A summary of security-enabling technologies for IoT devices
draft-moran-iot-nets-03
Document | Type |
Replaced Internet-Draft
(iotops WG)
Expired & archived
|
|
---|---|---|---|
Author | Brendan Moran | ||
Last updated | 2023-04-24 | ||
Replaced by | draft-ietf-iotops-security-summary | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Informational | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Candidate for WG Adoption | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-iotops-security-summary | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)