Bootstrapping CoAP Applications for Resource-Constrained Devices using EAP
draft-ohba-core-eap-based-bootstrapping-00

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Subir Das  , Yoshihiro Ohba 
Last updated 2011-07-01
Stream (None)
Formats
Expired & archived
plain text pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ohba-core-eap-based-bootstrapping-00.txt

Abstract

This document describes a mechanism to use EAP (Extensible Authentication Protocol) for bootstrapping DTLS-PSK (Pre-Shared Key) ciphersuites and PSK mode of IKEv2 that are used for establishing a secure communication channel between a CoAP (Constrained Application) client and a CoAP server to protect CoAP messaging.

Authors

Subir Das (subir@research.telcordia.com)
Yoshihiro Ohba (yoshihiro.ohba@toshiba.co.jp)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)