Re: [Iotsi] acceptance notice and a request

Barry Leiba <barryleiba@computer.org> Wed, 02 March 2016 17:04 UTC

Return-Path: <barryleiba@gmail.com>
X-Original-To: iotsi@ietfa.amsl.com
Delivered-To: iotsi@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61B091B2CA1 for <iotsi@ietfa.amsl.com>; Wed, 2 Mar 2016 09:04:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Level:
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cMW6wBXe7rWl for <iotsi@ietfa.amsl.com>; Wed, 2 Mar 2016 09:04:25 -0800 (PST)
Received: from mail-ig0-x22f.google.com (mail-ig0-x22f.google.com [IPv6:2607:f8b0:4001:c05::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87BEF1B2C9D for <iotsi@iab.org>; Wed, 2 Mar 2016 09:04:25 -0800 (PST)
Received: by mail-ig0-x22f.google.com with SMTP id y8so50103860igp.0 for <iotsi@iab.org>; Wed, 02 Mar 2016 09:04:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-transfer-encoding; bh=SDw1Lt5kfQFSpiyLVo5ShmfsUek7guWczpbuVrgjELk=; b=xIkw/oy6B2/49l8q1G8XTU+nX05DSncdPRTZl9tMvLVnUMNJmLy/wgQG6pS05LlN9m azo6u9+MH6Tf05ChmsvgiNlHlwnsyWfhPdLGO4WjoHPVxvftjzM9eueEJix+bXFPfGho pZKzxbThVElVQZq4sItkI6hSt4SeOev7cZpZ/wz+VcBKR5G/jDItIAiZ6PtlKmZfo31x PvxP5hS0CKxpNJFZ+pQsPkhCJlEHrupEiZQxoPMszvap00DrPhnrGrLhhJ2waKWGhqoY vJjqBVf94AQdxJjp6UF4qj27V2N0E7HC/bhWG5ITJfi15UzIXUQD0ravdRyuB3NccExO r7kQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:date :message-id:subject:from:to:cc:content-transfer-encoding; bh=SDw1Lt5kfQFSpiyLVo5ShmfsUek7guWczpbuVrgjELk=; b=dqcrbh0SjA5SFB8Z/i8tJcEk5kzLltm5zumO598KrHvpAbzPFeEToqdDZl/vI3X+EO 9E762DmiYvhOGmKqwnziXbzd8y0nU+7vJQp860xEPpQSeiDXlgYzCr8nZk6mNloKV4CT qKd+0RlqXehCm5pZOAmOJ6I/9HlTnE9KlBxPqBm7i7oavn0bqSsL+FY23GLKnMXi/tgT mzUyca6HyOrSJWUPOPAX8DHNfRqLjvgSEQZvQT9VQylnZf0YZKhMBdNIxVVhCQWkON9L BsnfT09WPMtaFQ4ZCH+VCfyVaQSw6R/FDztbWX+ufOhjzVfe/gRpKeuIXqBkeQrYDtTj AsRg==
X-Gm-Message-State: AD7BkJKIQhigIpKECIL+rkHqP1f9WZc9ndkyQZoKs4mLXmq0mu1BCorPx1g+jiXhbO2Eq8poqo9X3IEHFMN7wQ==
MIME-Version: 1.0
X-Received: by 10.50.23.80 with SMTP id k16mr294859igf.81.1456938264829; Wed, 02 Mar 2016 09:04:24 -0800 (PST)
Sender: barryleiba@gmail.com
Received: by 10.36.59.133 with HTTP; Wed, 2 Mar 2016 09:04:24 -0800 (PST)
In-Reply-To: <A968F4E0-6DCE-4624-93CE-D0B156D1ACC8@piuha.net>
References: <A968F4E0-6DCE-4624-93CE-D0B156D1ACC8@piuha.net>
Date: Wed, 02 Mar 2016 12:04:24 -0500
X-Google-Sender-Auth: dlPuhj8qEcNexSwGZEqu3I86u0U
Message-ID: <CALaySJ+RpVR-1rJykuDUrT3hJmrp9NZgv0JxmU7pYv=Jz6ys0Q@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Jari Arkko <jari.arkko@piuha.net>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/iotsi/aqsdxNjL8NfMteQkKvF7Dnn3VF0>
X-Mailman-Approved-At: Thu, 03 Mar 2016 14:28:28 -0800
Cc: iotsi@iab.org
Subject: Re: [Iotsi] acceptance notice and a request
X-BeenThere: iotsi@iab.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet of Things Semantic Interoperability Workshop <iotsi.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/iotsi>, <mailto:iotsi-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotsi/>
List-Post: <mailto:iotsi@iab.org>
List-Help: <mailto:iotsi-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/iotsi>, <mailto:iotsi-request@iab.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2016 17:04:28 -0000

> This is to let you know that you have been accepted for the workshop.
> For your information due to the popularity of the workshop we've been
> forced to limit the attendance and reject a fair number of papers. But
> it is important that the workshop is seen as a joint discussion
> between many people and organisations. As a result, we're asking all
> ADs and IAB members who desire to attend to submit position papers
> (see below for a message sent to the others). In your case, per prior
> agreement, you have already been accepted, but we’d like to request
> you to submit a position paper nevertheless.

Thanks, Jari.  Below is my contribution:

As the Internet of Things adds a great many devices to the Internet, a
number of basic interoperability issues arise:

- Discoverability

    - How do the devices find the controllers or peer networks they need?

    - How do the controllers or peer networks find and register new devices?

   - How are devices identified?

    - Is it necessary to have anonymous / pseudonymous devices, and
how does that work?

- Authentication and access control / trust

   - How do we decide to accept new devices?

    - What do we allow new devices to do?

   - Do we trust the data produced by new sensors?

    - How do we prevent attacks?

- Capability / function

   - How do devices communicate what they do and what their limitations are?

    - How do controllers restrict devices -- limit them to a subset of
their capabilities?

   - How do devices interact when their capabilities are related /
complementary?

That's just the tip of the iceberg, of course, but we have to start a
discussion of the models for answering those questions, on which we
can build the necessary protocols to manage networks of IoT devices
and to have the devices interoperate.

For a long time, I've considered a basic scenario:
I have an early meeting tomorrow at an office I don't usually work in.
The meeting is on my calendar, along with its location.
My alarm clock automatically sets itself to wake me earlier.
My coffee maker starts the coffee earlier.
My car's navigation system gets the location and automatically sets my route.
...and so on...

The issues above fit directly into that scenario:
How do my calendar, alarm clock, coffee maker, and nav systen get tied
in together?  What are the security and privacy issues of that?  How
is everything coordinated?  How do I, the human user, fit into the
control system?  How do I keep track of the devices involved?  How do
we make sure it's really my calendar resetting my clock and nav
system?

-- 
Barry Leiba