OMA DM v1.x compliant lightweight device management for constrained M2M devices

نویسندگان

  • Nhon Chu
  • Djelal Raouf
  • Bruno Corlay
  • Mohamed Ammari
  • Nenad Gligoric
  • Srdjan Krco
  • Nemanja Ognjanovic
  • Aleksandar Obradovic
چکیده

Open Mobile Alliance Device Management (OMA DM) specification is well established and is being widely used to manage mobile devices. However, the current OMA DM protocol (v1.2 and v1.3) is not suitable for constrained M2M devices operating in constrained networks. Therefore, new standards for M2M technology are being developed in order to sustain the exponential growth of M2M wireless communications market. The upcoming standardized lightweight protocols will not be compatible with the current OMA DM protocols. For this reason, this paper presents an alternative lightweight solution that is fully compatible with the current OMA DM protocol and with all existing OMA Management Objects (MOs) defined by OMA DM. A proxy adapter is used to convert OMA DM SyncML based messages to or from the ELFOMA (Exalted Lightweight For OMA DM v1.x) lightweight messages. This solution aims to enable operators and service providers to leverage their existing OMA DM servers (already managing over a billion mobile devices) to continue supporting former OMA DM enabled mobile devices and to incrementally support new constrained M2M devices through the added proxy server. Using ELFOMA, the size of OMA DM messages can be reduced by 85%. Other encoding schemes such as EXI and WBXML are also compared. Copyright c © 2013 John Wiley & Sons, Ltd. ∗Correspondence Nhon Chu, Sierra Wireless France, 5 bd Gallieni, 92442 Issy-les-Moulineaux, France. E-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enabling Dynamic and Lightweight Management of Distributed Bluetooth Low Energy Devices

Bluetooth Low Energy (BLE) is a wireless communication technology for Internet of Things (IoT) applications. Although recent versions of BLE embrace the 6LoWPAN standard for IPv6 low-power device communication, this is often not the best choice for constrained-node networks due to downsides such as increased memory and computation overhead, heavier network stack, increased power consumption, ba...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

OMA DM-based remote software fault management for mobile devices

Mobile devices (e.g. mobile handsets or PDAs) have gained much functionality and intelligence with the growth of mobile network technologies and the increased use of mobile services. As a consequence, mobile devices have become more complex and many related problems have occurred. Specifi cally, sudden rebooting and freezing problems caused by software faults decrease the availability of the mo...

متن کامل

An OMA DM Based Framework for Updating Modulation Module for Mobile Devices

Due to the rapid advancement of mobile communication technologies, the demands for managing mobile devices effectively to fulfill various functionalities are on the rise. It is well known that mobile devices make use of different kinds of modulation approaches to adapt to various channel conditions. Therefore, in this paper, the authors propose a framework of Modulation Module Update (MMU) for ...

متن کامل

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of research challenges in M2M is group authentication ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Emerging Telecommunications Technologies

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2013