%% You should probably cite draft-ietf-iotops-security-summary instead of this I-D. @techreport{moran-iot-nets-02, number = {draft-moran-iot-nets-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-moran-iot-nets/02/}, author = {Brendan Moran}, title = {{A summary of security-enabling technologies for IoT devices}}, pagetotal = 17, year = 2022, month = oct, day = 21, abstract = {The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.}, }