{"draft":"draft-ietf-ace-wg-coap-eap-15","doc_id":"RFC9820","title":"Authentication Service Based on the Extensible Authentication Protocol (EAP) for Use with the Constrained Application Protocol (CoAP)","authors":["R. Marin-Lopez","D. Garcia-Carrillo"],"format":["HTML","TEXT","PDF","XML"],"page_count":"35","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Authentication and Authorization for Constrained Environments","abstract":"This document specifies an authentication service that uses the\r\nConstrained Application Protocol (CoAP) as a transport method to\r\ncarry the Extensible Authentication Protocol (EAP). As such, it\r\ndefines an EAP lower layer based on CoAP called \"CoAP-EAP\". One of\r\nthe main goals is to authenticate a CoAP-enabled Internet of Things\r\n(IoT) device (EAP peer) that intends to join a security domain\r\nmanaged by a Controller (EAP authenticator). Secondly, it allows\r\nderiving key material to protect CoAP messages exchanged between them\r\nbased on Object Security for Constrained RESTful Environments\r\n(OSCORE), enabling the establishment of a security association\r\nbetween them.","pub_date":"September 2025","keywords":["CoAP","EAP","EAP lower layer","Internet of Things","IoT","Constrained Node","Smart Object"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9820","errata_url":null}