
Abstract
The present document provides options and analyses for the security features and mechanisms providing end-to-end security and group authentication for oneM2M.
The scope of this technical report includes use cases, threat analyses, high level architecture, generic requirements, available options, evaluation of options, and detailed procedures for executing end-to-end security and group authentication.
General Information
Publication date: 01 September 2016
Working groups: https://www.etsi.org/committee/1419-onem2m
ICT rolling plan topic: IoT
SDO: ETSI