Thing-to-Thing (t2trg)
| Document | Date | Status | IPR | AD/Shepherd | |
|---|---|---|---|---|---|
| Active Internet-Drafts (3 hits) | |||||
|
32 pages
draft-irtf-t2trg-iot-edge-04
IoT Edge Challenges and Functions |
2022-01-11 |
I-D Exists
IRTF stream |
|
||
|
35 pages
draft-irtf-t2trg-rest-iot-09
Guidance on RESTful Design for Internet of Things Systems |
2022-02-26 |
I-D Exists
Active RG Document : Informational |
|
||
|
21 pages
draft-irtf-t2trg-secure-bootstrapping-02
Terminology and processes for initial security setup of IoT devices |
2022-04-25 |
I-D Exists
IRTF stream |
|
||
| RFC (1 hit) | |||||
|
50 pages
RFC 8576
(was draft-irtf-t2trg-iot-seccons)
Internet of Things (IoT) Security: State of the Art and Challenges |
2019-04 | Informational RFC |
Jim Schaad |
||
| Related Internet-Drafts (5 hits) | |||||
|
10 pages
draft-bormann-t2trg-interconnect-declared-01
Interconnecting Limited Domains Based on Declared Communication Requirements |
2022-01-11 | I-D Exists |
|
||
|
18 pages
draft-bormann-t2trg-sworn-05
SWORN: Secure Wake on Radio Nudging |
2022-02-06 | I-D Exists |
|
||
|
7 pages
draft-dwon-t2trg-multiedge-arch-01
Multi-cluster Edge System Architecture and Network Function Requirements |
2021-11-19
Expires soon |
I-D Exists |
|
||
|
14 pages
draft-mattsson-t2trg-amplification-attacks-00
Amplification Attacks Using the Constrained Application Protocol (CoAP) |
2022-02-11 | I-D Exists |
|
||
|
25 pages
draft-richardson-t2trg-idevid-considerations-06
A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors |
2022-02-03 | I-D Exists |
|
||