I-D Action: draft-sarikaya-core-sbootstrapping-04.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A New Internet-Draft is available from the on-line Internet-Drafts directories.

	Title           : Security Bootstrapping Solution for Resource-Constrained Devices
	Author(s)       : Behcet Sarikaya
                          Yoshihiro Ohba
                          Robert Moskowitz
                          Zhen Cao
                          Robert Cragie
	Filename        : draft-sarikaya-core-sbootstrapping-04.txt
	Pages           : 27
	Date            : 2012-04-24

   This document describes how to initially configure the network of
   resource constrained nodes securely, a.k.a., security bootstrapping.
   Bootstrapping architecture, communication channel and bootstrap
   security methods are described.  System level objectives for security
   bootstrapping are stated followed by the protocols that can be used.
   Bootstrapping solution is based on EAP-TLS authentication with the
   use of raw public keys used as certificates.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-sarikaya-core-sbootstrapping-04.txt

The IETF datatracker page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-sarikaya-core-sbootstrapping/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux