Internet DRAFT - draft-rahman-ace-public-safety-use-case
draft-rahman-ace-public-safety-use-case
ACE WG A. Rahman
Internet-Draft C. Wang
Intended status: Informational V. Choyi
Expires: January 29, 2016 InterDigital Communications, LLC
July 28, 2015
Public Safety Use Case
draft-rahman-ace-public-safety-use-case-01
Abstract
A public safety use case is proposed for consideration by the ACE WG.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 29, 2016.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Rahman, et al. Expires January 29, 2016 [Page 1]
Internet-Draft Public Safety Use Case July 2015
Table of Contents
1. Terminology and Conventions . . . . . . . . . . . . . . . . . 2
2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Public Safety Use Case . . . . . . . . . . . . . . . . . . . 2
4. Authorization Problem Summary . . . . . . . . . . . . . . . . 3
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 3
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3
7. Security Considerations . . . . . . . . . . . . . . . . . . . 3
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
8.1. Normative References . . . . . . . . . . . . . . . . . . 4
8.2. Informative References . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 4
1. Terminology and Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
This document assumes readers are familiar with the terms and
concepts that are used in [RFC7252] and [I-D.ietf-ace-usecases].
2. Background
The ACE WG, as per their charter, is in the process of defining use
cases to drive the specification of standardized solutions for
authentication and authorization to enable authorized access (Get,
Put, Post, Delete) to resources identified by a URI and hosted on a
resource server in constrained environments. As a starting point,
the WG will assume that access to resources at a resource server by a
client device takes place using CoAP and is protected by DTLS
([RFC7252]). Both resource server and client may be constrained.
This access will be mediated by an authorization server, which is not
considered to be constrained.
3. Public Safety Use Case
A Fire Department requires that as part of the building safety code,
that the building have sensors that sense the level of smoke, heat,
Etc., when a fire breaks out. These sensors report metrics which are
then used by a back-end server to map safe areas and un-safe areas
within a building and also possibly the structural integrity of the
building before fire-fighters may enter it. Sensors may also be used
to track where human/animal activity is within the building. This
will allow people stuck within the building to be guided to safer
areas and suggest possible actions that they make take (e.g. using a
client application on their phones, or loudspeaker directions) in
Rahman, et al. Expires January 29, 2016 [Page 2]
Internet-Draft Public Safety Use Case July 2015
order to bring them to safety. In certain cases, other organizations
such as the Police, Ambulance, and federal organizations are also
involved and therefore the co-ordination of tasks between the various
entities have to be carried out using efficient messaging and
authorization mechanisms.
4. Authorization Problem Summary
1. The principal wants to ensure that only authorized clients can
read data from sensors and send commands to the actuators.
2. The principal wants to be able to grant access rights dynamically
when needed. This may be triggered where the Principal may be human
or machine (server/cloud system).
3. The principal wants to ensure the authenticity of the data
originating from the sensors (authenticating the originator of data).
4. The principal wants to ensure the Integrity of the received data.
5. The principal wants to ensure that data sent to the actuators are
Integrity protected.
6. The principal wants to ensure that extremely time-sensitive
operations have to be carried out in a quick manner.
7. The principal wants to ensure the ability to prove that an entity
(e.g. police or fire chief) that issued a message had indeed issued
the message (authenticating the sender of the message).
8. The principal wants to ensure that all the messaging and data
involved during a crisis is audit-able in a transparent manner.
5. Acknowledgements
TBD.
6. IANA Considerations
This memo includes no request to IANA.
7. Security Considerations
The entire draft is regarding a security use case related to
authentication and authorization for constrained environments.
Rahman, et al. Expires January 29, 2016 [Page 3]
Internet-Draft Public Safety Use Case July 2015
8. References
8.1. Normative References
[I-D.ietf-ace-usecases]
Seitz, L., Gerdes, S., Selander, G., Mani, M., and S.
Kumar, "ACE use cases", draft-ietf-ace-usecases-04 (work
in progress), June 2015.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
8.2. Informative References
[RFC6690] Shelby, Z., "Constrained RESTful Environments (CoRE) Link
Format", RFC 6690, DOI 10.17487/RFC6690, August 2012,
<http://www.rfc-editor.org/info/rfc6690>.
[RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
Application Protocol (CoAP)", RFC 7252,
DOI 10.17487/RFC7252, June 2014,
<http://www.rfc-editor.org/info/rfc7252>.
[RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for
the Constrained Application Protocol (CoAP)", RFC 7390,
DOI 10.17487/RFC7390, October 2014,
<http://www.rfc-editor.org/info/rfc7390>.
Authors' Addresses
Akbar Rahman
InterDigital Communications, LLC
Email: akbar.rahman@interdigital.com
Chonggang Wang
InterDigital Communications, LLC
Email: chonggang.wang@interdigital.com
Vinod Choyi
InterDigital Communications, LLC
Email: vinod.choyi@interdigital.com
Rahman, et al. Expires January 29, 2016 [Page 4]