%% You should probably cite rfc8576 instead of this I-D. @techreport{irtf-t2trg-iot-seccons-03, number = {draft-irtf-t2trg-iot-seccons-03}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-seccons/03/}, author = {Oscar Garcia-Morchon and Sandeep Kumar and Mohit Sethi}, title = {{State of the Art and Challenges for the Internet of Things}}, pagetotal = 46, year = , month = , day = , abstract = {The Internet of Things (IoT) concept refers to the usage of standard Internet protocols to allow for human-to-thing and thing-to-thing communication. The security needs are well-recognized and and many standardization steps for providing security have been taken, for example, the specification of Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS). However, security challenges still exist and there are some use cases that lack a suitable solution. In this document, we first discuss the various stages in the lifecycle of a thing. We then look at the security building blocks available for securing the different layers of the Internet protocol suite. Next, we document the various security threats to a thing and the challenges that one might face in order to protect against these threats. Lastly, we discuss the next steps needed to ensure roll out of secure Internet of Things services. This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).}, }