Title: Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability
Authors: Dong In Kim; Hyungu Lee; Alavalapati Goutham Reddy; Jaehwan Lee; Ji Sun Shin
Addresses: Department of Computer and Information Security, Sejong University, Seoul, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea ' School of Electronics and Information Engineering, Korea Aerospace University, Goyang-si, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea
Abstract: The services and applications of the internet of things (IoT) support various areas such as smart home, smart car, smart factory and so on. Previously, different platforms were used for each application and service. Recently, several groups of companies have been trying to integrate and standardise the IoT platforms and two major platforms among them are oneM2M and the Open Interconnect Consortium (OIC). oneM2M and OIC standards enable connected devices to communicate each other regardless of their manufacturers and operating systems. Also, there are attempts to interwork two open platforms. However, security interoperability has been less focused in the interworking. In this paper, we present the comparison of security-related methods between oneM2M and OIC standard specifications for the security interoperability. We compare the basic concepts and terminology of two standards by clarifying the same-spelled basic terms with different meanings and different terms having similar concepts. Moreover, we analyse security-related methods in OIC and oneM2M in a comparative manner. By comparative analysis, we help users understand the interworking and interoperability between oneM2M and OIC standard specifications.
Keywords: one machine-to-machine; oneM2M; security; internet of things; IoT; Open Interconnect Consortium; OIC; interworking.
DOI: 10.1504/IJITST.2019.101828
International Journal of Internet Technology and Secured Transactions, 2019 Vol.9 No.3, pp.313 - 331
Received: 05 Dec 2017
Accepted: 23 Mar 2018
Published online: 28 Aug 2019 *