Skip to main content

Two-way Authentication for IoT

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Corinna Schmitt , Burkhard Stiller , Martin Noack
Last updated 2016-01-01 (Latest revision 2015-06-30)
Replaces draft-schmitt-two-way-authentication-for-iot
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


In this draft a full two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards and protocols is introduced. The solution is twofold providing a two-way authentication for resource-rich hardware (e.g., class 2 devices with ~50 KiB RAM and ~250 KiB ROM [RFC7228]) and for devices with less resources (e.g., class 1 devices with ~10 KiB RAM and ~100 KiB ROM [RFC7228]). By relying on an established standard, existing implementations, engineering techniques, and security infrastructure can be reused, which enables an easy security uptake. The proposed security scheme for resource-rich devices is, therefore, based on RSA, the most widely used public key cryptography algorithm. It is designed to work over standard communication stacks that offer UDP/ IPv6 networking for Low power Wireless Personal Area Networks (6LoWPANs). RSA is a bulky solution at the moment but shows that it is possible using it on constraint devices for security purposes. An optimization is the usage of elliptic curve cryptography (ECC) as assumed for devices with less resources.


Corinna Schmitt
Burkhard Stiller
Martin Noack

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)