Page 287 - Unleashing the potenti al of the Internet of Things
P. 287

Unleashing the potential of the Internet of Things                         3


            MOC applications have the following requirements:
            1)      MOC applications are recommended to be able to set the prioritization of data (within a
                    single application or among different applications).
            2)      MOC applications are recommended to be able to manage different data according to their
                    prioritization.
            3)      MOC applications are recommended to be able to apply data prioritization to MOC devices
                    and  gateways  according  to  the  related  service  level  agreements  (SLA)  between  MOC
                    application customers and MOC application providers.

            8.14    Security

            8.14.1  Authentication and authorization
            The  MOC  end  users  accessing  the  MOC  applications  need  to  be  authenticated  and  authorized.
            Access to applications has to align with the relevant security levels.
            The  MOC  devices  involved  in  the  MOC  applications  and  directly  connected  need  to  be
            authenticated and authorized.

            The MOC devices involved in the MOC applications and connected via an MOC gateway should
            generally be authenticated and authorized.

            Requirements of authentication and authorization are as follows:
            1)      MOC applications are required to support the authentication and authorization of MOC end
                    users to access MOC applications and related data according to the related security levels.
            2)      MOC applications are required to support a mechanism for authentication and authorization
                    of directly connected MOC devices associated with the MOC applications themselves.
            3)      MOC  applications  are  recommended  to  support  a  mechanism  for  authentication  and
                    authorization of MOC devices which are in an MOC local network (connected via an MOC
                    gateway) and which are associated with the MOC applications themselves.

            4)      MOC  applications  are  required  to  support  a  mechanism  for  the  registration  of  directly
                    connected MOC devices associated with the MOC applications themselves.

            8.14.2  Security of data
            In  general,  MOC  applications  require  strong  security,  due  to  very  sensitive  data.  It  has  to  be
            considered that MOC devices cannot provide all security features because they may have system
            limitations. For example, sensed data carried over the network may not be sufficiently protected
            from the security viewpoint.
            MOC applications have the following requirements:
            1)      MOC  applications  are  required  to  provide  security  for  the  connectivity  between  MOC
                    applications  and  MOC  devices  even  when  the  MOC  devices  roam  from  one  network
                    domain to another network domain.
            2)      MOC  applications  are  required  to  support  the  integrity  and  confidentiality  of  the  data
                    exchanged during the application operations.
            3)      MOC applications are recommended to provide mechanisms of data encryption in order to
                    also support MOC devices with limited capabilities.
            8.14.3  Security of MOC device access

            All  data  produced  by  MOC  devices  are  required  to  be  unknown  to  unauthorized  entities.  For
            example, private or sensitive data of an MOC device should not be sent to an unauthenticated end
            user if this end user initiates a communication with that MOC device.




                                                                  Rec. ITU-T Y.4109/Y.2061 (06/2012)     273
   282   283   284   285   286   287   288   289   290   291   292