An unconstrained authorization server performs mediation of the access Aligned

An unconstrained authorization server performs

This preview shows page 31 - 33 out of 64 pages.

An unconstrained authorization server performs mediation of the access. Aligned with the initial focus, access to resources at a resource server by a client device occurs using CoAP and is protected by DTLS. DICE New generations of constrained nodes implementing an IP stack over constrained access networks are expected to run an optimized IP protocol stack. For example, when implementing UDP at the transport layer, the IETF Constrained Application Protocol (CoAP) should be used at the application layer. In constrained environments secured by DTLS, CoAP can be used to control resources on a device. The DTLS in Constrained Environments (DICE) working group focuses on implementing the DTLS transport layer security protocol in these environments. The first task of the DICE working group is to define an optimized DTLS profile for constrained nodes. In addition, the DICE working group is considering the applicability of the DTLS record layer to secure multicast messages and investigating how the DTLS handshake in constrained environments can get optimized. Profiles and Compliances Leveraging the Internet Protocol suite for smart objects involves a collection of protocols and options that must work in coordination with lower and upper layers. Therefore, profile definitions, certifications, and promotion by alliances can help implementers develop solutions that guarantee interoperability and/or interchangeability of devices. This section introduces some of the main industry organizations working on profile definitions and certifications for IoT constrained nodes and networks.
Image of page 31
Module 3: Internet of Things [15CS81] © Mr. Nischaykumar Hegde, Dept. of CSE, VCET Puttur 191 You can find various documents and promotions from these organizations in the IoT space, so it is worth being familiar with them and their goals. Internet Protocol for Smart Objects (IPSO) Alliance Established in 2008, the Internet Protocol for Smart Objects (IPSO) Alliance has had its objective evolve over years. The alliance initially focused on promoting IP as the premier solution for smart objects communications. Today, it is more focused on how to use IP, with the IPSO Alliance organizing interoperability tests between alliance members to validate that IP for smart objects can work together and properly implement industry standards. The IPSO Alliance does not define technologies, as that is the role of the IETF and other standard organizations, but it documents the use of IP-based technologies for various IoT use cases and participates in educating the industry. As the IPSO Alliance declares in its value and mission statement, it wants to ensure that “engineers and product builders will have access to the necessary tools for ‘how to build the IoT RIGHT.’” Wi-SUN Alliance The Wi-SUN Alliance is an example of efforts from the industry to define a communication profile that applies to specific physical and data link layer protocols.
Image of page 32
Image of page 33

You've reached the end of your free preview.

Want to read all 64 pages?

  • Winter '19
  • manu
  • Computer Science, Internet Protocol Suite, VCET PUTTUR, Mr. Nischaykumar Hegde

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture