Re: [solace] Slides posted for SAAG heads-up

Rene Struik <rstruik.ext@gmail.com> Thu, 08 November 2012 00:20 UTC

Return-Path: <rstruik.ext@gmail.com>
X-Original-To: solace@ietfa.amsl.com
Delivered-To: solace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 356EE21F8BF0 for <solace@ietfa.amsl.com>; Wed, 7 Nov 2012 16:20:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gtr6kcJTXSjV for <solace@ietfa.amsl.com>; Wed, 7 Nov 2012 16:20:56 -0800 (PST)
Received: from mail-ie0-f172.google.com (mail-ie0-f172.google.com [209.85.223.172]) by ietfa.amsl.com (Postfix) with ESMTP id EDE7121F8BDA for <solace@ietf.org>; Wed, 7 Nov 2012 16:20:55 -0800 (PST)
Received: by mail-ie0-f172.google.com with SMTP id 9so3749405iec.31 for <solace@ietf.org>; Wed, 07 Nov 2012 16:20:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; bh=A18FB6G/mePEzg1RZYVjvKi0oqW3TQTo0uBvBtHVMzo=; b=dukeZx7ukrj6tkkg7Mk8wIOlpkM8upPmDIPenw04ma6t82jAuw/j8kraIFwTYpTsFF deLfEuSL1gIkY4GVwcOJujsbYuZNvbJmkwcMapqRSiLGxVDL2CkPh6KJaCRS/Jy/dGvz DeRGw2yd1ksoZ3CUEXXBRMubQ4RwtwBkKUrEotuuMZMPumFFF4rsfzm/0ZZMh0Jlly6W rmrR2Dc7CVdzPokTRWY4DZL1bEA4uw8vygFR8+CG5qSqsumQ3HyGrLBnh/POEMedfLFM DHzr0BITB3lv+TUafwRwTO2my15WhLcPgVaGJhvv9DQ4+LO0ciqGy1JmwTaHfW1g/oJD UEaA==
Received: by 10.50.157.162 with SMTP id wn2mr6599641igb.27.1352334055578; Wed, 07 Nov 2012 16:20:55 -0800 (PST)
Received: from [192.168.1.100] (CPE0013100e2c51-CM001cea35caa6.cpe.net.cable.rogers.com. [99.231.4.27]) by mx.google.com with ESMTPS id xn10sm3202155igb.4.2012.11.07.16.20.53 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 07 Nov 2012 16:20:55 -0800 (PST)
Message-ID: <509AFAE1.1040707@gmail.com>
Date: Wed, 07 Nov 2012 19:20:49 -0500
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121026 Thunderbird/16.0.2
MIME-Version: 1.0
To: robert.cragie@gridmerge.com
References: <17F77EDC-3726-4AF2-9848-1C98E3F98B7E@tzi.org> <509AC579.3090301@gmail.com> <30433E6B-C9B9-4EDC-B2D5-1D042F8199AD@tzi.org> <509ADC64.2040902@gridmerge.com> <509AEEE2.6000102@gmail.com>
In-Reply-To: <509AEEE2.6000102@gmail.com>
Content-Type: multipart/alternative; boundary="------------070608020706070908020401"
Cc: solace@ietf.org
Subject: Re: [solace] Slides posted for SAAG heads-up
X-BeenThere: solace@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "\"Smart Object Lifecycle Architecture for Constrained Environments\" discussion list" <solace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/solace>, <mailto:solace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/solace>
List-Post: <mailto:solace@ietf.org>
List-Help: <mailto:solace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/solace>, <mailto:solace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Nov 2012 00:20:57 -0000

Hi Carsten:

If this sounds too easy, just because I put the word "industrial 
control" in the title, please abstract this a little bit and apply other 
nomenclature. If it is still too easy, then just provide a good 
description and a proposed approach and collect your price money. Then, 
we can move on to what you believe would be more difficult. I do claim 
that the scenario I described captures lots of aspects that are 
necessary to get to anything meaningful for internet of things 
scenarios. Not everything is a home scenario (plus: if all networks are 
home-size with debt-laden households, one never gets to the 50billion 
device numbers. Moreover, we also do not harness the power of wireless 
to assist in addressing huge societal problems).

What scenario do you suggest yourself: more than hub-and-spoke, all 
shrink-wrapped, I hope?

Rene

------- Original Message --------
Subject: 	Re: [solace] Slides posted for SAAG heads-up
Date: 	Wed, 7 Nov 2012 18:36:26 -0500
From: 	Carsten Bormann <cabo@tzi.org>
To: 	Rene Struik <rstruik.ext@gmail.com>
CC: 	robert.cragie@gridmerge.com, solace@ietf.org



On Nov 7, 2012, at 18:29, Rene Struik <rstruik.ext@gmail.com> wrote:

> industrial control

Too easy.

This is usually a highly controlled environment, where there already are defined business relationships.

Try a home occupied with a family with a 13-year old son, where the lifecycle later involves, say, a divorce and a foreclosure.

(I like the industrial scenario, but I think we should do that later.)

Grüße, Carsten



On 11/7/2012 6:29 PM, Rene Struik wrote:
>
> _Dear colleagues:
> _
>
> _
> _
>
> _What about starting with the following use case scenario, which was 
> one of the scenarios brought up by user community (Shell, in this 
> case) in industrial control network setting?
> _
>
> _
> _
>
> _Scenario 1:_
>
> ·Plant X wants to install a wireless sensor network to measure 5 
> pressure and 5 temperature points. One gateway. That gateway to 
> connect to the legacy wired infrastructure. Plant X now has a DCS 
> system with an Ethernet L2 network. Plant X likes to buy pressure 
> instruments from vendor A, and temperature instruments from B. 
> Gateways for G.
>
> ·Plant X uses contractor C for installation and commissioning.
>
> Scenario 1b would now include realization that contractor C turns out 
> not to be that trust worthy and threatens to throw installation info 
> on the street, unless a $1m amount is being paid to an offshore account.
>
>
>
> I believe this should not be "too theoretical" (??).
>
>
> Rene
>
> On 11/7/2012 5:10 PM, Robert Cragie wrote:
>>
>> On 07/11/2012 9:38 PM, Carsten Bormann wrote:
>>> Hi Rene,
>>>
>>> good to hear from you.
>>>
>>> Clearly, we cannot stop at exactly one usage scenario.
>>> But I strongly believe we need to start with exactly one.
>>> When we have the contributions for that, we can probably ask much 
>>> better questions for the next round, where we will add scenarios.
>> +1. The premise for an effective usage scenario is that it is fully 
>> or at least well understood otherwise it is not a usage scenario. It 
>> is all very well theorising on a multitude of usage scenarios and 
>> saying they are all important but unless they are proven to be 
>> relevant and the particular issues are understodd, they lose their 
>> relevance as a usage scenario.
>>>
>>> The slides are indeed more for SAAG and less for people who would 
>>> focus on the logistics of rolling out 50000000000 devices.
>>> SOLACE clearly goes beyond security, or we could do it right there 
>>> in the security area.
>> +1.
>>>
>>> The security objectives slides are divided into one for the specific 
>>> ones for a scenario and one for the general ones (one could say 
>>> "motherhood and apple pie" if they were better understood).  Even if 
>>> the specific ones can be toned down, we still have the general ones, 
>>> and that includes avoiding susceptibility to mass attacks.  (This is 
>>> one of the points that were made at the March SoS workshop.)  And 
>>> that is, very much, the reason why compromising on security always 
>>> leads to security compromises.
>>>
>>> Grüße, Carsten
>>>
>>> _______________________________________________
>>> solace mailing list
>>> solace@ietf.org
>>> https://www.ietf.org/mailman/listinfo/solace
>>>
>>
>>
>>
>>
>> _______________________________________________
>> solace mailing list
>> solace@ietf.org
>> https://www.ietf.org/mailman/listinfo/solace
>
>
> -- 
> email:rstruik.ext@gmail.com  | Skype: rstruik
> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363


-- 
email: rstruik.ext@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363