I-D Action: draft-sarikaya-core-sbootstrapping-05.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title           : Security Bootstrapping Solution for Resource-Constrained Devices
	Author(s)       : Behcet Sarikaya
                          Yoshihiro Ohba
                          Robert Moskowitz
                          Zhen Cao
                          Robert Cragie
	Filename        : draft-sarikaya-core-sbootstrapping-05.txt
	Pages           : 27
	Date            : 2012-07-10

Abstract:
   This document describes how to initially configure the network of
   resource constrained nodes securely, a.k.a., security bootstrapping.
   Bootstrapping architecture, communication channel and bootstrap
   security methods are described.  System level objectives for security
   bootstrapping are stated.  Bootstrapping solution is based on EAP-TLS
   authentication with the use of raw public keys as certificates.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-sarikaya-core-sbootstrapping

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-sarikaya-core-sbootstrapping-05

A diff from previous version is available at:
http://tools.ietf.org/rfcdiff?url2=draft-sarikaya-core-sbootstrapping-05


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux