RFC 8387

Practical Considerations and Implementation Experiences in Securing Smart Object Networks, May 2018

Canonical URL:
https://www.rfc-editor.org/rfc/rfc8387.txt
File formats:
Plain TextPDF
Status:
INFORMATIONAL
Authors:
M. Sethi
J. Arkko
A. Keranen
H. Back
Stream:
IETF
Source:
lwig (int)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC8387

Discuss this RFC: Send questions or comments to lwip@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

This memo describes challenges associated with securing resource- constrained smart object devices. The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices. Lastly, the memo discusses trade-offs involving different types of security approaches.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Download PDF Reader