I have just distributed the announcement for a workshop on Smart Object Security on the 23rd March 2012 in Paris (attached to the IETF meeting).
We are seeking input from participants to share their thoughts about the ability to utilize existing and widely deployed security mechanisms for smart objects.
In particular, we are interested to hear about:
- What techniques for issuing credentials have been deployed?
- What extensions are useful to make existing security protocols more suitable for smart objects?
- What type of credentials are frequently used?
- What experience has been gained when implementing and deploying application layer, transport layer, network layer, and link layer security mechanisms (or a mixture of all of them)?
- How can “clever” implementations make security protocols a better fit for constrained devices?
- Are there lessons we can learn from existing deployments?
More workshop details can be found on the webpage of our host:
If you plan to participate at the workshop please drop us a message (with a short description of what you are planning to contribute) and we can give you an early notice regarding your participation.