Requirements for CoAP End-To-End Security
draft-hartke-core-e2e-security-reqs-02

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Göran Selander  , Francesca Palombini  , Klaus Hartke 
Last updated 2017-07-17 (latest revision 2017-01-06)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-hartke-core-e2e-security-reqs-02.txt

Abstract

This document analyses threats to CoAP message exchanges traversing proxies and derives the security requirements for mitigating those threats.

Authors

Göran Selander (goran.selander@ericsson.com)
Francesca Palombini (francesca.palombini@ericsson.com)
Klaus Hartke (hartke@tzi.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)