http://www.rfc-editor.org/rfc/rfc7744.txt
RFC 7744: Use Cases for Authentication and Authorization in Constrained Environments, L. Seitz, S. Gerdes, G. Selander, M. Mani, S. Kumar2016-01-01T23:00:00-00:00Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as a communication protocol. However, most conclusions apply generally.