<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-lwig-crypto-sensors" target="https://datatracker.ietf.org/doc/html/draft-ietf-lwig-crypto-sensors-01">
   <front>
      <title>Practical Considerations and Implementation Experiences in Securing Smart Object Networks</title>
      <author initials="M." surname="Sethi" fullname="Mohit Sethi">
         </author>
      <author initials="J." surname="Arkko" fullname="Jari Arkko">
         </author>
      <author initials="A." surname="Keränen" fullname="Ari Keränen">
         </author>
      <author initials="H." surname="Back" fullname="Heidi-Maria Back">
         </author>
      <date month="October" day="31" year="2016" />
      <abstract>
	 <t>   This memo describes challenges associated with securing smart object
   devices in constrained implementations and environments.  The memo
   describes a possible deployment model suitable for these
   environments, discusses the availability of cryptographic libraries
   for small devices, presents some preliminary experiences in
   implementing small devices using those libraries, and discusses
   trade-offs involving different types of approaches.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lwig-crypto-sensors-01" />
   
</reference>
