%% You should probably cite rfc8576 instead of this I-D. @techreport{irtf-t2trg-iot-seccons-07, number = {draft-irtf-t2trg-iot-seccons-07}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-seccons/07/}, author = {Oscar Garcia-Morchon and Sandeep Kumar and Mohit Sethi}, title = {{State-of-the-Art and Challenges for the Internet of Things Security}}, pagetotal = 47, year = 2017, month = sep, day = 22, abstract = {The Internet of Things (IoT) concept refers to the usage of standard Internet protocols to allow for human-to-thing and thing-to-thing communication. The security needs for the IoT are well-recognized and many standardization steps for providing security have been taken, for example, the specification of Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS). However, security challenges still exist and there are some use cases that lack a suitable solution. In this document, we first discuss the various stages in the lifecycle of a thing. Next, we document the various security threats to a thing and the challenges that one might face to protect against these threats. Lastly, we discuss the next steps needed to facilitate the deployment of secure IoT systems. This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).}, }