Machine-to-Machine communications (M2M); Functional architecture

RTS/M2M-00002ed121

General Information

Status
Published
Publication Date
23-Jun-2013
Technical Committee
Current Stage
12 - Completion
Due Date
19-Jul-2013
Completion Date
24-Jun-2013
Mandate
Ref Project

Buy Standard

Standard
ETSI TS 102 690 V1.2.1 (2013-06) - Machine-to-Machine communications (M2M); Functional architecture
English language
279 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

ETSI TS 102 690 V1.2.1 (2013-06)






Technical Specification
Machine-to-Machine communications (M2M);
Functional architecture

---------------------- Page: 1 ----------------------
2 ETSI TS 102 690 V1.2.1 (2013-06)



Reference
RTS/M2M-00002ed121
Keywords
architecture, M2M
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2013.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM TM
3GPP and LTE are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI

---------------------- Page: 2 ----------------------
3 ETSI TS 102 690 V1.2.1 (2013-06)
Contents
Intellectual Property Rights . 11
Foreword . 11
1 Scope . 12
2 References . 12
2.1 Normative references . 12
2.2 Informative references . 14
3 Definitions, symbols and abbreviations . 15
3.1 Definitions . 15
3.2 Symbols . 15
3.3 Abbreviations . 15
4 High level architecture . 15
5 Functional architecture . 17
5.1 Framework . 18
5.1.1 Functions and reference points . 18
5.1.2 High level flow of events . 20
5.2 M2M Service Capabilities in the Network Domain . 22
5.2.1 Network Application Enablement (NAE) capability . 22
5.2.2 Network Generic Communication (NGC) capability. 22
5.2.3 Network Reachability, Addressing and Repository (NRAR) Capability . 23
5.2.4 Network Communication Selection (NCS) Capability . 23
5.2.5 Network Remote Entity Management (NREM) Capability . 23
5.2.6 Network Security Capability (NSEC) . 24
5.2.7 Network History and Data Retention (NHDR) capability . 25
5.2.8 Network Transaction Management (NTM) capability . 25
5.2.9 Network Interworking Proxy (NIP) capability . 25
5.2.10 Network Compensation Brokerage (NCB) capability . 25
5.2.11 Network Telco Operator Exposure (NTOE) Capability . 26
5.3 Service Capabilities in the M2M Gateway . 26
5.3.1 Gateway Application Enablement (GAE) capability . 26
5.3.2 Gateway Generic Communication (GGC) capability . 26
5.3.3 Gateway Reachability, Addressing and Repository (GRAR) capability . 27
5.3.4 Gateway Communication Selection (GCS) capability . 27
5.3.5 Gateway Remote Entity Management (GREM) capability . 27
5.3.6 Gateway SECurity (GSEC) capability . 28
5.3.7 Gateway History and Data Retention (GHDR) capability . 28
5.3.8 Gateway Transaction Management (GTM) capability . 29
5.3.9 Gateway Interworking Proxy (GIP) capability . 29
5.3.10 Gateway Compensation Brokerage (GCB) capability . 29
5.4 Service Capabilities in the M2M Device . 29
5.4.1 Device Application Enablement (DAE) capability . 29
5.4.2 Device Generic Communication (DGC) capability . 30
5.4.3 Device Reachability, Addressing and Repository (DRAR) capability . 30
5.4.4 Device Communication Selection (DCS) capability . 30
5.4.5 Device Remote Entity Management (DREM) capability . 30
5.4.6 Device SECurity (DSEC) capability . 31
5.4.7 Device History and Data Retention (DHDR) capability . 31
5.4.8 Device Transaction Management (DTM) capability . 32
5.4.9 Device Interworking Proxy (DIP) capability . 32
5.4.10 Device Compensation Brokerage (DCB) capability . 32
6 Reference points . 32
6.1 Overview . 32
6.2 mIa. 33
6.3 dIa . 34
ETSI

---------------------- Page: 3 ----------------------
4 ETSI TS 102 690 V1.2.1 (2013-06)
6.4 mId . 34
7 M2M Identification and addressing . 34
7.1 Introduction . 34
7.2 M2M Identification . 35
7.2.1 M2M Identifiers . 35
7.2.1.1 Application Identifier . 35
7.2.1.2 M2M Node Identifier . 35
7.2.1.3 SCL Identifier . 35
7.2.1.4 M2M Service Connection Identifier . 35
7.2.1.5 M2M Service Provider Identifier . 35
7.2.1.6 MSBF Identifier . 35
7.2.2 M2M Identifiers lifecycle and characteristics . 35
7.3 M2M Application Addressing . 38
7.3.1 Introduction. 38
7.3.2 Application Reachability . 38
7.3.2.1 M2M Communication Point of Contact (M2M PoC) . 38
7.3.2.2 Principles guiding Locating Applications . 38
7.3.2.3 Usage of M2M PoC by the M2M System . 38
7.3.2.3.1 M2M PoC related to M2M SCLs associated with a Fixed Network . 39
7.3.2.3.2 M2M PoC related to M2M SCLs associated with Mobile Networks . 39
7.3.2.3.3 M2M PoC to M2M SCLs associated with multiple access networks . 39
8 M2M Security, M2M Service Bootstrap, Service Provisioning and M2M Service Connection
procedures . 39
8.1 Introduction . 39
8.2 M2M Security Framework . 40
8.2.1 Overview . 40
8.2.2 Key hierarchy and realization . 40
8.2.2.1 Description of M2M keys . 40
8.2.2.2 M2M Root Key Provisioning . 41
8.2.2.3 Secured Environment Domains . 42
8.2.3 M2M Node Security Functionalities . 42
8.2.3.1 Network M2M Node Security Functionalities . 42
8.2.3.2 Device/Gateway M2M Node Common Security Functionalities . 43
8.2.3.3 Gateway M2M Node Specific Security Functionalities . 43
8.2.4 M2M Device/Gateway Integrity Validation (Optional) . 44
8.2.4.1 Integrity Validation Functional Description . 44
8.2.4.2 Integrity Validation prior to M2M Service Bootstrap (Optional) . 44
8.3 M2M Service Bootstrap procedures . 46
8.3.1 Introduction. 46
8.3.2 Access Network Assisted M2M Service Bootstrap procedures . 46
8.3.2.1 GBA based M2M Service Bootstrap procedure . 46
8.3.2.2 EAP-based Bootstrap Procedure using SIM/AKA-based Credentials . 48
8.3.2.3 Bootstrap Procedure Utilizing EAP-based Network Access Authentication . 48
8.3.3 Access Network Independent M2M Service Bootstrap procedures . 49
8.3.3.1 M2M Service Bootstrap required properties . 49
8.3.3.2 M2M Service Bootstrap Authentication and Transport Options . 50
8.3.3.3 Description of EAP over PANA as the M2M Service Bootstrap Transport . 50
8.3.3.3.1 EAP-IBAKE over PANA . 52
8.3.3.3.2 EAP-TLS over EAP/PANA. 55
8.3.3.4 TLS over TCP . 56
8.3.3.4.1 Detailed procedures . 57
8.3.3.5 Common Aspects of TLS/Certificates-Based M2M Service Bootstrap procedures . 58
8.3.3.5.1 Overview . 58
8.3.3.5.2 Bootstrapping credentials when Using Device Certificates . 58
8.3.3.5.3 Architecture . 59
8.3.3.5.4 MSBF Certificate Status Verification Methods . 60
8.4 M2M Service Connection procedures . 61
8.4.1 Overview . 61
8.4.2 M2M Service Connection procedure based on EAP / PANA . 62
8.4.3 M2M Service Connection procedure based on TLS-PSK . 63
ETSI

---------------------- Page: 4 ----------------------
5 ETSI TS 102 690 V1.2.1 (2013-06)
8.4.3.1 Overview . 63
8.4.3.2 High Level Call Flow . 63
8.4.4 M2M Service Connection procedure based on GBA . 65
8.5 mId Security . 67
9 M2M Resource Management and Procedures . 67
9.1 Introduction . 67
9.1.1 Usage of resources in a RESTful architecture . 67
9.1.2 Definitions . 69
9.2 Resource structure . 69
9.2.1 Types of resources to be used in a SCL . 69
9.2.1.1 SclBase Resource . 70
9.2.1.2 SCL Resource . 70
9.2.1.3 Application Resource . 70
9.2.1.4 AccessRight Resource . 70
9.2.1.5 Container Resource . 70
9.2.1.6 LocationContainer Resource . 70
9.2.1.7 Group Reso urce . 70
9.2.1.8 Subscription Resource . 70
9.2.1.9 M2MPoC Resource . 71
9.2.1.10 MgmtObj Resource . 71
9.2.1.11 MgmtCmd Resource . 71
9.2.1.12 AttachedDevices Resource . 71
9.2.1.13 AttachedDevice Resource . 71
9.2.1.14 Announced Resource . 71
9.2.1.15 NotificationChannel Resource . 72
9.2.1.16 Discovery Resource . 72
9.2.1.17 Collection Resource . 72
9.2.2 Common attributes . 72
9.2.3 Tree structure modelling relationship of different resource types . 73
9.2.3.1 Overview . 73
9.2.3.2 Resource . 74
9.2.3.3 Resource scls . 77
9.2.3.4 Resource . 78
9.2.3.5 Resource applications. 81
9.2.3.6 Resource . 83
9.2.3.7 Resource . 84
9.2.3.8 Resource accessRights . 85
9.2.3.9 Resource . 86
9.2.3.10 Resource . 87
9.2.3.11 Resource containers . 88
9.2.3.12 Resource . 90
9.2.3.13 Resource . 91
9.2.3.14 Resource . 91
9.2.3.15 Resource . 93
9.2.3.16 Resource contentInstances . 94
9.2.3.17 Resource . 95
9.2.3.18 Resource groups . 96
9.2.3.19 Resource . 97
9.2.3.20 Resource . 98
9.2.3.21 Resource membersContent . 99
9.2.3.22 Resource subscriptions . 99
9.2.3.23 Resource . 100
9.2.3.24 Resource m2mPocs . 101
9.2.3.25 Resource . 102
9.2.3.26 Resource mgmtObjs . 103
9.2.3.27 Resource . 104
9.2.3.28 Resource . 106
9.2.3.29 Resource . 106
9.2.3.30 Resource execInstances . 108
9.2.3.31 Resource . 108
9.2.3.32 Resource attachedDevices . 109
ETSI

---------------------- Page: 5 ----------------------
6 ETSI TS 102 690 V1.2.1 (2013-06)
9.2.3.33 Resource . 110
9.2.3.34 Resource notificationChannels . 111
9.2.3.35 Resource . 112
9.2.3.36 Resource discovery . 113
9.3 Interface Procedures . 113
9.3.1 General concept and procedures . 113
9.3.1.1 General responses . 113
9.3.1.2 General mechanisms . 113
9.3.1.3 Accessing resources in
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.