@techreport{kang-core-secure-reconfiguration-01, number = {draft-kang-core-secure-reconfiguration-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-kang-core-secure-reconfiguration/01/}, author = {Namhi Kang and Seung-Hun Oh and Shimkwon Yoon}, title = {{Secure initial-key reconfiguration for resource constrained devices}}, pagetotal = 12, year = 2014, month = feb, day = 10, abstract = {This document presents a secure method to configure a key for a resource constrained node when it initially joins to network that is currently in operation. The method is suited for a scenario, where resource constrained nodes are interconnected with each other and thus form a network called Internet of Things. It is assumed that communications for all nodes are based on TCP/IP protocols and the nodes use the constrained application protocol (CoAP). The presented method does not cover all operations of secure bootstrapping for IoT networks, but it is intended to securely support self-reconfiguration of the pre-installed temporary key of joined node.}, }