Table of Contents

�1���� Scope����������
�2���� References
�3���� Definitions
������� 3.1���� Terms defined elsewhere�������
������� 3.2���� Terms defined in this Recommendation�����������
������� 3.3���� Abbreviations and acronyms�
������� 3.4���� Symbols���������
�4���� Conventions������������
�5���� Security architecture������������
������� 5.1���� Overview�������
������� 5.2���� Security layers�������������
������� 5.3���� Integration within overall oneM2M architecture����������
�6���� Security services and interactions���
������� 6.1���� Security integration in oneM2M flow of events�������������
������� 6.2���� Security functions layer������������
������� 6.3���� Secure environment and secure environment abstraction��������
�7���� Authorization����������
������� 7.1���� Access control mechanism�����
������� 7.2���� AE impersonation prevention
������� 7.3���� Dynamic authorization�������������
������� 7.4���� Role based access control�������
�8���� Security frameworks������������
������� 8.1���� General introductions to the security frameworks�������
������� 8.2���� Security association establishment frameworks������������
������� 8.3���� Remote security provisioning frameworks�������
������� 8.4���� End-to-end security of primitives (ESPrim)�������
������� 8.5���� End-to-end security of data (ESData)��
������� 8.6���� Remote security frameworks for end-to-end security�
������� 8.7���� End-to-end certificate-based key establishment (ESCertKE)�����
������� 8.8���� MAF security framework details����������
�9���� Security framework procedures and parameters�����
������� 9.0���� Introduction�
������� 9.1���� Security association establishment framework procedures and parameters�����
������� 9.2���� Remote security provisioning framework procedures and parameters
10���� Protocol and algorithm details��������
������ 10.1���� Certificate-based security framework details
���� ��10.2���� TLS and DTLS details
������ 10.3���� Key export and key derivation details
������ 10.4���� Credential-ID details
������ 10.5���� KpsaID�����������
������ 10.6���� KmID format
������ 10.7���� Enrolment expiry������
11���� Privacy protection architecture using privacy policy managerPPM)������������
������ 11.1���� Introduction
������ 11.2���� Relationship between components of PPM and oneM2M�������
������ 11.3���� Privacy policy management in oneM2M architecture
������ 11.4���� Privacy policy manager implementation models����������
12���� Security-specific oneM2M data type definitions������
������ 12.1���� Introduction
������ 12.2���� Simple security-specific oneM2M data types
������ 12.3���� Enumerated security-specific oneM2M data types�����
������ 12.4���� Complex security-specific oneM2M data types������������
Annex A � Blank annex����
Annex B � Blank annex����
Annex C � Security protocols associated to specific SE technologies����
������� C.0���� Introduction�
������� C.1���� UICC
������� C.2���� Other secure element and embedded secure element with ISO 7816 interface
������� C.3���� Trusted execution environment����������
������� C.4���� SE to CSE binding��������
Annex D � UICC security framework to support oneM2M services����
������� D.0���� Introduction
������� D.1�� ��Access network UICC-based oneM2M service framework��������
������� D.2���� oneM2M service module application for symmetric credentials on UICC (1M2MSM)���
Annex E � Blank annex����
Annex F � Acquisition of location information for location based access control� ���
������� F.0���� Introduction�
������� F.1���� Description of region�
������� F.2���� Acquisition of location information�����
Annex G � Blank annex����
Annex H � Blank annex����
Annex I � Blank annex����
Annex J � List of privacy attributes����
����� Page
Appendix I � Mapping of 3GPP GBA terminology����
Appendix II � General mutual authentication mechanism����
������ II.0���� Introduction��
������ II.1���� Group authentication
Appendix III � Blank appendix����
Appendix IV � Blank appendix����
Appendix V � Precisions for the UICC framework to support M2M services����
������� V.0���� Introduction�
������� V.1���� Suggested content of the EFs at pre-personalization��
������� V.2���� EF changes via data download or CAT applications�������
������� V.3���� List of SFI values at the ADFM2MSM or DFM2M level�����������
������� V.4���� UICC related tags defined in annex J��
Appendix VI � Access control decision request����
Appendix VII � Implementation guidance and index of solutions����
Appendix VIII � Blank appendix����
Appendix IX � Blank appendix����
Appendix X � Terms and conditions markup language implementation rules����
Appendix XI � Example SCEP implementation����
������ XI.1���� Introduction�
������ XI.2���� Certificate provisioning procedures using SCEP��������������
Bibliography����