This is a comparison of all available Internet of Things platforms. The following criteria are used for comparison. For more details on the criteria and their values see below.
- Support of heterogeneous devices
- Type
- Architecture
- Open source
- REST
- Data access control
- Service discovery
- Integrity and Confidentiality
- Consent
- Policy-based access control
- Authentication
- Federated Identity
- Secure Device Identity
- Anonymous Identities
- Attestation
- Summarisation and Filtering
- Context-based security and Reputation
- IoT-specific Protocol Support
This criteria describes if the platform supports different types of devices and possible restrictions upon this support.[@MINERAUD20165]
- Yes
- No
- Embedded devices
- Ethernet enabled
- Home devices
- Needs gateway
- RFID
- Robots
This criteria describes the type of the platform.[@MINERAUD20165]
- Client/Server
- Hub
- M2M
- Mesh
- OS
- P2P
- PaaS
- Robots
- SaaS
- Server
This criteria describes the architecture of the platform.[@MINERAUD20165]
- Cloud-based
- Centralized
- Decentralized
- Distributed
This criteria describes whether a platform is open source or not and under which licence it is available.[@MINERAUD20165]
- Yes
- No
- Affero GNU Public License
- Apache 2.0
- Client open source
- Gateway firmware open source
- LGPLv3
- Libraries only
- M.I.T
This criteria describes if the platform offers a REST API.[@MINERAUD20165]
- Yes
- No
- CoAP
- n.a.
This criteria describes if and how the platform handles data access control.[@MINERAUD20165]
- Yes
- No
- 2 levels
- 3 levels
- 4 levels
- Facebook like privacy settings
- Fine-grained
- Locally stored
- n.a.
- No storage
- OAuth2
- Role-based
- Secured access
- User-based privileges
- User's choice
- XACML
This criteria describes if the platform offers service discovery.[@MINERAUD20165]
- Yes
- No
- Limited
- n.a.
This criteria describes whether the platform has implemented measures to ensure integrity and confidentiality of its data.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses user-directed security controls.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses a policy-based security model.[@Fremantle2017]
- Yes
- No
This criteria describes whether or not the platform has an authentication mechanism.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses federated models of identity for authentication.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses secure device identities.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses anonymous identities.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses attestation to ensure integrity and confidentiality.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses summarisation and filtering to prevent de-anonymisation.[@Fremantle2017]
- Yes
- No
This criteria describes if the platform uses a context and reputation based security system to ensure privacy.[@Fremantle2017]
- Yes
- No
This criteria lists the support protocols with focus on IoT.[@Fremantle2017] It is based on 2, but is extended with a specific list of the protocols
- MQTT
- AMQP
- CoAP
- Others
- No