Mobile Health Care , IST-2001-36006 MobiHealth Infrastructure Document Version: 1.1 Document Status: DRAFT Document Release Date: January 2003 © 2002 CMG Wireless Data Solutions — Table of Contents i Table of Contents 1 2 3 4 5 ii MobiHealth System ............................................................................................. 8 1.1 MobiHealth Infrastructure ...................................................................................................... 8 1.1.1 Overview ................................................................................................................. 8 1.2 Description of the BE system ................................................................................................. 9 1.2.1 Wireless Service Broker TM ..................................................................................... 9 1.2.2 Proposed security used in combination with the WSB ........................................... 9 1.2.3 Surrogate Host, Lookup Server, BAN Data Repository ......................................... 9 Interfaces Pull Service Broker ......................................................................... 10 2.1 Location provider ................................................................................................................. 10 2.2 Origin Server ........................................................................................................................ 10 2.3 Short Message Service Centre ............................................................................................ 11 2.3.1 UCP-SMSC .......................................................................................................... 11 2.3.2 SMPP SMSC ........................................................................................................ 11 2.4 Wireless Framework ............................................................................................................ 11 2.5 CMG support ........................................................................................................................ 11 Interfaces Push Service Broker ....................................................................... 12 3.1 Push Initiator ........................................................................................................................ 12 3.1.1 Transfer encoding ................................................................................................. 12 3.2 Wireless Framework ............................................................................................................ 13 3.3 Short Message Service Centre ............................................................................................ 14 3.3.1 UCP-SMSC .......................................................................................................... 14 3.3.2 SMPP SMSC ........................................................................................................ 14 3.4 Mobile Terminal ................................................................................................................... 14 3.5 CMG support ........................................................................................................................ 14 VPN .................................................................................................................... 15 4.1 VPN Concept ....................................................................................................................... 15 4.2 VPN Sessions ...................................................................................................................... 15 VPN Hardware ................................................................................................... 17 5.1 VPN Concentrator, WDS side .............................................................................................. 17 5.2 Firewall, customer side ........................................................................................................ 17 5.3 VPN Client, customer side ................................................................................................... 17 MobiHealth Infrastructure — © 2002 CMG Wireless Data Solutions 6 CMG VPN solution requirements .................................................................... 18 6.1 Requirements CMG side...................................................................................................... 18 6.2 Requirements Customer Side .............................................................................................. 18 © 2002 CMG Wireless Data Solutions — Table of Contents iii List of Figures Figure 1 Overview MobiHealth Infrastructure .......................................................................................... 8 Figure 2-1: External Interfaces ............................................................................................................... 10 Figure 3-1: External interfaces of the system ........................................................................................ 12 Figure 2: Overview BeSys / Management ............................................................................................. 19 Figure 3: Overview MobiHealth / Management BeSys .......................................................................... 20 © 2002 CMG Wireless Data Solutions — List of Figures v Preface Purpose This document specifies the Infrastructure of the MobiHealth project and the functionality used by the Wireless Service Broker TM ,the Surrogate Host, Lookup Server and the BAN Data Repository. All these items called the Back End System (BeSys). This specification is meant to give a clear overview of the architecture of the MobiHealth Infrastructure and perspective of what the Wireless Service Broker TM is supposed to offer from a hospital point of view. Audience This document is intended for people who want to know more about the Infrastructure of the MobiHealth project and the functionality and services of the BeSys. Readers are expected to be familiar with telecommunication networks and applications. 1 MobiHealth System 1.1 MobiHealth Infrastructure 1.1.1 Overview GPRS/UMTS End User Application Actu ator Radio tower GPRS / UMTS Operator Front-End Sens or Internet Note: VPN connector is only needed for remote support WSB (CMG) and remote support SH, Lus and BANDR (UT) MBU VPN Concentrator Router DMZ DMZ BeSys Firewall IDC Wireless Service Broker IBM Surrogate Host, Look Up Server. BAN DR Figure 1 Overview MobiHealth Infrastructure BAN Data Repository End User Application Healthcare Provider Network 1.2 Description of the BE system The MobiHealth Back-End System is located at the Hospitals DMZ, see below the horizontal line. Components of the Back-End System: Wireless Service Broker TM Surrogate Host, Lookup Server, BAN Data Repository 1.2.1 Wireless Service Broker TM The Wireless Service Broker enables service providers to structure their electronic services and to offer them to specific target audiences in a controlled and orderly way. The Wireless Service Broker in this case is the security gateway. Configurable service offering and navigating service menu’s is performed by means of point and click. The following functionality will be used: User authentication and Authorization, to grant the MBU for the Surrogate Host, this can be done by Username and Password, or by Pincode. Push Service Broker, this functionality will be used for push control information to the MBU by IP address, and when the mobile is not online to make a Session Initiation Request so the MBU will be asked to make a connection. The Wireless Service Broker will be used as Security Proxy gateway. Virtual Gateways will be used for separate Subscriber Data Bases. Billing functionality for logging information. Service profiles. 1.2.2 Proposed security used in combination with the WSB The proposed security used in combination with the Wireless Service Broker is End-to-End security (HTTPS) in both ways. The protocol W-TCP will be used instead of TCP. This protocol has a better performance then TCP in a network with wireless characteristics. 1.2.3 Surrogate Host, Lookup Server, BAN Data Repository The Surrogate Host, Lookup Server and BAN Data Repository will be used to access and stored data delivered from the MBU. Further from this site the MBU will be controlled. The “Wireless Service Broker” and the “Surrogate Host, Lookup Server and BAN Data Repository” will be installed on different hardware platforms. This is for remote support of software products on different hardware platforms through different departments. 2 Interfaces Pull Service Broker This chapter focuses on interfaces to external systems. It describes the capabilities of these interfaces and how they are related to system functionality. In the presented architectural structure, interfaces used to third party products to complete the system are also described. CMG Support Origin Server WSB Pull Service Broker Wireless Framework Location Provider Short Message Service Centre UCP SMSC SMPP SMSC Figure 2-1: External Interfaces 2.1 Location provider WSB can interface with an external Location provider to obtain subscriber related location information. To WSB: From WSB: - Location and positioning information. - Location and positioning requests. 2.2 Origin Server The Origin Server represents the interface to the origin server via the Internet or Intranet, used to retrieve WML-content for the mobile (either directly or via a web proxy). The output to the Origin Server consists of HTTP or HTTPS-requests sent over a standard Transmission Control Protocol/Internet Protocol (TCP/IP) communication facility. Each request holds specific data for that request. To WSB: From WSB: - HTTP-response or HTTPS-response - HTTP-request or HTTPS-request. 2.3 Short Message Service Centre 2.3.1 UCP-SMSC The UCP-SMSC is used to send and/or receive short messages to/from WSB, using the Universal Computer Protocol (UCP). SMSC takes the initial action by sending short messages to WSB. These short messages are processed by WSB and the resulting content, taken from the Internet/Intranet, is sent back to SMSC. Also the UCP-SMSC is used for sending OTAP and challenge messages to mobile subscribers. The UCP-SMSC is able to send delivery notifications back to WSB. To WSB: From WSB: - short message - delivery notification (short message) - short message On this interface we support the UCP protocol as specified. 2.3.2 SMPP SMSC The SMPP-SMSC is used to send and/or receive short messages to/from WSB, using the SMPP-protocol. SMSC will take the initial action by sending short messages to WSB. These short messages will be processed by WSB and the resulting content, taken from the Internet/Intranet, will be sent back to SMSC. Also the SMPP-SMSC is used for sending OTAP and challenge messages to mobile subscribers. The SMPP-SMSC is able to send delivery notifications back to WSB. To WSB: From WSB: - short message - delivery notification (short message) - short message 2.4 Wireless Framework The framework module contains the basic software features that are always required to deploy any of the Wireless Service Broker modules. Moreover the framework contains a number of software options that can be applied in combination with all available modules To WSB: From WSB: - API responses - API calls 2.5 CMG support CMG support can connect to the WSB system by means of a VPN tunnel. The Customer Support department of CMG has to make a connection. The operator has to open the line before CMG support is able to make a connection to increase the security. CMG support has to authorise by means of a PPP-connection. 3 Interfaces Push Service Broker This chapter discusses the external interfaces of Push Service Broker. For each interface, a description of in going and outgoing data flows is being given. Figure 3-1 shows the interfaces to Push Service Broker: (all lines crossing the dotted box are considered to be Push Service Broker interfaces). Wireless Framework (PullSB, OAM, Billing, LDAP) Short Message Service Centre Push Initiator WSB Push Service Broker UCP SMSC SMPP SMSC Mobile Terminal CMG Support Figure 3-1: External interfaces of the system 3.1 Push Initiator The Push Initiator (PI) represents the interface to the push server via the Internet or Intranet, either directly or via a web proxy. The PI sends push messages to the Push Service Broker to be forwarded to the end user device To Push Service Broker: From Push Service Broker: - PAP/HTTP request or PAP/HTTPS request PAP/HTTP response or PAP/HTTPS response The notification server is the entity associated to the Push Initiator, which will receive push notification results in case the Push Initiator requested it during the push submission time. The Notification server acts as an HTTP server. From Push Service Broker: To Push Service Broker: 3.1.1 - PAP/HTTP request or PAP/HTTPS request PAP/HTTP response or PAP/HTTPS response Transfer encoding The following transfer encodings are supported on the pap request: None, 7bits and 8bits. The following transfer encodings are supported on the control part of the pap request: None, 7bits, 8bits, base64 and quoted-printable. The following transfer encodings are supported on the content part of the pap request: None, 7bits, 8bits, base64 and quoted-printable. The following transfer encodings are supported on the capability part of the pap request: None, 7bits, 8bits, base64 and quoted-printable. The response over HTTP is never encoded. 3.2 Wireless Framework The framework module contains the basic software features that are always required to deploy any of the Wireless Service Broker modules. Moreover the framework contains a number of software options that can be applied in combination with all available modules. The PullSB is used to send push messages from the Push Service Broker using the OTAWSP protocol. This protocol may be used for connection oriented and connection less push requests. The COMM interface is used to send push messages over OTA-WSP via the PullSB. Client Capabilities Query is a request from the PI for the device capabilities of a certain subscriber. These capabilities are stored on the Wireless Framework and are requested using the COMM interface. The returned information is an XML document describing all known device software, hardware and configuration characteristics so that a PI can tailor the push content for a certain subscriber. The Lightweight Directory Access Protocol is used to communicate with a directory server for data storage and retrieval. This contains data like subscriber information and PI information. Interface statistics on the various parts of the PushSB system can be viewed via the OAM web interface. Also online configuration changes can be done and SNMP traps can be send to a SNMP Management package. The PushSB system supports SNMP version 1. The PushSB can access external Prepaid Billing System (PBS) using the Billing API. From Push Service Broker: To Push Service Broker: - client capabilities query OTA-WSP push subscriber data service data profile data meta-profile data get/set SNMP attribute commands accounting data (billing) client capabilities push result subscriber data service data profile data meta-profile data NMP alarms (traps) NMP attribute values - accounting data (billing) 3.3 Short Message Service Centre 3.3.1 UCP-SMSC The UCP-SMSC is used to send and/or receive short messages to/from Push Service Broker, using the Universal Computer Protocol (UCP). SMSC takes the initial action by sending short messages to the Push Service Broker. The Push Service Broker processes these short messages and the resulting content, taken from the Internet/Intranet, is sent back to SMSC. Also the UCP-SMSC is used for sending OTAP and challenge messages to mobile subscribers. The UCP-SMSC is able to send delivery notifications back to the Push Service Broker. To Push Service Broker: From Push Service Broker: - short message delivery notification (short message) short message On this interface we support the UCP protocol as specified. 3.3.2 SMPP SMSC The SMPP-SMSC is used to send and/or receive short messages to/from the Push Service Broker, using the SMPP-protocol. SMSC will take the initial action by sending short messages to Push Service Broker. The Push Service Broker will process these short messages and the resulting content, taken from the Internet/Intranet, will be sent back to SMSC. Also the SMPP-SMSC is used for sending OTAP and challenge messages to mobile subscribers. The SMPP-SMSC is able to send delivery notifications back to the Push Service Broker. To Push Service Broker: From Push Service Broker: - short message delivery notification (short message) short message 3.4 Mobile Terminal The OTA-HTTP interface is used to send push messages over HTTP as defined by the WAP 2.0 standards. Due to the characteristics of HTTP this is only applicable for connection oriented push requests. To Push Service Broker: From Push Service Broker: - push result session information OTA-HTTP push session information 3.5 CMG support CMG support can connect to the WSB system by means of a VPN tunnel. The Customer Support department of CMG has to make a connection. The operator has to open the line before CMG support is able to make a connection to increase the security. CMG support has to authorise by means of a PPP-connection. 4 VPN 4.1 VPN Concept There is an interest in providing VPN connectivity from CMG to the customer. Not all customers provide ISDN lines into the server rooms and are not interested into providing one because of policies or the costs. Using existing Internet access is more attractive. The VNP Concentrator is needed for remote support of the Back-End System. Via the VPN tunnel the Customer Support department of CMG has the availability to access in a secure way to give support on the Wireless Service Broker. On the same way it is possible for the University of Twente to give remote support on the Surrogate Host, Lus and BAN Data repository of the Back-End System. Since the VPN solution is to be used in the customer support environment, the choice is made to separate this VPN solution form the other VPN solutions that are already in place. The topology is such that the access server is accessed from the CMG intranet and that from the access server the customer systems can be reached. The VPN connection starts in the VPN router and ends in the VPN support router. Between the two, there is an encrypted and authenticated data channel, which can be continuously authenticated. 4.2 VPN Sessions A VPN session is a secure session from one point to another over an external network. This ‘tunnel’ will be created by the GRE protocol. To create security in the information through the ‘tunnel’ the IP-Sec protocol is used to apply 3DES encryption. To set up a VPN connection via the Internet, the VPN support router needs to establish a point-to-point connection via the Internet to the public IP address of the VPN client. Within the firewall, this address will be translated by statically NAT to the private CMG address assigned to the private interface of the VPN client located on the VPN DMZ. Therefore, certain ports on the firewall need to be opened to allow the VPN tunnel through to the VPN client. See connection scenario below. VPN client internet VPN Concentrator CMG Nieuwegein (NL) The customer is controlling the access over the VPN-tunnel. When they want to obtain support from the CMG organisation, they open the VPN-connection to allow access to their systems. At the end of the support, the customer has to close the VPN-connection to block access to their systems. To open the VPN-connection the customer must telnet to the CS-router (VPN-router) using the username ‘open’ and to close the VPN-connection the customer must telnet to the CSrouter (VPN-router) using the username ‘close’. A customer is not able, due to the security policy, to make a connection to another customer (CS-router) over the VPN-connection. 5 VPN Hardware 5.1 VPN Concentrator, WDS side In this VPN concept, as the VPN concentrator the Cisco-3640 is used. Every customer connecting via VPN will have the ‘tunnels’ terminated on this router. The addresses of the VPN concentrator will be translated by static NAT tables in the Firewall to a public IP address, so that it can be reached from the Internet. The firewall between the Internet and the concentrator is configured to allow VPN connections. Name VPN DMZ address Static NAT address NL-NIE-VPN03 XXX.XXX.XXX.XXX 212.136.56.9 5.2 Firewall, customer side As the customer firewall is outside the scope of this document, only a recommendation can be given about the configuration. In the configuration it is assumed that the support router remains where it originally was and that the unused Ethernet port that is connected to the LAN. Any firewall between the Internet and the support router are expected to allow certain traffic through to the support router: Protocol 50 (ESP) port any Protocol 51 (AH) port any Protocol 17 (UDP), port 10000 The administrator of the customer firewall can setup rules to allow only the specific VPN traffic using a fixed source and destination addresses (CMG Customer Support VPN router and CMG VPN Concentrator). CMG will provide the necessary information to setup the greatest security between the customer and CMG as possible. 5.3 VPN Client, customer side The VPN support router is the Cisco 3002 with ISDN BRI interface that is delivered with, for example, the SMSC STP. Required is an upgrade in the IOS version to enable IPSec and 3DES and in most cases an upgrade to support 40Mb of RAM and 8 Mb of flash. These are the requirements to enable IPSec and 3DES. The goal is to reuse the support router for VPN. Additional information: The support router needs to have at least 40Mb of ram, 8Mb flash and an unused Ethernet port. The Hardware will be delivered by CMG and CMG is also the owner of this hardware. 6 CMG VPN solution requirements For management of the Back-End-System, the customer support department from CMG has to connect via the VPN concentrator. The hardware will be provided by CMG The requirements can be split up into requirements for two parties, namely the CS department and the connecting customers. 6.1 Requirements CMG side Transparency for making connection from the support machines towards customers (CS sees no difference). Possibility of redundancy (e.g. having 2 or 3 tunnel end-points in different regions) start with Nieuwegein as end-point only Security – each tunnel needs to get verified (on IP number and shared secret key) Security – inbound traffic over the VPN tunnel is only allowed to go to the support machines (not to other customers) Tunnel end point devices only for VPN available (no other functionality than support traffic) Part of the Red Network Easy to maintain Document for Implementation Configuration provided by the ICT Department Scalable hardware to provide 1 or more tunnels 6.2 Requirements Customer Side Tunnel end point devices only for VPN available (no other functionality than support traffic) Security – inbound traffic only from CMG network. No Network Address Translation (NAT) on IP address used for tunnel end-point (not available yet in Cisco IOS SW; might change over time – planned mid 2002) Configuration provided by the ICT Department Internet connection available Upgrade of Router Software to support IPsec Possible upgrade necessary of Router Hardware to include extra port for Internet connectivity Possibility to open and close VPN tunnel Possibility to have ISDN/PSTN/X25 backup line Additional costs on customer side are for his account MobiHealth Infrastructure / Customer Support CMG Customer Support Internet Note: VPN connector is only needed for remote support WSB (CMG) and remote support SH, Lus and BANDR (UT) VPN Concentrator DMZ BeSys IDC Wireless Service Broker IBM Surrogate Host, Look Up Server. BAN DR Figure 2: Overview BeSys / Management BAN Data Repository End-User 1st level support CMG Customer Support Department 2nd level support University Twente Figure 3: Overview MobiHealth / Management BeSys WSB SH, LUS, BANDR Abbreviations Abbreviation Description API Application Programming Interface BAN Body Area Network BANDR BAN Data Repository BE Back-End BRI Basic Rate Interface CS Customer Support department CMG DMZ Demilitarised Zone GPRS General Packet Radio Service GRE Generic Routing Encapsulation HTTP HyperText Transfer Protocol HTTPS HyperText Transfer Protocol Secure ISDN Integrated Services Digital Network IST Information Society Technologies LUS Lookup Server MBU Mobile Base Unit NMP Network Management Protocol OTAP Over The Air Protocol PAP Push Access Protocol PI Push Initiator PPP Point to Point Protocol SH Surrogate Host SMPP Short Message Peer to peer Protocol SMSC Short Message Service Centre SNMP Simple Network Management Protocol TCP Transmission Control Protocoll TCP/IP Transmission Control Protocol / Internet Protocol UCP Universal Control Protocol UMTS Universal Mobile Telecommunications System Abbreviation Description VPN Virtual Privat Network WAP Wireless Application Protocol WSB Wireless Service Broker WSP Wireless Session Protocol W-TCP Wireless Profiled TCP WTLS Wireless Transport Layer Security 3DES Data Encryption Standard Version History Version Status Date Details of Changes Author(s) 0.1 DRAFT 29-12-2002 Initial version Hugo Geuverink 1.1 DRAFT 27-01-2003 Changes, new overviews Hugo Geuverink Approval Version Date Approved by Signature