%% You should probably cite draft-irtf-t2trg-security-setup-iot-devices instead of this I-D. @techreport{sarikaya-core-sbootstrapping-05, number = {draft-sarikaya-core-sbootstrapping-05}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-sarikaya-core-sbootstrapping/05/}, author = {Behcet Sarikaya and Yoshihiro Ohba and Robert Moskowitz and Zhen Cao and Robert Cragie}, title = {{Security Bootstrapping Solution for Resource-Constrained Devices}}, pagetotal = 27, year = 2012, month = jul, day = 10, abstract = {This document describes how to initially configure the network of resource constrained nodes securely, a.k.a., security bootstrapping. Bootstrapping architecture, communication channel and bootstrap security methods are described. System level objectives for security bootstrapping are stated. Bootstrapping solution is based on EAP-TLS authentication with the use of raw public keys as certificates.}, }