Hi,

I am trying to gather some information on the security features in
iotivity. I know DTLS is used, but is there anything like authorization
from devices when they are discovered? Is any client capable of discovering
whatever device running the stack? Is there a document that explain
iotivity security with some good details?

Also, this Internet Draft
https://tools.ietf.org/html/draft-ietf-core-object-security-01 just came
out and it proposes using CBOR for application layer security. I know CBOR
is used in the iotivity stack, so is this ID along the same line of thought
in iotivity or is the model different?

Best regards,

Khaled
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20161220/58f2a48b/attachment.html>

Reply via email to