Skip to main content

TLS/DTLS Optimizations for Internet of Things Deployments

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Thomas Fossati , Hannes Tschofenig , Nikos Mavrogiannopoulos
Last updated 2017-01-09 (Latest revision 2016-07-08)
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


Internet protocols work well in a variety of environments, including Internet of Things (IoT) deployments. While there are some optimization possibilities to reduce code size, bandwidth utilization, and to improve battery lifetime, in general most Internet protocols are also applicable to constrained environments. TLS and DTLS are two such security protocols that can be used by many IoT devices since DTLS/TLS provide lot of flexiblity in terms credential choice, ciphersuite usage, etc. The DICE working group has developed a specification that profiles the use of TLS and DTLS for IoT environments, without changing the TLS/DTLS specifications. This memo goes a step further and proposes changes to the DTLS/TLS protocol to introduce further optimizations. Since the ongoing work on TLS/DTLS 1.3 already offers several improvements (compared to previous versions) this document focuses on the use of version 1.3 and suggests further optimizations.


Thomas Fossati
Hannes Tschofenig
Nikos Mavrogiannopoulos

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)