Protecting EST payloads with OSCORE
draft-selander-ace-coap-est-oscore-02
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Last updated | 2019-09-09 (latest revision 2019-03-08) | ||
Replaces | draft-selander-ace-eals | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-selander-ace-coap-est-oscore-02.txt
Abstract
This document specifies public key certificate enrollment procedures protected with application-layer security protocols suitable for Internet of Things (IoT) deployments. The protocols leverage payload formats defined in Enrolment over Secure Transport (EST) and existing IoT standards including the Constrained Application Protocol (CoAP), Concise Binary Object Representation (CBOR) and the CBOR Object Signing and Encryption (COSE) format.
Authors
Göran Selander
(goran.selander@ericsson.com)
Shahid Raza
(shahid.raza@ri.se)
Martin Furuhed
(martin.furuhed@nexusgroup.com)
Mališa Vučinić
(malisav@ac.me)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)