Bootstrapping CoAP Applications for Resource-Constrained Devices using EAP

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Subir Das  , Yoshihiro Ohba 
Last updated 2011-07-01
Stream (None)
Expired & archived
plain text pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document describes a mechanism to use EAP (Extensible Authentication Protocol) for bootstrapping DTLS-PSK (Pre-Shared Key) ciphersuites and PSK mode of IKEv2 that are used for establishing a secure communication channel between a CoAP (Constrained Application) client and a CoAP server to protect CoAP messaging.


Subir Das (
Yoshihiro Ohba (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)