RFC 8387
Practical Considerations and Implementation Experiences in Securing Smart Object Networks, May 2018
- File formats:
- Status:
- INFORMATIONAL
- Authors:
- M. Sethi
J. Arkko
A. Keranen
H. Back - Stream:
- IETF
- Source:
- lwig (int)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC8387
Discuss this RFC: Send questions or comments to the mailing list lwip@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 8387
Abstract
This memo describes challenges associated with securing resource- constrained smart object devices. The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices. Lastly, the memo discusses trade-offs involving different types of security approaches.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.