Professional Documents
Culture Documents
ITU-T Y.4455
TELECOMMUNICATION (10/2017)
STANDARDIZATION SECTOR
OF ITU
Summary
Recommendation ITU-T Y.4455 introduces Internet of things (IoT) network capability exposure
(NCE). The IoT NCE is a functional entity in network domain, and facilitates IoT applications and
services to make full use of capabilities of their underlying networks. The IoT NCE can optimize user
experience, improve network efficiency and expose network capability in order to optimize IoT
applications and services.
Recommendation ITU-T Y.4455 clarifies the concept of the IoT NCE, identifies its general
characteristics and common requirements, and provides the reference architecture and relevant
capabilities for the IoT NCE. Additionally, it provides several use cases and common procedures to
illustrate the concept and the architecture of the IoT NCE.
History
Edition Recommendation Approval Study Group Unique ID*
1.0 ITU-T Y.4455 2017-10-29 20 11.1002/1000/13389
Keywords
Capability, Internet of things, network capability exposure.
* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/
11830-en.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other
obligatory language such as "must" and the negative equivalents are used to express requirements. The use of
such words does not suggest that compliance with the Recommendation is required of any party.
ITU 2017
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.
1 Scope
This Recommendation specifies reference architecture for Internet of things (IoT) network capability
exposure (NCE). The scope of this Recommendation includes:
– the concept, general characteristics and requirements of IoT NCE;
– reference architecture for IoT NCE.
2 References
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the currently
valid ITU-T Recommendations is regularly published. The reference to a document within this
Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
[ITU-T Y.4000] Recommendation ITU-T Y.4000/Y.2060 (2012), Overview of the Internet of
things.
3 Definitions
5 Conventions
The following conventions are used in this Recommendation:
– The keywords "is required to" indicate a requirement which must be strictly followed and
from which no deviation is permitted, if conformance to this Recommendation is to be
claimed.
– The keywords "is recommended" indicate a requirement which is recommended but which
is not absolutely required. Thus, this requirement need not be present to claim conformance.
7.3 Security
The IoT NCE allows the networks to control, through setting access policies, what or which types of
IoT applications and services can subscribe and access their exposed network capabilities.
7.4 Compatibility
The IoT NCE supports networks to expose selected capabilities to IoT applications and services, via
APIs defined by the Open Mobile Alliance (OMA), the Global System for Mobile Communications
Alliance (GSMA), other standards development organizations (SDOs), or network providers'
proprietary APIs.
The IoT NCE can support interworking with other platforms exposing network or service capabilities
for special networks, e.g., a service capability exposure framework (SCEF) within 3GPP systems
[b-3GPP TR 23.708] (see Appendix III).
8.2 Multiple network working model of the Internet of things network capability
exposure
In the multiple network working model (see Figure 8-2), networks (e.g., mobile network A and mobile
network B) can be deployed by a single or by different network providers and the IoT NCE is
independent of the networks.
As in the single network working model, exposed network capabilities need to be registered and
published on the IoT NCE; and the networks should update the states of their exposed network
capabilities.
Similarly, IoT applications and services can register on the IoT NCE and can discover, subscribe to
and access one or more exposed network capabilities as published on the IoT NCE and can get
relevant notifications.
The key differences from the single network working model are as follows.
The IoT NCE includes three functional components, namely the exposure supporting functional
component (ES-FC), the exposure coordination functional component (EC-FC) and the network agent
management functional component (NAM-FC), which operate at the SSAS layer. In addition, the IoT
NCE contains a series of network agent functional components (NA-FCs) that interact with the
external entities of the networks in the network layer.
As shown in Figure 10-1, the IoT NCE can cooperate with multiple networks (e.g., network N1 to
network Nk) and those networks can support different communication technologies.
Figure 10-2 shows the internal relationships between the functional components of the IoT NCE. The
EC-FC exposes reference point NCE-1 to IoT applications and services. The NAM-FC manages the
NA-FCs, the NA-FCs interact with networks. The ES-FC provides coordination functions and
provides support to the EC-FC and NAM-FC.
11.1 Publishing
The IoT NCE is able to collect information on network capabilities to be exposed to IoT applications
and services. The information about exposed network capabilities includes, but is not limited to:
– name of the network capabilities;
– description of the network capabilities;
– access approaches and relevant parameters;
– access profiles.
The IoT NCE is able to publish the collected information of network capabilities, in order to allow
IoT applications and services to discover and subscribe.
Clause II.1 provides a reference procedure for exposing and publishing network capabilities.
11.2 Subscribing
The IoT NCE is able to allow IoT applications and services to discover and subscribe to published
network capabilities on the IoT NCE, through the reference point NCE-1 exposed by the EC-FC.
The IoT NCE is able to support an IoT application or service to subscribe to one or more network
capability(ies) and the subscribed network capabilities may be exposed by one or more networks.
In the subscription process, the IoT NCE is able to validate the access permission according to the
policies of the IoT NCE and the access profiles related to the network capability.
Alternatively, the IoT NCE is also able to connect to the network that exposes the network capability
to negotiate access permission.
Clause II.2 provides a reference procedure for subscribing to the published network capabilities.
NOTE – This Recommendation does not specify interactions between the IoT NCE and networks.
11.4 Delivering
When an IoT application or service requests the IoT NCE to deliver information (e.g., information
about IoT devices to be served) in order to invoke network capabilities, the IoT NCE is able to deliver
the relevant request.
Clause II.4 provides related reference procedures.
12 Security considerations
The IoT NCE, IoT applications and services, IoT devices, and networks are usually deployed in
different domains and may be in untrusted environments. The IoT NCE is required to provide a
security mechanism to authorize and authenticate IoT applications and services to discover, subscribe
to and access network capabilities.
Additionally, the security mechanism should support security transportation technologies such as
transport layer security (TLS) when the IoT data are transported between the IoT NCE and IoT
applications and services, and between the IoT NCE and the networks.
This appendix provides some use cases to illustrate the concept of the IoT NCE.
If the car contains mobility sensors, the CCM service can get its dynamic mobility-related information
(e.g., static or mobile, moving speed, location) uploaded by the car automatically. If the driver of the
car wants to get consistent communication resources from the three mobile networks, he or she can
subscribe to the relevant service from the CCM service. The CCM service can facilitate the car to get
the expected communication resources with the following steps.
1 The CCM service subscribes to the exposed service capabilities for an enhanced mobile
communication service exposed by the three mobile networks individually.
2 According to the real-time location of the car, the CCM service searches for a mobile network
to serve the car through the subscribed service capabilities.
This appendix provides some common procedures to illustrate the reference architectures
(see clause 10) and common capabilities (see clause 11) of the IoT NCE.
Figure II.3 – Flow for accessing subscribed network capabilities from the IoT service
NOTE – The corresponding NA-FC translates the access request according to the approaches with which the
NA-FC interacts with the networks exposing the subscribed network capabilities. The NA-FC also translates
the responses from the networks and forwards the translated responses to the IoT service through the reference
point NCE-1.
A SCEF can be deployed in a 3GPP system. Traditionally, the networks in the 3GPP system may
publish network capabilities on the SCEF and the applications may access the published network
capabilities through the SCEF.
The IoT NCE can interwork with the SCEF, based on a special NA-FC. The SCEF may expose the
network capabilities on the IoT NCE.
In this case, when an IoT service accesses a network capability exposed by the SCEF, the special NA-
FC transforms and forwards the access request to the SCEF and the SCEF then accesses the target
network capabilities and forwards the access response to the NA-FC. The IoT NCE then transforms
and forwards the access response to the IoT service.
Figure III.1 (a) and (b) shows the methods of interworking with SCEF within the 3GPP system.
Series D Tariff and accounting principles and international telecommunication/ICT economic and
policy issues
Series E Overall network operation, telephone service, service operation and human factors
Series J Cable networks and transmission of television, sound programme and other multimedia
signals
Series K Protection against interference
Series L Environment and ICTs, climate change, e-waste, energy efficiency; construction, installation
and protection of cables and other elements of outside plant
Printed in Switzerland
Geneva, 2017