Object Security of CoAP (OSCOAP)
draft-selander-ace-object-security-06

Document Type Replaced Internet-Draft (individual)
Last updated 2016-10-11
Replaced by draft-ietf-core-object-security
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-core-object-security
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-selander-ace-object-security-06.txt

Abstract

This memo defines Object Security of CoAP (OSCOAP), a method for application layer protection of message exchanges with the Constrained Application Protocol (CoAP), using the CBOR Object Signing and Encryption (COSE) format. OSCOAP provides end-to-end encryption, integrity and replay protection to CoAP payload, options, and header fields, as well as a secure binding between CoAP request and response messages. The use of OSCOAP is signaled with the CoAP option Object-Security, also defined in this memo.

Authors

G├Âran Selander (goran.selander@ericsson.com)
John Mattsson (john.mattsson@ericsson.com)
Francesca Palombini (francesca.palombini@ericsson.com)
Ludwig Seitz (ludwig@sics.se)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)