Skip to main content

Practical Considerations and Implementation Experiences in Securing Smart Object Networks

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Expired & archived
Authors Mohit Sethi , Jari Arkko , Ari Keränen , Heidi-Maria Back
Last updated 2016-04-09 (Latest revision 2015-10-07)
Replaces draft-aks-crypto-sensors
Replaced by draft-ietf-lwig-crypto-sensors
RFC stream (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This memo describes challenges associated with securing smart object devices in constrained implementations and environments. The memo describes a possible deployment model suitable for these environments, discusses the availability of cryptographic libraries for small devices, presents some preliminary experiences in implementing small devices using those libraries, and discusses trade-offs involving different types of approaches.


Mohit Sethi
Jari Arkko
Ari Keränen
Heidi-Maria Back

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)