Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability
by Dong In Kim; Hyungu Lee; Alavalapati Goutham Reddy; Jaehwan Lee; Ji Sun Shin
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 9, No. 3, 2019

Abstract: The services and applications of the internet of things (IoT) support various areas such as smart home, smart car, smart factory and so on. Previously, different platforms were used for each application and service. Recently, several groups of companies have been trying to integrate and standardise the IoT platforms and two major platforms among them are oneM2M and the Open Interconnect Consortium (OIC). oneM2M and OIC standards enable connected devices to communicate each other regardless of their manufacturers and operating systems. Also, there are attempts to interwork two open platforms. However, security interoperability has been less focused in the interworking. In this paper, we present the comparison of security-related methods between oneM2M and OIC standard specifications for the security interoperability. We compare the basic concepts and terminology of two standards by clarifying the same-spelled basic terms with different meanings and different terms having similar concepts. Moreover, we analyse security-related methods in OIC and oneM2M in a comparative manner. By comparative analysis, we help users understand the interworking and interoperability between oneM2M and OIC standard specifications.

Online publication date: Wed, 28-Aug-2019

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com