SlideShare a Scribd company logo
1 of 41
Device Management with
OMA Lightweight M2M
Simon Lemay and
Hannes Tschofenig
Overview
 Why Lightweight Device Management
 OMA Lightweight M2M Standard
 Bootstrapping Interface
 Object Model
 Access Control Model
 Application Server Interaction
 Example Flows
©Sensinode 2013
Why Lightweight Device
Management
 Traditional Device Management (DM) is widely used in mobile devices
 Used by operators and enterprises for managing smart phones, tablets and
laptops
 Some M2M DM use today with cellular devices, mostly proprietary
 OMA DM was one of the first standards for device management in the
mobile handset sector.
 In the meanwhile various standards exist that provide similar functionality,
such as TR 69, or IEEE 802.1AR.
 OMA Lightweight M2M (LWM2M) created to serve the IoT market with
a focus on lightweight nature:
 Applicable to various radio technologies (devices just need IP connectivity)
 Extensible object model and registry open to the whole industry
 Enables both management and application data handling with the same
solution
 Addresses security need for software updates and device re-configuration.
 Re-uses IETF specifications.
Why Lightweight Device
Management?
©Sensinode 2013
Features
Mobile Device
Management
Device
Management
Bootstrap
ping
Device
Configurat
ion
Firmware
Update
Fault
Managem
ent
 Key management
 Service
provisioning
 Access Control
 Changes to settings
 Changes to parameters
of the device
 Update application and system
software
 Bug fixes
 Report Errors from devices
 Query about status of devices
Application Configurat
ion &
Control
Reporting
 Configure settings of the
application
 Send control commands
 Notify changes in sensor values
 Notify alarms and events
OMA LWM2M Architecture
 M2M Applications
 Application abstraction
through REST API
 Resource Discovery and
Linking
 LWM2M Clients are Devices
 Device abstraction through CoAP
 LWM2M Clients are CoAP Servers
 Any IP network connection
 LWM2M Server
 Reuses IETF technologies,
such as the CoAP protocol,
DTLS, Resource Directory.
 Deployable on gateways and in
the cloud
UDP
SMSDTLS
CoAP
LWM2M
Objects
LWM2M Interfaces
• Bootstrap Interface
– Configure Servers & Keys &
ACLs
– Pre-Configured, Smart Card, or
Server Initiated Bootstrap
– CoAP REST API
• Registration Interface
– RFC 6690 and Resource
Directory
• Management Interface Using
Objects
– Management Objects and
Resources
– CoAP REST API
• Reporting Interface
– Object Instances and
Resources Report
– Asynchronous notification
using CoAP Observe
Bootstrap Interface
Bootstrapping Architecture
Client Server
KDC
DTLS Secured Communication
Bootstrapping
©Sensinode 2013
Bootstrapping Features
 OMA LWM2M supports different credential provisioning
procedures:
 Pre-shared Secrets
 Raw Public Keys
 Certificates
 These credentials are provisioned by the Bootstrap
Server for use with LWM2M servers.
 It is possible to mix credentials for use with different
servers and even to use different credentials in a single
client/server interaction.
 The LWM2M client is assumed to possess credentials
for authentication to the Bootstrap Server. These
credentials are typically pre-provisioned during
manufacturing time.
Pre-Shared Key Mode
Raw Public Key Mode
Certificate Mode
 LWM2M Client may be pre-provisioned with information about the
LWM2M Server (rather than distributing credentials with the
bootstrapping protocol)
 LWM2M Client MUST have a LWM2M Bootstrap Server Account
(+Bootstrap Server URI, Endpoint Client Name)
 LWM2M Security Object
 Security Mode (PSK, raw public key, certificate, no-sec)
 Public Key or Identity (certificate, public key, or PSK identity)
 Server Public Key or Identity (LWM2M server or bootstrap
server certificate, public key or PSK identity)
 Secret Key (secret key or private key)
 LWM2M Server URI (bootstrap server or LWM2M server)
 Bootstrap Server (true – false)
A few more details
Object Model
 A LWM2M Client has one or more Object
Instances
 An Object is a collection of Resources
 A Resource is an atomic piece of information
that can be
 Read, Written or Executed
 Resources can have multiple instances
 Access control list (ACL) objects control access
to objects accessed by LWM2M Servers
 Objects and Resources are identified by a 16-bit
Integer, Instances by an 8-bit Integer
 Objects/Resources are accessed with simple
URIs:
/{Object ID}/{Object Instance}/{Resource ID}
 Example: /3/0/1 =
3 = Device Object,
0 = Object Instance #0,
1 = Manufacturer Resource
Object Model
©Sensinode 2013
 The LWM2M Technical Specification defines eight normative Objects
Standard Device Management
Objects
©Sensinode 2013
Object Name ID Multiple Instances? Description
LWM2M Security 0 Yes This LWM2M Object provides the keying material of a
LWM2M Client appropriate to access a specified
LWM2M Server.
LWM2M Server 1 Yes This LWM2M objects provides the data related to a
LWM2M server.
Access Control 2 Yes Access Control Object is used to check whether the
LWM2M Server has access right for performing an
operation.
Device 3 No This LWM2M Object provides a range of device related
information which can be queried by the LWM2M
Server, and a device reboot and factory reset function.
Connectivity Monitoring 4 No This LWM2M objects enables monitoring of parameters
related to network connectivity.
Firmware 5 No This Object includes installing firmware package,
updating firmware, and performing actions after
updating firmware.
Location 6 No The GPS location of the device.
Connectivity Statistics 7 No This LWM2M Objects enables client to collect statistical
information and enables the LWM2M Server to retrieve
these information, set the collection duration and reset
the statistical parameters.
 Example of the LWM2M Location Object, which has 6
Resources
Object Example
©Sensinode 2013
 Defining a new Object is straightforward
 Object IDs are registered with the OMA Naming Authority
(OMNA)
 Who can register an Object?
 OMA working groups
 3rd party organizations
 Enterprises
 How to register an Object?
 Write a specification filling out the Object template tables:
 Object Name, Description and if it can have Multiple
Instances
 The list of resources the Object defines
 Fill out the Lightweight Object form on-line.
 IPSO Alliance has created additional objects, which are
documented here (Starter Pack) and here (Expansion Pack).
Defining new Objects
©Sensinode 2013
Access Control Model
Overview
 Bootstrap servers distribute access control lists to LWM2M clients.
 Example from Appendix F of the OMA LWM2M technical specification:
(Table shows example objects provisioned at a LWM2M client by the
Bootstrap server.)
Overview, cont.
LWM2M
Client
LWM2M
Server
2
Luminaire
LWM2M
Client 3
Registration and
resource access
Light
Switc
h
ACL:
<Server 1,
RW>
LWM2M
Server 1
Registration
and
resource
access
LWM2M
Bootstrap
Server
Application
ACL:
<Server 2,
RW>
Discussion
 ACLs work well when a Bootstrap Server is aware of the future
interactions between LWM2M servers and LWM2M clients.
 Real-time provisioning of ACLs by the Bootstrap Server is also
possible.
 During registration a LWM2M client is a CoAP client; afterwards it
becomes a CoAP server waiting for incoming CoAP requests.
 Notes:
 LWM2M clients can become LWM2M servers in another communication
setup and may therefore also receive ACLs from the Bootstrap Server. In
our example light switches and luminaires are LWM2M clients in different
communication scenarios.
 Different LWM2M clients may also use different Bootstrap Servers.
 A single LWM2M client may also have more than one Bootstrap Server
(e.g., for redundancy/ purpose)
Application Server Interaction
LWM2M Application Server
Web
Server App
LWM2M
Server
Soft Endpoints
IP
Device
IP
Device
LWM2M Clients
/3303/0/5700
/domain/endpoints/3303/0/5700
LWM2M Application Server
Web
Server App
LWM2M
Server
IP
Device
IP
Device
LWM2M Clients
/domain/endpoints/3303/0/5700
/3303/0/5700
LWM2M Application Server
Web
Server App
LWM2M
Server
IP
Device
IP
Device
LWM2M Clients
LWM2M Supports Sleeping
Endpoints “b=uq”
 Client uses the
registration
refresh to inform
LWM2M server
that it is awake,
and listens for
any queued
operations
Observe Parameters
 LWM2M provides a mechanism to control Observation
 “Write Attributes” Interface using query parameters to set observe
attributes:
 Pmin – minimum observation quiet period, to limit notification
frequency
 Pmax – maximum observation quiet period, to guarantee
notifications
 Lt – low limit measurement notification, like low alarm, in
engineering units
 Gt – high limit measurement notification, like a high alarm, in
engineering units
 Step – Minimum delta change required to notify, in engineering units
LWM2M Bulk Read
 Returns TLV or
JSON based on
requested
content-format
 CBOR needs to
be added
 Linked Objects
are supported
{“e”:[
{"n":"0","sv":"Open Mobile
Alliance"},
{"n":"1","sv":"Lightweight M2M
Client"},
{"n":"2","sv":"345000123"},
{"n":"3","sv":"1.0"},
{"n":"6/0","v":"1"},
{"n":"6/1","v":"5"},
{"n":"7/0","v":"3800"},
{"n":"7/1","v":"5000"},
{"n":"8/0","v":"125"},
{"n":"8/1","v":"900"},
{"n":"9","v":"100"},
{"n":"10","v":"15"},
{"n":"11/0","v":"0"},
{"n":"13","v":"1367491215"},
{"n":"14","sv":"+02:00"},
{"n":"15","sv":"U"}]
}
LWM2M Uses CoRE RD
Resource Links (RFC 6690)
 Links are uploaded during registration to inform the
LWM2M server about resources on the endpoint
 Links are discovered using GET with content type
“application/link-format”
 JSON representation using content type
“application/link-format+json”
<4001/0/9002>;rt=“oma.lwm2m”;ct=50;obs=1
Resource Type
Content Type
Observable
Example Flows
Interface Flows
©Sensinode 2013
Registration
©Sensinode 2013
Object Access
©Sensinode 2013
Notification
©Sensinode 2013
Queue Mode (Sleeping
Devices)
©Sensinode 2013
Summary
 LWM2M re-uses many IETF specifications.
Specifications are publically available for download here.
 Implementations and products are available. Example:
Leshan (as an open source implementation)
 Several plugfests took place already and
there the issue list can be found here.
 Work on a bugfix release is in progress and
the Version 1.1 specification work will be
started soon to specification with ongoing IETF work.
40
Using LWM2M with ARM
Create your
application with
mbed Client.
Examples:
• mbed client
(Linux)
• mbed client
(mbed OS)
Connect your IoT
devices to the mbed
Device Connector at
https://connector.mbe
d.com
Create your web
application with example
code or REST API
Links:
• Example code
• Documentation

More Related Content

What's hot

Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いLinuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いRetrieva inc.
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and CaliforniumJulien Vermillard
 
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決techlog (Internet Initiative Japan Inc.)
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBoni Yeamin
 
About 6lowpan wi-sun_ecl_20150116
About 6lowpan wi-sun_ecl_20150116About 6lowpan wi-sun_ecl_20150116
About 6lowpan wi-sun_ecl_20150116Umeda Hidekazu
 
Pulsar - Distributed pub/sub platform
Pulsar - Distributed pub/sub platformPulsar - Distributed pub/sub platform
Pulsar - Distributed pub/sub platformMatteo Merli
 
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...NETWAYS
 
Mqtt overview (iot)
Mqtt overview (iot)Mqtt overview (iot)
Mqtt overview (iot)David Fowler
 
pfSense, OpenSource Firewall
pfSense, OpenSource FirewallpfSense, OpenSource Firewall
pfSense, OpenSource FirewallErik Kirschner
 
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)Ryuichi Yasunaga
 
Apache kafka 관리와 모니터링
Apache kafka 관리와 모니터링Apache kafka 관리와 모니터링
Apache kafka 관리와 모니터링JANGWONSEO4
 

What's hot (20)

Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
さくらのセキュアモバイルコネクトの仕組み
さくらのセキュアモバイルコネクトの仕組みさくらのセキュアモバイルコネクトの仕組み
さくらのセキュアモバイルコネクトの仕組み
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
IIJmio meeting 7 MVNOとSIMフリー端末の問題について
IIJmio meeting 7 MVNOとSIMフリー端末の問題についてIIJmio meeting 7 MVNOとSIMフリー端末の問題について
IIJmio meeting 7 MVNOとSIMフリー端末の問題について
 
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いLinuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and Californium
 
IIJmio meeting 31 音声通信の世界
IIJmio meeting 31 音声通信の世界IIJmio meeting 31 音声通信の世界
IIJmio meeting 31 音声通信の世界
 
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決
IIJmio meeting 26 プライベートLTEとパブリックLTEの相互運用における問題とその解決
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
About 6lowpan wi-sun_ecl_20150116
About 6lowpan wi-sun_ecl_20150116About 6lowpan wi-sun_ecl_20150116
About 6lowpan wi-sun_ecl_20150116
 
An introduction to MQTT
An introduction to MQTTAn introduction to MQTT
An introduction to MQTT
 
CORS and (in)security
CORS and (in)securityCORS and (in)security
CORS and (in)security
 
Open Match Deep Dive
Open Match Deep DiveOpen Match Deep Dive
Open Match Deep Dive
 
Pulsar - Distributed pub/sub platform
Pulsar - Distributed pub/sub platformPulsar - Distributed pub/sub platform
Pulsar - Distributed pub/sub platform
 
Native Memory Tracking
Native Memory TrackingNative Memory Tracking
Native Memory Tracking
 
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...
OSMC 2022 | VictoriaMetrics: scaling to 100 million metrics per second by Ali...
 
Mqtt overview (iot)
Mqtt overview (iot)Mqtt overview (iot)
Mqtt overview (iot)
 
pfSense, OpenSource Firewall
pfSense, OpenSource FirewallpfSense, OpenSource Firewall
pfSense, OpenSource Firewall
 
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)
3GPP 5G SA Detailed explanation 5(5G SA Handover Call Flow include 5GC)
 
Apache kafka 관리와 모니터링
Apache kafka 관리와 모니터링Apache kafka 관리와 모니터링
Apache kafka 관리와 모니터링
 

Similar to Device Management with OMA Lightweight M2M

Ipso smart object seminar
Ipso smart object seminarIpso smart object seminar
Ipso smart object seminarMichael Koster
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management ProtocolsLeo Dumov
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoMichael Koster
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoMichael Koster
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Open Mobile Alliance
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoMichael Koster
 
LWM2M Introduction - Edinburgh 2016 Workshop with ARM
LWM2M Introduction - Edinburgh 2016 Workshop with ARMLWM2M Introduction - Edinburgh 2016 Workshop with ARM
LWM2M Introduction - Edinburgh 2016 Workshop with ARMOpen Mobile Alliance
 
Hands on with lightweight m2m and Eclipse Leshan
Hands on with lightweight m2m and Eclipse LeshanHands on with lightweight m2m and Eclipse Leshan
Hands on with lightweight m2m and Eclipse LeshanJulien Vermillard
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningAr Agarwal
 
Understanding Platform as a Service
Understanding Platform as a ServiceUnderstanding Platform as a Service
Understanding Platform as a ServicePaul Fremantle
 
Building an Observability Platform in 389 Difficult Steps
Building an Observability Platform in 389 Difficult StepsBuilding an Observability Platform in 389 Difficult Steps
Building an Observability Platform in 389 Difficult StepsDigitalOcean
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of RobotiumSusan Tullis
 
Device Management for OSGi IoT Gateways
Device Management for OSGi IoT GatewaysDevice Management for OSGi IoT Gateways
Device Management for OSGi IoT GatewaysEurotech
 
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...FIWARE
 
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDevice Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDuncan Purves
 
Hpe service virtualization 3.8 what's new chicago adm
Hpe service virtualization 3.8 what's new chicago admHpe service virtualization 3.8 what's new chicago adm
Hpe service virtualization 3.8 what's new chicago admJeffrey Nunn
 
FIWARE Tech Summit - lwM2M IoT Agent in Depth
FIWARE Tech Summit - lwM2M IoT Agent in DepthFIWARE Tech Summit - lwM2M IoT Agent in Depth
FIWARE Tech Summit - lwM2M IoT Agent in DepthFIWARE
 

Similar to Device Management with OMA Lightweight M2M (20)

Ipso smart object seminar
Ipso smart object seminarIpso smart object seminar
Ipso smart object seminar
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipso
 
OMA Lightweight M2M
OMA Lightweight M2M OMA Lightweight M2M
OMA Lightweight M2M
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipso
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipso
 
LWM2M Introduction - Edinburgh 2016 Workshop with ARM
LWM2M Introduction - Edinburgh 2016 Workshop with ARMLWM2M Introduction - Edinburgh 2016 Workshop with ARM
LWM2M Introduction - Edinburgh 2016 Workshop with ARM
 
Hands on with lightweight m2m and Eclipse Leshan
Hands on with lightweight m2m and Eclipse LeshanHands on with lightweight m2m and Eclipse Leshan
Hands on with lightweight m2m and Eclipse Leshan
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
 
Understanding Platform as a Service
Understanding Platform as a ServiceUnderstanding Platform as a Service
Understanding Platform as a Service
 
Building an Observability Platform in 389 Difficult Steps
Building an Observability Platform in 389 Difficult StepsBuilding an Observability Platform in 389 Difficult Steps
Building an Observability Platform in 389 Difficult Steps
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of Robotium
 
Device Management for OSGi IoT Gateways
Device Management for OSGi IoT GatewaysDevice Management for OSGi IoT Gateways
Device Management for OSGi IoT Gateways
 
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
 
Microservices
MicroservicesMicroservices
Microservices
 
Mule overview
Mule overviewMule overview
Mule overview
 
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2MDevice Management for Internet of Things Constrained Devices OMA Lightweight M2M
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M
 
Hpe service virtualization 3.8 what's new chicago adm
Hpe service virtualization 3.8 what's new chicago admHpe service virtualization 3.8 what's new chicago adm
Hpe service virtualization 3.8 what's new chicago adm
 
FIWARE Tech Summit - lwM2M IoT Agent in Depth
FIWARE Tech Summit - lwM2M IoT Agent in DepthFIWARE Tech Summit - lwM2M IoT Agent in Depth
FIWARE Tech Summit - lwM2M IoT Agent in Depth
 

More from Hannes Tschofenig

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesHannes Tschofenig
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Hannes Tschofenig
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT SecurityHannes Tschofenig
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Hannes Tschofenig
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsHannes Tschofenig
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?Hannes Tschofenig
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successfulHannes Tschofenig
 

More from Hannes Tschofenig (10)

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Smart Object Architecture
Smart Object ArchitectureSmart Object Architecture
Smart Object Architecture
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M Processors
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Device Management with OMA Lightweight M2M

  • 1. Device Management with OMA Lightweight M2M Simon Lemay and Hannes Tschofenig
  • 2. Overview  Why Lightweight Device Management  OMA Lightweight M2M Standard  Bootstrapping Interface  Object Model  Access Control Model  Application Server Interaction  Example Flows ©Sensinode 2013
  • 4.  Traditional Device Management (DM) is widely used in mobile devices  Used by operators and enterprises for managing smart phones, tablets and laptops  Some M2M DM use today with cellular devices, mostly proprietary  OMA DM was one of the first standards for device management in the mobile handset sector.  In the meanwhile various standards exist that provide similar functionality, such as TR 69, or IEEE 802.1AR.  OMA Lightweight M2M (LWM2M) created to serve the IoT market with a focus on lightweight nature:  Applicable to various radio technologies (devices just need IP connectivity)  Extensible object model and registry open to the whole industry  Enables both management and application data handling with the same solution  Addresses security need for software updates and device re-configuration.  Re-uses IETF specifications. Why Lightweight Device Management? ©Sensinode 2013
  • 5. Features Mobile Device Management Device Management Bootstrap ping Device Configurat ion Firmware Update Fault Managem ent  Key management  Service provisioning  Access Control  Changes to settings  Changes to parameters of the device  Update application and system software  Bug fixes  Report Errors from devices  Query about status of devices Application Configurat ion & Control Reporting  Configure settings of the application  Send control commands  Notify changes in sensor values  Notify alarms and events
  • 6. OMA LWM2M Architecture  M2M Applications  Application abstraction through REST API  Resource Discovery and Linking  LWM2M Clients are Devices  Device abstraction through CoAP  LWM2M Clients are CoAP Servers  Any IP network connection  LWM2M Server  Reuses IETF technologies, such as the CoAP protocol, DTLS, Resource Directory.  Deployable on gateways and in the cloud UDP SMSDTLS CoAP LWM2M Objects
  • 7. LWM2M Interfaces • Bootstrap Interface – Configure Servers & Keys & ACLs – Pre-Configured, Smart Card, or Server Initiated Bootstrap – CoAP REST API • Registration Interface – RFC 6690 and Resource Directory • Management Interface Using Objects – Management Objects and Resources – CoAP REST API • Reporting Interface – Object Instances and Resources Report – Asynchronous notification using CoAP Observe
  • 11.
  • 12. Bootstrapping Features  OMA LWM2M supports different credential provisioning procedures:  Pre-shared Secrets  Raw Public Keys  Certificates  These credentials are provisioned by the Bootstrap Server for use with LWM2M servers.  It is possible to mix credentials for use with different servers and even to use different credentials in a single client/server interaction.  The LWM2M client is assumed to possess credentials for authentication to the Bootstrap Server. These credentials are typically pre-provisioned during manufacturing time.
  • 16.  LWM2M Client may be pre-provisioned with information about the LWM2M Server (rather than distributing credentials with the bootstrapping protocol)  LWM2M Client MUST have a LWM2M Bootstrap Server Account (+Bootstrap Server URI, Endpoint Client Name)  LWM2M Security Object  Security Mode (PSK, raw public key, certificate, no-sec)  Public Key or Identity (certificate, public key, or PSK identity)  Server Public Key or Identity (LWM2M server or bootstrap server certificate, public key or PSK identity)  Secret Key (secret key or private key)  LWM2M Server URI (bootstrap server or LWM2M server)  Bootstrap Server (true – false) A few more details
  • 18.  A LWM2M Client has one or more Object Instances  An Object is a collection of Resources  A Resource is an atomic piece of information that can be  Read, Written or Executed  Resources can have multiple instances  Access control list (ACL) objects control access to objects accessed by LWM2M Servers  Objects and Resources are identified by a 16-bit Integer, Instances by an 8-bit Integer  Objects/Resources are accessed with simple URIs: /{Object ID}/{Object Instance}/{Resource ID}  Example: /3/0/1 = 3 = Device Object, 0 = Object Instance #0, 1 = Manufacturer Resource Object Model ©Sensinode 2013
  • 19.  The LWM2M Technical Specification defines eight normative Objects Standard Device Management Objects ©Sensinode 2013 Object Name ID Multiple Instances? Description LWM2M Security 0 Yes This LWM2M Object provides the keying material of a LWM2M Client appropriate to access a specified LWM2M Server. LWM2M Server 1 Yes This LWM2M objects provides the data related to a LWM2M server. Access Control 2 Yes Access Control Object is used to check whether the LWM2M Server has access right for performing an operation. Device 3 No This LWM2M Object provides a range of device related information which can be queried by the LWM2M Server, and a device reboot and factory reset function. Connectivity Monitoring 4 No This LWM2M objects enables monitoring of parameters related to network connectivity. Firmware 5 No This Object includes installing firmware package, updating firmware, and performing actions after updating firmware. Location 6 No The GPS location of the device. Connectivity Statistics 7 No This LWM2M Objects enables client to collect statistical information and enables the LWM2M Server to retrieve these information, set the collection duration and reset the statistical parameters.
  • 20.  Example of the LWM2M Location Object, which has 6 Resources Object Example ©Sensinode 2013
  • 21.  Defining a new Object is straightforward  Object IDs are registered with the OMA Naming Authority (OMNA)  Who can register an Object?  OMA working groups  3rd party organizations  Enterprises  How to register an Object?  Write a specification filling out the Object template tables:  Object Name, Description and if it can have Multiple Instances  The list of resources the Object defines  Fill out the Lightweight Object form on-line.  IPSO Alliance has created additional objects, which are documented here (Starter Pack) and here (Expansion Pack). Defining new Objects ©Sensinode 2013
  • 23. Overview  Bootstrap servers distribute access control lists to LWM2M clients.  Example from Appendix F of the OMA LWM2M technical specification: (Table shows example objects provisioned at a LWM2M client by the Bootstrap server.)
  • 24. Overview, cont. LWM2M Client LWM2M Server 2 Luminaire LWM2M Client 3 Registration and resource access Light Switc h ACL: <Server 1, RW> LWM2M Server 1 Registration and resource access LWM2M Bootstrap Server Application ACL: <Server 2, RW>
  • 25. Discussion  ACLs work well when a Bootstrap Server is aware of the future interactions between LWM2M servers and LWM2M clients.  Real-time provisioning of ACLs by the Bootstrap Server is also possible.  During registration a LWM2M client is a CoAP client; afterwards it becomes a CoAP server waiting for incoming CoAP requests.  Notes:  LWM2M clients can become LWM2M servers in another communication setup and may therefore also receive ACLs from the Bootstrap Server. In our example light switches and luminaires are LWM2M clients in different communication scenarios.  Different LWM2M clients may also use different Bootstrap Servers.  A single LWM2M client may also have more than one Bootstrap Server (e.g., for redundancy/ purpose)
  • 27. LWM2M Application Server Web Server App LWM2M Server Soft Endpoints IP Device IP Device LWM2M Clients /3303/0/5700 /domain/endpoints/3303/0/5700
  • 28. LWM2M Application Server Web Server App LWM2M Server IP Device IP Device LWM2M Clients /domain/endpoints/3303/0/5700 /3303/0/5700
  • 29. LWM2M Application Server Web Server App LWM2M Server IP Device IP Device LWM2M Clients
  • 30. LWM2M Supports Sleeping Endpoints “b=uq”  Client uses the registration refresh to inform LWM2M server that it is awake, and listens for any queued operations
  • 31. Observe Parameters  LWM2M provides a mechanism to control Observation  “Write Attributes” Interface using query parameters to set observe attributes:  Pmin – minimum observation quiet period, to limit notification frequency  Pmax – maximum observation quiet period, to guarantee notifications  Lt – low limit measurement notification, like low alarm, in engineering units  Gt – high limit measurement notification, like a high alarm, in engineering units  Step – Minimum delta change required to notify, in engineering units
  • 32. LWM2M Bulk Read  Returns TLV or JSON based on requested content-format  CBOR needs to be added  Linked Objects are supported {“e”:[ {"n":"0","sv":"Open Mobile Alliance"}, {"n":"1","sv":"Lightweight M2M Client"}, {"n":"2","sv":"345000123"}, {"n":"3","sv":"1.0"}, {"n":"6/0","v":"1"}, {"n":"6/1","v":"5"}, {"n":"7/0","v":"3800"}, {"n":"7/1","v":"5000"}, {"n":"8/0","v":"125"}, {"n":"8/1","v":"900"}, {"n":"9","v":"100"}, {"n":"10","v":"15"}, {"n":"11/0","v":"0"}, {"n":"13","v":"1367491215"}, {"n":"14","sv":"+02:00"}, {"n":"15","sv":"U"}] }
  • 33. LWM2M Uses CoRE RD Resource Links (RFC 6690)  Links are uploaded during registration to inform the LWM2M server about resources on the endpoint  Links are discovered using GET with content type “application/link-format”  JSON representation using content type “application/link-format+json” <4001/0/9002>;rt=“oma.lwm2m”;ct=50;obs=1 Resource Type Content Type Observable
  • 40. Summary  LWM2M re-uses many IETF specifications. Specifications are publically available for download here.  Implementations and products are available. Example: Leshan (as an open source implementation)  Several plugfests took place already and there the issue list can be found here.  Work on a bugfix release is in progress and the Version 1.1 specification work will be started soon to specification with ongoing IETF work. 40
  • 41. Using LWM2M with ARM Create your application with mbed Client. Examples: • mbed client (Linux) • mbed client (mbed OS) Connect your IoT devices to the mbed Device Connector at https://connector.mbe d.com Create your web application with example code or REST API Links: • Example code • Documentation