Skip to main content

Bootstrapping CoAP Applications for Resource-Constrained Devices using EAP
draft-ohba-core-eap-based-bootstrapping-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
Authors Subir Das , Yoshihiro Ohba
Last updated 2011-07-01
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes a mechanism to use EAP (Extensible Authentication Protocol) for bootstrapping DTLS-PSK (Pre-Shared Key) ciphersuites and PSK mode of IKEv2 that are used for establishing a secure communication channel between a CoAP (Constrained Application) client and a CoAP server to protect CoAP messaging.

Authors

Subir Das
Yoshihiro Ohba

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)