A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Security Bootstrapping of Resource-Constrained Devices Author(s) : Behcet Sarikaya Yoshihiro Ohba Robert Moskowitz Zhen Cao Robert Cragie Filename : draft-sarikaya-core-sbootstrapping-03.txt Pages : 27 Date : 2011-10-31 This document describes how to initially configure the network of resource constrained nodes securely, a.k.a., security bootstrapping. Bootstrapping architecture, communication channel and bootstrap security methods are described. System level objectives for security bootstrapping are stated followed by the protocols that can be used. Requirements on these protocols to be used as security bootstrapping protocols are identified. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-03.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ This Internet-Draft can be retrieved at: ftp://ftp.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-03.txt _______________________________________________ I-D-Announce mailing list I-D-Announce@ietf.org https://www.ietf.org/mailman/listinfo/i-d-announce Internet-Draft directories: http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt