J. Latvakoski, A. Iivari, P. Vitic, B. Jubeh, M. B. Alaya, T. Monteil, Y. Lopez, G. Talavera, J. Gonzalez, N. Granqvist, M. Kellil, H. Ganem, and T. Väisänen, “A survey on M2M service networks,” Computers, vol. 3, no. 4, pp. 130-173, 2014. [OpenAIRE]
 H. Lasi, P. Fettke, H.-G. Kemper, T. Feld, and M. Hoffmann, “Industry 4.0,” Business & Information Systems Engineering, vol. 6, no. 4, pp. 239-242, Aug 2014.
 Y. Liu, K.-F. Tong, X. Qiu, Y. Liu, and X. Ding, “Wireless mesh networks in IoT networks,” in 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE, 2017, pp. 183-185.
 K. Mekki, E. Bajic, F. Chaxel, and F. Meyer, “A comparative study of LPWAN technologies for large-scale IoT deployment,” ICT Express, vol. 5, no. 1, pp. 1-7, mar 2019.
 C. Gomez and J. Paradells, “Wireless home automation networks: A survey of architectures and technologies,” IEEE Communications Magazine, vol. 48, no. 6, 2010.
 ZigBee, “ZigBee: Securing the IoT,” ZigBee Alliance, Tech. Rep., 2017.
 Thread, “Thread technical overview,” Thread, Tech. Rep., 2015.
 ABR, “Introduction to the Z-Wave security ecosystem,” Sigma Design, Tech. Rep., 2016.
 K. E. Nolan, W. Guibene, and M. Y. Kelly, “An evaluation of low power wide area network technologies for the internet of things,” in 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, sep 2016.
 M. Elkhodr, S. Shahrestani, and H. Cheung, “The internet of things: New interoperability, management and security challenges,” International Journal of Network Security & Its Applications, vol. 8, no. 2, pp. 85- 102, mar 2016.
International audience; Industry includes more and more IoT components to have a better control on production and logistic processes. Unfortunately, growing network openness in a formerly isolated world induces major security risks which are especially critical in an industrial context. These risks are exacerbated by the highly fragmented nature of the industrial IoT market which imposes interoperability management and challenges security. We propose an approach to enable end-to-end data security within a heterogeneous IoT deployment. Interoperability is ensured by a central network powered by oneM2M interacting with various tier protocols. In this paper, we focus on secure communication with ZigBee and discuss how it can be transposed to other protocols, namely Z-Wave and Thread.