%% You should probably cite draft-schmitt-ace-twowayauth-for-iot-02 instead of this revision. @techreport{schmitt-ace-twowayauth-for-iot-00, number = {draft-schmitt-ace-twowayauth-for-iot-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-schmitt-ace-twowayauth-for-iot/00/}, author = {Corinna Schmitt and Burkhard Stiller}, title = {{Two-way Authentication for IoT}}, pagetotal = 19, year = 2014, month = jun, day = 25, abstract = {In this draft the first key idea for a full two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards is introduced. The solution is twofold providing a two-way authentication for resource-rich hardware (e.g., class 2 devices with \textasciitilde{}50 KiB RAM and \textasciitilde{}250 KiB ROM {[}14{]}) and for devices with less resources (e.g., class 1 devices with \textasciitilde{}10 KiB RAM and \textasciitilde{}100 KiB ROM {[}14{]}). By relying on an established standard, existing implementations, engineering techniques, and security infrastructure can be reused, which enables an easy security uptake. The proposed security scheme for resource-rich devices is, therefore, based on RSA, the most widely used public key cryptography algorithm. It is designed to work over standard communication stacks that offer UDP/ IPv6 networking for Low power Wireless Personal Area Networks (6LoWPANs). RSA is a bulky solution at the moment but shows that it is possible using it on constraint devices for security purposes. An optimization is the usage of elliptic curve cryptography (ECC) as assumed for devices with less resources.}, }