Skip to main content

Design Considerations for Security Protocols in Constrained Environments
draft-seitz-ace-design-considerations-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Ludwig Seitz , Göran Selander
Last updated 2014-08-18 (Latest revision 2014-02-14)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Considerable effort has been spent on securing existing Internet standard authentication and authorization protocols such as TLS, Kerberos, and OAuth, among others. It would save a lot of effort if these protocols could be profiled to be feasible for constrained environments, with some easily obtainable security considerations. However, these protocols were typically not designed with constrained environments in mind, so profiling of an existing protocol may result in a far from optimal solution. Moreover they are not necessarily complying with their original design objectives outside their intended domain of application. This document examines the impact of typical characteristics of security protocols (e.g. cryptographic calculations, number and size of protocol messages) in a constrained environment. The goal is to provide decision support when different resource usage optimizations are possible in the adaptation of a security protocol for this setting.

Authors

Ludwig Seitz
Göran Selander

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)