Practical Considerations and Implementation Experiences in Securing Smart Object Networks
This memo describes challenges associated with securing smart object devices in constrained implementations and environments. The memo describes a possible deployment model suitable for these environments, discusses the availability of cryptographic libraries for small devices, presents some experiences in implementing small devices using those libraries, and discusses trade-offs involving different types of approaches.