Cascoda

Cascoda and OCF

Cascoda joined the Open Connectivity Foundation (OCF) in 2019, and we have since pioneered the development of OCF-over-Thread and taken the position of Vice-Chair of the Marketing Communications Work Group. Cascoda is currently involved in drafting new specification features for the use of OCF on bandwidth and resource-constrained devices.

Overview

The Open Connectivity Foundation (OCF) is a standards organization that develops application-layer IoT protocols, based on the Internet Protocol (IP), using strong open standards. IoTivity is the open source reference implementation of the OCF specification. IoTivity provides a framework for device discovery, on-boarding, end-to-end security (and optionally, data models), for device-to-device and device-to-cloud connectivity. OCF is published as a ISO/IEC specification, and there is a comprehensive certification program in place.

Cascoda® & OCF®
Pioneer of OCF-over-Thread & Vice-Chair of the MARCOM Work Group
Supports IPv6

Link layer agnostic
(Thread, Wi-Fi, Ethernet etc.)

PKI Security
Supports Public Key Infrastructure (PKI) security
Device-to-cloud

Device-to-device & device-to-cloud connectivity

Guaranteed interoperability

Platform agnostic
(iOS, Android, Linux, Windows, Embedded etc.)

Open Source

Open source implementation,
IoTivity Lite

OCF Security

OCF, as an IP-based application layer, ensures that the data sent over the internet, whether device to device, or device to cloud, cannot be read or modified by anyone except the desired recipient. This security system is called end-to-end encryption. End-to-end encryption is important, because information exchange over the internet may pass through the networks of intermediary organisations such as telecom and internet providers in multiple jurisdictions worldwide.

OCF achieves end-to-end encryption using a set of policies and procedures known as Public Key Infrastructure (PKI). PKI defines how to employ public and private digital certificates to perform end-to-end encryption. OCF employs a communications protocol known as Datagram Transport Layer Security (DTLS) to exchange PKI public key certificates between the OCF client and OCF server. Both the OCF client and server then use the public key certificates of the respective recipient to securely encrypt the data to be sent, such that the recipient is the only one that can read it.

The OCF specification maps to the IoT baseline security capabilities consensus outlined by the National Institute of Standards and Technology (NIST), as described here.

OCF Clients & Servers

OCF Roles

The OCF Architecture defines two logical roles that a device can take:
OCF Server: Devices that expose hosted resources, is discoverable and responds to client transactions
OCF Client: Devices that interacts with resources on an OCF Server using Create, Retrieve, Update, Delete and Notify (CRUDN) commands
An OCF Device may implement one or both logical roles

Optimized for IoT

RESTful interaction model using CoAP
CoAP used to push events from server to client, to avoid polling
Built-in discovery and subscription mechanisms

Encoding Scheme

Concise Binary Object Representation (CBOR) based on a JSON data model
The simplicity of JSON with the advantage of binary payloads