@techreport{sethi-gba-constrained-01, number = {draft-sethi-gba-constrained-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-sethi-gba-constrained/01/}, author = {Mohit Sethi and Vesa Lehtovirta and Patrik Salmela}, title = {{Using Generic Bootstrapping Architecture with Constrained Devices}}, pagetotal = 18, year = 2014, month = feb, day = 13, abstract = {This document discusses the use of the 3GPP Generic Bootstrapping Architecture (GBA) for authenticating and securing constrained devices. While GBA re-uses the 3GPP credentials, it does not require mobile network access, such as LTE, but requires only IP connectivity. Though building devices that employ GBA is obviously well known, this document specifically focuses on techniques necessary to minimize memory and energy consumption which is essential for constrained device networks.}, }