IoT Security Part Two: How OCF is Mapping to Core Security Capabilities