%% You should probably cite draft-chen-rats-tee-identification-03 instead of this revision. @techreport{chen-rats-tee-identification-01, number = {draft-chen-rats-tee-identification-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-chen-rats-tee-identification/01/}, author = {Penglin Yang and Meiling Chen and Li Su}, title = {{Use TEE Identification in EAP-TLS}}, pagetotal = 10, year = ** No value found for 'doc.pub_date.year' **, month = ** No value found for 'doc.pub_date' **, day = ** No value found for 'doc.pub_date.day' **, abstract = {In security considerations, identity of a device should be protected and cannot be exposed in public in plaintext. The storage and execution of identity in device also need to be protected during the lifecycle. Based on this purpose, this document specifies the architecture of TEE identification based on EAP-TLS. In this architecture, certificate protection and handshake keys generation which are used for EAP-TLS authentication will be executed in TEE. Communication establishment with EAP-TLS Server will be executed in REE. A middle layer is introduced to communicate between TEE and REE to compose the original function of EAP-TLS Client. TEE identification based on EAP-TLS could be used in different network layers to implement identity authentication.}, }