Skip to main content

Information-Centric Networking (ICN) Adaptation to Low-Power Wireless Personal Area Networks (LoWPANs)
RFC 9139

Document Type RFC - Experimental (November 2021)
Authors Cenk Gündoğan , Thomas C. Schmidt , Matthias Wählisch , Christopher Scherb , Claudio Marxer , Christian Tschudin
Last updated 2021-11-30
RFC stream Internet Research Task Force (IRTF)
Formats
Additional resources Mailing list discussion
IESG Responsible AD (None)
Send notices to (None)
RFC 9139
T2T Research Group                                               J. Hong
Internet-Draft                                                 Y-G. Hong
Intended status: Informational                                      ETRI
Expires: April 25, 2019                                        J-S. Youn
                                                           DONG-EUI Univ
                                                        October 22, 2018

        Problem Statement of IoT integrated with Edge Computing
                    draft-hong-iot-edge-computing-01

Abstract

   This document describes new challenges for IoT services originated
   from the changes in the IoT environment.  In order to address those
   new challenges, the integration of Edge computing and IoT has been
   emerged as a promising solution.  This document discribes the concept
   of IoT integrated with Edge computing as well as its use cases.  It
   discusses benefits and challenges of Edge computing, focusing mainly
   on IoT data.  The direction of Edge computing for IoT should be
   discussed in IETF/IRTF.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 25, 2019.

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents

Hong, et al.             Expires April 25, 2019                 [Page 1]
Internet-Draft           IoT with Edge computing            October 2018

   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions and Terminology . . . . . . . . . . . . . . . . .   3
   3.  Background  . . . . . . . . . . . . . . . . . . . . . . . . .   3
     3.1.  Internet of Things (IoT)  . . . . . . . . . . . . . . . .   3
     3.2.  IoT with Cloud computing  . . . . . . . . . . . . . . . .   3
     3.3.  Environment changes/Paradigm shift  . . . . . . . . . . .   4
   4.  New challenges of IoT . . . . . . . . . . . . . . . . . . . .   4
     4.1.  Strict Latency  . . . . . . . . . . . . . . . . . . . . .   4
     4.2.  Constrained Network Bandwidth . . . . . . . . . . . . . .   5
     4.3.  Constrained Devices . . . . . . . . . . . . . . . . . . .   5
     4.4.  Uninterrupted Services with Intermittent Connectivity to
           the Cloud . . . . . . . . . . . . . . . . . . . . . . . .   5
     4.5.  Privacy and Security  . . . . . . . . . . . . . . . . . .   5
   5.  IoT integrated with Edge Computing  . . . . . . . . . . . . .   5
     5.1.  IoT Data in Edge Computing  . . . . . . . . . . . . . . .   5
       5.1.1.  Data Storage  . . . . . . . . . . . . . . . . . . . .   6
       5.1.2.  Data Processing . . . . . . . . . . . . . . . . . . .   6
       5.1.3.  Data Analyzing  . . . . . . . . . . . . . . . . . . .   7
     5.2.  IoT Device Management in Edge Computing . . . . . . . . .   7
     5.3.  Edge Computing in IoT . . . . . . . . . . . . . . . . . .   7
   6.  Use Cases of Edge Computing in IoT  . . . . . . . . . . . . .   8
     6.1.  Smart Constructions . . . . . . . . . . . . . . . . . . .   8
     6.2.  Smart Grid  . . . . . . . . . . . . . . . . . . . . . . .   9
     6.3.  Smart Water System  . . . . . . . . . . . . . . . . . . .   9
     6.4.  Smart Buildings . . . . . . . . . . . . . . . . . . . . .   9
     6.5.  Smart Cities  . . . . . . . . . . . . . . . . . . . . . .   9
     6.6.  Connected Vehicles  . . . . . . . . . . . . . . . . . . .  10
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  10
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  10
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  10
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  11

1.  Introduction

   Nowadays, most IoT services are based on Cloud computing since it can
   provide virtually unlimited storage and processing power.  The
   integration of IoT with Cloud computing brings many advantages such
   as flexibility, efficiency, and ability to store and use data.

Hong, et al.             Expires April 25, 2019                 [Page 2]
Internet-Draft           IoT with Edge computing            October 2018

   However, the IoT environment is changing in such a way that vast
   amounts of data are created at edge networks and about a half of data
   is stored, processed, analyzed and acted upon close to the data
   producer.  Emerging IoT services introduce new challenges that cannot
   be addressed by today's centralized Cloud computing models alone.

   Thus, in this document, we describe new challenges for emerging IoT
   services such as strict latency, constrained network bandwidth,
   constrained devices, uninterrupted services with intermittent
   connectivity, privacy and security due to the IoT environmental
   changes.

   In order to address those new challenges for IoT services, the
   integration of Edge computing and IoT has been emerged as a promising
   solution.  In this document, we thus describe the concept of IoT
   integrated with Edge computing as well as its use cases to discuss
   the benefits and challenges of Edge computing mainly focused on IoT
   data.  The purpose of this document is to bring up the issues of Edge
   computing for IoT services in IETF/IRTF.

2.  Conventions and Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Background

3.1.  Internet of Things (IoT)

   Since the phrase 'Internet of Things (IoT)' was coined by Kevin
   Ashton in 1999 working on Radio-frequency identification (RFID)
   technology at the Auto-ID Center of the Massachusetts Institute of
   Technology (MIT) [Ashton], the concept of IoT has been that things
   connected to the Internet can send and receive information collected
   by sensors without human intervention, where things are various
   embedded systems such as home appliances, mobile equipment, wearable
   devices, etc.  IoT has become one of the notable innovations playing
   an important role in our daily lives [Lin].

3.2.  IoT with Cloud computing

   IoT is generally characterized by real world small things that are
   widely distributed but have limited storage and processing power.  On
   the other hand, Cloud computing is an emerging technology which has
   virtually unlimited capacity in terms of storage and processing
   power.  Thus, the IoT with Cloud computing has been recognized as an
   efficient way to overcome those IoT issues [Botta].

Hong, et al.             Expires April 25, 2019                 [Page 3]
Internet-Draft           IoT with Edge computing            October 2018

   The integration of IoT with Cloud computing brings many advantages
   such as flexibility, efficiency, and capability to store and use IoT
   data since Cloud computing has been a mature technology used to
   provide computing services or IoT data storage over the Internet.

3.3.  Environment changes/Paradigm shift

   Now with IoT, we will reach the era of post-Clouds where
   unprecedented volume and variety of data will be generated by things
   at edge networks and many applications will be deployed on the edge
   netwoks to consume these IoT data.  Some of the applications may have
   very short response times, some may contain personal data, and others
   may generate vast amounts of data.  Today's Cloud based service
   models are not suitable for these applications.

   Cisco Systems predicts that by 2019, 45% of the data created in IoT
   will be stored, processed, analyzed and acted close to, or at the
   edge of the network and about 50 billion devices will connect to the
   Internet by 2020 [Evans].  So, moving all data from edge networks to
   the cloud data center may not be an efficient way anymore to process
   vast amounts of data.

   In Cloud computing, users traditionally only consumed IoT data
   through Cloud services.  Now, however, users are also producing IoT
   data with their mobile devices.  This change requires more
   functionality at edge networks [Shi].

4.  New challenges of IoT

   As the IoT environment is changing in such a way that vast amounts of
   data are created at edge networks and about a half of IoT data is
   stored, processed, analyzed and acted close to the IoT data producer,
   the emerging IoT services introduce new challenges that cannot be
   addressed by today&", Proc. of 7th ACM Conf. on Information-Centric
              Networking (ICN-2020) ACM DL, pp. 70-76, September 2020,
              <https://doi.org/10.1145/3405656.3418719>.

   [TLV-ENC-802.15.4]
              Mosko, M. and C. Tschudin, "CCN and NDN TLV encodings in
              802.15.4 packets", January 2015,
              <https://datatracker.ietf.org/meeting/interim-2015-icnrg-
              01/materials/slides-interim-2015-icnrg-1-2>.

   [WIRE-FORMAT-CONSID]
              Wang, G., Tschudin, C., and R. Ravindran, "CCN/NDN
              Protocol Wire Format and Functionality Considerations",
              January 2015, <https://datatracker.ietf.org/meeting/
              interim-2015-icnrg-01/materials/slides-interim-2015-icnrg-
              1-8>.

Appendix A.  Estimated Size Reduction

   In the following, a theoretical evaluation is given to estimate the
   gains of ICN LoWPAN compared to uncompressed CCNx and NDN messages.

   We assume that n is the number of name components; comps_n denotes
   the sum of n name component lengths.  We also assume that the length
   of each name component is lower than 16 bytes.  The length of the
   content is given by clen.  The lengths of TLV components are specific
   to the CCNx or NDN encoding and are outlined below.

A.1.  NDN

   The NDN TLV encoding has variable-sized TLV fields.  For simplicity,
   the 1-byte form of each TLV component is assumed.  A typical TLV
   component therefore is of size 2 (Type field + Length field) + the
   actual value.

A.1.1.  Interest

   Figure 34 depicts the size requirements for a basic, uncompressed NDN
   Interest containing a CanBePrefix TLV, a MustBeFresh TLV, an
   InterestLifetime TLV set to 4 seconds, and a HopLimit TLV set to 6.
   Numbers below represent the amount of bytes.

         ------------------------------------,
         Interest TLV            = 2         |
           ---------------------,            |
           Name                 |  2 +       |
             NameComponents      = 2n +      |
                                |  comps_n   |
           ---------------------'             = 21 + 2n + comps_n
           CanBePrefix           = 2         |
           MustBeFresh           = 2         |
           Nonce                 = 6         |
           InterestLifetime      = 4         |
           HopLimit              = 3         |
         ------------------------------------'

         Figure 34: Estimated Size of an Uncompressed NDN Interest

   Figure 35 depicts the size requirements after compression.

         ------------------------------------,
         Dispatch Page Switch    = 1         |
         NDN Interest Dispatch   = 2         |
         Interest TLV            = 1         |
         -----------------------,            |
         Name                   |            |
           NameComponents        = n/2 +      = 10 + n/2 + comps_n
                                |  comps_n   |
         -----------------------'            |
         Nonce                   = 4         |
         HopLimit                = 1         |
         InterestLifetime        = 1         |
         ------------------------------------'

           Figure 35: Estimated Size of a Compressed NDN Interest

   The size difference is 11 + 1.5n bytes.

   For the name /DE/HH/HAW/BT7, the total size gain is 17 bytes, which
   is 43% of the uncompressed packet.

A.1.2.  Data

   Figure 36 depicts the size requirements for a basic, uncompressed NDN
   Data containing a FreshnessPeriod as MetaInfo.  A FreshnessPeriod of
   1 minute is assumed, and the value is encoded using 1 byte.  An
   HMACWithSha256 is assumed as a signature.  The key locator is assumed
   to contain a Name TLV of length klen.

        ------------------------------------,
        Data TLV                = 2         |
          ---------------------,            |
          Name                 |  2 +       |
            NameComponents      = 2n +      |
                               |  comps_n   |
          ---------------------'            |
          ---------------------,            |
          MetaInfo             |            |
            FreshnessPeriod     = 6         |
                               |             = 53 + 2n + comps_n +
          ---------------------'            |  clen + klen
          Content               = 2 + clen  |
          ---------------------,            |
          SignatureInfo        |            |
            SignatureType      |            |
              KeyLocator        = 41 + klen |
          SignatureValue       |            |
            DigestSha256       |            |
          ---------------------'            |
        ------------------------------------'

           Figure 36: Estimated Size of an Uncompressed NDN Data

   Figure 37 depicts the size requirements for the compressed version of
   the above Data packet.

        ------------------------------------,
        Dispatch Page Switch    = 1         |
        NDN Data Dispatch       = 2         |
        -----------------------,            |
        Name                   |            |
          NameComponents        = n/2 +     |
                               |  comps_n    = 38 + n/2 + comps_n +
        -----------------------'            |  clen + klen
        Content                 = 1 + clen  |
        KeyLocator              = 1 + klen  |
        DigestSha256            = 32        |
        FreshnessPeriod         = 1         |
        ------------------------------------'

             Figure 37: Estimated Size of a Compressed NDN Data

   The size difference is 15 + 1.5n bytes.

   For the name /DE/HH/HAW/BT7, the total size gain is 21 bytes.

A.2.  CCNx

   The CCNx TLV encoding defines a 2-byte encoding for Type and Length
   fields, summing up to 4 bytes in total without a value.

A.2.1.  Interest

   Figure 38 depicts the size requirements for a basic, uncompressed
   CCNx Interest.  No hop-by-hop TLVs are included, the protocol version
   is assumed to be 1, and the Reserved field is assumed to be 0.  A
   KeyIdRestriction TLV with T_SHA-256 is included to limit the
   responses to Content Objects containing the specific key.

         ------------------------------------,
         Fixed Header            = 8         |
         Message                 = 4         |
           ---------------------,            |
           Name                 |  4 +        = 56 + 4n + comps_n
             NameSegments        = 4n +      |
                                |  comps_n   |
           ---------------------'            |
           KeyIdRestriction      = 40        |
         ------------------------------------'

         Figure 38: Estimated Size of an Uncompressed CCNx Interest

   Figure 39 depicts the size requirements after compression.

         ------------------------------------,
         Dispatch Page Switch    = 1         |
         CCNx Interest Dispatch  = 2         |
         Fixed Header            = 3         |
         -----------------------,            |
         Name                   |             = 38 + n/2 + comps_n
           NameSegments          = n/2 +     |
                                |  comps_n   |
         -----------------------'            |
         T_SHA-256               = 32        |
         ------------------------------------'

          Figure 39: Estimated Size of a Compressed CCNx Interest

   The size difference is 18 + 3.5n bytes.

   For the name /DE/HH/HAW/BT7, the size is reduced by 53 bytes, which
   is 53% of the uncompressed packet.

A.2.2.  Content Object

   Figure 40 depicts the size requirements for a basic, uncompressed
   CCNx Content Object containing an ExpiryTime Message TLV, an
   HMAC_SHA-256 signature, the signature time, and a hash of the shared
   secret key.  In the fixed header, the protocol version is assumed to
   be 1 and the Reserved field is assumed to be 0

     ------------------------------------,
     Fixed Header            = 8         |
     Message                 = 4         |
       ---------------------,            |
       Name                 |  4 +       |
         NameSegments        = 4n +      |
                            |  comps_n   |
       ---------------------'            |
       ExpiryTime            = 12         = 124 + 4n + comps_n + clen
       Payload               = 4 + clen  |
       ---------------------,            |
       ValidationAlgorithm  |            |
         T_HMAC-256          = 56        |
           KeyID            |            |
         SignatureTime      |            |
       ---------------------'            |
       ValidationPayload     = 36        |
     ------------------------------------'

      Figure 40: Estimated Size of an Uncompressed CCNx Content Object

   Figure 41 depicts the size requirements for a basic, compressed CCNx
   Data.

     ------------------------------------,
     Dispatch Page Switch    = 1         |
     CCNx Content Dispatch   = 3         |
     Fixed Header            = 2         |
     -----------------------,            |
     Name                   |            |
       NameSegments          = n/2 +     |
                            |  comps_n    = 89 + n/2 + comps_n + clen
     -----------------------'            |
     ExpiryTime              = 8         |
     Payload                 = 1 + clen  |
     T_HMAC-SHA256           = 32        |
     SignatureTime           = 8         |
     ValidationPayload       = 34        |
     ------------------------------------'

         Figure 41: Estimated Size of a Compressed CCNx Data Object

   The size difference is 35 + 3.5n bytes.

   For the name /DE/HH/HAW/BT7, the size is reduced by 70 bytes, which
   is 40% of the uncompressed packet containing a 4-byte payload.

Acknowledgments

   This work was stimulated by fruitful discussions in the ICNRG and the
   communities of RIOT and CCNlite.  We would like to thank all active
   members for constructive thoughts and feedback.  In particular, the
   authors would like to thank (in alphabetical order) Peter Kietzmann,
   Dirk Kutscher, Martine Lenders, Colin Perkins, and Junxiao Shi. The
   hop-wise stateful name compression was brought up in a discussion by
   Dave Oran, which is gratefully acknowledged.  Larger parts of this
   work are inspired by [RFC4944] and [RFC6282].  Special mention goes
   to Mark Mosko, as well as G.Q. Wang and Ravi Ravindran, as their
   previous work in [TLV-ENC-802.15.4] and [WIRE-FORMAT-CONSID] provided
   a good base for our discussions on stateless header compression
   mechanisms.  Many thanks also to Carsten Bormann and Lars Eggert, who
   contributed in-depth comments during the IRSG review.  This work was
   supported in part by the German Federal Ministry of Research and
   Education within the projects I3 and RAPstore.

Authors' Addresses

   Cenk Gündoğan
   HAW Hamburg
   Berliner Tor 7
   D-20099 Hamburg
   Germany

   Phone: +4940428758067
   Email: cenk.guendogan@haw-hamburg.de
   URI:   http://inet.haw-hamburg.de/members/cenk-gundogan

   Thomas C. Schmidt
   HAW Hamburg
   Berliner Tor 7
   D-20099 Hamburg
   Germany

   Email: t.schmidt@haw-hamburg.de
   URI:   http://inet.haw-hamburg.de/members/schmidt

   Matthias Wählisch
   link-lab & FU Berlin
   Hoenower Str. 35
   D-10318 Berlin
   Germany

   Email: mw@link-lab.net
   URI:   https://www.mi.fu-berlin.de/en/inf/groups/ilab/members/
   waehlisch.html

   Christopher Scherb
   University of Applied Sciences and Arts Northwestern Switzerland
   Peter Merian-Str. 86
   CH-4002 Basel
   Switzerland

   Email: christopher.scherb@fhnw.ch

   Claudio Marxer
   University of Basel
   Spiegelgasse 1
   CH-4051 Basel
   Switzerland

   Email: claudio.marxer@unibas.ch

   Christian Tschudin
   University of Basel
   Spiegelgasse 1
   CH-4051 Basel
   Switzerland

   Email: christian.tschudin@unibas.ch