I-D Action: draft-kang-ace-secure-configuration-00.txt

internet-drafts@ietf.org Thu, 23 October 2014 07:43 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietfa.amsl.com
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E0C01A88FE for <i-d-announce@ietfa.amsl.com>; Thu, 23 Oct 2014 00:43:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MrvHHhkIe2vs for <i-d-announce@ietfa.amsl.com>; Thu, 23 Oct 2014 00:43:10 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DF5A61A88EE for <i-d-announce@ietf.org>; Thu, 23 Oct 2014 00:43:10 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-kang-ace-secure-configuration-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 5.6.4.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141023074310.21688.26314.idtracker@ietfa.amsl.com>
Date: Thu, 23 Oct 2014 00:43:10 -0700
Archived-At: http://mailarchive.ietf.org/arch/msg/i-d-announce/83VrswPPXhyFvm-Ds3Gw_yCAm90
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Oct 2014 07:43:12 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Security Key configuration for resource constrained devices
        Authors         : Namhi Kang
                          Jaeduck Choi
                          Seungwook Jung
                          Souhwan Jung
                          Younghan Kim
	Filename        : draft-kang-ace-secure-configuration-00.txt
	Pages           : 13
	Date            : 2014-10-23

Abstract:
   This document presents a secure method to configure/reconfigure a key
   for a resource constrained node when it initially joins to network
   that is currently in operation. The method is suited for a scenario,
   where resource constrained nodes are interconnected with each other
   and thus form a network called Internet of Things. It is assumed that
   communications for all nodes are based on TCP/IP protocols and the
   nodes use the constrained application protocol (CoAP). The presented
   method does not cover all operations of secure bootstrapping for IoT
   networks, but it is intended to securely support self-reconfiguration
   of the pre-installed temporary key of joined node.




The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-kang-ace-secure-configuration/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-kang-ace-secure-configuration-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/