Security in Internet of Things using Delegation of Trust to a Provisioning Server

Size: px
Start display at page:

Download "Security in Internet of Things using Delegation of Trust to a Provisioning Server"

Transcription

1 Security in Internet of Things using Delegation of Trust to a Provisioning Server Architecture overview Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile peter.waher@clayster.com Abstract. This paper proposes an architecture for open networks, such as the Internet of Things, and describes an implemented solution that allows Things with limited or no user interfaces to provide a high level of data security, by delegating trust to a trusted third party to help the device determine which users, devices or services are authorized to perform what operations on the device in a secure manner. Keywords: Internet of Things, Security, Provisioning, Authentication, Authorization. 1 Introduction One large problem in open networks is how to provide a high level of data security in the network. In closed networks of high value participants, like PCs with complex operating systems, system operators can provide security by using directory services that provide identity and privilege information to each participant in the network. But in open networks, containing small resource constrained devices, such solutions become impractical. An alternative to using a directory service in open networks has been to let each server (or service) handle authentication and authorization itself. This might work for stand-alone web servers and web applications, where rich user interfaces are available. But small resource constrained devices often have very limited human user interfaces, sometimes perhaps only a small button or a LED, if even that. Performing authentication and authorization on the device itself becomes both a complex and impractical task. Furthermore, performing authentication and authorization on the device itself, makes it difficult to reuse and propagate a user identity and privileges in a network of multiple devices, and makes distributed operations very difficult to perform in a secure manner. To avoid the aforementioned complexities of a uniform security model in an open network of resource constrained devices, some solutions go so far, as to assume any participant with access to the network is trusted to perform the operations it wants to do. Focus is given to the system operator to provide security for the network and only Security in Internet of Things using Delegation of Trust to a Provisioning Server, p. 1, Clayster Laboratorios Chile S.A 2014

2 allow access to the network to participants that are not malicious. This model may work very well in closed networks and back-end solutions, where full control of participants can be guaranteed, but for public open networks, where new participants can participate easily, such a security model quickly becomes impractical for the system operator. This paper proposes an architecture that allows resource constrained devices to delegate trust to a trusted third party, a Provisioning Server, which helps devices to decide which users, devices or services are authorized to perform what operations on the device. It also describes a solution that allows this to be performed over the public Internet using only existing, proven, open and standardized protocols and openly available extensions for maximum interoperability and scalability, and where components would be interchangeable. 2 Problem Description The problem being solved by the proposal is the following: In a public network (the Internet), how do you create user identities that are difficult to falsify for participants in the network, enforce secure user authentication, then provide authorization of who can communicate with whom, and finally when communication links are available, what operations can be performed on which device, by what user or through which service? The solution must support distributed operations and identity propagation. Furthermore, the solution must not use proprietary, but open, methods, allowing any manufacturer to share the same infrastructure if desired, promote interoperability and making sure end-users (or interested parties) can validate that used communication patterns are secure. At the same time, the solution must be simple to implement both by developers and network architects. Example: Consider a PLC with 24 outputs installed in the basement of a building with 10 apartments. How do you assure only users in the 10 apartments are allowed access to the PLC, and at the same time assure that each apartment is only allowed to read and configure the status of two distinct outputs each, while at the same time all 10 apartments can read and control the remaining four shared outputs? This, regardless of what service is used to read or control the PLC. Example: Consider an electricity meter installed in your apartment or house. Both the billing department in the Utility Company and the Energy Savings Company that helps you optimize your energy must have access to the electricity meter. But how do you assure the Utility Company is only allowed access to current and historical accumulated energy values, while the Energy Savings Company is allowed access to momentary power, so it can show you your current consumption? Since the momentary power can be used to detect if somebody is home, it might be a privacy issue who gets access to that value. Example: Competitors are forced to coexist and contractually interchange information between devices in a common network. This means competitors have access to each other s devices. How do you make sure only access to certain registers is given to the competitors, while private information is maintained confidentially?

3 3 Conceptual Architecture A Thing connects to the network by connecting to a Message Broker. The Message Broker makes sure the Thing is authenticated and provides the Thing with an Identity, which is unique within the Domain of the Message Broker. Message Brokers are then federated into a larger network, each Message Broker defined by its own domain. Communication between Message Brokers is encrypted, and Message Broker domains are validated using Domain Certificates. The Network Identity of the Thing in the federated network is the combination of the local identity on the Message Broker to which it connects, and the Domain Name of the Message Broker itself. Messaging between Things connected to different Message Brokers in the federated network is accomplished by simple message forwarding between the Brokers in the network. The Message Broker maintains a Roster of approved Friends for each Identity on the Message Broker. A Thing is only authorized to send messages to another if the other Thing has a defined Friendship. For Internet of Things, messages are then broken down into the following simple Operations that are well understood by participants in the network: Friendship request, Readout Request and Control Request. Things delegating trust to a Provisioning Server can ask the corresponding questions to the Provisioning Server, to know if the corresponding operations are allowed or not: Can be Friend? Can Read? 1 Can Control? Services in the network can also ask the Provisioning Server Has Privilege? For each question made to the Provisioning Server, the server can respond either by approving the request, denying the request or limiting the request, based on the Credentials of the request itself. Credentials can be both Network Identities, but also Tokens, issued by the Provisioning Server. The architecture allows for multiple Tokens to be used as credentials of a request, and the Provisioning Server can determine which credentials to use as a base for the response. When a response from the Provisioning Server has been received, the Thing can in turn respond correspondingly to the original request made to it. Apart from Network Identities provided to participants in the network, the architecture also provides a mechanism of providing X.509 Certificates based Identities for actors in the network not directly connected to the network, such as Users, Services and Devices. The corresponding entity provides the Public Part of the certificate to the Provisioning Server and the server returns a Token. This token is sufficiently random to be very difficult to guess, but as a string simple enough so that it can be easily propagated across the network. When an operation is performed and a token is provided as credentials, as tokens are not part of the underlying network authentication scheme, the Provisioning Server may pose a Challenge to the sender. This Challenge 1 Note that the Can Read? question to the Provisioning Server is not necessarily a consequence of a previous Read Request made by somebody. It can also be a result of the Thing itself wanting to send an asynchronous event to somebody or use the publish/subscribe pattern to publish information, etc., to make sure the recipients are entitled to receive the information that is about to be sent, and what information the recipients are entitled to.

4 can in turn be propagated back to the originator of the request. Only the holder of the Private Part of the Certificate can respond accurately on the challenge. In this way, actors in the network can make sure nobody without the correct credentials assumes the identity. To avoid making the Provisioning Server into a bottleneck in the network, Things are required to remember responses to questions posed to the Provisioning Server in a Cache. The size of this Cache and time to store items in the Cache is implementation specific, within certain limits. When changes concerning rules for a Thing are made on a Provisioning Server, the Provisioning Server can ask the Thing to simply clear the cache, as a simple way to make sure updated rules are propagated in the network in a simple way, and avoiding the complexities of maintaining an updated cache using incremental rule changes in a synchronized manner. Since rules for a Thing are not expected to be updated often during normal operation of a Thing, this is not considered to affect network load with any significant order of complexity. The Provisioning Server can also be proactive and Recommend Friendships to Things. In this way, it can connect things and indirectly create new relationships. 4 Choice of Protocol For the solution presented in this paper, XMPP [1] [2] [3] has been chosen as the transport protocol for communication in Internet of Things. Apart from being an open, flexible and extensible protocol [4] it also supports most commonly used communication patterns necessary for Internet of Things, such as request/response, asynchronous messaging and publish/subscribe 2 patterns. XMPP is based on Message Brokers to solve the security issues concerning user identities, authentication, federation, friendship relationships, and message authorization, as discussed above. It can also be used in resource constrained devices [5] [6] and supports resource constrained networks [7]. The operations discussed in this paper are defined in open extensions to XMPP: Sensor data readout is defined in XEP-0323 [8] and control of actuators in XEP-0325 [9]. XEP-0324 [10] provides an extension describing in detail the protocol used to communicate with the Provisioning Server for delegation of trust, and includes details on how to retrieve tokens, respond to challenges, ask for authorization to perform operations, etc. Other benefits of using XMPP for IoT applications include: possibility to bridge between different protocols using XEP-0326 [11], extensions of Semantic Web technologies onto XMPP networks [12] [13], secure in-band registration of new accounts using XEP-0077 [14] and XEP-0348 [15], and control the entire life cycle of Things 2 In XMPP, in comparison to MQTT, the publish/subscribe pattern allows owners of nodes (topics) to control who can subscribe to them, etc. In MQTT, a publisher cannot control who receives the information. Nor can a receiver of information make sure that the information comes from the pretended publisher, unless an additional layer of end-to-end encryption or content signatures are added.

5 using XEP-0347 [16], which includes production, installation, self-configuration, discovery, ownership, search, disowning and decommissioning of Things. Other available transport protocols lack one or the other of several important features with which XMPP helps IoT developers, whether it is unique authenticated identities that are propagated in a federated network, in-band registration in a secure way of new identities, authorization of messages, or specific communication patterns, etc. A comparison between XMPP and MQTT can be found in [17]. 5 XEP-0324 Internet of Things - Provisioning The entire protocol for communicating with a Provisioning Server is laid out in detail in XEP-0324 [10], to encourage implementation and interoperability between different manufacturers. This document describes how to delegate trust, server components vs. client-based provisioning servers, certificates, tokens, challenges, propagation of tokens, friendships, accepting/rejecting/limiting device read-outs, accepting/rejecting/limiting device control operations, cache management, services, users, privileges, determining support, multiple provisioning servers, security considerations, etc. 6 Existing Provisioning Server A Provisioning Server is available at: provisioning.thingk.me (XMPP Server at thingk.me) The Provisioning Server also hosts a Thing Registry, where Things and Owners can be securely matched according to methods defined in [16]. The URL of the provisioning web interface is: Both the Thing Registry as well as the Provisioning Server can be duplicated and hosted on small plug computers for local use, on PCs, servers or be clustered in the cloud. It is important to note that Thing Registries and Provisioning Servers are two different inventions that can either coexist or work separately of each other. 7 Reactive vs. Proactive Learning XEP-0324 [10] only specifies how Things communicate with the Provisioning Server to get information of what they can do in different situations. However, it does not specify how the Provisioning Server itself gets the information in the first place. The implementation presented here uses Reactive Learning as opposed to Proactive Learning of rules that govern the network. What does this mean? Instead of forcing

6 the user to beforehand provide possibly very complex rule information to the server, the server reacts to incoming requests and incrementally builds a knowledge database on how to respond to provisioning questions. This means that if a request is made that the Provisioning Server can respond to based information from previous input, the Provisioning Server responds accordingly. Otherwise, the Provisioning Server always responds in the negative, i.e. telling the requester the operation is not allowed. At the same time a simple atomic event is shown or sent to the owner (or operator) of the Thing that a new event has occurred and asks for guidance on how to respond to similar questions in the future. As owners respond to these simple atomic questions, the Provisioning Server incrementally updates the set of rules for the corresponding Things. This allows users to be able to configure otherwise complex networks without having advanced knowledge about the subject. An example of such an event can be seen in [18]. 8 Novel features The proposed architecture is the only IoT architecture publicly available, known to the author, which allows full authorization of Internet of Things operations across a federated network, distributed operation and configuration, including propagation of credentials to sub-operations across the network. It is designed for resource constrained devices and only uses publicly available standardized and openly extended protocols to promote interoperability that can be easily implemented by developers and used by IT architects and operators. The architecture aims for zero-configuration for operators and manufacturers, without compromising security or ease-of-use for end-users. Furthermore, the authorization mechanism does not only include accepting or rejecting of operations, but also include partial acceptance, i.e. limitations, of operations. This extended authorization mechanism is then used to provide for efficient and secure provisioning of services on-top of the network. The architecture is also scalable and can be used both in local environments such as cars, homes, offices, buildings, industry plants, etc., with local Provisioning Servers and local Message Brokers, as well as in global environments, with global Provisioning Servers connected to global Message Brokers. In all cases, there is a logical place where configuration of the network can be done by logical owners of things. The solution also supports multiple Provisioning Servers, allowing different operators to co-exist and together configure a common infrastructure. 9 About the author Clayster is a company with origin in Scandinavia, founded by Rikard Strid and Peter Waher. Clayster is dedicated to the promotion of Internet of Things technology and development of Internet of Things applications. Clayster also provides an IoT platform for rapid application development. Founder Rikard Strid currently lives in New York, USA, and apart from pro-

7 moting Internet of Things technology, is also a Cisco Champion. Co-founder, and author of this proposal, Peter Waher currently lives and works in Chile where he is CEO of Clayster Laboratorios Chile S.A., a subsidiary to Clayster that provides development expertise to partner companies and promotes Internet of Things technology to research institutions. Originally a mathematician, commercial pilot and computer games developer, he has worked twenty years with computer and device communication, including low-level development in assembler for resource constrained devices to high-level system design and architecture. He s currently participant in various standardization efforts within IEEE, IEC, ISO and XSF, working on standards for the Internet of Things. His work with Smart Applications for the Internet of Things and the development of the IP-TV application Energy Saving through Smart Applications won the Urban Living Labs global showcase award in category Cultural and Societal Participation and Collaboration Tools. Rikard Strid can be found on LinkedIn: Peter Waher can be found on LinkedIn: 10 Acknowledgements Thanks to Dr. Karin Forsell for all valuable feedback. 11 References [1] P. Saint-André, "RFC 6120: Extensible Messaging and Presence Protocol (XMPP): Core," [Online]. Available: [2] P. Saint-André, "RFC 6121: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence," [Online]. Available: [3] P. Saint-André, "RFC 6122: Extensible Messaging and Presence Protocol (XMPP): Address Format," [Online]. Available: [4] xmpp.org, "XMPP Technology Overview," [Online]. Available: [Accessed ]. [5] R. Klauck and M. Kirsche, "Chatty Things Making the Internet of Things Readily Usable for the Masses with XMPP," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/collaboratecom_2012- Klauck_Kirsche.pdf. [6] M. Krische and R. Klauck, "Unify to Bridge Gaps: Bringing XMPP into the Internet of Things," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/percom_2012-wip- Kirsche_Klauck.pdf. [7] P. Waher and Y. DOI, "XEP-0322: Efficient XML Interchange (EXI) Format,"

8 2013. [Online]. Available: [8] P. Waher, "XEP-0323: Internet of Things Sensor Data," [Online]. Available: [9] P. Waher, "XEP-0325: Internet of Things - Control," [Online]. Available: [10] P. Waher, "XEP-0324: Internet of Things - Provisioning," [Online]. Available: [11] P. Waher, "XEP-0326: Internet of Things - Concentrators," [Online]. Available: [12] P. Waher, "XEP-0332: HTTP over XMPP transport," [Online]. Available: [13] P. Waher, "Extending the Semantic Web to Peer-to-Peer-Like Sensor Networks Based on XMPP". [14] P. Saint-Andre, "XEP-0077: In-Band Registration," [Online]. Available: [15] P. Waher, "XEP-0348: Signing Forms," [Online]. Available: [16] P. Waher and R. Klauck, "XEP-0347: Internet of Things - Discovery," [Online]. Available: [Accessed ]. [17] P. Waher, "Bridging MQTT & XMPP Internet of Things networks," [18] P. Waher, "Simple example of device readout request event in Clayster Provisioning Server," [Online]. Available: [Accessed ].

How To Bridge The Semantic Web To The Internet Of Things

How To Bridge The Semantic Web To The Internet Of Things Extending the Semantic Web to Peer-to-Peer-Like Sensor Networks Based on XMPP Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile peter.waher@clayster.com Abstract. This

More information

XEP-0324: Internet of Things - Provisioning

XEP-0324: Internet of Things - Provisioning XEP-0324: Internet of Things - Provisioning Peter Waher mailto:peterwaher@hotmail.com xmpp:peter.waher@jabber.org http://www.linkedin.com/in/peterwaher 2015-11-09 Version 0.4 Status Type Short Name Experimental

More information

W3C Meeting ISO/IEC/IEEE P21451-1-4

W3C Meeting ISO/IEC/IEEE P21451-1-4 W3C Meeting ISO/IEC/IEEE P21451-1-4 1 st International Semantic Web 3.0 Standard for the Internet of Things (IoT) William J. Miller Chairman 07/22/2015 1 Internet of Things (IoT) http://www.sensei-iot.org

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

XEP-0347: Internet of Things - Discovery

XEP-0347: Internet of Things - Discovery XEP-0347: Internet of Things - Discovery Peter Waher mailto:peterwaher@hotmail.com xmpp:peter.waher@jabber.org http://www.linkedin.com/in/peterwaher Ronny Klauck mailto:rklauck@informatik.tu-cottbus.de

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

CCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014

CCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014 CCN CCNx 1.0 Internet of Things Architectural Overview Computer Science Laboratory Networking & Distributed Systems March 2014 CCN IoT Platform Accomodate multiple IoT protocols Improve performance and

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners

Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners Sokol Dhana One of the most challenging problems in

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Enabling REST Services with SAP PI. Michael Le mle@advantco.com Peter Ha pha@advantco.com

Enabling REST Services with SAP PI. Michael Le mle@advantco.com Peter Ha pha@advantco.com Enabling REST Services with SAP PI Michael Le mle@advantco.com Peter Ha pha@advantco.com Learning Points Understanding the REST architecture and concepts Understanding the differences between SOAP and

More information

GravityLab Multimedia Inc. Windows Media Authentication Administration Guide

GravityLab Multimedia Inc. Windows Media Authentication Administration Guide GravityLab Multimedia Inc. Windows Media Authentication Administration Guide Token Auth Menu GravityLab Multimedia supports two types of authentication to accommodate customers with content that requires

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Fast Innovation requires Fast IT

Fast Innovation requires Fast IT Fast Innovation requires Fast IT 2014 Cisco and/or its affiliates. All rights reserved. 2 2014 Cisco and/or its affiliates. All rights reserved. 3 IoT World Forum Architecture Committee 2013 Cisco and/or

More information

Account Management: A Deployment and Usability Problem Phillip Hallam- Baker VP & Principal Scientist, Comodo Group Inc.

Account Management: A Deployment and Usability Problem Phillip Hallam- Baker VP & Principal Scientist, Comodo Group Inc. Account Management: A Deployment and Usability Problem Phillip Hallam- Baker VP & Principal Scientist, Comodo Group Inc. Abstract Account management is the biggest challenge most Web users face today.

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

Cross-domain Identity Management System for Cloud Environment

Cross-domain Identity Management System for Cloud Environment Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Introduction to UDDI: Important Features and Functional Concepts

Introduction to UDDI: Important Features and Functional Concepts : October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...

More information

Technical. Overview. ~ a ~ irods version 4.x

Technical. Overview. ~ a ~ irods version 4.x Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number

More information

XEP-0210: Requirements for Encrypted Sessions

XEP-0210: Requirements for Encrypted Sessions XEP-0210: Requirements for Encrypted Sessions Ian Paterson mailto:ian.paterson@clientside.co.uk xmpp:ian@zoofy.com 2007-05-30 Version 0.2 Status Type Short Name Deferred Standards Track N/A This document

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

Mobile Data Virtualization. From Managing Devices, to Apps, to Business Data through Mobile Data Access APIs

Mobile Data Virtualization. From Managing Devices, to Apps, to Business Data through Mobile Data Access APIs Mobile Data Virtualization From Managing Devices, to Apps, to Business Data through Mobile Data Access APIs INTRODUCTION Most enterprise mobile applications have one thing in common: they need to access

More information

Evolving from SCADA to IoT

Evolving from SCADA to IoT Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.

More information

Arrowhead Framework A Local Cloud Approach to Automation. Prof. Jerker Delsing. www.arrowhead.eu

Arrowhead Framework A Local Cloud Approach to Automation. Prof. Jerker Delsing. www.arrowhead.eu 1 Arrowhead Framework A Local Cloud Approach to Automation Prof. Jerker Delsing Luleå University of Technology Division of EISLAB Professor Jerker Delsing Arrowhead Process and energy system automation

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted

More information

How To Build An Operating Software For The Enterprise

How To Build An Operating Software For The Enterprise Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS

More information

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon

More information

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt kmahmoud@eg.ibm.com 2 Computer

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Security of smart grid communication protocols

Security of smart grid communication protocols Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen

More information

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

The following slides describe these prototypes above in more details

The following slides describe these prototypes above in more details MERA is a full ETSI member and is actively involved in M2M technology investigation and expertise development in the M2M domain. As such we have a full time R&D team dedicated to the study of use-cases,

More information

Collaborative Open Market to Place Objects at your Service

Collaborative Open Market to Place Objects at your Service Collaborative Open Market to Place Objects at your Service D6.4.1 Marketplace integration First version Project Acronym COMPOSE Project Title Project Number 317862 Work Package WP6 Open marketplace Lead

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Secure communications via IdentaDefense

Secure communications via IdentaDefense Secure communications via IdentaDefense How vulnerable is sensitive data? Communication is the least secure area of digital information. The many benefits of sending information electronically in a digital

More information

SIF 3: A NEW BEGINNING

SIF 3: A NEW BEGINNING SIF 3: A NEW BEGINNING The SIF Implementation Specification Defines common data formats and rules of interaction and architecture, and is made up of two parts: SIF Infrastructure Implementation Specification

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

An introduction to Cryptosoft

An introduction to Cryptosoft An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company

More information

UPnP Internet of Things

UPnP Internet of Things UPnP Internet of Things July 2014 Keith Miller Intel Wouter van der Beek Cisco Systems, Inc. UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

A Comparison of Protocols for Device Management and Software Updates

A Comparison of Protocols for Device Management and Software Updates B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4 Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows

More information

AquaLogic ESB Design and Integration (3 Days)

AquaLogic ESB Design and Integration (3 Days) www.peaksolutions.com AquaLogic ESB Design and Integration (3 Days) Audience Course Abstract Designed for developers, project leaders, IT architects and other technical individuals that need to understand

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

vehicle cloud Connected vehicle cloud Under the hood

vehicle cloud Connected vehicle cloud Under the hood vehicle cloud Connected vehicle cloud Under the hood Connecting the vehicle opportunities around the bend bendexperience Ericsson s Connected Vehicle Cloud increases the value of car manufacturer s core

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

A Simple M2M Overlay Entity Discovery Protocol

A Simple M2M Overlay Entity Discovery Protocol A Simple M2M Overlay Entity Discovery Protocol Teemu Väisänen VTT Technical Research Centre of Finland, Oulu, Finland Teemu.Vaisanen @ vtt.fi Abstract This paper deals with discovering M2M overlay entities

More information

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning

More information

GROUPWARE. Ifeoluwa Idowu

GROUPWARE. Ifeoluwa Idowu GROUPWARE Ifeoluwa Idowu GROUPWARE What is Groupware? Definitions of Groupware Computer-based systems that support groups of people engaged in a common task (or goal) and that provide an interface to a

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.

Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1. Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Literature Review Service Frameworks and Architectural Design Patterns in Web Development

Literature Review Service Frameworks and Architectural Design Patterns in Web Development Literature Review Service Frameworks and Architectural Design Patterns in Web Development Connor Patrick ptrcon001@myuct.ac.za Computer Science Honours University of Cape Town 15 May 2014 Abstract Organizing

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

The Resilient Smart Grid Workshop Network-based Data Service

The Resilient Smart Grid Workshop Network-based Data Service The Resilient Smart Grid Workshop Network-based Data Service October 16 th, 2014 Jin Chang Agenda Fermilab Introduction Smart Grid Resilience Challenges Network-based Data Service (NDS) Introduction Network-based

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Sophisticated Common Data Environment (CDE) with BIMaaS Platform

Sophisticated Common Data Environment (CDE) with BIMaaS Platform Sophisticated Common Data Environment (CDE) with BIMaaS Platform September 2015 Contents 1. Introduction to BIMaaS Platform... 3 2. What is Common Data Environment?... 3 3. Real World Challenges without

More information

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine

More information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

CONVERGENCE Glossary (version of 30/10/2012)

CONVERGENCE Glossary (version of 30/10/2012) Glossary (version of 30/10/2012) Term Access Rights Advertise Application Business Scenario CA CCN Cl_Auth_SC Cl_Auth_User_Pw Clean-slate architecture CoApp CoApp Provider CoMid CoMid Provider CoMid Resource

More information

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS

More information

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies

More information

Web Hosting. Definition. Overview. Topics. 1. Overview of the Web

Web Hosting. Definition. Overview. Topics. 1. Overview of the Web Web Hosting Definition The World Wide Web (WWW), a web of worldwide servers connected to the Internet, provides an easily used and understood method of accessing electronic content. Accessing information

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

UPnP Internet of Things Dec 2014

UPnP Internet of Things Dec 2014 UPnP Internet of Things Dec 2014 Keith Miller Intel Wouter van der Beek Cisco UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description Sensor Management

More information

Automation Systems and the IoT Industrial Internet

Automation Systems and the IoT Industrial Internet Automation Systems and the IoT Industrial Internet Ahmed Ismail and Wolfgang Kastner Vienna University of Technology Automation Systems Group www.auto.tuwien.ac.at {aismail, k}@auto.tuwien.ac.at Outline

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

GenomeSpace Architecture

GenomeSpace Architecture GenomeSpace Architecture The primary services, or components, are shown in Figure 1, the high level GenomeSpace architecture. These include (1) an Authorization and Authentication service, (2) an analysis

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

SERVICE ORIENTED ARCHITECTURE

SERVICE ORIENTED ARCHITECTURE SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) (joerg.swetina@neclab.eu)

ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) (joerg.swetina@neclab.eu) ETSI M2M / onem2m and the need for semantics Joerg Swetina (NEC) (joerg.swetina@neclab.eu) Outline of this presentation A simple picture of Machine-to-Machine (M2M) communications Where do standards apply

More information