Secure IoT Bootstrapping: A Survey
draft-sarikaya-t2trg-sbootstrapping-08
Document | Type |
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Expired & archived
|
|
---|---|---|---|
Authors | Mohit Sethi , Behcet Sarikaya , Dan Garcia-Carillo | ||
Last updated | 2020-09-10 (Latest revision 2020-03-09) | ||
Replaced by | draft-irtf-t2trg-security-setup-iot-devices, draft-irtf-t2trg-secure-bootstrapping | ||
RFC stream | (None) | ||
Formats | |||
Additional resources | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This draft provides an overview of the various terms that are used when discussing bootstrapping of devices. We document terms that have been used within the IETF as well as other standards bodies. We investigate if the terms refer to the same phenomena or have subtle differences. We provide recommendations on the applicability of terms in different contexts. Finally, this document presents a survey of secure bootstrapping mechanisms available for smart objects that are part of an Internet of Things (IoT) network. The survey does not prescribe any one mechanism and rather presents IoT developers with different options to choose from, depending on their use-case, security requirements, and the user interface available on their smart objects.
Authors
Mohit Sethi
Behcet Sarikaya
Dan Garcia-Carillo
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)