Page 687 - Unleashing the potenti al of the Internet of Things
P. 687
Unleashing the potential of the Internet of Things 5
8.7 Secure capabilities of EHM components
According to the capability requirements described in clause 9.7 of [ITU-T Y.2065], the EHM
components are required to support the following security capabilities:
1) Authentication and authorization
The EHM gateway, EHM terminal, IoT platform and EHM application server are required to
support authentication and authorization mechanisms.
The EHM gateway and IoT platform are required to support authentication and authorization
for EHM devices and EHM application servers.
The EHM devices and EHM application servers are recommended to support a mutual
authentication and authorization when accessing the EHM gateway or IoT platform.
The authentication and authorization mechanisms among the EHM gateway, IoT platform,
EHM devices and EHM application servers can be based on network level authentication
mechanisms (e.g., IP based or SIM card based) or application level authentication
mechanisms (e.g., certificate based or account and password based).
The authentication and authorization mechanisms between EHM devices and the EHM
gateway can be additionally based on authentication mechanisms (e.g., Bluetooth based,
wired connection based) of the local network among EHM devices and gateways.
The EHM terminal and EHM application server are required to support authentication and
authorization for EHM customer access.
NOTE – EHM gateways that support EHM customer access are also required to provide
authentication and authorization for accessing users.
2) Secure communications
All EHM components are required to support secure communications. The EHM application,
EHM terminal and IoT platform are required to support secure communications through the
communication network. The EHM end point is required to support secure communications
through the local network among EHM devices and gateways. The EHM gateway is required
to support secure communications through both the communication network and the local
network among EHM devices and EHM gateways.
3) Confidentiality
All EHM components are required to enforce the confidentiality of the data whenever the
data are exchanged, stored or processed.
4) Integrity
All EHM components are required to guarantee the integrity of data when the data are
transmitted. Any loss of integrity of the transmitted data must be recognizable by the
receiving components.
5) Access control
The EHM gateway, EHM terminal, IoT platform and EHM application server are required to
ensure that only authorized EHM components are able to access protected data and only
authorized users can access the EHM components.
6) Audit trail
The EHM gateway, EHM terminal, IoT platform and EHM application server are required to
trace and record any access or attempt to access EHM data.
7) Data storage security
All EHM components that support data storage are required to support data integrity
validation and data privacy protection. In addition, the IoT platform and EHM application
server are required to support data backup, anti-hacker data protection, uninterruptible power
of data storage and data recovery.
Rec. ITU-T Y.4408/Y.2075 (09/2015) 673

