Cascoda pioneered the development of OCF-over-Thread in conjunction with other key OCF members and the Thread Group.
OCF and Thread are open standards based on the universally-supported Internet Protocol (IP). As such, both standards are dedicated to interoparability, both are built for IoT, both support native IPv6 communications and both use Datagram Transport Layer Security (DTLS) security features as standard.


The Open Connectivity Foundation (OCF) is a standards organization that develops application-layer IoT protocols, based on the Internet Protocol (IP), using strong open standards. IoTivity is the open source reference implementation of the OCF specification. IoTivity provides a framework for device discovery, on-boarding, end-to-end security (and optionally, data models), for device-to-device and device-to-cloud connectivity. OCF is published as a ISO/IEC specification, and there is a comprehensive certification program in place.

Cascoda® & OCF®
Pioneer of OCF-over-Thread & Vice-Chair of the MARCOM Work Group
Both IoT

Open source implementation,
IoTivity Lite

Supports IPv6

Link layer agnostic
(Thread, Wi-Fi, Ethernet etc.)

Highly Secure
Supports Public Key Infrastructure (PKI) security
Dedicated to Interoperability

Device-to-device & device-to-cloud connectivity

Open Standards

Platform agnostic
(iOS, Android, Linux, Windows, Embedded etc.)< p>

OCF Security

OCF, as an IP-based application layer, ensures that the data sent over the internet, whether device to device, or device to cloud, cannot be read or modified by anyone except the desired recipient. This security system is called end-to-end encryption. End-to-end encryption is important, because information exchange over the internet may pass through the networks of intermediary organisations such as telecom and internet providers in multiple jurisdictions worldwide.

OCF achieves end-to-end encryption using a set of policies and procedures known as Public Key Infrastructure (PKI). PKI defines how to employ public and private digital certificates to perform end-to-end encryption. OCF employs a communications protocol known as Datagram Transport Layer Security (DTLS) to exchange PKI public key certificates between the OCF client and OCF server. Both the OCF client and server then use the public key certificates of the respective recipient to securely encrypt the data to be sent, such that the recipient is the only one that can read it.

The OCF specification maps to the IoT baseline security capabilities consensus outlined by the National Institute of Standards and Technology (NIST), as described here.

OCF Clients & Servers

OCF Roles

The OCF Architecture defines two logical roles that a device can take:
OCF Server: Devices that expose hosted resources, is discoverable and responds to client transactions
OCF Client: Devices that interacts with resources on an OCF Server using Create, Retrieve, Update, Delete and Notify (CRUDN) commands
An OCF Device may implement one or both logical roles

Optimized for IoT

RESTful interaction model using CoAP
CoAP used to push events from server to client, to avoid polling
Built-in discovery and subscription mechanisms

Encoding Scheme

Concise Binary Object Representation (CBOR) based on a JSON data model
The simplicity of JSON with the advantage of binary payloads