1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
|
Internet Architecture Board (IAB) H. Tschofenig
Request for Comments: 6574 J. Arkko
Category: Informational April 2012
ISSN: 2070-1721
Report from the Smart Object Workshop
Abstract
This document provides an overview of a workshop held by the Internet
Architecture Board (IAB) on 'Interconnecting Smart Objects with the
Internet'. The workshop took place in Prague on 25 March 2011. The
main goal of the workshop was to solicit feedback from the wider
community on their experience with deploying IETF protocols in
constrained environments. This report summarizes the discussions and
lists the conclusions and recommendations to the Internet Engineering
Task Force (IETF) community.
Note that this document is a report on the proceedings of the
workshop. The views and positions documented in this report are
those of the workshop participants and do not necessarily reflect IAB
views and positions.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Architecture Board (IAB)
and represents information that the IAB has deemed valuable to
provide for permanent record. Documents approved for publication by
the IAB are not a candidate for any level of Internet Standard; see
Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6574.
Tschofenig & Arkko Informational [Page 1]
^L
RFC 6574 Smart Object Workshop Report April 2012
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Constrained Nodes and Networks . . . . . . . . . . . . . . . . 5
3. Workshop Structure . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Architecture . . . . . . . . . . . . . . . . . . . . . . . 6
3.1.1. One Internet vs. Islands . . . . . . . . . . . . . . . 6
3.1.2. Domain-Specific Stacks and Profiles . . . . . . . . . 8
3.1.3. Which Layer? . . . . . . . . . . . . . . . . . . . . . 9
3.2. Sleeping Nodes . . . . . . . . . . . . . . . . . . . . . . 10
3.3. Security . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4. Routing . . . . . . . . . . . . . . . . . . . . . . . . . 14
4. Conclusions and Next Steps . . . . . . . . . . . . . . . . . . 16
5. Security Considerations . . . . . . . . . . . . . . . . . . . 19
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 20
7. Informative References . . . . . . . . . . . . . . . . . . . . 20
Appendix A. Program Committee . . . . . . . . . . . . . . . . . . 25
Appendix B. Workshop Materials . . . . . . . . . . . . . . . . . 25
Appendix C. Accepted Position Papers . . . . . . . . . . . . . . 25
Appendix D. Workshop Participants . . . . . . . . . . . . . . . . 30
Appendix E. IAB Members at the Time of Approval . . . . . . . . . 32
Tschofenig & Arkko Informational [Page 2]
^L
RFC 6574 Smart Object Workshop Report April 2012
1. Introduction
The Internet Architecture Board (IAB) holds occasional workshops
designed to consider long-term issues and strategies for the Internet
and to suggest future directions for the Internet architecture. This
long-term planning function of the IAB is complementary to the
ongoing engineering efforts performed by working groups of the
Internet Engineering Task Force (IETF), under the leadership of the
Internet Engineering Steering Group (IESG) and area directorates.
Today's Internet is experienced by users as a set of applications,
such as email, instant messaging, and services on the Web. While
these applications do not require users to be present at the time of
service execution, in many cases they are. There are also
substantial differences in performance among the various end devices,
but in general end devices participating in the Internet are
considered to have high performance.
There are, however, a large number of deployed embedded devices, and
there is substantial value in interconnecting them with the Internet.
The term "Internet of Things" denotes a trend where a large number of
devices employ communication services offered by the Internet
protocols. Many of these devices are not directly operated by
humans, but exist as components in buildings or vehicles, or are
spread out in the environment. There is a large variation in the
computing power, available memory, (electrical) power, and
communications bandwidth between different types of devices.
Many of these devices offer a range of new possibilities or provide
additional value for previously unconnected devices. Some devices
have been connected using proprietary communication networks in the
past but are now migrating to the use of the Internet Protocol suite
in order to share the same communication network between all
applications and to enable rich communications services.
Much of this development can simply run on existing Internet
protocols. For instance, home entertainment and monitoring systems
often offer a Web interface to the end user. In many cases the new,
constrained environments can benefit from additional protocols and
protocol extensions that help optimize the communications and lower
the computational requirements. Examples of currently ongoing
standardization efforts targeted for these environments include the
Constrained RESTful Environments (CoRE), IPv6 over Low power WPAN
(6LoWPAN), Routing Over Low power and Lossy networks (ROLL), and the
Light-Weight Implementation Guidance (LWIG) working groups of the
IETF.
Tschofenig & Arkko Informational [Page 3]
^L
RFC 6574 Smart Object Workshop Report April 2012
This workshop explored the experiences of researchers and developers
when considering the characteristics of constrained devices.
Engineers know that many design considerations need to be taken into
account when developing protocols and architecture. Balancing
between the conflicting goals of code size, economic incentives,
power consumption, usability, and security is often difficult, as
illustrated by Clark et al. in "Tussle in Cyberspace: Defining
Tomorrow's Internet" [Tussle].
Participants at the workshop discussed the experience and approaches
taken when designing protocols and architectures for interconnecting
smart objects to the Internet. The scope of the investigations
included constrained nodes as well as constrained networks.
The call for position papers suggested investigating the area of
integration with the Internet in the following categories:
o Scalability
o Power efficiency
o Interworking between different technologies and network domains
o Usability and manageability
o Security and privacy
The goals of the workshop can be summarized as follows:
As many deployed smart objects demonstrate, running protocols like
the Internet Protocol Version 4 [RFC0791] and Version 6 [RFC2460],
the User Datagram Protocol (UDP) [RFC0768], the Transmission
Control Protocol (TCP) [RFC0793], the Hypertext Transfer Protocol
(HTTP) [RFC2616], etc., on constrained devices is clearly
possible. Still, protocol designers, system architects, and
developers have to keep various limitations in mind. The
organizers were interested to discuss the experience with
deploying IETF protocols in different constrained environments.
Furthermore, the organizers were seeking to identify issues either
where current implementers do not yet have solutions or where
researchers predict potential issues.
The workshop served as a venue to identify problems and to
discover common interests that may turn into new work or into
changes in direction of already ongoing work at the IETF and or
the Internet Research Task Force (IRTF).
Tschofenig & Arkko Informational [Page 4]
^L
RFC 6574 Smart Object Workshop Report April 2012
2. Constrained Nodes and Networks
The workshop was spurred by the increasing presence of constrained
devices on the network. It is quite natural to ask how these
limitations impact the design of the affected nodes. Note that not
all nodes suffer from the same set of limitations.
Energy constraints:
Since wireless communication can be a large portion of the power
budget for wireless devices, reducing unnecessary communication
can significantly increase the battery life of a low-end device.
The choice of low-power radio can also significantly impact the
overall energy consumption, as can sleeping periodically, when the
device is not in use. In some cases, these nodes will only wake
periodically to handle needed communications. This constraint is
quite in contrast to the "always on" paradigm found in regular
Internet hosts. Even in the case of non-battery operated devices,
power is a constraint with respect to energy efficiency goals.
Bandwidth constraints:
Various low-power radio networks offer only limited bandwidth, and
show high packet loss as well as high link quality variability.
The data transmission rates vary from 20 to 900 kilobits per
second (e.g., in the case of IEEE 802.15.4). Nodes may be used in
usually highly unstable radio environments. The physical-layer
packet size may be limited (~100 bytes).
Memory constraints:
The amount of volatile and persistent storage impacts the program
execution and has important implications for the functionality of
the protocol stack. The Arduino UNO board, for example, provides
a developer with 2 KB RAM and 32 KB flash memory (without any
extensions, such as microSD cards).
A system designer also needs to consider CPU constraints, which often
relate to energy constraints: a processor with lower performance
consumes less energy. As described later in this document, the
design of the mainboard may allow certain components to be put to
sleep to further lower energy consumption. In general, embedded
systems are often purpose built with only the hardware components
needed for the given task, while general-purpose personal computers
are less constrained with regard to their mainboard layout and
typically offer a huge number of optional plug-in peripherals to be
connected. A factor that also has to be taken into consideration is
the intended usage environment. For example, a humidity sensor
Tschofenig & Arkko Informational [Page 5]
^L
RFC 6574 Smart Object Workshop Report April 2012
deployed outside a building may need to deal with temperatures from
-50 degrees C to +85 degrees C. There are often physical size
limitations for smart objects. While traditional mainboards are
rather large, such as the Advanced Technology eXtended (ATX) design
with a board size of 305 x 244 mm available in many PCs or the mini-
ITX design typically found in home theater PCs with 170 x 170 mm,
mainboard layouts for embedded systems are typically much smaller,
such as the CoreExpress layout with 58 x 65 mm, or even smaller. In
addition to the plain mainboard, additional sensors, peripherals, a
power adapter/battery, and a case have to be taken into
consideration. Finally, there are cost restrictions as well.
The situation becomes more challenging when not only the hosts are
constrained but also the network nodes themselves.
While there are constantly improvements being made, Moore's law tends
to be less effective in the embedded system space than in personal
computing devices: gains made available by increases in transistor
count and density are more likely to be invested in reductions of
cost and power requirements than into continual increases in
computing power.
3. Workshop Structure
With the ongoing work on connecting smart objects to the Internet,
there are many challenges the workshop participants raised in more
than 70 accepted position papers. With a single workshop day,
discussions had to be focused, and priority was given to those topics
that had been raised by many authors. A summary of the identified
issues are captured in the subsections below.
3.1. Architecture
A number of architectural questions were brought up in the workshop.
This is natural, as the architectural choices affect the required
technical solutions and the need for standards. At this workshop,
questions regarding the separation of traffic, the need for profiling
for application-specific domains, the demand for data-model-specific
standardization, as well as the design choices regarding the layer at
which functionality should be put were discussed and are briefly
summarized below.
3.1.1. One Internet vs. Islands
Devices that used to be in proprietary or application-specific
networks are today migrating to IP networks. There is, however, the
question of whether these smart objects are now on the same IP
network as any other application. Controlled applications, like the
Tschofenig & Arkko Informational [Page 6]
^L
RFC 6574 Smart Object Workshop Report April 2012
fountains in front of the Bellagio hotel in Las Vegas that are
operated as a distributed control system [Dolin], probably are not
exchanging their control messages over the same network that is also
used by hotel guests for their Internet traffic. The same had been
argued for smart grids, which are described as follows in
[SmartGrid]:
A smart grid is a digitally enabled electrical grid that gathers,
distributes, and acts on information about the behavior of all
participants (suppliers and consumers) in order to improve the
efficiency, reliability, economics, and sustainability of
electricity services.
The question that was raised during the workshop is, therefore, in
what sense are we talking about one Internet or about using IP
technology for a separate, "walled garden" network that is
independent of the Internet?
Cullen Jennings compared the current state of smart object deployment
with the evolution of Voice over IP (VoIP): "Initially, many vendors
recommended to run VoIP over a separate VLAN or a separate
infrastructure. Nobody could imagine how to make the type of real-
time guarantees, how to debug it, and how to get it to work because
the Internet is not ideally suited for making any types of guarantees
for real-time systems. As time went on, people got better at making
voice work across that type of IP network. They suddenly noticed
that having voice running on a separate virtual network than their
other applications was a disaster. They couldn't decide if a PC was
running a softphone and whether it went on a voice or a data network.
At that point, people realized that they needed a converged network
and all moved to one. I wouldn't be surprised to see the same happen
here. Initially, we will see very separated networks. Then, those
will be running over the same hardware to take advantage of the cost
benefits of not having to deploy multiple sets of wires around
buildings. Over time, there will be strong needs to directly
communicate with each other. We need to be designing the system for
the long run. Assume everything will end up on the same network even
if you initially plan to run it in separate networks."
It is clearly possible to let sensors in a building communicate
through the wireless access points and through the same
infrastructure used for Internet access, if you want to. Those who
want separation at the physical layer can do so as well. What is
important is to make sure that these different deployment
philosophies do not force loss of interoperability.
Tschofenig & Arkko Informational [Page 7]
^L
RFC 6574 Smart Object Workshop Report April 2012
The level of interoperability that IP accomplished fostered
innovation at the application layer. Ralph Droms reinforced this
message by saying: "Bright people will take a phone, build an
application and connect it, with the appropriate security controls in
place, to the things in my house in ways we have never thought about
before. Otherwise, we are just building another telephone network."
3.1.2. Domain-Specific Stacks and Profiles
Imagine a building network scenario where a new light bulb is
installed that should, out of the box without further configuration,
interoperate with the already present light switch from a different
vendor in the room. For many, this is the desired level of
interoperability in the area of smart object design. To accomplish
this level of interoperability, it is not sufficient to provide
interoperability only at the network layer. Even running the same
transport protocol and application-layer protocol (e.g., HTTP) is
insufficient since both devices need to understand the semantics of
the payloads for "Turn the light on" as well.
Standardizing the entire protocol stack for this specific "light
switch / light bulb" scenario is possible. A possible stack would,
for example, use IPv6 with a specific address configuration mechanism
(such as stateless address autoconfiguration), a network access
authentication security mechanism such as Protocol for carrying
Authentication for Network Access (PANA) [RFC5191], a service
discovery mechanism (e.g., multicast DNS with DNS-Based Service
Discovery [DNS-SD]), an application-layer protocol, for example,
Constrained Application Protocol (CoAP) [CoAP] (which uses UDP), and
the syntax and semantic for the light on/off functionality.
As this list shows, there is already some amount of protocol
functionality that has to be agreed on by various stakeholders to
make this scenario work seamlessly. As we approach more complex
protocol interactions, the functionality quickly becomes more
complex: IPv4 and IPv6 on the network layer, various options at the
transport layer (such as UDP, TCP, the Stream Control Transmission
Protocol (SCTP) [RFC4960], and the Datagram Congestion Control
Protocol (DCCP) [RFC4340]), and there are plenty of choices at the
application layer with respect to communication protocols, data
formats and data models. Different requirements have led to the
development of a variety of communication protocols: client-server
protocols in the style of the original HTTP, publish-subscribe
protocols (like the Session Initiation Protocol (SIP) [RFC3261] or
Extensible Messaging and Presence Protocol (XMPP) [RFC6121]), and
store-and-forward messaging (borrowed from the delay tolerant
Tschofenig & Arkko Informational [Page 8]
^L
RFC 6574 Smart Object Workshop Report April 2012
networking community). Along with the different application-layer
communication protocols come various identity and security
mechanisms.
With the smart object constraints, it feels natural to develop these
stacks since each application domain (e.g., healthcare, smart grids,
building networking) will have their unique requirements and their
own community involved in the design process. How likely are these
profiles going to be the right match for the future, specifically for
the new innovations that will come? How many of these stacks are we
going to have? Will the differences in the profiles purely be the
result of different requirements coming from the individual
application domains or will these mismatches reflect the spirit,
understanding, and preferences of the community designing them? How
many stacks will multipurpose devices have to implement?
Standardizing profiles independently for each application is not the
only option. Another option is to let many different applications
utilize a common foundation, i.e., a protocol stack that is
implemented and utilized by every device. This, however, requires
various application domains to be analyzed for their common
characteristics and to identify requirements that are common across
all of them. The level of difficulty for finding an agreement of how
such a foundation stack should look depends on how many layers it
covers and how lightweight it has to be.
From the discussions at the workshop, it was clear that the available
options are not ideal and further discussions are needed.
3.1.3. Which Layer?
The end-to-end principle states that functionality should be put into
the end points instead of into the networks. An additional
recommendation, which is equally important, is to put functionality
higher up in the protocol stack. While it is useful to make common
functionality available as building blocks to higher layers, the wide
range of requirements by different applications led to a model where
lower layers provide only very basic functionality and more
sophisticated features were made available by various applications.
Still, there has been the desire to put application-layer
functionality into the lower layers of the networking stack. A
common belief is that performance benefits can be gained if
functionality is placed at the lower layers of the protocol stack.
This new functionality may be offered in the form of a gateway, which
bridges different communication technologies, acts on behalf of other
nodes, and offers more generic functionality (such as name-based
routing and caching).
Tschofenig & Arkko Informational [Page 9]
^L
RFC 6574 Smart Object Workshop Report April 2012
Two examples of functionality offered at the network layer and
discussed during the workshops were location and name-based routing:
Location:
The notion of location gives each network node the understanding
of proximity (e.g., 'I am a light bulb and in the same room as the
light switch.'). Today, a router may provide information as to
whether other nodes belong to the same subnet or they may provide
location information (for example, in the form of GPS-based
coordinates). However, providing a sense of the specific
environment (e.g., a room, building, campus, etc.) is not possible
without manual configuration. While it has been a desirable
feature for many ubiquitous computing applications to know this
type of information and to use it for richer application-layer
interactions, widespread deployment has not happened yet.
Name-Based Routing:
With the work on recent "clean slate" architecture proposals, such
as named data networking, flexible naming concepts are being
researched to allow application developers to express their
application-layer concepts in a way that they can be used natively
by the underlying networking stack without translation. For
example, Jeff Burke provided the example of his work in a theater
with a distributed control system of technical equipment (such as
projectors, dimmers, and light systems). Application developers
name their equipment with human-readable identifiers, which may
change after the end of a rehearsal, and address them using these
names. These naming concepts based on variable-length strings
raise questions regarding scalability.
The workshop participants were not able to come to an agreement about
what functionality should be moved from the application layer to the
network layer.
3.2. Sleeping Nodes
One limitation of smart objects is their available energy. To extend
battery life, for example, of a watch battery or single AAA battery
for months, these low-power devices have to sleep 99% to 99.5% of
their time. For example, a light sensor may only wake up to check
whether it is nighttime to turn on light bulbs. Most parts of the
system, particularly communication components, are put into a
sleeping state (e.g., WLAN radio interface) and selected components,
Tschofenig & Arkko Informational [Page 10]
^L
RFC 6574 Smart Object Workshop Report April 2012
such as sensors, periodically check for relevant events and, if
necessary, turn on other hardware modules. Every bit is precious, as
is every round trip and every millisecond of radio activity.
Many IETF protocols are implicitly designed to be always on, i.e.,
the protocol implementation waits for and reacts to incoming
messages, and may maintain session state (at various layers of the
stack). These protocols work well when energy consumption is not a
concern and when receiving and sending messages happen at a low cost.
It should be understood that energy is consumed both in transmitting
messages (and often more importantly) in keeping the receiver awake.
Allowing devices to sleep most of the time preserves energy but
creates challenges for protocol designs.
The inherent issue encountered by a stationary node resuming from
sleep is that another node may have chosen the same address while the
node was asleep. A number of steps have to be taken before sending a
packet. A new address may have to be obtained, for example using the
Dynamic Host Configuration Protocol (DHCP) or stateless address
autoconfiguration. Optionally, Detecting Network Attachment (DNA)
procedures (see [RFC4436] and [RFC6059]) can be used to shorten the
setup time by noticing that the node is using the same default
gateway.
The issue with a mobile node that is sleeping is that the node may
have been moved to another network (e.g., a sleeping laptop being
transported to a new environment) where on resumption it may discover
that its address has become invalid.
The following design considerations should be taken into account when
energy efficiency is a concern:
1. Rethink the Always-On Assumption
When designing a protocol that assumes that the nodes are always
on, alternatives need to be considered. This could involve
eliminating functionality (e.g., not implementing DNA or
duplicate address detection) or considering the use of a sleep
proxy. While sleep proxies (e.g., proxZzzy(TM) [proxZzzy])
enable periodic messages to be sent on behalf of sleeping nodes,
this approach assumes that energy management constraints do not
apply to the sleep proxy, which may not always be the case (e.g.,
if the entire network is deployed in the field without access to
power). Yet another option is for devices to explicitly
communicate sleep cycles so that they can only check for messages
periodically (be it measured in milliseconds, seconds, or hours).
Tschofenig & Arkko Informational [Page 11]
^L
RFC 6574 Smart Object Workshop Report April 2012
This is the approach taken in IEEE 802.11, which supports
multiple energy conservation mechanisms designed to enable a
station to spend a large fraction of the time sleeping.
2. Reduce Network Attachment Costs
As noted above, the procedures for obtaining an address and
assuring its uniqueness can be costly. In a network where nodes
spend a large fraction of the time sleeping, but are not
necessarily mobile, are all of these procedures really necessary?
Can we find ways to reduce the number of protocol interactions
without sacrificing correctness? The main focus of past
investigations has been on IPv6 and ND, but other protocols do
also deserve a deeper investigation, such as DNS and DHCP.
3. Avoid Verbose Protocols
Protocols involving multiple roundtrips and/or lengthy messages
with verbose encodings (e.g., XML) are not always well-suited for
constrained environments. Low-power nodes utilizing verbose
protocols have to use more energy in sending messages and have to
stay powered on for a longer period of time as they wait for the
multi-roundtrip protocol exchanges to complete.
The best way to address these problems is to ensure that the
simplest possible protocol exchanges are used when the protocols
in question are designed. In some cases, alternative encoding
formats and compression may also help.
4. Think about System-Wide Efficiency
While energy efficiency is critical for low-power devices running
on batteries, it is also beneficial for other devices as well,
including notebook computers, desktop computers, and smartphones.
However, if the goal is energy efficiency as opposed to battery
life extension for low-power devices, then it is important to
consider the total energy consumption of all the elements of the
system.
For example, consider energy consumption in a home environment.
In these scenarios it is important to evaluate the energy usage
of the entire system. A light bulb utilizing Internet technology
described in this document may use less power but there is also
the device that controls the bulb that may consume a lot of
energy. If the goal is to reduce overall energy usage, then it
is important to consider these two devices (and potentially many
others) together.
Tschofenig & Arkko Informational [Page 12]
^L
RFC 6574 Smart Object Workshop Report April 2012
3.3. Security
In the development of smart object applications, as with any other
protocol application solution, security has to be considered early in
the design process. As such, the recommendations currently provided
to IETF protocol architects, such as RFC 3552 [RFC3552] and RFC 4101
[RFC4101], apply also to the smart object space.
While there are additional constraints, as described in Section 2,
security has to be a mandatory part of the solution. The hope is
that this will lead to implementations that provide security
features, deployments that utilize them, and finally use of better
security mechanisms. It is important to point out that the lack of
direct user interaction will place hard requirements on deployment
models, configuration mechanisms, and software upgrade /
crypto-agility mechanisms.
Since many of the security mechanisms allow for customization,
particularly with regard to the cryptographic primitives utilized,
many believe that IETF security solutions are usable without
modifications in a large part of the smart object domain. Others
call for new work on cryptographic primitives that make use of a
single primitive (such as the Advanced Encryption Standard (AES)
[AES]) as a building block for all cryptographic functions. The
benefit would be a smaller footprint of the overall solution,
specifically with respect to hardware limitations (e.g., the hardware
architecture of certain embedded devices prevents pipelining from
being used). In the excitement for new work on optimizations of
cryptographic primitives, other factors have to be taken into
consideration that influence successful deployment, such as
widespread support in libraries, as well as intellectual property
rights (IPR). As an example of the latter aspect, the struggle of
Elliptic Curve Cryptography (ECC)-based cryptographic algorithms
[ECC] to find deployment can partially be attributed to its IPR
situation. The reuse of libraries providing cryptographic functions
is clearly an important way to use available memory resources in a
more efficient way. To deal with the performance and footprint
concerns, investigations into offloading certain resource-hungry
functions to parties that possess more cryptographic power have been
considered. For example, the ability to delegate certificate
validation to servers has been standardized in the IETF before, for
the support of the Online Certificate Status Protocol (OCSP) in the
Internet Key Exchange protocol version 2 (IKEv2) and in Transport
Layer Security (TLS); see [RFC4806] and [RFC5246], respectively.
Focusing only on the cryptographic primitives would be shortsighted;
many would argue that this is the easy part of a smart object
security solution. Key management and credential enrollment,
Tschofenig & Arkko Informational [Page 13]
^L
RFC 6574 Smart Object Workshop Report April 2012
however, are considered a big challenge by many, particularly when
usability requirements have to be taken into account. Another group
of challenges concern privacy; with smart grids, for example, some
have voiced concerns regarding the ability of third parties to keep
track of an individual's energy consumption (and draw associated
conclusions). As another example, it is easy to see how a scale that
is connected to the Internet for uploading weight information to a
social network could lead to privacy concerns. While security
mechanisms that are used to offer protection of the communication
between different parties also provide a certain degree of privacy
protection, they are clearly not enough to address all concerns.
Even with the best communication security and access control
mechanisms in place, one still needs additional safeguards against
the concerns mentioned in the examples.
While better deployment of security protocols on the entire Internet
would be very desirable, practical considerations regarding usability
and the incentives of the stakeholders involved have often lead to
slower adoption.
3.4. Routing
A smart object network environment may also employ routers under
similar constraints as the end devices. Currently two approaches to
routing in these low-power and lossy networks are under consideration
-- namely, mesh-under and route-over. The so-called "mesh-under"
approach places routing functions at the link layer, and consequently
all devices appear as immediate neighbors at the network layer. With
the "route-over" approach, routing is done in the IP layer and not at
all in the link layer. Each physical hop appears as a single IP hop
(ignoring devices that just extend the physical range of signaling,
such as repeaters). Routing in this context means running a routing
protocol. The IPv6 Routing Protocol for Low-power and Lossy Networks
(RPL) [RPL], for example, belongs to the route-over category.
From an architectural point of view there are several questions that
arise from where routing is provided, for example:
o Protocols often assume that link characteristics are predictable
when communicating with any device attached to the same link.
Latency, throughput, and reliability may vary considerably between
different devices that are multiple link-layer hops away. What
timeout should be used? What happens if a device is unreachable?
In case of default router selection, two advertised routers may be
a different number of hops away. Should a device have visibility
into the path to make a decision, and what path characteristics
would be useful to have?
Tschofenig & Arkko Informational [Page 14]
^L
RFC 6574 Smart Object Workshop Report April 2012
o Scoped message delivery to a neighboring IP hop (via link-local
addressing) allows certain types of IP protocols to communicate
with their immediate neighbors and to therefore scope their
recipients. A link-local multicast message will be received by
all nodes in the same IP link-local realm unless some special
optimizations are provided by the link layer.
o When path computations are done at the link layer as well as on
the network layer, then what coordination needs to take place?
When multiple different link-layer technologies are involved in a
network design, routing at layer 3 has to be provided in any case.
[IoT-ARCH] talks about these tradeoffs between route-over and mesh-
under in detail. Furthermore, those who decide about the deployment
have to determine how to connect smart objects to the Internet
infrastructure, and a number of wired and wireless technologies may
be suitable for a specific deployment. Depending on the chosen
technologies the above-mentioned mesh-under vs. route-over approach
will have to be decided, and further decisions will have to be made
about the choice of a specific routing protocol.
In 2008, the IETF formed the Routing Over Low power and Lossy
networks (ROLL) working group to specify a routing solution for smart
object environments. During its first year of existence, the working
group studied routing requirements in detail (see [RFC5867],
[RFC5826], [RFC5673], and [RFC5548]), and it worked on a protocol
survey comparing a number of existing routing protocols, including Ad
hoc On-Demand Distance Vector (AODV)-style protocols [RFC3561],
against the identified requirements. The protocol survey
[PROT-SURVEY] was inconclusive and abandoned without giving rise to
publication of an RFC.
The ROLL WG concluded that a new routing protocol satisfying the
documented requirements has to be developed and the work on RPL was
started as the IETF routing protocol for smart object networks.
Nevertheless, controversial discussions at the workshop about which
routing protocols is best in a given environment are still ongoing.
Thomas Clausen, for example, argued for using an AODV-like routing
protocol in [Clausen].
Tschofenig & Arkko Informational [Page 15]
^L
RFC 6574 Smart Object Workshop Report April 2012
4. Conclusions and Next Steps
The workshop allowed the participants to be exposed to interesting
applications and their requirements (buildings, fountains, theater,
etc.), to have discussions about radically different architectures
and their issues (e.g., information centric networking), to look at
existing technology from a new angle (sleeping nodes, energy
consumption), to focus on some details of the protocol stack
(neighbor discovery, security, routing) and to learn about
implementation experience.
One goal of the workshop was to identify areas that require further
investigation. The list below reflects the thoughts of the workshop
participants as expressed on the day of the workshop. Note that the
suggested items concern potential work by the IETF and the IRTF, and
the order does not imply a particular preference.
Security:
A discussion of security is provided in Section 3.3. In general,
security-related protocol exchanges and the required amount of
computational resource requirements can contribute significantly
to the overall processing. Therefore, it remains a challenge to
accomplish performance improvements without sacrificing the
overall security level, taking the usability of the entire system
into consideration.
Another challenge is how to balance the security and performance
needs of smart objects with the interoperability requirements of
hosts on the Internet since different suites of algorithms tend to
be chosen for these different environments. This involves trade-
offs between performance on the smart objects versus end-to-end
security. Solutions that mandate a "trusted" middlebox whose only
role is to terminate security associations tend to be frowned upon
from the security perspective, especially since end users of
challenged devices (where those exist) are unlikely to understand
the security consequences of such middleboxes.
The discussion concluded with the following recommendations:
* Investigate usability in cryptographic protocol design with
regard to credential management. As an example, the Bluetooth
pairing mechanism was mentioned as a simple and yet reasonably
secure method of introducing devices into a new environment.
In fact, the IETF working group Credential and Provisioning
(ENROLL) was established years ago to deal with residential
Tschofenig & Arkko Informational [Page 16]
^L
RFC 6574 Smart Object Workshop Report April 2012
networks but was terminated prematurely due to lack of
progress. The email archive still exists and is available
[ENROLL] and may provide useful historical information.
* Standardized authentication and key exchange mechanisms should
be surveyed for suitability in smart object environments with
respect to message size, computational performance, number of
messages, code size, and main memory requirements. A starting
point of such an investigation (in the case of IKEv2) was
provided by Tero Kivinen with [MINIMAL-IKEv2], and a suitable
venue for discussion could be the recently established Light-
Weight Implementation Guidance (LWIG) working group [LWIG].
* Research has to be done in the area of lightweight
cryptographic primitives -- namely, block ciphers, stream
ciphers, and cryptographic hash functions. It's worthwhile to
mention the early work with the National Institute of Standards
and Technology (NIST) new cryptographic hash algorithm 'SHA-3'
competition [SHA3]. A suitable forum for discussion is the
IRTF Crypto Forum Research Group (CFRG) [CFRG].
The difficulty and impact of choosing specialized algorithms for
smart objects should not be underestimated. Issues that arise
include the additional specification complexity (e.g., TLS already
has hundreds of ciphersuites defined, most of which are unused in
practice), the long latency in terms of roll out (many hosts are
still using deprecated algorithms 5-10 years after those
algorithms were deprecated), and the barriers that IPR-encumbered
schemes present to widespread deployment. While research on this
topic within CFRG and the cryptographic research community is a
very worthwhile goal, any such algorithms will likely have to
offer very significant benefits before they will be broadly
adopted. 20% less CPU usage is unlikely to be a winning argument
no matter what an algorithm inventor believes.
Energy Design Considerations:
One part of the workshop was focused on the discussion of energy
implications for IETF protocol design with proposals being made
about how to extend protocols to better support nodes that are
mostly sleeping. Discussions are encouraged to take place on the
RECIPE mailing list [RECIPE]. The workshop position paper
[Wasserman] by Margaret Wasserman provides a good starting point
for further investigations.
Tschofenig & Arkko Informational [Page 17]
^L
RFC 6574 Smart Object Workshop Report April 2012
Information-/Content-Centric Networking:
Information/Content Centric Networking is about accessing named
content, and a number of research projects have emerged around
this theme. At this point in time, the work is not yet ready for
standardization in the IETF. Instead, the formation of an IRTF
research group has been proposed, and more details are available
on the IRTF DISCUSS mailing list [irtf-discuss].
Architectural Guidelines:
Participants suggested developing an architectural write-up about
what can be done with the IETF protocols we have today and how
these different elements may be combined to offer an explanation
for the broader community. This would be a task for the IAB. An
example of prior work that serves as input is [RFC6272].
Network Management:
While this topic did not make it onto the workshop agenda, it was
considered useful to start a discussion about how to implement
network management protocols, such as Network Configuration
Protocol (NETCONF) [RFC6241], on smart objects. The following
position papers may be useful as a starting point for further
discussions: [Ersue] and [Schoenwaelder]. An IETF draft document
is also available: [SNMP-OPT].
Congestion Control:
When smart objects transmit sensor readings to some server on the
Internet, these protocol interactions often carry a small amount
of data and happen infrequently, although regularly. With the
work on new application protocols, like CoAP [CoAP], the question
of whether a congestion control mechanism should be used at the
underlying transport protocol or by the application protocol
itself arises. [CoAP-CC] is a starting point for CoAP, but
further work is needed.
Data Models:
Standardization of application-layer protocols is important but
does not ensure that, for example, a light switch and a light bulb
are able to interact with each other. One area where participants
saw the need for further work was in the area of data models.
While prior IETF standardization work on, for example, location
[GEOPRIV] can be reused, the question was raised where the IETF
Tschofenig & Arkko Informational [Page 18]
^L
RFC 6574 Smart Object Workshop Report April 2012
should focus its standardization efforts since domain expertise in
each area will be needed. As a potential example, energy pricing
was discussed, with an example provided by [ENERGY-PRICING].
Building Networking:
Network architectures in residential as well as commercial
buildings should take the presence of smart objects and dedicated
subnetworks focusing on smart objects into account. A new working
group, Home Networking (HOMENET) [HOMENET], was created after the
workshop to look at this topic.
Discovery:
Additional extensions to developed discovery protocols, such as
multicast DNS (mDNS), may be needed for the smart object
environment. For instance, the HOMENET working group wants to
extend current discovery protocols to work across multiple
subnets. Smart object networks are often organized in separate
subnets, so these extensions may be useful in that environment as
well.
Routing:
Changing radio conditions and link fluctuation may lead to the
need for renumbering. Workshop participants argued that work
should be started on the multi-link subnetworks to mitigate this
problem, i.e., to extend the notion of a subnet to be able to span
multiple links. With the publication of RFC 4903 [RFC4903], the
Internet Architecture Board had looked into this topic already and
provided pros and cons.
The applicability of specific routing protocols designed for smart
object networks needs further investigation. The ROLL working
group is chartered with the task of constructing an applicability
document for RPL, for instance.
5. Security Considerations
The workshop discussions covered a range of potential engineering
activities, each with its own security considerations. As the IETF
community begins to pursue specific avenues arising out of this
workshop, addressing relevant security requirements will be crucial.
As described in this report, part of the agenda was focused on the
discussion of security; see Section 3.3.
Tschofenig & Arkko Informational [Page 19]
^L
RFC 6574 Smart Object Workshop Report April 2012
6. Acknowledgements
We would like to thank all the participants for their position
papers. The authors of the accepted position papers were invited to
the workshop.
Big thanks to Elwyn Davies for helping us to fix language bugs. We
would also like to thank Andrei Robachevsky, Ulrich Herberg, Thomas
Clausen, Bruce Nordman, Alissa Cooper, Dave Thaler, Bernard Aboba,
and Henning Schulzrinne for their review comments.
Additionally, we would like to thank Ericsson and Nokia Siemens
Networks for their financial support.
7. Informative References
[AES] Wikipedia, "Advanced Encryption Standard",
December 2011, <http://en.wikipedia.org/w/
index.php?title=Advanced_Encryption_Standard&
oldid=481153988>.
[CFRG] McGrew (Chair), D., "IRTF Crypto Forum Research
Group (CFRG)", June 2011, <http://irtf.org/cfrg>.
[Clausen] Clausen, T. and U. Herberg, "Some Considerations on
Routing in Particular and Lossy Environments", IAB
Interconnecting Smart Objects with the Internet
Workshop, Prague, Czech Republic, March 2011,
<http://www.iab.org/wp-content/IAB-uploads/
2011/03/Herberg.pdf>.
[CoAP] Shelby, Z., Hartke, K., Bormann, C., and B. Frank,
"Constrained Application Protocol (CoAP)", Work
in Progress, October 2011.
[CoAP-CC] Eggert, L., "Congestion Control for the Constrained
Application Protocol (CoAP)", Work in Progress,
January 2011.
[DNS-SD] Cheshire, S. and M. Krochmal, "DNS-Based Service
Discovery", Work in Progress, December 2011.
[Dolin] Dolin, B., "Application Communications Requirements
for 'The Internet of Things'", IAB Interconnecting
Smart Objects with the Internet Workshop, Prague,
Czech Republic, March 2011, <http://www.iab.org/
wp-content/IAB-uploads/2011/03/Dolin.pdf>.
Tschofenig & Arkko Informational [Page 20]
^L
RFC 6574 Smart Object Workshop Report April 2012
[ECC] Wikipedia, "Elliptic Curve Cryptography",
December 2011, <http://en.wikipedia.org/w/
index.php?title=Elliptic_curve_cryptography&
oldid=480053167>.
[ENERGY-PRICING] Jennings, C. and B. Nordman, "Communication of
Energy Price Information", Work in Progress,
July 2011.
[ENROLL] "The ietf-enroll Archives",
<http://mailman.mit.edu/pipermail/ietf-enroll/>.
[Ersue] Ersue, M. and J. Korhonen, "Position Paper on
'Interconnecting Smart Objects with the Internet'",
IAB Interconnecting Smart Objects with the Internet
Workshop, Prague, Czech Republic, February 2011,
<http://www.iab.org/wp-content/IAB-uploads/2011/03/
Ersue.pdf>.
[GEOPRIV] IETF, "Geographic Location/Privacy (geopriv)
Working Group",
<http://datatracker.ietf.org/wg/geopriv/>.
[HOMENET] "Home Networking (homenet) Working Group",
<http://datatracker.ietf.org/wg/homenet>.
[IoT-ARCH] Hui, J. and J. Vasseur, "Routing Architecture in
Low-Power and Lossy Networks (LLNs)", Work
in Progress, March 2011.
[LWIG] IETF, "Light-Weight Implementation Guidance (lwig)
Working Group", June 2011,
<http://datatracker.ietf.org/wg/lwig/charter/>.
[MINIMAL-IKEv2] Kivinen, T., "Minimal IKEv2", Work in Progress,
February 2011.
[PROT-SURVEY] Tavakoli, A., Dawson-Haggerty, S., and P. Levis,
"Overview of Existing Routing Protocols for Low
Power and Lossy Networks", Work in Progress,
April 2009.
[RECIPE] "Reducing Energy Consumption with Internet
Protocols Exploration (RECIPE) Mailing List",
<https://www.ietf.org/mailman/listinfo/recipe>.
[RFC0768] Postel, J., "User Datagram Protocol", STD 6,
RFC 768, August 1980.
Tschofenig & Arkko Informational [Page 21]
^L
RFC 6574 Smart Object Workshop Report April 2012
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
September 1981.
[RFC0793] Postel, J., "Transmission Control Protocol", STD 7,
RFC 793, September 1981.
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol,
Version 6 (IPv6) Specification", RFC 2460,
December 1998.
[RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,
Masinter, L., Leach, P., and T. Berners-Lee,
"Hypertext Transfer Protocol -- HTTP/1.1",
RFC 2616, June 1999.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,
Johnston, A., Peterson, J., Sparks, R., Handley,
M., and E. Schooler, "SIP: Session Initiation
Protocol", RFC 3261, June 2002.
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing
RFC Text on Security Considerations", BCP 72,
RFC 3552, July 2003.
[RFC3561] Perkins, C., Belding-Royer, E., and S. Das, "Ad hoc
On-Demand Distance Vector (AODV) Routing",
RFC 3561, July 2003.
[RFC4101] Rescorla, E. and IAB, "Writing Protocol Models",
RFC 4101, June 2005.
[RFC4340] Kohler, E., Handley, M., and S. Floyd, "Datagram
Congestion Control Protocol (DCCP)", RFC 4340,
March 2006.
[RFC4436] Aboba, B., Carlson, J., and S. Cheshire, "Detecting
Network Attachment in IPv4 (DNAv4)", RFC 4436,
March 2006.
[RFC4806] Myers, M. and H. Tschofenig, "Online Certificate
Status Protocol (OCSP) Extensions to IKEv2",
RFC 4806, February 2007.
[RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903,
June 2007.
[RFC4960] Stewart, R., "Stream Control Transmission
Protocol", RFC 4960, September 2007.
Tschofenig & Arkko Informational [Page 22]
^L
RFC 6574 Smart Object Workshop Report April 2012
[RFC5191] Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H.,
and A. Yegin, "Protocol for Carrying Authentication
for Network Access (PANA)", RFC 5191, May 2008.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer
Security (TLS) Protocol Version 1.2", RFC 5246,
August 2008.
[RFC5548] Dohler, M., Watteyne, T., Winter, T., and D.
Barthel, "Routing Requirements for Urban Low-Power
and Lossy Networks", RFC 5548, May 2009.
[RFC5673] Pister, K., Thubert, P., Dwars, S., and T. Phinney,
"Industrial Routing Requirements in Low-Power and
Lossy Networks", RFC 5673, October 2009.
[RFC5826] Brandt, A., Buron, J., and G. Porcu, "Home
Automation Routing Requirements in Low-Power and
Lossy Networks", RFC 5826, April 2010.
[RFC5867] Martocci, J., De Mil, P., Riou, N., and W.
Vermeylen, "Building Automation Routing
Requirements in Low-Power and Lossy Networks",
RFC 5867, June 2010.
[RFC6059] Krishnan, S. and G. Daley, "Simple Procedures for
Detecting Network Attachment in IPv6", RFC 6059,
November 2010.
[RFC6121] Saint-Andre, P., "Extensible Messaging and Presence
Protocol (XMPP): Instant Messaging and Presence",
RFC 6121, March 2011.
[RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J., and A.
Bierman, "Network Configuration Protocol
(NETCONF)", RFC 6241, June 2011.
[RFC6272] Baker, F. and D. Meyer, "Internet Protocols for the
Smart Grid", RFC 6272, June 2011.
[RPL] Brandt, A., Vasseur, J., Hui, J., Pister, K.,
Thubert, P., Levis, P., Struik, R., Kelsey, R.,
Clausen, T., and T. Winter, "RPL: IPv6 Routing
Protocol for Low-Power and Lossy Networks", Work
in Progress, March 2011.
Tschofenig & Arkko Informational [Page 23]
^L
RFC 6574 Smart Object Workshop Report April 2012
[SHA3] NIST, "Cryptographic Hash Algorithm Competition",
December 2010, <http://csrc.nist.gov/groups/ST/
hash/sha-3/index.html>.
[SNMP-OPT] Schoenwaelder, J., Mukhtar, H., Joo, S., and K.
Kim, "SNMP Optimizations for Constrained Devices",
Work in Progress, October 2010.
[Schoenwaelder] Schoenwaelder, J., Tsou, T., and B. Sarikaya,
"Protocol Profiles for Constrained Devices", IAB
Interconnecting Smart Objects with the Internet
Workshop, Prague, Czech Republic, February 2011,
<http://www.iab.org/wp-content/IAB-uploads/2011/03/
Schoenwaelder.pdf>.
[SmartGrid] Wikipedia, "Smart Grid", December 2011,
<http://en.wikipedia.org/w/
index.php?title=Smart_grid&oldid=479750548>.
[Tussle] Clark, D., Wroclawski, J., Sollins, K., and R.
Braden, "Tussle in Cyberspace: Defining Tomorrow's
Internet", In Proc. ACM SIGCOMM, 2002,
<http://conferences.sigcomm.org/sigcomm/2002/
papers/tussle.html>.
[Wasserman] Wasserman, M., "It's Not Easy Being 'Green'", IAB
Interconnecting Smart Objects with the Internet
Workshop, Prague, Czech Republic, March 2011,
<http://www.iab.org/wp-content/IAB-uploads/2011/03/
Wasserman.pdf>.
[irtf-discuss] Ohlman, B., "Draft ICN RG Charter", message to IRTF
DISCUSS Mailing List, May 2011,
<http://www.ietf.org/mail-archive/web/irtf-discuss/
current/msg00041.html>.
[proxZzzy] ECMA, "proxZzzy(TM) for sleeping hosts",
Standard ECMA-393, February 2010,
<http://www.ecma-international.org/publications/
standards/Ecma-393.htm>.
Tschofenig & Arkko Informational [Page 24]
^L
RFC 6574 Smart Object Workshop Report April 2012
Appendix A. Program Committee
The following persons are responsible for the organization of the
associated workshop and are responsible also for this event: Jari
Arkko, Hannes Tschofenig, Bernard Aboba, Carsten Bormann, David
Culler, Lars Eggert, JP. Vasseur, Stewart Bryant, Adrian Farrel,
Ralph Droms, Geoffrey Mulligan, Alexey Melnikov, Peter Saint-Andre,
Marcelo Bagnulo, Zach Shelby, Isidro Ballesteros Laso, Fred Baker,
Cullen Jennings, Manfred Hauswirth, and Lukas Kencl.
Appendix B. Workshop Materials
Main page:
http://www.iab.org/about/workshops/smartobjects/
Position papers:
http://www.iab.org/about/workshops/smartobjects/papers/
Slides:
http://www.iab.org/about/workshops/smartobjects/agenda/
Minutes:
http://www.iab.org/activities/workshops/smartobjects/
smartobjectworkshopmeetingminutes/
Appendix C. Accepted Position Papers
1. Deployment Experience with Low Power Lossy Wireless Sensor
Networks" by C. Adjih, E. Baccelli, P. Jacquet, P. Minet, M.
Philipp, and G. Wittenburg
2. CoAP improvements to meet embedded device hardware constraints"
by Davide Barbieri
3. "Unified Device Networking Protocols for Smart Objects" by
Daniel Barisic and Anton Pfefferseder
4. "Simplified neighbour cache implementation in RPL/6LoWPAN" by
Dominique Barthel
5. "Home Control in a consumer's perspective" by Anders Brandt
6. "Authoring Place-based Experiences with an Internet of Things:
Tussles of Expressive, Operational, and Participatory Goals" by
Jeff Burke
Tschofenig & Arkko Informational [Page 25]
^L
RFC 6574 Smart Object Workshop Report April 2012
7. "A Dynamic Distributed Federated Approach for the Internet of
Things" by Diego Casado Mansilla, Juan Ramon Velasco Perez, and
Mario Lopez-Ramos
8. "Quickly interoperable Internet of Things using simple
transparent gateways" by Angelo P. Castellani, Salvatore Loreto,
Nicola Bui, and Michele Zorzi
9. "Position Paper of the Brno University of Technology Department
of Telecommunications" by Vladimir Cervenka, Lubomir Mraz, Milan
Simek, and Karel Pavlata
10. "Secure Access to IOT Network: An Application-based Group Key
Approach" by Samita Chakrabarti and Wassim Haddad
11. "Domain-Insulated Autonomous Network Architecture (DIANA)" by W.
Chun
12. "Yet Another Definition on Name, Address, ID, and Locator
(YANAIL)" by W. Chun
13. "The Challenge of Mobility in Low Power Networks" by E. Davies
14. "If the routing protocol is so smart, why should neighbour
discovery be so dumb?" by Nicolas Dejean
15. "Making Smart Objects IPv6 Ready: Where are we?" by M. Durvy and
M. Valente
16. "Position Paper on 'Interconnecting Smart Objects with the
Internet'" by Mehmet Ersue and Jouni Korhonen
17. "The Real-time Enterprise: IoT-enabled Business Processes" by
Stephan Haller and Carsten Magerkurth
18. "Making Internet-Connected Objects readily useful" by Manfred
Hauswirth, Dennis Pfisterer, and Stefan Decker
19. "Some Considerations on Routing in Particular and Lossy
Environments" by Thomas Clausen and Ulrich Herberg
20. "A Security Protocol Adaptation Layer for the IP-based Internet
of Things" by Rene Hummen, Tobias Heer, and Klaus Wehrle
21. "Simplified SIP Approach for the Smart Object" by Ryota
Ishibashi, Takumi Ohba, Arata Koike, and Akira Kurokawa
Tschofenig & Arkko Informational [Page 26]
^L
RFC 6574 Smart Object Workshop Report April 2012
22. "Mobility support for the small and smart Future Internet
devices" by Antonio J. Jara and Antonio F. G. Skarmeta
23. "The Need for Efficient Reliable Multicast in Smart Grid
Networks" by J. Jetcheva, D. Popa, M.G. Stuber, and H. Van Wyk
24. "Lightweight Cryptography for the Internet of Things" by
Masanobu Katagi and Shiho Moriai
25. "Thoughts on Reliability in the Internet of Things" by James
Kempf, Jari Arkko, Neda Beheshti, and Kiran Yedavalli
26. "IKEv2 and Smart Objects" by Tero Kivinen
27. "Position Paper on Thing Name Service (TNS) for the Internet of
Things (IoT)" by Ning Kong and Shuo Shen
28. "Connecting Smart Objects to Wireless WANs" by Suresh Krishnan
29. "Towards an Information-Centric Internet with more Things" by D.
Kutscher and S. Farrell
30. "Application of 6LoWPAN for the Real-Time Positioning of
Manufacturing Assets" by Jaacan Martinez and Jose L. M. Lastra
31. "Lighting interface to wireless network" by Jaroslav Meduna
32. "Social-driven Internet of Connected Objects" by Paulo Mendes
33. "Protocols should go forward that are required by non IP based
protocols" by Tsuyoshi Momose
34. "Web services for Wireless Sensor and Actuator Networks" by
Guido Moritz
35. "Connecting BT-LE sensors to the Internet using Ipv6" by Markus
Isomaki, Kanji Kerai, Jari Mutikainen, Johanna Nieminen,
Basavaraj Patil, Teemu Savolainen, and Zach Shelby
36. "Building Networks" by Bruce Nordman
37. "Issues and Challenges in Provisioning Keys to Smart Objects" by
Yoshihiro Ohba and Subir Das
38. "Challenges and Solutions of Secure Smart Environments" by Eila
Ovaska and Antti Evesti
Tschofenig & Arkko Informational [Page 27]
^L
RFC 6574 Smart Object Workshop Report April 2012
39. "Research Experiences about Internetworking Mechanisms to
Integrate Embedded Wireless Networks into Traditional Networks"
by Jose F. Martinez, Ivan Corredor, and Miguel S. Familiar
40. "Scalable Video Coding in Networked Environment" by Naeem
Ramzan, Tomas Piatrik, and Ebroul Izquierdo
41. "Challenges in Opportunistic Networking" by Mikko Pitkaenen and
Teemu Kaerkkaeinen
42. "Position Statement" by Neeli R. Prasad and Sateesh Addepalli
43. "A Gateway Architecture for Interconnecting Smart Objects to the
Internet" by Akbar Rahman, Dorothy Gellert, Dale Seed
44. "Routing Challenges and Directions for Smart Objects in Future
Internet of Things" by T. A. Ramrekha, E. Panaousis, and C.
Politis
45. "6LoWPAN Extension for IPsec" by Shahid Raza, Thiemo Voigt, and
Utz Roedig
46. "Connected Vehicle as Smart Object(s)" by Ryuji Wakikawa
47. "Problem and possible approach of development and operation of
Smart Objects" by Shoichi Sakane
48. "Connecting Passive RFID Tags to the Internet of Things" by
Sandra Dominikus and Joern-Marc Schmidt
49. "Protocol Profiles for Constrained Devices" by Juergen
Schoenwaelde, Tina Tsou, and Behcet Sarikaya
50. "Multihoming for Sensor Networks" by J. Soininen
51. "Internet Objects for Building Control" by Peter van der Stok
and Nicolas Riou
52. "Optimal information placement for Smart Objects" by Shigeya
Suzuki
53. "Multi-National Initiative for Cloud Computing in Health Care
(MUNICH)" by Christoph Thuemmler
54. "The time of the hourglass has elapsed" by Laurent Toutain,
Nicolas Montavont, and Dominique Barthel
Tschofenig & Arkko Informational [Page 28]
^L
RFC 6574 Smart Object Workshop Report April 2012
55. "Sensor and Actuator Resource Architecture" by Vlasios Tsiatsis,
Jan Hoeller, and Richard Gold
56. "IT'S NOT EASY BEING 'GREEN'" by Margaret Wasserman
57. "Trustworthy Wireless Industrial Sensor Networks" by Markus
Wehner, Thomas Bartzsch, Dirk Burggraf, Sven Zeisberg, Alexis
Olivereau, and Oualha Nouha
58. "Interconnecting smart objects through an overlay networking
architecture" by Anastasios Zafeiropoulos, Athanassios
Liakopoulos and Panagiotis Gouvas
59. "Building trust among Virtual Interconnecting Smart Objects in
the Future Internet" by Theodore Zahariadic, Helen C. Leligou,
Panagiotis Trakadas, and Mischa Dohler
60. "Experience and Challenges of Integrating Smart Devices with the
Mobile Internet" by Zhen Cao and Hui Deng
61. "The 'mesh-under' versus 'route over' debate in IP Smart Objects
Networks" by JP. Vasseur and Jonathan Hui
62. "Identification and Authentication of IoT Devices" by Alper
Yegin
63. "Security Challenges For the Internet of Things" by Tim Polk and
Sean Turner
64. "Application Communications Requirements for 'The Internet of
Things'" by Bob Dolin
65. "Interoperability Concerns in the Internet of Things" by Jari
Arkko
66. "Privacy in Ubiquitous Computing" by Ivan Gudymenko and Katrin
Borcea-Pfitzmann
67. "The 10 Laws of Smart Object Security Design" by Hannes
Tschofenig and Bernard Aboba
68. "Position Paper on 'In-Network Object Cloud' Architecture and
Design Goals" by Alex Galis and Stuart Clayman
69. "Temptations and Difficulties of Protocols for Smart Objects and
the Internet" by Alexandru Petrescu
Tschofenig & Arkko Informational [Page 29]
^L
RFC 6574 Smart Object Workshop Report April 2012
70. "The Internet of Things - Challenge for a New Architecture from
Problems" by Gyu Myoung Lee and Noel Crespi
71. "Garrulity and Fluff" by Carsten Bormann and Klaus Hartke
Appendix D. Workshop Participants
We would like to than the following workshop participants for
attending the workshop:
Adrian Farrel
Akbar Rahman
Alissa Cooper
Alper Yegin
Anastasios Zafeiropoulos
Anders Brandt
Angelo P. Castellani
Antonio F. G. Skarmeta
Antonio Jara
Arvind Ramrekha
Behcet Sarikaya
Bernard Aboba
Bruce Nordman
Carsten Bormann
Cullen Jennings
Daniel Barisic
Dave Thaler
Davide Barbieri
Diego Casado Mansilla
Dirk Kutscher
Dominique Barthel
Dorothy Gellert
Elwyn Davis
Emmanuel Baccelli
Fred Baker
Guido Moritz
Gyu Myoung Lee
Hannes Tschofenig
Hui Deng
Ivan Gudymenko
Jaacan Martinez
Jari Arkko
Jaroslav Meduna
Jeff Burke
Johanna Nieminen
Jonathan Hui
Jonne Soininen
Jouni Korhonen
Tschofenig & Arkko Informational [Page 30]
^L
RFC 6574 Smart Object Workshop Report April 2012
JP. Vasseur
Karel Pavlata
Klaus Hartke
Lars Eggert
Laura Gheorghe
Laurent Toutain
Lukas Kencl
Marcelo Bagnulo
Marco Valente
Margaret Wasserman
Markus Isomaki
Markus Wehner
Masanobu Katagi
Mathilde Durvy
Mehmet Ersue
Mikko Pitkaenen
Milan Simek
Neeli R. Prasad
Nicolas Dejean
Ning Kong
Pascal Thubert
Paulo Mendes
Pete Resnick
Peter van der Stok
Ralph Droms
Rene Hummen
Ross Callon
Ruediger Martin
Russ Housley
Ryota Ishibashi
Ryuji Wakikawa
Samita Chakrabarti
Sandra Dominikus
Sean Shen
Sean Turner
Shahid Raza
Shoichi Sakane
Spencer Dawkins
Stephan Haller
Stephen Farrell
Stewart Bryant
Subir Das
Suresh Krishnan
Tea Sang Choi
Tero Kivinen
Theodore Zahariadis
Thomas Clausen
Tim Polk
Tschofenig & Arkko Informational [Page 31]
^L
RFC 6574 Smart Object Workshop Report April 2012
Tina Tsou
Tsuyoshi Momose
Vladimir Cervenka
Wassim Haddad
Woojik Chun
Zach Shelby
Appendix E. IAB Members at the Time of Approval
Bernard Aboba
Ross Callon
Alissa Cooper
Spencer Dawkins
Joel Halpern
Russ Housley
David Kessens
Olaf Kolkman
Danny McPherson
Jon Peterson
Andrei Robachevsky
Dave Thaler
Hannes Tschofenig
Authors' Addresses
Hannes Tschofenig
Nokia Siemens Networks
Linnoitustie 6
Espoo 02600
Finland
Phone: +358 (50) 4871445
EMail: Hannes.Tschofenig@gmx.net
URI: http://www.tschofenig.priv.at
Jari Arkko
Ericsson
Jorvas 02420
Finland
EMail: jari.arkko@piuha.net
Internet Architecture Board
EMail: iab@iab.org
Tschofenig & Arkko Informational [Page 32]
^L
|