RFC 8387

Practical Considerations and Implementation Experiences in Securing Smart Object Networks, May 2018

File formats:
icon for text file icon for PDF icon for HTML
Status:
INFORMATIONAL
Authors:
M. Sethi
J. Arkko
A. Keranen
H. Back
Stream:
IETF
Source:
lwig (int)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC8387

Discuss this RFC: Send questions or comments to the mailing list lwip@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 8387


Abstract

This memo describes challenges associated with securing resource- constrained smart object devices. The memo describes a possible deployment model where resource-constrained devices sign message objects, discusses the availability of cryptographic libraries for resource-constrained devices, and presents some preliminary experiences with those libraries for message signing on resource- constrained devices. Lastly, the memo discusses trade-offs involving different types of security approaches.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search