Thing-to-Thing (t2trg) Internet Drafts


      
 Guidance on RESTful Design for Internet of Things Systems
 
 draft-irtf-t2trg-rest-iot-13.txt
 Date: 25/01/2024
 Authors: Ari Keranen, Matthias Kovatsch, Klaus Hartke
 Working Group: Thing-to-Thing (t2trg)
This document gives guidance for designing Internet of Things (IoT) systems that follow the principles of the Representational State Transfer (REST) architectural style. This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).
 Amplification Attacks Using the Constrained Application Protocol (CoAP)
 
 draft-irtf-t2trg-amplification-attacks-03.txt
 Date: 21/02/2024
 Authors: John Mattsson, Goeran Selander, Christian Amsuess
 Working Group: Thing-to-Thing (t2trg)
Protecting Internet of Things (IoT) devices against attacks is not enough. IoT deployments need to make sure that they are not used for Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are typically done with compromised devices or with amplification attacks using a spoofed source address. This document gives examples of different theoretical amplification attacks using the Constrained Application Protocol (CoAP). The goal with this document is to raise awareness and to motivate generic and protocol-specific recommendations on the usage of CoAP. Some of the discussed attacks can be mitigated by not using NoSec or by using the Echo option.
 A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors
 
 draft-irtf-t2trg-taxonomy-manufacturer-anchors-03.txt
 Date: 30/01/2024
 Authors: Michael Richardson
 Working Group: Thing-to-Thing (t2trg)
This document provides a taxonomy of methods used by manufacturers of silicon and devices to secure private keys and public trust anchors. This deals with two related activities: how trust anchors and private keys are installed into devices during manufacturing, and how the related manufacturer held private keys are secured against disclosure. This document does not evaluate the different mechanisms, but rather just serves to name them in a consistent manner in order to aid in communication. RFCEDITOR: please remove this paragraph. This work is occurring in https://github.com/mcr/idevid-security-considerations
 Terminology and processes for initial security setup of IoT devices
 
 draft-irtf-t2trg-security-setup-iot-devices-02.txt
 Date: 24/03/2024
 Authors: Mohit Sethi, Behcet Sarikaya, Dan Garcia-Carrillo
 Working Group: Thing-to-Thing (t2trg)
This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completion, and the knowledge imparted to the IoT devices after the setup is complete.