Requirements for CoAP End-To-End Security

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Göran Selander  , Francesca Palombini  , Klaus Hartke 
Last updated 2017-07-17 (latest revision 2017-01-06)
Stream (None)
Expired & archived
pdf htmlized bibtex
Additional Resources
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document analyses threats to CoAP message exchanges traversing proxies and derives the security requirements for mitigating those threats.


Göran Selander (
Francesca Palombini (
Klaus Hartke (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)