diff --git a/index.html b/index.html index f8c97fc6..ec859d59 100644 --- a/index.html +++ b/index.html @@ -3153,6 +3153,15 @@

JSON Schema for WoT Discovery TD-extensions

Recent Specification Changes

+

Changes from 11 July 2023 Proposed Recommendation

+

Changes from 19 January 2023 Candidate Recommendation

+
+
+
+
7.3.2.1.4 +Deletion
+
+

A delete +operation MUST be done using an HTTP +DELETE request at /things/{id}, where +id is the identifier of the existing TD. +A +successful response MUST have 204 (No +Content) status. The retrieve operation is specified as +deleteThing property in 7.3.2.4 API Specification (Thing +Model).

+
+
+
+
7.3.2.1.5 +Listing
+
+

The listing endpoint provides different ways to query the +collection of full TD objects from the directory.

+

In many scenarios, retrieving parts instead of full TD objects +is preferred because only a subset of elements are needed (e.g. +id and href of a property for all TDs) +and to save networking resources. The Search API allows querying +parts of TD objects; see 7.3.2.3 Search API.

+

The +directory MUST allow retrieval of existing +TDs using HTTP GET requests at the +/things endpoint. A successful response +MUST have 200 (OK) status and an array of +TDs in the body. A successful response with JSON +serialization MUST contain either +application/json or application/ld+json +in the Content-Type header. Here +application/ld+json is preferred as it is more +specific and implies application/json. Note that the +default serialization is JSON with JSON-LD syntax, and alternative +serializations can be negotiated; see 7.3.2.1 Things API.

+

There may be scenarios in which clients need to retrieve the +collection in small subsets of TDs. While the Search API (7.3.2.3 Search API) does +offer the ability to query a specific range, it may not be optimal, +nor developer-friendly. The server MAY support pagination to return the collection in +small subsets. The pagination must be based on the following +rules:

+ +

This above specification follows a subset of Linked Data Paging +[LDP-Paging] to allow +optional pagination of the JSON-LD array. Additional parts of +Linked Data Paging may be implemented for examples to honour +client's query preference or to add other link relations for +semantic annotation and alternative navigation links.

+

The following example provides a walk-through of the paginated +retrieval of TDs:

+ -

As an - alternative to an array of TDs as the body of the - response, the server MAY send - a more verbose payload allowing server-side - information, such as pagination information, to be - included in addition to the actual data.

-

The alternative pagination format is inspired by - - Hydra Advanced Concepts, more concretely the - - Partial Collection View. Adapted to our purposes - and using the members field to accomodate the - array of TDs, it looks as follows for the listing - endpoint:

- +

As an alternative to an +array of TDs as the body of the response, the server MAY send a more verbose payload allowing server-side +information, such as pagination information, to be included in +addition to the actual data.

+

The alternative pagination format is inspired by Hydra +Advanced Concepts, more concretely the +Partial Collection View. Adapted to our purposes and using the +members field to accomodate the array of TDs, it looks as +follows for the listing endpoint:

+ -

To tell the server which format to send, the - additional query parameter - ?format=array|collection can be added to - the request. ?format=array is the default - parameter, does not have to be provided explicitly, and - yields to a server response of the pure array of TDs. - ?format=collection should yield to a - server response with the format as described in - Example 9.

-

The listing operation is specified as - things property in 7.3.2.4 API Specification (Thing - Model).

-
-
-
-
7.3.2.1.6 Validation
-
-

The syntactic validation of - TD objects before storage is RECOMMENDED to prevent common erroneous - submissions. The server SHOULD use at least - Minimal Validation as defined in [wot-thing-description11] - to validate TDs, including use of the - WoT Thing Description (1.0) JSON Schema or - WoT Thing Description 1.1 JSON Schema, and the JSON - schema defined in A. JSON Schema - for WoT Discovery TD-extensions for Enriched - TDs, as appropriate based on the value of the - @context.

-

Additional forms of validation can be added to - support various use cases. For example, a use case may - require stateful validation of the input TDs to ensure - that the version value is initialized and - updated according to pre-defined rules.

-

If the server fails to validate - the TD object, it MUST inform - the client with necessary details to identify and - resolve the errors. The - validation error MUST be - described as Problem Details [RFC7807] - with an extension field called - validationErrors, set to an array of - objects with field and - description fields. This is - necessary to represent the error in a machine-readable - way. All validation error - responses described using Problem Details MUST be encoded using UTF-8. As - already stated in general for error reporting, - validation error responses may report details in - different languages using proactive negotiation, if the - Accept-Language header field has been set - in the HTTP request [RFC7231].

-

Example 10 is an example - error response with two validation errors.

- +

To tell the server which format to send, the additional query +parameter ?format=array|collection can be added to the +request. ?format=array is the default parameter, does +not have to be provided explicitly, and yields to a server response +of the pure array of TDs. ?format=collection should +yield to a server response with the format as described in Example +9.

+

The listing operation is specified as things +property in 7.3.2.4 API Specification (Thing Model).

+
+
+
+
7.3.2.1.6 +Validation
+
+

The syntactic validation of TD objects +before storage is RECOMMENDED to prevent +common erroneous submissions. The server +SHOULD use at least +Minimal Validation as defined in [wot-thing-description11] +to validate TDs, including use of the +WoT Thing Description (1.0) JSON Schema or +WoT Thing Description 1.1 JSON Schema, and the JSON schema +defined in A. JSON Schema for WoT Discovery TD-extensions +for Enriched TDs, as +appropriate based on the value of the +@context.

+

Additional forms of validation can be added to support various +use cases. For example, a use case may require stateful validation +of the input TDs to ensure that the version value is +initialized and updated according to pre-defined rules.

+

If +the server fails to validate the TD object, it MUST inform the client with necessary details to +identify and resolve the errors. The validation +error MUST be described as Problem Details +[RFC7807] with an +extension field called validationErrors, set to an +array of objects with field and +description fields. This is necessary to +represent the error in a machine-readable way. All +validation error responses described using Problem Details +MUST be encoded using UTF-8. As +already stated in general for error reporting, validation error +responses may report details in different languages using proactive +negotiation, if the Accept-Language header field has +been set in the HTTP request [RFC7231].

+

Example +10 is an example error response with two validation +errors.

+ -
- -
-
-
7.3.2.2 Events API
-
-

The Notification API is to notify clients about the - changes to TDs - maintained within the directory. Directories - MAY implement the Notification - API.

-

The Notification API MUST follow the Server-Sent Events (SSE) - [HTML] - specifications to serve events to clients at - /events endpoint. In particular, the - server responds to successful requests with 200 (OK) - status and text/event-stream Content Type. - Re-connecting clients may continue from the last event by - providing the last event ID as Last-Event-ID - header value. The server SHOULD provide an event ID as the - id field in each event and respond to - re-connecting clients by delivering all missed - events.

-

The rest of this section describes the implementation - details on top of the SSE protocol. Realizing the - notification functionality using other protocols such as - MQTT are possible and may be formalized in future - versions of this specification.

-
-
Event Types
-
The server MUST produce events attributed to the - lifecycle of the Thing Descriptions within the - directory using thing_created, - thing_updated, and - thing_deleted event types.
-
Event Filtering
-
- The API enables server-side filtering of events to - reduce resource consumption by delivering only the - events required by clients. Client libraries may - offer additional filtering capabilities on the - client-side. -

The server MUST support event filtering based on - the event type given by the client upon - subscription.

-

For example, given the URI Template - /events{/type}:

-
    -
  • /events/thing_created instructs - the server to only deliver events of type - thing_created
  • -
  • /events instructs the server to - deliver all events
  • -
-

The clients need to subscribe separately to - receive a subset of the events (e.g. only - thing_created and - thing_deleted) from the server. When - using HTTP/2, multiple subscriptions on the same - domain (HTTP streams) get multiplexed on a single - connection.

-
-
Event Data
-
-

The event data MUST contain the JSON serialization of - the event object. The event data object is a - Partial - TD or the whole TD object depending on the - request:

-
    -
  • - The event data - object MUST at least - include the identifier of the TD created, - updated, or deleted at that event in Partial - TD form. - +
+ +
+
+
7.3.2.2 +Events API
+
+

The Notification API is to notify clients about the changes to +TDs maintained within the directory. +Directories +MAY implement the Notification +API.

+

The +Notification API MUST follow the +Server-Sent Events (SSE) [HTML] +specifications to serve events to clients at /events +endpoint. In particular, the server responds to successful +requests with 200 (OK) status and text/event-stream +Content Type. Re-connecting clients may continue from the last +event by providing the last event ID as Last-Event-ID +header value. The server SHOULD provide an event ID as the id +field in each event and respond to re-connecting clients by +delivering all missed events.

+

The rest of this section describes the implementation details on +top of the SSE protocol. Realizing the notification functionality +using other protocols such as MQTT are possible and may be +formalized in future versions of this specification.

+
+
Event Types
+
The server MUST produce events attributed to the lifecycle of +the Thing Descriptions within the directory using +thing_created, thing_updated, and +thing_deleted event types.
+
Event Filtering
+
The API enables server-side filtering of events to reduce +resource consumption by delivering only the events required by +clients. Client libraries may offer additional filtering +capabilities on the client-side. +

The server MUST support event filtering based on the event type +given by the client upon subscription.

+

For example, given the URI Template +/events{/type}:

+
    +
  • /events/thing_created instructs the server to only +deliver events of type thing_created
  • +
  • /events instructs the server to deliver all +events
  • +
+

The clients need to subscribe separately to receive a subset of +the events (e.g. only thing_created and +thing_deleted) from the server. When using HTTP/2, +multiple subscriptions on the same domain (HTTP streams) get +multiplexed on a single connection.

+
+
Event Data
+
+

The +event data MUST contain the JSON +serialization of the event object. The event data object is +a Partial TD or the +whole TD object depending on the request:

+
    +
  • The event data object MUST at least include the identifier of the TD +created, updated, or deleted at that event in Partial TD +form. + -
  • -
  • - When - diff query parameter is set to - true and the event has - thing_created type, the server - MAY return the whole TD - object as event data. - +
  • +
  • When diff query +parameter is set to true and the event has +thing_created type, the server MAY return the whole TD object as event data. + -
  • -
  • - When - diff query parameter is set to - true and the event has - thing_updated type, the server - MAY inform the client - about the updated parts following the JSON Merge - Patch [RFC7396] - format. A - thing_updated event data that is - based on JSON Merge Patch [RFC7396] MUST always include the identifier - of the TD regardless of whether it is - changed. -

    The following example shows the event - triggered on update of the TD from Example 12:

    - +
  • +
  • When diff query +parameter is set to true and the event has +thing_updated type, the server MAY inform the client about the updated parts +following the JSON Merge Patch [RFC7396] format. A +thing_updated event data that is based on JSON Merge +Patch [RFC7396] +MUST always include the identifier of the +TD regardless of whether it is changed. +

    The following example shows the event triggered on update of the +TD from Example +12:

    + -
  • -
  • The - diff query parameter MUST be ignored for - thing_deleted events. In other - words, the server shall not include additional - properties in the payload of - thing_deleted events when - diff is set to true.
  • -
  • When a server which does not support the - diff query parameter is requested with - such query parameter, it should reject the request. - This is to inform clients about the lack of such - functionality at connection time and avoid runtime - exceptions caused by missing event data - attributes.
  • -
-
-
-

The Notification API is specified as three event - affordances in 7.3.2.4 API - Specification (Thing Model), namely: - thingCreated, thingUpdated, and - thingDeleted.

-
-
- Note: SSE - Authorization Header -
-

Some early SSE implementations (including - HTML5 EventSource) do not allow setting custom headers - in the initial HTTP request. Authorization header is - required in few OAuth2 flows and passing it as a query - parameter is - not advised. There are polyfills for browsers and - modern libraries which allow setting Authorization - header.

-
-
- -
-
-
- 7.3.2.4 API Specification - (Thing Model)
-
-

A template for the API of Thing Description - Directories is given here as a Thing Model. The Thing - Model is normative (except where noted) but should not be - considered as the sole reference to implement or interact - with a Thing Description Directory. Please refer also to - the specifications given in 7.3.2 Directory - Service API.

-

The searchJSONPath and - searchXPath affordances given in this Thing - Model are not normative and are provided for information - only.

-

Note that a contentType is required by - the WoT TD 1.1 specification [wot-thing-description11] - for instances of the ExpectedResponse class - (i.e., the JSON object corresponding to the key - response in a form), even when the body of - the HTTP response is supposed to be empty. In this case, - application/x-empty can be used to ensure - that the TD generated from the TM below is valid.

-
{
+id: event_3
+

+ +
  • The diff query +parameter MUST be ignored for +thing_deleted events. In other words, the +server shall not include additional properties in the payload of +thing_deleted events when diff is set to +true.
  • +
  • When a server which does not support the diff +query parameter is requested with such query parameter, it should +reject the request. This is to inform clients about the lack of +such functionality at connection time and avoid runtime exceptions +caused by missing event data attributes.
  • + + + +

    The Notification API is specified as three event affordances in +7.3.2.4 API Specification (Thing Model), namely: +thingCreated, thingUpdated, and +thingDeleted.

    +
    +
    Note: SSE +Authorization Header
    +

    Some early SSE implementations (including HTML5 +EventSource) do not allow setting custom headers in the initial +HTTP request. Authorization header is required in few OAuth2 flows +and passing it as a query parameter is not +advised. There are polyfills for browsers and modern libraries +which allow setting Authorization header.

    +
    +
    + +
    +
    +
    7.3.2.4 API Specification (Thing Model)
    +
    +

    A template for the API of Thing Description Directories is given +here as a Thing +Model. The Thing Model is normative (except where noted) but +should not be considered as the sole reference to implement or +interact with a Thing Description Directory. Please refer also to +the specifications given in 7.3.2 Directory Service +API.

    +

    The searchJSONPath and searchXPath +affordances given in this Thing Model are not normative and are +provided for information only.

    +

    Note that a contentType is required by the WoT TD +1.1 specification [wot-thing-description11] +for instances of the ExpectedResponse class (i.e., the +JSON object corresponding to the key response in a +form), even when the body of the HTTP response is supposed to be +empty. In this case, application/x-empty can be used +to ensure that the TD generated from the TM below is valid.

    +
    {
         "@context": [
             "https://www.w3.org/2022/wot/td/v1.1",
    @@ -5914,724 +5263,631 @@ 
    ] } } -}
    -
    - - - -
    -
    -

    8. Security Considerations

    -
    -

    Security is a cross-cutting issue that needs to be - considered in all WoT building blocks and WoT implementations. - This chapter summarizes some general issues and guidelines to - help preserve the security of concrete WoT discovery - implementations. For a more detailed and complete analysis of - both security and privacy issues, see the WoT Security and - Privacy Guidelines specification [WOT-SECURITY]. - WoT Thing and WoT TDDs are also web services and should be - implemented using best practices for web services. In addition - to the specific security considerations below, the security - risks and mitigations discussed in guides such as the OWASP Top - 10 [OWASP-Top-10] should be evaluated, - and if applicable, addressed.

    -
    -
    -

    8.1 Denial of Service

    -
    -

    Certain functions of the directory service, in particular - search queries, may require significant resources to execute - and this fact can be used to launch denial of service (DoS) - attacks against WoT Thing Description Directory services. In - such an attack a WoT Directory would be overloaded by - requests from the attacker and unable to service other - requests.

    -
    -
    Mitigations:
    -
    -
      -
    • A WoT Thing Description Directory implementation - should limit the number of queries per unit time from - the same requestor.
    • -
    • A WoT Thing Description Directory implementation - should limit the complexity of queries (for example, - the total length of the query expression or its - depth).
    • -
    • A WoT Thing Description Directory implementation - should use a watchdog timer to abort queries that take - more than a certain maximum - (implementation-configurable) amount of time.
    • -
    -
    -
    -
    -
    -
    -

    - 8.2 Amplification and Distributed - Denial of Service

    -
    -

    It may also be possible to use elements of WoT Discovery - mechanisms to launch distributed denial of service (DDoS) - attacks against other targets. In such an attack the WoT - Discovery service itself is not the target. Instead, an - aspect of the WoT Discovery service would be exploited to - generate amplified network traffic that overloads a third - party, the actual target. Such an attack has two - requirements: first, the ability to redirect traffic to a - third party, and second, an intermediary service that can be - exploited to amplify network traffic from the attacker. - Redirection of network traffic is possible in some protocols, - such as unsecured CoAP, by modifying source information in - headers. Amplification is possible by taking advantage of - three multiplicative factors: the ratio of request to - response payload sizes, use of "observe" in protocols like - CoAP (which can give multiple results for one request), and - use of multicast (which can allow multiple servers to respond - to one request). Services which do not support authentication - are ideal intermediaries for such an indirect attack. - Unfortunately, the Introduction mechanisms for WoT Discovery - are meant to provide open access mechanisms to initiate - discovery and might be exploited for this purpose.

    -
    -
    Mitigations:
    -
    -
      -
    • Open implementations of - Introduction mechanisms SHOULD - NOT support observe or similar extended result - subprotocols.
    • -
    • Open implementations of Introduction mechanisms - should not respond to multicast requests unless this is - absolutely required by the protocol. If support for - multicast is required, in the case of CoAP, the - observations made in [AMPLIFICATION-ATTACKS] - are relevant, since the number of servers that might - respond to a multicast request during discovery will - generally not be known in advance.
    • -
    • Limit the size of responses to the minimum. The - total size of responses to an Introduction on the - public internet (outside of a protected local network) - should be less than 3x the size of the total size of - request, and this should include any error responses. - This is consistent with DDOS mitigations in - [RFC9000] - (QUIC) and HTTP/3. Here "total size" includes any - headers required by the protocol itself, as well as - padding in the request to allow for a larger - response.
    • -
    • Introductions should rate-limit responses to any - particular request source.
    • -
    • Introduction mechanisms on a - segmented network behind a firewall (e.g. a LAN) - SHOULD NOT respond to requests - that are (apparently) from outside that - LAN.
    • -
    Of particular concern are Introduction mechanisms - that can return multiple results, such as CoRE-RD and - DID. It may be necessary to use - authentication/authorization on such Introduction - mechanisms as well if the other mitigations above are not - sufficient. A recommended alternative is to move multiple - results from such Introductions into a WoT TDD, which can - then be protected by appropriate authentication and - authorization measures. Then the open Introduction - mechanism only has to return one result, the URL of the - TDD. Introduction mechanisms that are visible on the open - internet should be especially careful to implement the - above mitigations, and perhaps avoid Introduction - mechanisms that can return multiple URLs completely. -
    -
    -
    -
    -
    -

    8.3 Self-Discovery on LANs

    -
    -

    On a LAN, certificates and browsers may not be able to - property set up TLS for HTTPS because browsers expect - certificates pointing to a publicly-visible URL. Using HTTP - is common practice inside LANs but in combination with - self-description it means that WoT Things would be - essentially be making TDs visible to everyone with access to - the private LAN. Even if security mechanisms such as HTTP - passwords were used, these are not effective (they can be - easily discovered by a traffic analyser) without transport - security.

    -
    -
    Mitigations:
    -
    -

    PSK - (pre-shared keys) SHOULD be used - if possible on LANs, meaning one of the ciphersuites in - [RFC4279]. - This does require that Things are assigned PSKs in a - common security domain, which is typically done by - following an onboarding process. Unfortunately, specific - onboarding processes are currently out of scope of the - WoT specifications.

    -

    An alternative is to depend on local network security - (i.e. WEP). This is not the best solution from a security - or privacy point of view but may be acceptable in some - contexts. Note however that all users with access to the - network would in turn have access to all TDs via - self-description. If Things cannot be individually - secured with transport security and authentication and - authorization, a separate network SHOULD be set up, i.e. with an alternative - SSID, and used only for IoT devices. Using a - segmented network reduces the need for distributing the - password to this network to those who need access to the - set of IoT devices connected to it.

    -

    Another alternative is to use a reverse proxy service - based in the cloud. Secure setup can be accomplished if - the IoT device has access to the cloud, since the proxy - server can have a public URL and the initial connection - can use HTTPS, then open a secure tunnel over a - websocket. The proxy can in turn re-expose a secure - endpoint, and possible add authentication. The - disadvantages of this approach including depending on an - external cloud service and the need to expose an external - access point (which is itself a security risk). The first - disadvantage can be addressed by hosting the proxy - service locally and exposing a public URL using e.g. - dynamic DNS if the local server is connected through an - ISP. If Things cannot be individually secured with - transport security and authentication and authorization, - then they may be made available for general access via a - proxy that can provide suitable access controls.

    -
    -
    -
    -
    -
    -
    -

    9. Privacy Considerations

    -
    -

    Privacy is a cross-cutting issue that needs to be considered - in all WoT building blocks and WoT implementations. This - chapter summarizes some general issues and guidelines to help - preserve the privacy of concrete WoT discovery implementations. - For a more detailed and complete analysis of both security and - privacy issues, see the WoT Security and Privacy - Guidelines specification [WOT-SECURITY].

    -

    The WoT discovery architecture is designed to avoid a - dependence on the privacy of existing discovery schemes by - using a two-phase approach and allowing for the enforcement of - authorization before metadata release. However several privacy - risks still exist. These are listed below along with possible - mitigations. The level of risk to privacy in particular depends - on the use case and whether there is a risk that information - related to a person might be distributed in a fashion - inconsistent with the privacy desires of that person. For - privacy we distinguish the following broad classes of use case - scenarios:

    -
    -
    Institutional
    -
    Both the Things producing metadata and the Consumers of - that metadata are owned and controlled by an institution or - representatives of an institution. Example: Automation in a - factory where a control system is accessing the state of an - assembly line in order to evaluate quality.
    -
    Service
    -
    The Things producing metadata are owned and controlled by - an institution or representatives of an institution while the - consumers are individuals. Example: driver of an electric - vehicle accessing the TD for a charge station in order to - check status of a charge.
    -
    Personal
    -
    Both the Things producing metadata and the Consumers of - that metadata are owned and controlled by the same - individual. Example: A smart home control system for charging - an electric car from home-attached solar panels, both home - and car owned by the same person.
    -
    Personal Peer-to-Peer
    -
    The Things producing metadata and the Consumers of that - metadata are owned and controlled by different individuals. - Example: A smart home control system for charging a guest's - electric car from home-attached solar panels.
    -
    Institutional Peer-to-Peer
    -
    The Things producing metadata and the Consumers of that - metadata are owned and controlled by different institutions. - Example: A utility provides and manages power delivered to a - factory, and the factory provides an interface for the - utility to negotiate on-demand power usage reductions.
    -
    Client
    -
    The Things producing metadata are owned and controlled by - an individual while the consumers are an institution or - representatives of an institution. Example: A personal - electric vehicle exposes an interface to a public charging - station so that the charging station can evaluate the charge - status of the vehicle.
    -
    -

    All of these in fact carry privacy risks. Even in the case - of factory automation, there is the chance that data about - employee performance would be captured and would have to be - managed appropriately.

    -

    In the following we make frequent reference to "tracking". - This term covers multiple privacy risks, including location - tracking and behavioral profiling. In general, the definition - of "profiling" given in Article 4 of the GDPR [GDPR-Defs] - is to be considered equivalent to "tracking" as used in this - document.

    -

    With these definitions and categories established, we will - now discuss some specific privacy risks and potential - mitigations.

    -
    -
    -

    9.1 Location Tracking and - Profiling

    -
    -

    A discovery service may potentially allow the approximate - location of a person to be determined without their consent. - This risk occurs in some specific circumstances which can be - avoided or mitigated. It is also similar to the risk posed by - other network services such as DHCP and DNS.

    -

    For this risk to occur, there first has to be an IoT - device that can be reliably associated with a person's - location, such as a necessary medical device or a vehicle. - Note that the risk only applies to personal use cases, not - institutional ones. Secondly, the device has to be configured - to register automatically with the nearest directory service. - In this case, the location of the device can be inferred from - the network range of the directory service and the location - of the person inferred from the location of the device.

    -

    There are a few variants of this:

    -
      -
    • The TD or Thing could report actual location - information so no inferencing by network range is - needed;
    • -
    • A directory could support actual search by - location;
    • -
    • Absence of a TD in a directory could reveal negative - location information. For example, if a TD times out and is - removed from a directory, that means the device has not - been present for a while, which could be used to infer that - a person is NOT in a particular location, e.g. not at - home.
    • -
    -

    Location tracking is not the only profiling risk. In - general, "profiling" includes any mechanism used to evaluate - information about a person, including economic status, - health, preferences, interests, reliability, and behavior. - Some of the metadata in a TD can be used to infer information - of this kind if the described Thing can be associated with a - person. Some of the mitigations below are also applicable to - this more general definition of profiling.

    -

    Some of these risks are shared by similar services. For - example, DCHP automatically responds to requests for IP - addresses on a local network, and devices typically provide - an identifier (a MAC address) as part of this process, and - the DHCP server maintains a registry. In theory, someone with - access to the DHCP server in, say, a cafe, could use this - information to track someone's phone and infer their - location.

    -
    -
    Mitigations:
    -
    - There are a few options to mitigate these risks: -
      -
    • To avoid location tracking and other forms of - profiling, a WoT Thing associated with a person may - disable registration with public directories. - Registration would still be possible with personal - directories, for example, a home gateway, but a user - could disable registration at other locations. This has - the disadvantage that functionality is lost: personal - devices cannot be discovered in public locations. This - could be addressed by having internet-accessible - private discovery services. For example, the user's - home gateway could provide an internet-accessible - service, but with access control limiting use to - authorized users.
    • -
    • To avoid location tracking and other forms of - profiling, a WoT Thing associated with a person should - use anonymous TDs when registering with a public - directories. In some cases, it may be possible to use - anonymous TDs and omit explicit IDs from TDs submitted - to a TDD. In this case the TDD will generate a local ID - valid only in that TDD. This does, however, complicate - update since the client needs to remember the local ID - assigned by the TDD. Anonymous TDs also do not prevent - tracking by other means, such as fingerprinting.
    • -
    • To avoid location tracking and other forms of - profiling, a WoT Thing associated with a person may - periodically generate new IDs. Using fixed IDs makes it - exceptionally easy to track devices. This problem also - occurs in DHCP with MAC address and there is a similar - partial mitigation: generate new random IDs - periodically. There are however, a few issues. First of - all, other identification information in the TD needs - to be hidden. For example, client IDs issued by CSPs - for API security should be omitted from TDs if they - cannot be easily changed. Second, if the device - generates a new ID, the user may still need to know the - current ID to find the device via discovery. This can - be accomplished however by generating new IDs using a - deterministic cryptographic generator that is a - function of the current time. However, note that - regenerating IDs alone does not make tracking - impossible since a TD might be fingerprinted. Also, - updating an ID might be observable to the owner of the - directory service, who could track and record the - updated ID. Even if the TD is deleted and reinserted - the association could be inferred. This is however - exactly parallel to the situation with DHCP and - rotation of MAC addresses. In general, however, - generating new IDs at least for each service or person - to which a TD is supplied makes it harder to connect - registration events at different locations and times. - It is also prudent to generate new identifiers upon - major changes in configuration, such as unregistering - from a local network or hub and registering with a new - one (which typically indicates a change in ownership). - There is a related issue with long-lived IP addresses - which might need to be updated periodically to mitigate - tracking. In the context of ipv6 [RFC8981] - discusses this. Finally, there is a problem with - devices that require immutable identifiers, e.g. - medical devices in such jurisdictions. This is - discussed in [wot-thing-description11], - but in summary the problem can be avoided if such - immutable identifiers are made available only as - protected properties, e.g. via affordances requiring - authentication, not in the TD, and the TD identifier - itself (if used) is independent of the immutable - identifier, and so can be made mutable.
    • -
    • To reduce the risk of - negative location inferencing, access to private - directories SHOULD be limited - by using access controls. If an attacker cannot - access the service, they cannot retrieve information to - infer location. Access rights provided to guests (e.g. - for Peer-to-Peer Personal scenarios) should be - appropriately time-limited. Use of long time-to-live - values may be appropriate in other cases. In addition, - TDs should be updated in a directory only when they - change. For example, the TD for a car may only be - updated when new car firmware is available providing - new services, and the time-to-live might be set at one - month (covering most absences).
    • -
    • When explicit location - information is available, whether stored in a TD or - available in a property, additional care SHOULD be taken to only share the TD - and/or access to the device with trusted partners, - including directories. If the TD must be shared - with a public directory, the location information may - be stripped.
    • -
    -
    -
    -
    -
    -
    -

    9.2 - Query Tracking

    -
    -

    A directory service could potentially record and track - queries by an individual, identifying that individual by - their authenticated identity provided. Then the set of - queries associated with an individual could be used to - profile that individual, and specific queries may also reveal - personal information about an individual.

    -
    -
    Mitigations:
    -
    -

    When accessing a public directory, like any other - public web service, users and implementations should use - an anonymous identity provider. In particular, OAuth2 can - provide tokens which don't identify specific individuals, - they just assert access rights proven elsewhere.

    -
    -
    -
    -
    -
    -
    -

    10. Performance Considerations

    -
    -

    This section is non-normative.

    -
    -
    -

    10.1 Incremental Transfer

    -
    -

    TD objects are not constrained in - size. They may become expensive to process and transfer - individually or collectively. A single TD or a list of TDs - could be too large for a constrained device, serving its own - TD to consumers, submitting it to a directory, or consuming - other TDs. To meet such requirements, servers should support - incremental transfer of payloads using protocol-specific - mechanisms:

    -
      -
    • HTTP/1.1 servers should support chunked - - Transfer-Encoding [RFC7230] - to receive and server data incrementally. -
    • -
    • HTTP/2 servers should handle the data incrementally - using - HTTP Frames [RFC7540]. - The HTTP/1.1 chunked transfer encoding is not supported - in HTTP/2. -
    • -
    • CoAP servers must suppoert block-wise transfer - [RFC7959] - when relying on an unreliable transport protocol like UDP - and should support it when using a reliable transport - protocol like TCP or WebSockets [RFC8323].
    • -
    -

    Most HTTP servers and clients automatically process the - data that is transferred in chunks. Memory-constrained - clients should consider consuming the received data - incrementally, instead of trying to load a whole object in - memory for de-serialization.

    -
    -
    -
    -
    -

    11. - IANA Considerations

    -
    -
    -
    -

    11.1 Well-Known URI - Registration

    -
    -

    IANA will be asked to allocate the following value into - the Well-Known URI defined in [RFC8615].

    -
      -
    • URI suffix: wot
    • -
    -
    -
    -
    -

    11.2 Service Name Registration

    -
    -

    IANA will be asked to allocate the following value into - Service Name and Transport Protocol Port Number Registry - defined in [RFC6335].

    -
      -
    • Service Name: wot
    • -
    • Transport Protocol: TCP, UDP
    • -
    • Description: Service name to search for the Thing - Description of a Thing or a Thing Description Directory in - the W3C Web - of Things
    • -
    • Port Number: N/A
    • -
    • Assignment notes: We use _directory - subtype for a Thing Description Directory.
    • -
    -
    -
    -
    -

    11.3 CoRE Resource Types - Registration

    -
    -

    IANA will be asked to allocate the following values into - the Resource Type (rt=) Link Target Attribute - Values sub-registry of the Constrained Restful Environments - (CoRE) Parameters registry defined in [RFC6690].

    - - - - - - - - - - - - - - - - - - - - -
    ValueDescriptionReference
    wot.thingThing Description of a Thing - 6.4 CoRE - Link Format and CoRE Resource Directory -
    wot.directory - Thing Description of a Thing - Description Directory - - 6.4 CoRE - Link Format and CoRE Resource Directory -
    -
    -
    -
    -
    -

    - 12. Other Name Registration - Considerations

    -
    -
    -
    -

    12.1 DID Service Name - Registration

    -
    -

    The following values will be allocated for the Service - Type used in DID Documents.

    - - - - - - - - - - - - - - - - - - - - -
    ValueDescriptionReference
    WotThingThing Description of a Thing - 6.5 DID - Documents -
    WotDirectory - Thing Description of a Thing - Description Directory - - 6.5 DID - Documents -
    -
    -
    -
    -
    -

    - A. JSON Schema for WoT Discovery - TD-extensions

    -
    The following JSON Schema specifies the extensions used - in Enriched - TDs. It can be used for validating TDs by a TDD as prescribed in 7.3.2.1.6 Validation. -
    {
    +}
    + + + +
    +
    +

    8. +Security Considerations

    +
    +

    Security is a cross-cutting issue that needs to be considered in +all WoT building blocks and WoT implementations. This chapter +summarizes some general issues and guidelines to help preserve the +security of concrete WoT discovery implementations. For a more +detailed and complete analysis of both security and privacy issues, +see the WoT Security and Privacy Guidelines specification +[WOT-SECURITY]. +WoT Thing and WoT TDDs are also web services and should be +implemented using best practices for web services. In addition to +the specific security considerations below, the security risks and +mitigations discussed in guides such as the OWASP Top 10 +[OWASP-Top-10] +should be evaluated, and if applicable, addressed.

    +
    +
    +

    8.1 Denial +of Service

    +
    +

    Certain functions of the directory service, in particular search +queries, may require significant resources to execute and this fact +can be used to launch denial of service (DoS) attacks against WoT +Thing Description Directory services. In such an attack a WoT +Directory would be overloaded by requests from the attacker and +unable to service other requests.

    +
    +
    Mitigations:
    +
    +
      +
    • A WoT Thing Description Directory implementation should limit +the number of queries per unit time from the same requestor.
    • +
    • A WoT Thing Description Directory implementation should limit +the complexity of queries (for example, the total length of the +query expression or its depth).
    • +
    • A WoT Thing Description Directory implementation should use a +watchdog timer to abort queries that take more than a certain +maximum (implementation-configurable) amount of time.
    • +
    +
    +
    +
    +
    +
    +

    +8.2 Amplification and Distributed Denial +of Service

    +
    +

    It may also be possible to use elements of WoT Discovery +mechanisms to launch distributed denial of service (DDoS) attacks +against other targets. In such an attack the WoT Discovery service +itself is not the target. Instead, an aspect of the WoT Discovery +service would be exploited to generate amplified network traffic +that overloads a third party, the actual target. Such an attack has +two requirements: first, the ability to redirect traffic to a third +party, and second, an intermediary service that can be exploited to +amplify network traffic from the attacker. Redirection of network +traffic is possible in some protocols, such as unsecured CoAP, by +modifying source information in headers. Amplification is possible +by taking advantage of three multiplicative factors: the ratio of +request to response payload sizes, use of "observe" in protocols +like CoAP (which can give multiple results for one request), and +use of multicast (which can allow multiple servers to respond to +one request). Services which do not support authentication are +ideal intermediaries for such an indirect attack. Unfortunately, +the Introduction mechanisms for WoT Discovery are meant to provide +open access mechanisms to initiate discovery and might be exploited +for this purpose.

    +
    +
    Mitigations:
    +
    +
      +
    • Open implementations of Introduction +mechanisms SHOULD NOT support observe or +similar extended result subprotocols.
    • +
    • Open implementations of Introduction mechanisms should not +respond to multicast requests unless this is absolutely required by +the protocol. If support for multicast is required, in the case of +CoAP, the observations made in [AMPLIFICATION-ATTACKS] +are relevant, since the number of servers that might respond to a +multicast request during discovery will generally not be known in +advance.
    • +
    • Limit the size of responses to the minimum. The total size of +responses to an Introduction on the public internet (outside of a +protected local network) should be less than 3x the size of the +total size of request, and this should include any error responses. +This is consistent with DDOS mitigations in [RFC9000] +(QUIC) and HTTP/3. Here "total size" includes any headers required +by the protocol itself, as well as padding in the request to allow +for a larger response.
    • +
    • Introductions should rate-limit responses to any particular +request source.
    • +
    • Introduction mechanisms on a segmented +network behind a firewall (e.g. a LAN) SHOULD +NOT respond to requests that are (apparently) from outside +that LAN.
    • +
    +Of particular concern are Introduction mechanisms that can return +multiple results, such as CoRE-RD and DID. It may be necessary to +use authentication/authorization on such Introduction mechanisms as +well if the other mitigations above are not sufficient. A +recommended alternative is to move multiple results from such +Introductions into a WoT TDD, which can then be protected by +appropriate authentication and authorization measures. Then the +open Introduction mechanism only has to return one result, the URL +of the TDD. Introduction mechanisms that are visible on the open +internet should be especially careful to implement the above +mitigations, and perhaps avoid Introduction mechanisms that can +return multiple URLs completely.
    +
    +
    +
    +
    +

    8.3 +Self-Discovery on LANs

    +
    +

    On a LAN, certificates and browsers may not be able to property +set up TLS for HTTPS because browsers expect certificates pointing +to a publicly-visible URL. Using HTTP is common practice inside +LANs but in combination with self-description it means that WoT +Things would be essentially be making TDs visible to everyone with +access to the private LAN. Even if security mechanisms such as HTTP +passwords were used, these are not effective (they can be easily +discovered by a traffic analyser) without transport security.

    +
    +
    Mitigations:
    +
    +

    PSK +(pre-shared keys) SHOULD be used if +possible on LANs, meaning one of the ciphersuites in +[RFC4279]. +This does require that Things are assigned PSKs in a common +security domain, which is typically done by following an onboarding +process. Unfortunately, specific onboarding processes are currently +out of scope of the WoT specifications.

    +

    An alternative is to depend on local network security (i.e. +WEP). This is not the best solution from a security or privacy +point of view but may be acceptable in some contexts. Note however +that all users with access to the network would in turn have access +to all TDs via self-description. If Things cannot be individually secured with +transport security and authentication and authorization, a separate +network SHOULD be set up, i.e. with an +alternative SSID, and used only for IoT devices. Using a +segmented network reduces the need for distributing the password to +this network to those who need access to the set of IoT devices +connected to it.

    +

    Another alternative is to use a reverse proxy service based in +the cloud. Secure setup can be accomplished if the IoT device has +access to the cloud, since the proxy server can have a public URL +and the initial connection can use HTTPS, then open a secure tunnel +over a websocket. The proxy can in turn re-expose a secure +endpoint, and possible add authentication. The disadvantages of +this approach including depending on an external cloud service and +the need to expose an external access point (which is itself a +security risk). The first disadvantage can be addressed by hosting +the proxy service locally and exposing a public URL using e.g. +dynamic DNS if the local server is connected through an ISP. If +Things cannot be individually secured with transport security and +authentication and authorization, then they may be made available +for general access via a proxy that can provide suitable access +controls.

    +
    +
    +
    +
    +
    +
    +

    9. +Privacy Considerations

    +
    +

    Privacy is a cross-cutting issue that needs to be considered in +all WoT building blocks and WoT implementations. This chapter +summarizes some general issues and guidelines to help preserve the +privacy of concrete WoT discovery implementations. For a more +detailed and complete analysis of both security and privacy issues, +see the WoT Security and Privacy Guidelines specification +[WOT-SECURITY].

    +

    The WoT discovery architecture is designed to avoid a dependence +on the privacy of existing discovery schemes by using a two-phase +approach and allowing for the enforcement of authorization before +metadata release. However several privacy risks still exist. These +are listed below along with possible mitigations. The level of risk +to privacy in particular depends on the use case and whether there +is a risk that information related to a person might be distributed +in a fashion inconsistent with the privacy desires of that person. +For privacy we distinguish the following broad classes of use case +scenarios:

    +
    +
    Institutional
    +
    Both the Things producing metadata and the Consumers of that +metadata are owned and controlled by an institution or +representatives of an institution. Example: Automation in a factory +where a control system is accessing the state of an assembly line +in order to evaluate quality.
    +
    Service
    +
    The Things producing metadata are owned and controlled by an +institution or representatives of an institution while the +consumers are individuals. Example: driver of an electric vehicle +accessing the TD for a charge station in order to check status of a +charge.
    +
    Personal
    +
    Both the Things producing metadata and the Consumers of that +metadata are owned and controlled by the same individual. Example: +A smart home control system for charging an electric car from +home-attached solar panels, both home and car owned by the same +person.
    +
    Personal Peer-to-Peer
    +
    The Things producing metadata and the Consumers of that +metadata are owned and controlled by different individuals. +Example: A smart home control system for charging a guest's +electric car from home-attached solar panels.
    +
    Institutional Peer-to-Peer
    +
    The Things producing metadata and the Consumers of that +metadata are owned and controlled by different institutions. +Example: A utility provides and manages power delivered to a +factory, and the factory provides an interface for the utility to +negotiate on-demand power usage reductions.
    +
    Client
    +
    The Things producing metadata are owned and controlled by an +individual while the consumers are an institution or +representatives of an institution. Example: A personal electric +vehicle exposes an interface to a public charging station so that +the charging station can evaluate the charge status of the +vehicle.
    +
    +

    All of these in fact carry privacy risks. Even in the case of +factory automation, there is the chance that data about employee +performance would be captured and would have to be managed +appropriately.

    +

    In the following we make frequent reference to "tracking". This +term covers multiple privacy risks, including location tracking and +behavioral profiling. In general, the definition of "profiling" +given in Article 4 of the GDPR [GDPR-Defs] +is to be considered equivalent to "tracking" as used in this +document.

    +

    With these definitions and categories established, we will now +discuss some specific privacy risks and potential mitigations.

    +
    +
    +

    9.1 Location Tracking and Profiling

    +
    +

    A discovery service may potentially allow the approximate +location of a person to be determined without their consent. This +risk occurs in some specific circumstances which can be avoided or +mitigated. It is also similar to the risk posed by other network +services such as DHCP and DNS.

    +

    For this risk to occur, there first has to be an IoT device that +can be reliably associated with a person's location, such as a +necessary medical device or a vehicle. Note that the risk only +applies to personal use cases, not institutional ones. Secondly, +the device has to be configured to register automatically with the +nearest directory service. In this case, the location of the device +can be inferred from the network range of the directory service and +the location of the person inferred from the location of the +device.

    +

    There are a few variants of this:

    +
      +
    • The TD or Thing could report actual location information so no +inferencing by network range is needed;
    • +
    • A directory could support actual search by location;
    • +
    • Absence of a TD in a directory could reveal negative location +information. For example, if a TD times out and is removed from a +directory, that means the device has not been present for a while, +which could be used to infer that a person is NOT in a particular +location, e.g. not at home.
    • +
    +

    Location tracking is not the only profiling risk. In general, +"profiling" includes any mechanism used to evaluate information +about a person, including economic status, health, preferences, +interests, reliability, and behavior. Some of the metadata in a TD +can be used to infer information of this kind if the described +Thing can be associated with a person. Some of the mitigations +below are also applicable to this more general definition of +profiling.

    +

    Some of these risks are shared by similar services. For example, +DCHP automatically responds to requests for IP addresses on a local +network, and devices typically provide an identifier (a MAC +address) as part of this process, and the DHCP server maintains a +registry. In theory, someone with access to the DHCP server in, +say, a cafe, could use this information to track someone's phone +and infer their location.

    +
    +
    Mitigations:
    +
    There are a few options to mitigate these risks: +
      +
    • To avoid location tracking and other forms of profiling, a WoT +Thing associated with a person may disable registration with public +directories. Registration would still be possible with personal +directories, for example, a home gateway, but a user could disable +registration at other locations. This has the disadvantage that +functionality is lost: personal devices cannot be discovered in +public locations. This could be addressed by having +internet-accessible private discovery services. For example, the +user's home gateway could provide an internet-accessible service, +but with access control limiting use to authorized users.
    • +
    • To avoid location tracking and other forms of profiling, a WoT +Thing associated with a person should use anonymous TDs when +registering with a public directories. In some cases, it may be +possible to use anonymous TDs and omit explicit IDs from TDs +submitted to a TDD. In this case the TDD will generate a local ID +valid only in that TDD. This does, however, complicate update since +the client needs to remember the local ID assigned by the TDD. +Anonymous TDs also do not prevent tracking by other means, such as +fingerprinting.
    • +
    • To avoid location tracking and other forms of profiling, a WoT +Thing associated with a person may periodically generate new IDs. +Using fixed IDs makes it exceptionally easy to track devices. This +problem also occurs in DHCP with MAC address and there is a similar +partial mitigation: generate new random IDs periodically. There are +however, a few issues. First of all, other identification +information in the TD needs to be hidden. For example, client IDs +issued by CSPs for API security should be omitted from TDs if they +cannot be easily changed. Second, if the device generates a new ID, +the user may still need to know the current ID to find the device +via discovery. This can be accomplished however by generating new +IDs using a deterministic cryptographic generator that is a +function of the current time. However, note that regenerating IDs +alone does not make tracking impossible since a TD might be +fingerprinted. Also, updating an ID might be observable to the +owner of the directory service, who could track and record the +updated ID. Even if the TD is deleted and reinserted the +association could be inferred. This is however exactly parallel to +the situation with DHCP and rotation of MAC addresses. In general, +however, generating new IDs at least for each service or person to +which a TD is supplied makes it harder to connect registration +events at different locations and times. It is also prudent to +generate new identifiers upon major changes in configuration, such +as unregistering from a local network or hub and registering with a +new one (which typically indicates a change in ownership). There is +a related issue with long-lived IP addresses which might need to be +updated periodically to mitigate tracking. In the context of ipv6 +[RFC8981] +discusses this. Finally, there is a problem with devices that +require immutable identifiers, e.g. medical devices in such +jurisdictions. This is discussed in [wot-thing-description11], +but in summary the problem can be avoided if such immutable +identifiers are made available only as protected properties, e.g. +via affordances requiring authentication, not in the TD, and the TD +identifier itself (if used) is independent of the immutable +identifier, and so can be made mutable.
    • +
    • To reduce the risk of negative location +inferencing, access to private directories SHOULD be limited by using access controls. +If an attacker cannot access the service, they cannot retrieve +information to infer location. Access rights provided to guests +(e.g. for Peer-to-Peer Personal scenarios) should be appropriately +time-limited. Use of long time-to-live values may be appropriate in +other cases. In addition, TDs should be updated in a directory only +when they change. For example, the TD for a car may only be updated +when new car firmware is available providing new services, and the +time-to-live might be set at one month (covering most +absences).
    • +
    • When explicit location information is +available, whether stored in a TD or available in a property, +additional care SHOULD be taken to only +share the TD and/or access to the device with trusted partners, +including directories. If the TD must be shared with a +public directory, the location information may be stripped.
    • +
    +
    +
    +
    +
    +
    +

    9.2 Query +Tracking

    +
    +

    A directory service could potentially record and track queries +by an individual, identifying that individual by their +authenticated identity provided. Then the set of queries associated +with an individual could be used to profile that individual, and +specific queries may also reveal personal information about an +individual.

    +
    +
    Mitigations:
    +
    +

    When accessing a public directory, like any other public web +service, users and implementations should use an anonymous identity +provider. In particular, OAuth2 can provide tokens which don't +identify specific individuals, they just assert access rights +proven elsewhere.

    +
    +
    +
    +
    +
    +
    +

    10. Performance Considerations

    +
    +

    This section is non-normative.

    +
    +
    +

    10.1 +Incremental Transfer

    +
    +

    TD objects are not constrained in size. +They may become expensive to process and transfer individually or +collectively. A single TD or a list of TDs could be too large for a +constrained device, serving its own TD to consumers, submitting it +to a directory, or consuming other TDs. To meet such requirements, +servers should support incremental transfer of payloads using +protocol-specific mechanisms:

    +
      +
    • HTTP/1.1 servers should support chunked Transfer-Encoding +[RFC7230] +to receive and server data incrementally.
    • +
    • HTTP/2 servers should handle the data incrementally using +HTTP +Frames [RFC7540]. +The HTTP/1.1 chunked transfer encoding is not supported in +HTTP/2.
    • +
    • CoAP servers must suppoert block-wise transfer [RFC7959] +when relying on an unreliable transport protocol like UDP and +should support it when using a reliable transport protocol like TCP +or WebSockets [RFC8323].
    • +
    +

    Most HTTP servers and clients automatically process the data +that is transferred in chunks. Memory-constrained clients should +consider consuming the received data incrementally, instead of +trying to load a whole object in memory for de-serialization.

    +
    +
    +
    +
    +

    11. IANA +Considerations

    +
    +
    +
    +

    11.1 Well-Known URI Registration

    +
    +

    IANA will be asked to allocate the following value into the +Well-Known URI defined in [RFC8615].

    +
      +
    • URI suffix: wot
    • +
    +
    +
    +
    +

    11.2 Service Name Registration

    +
    +

    IANA will be asked to allocate the following value into Service +Name and Transport Protocol Port Number Registry defined in +[RFC6335].

    +
      +
    • Service Name: wot
    • +
    • Transport Protocol: TCP, UDP
    • +
    • Description: Service name to search for the Thing Description +of a Thing or a Thing Description Directory in the W3C Web of Things
    • +
    • Port Number: N/A
    • +
    • Assignment notes: We use _directory subtype for a +Thing Description Directory.
    • +
    +
    +
    +
    +

    11.3 CoRE Resource Types Registration

    +
    +

    IANA will be asked to allocate the following values into the +Resource Type (rt=) Link Target Attribute Values +sub-registry of the Constrained Restful Environments (CoRE) +Parameters registry defined in [RFC6690].

    + + + + + + + + + + + + + + + + + + + + +
    ValueDescriptionReference
    wot.thingThing Description of a Thing6.4 CoRE Link Format and CoRE Resource +Directory
    wot.directoryThing Description of a Thing Description +Directory6.4 CoRE Link Format and CoRE Resource +Directory
    +
    +
    +
    +
    +

    12. Other Name Registration Considerations

    +
    +
    +
    +

    12.1 DID Service Name Registration

    +
    +

    The following values will be allocated for the Service Type used +in DID Documents.

    + + + + + + + + + + + + + + + + + + + + +
    ValueDescriptionReference
    WotThingThing Description of a Thing6.5 DID Documents
    WotDirectoryThing Description of a Thing Description +Directory6.5 DID Documents
    +
    +
    +
    +
    +

    A. JSON Schema for WoT Discovery TD-extensions

    +
    +The following JSON Schema specifies the extensions used in Enriched TDs. It +can be used for validating TDs by a TDD as prescribed in 7.3.2.1.6 Validation. +
    {
       "title": "WoT Discovery TD-extensions Schema - 21 May 2021",
       "description": 
           }
         }
       }
    -}
    -
    -
    -
    -

    B. Recent Specification Changes

    -
    -
    -
    -

    B.1 - Changes from 19 January 2023 Candidate - Recommendation

    -
    -
      -
    • No normative changes from Candidate - Recommendation.
    • -
    • Add reference to IoT'16 paper by Arne Broering, Soumya - Kanti Datta, and Christian Bonnet.
    • -
    • At-risk assertions that did not receive sufficient - implementations were removed or converted to informative - statements.
    • -
    • - - HTML Diff -
    • -
    -
    -
    -
    -

    B.2 Changes from 10 August 2022 Working - Draft

    -
    -
      -
    • Define sorting order to be based on Unicode code - points.
    • -
    • Clarify 3x rule for DDoS migitation to allow padding in - request, and require it only outside of protected local - networks.
    • -
    • Define content types to be used for CoAP servers, - paralleling TD servers.
    • -
    • Update DID service names and refine DID assertions and - add examples to clarify use for Introductions.
    • -
    • Update DNS-SD section to include explicit scheme in TXT - field.
    • -
    • Replace reference to draft CoRE-RD with final - specification published as RFC9176.
    • -
    -
    -
    -
    -

    B.3 Changes from 2 June 2021 Working - Draft

    -
    -
      -
    • Use wot for well-known URI service - name.
    • -
    • Refer to TD and Architecture specs for general - constraints on secure transport.
    • -
    • Define requirements for CoAP-based TD Servers.
    • -
    • Introduction of TD Server exploration, with - self-description as a special case.
    • -
    • Elaboration of class diagram to clarify that not all - Directories need to be self-describing.
    • -
    • Clarify and consolidate error codes and ontology.
    • -
    • Add assertions for UTF-8 supporting - internationalization.
    • -
    • Update overview figure showing introduction and - exploration mechanisms.
    • -
    • Add Discoverer section defining requirements for - discovery clients.
    • -
    • Use Thing Model instead of a Thing Description example - for Directory API.
    • -
    • Refactor Directory Service API (td->thing, split - anonymous create action, retrieve one and search as - actions, listing as things property, split events)
    • -
    • Add amplification DDOS security consideration.
    • -
    • Split Security and Privacy Considerations into separate - sections.
    • -
    • Define status of search mechanisms: JSON Path, XPath, - and SPARQL.
    • -
    • Pagination as array and pagination as collection.
    • -
    • Updates to events API.
    • -
    • TD expiry management.
    • -
    • HEAD method support.
    • -
    -
    -
    -
    -

    B.4 Changes from 24 November 2020 First - Public Working Draft

    -
    -
      -
    • Update name of directory service to "Thing Description - Directory" with acronym TDD, to avoid confusion with the - acronym TD used for Thing Descriptions.
    • -
    • Elaboration of complete API for registration of a Thing - Description with a Thing Description Directory, including - support for creation, update, retrieval, deletion, and - listing.
    • -
    • Add recommendation that TDs be validated before storage - in a directory. Note: this corresponds to work under way in - the TD spec to precisely define appropriate levels of - automatic validation for different contexts, including - directory registration.
    • -
    • Addition of Security and Privacy Considerations - regarding Denial of Service and Location Tracking.
    • -
    • Addition of IANA Considerations regarding CoRE Resource - Types.
    • -
    • Definition of Enriched TD to support embedded metadata - in TDs returned by a TDD.
    • -
    • Updates to description of exploration to avoid - unnecessary dependence on HTTP (in the future, other - protocols may be supported).
    • -
    • Use of "resource type" instead of "endpoint type" when - describing entry in CoRE RD.
    • -
    • Addition of ontology for TDDs that include the type - DirectoryDescription identifying TDs of - directories and a type LinkDescription to - identify a TD that is just a link to another TD (useful for - referring to remote directories in order to support - federation).
    • -
    • Add section for self-description exploration mechanism. - This supports the use case where a Thing hosts its own TD - and peer-to-peer Thing communication.
    • -
    • Addition of diagram showing the directory information - model.
    • -
    • Removal of reference to Issue 16, citing CRUD interface - requirements. Replaced with CRUDL (CRUD + Listing) - interface requirement.
    • -
    • MAY assertion added to - explicitly permit implementation of SPARQL federation, and - a requirement that if implemented, it needs to follow the - SPARQL 1.1 specification.
    • -
    • Updates to references: more recent versions of CoRE RD, - DID Core, Eventsource, JSON-LD, and JSON Path - specifications. Use of datatracker service (and URLs) to - reference IETF RFCs. Addition of normative references to - RFC7396 and RFC7540.
    • -
    -
    -
    -
    -
    -

    C. - Acknowledgments

    -
    -

    Special thanks to Arne Broering, Soumya Kanti Datta, and - Christian Bonnet for their survey work on existing discovery - mechannisms in IoT. Special thanks to Philipp Blum, Victor - Charpeney, Ben Francis, Christian Glomb, Daniel Peintner, - Christine Perey, Jan Romann, and Elodie Thieblin for their - contributions to this document.

    -

    Many thanks to the W3C staff, especially - Kazuyuki Ashimura and Dominique Hazael-Massieux, and all other - active Participants of the W3C Web of Things Interest - Group (WoT IG) and Working Group (WoT WG) for their support, - technical input and suggestions that led to improvements to - this document.

    -
    -
    -
    -

    D. - References

    -
    -
    -
    -

    D.1 Normative references

    -
    -
    -
    - [AMPLIFICATION-ATTACKS]
    -
    - - Amplification Attacks Using the Constrained - Application Protocol (CoAP). John Preuß - Mattsson; Göran Selander; Christian Amsüss. IETF. DRAFT. - URL: - https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-amplification-attacks -
    -
    [DID-CORE]
    -
    - Decentralized - Identifiers (DIDs) v1.0. Manu Sporny; Amy Guy; - Markus Sabadello; Drummond Reed. W3C. 19 July 2022. W3C - Recommendation. URL: https://www.w3.org/TR/did-core/ -
    -
    [did-spec-registries]
    -
    - DID - Specification Registries. Orie Steele; Manu - Sporny. W3C. 11 September 2023. W3C Working Group Note. - URL: https://www.w3.org/TR/did-spec-registries/ -
    -
    - [Discovery-Categorization-IoT]
    -
    - A - Categorization of Discovery Technologies for the Internet - of Things. Arne Broering; Soumya Kanti Datta; - Christian Bonnet. Association of Computing Machinery - (ACM): IoT'16 Proceedings. 7-9 November 2016. URL: - https://dl.acm.org/doi/10.1145/2991561.2991570 -
    -
    [GDPR-Defs]
    -
    - General - Data Protection Regulation (GDPR) Article 4 - - Definitions. European Union (EU) and the - European Economic Area (EEA). URL: https://gdpr-info.eu/art-4-gdpr/ -
    -
    [HTML]
    -
    - HTML - Standard. Anne van Kesteren; Domenic Denicola; - Ian Hickson; Philip Jägenstedt; Simon Pieters. WHATWG. - Living Standard. URL: https://html.spec.whatwg.org/multipage/ -
    -
    [JSON-LD11]
    -
    - JSON-LD - 1.1. Gregg Kellogg; Pierre-Antoine Champin; - Dave Longley. W3C. 16 July 2020. W3C Recommendation. URL: - https://www.w3.org/TR/json-ld11/ -
    -
    [OWASP-Top-10]
    -
    - OWASP Top - Ten. OWASP. URL: https://owasp.org/www-project-top-ten/ -
    -
    [RFC1738]
    -
    - Uniform - Resource Locators (URL). T. Berners-Lee; L. - Masinter; M. McCahill. IETF. December 1994. Proposed - Standard. URL: https://www.rfc-editor.org/rfc/rfc1738 -
    -
    [RFC2119]
    -
    - Key words - for use in RFCs to Indicate Requirement - Levels. S. Bradner. IETF. March 1997. Best - Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119 -
    -
    [RFC3339]
    -
    - Date and - Time on the Internet: Timestamps. G. Klyne; C. - Newman. IETF. July 2002. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc3339 -
    -
    [RFC4122]
    -
    - A - Universally Unique IDentifier (UUID) URN - Namespace. P. Leach; M. Mealling; R. Salz. - IETF. July 2005. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc4122 -
    -
    [RFC4279]
    -
    - Pre-Shared - Key Ciphersuites for Transport Layer Security - (TLS). P. Eronen, Ed.; H. Tschofenig, Ed.. - IETF. December 2005. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc4279 -
    -
    [RFC6335]
    -
    - Internet - Assigned Numbers Authority (IANA) Procedures for the - Management of the Service Name and Transport Protocol - Port Number Registry. M. Cotton; L. Eggert; J. - Touch; M. Westerlund; S. Cheshire. IETF. August 2011. - Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc6335 -
    -
    [RFC6690]
    -
    - Constrained - RESTful Environments (CoRE) Link Format. Z. - Shelby. IETF. August 2012. Proposed Standard. URL: - https://www.rfc-editor.org/rfc/rfc6690 -
    -
    [RFC6762]
    -
    - Multicast - DNS. S. Cheshire; M. Krochmal. IETF. February - 2013. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6762 -
    -
    [RFC6763]
    -
    - DNS-Based - Service Discovery. S. Cheshire; M. Krochmal. - IETF. February 2013. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6763 -
    -
    [RFC7231]
    -
    - Hypertext - Transfer Protocol (HTTP/1.1): Semantics and - Content. R. Fielding, Ed.; J. Reschke, Ed.. - IETF. June 2014. Proposed Standard. URL: https://httpwg.org/specs/rfc7231.html -
    -
    [RFC7396]
    -
    - JSON Merge - Patch. P. Hoffman; J. Snell. IETF. October - 2014. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7396 -
    -
    [RFC7595]
    -
    - Guidelines - and Registration Procedures for URI Schemes. - D. Thaler, Ed.; T. Hansen; T. Hardie. IETF. June 2015. - Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc7595 -
    -
    [RFC7807]
    -
    - Problem - Details for HTTP APIs. M. Nottingham; E. - Wilde. IETF. March 2016. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7807 -
    -
    [RFC7959]
    -
    - Block-Wise - Transfers in the Constrained Application Protocol - (CoAP). C. Bormann; Z. Shelby, Ed.. IETF. - August 2016. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7959 -
    -
    [RFC8174]
    -
    - Ambiguity - of Uppercase vs Lowercase in RFC 2119 Key - Words. B. Leiba. IETF. May 2017. Best Current - Practice. URL: https://www.rfc-editor.org/rfc/rfc8174 -
    -
    [RFC8288]
    -
    - Web - Linking. M. Nottingham. IETF. October 2017. - Proposed Standard. URL: https://httpwg.org/specs/rfc8288.html -
    -
    [RFC8615]
    -
    - Well-Known - Uniform Resource Identifiers (URIs). M. - Nottingham. IETF. May 2019. Proposed Standard. URL: - https://www.rfc-editor.org/rfc/rfc8615 -
    -
    [RFC8981]
    -
    - Temporary - Address Extensions for Stateless Address - Autoconfiguration in IPv6. F. Gont; S. - Krishnan; T. Narten; R. Draves. IETF. February 2021. - Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc8981 -
    -
    [RFC9000]
    -
    - QUIC: A - UDP-Based Multiplexed and Secure Transport. J. - Iyengar, Ed.; M. Thomson, Ed.. IETF. May 2021. Proposed - Standard. URL: https://www.rfc-editor.org/rfc/rfc9000 -
    -
    [RFC9176]
    -
    - Constrained - RESTful Environments (CoRE) Resource - Directory. C. Amsüss, Ed.; Z. Shelby; M. - Koster; C. Bormann; P. van der Stok. IETF. April 2022. - Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc9176 -
    -
    [SPARQL11-OVERVIEW]
    -
    - SPARQL - 1.1 Overview. The W3C SPARQL Working Group. - W3C. 21 March 2013. W3C Recommendation. URL: https://www.w3.org/TR/sparql11-overview/ -
    -
    [wot-architecture11]
    -
    - Web of - Things (WoT) Architecture 1.1. Michael - Lagally; Ryuichi Matsukura; Kunihiko Toumura; Michael - McCool. W3C. 11 July 2023. W3C Proposed Recommendation. - URL: https://www.w3.org/TR/wot-architecture11/ -
    -
    - [wot-thing-description11]
    -
    - Web - of Things (WoT) Thing Description 1.1. - Sebastian Käbisch; Michael McCool; Ege Korkan. W3C. 11 - July 2023. W3C Proposed Recommendation. URL: https://www.w3.org/TR/wot-thing-description11/ -
    -
    [wot-usecases]
    -
    - Web - of Things (WoT): Use Cases. Michael Lagally; - Michael McCool; Ryuichi Matsukura; Tomoaki Mizushima. - W3C. 15 October 2020. Editor's Draft. URL: https://w3c.github.io/wot-usecases/ -
    -
    [xpath-31]
    -
    - XML Path - Language (XPath) 3.1. Jonathan Robie; Michael - Dyck; Josh Spiegel. W3C. 21 March 2017. W3C - Recommendation. URL: https://www.w3.org/TR/xpath-31/ -
    -
    -
    -
    -
    -

    D.2 Informative references

    -
    -
    -
    [JSONPATH]
    -
    - - JSONPath: Query expressions for JSON. - Stefan Gössner; Glyn Normington; Carsten Bormann. IETF. - DRAFT. URL: - https://datatracker.ietf.org/doc/html/draft-ietf-jsonpath-base -
    -
    [LDP-Paging]
    -
    - Linked - Data Platform Paging 1.0. Steve Speicher; John - Arwe; Ashok Malhotra. W3C. 30 June 2015. W3C Working - Group Note. URL: https://www.w3.org/TR/ldp-paging/ -
    -
    [REST-IOT]
    -
    - - RESTful Design for Internet of Things - Systems. Ari Keranen; Matthias Kovatsch; Klaus - Hartke. IETF. 11 May 2020. URL: - https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-rest-iot-06 -
    -
    [RFC7230]
    -
    - Hypertext - Transfer Protocol (HTTP/1.1): Message Syntax and - Routing. R. Fielding, Ed.; J. Reschke, Ed.. - IETF. June 2014. Proposed Standard. URL: https://httpwg.org/specs/rfc7230.html -
    -
    [RFC7540]
    -
    - Hypertext - Transfer Protocol Version 2 (HTTP/2). M. - Belshe; R. Peon; M. Thomson, Ed.. IETF. May 2015. - Proposed Standard. URL: https://httpwg.org/specs/rfc7540.html -
    -
    [RFC8323]
    -
    - CoAP - (Constrained Application Protocol) over TCP, TLS, and - WebSockets. C. Bormann; S. Lemay; H. - Tschofenig; K. Hartke; B. Silverajan; B. Raymor, Ed.. - IETF. February 2018. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc8323 -
    -
    [WOT-SECURITY]
    -
    - Web - of Things (WoT) Security and Privacy - Guidelines. Elena Reshetova; Michael McCool. - W3C. 6 November 2019. W3C Working Group Note. URL: - https://www.w3.org/TR/wot-security/ -
    -
    -
    -
    - - - - - - - - - - - - - - - - - - - - - - +} +})() + + diff --git a/publication/6-rec/index.html b/publication/6-rec/index.html index 8d164c9e..83f66682 100644 --- a/publication/6-rec/index.html +++ b/publication/6-rec/index.html @@ -3666,6 +3666,15 @@

    JSON Schema for WoT Discovery TD-extensions

    Recent Specification Changes

    +

    Changes from 11 July 2023 Proposed Recommendation

    +

    Changes from 19 January 2023 Candidate Recommendation

    +

    1. Introduction

    The Web of Things (WoT) defines an architecture that supports the integration @@ -4641,7 +4641,16 @@

    Web of Things (WoT) Discovery

    B. Recent Specification Changes

    -

    B.1 Changes from 19 January 2023 Candidate Recommendation

    +

    B.1 Changes from 11 July 2023 Proposed Recommendation

    +
      +
    • No normative changes from Proposed Recommendation.
    • +
    • Add errata link.
    • +
    • Update process link to 3 November 2023.
    • +
    • Remove Editors' notes regarding date-time and Search API overview.
    • +
    • Update references to DID registry and other WoT documents.
    • +
    • HTML Diff
    • +
    +

    B.2 Changes from 19 January 2023 Candidate Recommendation

    • No normative changes from Candidate Recommendation.
    • Add reference to IoT'16 paper by Arne Broering, Soumya Kanti Datta, and Christian Bonnet.
    • @@ -4650,7 +4659,7 @@

      Web of Things (WoT) Discovery

    • HTML Diff
    -

    B.2 Changes from 10 August 2022 Working Draft

    +

    B.3 Changes from 10 August 2022 Working Draft

    • Define sorting order to be based on Unicode code points.
    • Clarify 3x rule for DDoS migitation to allow padding in request, and require it only outside of protected local networks.
    • @@ -4659,7 +4668,7 @@

      Web of Things (WoT) Discovery

    • Update DNS-SD section to include explicit scheme in TXT field.
    • Replace reference to draft CoRE-RD with final specification published as RFC9176.
    -

    B.3 Changes from 2 June 2021 Working Draft

    +

    B.4 Changes from 2 June 2021 Working Draft

    • Use wot for well-known URI service name.
    • Refer to TD and Architecture specs for general constraints on secure transport.
    • @@ -4680,7 +4689,7 @@

      Web of Things (WoT) Discovery

    • TD expiry management.
    • HEAD method support.
    -

    B.4 Changes from 24 November 2020 First Public Working Draft

    +

    B.5 Changes from 24 November 2020 First Public Working Draft

    • Update name of directory service to "Thing Description Directory" with acronym TDD, to avoid confusion with the acronym TD used for Thing Descriptions.