[DG-IDoT] out IDoT topics

Ingo.Friese at telekom.de Ingo.Friese at telekom.de
Tue Nov 19 08:24:12 CST 2013

To me this is not a question of a single protocol its rather a model to focus and group our topics.
We have limited resources and can not handle everything at a time.
So this was my first attempt to bring focus and priorities in our topics.

From: j stollman [mailto:stollman.j at gmail.com]
Sent: Montag, 18. November 2013 23:40
To: Salvatore D'Agostino
Cc: Friese, Ingo; dg-idot at kantarainitiative.org
Subject: Re: [DG-IDoT] out IDoT topics

I am not yet convinced that the ability to link everything through a single protocol is desirable.

The notion of being able to obtain data from all sensors and/or to be able to control all active components is alluring.  But, I would assert that anything that we can do with this new ability, adversaries can exploit as well.

The notion of defense-in-depth is to complicate control of devices by using multiple protocols.  This makes it more difficult for adversaries to take over our networks and devices.

Deciding which devices to make easily accessible and which to make more complicated is going to be a complicated process.


On Mon, Nov 18, 2013 at 9:16 AM, Salvatore D'Agostino <sal at idmachines.com<mailto:sal at idmachines.com>> wrote:
Thanks Ingo,

Yes that's a traditional SCADA approach.  Certainly applies, sensor \controller\ network

At the same time the reason we are talking about this is that much of this is available at the edge.

Rgds all,


From: dg-idot-bounces at kantarainitiative.org<mailto:dg-idot-bounces at kantarainitiative.org> [mailto:dg-idot-bounces at kantarainitiative.org<mailto:dg-idot-bounces at kantarainitiative.org>] On Behalf Of Ingo.Friese at telekom.de<mailto:Ingo.Friese at telekom.de>
Sent: Monday, November 18, 2013 8:49 AM
To: dg-idot at kantarainitiative.org<mailto:dg-idot at kantarainitiative.org>
Subject: [DG-IDoT] out IDoT topics

Hi All,

I'm back from vacation and business trips. One week ago I promoted our group at IEEE IoT workshop.
Find attached my slide set.
I'd like to draw your attention to slide 4. This is my attempt to cluster and to prioritize different IdM Topics
(identifier, mapping, discovery, authentication, authorization, privacy...).

I saw a youtube video by Scott Jenson (@Paul thanks for sending the link to the list). Scott sees three layers of complexity in the IoT.

-          First one is about simple sensors/actuators e.g. measuring the temperature at "central square" - here the challenge is discovery

-          Second layer is "control" - it's about putting some restrictive elements in front of the sensor - a user needs to authenticate etc.

-          Third layer is "coordination"-it's about many devices acting together according to certain policies etc.
Along these layers I located different sub-topics of our identity discussion.
Maybe it's a good way to bring some order and focus to our groups topics.
It would be good to match this order with your current IoT projects/experiences and provide feedback.

Many greets,


DG-IDoT mailing list
DG-IDoT at kantarainitiative.org<mailto:DG-IDoT at kantarainitiative.org>

Jeff Stollman
stollman.j at gmail.com<mailto:stollman.j at gmail.com>
1 202.683.8699

Truth never triumphs - its opponents just die out.
Science advances one funeral at a time.
                                    Max Planck
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://kantarainitiative.org/pipermail/dg-idot/attachments/20131119/2e556bca/attachment.html>

More information about the DG-IDoT mailing list