Practical Considerations and Implementation Experiences in Securing Smart Object Networks
draft-aks-lwig-crypto-sensors-00

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Last updated 2016-04-09 (latest revision 2015-10-07)
Replaces draft-aks-crypto-sensors
Replaced by draft-ietf-lwig-crypto-sensors
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-aks-lwig-crypto-sensors-00.txt

Abstract

This memo describes challenges associated with securing smart object devices in constrained implementations and environments. The memo describes a possible deployment model suitable for these environments, discusses the availability of cryptographic libraries for small devices, presents some preliminary experiences in implementing small devices using those libraries, and discusses trade-offs involving different types of approaches.

Authors

Mohit Sethi (mohit.m.sethi@ericsson.com)
Jari Arkko (jari.arkko@piuha.net)
Ari Keränen (ari.keranen@ericsson.com)
Heidi-Maria Back (heidi-maria.back@ericsson.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)