%% You should probably cite draft-kang-core-secure-reconfiguration-01 instead of this revision. @techreport{kang-core-secure-reconfiguration-00, number = {draft-kang-core-secure-reconfiguration-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-kang-core-secure-reconfiguration/00/}, author = {Namhi Kang}, title = {{Secure initial-key reconfiguration for resource constrained devices}}, pagetotal = 11, year = 2013, month = oct, day = 15, abstract = {This document presents a secure method to configure a key for a node when it initially joins to network that is currently in operation. The method is suited for a scenario, where resource constrained objects are interconnected with each other and thus form a network called Internet of Things. It is assumed that communications for all nodes are based on TCP/IP protocols and some of the nodes use the constrained application protocol (CoAP). The method does not cover all operations of secure bootstrapping, but it is intended to securely support self-reconfiguration of the pre-installed temporary key of new node.}, }