Terminology and processes for initial security setup of IoT devices
draft-irtf-t2trg-secure-bootstrapping-03
Document | Type |
Replaced Internet-Draft
(t2trg RG)
Expired & archived
|
|
---|---|---|---|
Authors | Mohit Sethi , Behcet Sarikaya , Dan Garcia-Carrillo | ||
Last updated | 2022-11-26 | ||
Replaces | draft-sarikaya-t2trg-sbootstrapping | ||
Replaced by | draft-irtf-t2trg-security-setup-iot-devices | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | IRTF state | Replaced | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-irtf-t2trg-security-setup-iot-devices | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completetion, and the knowledge imparted to the IoT devices after the setup is complete.
Authors
Mohit Sethi
Behcet Sarikaya
Dan Garcia-Carrillo
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)