The present document provides options and analyses for the security features and mechanisms providing end-to-end security and group authentication for oneM2M. The scope of this technical report includes use cases@ threat analyses@ high level architecture@ generic requirements@ available options@ evaluation of options@ and detailed procedures for executing end-to-end security and group authentication.