I-D Action: draft-sarikaya-core-sbootstrapping-03.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A New Internet-Draft is available from the on-line Internet-Drafts directories.

	Title           : Security Bootstrapping of Resource-Constrained Devices
	Author(s)       : Behcet Sarikaya
                          Yoshihiro Ohba
                          Robert Moskowitz
                          Zhen Cao
                          Robert Cragie
	Filename        : draft-sarikaya-core-sbootstrapping-03.txt
	Pages           : 27
	Date            : 2011-10-31

   This document describes how to initially configure the network of
   resource constrained nodes securely, a.k.a., security bootstrapping.
   Bootstrapping architecture, communication channel and bootstrap
   security methods are described.  System level objectives for security
   bootstrapping are stated followed by the protocols that can be used.
   Requirements on these protocols to be used as security bootstrapping
   protocols are identified.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-03.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-03.txt
_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux