Title: Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability

Authors: Dong In Kim; Hyungu Lee; Alavalapati Goutham Reddy; Jaehwan Lee; Ji Sun Shin

Addresses: Department of Computer and Information Security, Sejong University, Seoul, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea ' School of Electronics and Information Engineering, Korea Aerospace University, Goyang-si, South Korea ' Department of Computer and Information Security, Sejong University, Seoul, South Korea

Abstract: The services and applications of the internet of things (IoT) support various areas such as smart home, smart car, smart factory and so on. Previously, different platforms were used for each application and service. Recently, several groups of companies have been trying to integrate and standardise the IoT platforms and two major platforms among them are oneM2M and the Open Interconnect Consortium (OIC). oneM2M and OIC standards enable connected devices to communicate each other regardless of their manufacturers and operating systems. Also, there are attempts to interwork two open platforms. However, security interoperability has been less focused in the interworking. In this paper, we present the comparison of security-related methods between oneM2M and OIC standard specifications for the security interoperability. We compare the basic concepts and terminology of two standards by clarifying the same-spelled basic terms with different meanings and different terms having similar concepts. Moreover, we analyse security-related methods in OIC and oneM2M in a comparative manner. By comparative analysis, we help users understand the interworking and interoperability between oneM2M and OIC standard specifications.

Keywords: one machine-to-machine; oneM2M; security; internet of things; IoT; Open Interconnect Consortium; OIC; interworking.

DOI: 10.1504/IJITST.2019.101828

International Journal of Internet Technology and Secured Transactions, 2019 Vol.9 No.3, pp.313 - 331

Received: 05 Dec 2017
Accepted: 23 Mar 2018

Published online: 28 Aug 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article