Hi, I am trying to gather some information on the security features in iotivity. I know DTLS is used, but is there anything like authorization from devices when they are discovered? Is any client capable of discovering whatever device running the stack? Is there a document that explain iotivity security with some good details?
Also, this Internet Draft https://tools.ietf.org/html/draft-ietf-core-object-security-01 just came out and it proposes using CBOR for application layer security. I know CBOR is used in the iotivity stack, so is this ID along the same line of thought in iotivity or is the model different? Best regards, Khaled -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20161220/58f2a48b/attachment.html>