[Iotops] I-D Action: draft-ietf-iotops-security-summary-01.txt
internet-drafts@ietf.org Mon, 23 October 2023 19:07 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: iotops@ietf.org
Delivered-To: iotops@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C0249C16F3F3; Mon, 23 Oct 2023 12:07:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: iotops@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.13.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: iotops@ietf.org
Message-ID: <169808802377.55895.1785074101288701572@ietfa.amsl.com>
Date: Mon, 23 Oct 2023 12:07:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/ARe5V1dHFM2QvlfoymXdkP3_Yjo>
Subject: [Iotops] I-D Action: draft-ietf-iotops-security-summary-01.txt
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.39
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Oct 2023 19:07:03 -0000
Internet-Draft draft-ietf-iotops-security-summary-01.txt is now available. It is a work item of the IOT Operations (IOTOPS) WG of the IETF. Title: A summary of security-enabling technologies for IoT devices Author: Brendan Moran Name: draft-ietf-iotops-security-summary-01.txt Pages: 27 Dates: 2023-10-23 Abstract: The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies. The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-iotops-security-summary/ There is also an HTMLized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-iotops-security-summary-01 A diff from the previous version is available at: https://author-tools.ietf.org/iddiff?url2=draft-ietf-iotops-security-summary-01 Internet-Drafts are also available by rsync at: rsync.ietf.org::internet-drafts
- [Iotops] I-D Action: draft-ietf-iotops-security-s… internet-drafts