[Iotops] I-D Action: draft-moran-iot-nets-03.txt

internet-drafts@ietf.org Mon, 24 April 2023 10:29 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: iotops@ietf.org
Delivered-To: iotops@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DA3B2C151B33; Mon, 24 Apr 2023 03:29:29 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: iotops@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 10.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: iotops@ietf.org
Message-ID: <168233216987.33478.4416379766001769037@ietfa.amsl.com>
Date: Mon, 24 Apr 2023 03:29:29 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/4yYfsfuTHBaay83FRXVSDI8B6PI>
Subject: [Iotops] I-D Action: draft-moran-iot-nets-03.txt
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.39
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Apr 2023 10:29:29 -0000

A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the IOT Operations (IOTOPS)
WG of the IETF.

   Title           : A summary of security-enabling technologies for IoT devices
   Author          : Brendan Moran
   Filename        : draft-moran-iot-nets-03.txt
   Pages           : 19
   Date            : 2023-04-24

   The IETF has developed security technologies that help to secure the
   Internet of Things even over constrained networks and when targetting
   constrained nodes.  These technologies can be used independenly or
   can be composed into larger systems to mitigate a variety of threats.
   This documents illustrates an overview over these technologies and
   highlights their relationships.  Ultimately, a threat model is
   presented as a basis to derive requirements that interconnect
   existing and emerging solution technologies.

The IETF datatracker status page for this Internet-Draft is:

There is also an htmlized version available at:

A diff from the previous version is available at:

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts