This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
This document describes how to initially configure the network of
resource constrained nodes securely, a.k.a., security bootstrapping.
Bootstrapping architecture, communication channel and bootstrap
security methods are described. System level objectives for security
bootstrapping are stated. Bootstrapping solution is based on EAP-TLS
authentication with the use of raw public keys as certificates.
Behcet Sarikaya <email@example.com>
Yoshihiro Ohba <firstname.lastname@example.org>
Robert Moskowitz <email@example.com>
Zhen Cao <firstname.lastname@example.org>
Robert Cragie <email@example.com>
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)