Iot System: Indian Standard
Iot System: Indian Standard
आई ओ टी सिस्टम
भाग 1 रेफेरेंस आर्कि टे क्चर
IoT System
Part 1 Reference Architecture
ICS 35.020
© BIS 2021
FOREWORD
This Indian Standard was adopted by the Bureau of Indian Standards, after the draft finalized by the Smart
Infrastructure Sectional Committee, had been approved by the Electronics and Information Technology Division
Council.
In the formulation of this standard, considerable assistance has been derived from the following publications:
a) ISO/IEC 30141 : 2018 Internet of Things (IoT) — Reference Architecture
b) ITU-T Y.3056 Framework for bootstrapping of devices and applications for open access to trusted
services in distributed ecosystems
c) TEC 30001 : 2020 oneM2M Functional Architecture
d) TEC-TR-SN-M2M-009 – Release 01 Recommendations for IoT / M2M Security (Technical report)
The IoT Concept Model Diagram and Definitions used in this document are adapted from the ISO/IEC 30141,
the Functional Architecture has been adapted from ITU-T Y.3056, and The Common Service Layer architecture
has been adapted from the TEC 30001 : 2020. The Classification of Use Cases (Cl 8.2.2) is derived from
TEC-TR-SN-M2M-009.
The IoT Reference Architecture described in this Standard aims to fulfil the broad requirements identified
in IS 18004-6 Functional Requirements of IoT Systems (under development) and TEC 30002 : 2020
oneM2M-Requirements.
The Department of Telecommunications, Ministry of Communications, Government of India vide Gazette
Notification No. G.S.R. 1131(E) dated 5th September, 2017 has amended the Indian Telegraph Rules, 1951
(Amendment 2017) to introduce Mandatory Testing & Certification of Telecom Equipment (MTCTE). As per
MTCTE, every telecom equipment must undergo mandatory testing and certification before its sell or import.
The requirements for the security management (8.2) has been set to fulfil the requirements for the MTCTE.
The Composition of the panel, LITD 28/P9 and the sectional committee, LITD 28 responsible for the formulation
of this standard is given at Annex C.
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
Contents
Pages
1 SCOPE ... 1
2 REFERENCES ... 1
4 OVERVIEW ... 1
4.1 IoT Concept Model ... 1
4.2 IoT Reference Model ... 2
4.3 IoT Reference Architecture ... 2
i
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
Pages
BIBLIOGRAPHY ... 21
LIST OF FIGURES
Fig. 1 The progression of the IoT Ecosystem Standard ... 2
Fig. 2 IoT Concept Model [Source: ISO/IEC 30141] ... 3
Fig. 3 Domain based IoT reference Model ... 5
Fig. 4 Entity based IoT Reference Model ... 6
Fig. 5 IoT Service Layer Architecture ... 7
Fig. 6 IoT Functional Architecture ... 8
Fig. 7 IoT Role Based View ... 11
Fig. 8 IoT System Deployment View ... 11
Fig. 9 Node based Deployment Architecture View ... 12
Fig. 10 End point device identity and security assurance ... 14
Fig. 11 IoT/ M2M Identification, Authentication and Authorization ... 15
Fig. 12 Trust Centre framework ... 15
LIST OF TABLES
Table 1 Functions of Common Service Layer ... 9
Table 2 Classification of IoT Devices ... 16
ii
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
iii
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
Indian Standards
IOT SYSTEM
PART 1 REFERENCE ARCHITECTURE
1
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
2
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
An Entity is anything (both physical and non-physical) electronic appliances to closed or open environments. A
that has a distinct and independent existence. Every Physical Entity is a specialization of entity. A Physical
entity has a unique identity. Entity can contain other physical entities.
A Digital Entity is a computational or data element of An IoT-User is a user of an IoT system, which can
an IoT system. These elements include applications, be human or non-human. An IoT-User is part of an
services, virtual entities, data stores, IoT devices and IoT system. An IoT-User is a specialization of entity
IoT gateways. A Digital Entity is a specialization representing a human user or digital user.
of Entity. A Digital Entity can contain other Digital
Entities. A Network is the infrastructure that connects a set
of Digital Entities, enabling communication of data
A Physical Entity is a discrete, identifiable and between them. A network is a specialization of entity.
observable part of the physical environment.
Physical Entities can be almost any physical object Most entities in IoT, especially Physical Entities
or environment; from humans or animals to cars; (“things”), have an Identity. An Identifier is a set of
from store or logistics chain items to computers; from attributes of the entity that can be used to uniquely
3
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
identify the entity in a context. An entity can have more The Concept Model also addresses the Field Security
than one identifier, but it requires at least one unique Management requirements given in clause 8.11.6 of
identifier within any Identity Context through which it IS 18000, which requires that the IoT devices
can be accessed. For example, the identity information are genuine, the firmware and/or software are not
from a tag can be used as an identifier to identify the compromised and that they are authenticated, authorized
Physical Entity to which it is attached. and managed using security keys so as to be protected
against cyber-attacks throughout the lifecycle.
Entities which interact via networks do so by exposing
one or more endpoints on a network. A network 6 IOT REFERENCE MODELS
connects endpoints. A Service exposes one or more
endpoints by which it can be invoked. An endpoint has 6.1 Domain Based Reference Model
one or more network interfaces. Services, which are
located remotely, can be reached by endpoints through The IoT Domain based Reference Model (RM)
network interfaces across a communication network. depicted in Fig. 3 is shown as a set of entities within
Endpoints exist on one or more networks. well-defined domains which interact with each other
whilst being governed by a set of Policy, Regulatory,
A Service is a set of distinct capabilities provided Governmental Guidelines, and Standards.
through a defined interface. A service can be composed
of other services. A service is typically implemented as In order to provide a sustainable, interoperable,
software. A service defines network interfaces and is standardised and scalable framework for the
exposed by an endpoint. A service interacts with other proliferation of the IoT Use Cases, these concept model
entities via one or more networks. A service may or envisages the need for IoT Reference Models which can
may not be used to develop implementation models for various
use cases across sectors.
a) interact with IoT gateways or IoT devices
b) interact with other services The Entities in the Domain based IoT RM represent both
Physical and Digital entities as they form a relationship
c) use data stores
with each other including the devices, networks,
Data associated with services, IoT devices and with IoT platforms and applications as illustrated in Fig. 3. Though
gateways can be held in a Data Store used by one or Fig. 3 depicts the interactions between domains, the
more entities. actors and entities have however been shown here
within the domains for exemplification.
An Application is a software entity or system that
offers a collection of functions and solutions designed The following domains are important from the
to help IoT users perform particular tasks or to handle perspective of a standardised IoT Ecosystem:
particular types of IT problems. An application can use a) Device / Network Domain
one or more services. An application can be used by
b) Consumer Domain
a human user (via a human-machine interface (HMI))
or by a digital user (via an API). The Services and c) Provider Domain
Applications are illustrated in the Reference Models d) Service / Application Domain
described in 6.1 (see Fig. 3). e) Standards / Policy / Regulatory / Governance
An interface is defined as a named set of operations that Domain
characterize the behaviour of an entity and is specifically f) Trust Establishment, Registration, Certification
a set of operations and associated parameters which can Domain
be used by one Digital Entity to request actions from
It acknowledges the existence of multiple entities,
another Digital Entity.
including but not limited to Device Manufacturer, App
The Concept Model also addresses the OT Asset Developer, Device or App Buyer, Device or App User,
Management as given in clause 8.11.2 of IS 18000, Various Service Providers, System Integrators, Trust
which requires that the management of all IT or non-IT Providers, Regulators, Registration and Certification
field device should be protected and managed. Every Authorities and Application Verticals etc.
such device should be easily identifiable through a well-
In Fig. 3, the horizontal domains have been depicted
defined asset tagging mechanism, maintained in an
using rectangular shapes with rounded edges having
asset registry using the asset tag as the key, identifying
dotted boundaries. The two vertical domains have
asset ownership and custodian. The registry must
been represented using sharp edged rectangles with
maintain the entire lifecycle of the asset, right from its
dotted boundaries. The horizontal domains are more or
procurement, installation, maintenance to disposal of a
less specific to the actors or entities depicted therein
device.
and have interactions with more than one domain.
4
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
The vertical domains are the ones which encompass contained within the individual domains. The
the entire IoT ecosystem and are mainly driven by arrows depicting these interactions, therefore,
standards, policy, regulatory frameworks, governance do not cross the domain boundary and that
etc. There are two pillars shown at the two sides of the signifies that the interactions are between the
diagram which germinate from the model contained entirety of the domains.
within. They are:
6.2 Entity based IoT reference model
a) IoT Reference Architecture
b) IoT Deployment Views The entity based IoT Reference Model is shown in
Fig. 4. While the Domain based IoT Reference Model
The following three types of interactions are used in described the domains from the perspective of HMI,
Fig. 3: M2M and D2D interactions, it is also necessary to
a) Human to Machine Interaction (HMI) — consider the physical and digital entities and the
These are mainly the interactions between interactions between them. The concept of layers is
human entities with machines or subsystems. introduced in this description in the following way:
The arrows depicting these interactions cross a) Users or Application Layer — This layer
the domain boundary which signifies that the contains the State/Corporate Entity, Consumer
interactions are between the actors and/or Entity and Governance Entity
entities within a specific domain to other actors b) Services Layer — This layer contains the IoT/
and/or entities. M2M Data Management Entity and IoT/M2M
b) Machine to Machine Interaction (M2M) — Service Entity
These are the interactions between machines/ c) Network Layer — This layer contains the
subsystems mainly between the actors or various Network Entities of an IoT ecosystem
entities of the Device/Network Domain and namely Public Network, M2M Area Network
the Service/Application Domain. The arrows (also known as Personal Area Network) and
depicting these interactions also cross the Captive Network.
domain boundary signifying such interactions.
d) Physical Layer — This layer contains the
c) Domain to Domain Interaction (D2D) — physical Entities that are Sensors/Actuators
These are the interaction between the domains and IoT/M2M Devices/Gateways
and does not indicate any specific actor or entity
5
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
The layers, along with the related entities, cut across 7.1 IoT Architecture Layers and Planes
and operate at three planes, namely:
Fig. 5 shows an abstract view of the IoT Reference
a) IoT/M2M Functional Plane, Architecture that comprises four layers. It also
b) IoT/M2M Standards Certification and demonstrates the interaction between the different
Compliance Plane layers both at the horizontal and vertical level.
c) IoT/M2M Data and Security Management The architecture is technology agnostics such
Plane that it gives guidance to architect an IoT System.
Each layer of the IoT Reference Architecture
7 IOT REFERENCE ARCHITECTURE is explained as below.
7.1.1 Physical Layer
The IoT Reference Architecture (IoT RA) is derived
from the two reference models described in 6 which Consists of “things” that have independent existence
described the Domains, Entities and their interactions. and consists of sensors, actuators, gateway devices
that capture the real time and offline data from the
The IoT System implemented in the city shall adhere environment.
to the Unified Digital infrastructure (UDI) properties
defined in IS 18000 and the data principles defined in 7.1.2 Network Layer
Table 1 of IS 18002.
This layer encapsulates the different communication
The various layers and planes described in 6 are further technologies and protocols that constitute an IoT
detailed in a layered architecture. The IoT Reference Network as suggested by the domain-based reference
Architecture is created from a deployment perspective, model mentioned in 6.1.
it provides for the implementation of the individual
7.1.3 Common Service Layer
components and the interaction between the different
layers. Each layer talks to the other layer as shown in As the name suggests, this layer is the common service
Fig. 5 below without ignoring any one of them. Each of utility layer for the IoT platform. All the necessary
the layers is technology agnostic. functions of any IoT Ecosystem is contained here that
6
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
can be provided as a service. These are called Common Plane provides the management aspect of the entire IoT
Service Functions (CSFs). Example of such Common ecosystem be it the Digital Infrastructure Management,
Service Functions are registration and authorization; Agreements, Contracts, Workflow Management etc.
secured data exchange; location services; notification The ‘Reliability’ of an IoT System, which is the ability
and event detection services; data storage and data to perform the intended function in the prescribed
exchanges; and Semantics (This module enable conditions for a specific period of time that can be
applications to manage semantic information and measured in various metric form such as Quality of
provide functionalities based on this information). Service, Availability of Service etc. is one of the key
Refer TEC 30001 : 2020, TEC 30004 : 2020, and deliverables of this plane and that cut across all the
TEC 30003 : 2020 for the Common Service Layer and components of all the four layers.
its constituent Common Service Functions.
7.1.6 Data and Security Management Plane
This layer provides the APIs to access the physical
entities and exchange data between the physical entities. Data and Security Management Plane covers the
aspects of Security and its association with Data that
7.1.4 Application Layer is generated by the IoT Ecosystem. Security in the IoT
Ecosystem has another dimension in the perspective of
This Layer encapsulates the components which are Safety. Safety in IoT parlance is defined as a condition
providing the interfaces or visualisation which enables in which the IoT System operates without causing any
the Human to Machine Interactions. The Digital injury or damage to human health either directly or
Entities which add meaning to the things are contained indirectly or posing any risk to the environment Safety
in this layer that may also provide user interfaces that is a major concern for the IoT systems not only with
act as a dashboard for the end users and interacts with respect to the human beings but also to other living
the Common Service Layer. beings and environment as it interacts and applies
7.1.5 Functional Plane control mechanism for the physical world. Safety can
not be compromised at any entity starting from the
The said four layers perform the functions on any or all physical entity to the application entity. A wrong data
of the three planes depicted in Fig. 5. The Functional captured by a physical entity can lead to wrong control
7
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
mechanism at the application levels and may lead to 7.2 IoT Functional Architecture
safety issues not only to human lives but also to the
environment where the IoT system is operating. The IoT Functional Architecture (FA) is shown in
Fig. 6. The IoT FA is derived from TEC 30001 :
Similar to the Cybersecurity ecosystem, the Security 2020, and in alignment with TEC 30004 : 2020 and
of an IoT System can be defined as the condition in TEC 30003 : 2020. The IoT FA defines five nodes
which there is no compromise of data while flowing in (see note), five functions and four reference points.
or out of the IoT System. This includes the information The reference points are called RPa, RPc, RPn and
systems involved, the physical systems, and the are further suffixed with numerals to show the distinct
controlling systems. interfaces between nodes.
Information Security is the major threat in the context a) RPa is the reference point between the
of the IoT System. IoT Systems pose a big challenge in Application Functions and Common Service
terms of Information Security as they are distributed Functions.
and connected and hence create a big challenge as b) RPd is the reference point between the cyber-
there may be a huge number of IoT systems installed physical device and common service function.
in the network. Any compromise in one of the IoT c) RPc is the reference point between two
systems makes the complete network vulnerable. common service functions within a realm
The main objective to have Safety and Security d) RPo is the reference point between two
across the IoT Reference Architecture is to ensure the common service functions outside each other’s
Confidentiality, Integrity and Availability of the IoT realm
Systems.
C2 is the reference point between two common service
7.1.7 Standards, Certification and Compliance Plane functions and N1 is the reference point between device
Standards, Certification and Compliance Plane binds functions and network functions. All four functions
all the components of the IoT ecosystem with the will interact with each other based on these reference
standards, its certification methods and compliance when points. There is another block parallel to the common
it is mandated or recommended. The policies, regulations service function that may be called a supporting/utility
and legal aspects are all covered under this plane and function block that only interacts with the CSF and
thus establishes a framework that binds the entire this supporting /utility function is out of the scope of
ecosystem. the IoT RA.
8
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
7.3 Entity based components and functional blocks of the data. However, as there are several ontologies
for describing each distinct Thing, we need semantic
Table 1 lists out the different functions of Common interoperability mechanisms to perform common data
Service Layer with a brief explanation. mapping across the various utilized formats (e.g. XML
or JSON) and ontology alignment.
7.4 Sematic Interoperability
7.5 Functional description of the Semantics CSF
In the IoT ecosystems, the various devices and
applications operate without adequate compatibility with The architectural model assumed in this standard is
products from different manufacturers. For example, based on the generic architecture for the Common
Smart Street Light application provided by one vendor Service Layer in Fig. 5. The core functionality
does not work seamlessly with the lights provided by supporting semantics resides at various common
another vendor. This leads to a vendor locked-in siloed service entities, providing services to the application
environment. standards resolve this issue by enabling entities interacting with other common service
horizontal and vertical communication, operation, and entities.
programming across devices and platforms, regardless
of their model or manufacturer. Though standardised The Semantics (SEM) Common Service Function
common service layer solves this problem to a great (CSF) enables semantic information management
extent in order to utilize the full potential of the and provides the related functionality based on
interoperable IoT ecosystem, standardised semantic this semantic information. The functionality
annotations, mashups and semantic reasoning is of this CSF is based on semantic descriptions.
necessary. The commonly agreed information models This functionality is also enabled by other, more
and ontologies for the data produced by the IoT devices, generic, resources and procedures described in
that are processed by the interfaces or are included in TEC 30001 : 2020 and further referenced in this
the exchanged data can provide the required meaning specification. The main features of the SEM CSF
Sl Functions Description
No.
1 Registration (REG) This function will enable the registration of the Applications (and each instance of the
application) with the CSF
2 Discovery (DIS) This function allows the application to discover the resources (devices as well as
applications) within the CSF
3 Security (SEC) This module ensures security of the data as well as communication
4 Group Management (GM) CSF allows the application to create groups for different IoT devices to initiate a
common action for the group
5 Data Management and Repository (DMR) This block manages the storage of data within the CSF and facilitates data exchange
within the applications
6 Subscription and Notification (S&N) The module is responsible for notifying applications about data arrival or events. The
individual application needs to subscribe for such notification.
7 Device Management (DM) This module is responsible for the management of devices based on different
technologies such as TR069, LWM2M, OMA-DM
8 Application and Service Management The management of applications and service subscriptions is done by this module
(ASM)
9 Location (LOC) The location services and data management are taken care by the Location entity in
the CSF
10 Network Service Exposure (NSE) This module facilitates the IoT System to choose the optimal network for application
& device triggering.
11 Communication Management and The module is responsible for the frequency and the channels of the communication
Delivery Handling (CMDH) taking place in the IoT System.
12 Service Charging & Accounting (SCA) This module is responsible for providing charging data for billing and accounting
purpose.
13 Transaction Management (TM) This module takes care of the scheduling of a transaction, locking and unlocking of
resources targeted by a transaction.
9
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
are listed in clause 10.2.14 of TEC 30001 : 2020 to end IoT Services including devices,
and further detailed in 6 and 7 of this standard. The connectivity and applications, undertakes
SEM CSF includes specialized functional blocks such the custodian KYC, provisions the
as SPARQL engine, repositories for ontologies and IoT/M2M Services for retail, enterprise
semantic descriptions, which may be implemented via and government beneficiaries.
permanent or temporary Semantic Graph Stores, etc. 2) Operates the IoT/M2M Services.
8 IOT DEPLOYMENT VIEWS d) The Network Service Provider fulfils all of the
following criteria:
8.1 General 1) Provides Connectivity and related services
for IoT/M2M Service Providers.
In order to implement the IoT System following the
IoT Reference Architecture, it is important to describe 2) Operates an Underlying Network. Such
and understand the roles which are necessary to be an Underlying Network could, for
played by the corresponding stakeholders. Similarly, example be a licensed telecom network
the functional blocks described in 7 shall have to be or an unlicensed Machine to machine
expanded in a way that can touch upon all the necessary connectivity network
components of practical deployment. Also, as the e) The Device Manufacturers fulfil all the
device, data security and privacy aspects are paramount following criteria:
in the IoT ecosystem, it is prudent to have a very precise 1) Manufacturers/Provides the devices
and crisp specification for security implementation in a (sensors/actuators/gateways) in the field
real IoT world. 2) Conforms to the specifications of the
This objective is being met by the following three standards as applicable in the IoT/M2M
views that have been presented in this section: ecosystem
a) IoT Role Based View All the above roles are having mapping to various
b) IoT Systems Deployment View layers as defined in the IoT RA and are governed by
the Governance, Regulations and Standards entities as
c) IoT Security Management View defined in the IoT Reference Model.
8.1.1 IoT Role Based View
8.1.2 IoT System Deployment View
The three layered IoT Reference Architecture described
From the deployment standpoint, the layered
in 7 gets manifest in various deployment views. A
architectures facilitate the understanding of roles,
generic form of the deployment view is illustrated in
functions, positions, and the abstraction of different
Fig. 7 which is developed keeping in mind the key
hardware, software and networking entities. Fig. 8
stakeholders from the perspective of the roles played
gives an elaborate view of the entities and functions
by them towards the service delivery and consumption
involved in the deployment of the IoT ecosystem.
standpoint of the IoT ecosystem as presented in Fig. 7.
These roles are purely functional and may coincide or The deployment view is the layered representation
clubbed with any other role. of the way the IoT devices, associated applications,
service functions and other related entities interact
The roles depicted in Fig. 7 are described as follows: with each other. The associated functions and
a) The User (individual or company) fulfils all of other related entities like Information Technology
the following criteria: Service Management (ITSM), Disaster Recovery
and Business Continuity Management (BCM), Data
1) Lawfully subscribes to an IoT/M2M
Centre Network Management System (DCNMS),
solution.
Configuration Management, Microservice
b) The Application Service Provider fulfils all of Management and Orchestration, Autoscaling and CI/
the following criteria: CD (Continuous Integration/Continuous Deployment)
1) Registers the Application, gets etc. though extremely important, are implementation
it certified as per the provisions specific entities and hence are out of scope of this
of the law, and provides it as standard.
an IoT/M2M Application Service.
This deployment view is derived from the IoT Service
2) Operates IoT/M2M Applications. Layer Architecture and IoT Functional Architecture.
c) The IoT/M2M Service Provider fulfils all of TEC 30001 : 2020, TEC 30004 : 2020, TEC 30009 :
the following criteria: 2020, TEC 30010 : 2020, TEC 30020 : 2020 were also
1) Obtains the required registrations and referred to for validating the deployment scenarios with
certifications for the provisioning of end reference to the specifications contained therein.
10
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
11
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
8.1.2.1 Node based Deployment Architecture view would also connect to the common service
layer in the infrastructure domain. More often
An IoT application deployment as per the IoT Reference than not they are termed as the aggregation
Architecture would have the following nodes: gateways.
a) Field domain sensor nodes: These are the field d) Service Providers’ Domain Infrastructure:
domain nodes connecting the sensors and/or The core infrastructure that would provide the
actuators directly using a wired interface. They majority of the services as articulated as part
communicate to the Common Service Layer of the common service layer. For the sake of
through one or more Gateway nodes using any differentiation from the field domain common
form of network connectivity. service layer, this infrastructure is termed
b) Level one Gateways: These are the nodes that as Common Service Platform of the Service
connect to one or more types of sensors and/ Provider.
or actuators and may have multiple instances
of the applications with the business logic of A simplistic illustration of IoT application deployment
the respective vertical segments being catered using the above nodes following the IoT RA is given
to by them. These nodes can connect to the in Fig. 9 which is in harmony with TEC 30001 : 2020,
common service layer of the nodes placed TEC 30004 : 2020, TEC 30009 : 2020, TEC 30010 :
hierarchically above them either in the field 2020, TEC 30020 : 2020 and also with TEC 30003 :
domain or in the infrastructure domain i.e. 2020.
the Service Providers’ domain having core 8.2 IoT Security Management View
infrastructure.
c) Level two Gateways: These are the Gateway The Security management shall adhere to the following
nodes that must have the field domain form of requirements (refer TEC 30003 : 2020 for more details):
common service layer and would essentially a) Unique identification and registration of IoT
connect to the field domain sensor nodes Devices and Applications framework based on
either directly or through level one gateways a trust framework permitting sectoral, national
or through another level two gateway. They and international registrars
12
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
b) Registration of Service Providers to the EID) by the sectoral registrar (for example
respective trust authorities, registrars (Telecom vahan or AIS140 backend server) using bi-
Service Providers, Machine to Machine Service directional authentication based on keys and
Providers, Application Service Providers) certificates stored on the secure element of the
c) Classification of Use Cases and differential trust device (secure authentication channel)
requirements based on these classifications n) Custodian verification and Know Your
d) Identification and registration of IoT/ M2M Customer (KYC) norms for devices using
Applications and the M2M Devices, tamper embedded and tamper resistant roots of
resistant roots of trust for mission critical and trust shall be simplified if the inherent trust
sensitive use cases capabilities of the device and service provider
are used. The M2M SP/ TSP shall be allowed
e) Mandatory testing and certification of all
to access the manufacturer’s data lawfully
connected devices and applications by the
published on the servers of sector registrar
Original Equipment Manufacturer in India or
servers by the manufacturer, by using their
the person importing telegraph (device) for
authenticated user access provided by the trust
sale in India as per Gazette Notification No.
registrar.
G.S.R. 1131(E) dated 5th September, 2017 of
Department of Telecommunications, Ministry o) For the pluggable SIM that can be changed
of Communications, Government of India. in the field by the customer, the custodian-
machine KYC shall follow the digital KYC
f) The connectivity elements shall be compliant
processes as specified by the department of
to the relevant Generic Requirements(GR),
telecommunications from time to time.
Interface Requirements(IR) and Essential
Requirements (ER) published by TEC. p) The KYC may be completed by the TSP/ M2M
SP digitally and remotely, if using its private
g) Mutual Authentication and Authorization of
key to retrieve the secure triplet from the
security nodes belonging to service providers,
secure element, and having that information
application providers and registrars using
verified by the custodian using an one-time-
online and real time systems
password (OTP) to the mobile number of the
h) Frequent and regular mutual authentication custodian registered with the sector registrar as
between devices and the servers receiving and an owner of the machine.
hosting the data from the device
8.2.1 End point security and classification
i) Remote management and configuration shall
be compliant to national and international The End Point Devices are an essential component
standards like ETSI TS 101 181 V8.9.0 or and enabler for security, it is required to establish the
OMA DM (wireless) or BBF TR-69 (wireline) assurance level of End Point devices, as they manifest
j) Location information requirement for mission themselves in different forms with unique requirements
critical use cases of the use cases they serve.
k) Identities and information elements that The end point device identity and security assurance
are private and sensitive to users, networks requirement is shown in Fig. 10.
or service providers shall be transported
encrypted and transformed such that the real 8.2.2 Classification of Use Cases
identities are only known to the party that
owns the private data and not to agencies that The use cases may be classified as per clause 7.1.2 of
are transporting or processing the information. TEC-TR-SN-M2M-009 as reproduced below:
l) Principles of ‘secure by design’ and ‘end The most important aspect of M2M / IoT Security is in
to end encryption’ shall be applicable, how it is able to protect the data generated by the end
security algorithms and key management for points and the applications that use the end point data
encryption and signing shall be based on use to create services. The classifications of IoT / M2M Use
case classification and minimum requirements Cases, and the proposed mandatory recommendations,
as specified by the relevant regulations. are in the context of the said primary objective of M2M
m) Device identity, may be linked to the globally / IoT data protection
unique, tamper resistant identity provided by a a) Use Case categories
TSP/ M2MSP, provided that the tamper resistant
secure element of the device is provisioned with 1) Mission Critical, High QoS, Sensitive
the custodian (for example Aadhaar), machine Information [CQS]
(for example vehicle chassis number) and 2) Mission Critical, High QoS, Non Sensitive
communication identity (for example IccID/ Information [CQN]
13
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
15
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
ANNEX A
USE CASE BASED REQUIREMENT CATEGORISATION
Sl Communication
Device Type Compute Capacity OS
No.# Methodology
1 High Constrained Devices 8/16 bit Microcontroller NO Non-IP/IP
2 Constrained Device 16/32 bit Microcontroller NO/RTOS Non-IP/IP
3 Small Compute Device Single core 32 bit Microprocessors yes IP
4 Medium Compute Device Single/Dual core 32/64 bit Microprocessors yes IP
5 Large Compute Device Multi core(>2) 64 bit Microprocessors yes IP
6 Virtual Machine/Server Multi core VMs/Dockers/Servers yes IP
16
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
ANNEX B
BROAD FUNCTIONAL REQUIREMENTS
The broad functional requirements are being covered Applications and /or from the IoT System would be
as a separate standard IS 18004 (Part 6) (under covered in the Data Analytics Requirements. It would
development). However, the summary of the same is also lay down the requirements from the IoT system
being captured here to give a high level view to the to support a standardized format for the rules/policies
readers about the functional requirements fulfilled by used to define service logic.
the IoT System RA. Following list gives the different
categories in which the functional requirements are The importance of Security for the IoT System is
identified and articulated. paramount. While the overall digital as well as physical
ecosystem has to follow elaborate security guidelines,
a) Overall System Requirements it is equally important to identify and elaborate the
b) Management Requirements security requirements for the IoT System so that the
c) Semantics Requirements fulfilment of the same can be a standardised practice
for any entity getting onboarded.
d) Data Analytics Requirements
e) Security Requirements Even though the IoT system does not and shall not
f) Charging Requirements be prescriptive about the monetisation aspects of
the IoT deployments, it is important for the sake of
g) Operational Requirements
standardisation to define the Charging Requirements
h) Communication Management Requirements so that the IoT System is able to support collection
The Overall System requirements would be covering of charging specific information related to the
the generic requirements of registration, onboarding, individual services facilitated by the IoT System (such
communication and data handling etc. by the IoT as Data Management, Device Management and/or
System. Connectivity Management), Collection of charging
specific information with concurrent resource usage
The management requirement would be providing the and support mechanisms to facilitate correlation of
comprehensive requirements of management of the charging information (e.g. of a User) collected for
devices within the IoT ecosystem. This would also IoT Services, IoT Application Services and services
cover the management of the software entities. provided by Underlying Network Operators.
Semantics are extremely important for the Following the deployment of the IoT System, it is
interoperability within the IoT ecosystem and essential to standardize the operational aspects of the
also for seamless sharing of data within the IoT IoT System. It therefore, becomes necessary to capture
system. This would be covering Ontology Related and define all such essential requirements which are
Requirements,Semantics Annotation Requirements, mandatory to operationalize any IoT System.
Semantics Query Requirements, Semantics Mashup
Requirements and Semantics Reasoning Requirements Last but not the least, the communication management
etc. requirements are also equally important for any
IoT System. While the IoT RA is agnostic to any
The ability of the IoT System to support capabilities communication technology, the generic communication
(e.g. processing function) for performing IoT data management needs shall have to be fulfilled for efficient
analytics based on semantic descriptions from IoT handling and distribution of IoT data.
17
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
ANNEX C
( Foreword )
COMMITTEE COMPOSITION
Organization Representative(s)
18
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
Organization Representative(s)
Member Secretary
Shri Manikandan K.
Scientist ‘D’ (Electronics and IT), BIS
19
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
Organization Representative(s)
20
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
BIBLIOGRAPHY
21
Free Standard provided by BIS via BSB Edge Private Limited to Sai Charan Majji -
Gurugram([email protected]) 182.72.87.162 [for non-commercial use only].
BIS is a statutory institution established under the Bureau of Indian Standards Act, 2016 to promote harmonious
development of the activities of standardization, marking and quality certification of goods and attending to
connected matters in the country.
Copyright
BIS has the copyright of all its publications. No part of these publications may be reproduced in any form without
the prior permission in writing of BIS. This does not preclude the free use, in the course of implementing the
standard, of necessary details, such as symbols and sizes, type or grade designations. Enquiries relating to
copyright be addressed to the Director (Publications), BIS.
Amendments are issued to standards as the need arises on the basis of comments. Standards are also reviewed
periodically; a standard along with amendments is reaffirmed when such review indicates that no changes are
needed; if the review indicates that changes are needed, it is taken up for revision. Users of Indian Standards
should ascertain that they are in possession of the latest amendments or edition by referring to the latest issue of
‘BIS Catalogue’ and ‘Standards: Monthly Additions’.
This Indian Standard has been developed from Doc No.: LITD 28 (17304).