Open Connectivity Foundation continues to address the need for a secure IoT environment with its “secure-by-design” approach, security specification and ongoing collaboration with government and cybersecurity organizations. In addition to these tactics, OCF experts actively contribute their security knowledge and insights to the greater IoT community to further promote OCF’s vision for a safeguarded, reliable IoT ecosystem.
Below, we have highlighted a few security-focused resources developed by OCF experts that give end users and other IoT enthusiasts an in-depth look into OCF technology and how it can be used to optimize the IoT:
IoT Device Security: A Path to Standardization
In this article, Oleksandr Andrieiev of Samsung and Philip Hawkes of Qualcomm describe how to safely onboard consumer IoT products. The authors provide a high-level overview of consumer product onboarding, the OCF organization and OCF’s solution for security. Readers will have a basic understanding of the crucial steps to setting up a secure IoT device, specifically with the OCF onboarding process.
Read the full article via Embedded.com here.
Securing the IoT from the Network Layer to the Application Layer
To ensure end-to-end security, security implementations must be made in the hardware, network, and application layers. In this article, Cisco’s Wouter van der Beek and Cascoda’s Bruno Johnson help define these three security layers. Readers will learn how the Thread Group network and OCF technology can work together as OCF-over-Thread to form a complete, secure IoT platform.
Take a look at the article published on IoT Now.
The C2 Consensus on IoT Device Security Baseline Capabilities
OCF proudly collaborated with the Consumer Technology Association (CTA) and Council to Secure the Digital Economy (CSDE) to help establish the C2 Consensus on IoT Device Security Baseline Capabilities. OCF leadership actively contributed their advice, support, and recommendations to help form guidelines to drive increased IoT security. The document contains an annex, which maps the OCF specification to the C2 consensus security capabilities.
To learn more about OCF’s work with CTA and CSDE and the OCF annex, read our C2 report blog.
OCF Continues to Engage with NIST to Shape its Cybersecurity Baseline
To help drive increased IoT security, OCF continues to engage with the National Institute of Standards and Technology (NIST), the US federal government’s expert agency on cybersecurity. OCF’s engagement with NIST is part of its broader goal to ensure all stakeholders, including public officials, understand that the needed cybersecurity capabilities are readily available today to significantly increase the security of IoT devices.
Read the OCF blog to learn how OCF has supported NIST’s cybersecurity guidelines.
How to Secure IoT Connectivity and Onboarding Without Writing Code
Those looking for a step-by-step guide to developing a secure IoT device should look no further. Kyle Haefner of CableLabs and Clarke Stevens of Shaw Communications write a detailed description of how to build a binary-switch server with OCF’s IoTivity Lite open source implementation. While small developers often lack resources and expertise to properly secure IoT devices, open source solutions, such as IoTivity-Lite, enable developers to quickly and efficiently secure a device without writing code.
Kickstart your IoT development by reading the full guide.
Applying Security Principles to Building Automation
As building automation shifts from proprietary networks to IP networks, there will be an influx of building IoT devices on the network, creating a large impact on network management. These devices will need to be securely added to the network and provisioned in the Building Management System (BMS). In this article, Wouter van der Beek of Cisco describes the security and onboarding requirements specifically needed for building IoT devices.
Check out the full article on Embedded.com.
These articles and documents are a great resource for those interested in learning about the importance of IoT security, how to implement security standards, device onboarding and more. To stay up to date on all technical articles and documents written and supported by OCF experts, we encourage you to visit our Technical Articles page and OCF Security page.