas 02420 + Finland + + Email: antti.ratilainen@ericsson.com + + + Chin-Sean SUM + Wi-Sun Alliance + 20, Science Park Rd 117674 + Singapore + + Phone: +65 6771 1011 + Email: sum@wi-sun.org + + + Laurent Toutain + Institut MINES TELECOM ; TELECOM Bretagne + 2 rue de la Chataigneraie + CS 17607 + 35576 Cesson-Sevigne Cedex + France + + Email: Laurent.Toutain@telecom-bretagne.eu + + + Alper Yegin + Actility + Paris + France + + Email: alper.yegin@actility.com + + + Juan Carlos Zuniga + Sigfox + 425 rue Jean Rostand + Labege 31670 + France + + Email: JuanCarlos.Zuniga@sigfox.com + URI: http://www.sigfox.com/ + + + + + + + +Farrell Informational [Page 42] + +RFC 8376 LPWAN Overview May 2018 + + +Author's Address + + Stephen Farrell (editor) + Trinity College Dublin + Dublin 2 + Ireland + + Phone: +353-1-896-2354 + Email: stephen.farrell@cs.tcd.ie + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Farrell Informational [Page 43] + |