The given uses are supported by the OMA-DM specification. However, a device may
implement all of them or chose specific ones. OMA-DM is mainly designed by keeping small
footprint devices in mind. In such devices, storage and memory space might be limited.
Plus, they may also have bandwidth constraints for communication. If we speak in techni-
cal terms, then OMA-DM protocol mainly utilizes XML for the exchange of data. It is most
specifically defined by SyncML. The task of device management is conducted by establishing
communication between a server and the client. OMA-DM can support various data trans-
ports such as:
Physically over a wired connection (ex: USB, RS-232) or wireless connection (CDMA,
GSM, Bluetooth, or IrDA)
Transport layers applied over any kind of WAP (WSP), HTTP, or OBEX.
Semantic Protocols
JSON-LD stands as JavaScript Object Notation-Linked Data. It works as a lightweight Linked
Data format that makes it easier for humans to read and write structured data. It is known
as a model data format for programming environments. JSON-LD is available for JavaScript,
Python, PHP, Ruby, Java, C#, Go, and Erlang/Elixr. Its main aim is to help information networks
to acquire links data. This allows the data to be organized in the traditional JSON concept.
The most important role of JSON-LD is to allow network information set to navigate out-
side the pair system that used to be conventional before linked data played the role. JSON-LD is
enabling these data networks to gather extra link data from the hyperlinks. JSON-LD improves
what users are capable of doing in the data collection process. It doesn’t enforce a lot of propri-
etary syntaxes or the developers into a specific format.
Search engine pioneer Google has said JSON-LD as a preferred method of adding struc-
tured data to webpages in order to style them much easier to parse for more precise search
engine results. It eectively provides many benefits of JSON, this includes the lightweight data
interchange format and linked data world. Linked data is a technological reach that supports
the World Wide Web.
Security Protocols
Today, we are witnessing exponential growth in Internet users. Everyone wants to be connected
to the Internet. However, this has also created the rise of cybercrimes. The big organizations are
in the dire need for secure communications. To resolve this issue, we need strong cryptographic
verification to connect computers.
X.509 is the answer to this problem. It is a digital certificate that is internationally
uses public key infrastructure for verifying whether the public key belongs to the user or
A public key is a value given by some chosen authorities as an encryption that can be com-
bined with a private key resultant from the public key. It could be used to eciently encrypt
digital signatures and messages.
Public Key Infrastructure (PKI) is a combination of software, hardware, policies, people,
and procedures that are needed to build, distribute, manage, store, use, and revoke digital
Chapter 5 IoT Core Modules 119
Internet_of_Things_CH05_pp105-140.indd 119 9/3/2019 10:13:55 AM

Get Internet of Things now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.