<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc iprnotified="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc colonspace="yes"?>
<?rfc rfcedstyle="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-rest-iot-17" category="info" submissionType="IRTF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RESTful Design for IoT Systems">Guidance on RESTful Design for Internet of Things Systems</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-17"/>
    <author initials="A." surname="Keränen" fullname="Ari Keränen">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street/>
          <city>Jorvas</city>
          <code>02420</code>
          <country>Finland</country>
        </postal>
        <email>ari.keranen@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
      <organization>Siemens</organization>
      <address>
        <postal>
          <street>Zählerweg 5</street>
          <city>Zug</city>
          <code>6300</code>
          <country>Switzerland</country>
        </postal>
        <email>matthias.kovatsch@siemens.com</email>
      </address>
    </author>
    <author initials="K." surname="Hartke" fullname="Klaus Hartke">
      <organization/>
      <address>
        <email>hartke@projectcool.de</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>T2TRG</area>
    <abstract>
      <?line 138?>

<t>This document gives guidance for designing Internet of Things (IoT) systems
that follow the principles of the Representational State Transfer (REST)
architectural style. This document is a product of the IRTF Thing-to-Thing
Research Group (T2TRG).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-irtf-t2trg-rest-iot/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Thing-to-Thing Research Group mailing list (<eref target="mailto:t2trg@irtf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/t2trg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/t2trg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/t2trg/t2trg-rest-iot"/>.</t>
    </note>
  </front>
  <middle>
    <?line 145?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Representational State Transfer (REST) architectural style <xref target="REST"/> is a set of guidelines and best practices for building distributed hypermedia systems.
At its core is a set of constraints, which when fulfilled enable desirable properties for distributed software systems such as scalability and modifiability.
When REST principles are applied to the design of a system, the result is often called RESTful and in particular an API following these principles is called a RESTful API.</t>
      <t>Different protocols can be used with RESTful systems, but at the time of writing the most common protocols are HTTP <xref target="RFC9110"/> and CoAP <xref target="RFC7252"/>.
Since RESTful APIs are often lightweight and enable loose coupling of system components, they are a good fit for various Internet of Things (IoT) applications, which in general aim at interconnecting the physical world with the virtual world.
The goal of this document is to give basic guidance for designing RESTful systems and APIs for IoT applications and give pointers for more information.</t>
      <t>Designing a good RESTful IoT system naturally has many commonalities with other Web systems.
Compared to others, the key characteristics of many RESTful IoT systems include:</t>
      <ul spacing="normal">
        <li>
          <t>accommodating for constrained devices <xref target="RFC7228"/>, so with IoT, REST is not only used for scaling out (large number of clients on a Web server), but also for scaling down (efficient server on constrained node, e.g., in energy consumption or implementation complexity)</t>
        </li>
        <li>
          <t>facilitating efficient transfer over (often) constrained networks and lightweight processing in constrained nodes through compact and simple data formats</t>
        </li>
        <li>
          <t>avoiding (or at least minimizing) the need for human interaction through machine-understandable data formats and interaction patterns</t>
        </li>
        <li>
          <t>enabling the system to evolve gradually in the field, as the usually large number of endpoints can not be updated simultaneously</t>
        </li>
        <li>
          <t>having endpoints that are both clients and servers</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-terms">
      <name>Terminology</name>
      <t>This section explains selected terminology that is commonly used in the context of RESTful design for IoT systems.
For terminology of constrained nodes and networks, see <xref target="RFC7228"/>.
Terminology on modeling of Things and their affordances (Properties, Actions, and Events) was taken from <xref target="I-D.ietf-asdf-sdf"/>.</t>
      <dl>
        <dt>Action:</dt>
        <dd>
          <t>A kind of affordance that can potentially be used to perform a named operation on a Thing.</t>
        </dd>
        <dt>Action Result:</dt>
        <dd>
          <t>A representation sent as a response by a server that does not represent resource state, but the result of the interaction with the originally addressed resource.</t>
        </dd>
        <dt>Affordance:</dt>
        <dd>
          <t>An element of an interface offered for interaction, defining its possible uses or making clear how it can or should be used.
The term is used here for the digital interfaces of a Thing only;
the Thing might also have physical affordances such as buttons, dials, and displays.</t>
        </dd>
        <dt>Cache:</dt>
        <dd>
          <t>A local store of response messages and the subsystem that controls storage, retrieval, and deletion of messages in it.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>A node that sends requests to servers and receives responses; it therefore has the initiative to interact.
In RESTful IoT systems it is common for nodes to have more than one role (i.e., to be both server and client; see <xref target="sec-architecture"/>).</t>
        </dd>
        <dt>Client State:</dt>
        <dd>
          <t>The state kept by a client between requests.
This typically includes the currently processed representation, the set of active requests, the history of requests, bookmarks (URIs stored for later retrieval), and application-specific state (e.g., local variables).
(Note that this is called "Application State" in <xref target="REST"/>, which has some ambiguity in modern (IoT) systems where resources are highly dynamic and the overall state of the distributed application (i.e., application state) is reflected in the union of all Client States and Resource States of all clients and servers involved.)</t>
        </dd>
        <dt>Content Type:</dt>
        <dd>
          <t>A string that carries the media type plus potential parameters for the representation format such as "text/plain;charset=UTF-8".</t>
        </dd>
        <dt>Content Negotiation:</dt>
        <dd>
          <t>The practice of determining the "best" representation for a client when examining the current state of a resource.
The most common forms of content negotiation are Proactive Content Negotiation and Reactive Content Negotiation.</t>
        </dd>
        <dt>Dereference:</dt>
        <dd>
          <t>To use an access mechanism (e.g., HTTP or CoAP) to interact with the resource of a URI.</t>
        </dd>
        <dt>Dereferenceable URI:</dt>
        <dd>
          <t>A URI that can be dereferenced, i.e., interaction with the identified resource is possible.
Not all HTTP or CoAP URIs are dereferenceable, e.g., when the target resource does not exist.</t>
        </dd>
        <dt>Event:</dt>
        <dd>
          <t>A kind of affordance that can potentially be used to (recurrently) obtain information about what happened to a Thing, e.g., through server push.</t>
        </dd>
        <dt>Form:</dt>
        <dd>
          <t>A hypermedia control that enables a client to construct more complex requests, e.g., to change the state of a resource or perform specific queries.</t>
        </dd>
        <dt>Forward Proxy:</dt>
        <dd>
          <t>An intermediary that is selected by a client, usually via local configuration rules, and that can be tasked to make requests on behalf of the client.
This may be useful, for example, when the client lacks the capability to make the request itself or to service the response from a cache in order to reduce response time, network bandwidth, and energy consumption.</t>
        </dd>
        <dt>Gateway:</dt>
        <dd>
          <t>A reverse proxy that provides an interface to a non-RESTful system such as legacy systems or alternative technologies such as Bluetooth Attribute Profile (ATT) or Generic Attribute Profile (GATT).
See also "Reverse Proxy".</t>
        </dd>
        <dt>Hypermedia Control:</dt>
        <dd>
          <t>Information provided by a server on how to use its RESTful API; usually a URI and instructions on how to dereference it for a specific interaction. Hypermedia Controls are the serialized/encoded affordances of hypermedia systems.</t>
        </dd>
        <dt>Idempotent Method:</dt>
        <dd>
          <t>A method where multiple identical requests with that method lead to the same visible resource state as a single such request.</t>
        </dd>
        <dt>Intermediary:</dt>
        <dd>
          <t>System component in both server and client role. See "Forward Proxy", "Gateway", and "Reverse Proxy".</t>
        </dd>
        <dt>Link:</dt>
        <dd>
          <t>A hypermedia control that enables a client to navigate between resources and thereby change the client state.</t>
        </dd>
        <dt>Link Relation Type:</dt>
        <dd>
          <t>An identifier that describes how the link target resource relates to the current resource (see <xref target="RFC8288"/>).</t>
        </dd>
        <dt>Media Type:</dt>
        <dd>
          <t>An IANA-registered string such as "text/html" or "application/json" that is used to label representations so that it is known how the representation should be interpreted and how it is encoded.</t>
        </dd>
        <dt>Method:</dt>
        <dd>
          <t>An operation associated with a resource. Common methods include GET, PUT, POST, and DELETE (see <xref target="sec-methods"/> for details).</t>
        </dd>
        <dt>Origin Server:</dt>
        <dd>
          <t>A server that is the definitive source for representations of its resources and the ultimate recipient of any request that intends to modify its resources.
In contrast, intermediaries (such as proxies caching a representation) can assume the role of a server, but are not the source for representations as these are acquired from the origin server.</t>
        </dd>
        <dt>Proactive Content Negotiation:</dt>
        <dd>
          <t>A content negotiation mechanism where the server selects a representation based on the expressed preference of the client.
For example, an IoT application could send a request that prefers to accept the media type "application/senml+json".</t>
        </dd>
        <dt>Property:</dt>
        <dd>
          <t>A kind of affordance that can potentially be used to read, write, and/or observe state on a Thing.</t>
        </dd>
        <dt>Reactive Content Negotiation:</dt>
        <dd>
          <t>A content negotiation mechanism where the client selects a representation from a list of available representations.
The list may, for example, be included by a server in an initial response.
If the user agent is not satisfied by the initial response representation, it can request one or more of the alternative representations, selected based on metadata (e.g., available media types) included in the response.</t>
        </dd>
        <dt>Representation:</dt>
        <dd>
          <t>A serialization that represents the current or intended state of a resource and that can be transferred between client and server.
REST requires representations to be self-describing, meaning that there must be metadata that allows peers to understand which representation format is used.
Depending on the protocol needs and capabilities, there can be additional metadata that is transmitted along with the representation.</t>
        </dd>
        <dt>Representation Format:</dt>
        <dd>
          <t>A set of rules for serializing resource state.
On the Web, the most prevalent representation format is HTML.
Other common formats include plain text and formats based on JSON <xref target="RFC8259"/>, XML, or RDF. Within IoT systems, often compact formats based on JSON, CBOR <xref target="RFC8949"/>, and EXI <xref target="W3C.REC-exi-20110310"/> are used.</t>
        </dd>
        <dt>Representational State Transfer (REST):</dt>
        <dd>
          <t>An architectural style for Internet-scale distributed hypermedia systems.</t>
        </dd>
        <dt>Resource:</dt>
        <dd>
          <t>An item of interest identified by a URI.
Anything that can be named can be a resource.
A resource often encapsulates a piece of state in a system.
Typical resources in an IoT system can be, e.g., a sensor, the current value of a sensor, the location of a device, or the current state of an actuator.</t>
        </dd>
        <dt>Resource State:</dt>
        <dd>
          <t>A model of the possible states of a resource that is expressed in supported representation formats.
Resources can change state because of REST interactions with them, or they can change state for reasons outside of the REST model, e.g., business logic implemented on the server side such as sampling a sensor.</t>
        </dd>
        <dt>Resource Type:</dt>
        <dd>
          <t>An identifier that annotates the application-semantics of a resource (see <xref section="3.1" sectionFormat="of" target="RFC6690"/>).</t>
        </dd>
        <dt>Reverse Proxy:</dt>
        <dd>
          <t>An intermediary that appears as a server towards the client, but satisfies the requests by making its own request toward the origin server (possibly via one or more other intermediaries) and replying accordingly.
A reverse proxy is often used to encapsulate legacy services, to improve server performance through caching, or to enable load balancing across multiple machines.</t>
        </dd>
        <dt>Safe Method:</dt>
        <dd>
          <t>A method that does not result in any state change on the origin server when applied to a resource.</t>
        </dd>
        <dt>Server:</dt>
        <dd>
          <t>A node that listens for requests, performs the requested operation, and sends responses back to the clients.
In RESTful IoT systems it is common for nodes to have more than one role (i.e., to be both server and client; see <xref target="sec-architecture"/>).</t>
        </dd>
        <dt>Thing:</dt>
        <dd>
          <t>A physical item that is also available for interaction over a network, thereby enabling digital interaction with the physical world for humans, services, and/or other Things.</t>
        </dd>
        <dt>Transfer protocols:</dt>
        <dd>
          <t>In particular in the IoT domain, protocols above the transport layer that are used to transfer data objects and provide semantics for operations on the data.</t>
        </dd>
        <dt>Transfer layer:</dt>
        <dd>
          <t>Re-usable part of the application layer used to transfer the application specific data items using a standard set of methods that can fulfill application-specific operations.</t>
        </dd>
        <dt>Uniform Resource Identifier (URI):</dt>
        <dd>
          <t>A global identifier for resources.
See <xref target="sec-uris"/> for more details.</t>
        </dd>
      </dl>
    </section>
    <section anchor="basics">
      <name>Basics</name>
      <section anchor="sec-architecture">
        <name>Architecture</name>
        <t>Components of a RESTful system assume one of two roles when interacting: client or server.
Classic user agents (e.g., Web browsers) are always in the client role and have the initiative to interact with other components.
Origin servers govern over the resources they host and always have the server role, in which they wait for requests.</t>
        <t>Simple IoT devices, such as connected sensors and actuators, are commonly acting as servers to expose their physical world interaction capabilities (e.g., temperature measurement or door lock control capability) as resources.
A typical example of an IoT system client is a cloud service that retrieves data from the sensors and commands the actuators based on the sensor information.
Alternatively an IoT data storage system could work as a server where IoT sensor devices send their data in client role.</t>
        <figure anchor="basic-arch-x">
          <name>Client-Server Communication</name>
          <artwork align="center"><![CDATA[
   ________                       _________
  |        |                     |         |
  | User  (C)-------------------(S) Origin |
  | Agent  |                     |  Server |
  |________|                     |_________|
(e.g., Sensor,                (e.g., Data Store,
Cloud Service)                   IoT Device)
]]></artwork>
        </figure>
        <t>Intermediaries implement both roles, as they receive requests in server role and satisfy them by issuing their own requests in client role.
They do not, however, have initiative to issue requests on their own.
They often provide a cache to improve the overall system performance or, in the case of IoT, shield constrained devices from too many requests.
They can also translate requests to different RESTful protocols, for instance, as CoAP-HTTP cross-proxies <xref target="RFC8075"/>.</t>
        <t>A forward proxy is an intermediary selected by the user agent because of local application or system configuration.
It then forwards the request on behalf of the user agent, for instance, when the user agent is restricted by firewall rules or otherwise lacks the capability itself (e.g., a CoAP device contacting an HTTP origin server).</t>
        <figure anchor="basic-arch-a">
          <name>Communication with Forward Proxy</name>
          <artwork align="center"><![CDATA[
       ________       __________                        _________
      |        |     |          |                      |         |
      | User  (C)---(S) Inter- (C)--------------------(S) Origin |
      | Agent  |     |  mediary |                      |  Server |
      |________|     |__________|                      |_________|
(e.g., IoT Device) (e.g., Cross-Proxy)               (e.g., Web Server)
]]></artwork>
        </figure>
        <t>A reverse proxy is usually imposed by the origin server to transparently implement new features such as load balancing or interfaces to non-RESTful services such as legacy systems or alternative technologies such as Bluetooth ATT/GATT <xref target="BTCorev5.3"/>.
In the latter case, reverse proxies are usually called gateways.
Because of the Layered System constraint of REST, which says that a client cannot see beyond the server it is connected to, the user agent is not and does not need to be aware of the changes introduced through reverse proxies.</t>
        <figure anchor="basic-arch-b">
          <name>Communication with Reverse Proxy</name>
          <artwork align="center"><![CDATA[
      ________                        __________       _________
     |        |                      |          |     |         |
     | User  (C)--------------------(S) Inter- (x)---(x) Origin |
     | Agent  |                      |  mediary |     |  Server |
     |________|                      |__________|     |_________|
(e.g., Cloud Service)              (e.g., Gateway)   (e.g., Legacy System)
]]></artwork>
        </figure>
        <t>Components in IoT systems often implement both roles.
Unlike intermediaries, however, they can take the initiative as a client (e.g., to register with a directory, such as CoRE Resource Directory <xref target="RFC9176"/>, or to interact with another IoT device) and act as origin server at the same time (e.g., to serve sensor values or provide an actuator interface).</t>
        <figure anchor="basic-arch-c">
          <name>Communication with Things</name>
          <artwork align="center"><![CDATA[
 ________                                         _________
|        |                                       |         |
| Thing (C)-------------------------------------(S) Origin |
|       (S)                                 ___/ |  Server |
|________| \                            ___/     |_________|
 (e.g.,     \                       ___/   (e.g., Resource Directory)
  Sensor)    \   _________      ___/              _________
              \ |         | ___/                 |         |
               (C) Thing (C)                     |  User   |
                |        (S)--------------------(C) Agent  |
                |_________|                      |_________|
             (e.g., Controller)            (e.g., Configuration Tool)
]]></artwork>
        </figure>
      </section>
      <section anchor="system-design">
        <name>System Design</name>
        <t>When designing a RESTful system, the primary effort goes into modeling the application as distributed state and assigning it to the different components (i.e., clients and servers).
The secondary effort is then selecting or designing the necessary representation formats to exchange information and enable interaction between the components through resources.</t>
        <t>Which resources exist and how they can be used is expressed by the server in so-called affordances, a concept adopted in the field of human-computer interaction <xref target="HCI"/>.
Affordances can be described in responses (e.g., the initial response from a well-known resource) or out of band (e.g., through a W3C Thing Description document <xref target="W3C-TD"/> from a directory).
In RESTful systems, affordances are encoded as hypermedia controls (links and forms):
links allow to navigate between resources and forms enable clients to formulate more complex requests (e.g., to modify a resource or perform a query).</t>
        <t>A physical door may have a door knob as affordance, indicating that the door can be opened by twisting the knob; a keyhole may indicate that it can be locked.
For Things in the IoT, these affordances may be serialized as two hypermedia forms, which include semantic identifiers from a controlled vocabulary (e.g., schema.org) and the instructions on how to formulate the requests for opening and locking, respectively.
Overall, this allows to realize a Uniform Interface (see <xref target="sec-uniform-interface"/>), which enables loose coupling between clients and servers.</t>
        <t>Hypermedia controls span a kind of state machine, where the nodes are resources or action results and the transitions are links or forms.
Clients run this distributed state machine (i.e., the application) by retrieving representations, processing the data, and following the included links and/or submitting forms to trigger the corresponding transition.
This is usually done by retrieving the current state, modifying the copy of the state on the client side, and transferring the new state to the server in the form of new representations -- rather than calling a service and modifying the state on the server side (see <xref target="sec-calling-procedure"/>).</t>
        <t>Client state encompasses the current state of the described state machine and the possible next transitions derived from the hypermedia controls within the currently processed representation.
Furthermore, clients can have part of the state of the distributed application in local variables.</t>
        <t>Resource state includes the more persistent data of an application (i.e., data that exists independent of individual clients).
This can be static data such as device descriptions, persistent data such as system configurations, but also dynamic data such as the current value of a sensor on a Thing.</t>
        <t>In the design, it is important to distinguish between "client state" and "resource state", and keep them separate.
Following the Stateless constraint, the client state must be kept only on clients.
That is, there is no establishment of shared information about past and future interactions between client and server (usually called a session).
On the one hand, this makes requests a bit more verbose since every request must contain all the information necessary to process it.
On the other hand, this makes servers efficient and scalable, since they do not have to keep any state about their clients.
Requests can easily be distributed over multiple worker threads or server instances (cf. load balancing).
For IoT systems, this constraint lowers the memory requirements for server implementations, which is particularly important for constrained servers (e.g., sensor nodes) and servers serving large amount of clients (e.g., Resource Directory).</t>
      </section>
      <section anchor="sec-uris">
        <name>Uniform Resource Identifiers (URIs)</name>
        <t>An important aspect of RESTful API design is to model the system as a set of resources, which potentially can be created and/or deleted dynamically and whose state can be retrieved and/or modified.</t>
        <t>Uniform Resource Identifiers (URIs) are used to indicate resources for interaction, to reference a resource from another resource, to advertise or bookmark a resource, or to index a resource by search engines.</t>
        <artwork><![CDATA[
  foo://example.com:8042/over/there?name=ferret#nose
  \_/   \______________/\_________/ \_________/ \__/
   |           |            |            |        |
scheme     authority       path        query   fragment
]]></artwork>
        <t>A URI is a sequence of characters that matches the syntax defined in <xref target="RFC3986"/>.
It consists of a hierarchical sequence of five components: scheme, authority, path, query, and fragment identifier (from most significant to least significant), while not all components are necessary to form a valid URI.
A scheme creates a namespace for resources and defines how the following components identify a resource within that namespace.
The authority identifies an entity that governs part of the namespace, such as the server "www.example.org" in the "https" scheme.
A hostname (e.g., a fully qualified domain name) or an IP address literal, optionally followed by a transport layer port number, are usually used for the authority component.
The path and optional query contain data to identify a resource within the scope of the scheme-dependent naming authority (i.e., "http://www.example.org" is a different authority than "https://www.example.org"); if no path is given, the root resource is addressed.
The fragment identifier allows referring to some portion of the resource, such as a Record in a SenML Pack (<xref section="9" sectionFormat="of" target="RFC8428"/>).
However, fragment identifiers are processed only at client side and not sent on the wire.
<xref target="RFC8820"/> provides more details on URI design and ownership with best current practices for establishing URI structures, conventions, and formats.</t>
        <t>For RESTful IoT applications, typical schemes include "https", "coaps", "http", and "coap".
These refer to HTTP and CoAP, with and without Transport Layer Security (TLS, <xref target="RFC5246"/> for TLS 1.2 and <xref target="RFC8446"/> for TLS 1.3).
(CoAP uses Datagram TLS (DTLS) <xref target="RFC6347"/><xref target="RFC9147"/>, the variant of TLS for UDP.)
These four schemes also provide means for locating the resource; using the protocols HTTP for "http" and "https" and CoAP for "coap" and "coaps".
If the scheme is different for two URIs (e.g., "coap" vs. "coaps"), it is important to note that even if the remainder of the URI is identical, these are two different resources, in two distinct namespaces.</t>
        <t>Some schemes are for URIs with the main purpose as identifiers, and hence are not dereferenceable, e.g., the "urn" scheme can be used to construct unique names in registered namespaces.
In particular the "urn:dev" URI <xref target="RFC9039"/> details multiple ways for generating and representing endpoint identifiers of IoT devices.</t>
        <t>The query parameters can be used to parameterize the resource.
For example, a GET request may use query parameters to request the server to send only certain kind data of the resource (i.e., filtering the response).
Query parameters in PUT and POST requests do not have such established semantics and are not used consistently.
Whether the order of the query parameters matters in URIs is up to the server implementation; they might even be re-ordered, for instance by intermediaries.
Therefore, applications should not rely on their order; see <xref section="3.3.4" sectionFormat="of" target="RFC6943"/> for more details.</t>
        <t>Due to the relatively complex processing rules and text representation format, URI handling can be difficult to implement correctly in constrained devices.
Constrained Resource Identifiers <xref target="I-D.ietf-core-href"/> provide a CBOR-based format of URIs that is better suited for resource constrained devices.</t>
      </section>
      <section anchor="representations">
        <name>Representations</name>
        <t>Clients can retrieve the resource state from a server or manipulate resource state on the (origin) server by transferring resource representations.
Resource representations must have metadata that identifies the representation format used, so the representations can be interpreted correctly.
This is usually a simple string such as the IANA-registered Internet Media Types.
Typical media types for IoT systems include:</t>
        <ul spacing="normal">
          <li>
            <t>"text/plain" for simple text (more precisely "text/plain;charset=UTF-8" for UTF-8 encoding)</t>
          </li>
          <li>
            <t>"application/octet-stream" for arbitrary binary data</t>
          </li>
          <li>
            <t>"application/json" for the JSON format <xref target="RFC8259"/></t>
          </li>
          <li>
            <t>"application/cbor" for CBOR <xref target="RFC8949"/></t>
          </li>
          <li>
            <t>"application/exi" for EXI <xref target="W3C.REC-exi-20110310"/></t>
          </li>
          <li>
            <t>"application/link-format" for CoRE Link Format <xref target="RFC6690"/></t>
          </li>
          <li>
            <t>"application/senml+json" and "application/senml+cbor" for Sensor Measurement Lists (SenML) data <xref target="RFC8428"/></t>
          </li>
        </ul>
        <t>A full list of registered Internet Media Types is available at the IANA registry <xref target="IANA-media-types"/>.
Numerical identifiers for media types, parameters, and content codings registered for use with CoAP are listed at CoAP Content-Formats IANA registry <xref target="IANA-CoAP-media"/>.</t>
        <t>The terms "media type", "content type" (media type plus potential parameters), and "content format" (short identifier of content type and content coding, abbreviated for historical reasons "ct") are often used when referring to representation formats used with CoAP.
The differences between these terms are discussed in more detail in <xref section="2" sectionFormat="of" target="RFC9193"/>.</t>
      </section>
      <section anchor="sec-methods">
        <name>HTTP/CoAP Methods</name>
        <t><xref section="9.3" sectionFormat="of" target="RFC9110"/> defines the set of methods in HTTP;
<xref section="5.8" sectionFormat="of" target="RFC7252"/> defines the set of methods in CoAP.
As part of the Uniform Interface constraint (see <xref target="sec-uniform-interface"/>), each method can have certain properties that give guarantees to clients.</t>
        <t>Safe methods do not cause any state change on the origin server when applied to a resource.
For example, the GET method only returns a representation of the resource state but does not change the resource.
Thus, it is always safe for a client to retrieve a representation without affecting server-side state.</t>
        <t>Idempotent methods can be applied multiple times to the same resource while causing the same eventual resource state as a single such request (unless something else caused the resource state to change).
For example, the PUT method replaces the state of a resource with a new state; replacing the state multiple times with the same new state still results in the same state for the resource.
However, responses from the server can be different when the same idempotent method is used multiple times.
For example when DELETE is used twice on an existing resource, the first request would remove the association and return a success acknowledgement, whereas the second request would likely result in an error response due to non-existing resource (note that neither response is a representation of the resource).</t>
        <t>The following lists the most relevant methods and gives a short explanation of their semantics.</t>
        <section anchor="get">
          <name>GET</name>
          <t>The GET method requests a current representation for the target resource, while the origin server must ensure that there are no side effects on the resource state.
Only the origin server needs to know how each of its resource identifiers corresponds to an implementation and how each implementation manages to select and send a current representation of the target resource in a response to GET.</t>
          <t>A payload within a GET request message has no defined semantics.</t>
          <t>The GET method is safe and idempotent.</t>
        </section>
        <section anchor="post">
          <name>POST</name>
          <t>The POST method requests that the target resource process the representation enclosed in the request according to the resource's own specific semantics.</t>
          <t>If one or more resources has been created on the origin server as a result of successfully processing a POST request, the origin server sends a 201 (Created) response containing a Location header field (with HTTP) or Location-Path and/or Location-Query Options (with CoAP) that provide an identifier for the resource created.
The server also includes a representation that describes the status of the request while referring to the new resource(s).</t>
          <t>The POST method is not safe nor idempotent.</t>
        </section>
        <section anchor="put">
          <name>PUT</name>
          <t>The PUT method requests that the state of the target resource be created or replaced with the state defined by the representation enclosed in the request message payload.
A successful PUT of a given representation would suggest that a subsequent GET on that same target resource will result in an equivalent representation being sent.
A PUT request applied to the target resource can have side effects on other resources.</t>
          <t>The fundamental difference between the POST and PUT methods is highlighted by the different intent for the enclosed representation.
The target resource in a POST request is intended to handle the enclosed representation according to the resource's own semantics, whereas the enclosed representation in a PUT request is defined as replacing the state of the target resource.
Hence, the intent of PUT is idempotent and visible to intermediaries, even though the exact effect is only known by the origin server.</t>
          <t>The PUT method is not safe, but is idempotent.</t>
        </section>
        <section anchor="delete">
          <name>DELETE</name>
          <t>The DELETE method requests that the origin server remove the association between the target resource and its current functionality.</t>
          <t>If the target resource has one or more current representations, they might or might not be destroyed by the origin server, and the associated storage might or might not be reclaimed, depending entirely on the nature of the resource and its implementation by the origin server.</t>
          <t>The DELETE method is not safe, but is idempotent.</t>
        </section>
        <section anchor="fetch-query">
          <name>FETCH / QUERY</name>
          <t>The CoAP-specific FETCH method <xref target="RFC8132"/> requests a representation of a resource parameterized by a representation enclosed in the request.</t>
          <t>The fundamental difference between the GET and FETCH methods is that the request parameters are included as the payload of a FETCH request, while in a GET request they are typically part of the query string of the request URI.</t>
          <t>The FETCH method is safe and idempotent.</t>
          <t>For HTTP a new QUERY method is being specified <xref target="I-D.ietf-httpbis-safe-method-w-body"/> for making a safe, idempotent request that contains content.</t>
        </section>
        <section anchor="patch">
          <name>PATCH</name>
          <t>The PATCH method <xref target="RFC5789"/> <xref target="RFC8132"/> requests that a set of changes described in the request entity be applied to the target resource.</t>
          <t>The PATCH method is not safe nor idempotent.</t>
          <t>The CoAP-specific iPATCH method is a variant of the PATCH method that is not safe, but is idempotent.</t>
        </section>
      </section>
      <section anchor="coap-response-codes-and-http-status-codes">
        <name>CoAP Response Codes and HTTP Status Codes</name>
        <t><xref section="15" sectionFormat="of" target="RFC9110"/> defines a set of Status Codes in HTTP that are assigned by the server to indicate whether a request was understood and satisfied, and how to interpret the answer.
Similarly, <xref section="5.9" sectionFormat="of" target="RFC7252"/> defines the set of Response Codes in CoAP.</t>
        <t>The codes consist of three digits (e.g., "404" with HTTP or "4.04" with CoAP) where the first digit expresses the class of the code.
Implementations do not need to understand all codes, but the class of the code must be understood.
Codes starting with 1 are informational; the request was received and being processed (not available in CoAP).
Codes starting with 2 indicate a successful request.
Codes starting with 3 indicate redirection; further action is needed to complete the request (not available in CoAP).
Codes stating with 4 and 5 indicate errors.
The codes starting with 4 mean client error (e.g., bad syntax in the request) whereas codes starting with 5 mean server error; there was no apparent problem with the request, but the server was not able to fulfill the request.</t>
        <t>For CoAP, the response code alone decides whether a response is cacheable, while HTTP uses explicit cache-control headers or rules over method and code.
CoAP responses with code 2.05, 4.xx, and 5.xx are cacheable.
This difference to HTTP also leads to slightly different codes starting with 2; for example, CoAP does not have a 2.00 response code whereas 200 ("OK") is commonly used with HTTP.</t>
      </section>
    </section>
    <section anchor="rest-constraints">
      <name>REST Constraints</name>
      <t>The REST architectural style defines a set of constraints for the system design.
When all constraints are applied correctly, REST enables architectural properties of key interest <xref target="REST"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Performance</t>
        </li>
        <li>
          <t>Scalability</t>
        </li>
        <li>
          <t>Reliability</t>
        </li>
        <li>
          <t>Simplicity</t>
        </li>
        <li>
          <t>Modifiability</t>
        </li>
        <li>
          <t>Visibility</t>
        </li>
        <li>
          <t>Portability</t>
        </li>
      </ul>
      <t>The following subsections briefly summarize the REST constraints and explain how they enable the listed properties.</t>
      <section anchor="client-server">
        <name>Client-Server</name>
        <t>As explained in the Architecture section, RESTful system components have clear roles in every interaction.
Clients have the initiative to issue requests, intermediaries can only forward requests, and servers respond to requests, while origin servers are the ultimate recipient of requests that intend to modify resource state.</t>
        <t>This improves simplicity and visibility (also for digital forensics), as it is clear which component started an interaction.
Furthermore, it improves modifiability through a clear separation of concerns.</t>
        <t>In IoT systems, endpoints often assume both roles of client and (origin) server simultaneously.
When an IoT device has initiative (because there is a user, e.g., pressing a button, or installed rules/policies), it acts as a client.
When a device offers a service, it is in server role.</t>
      </section>
      <section anchor="stateless">
        <name>Stateless</name>
        <t>The Stateless constraint requires messages to be self-contained.
They must contain all the information to process it, independent from previous messages.
This allows to strictly separate the client state from the resource state.</t>
        <t>This improves scalability and reliability, since servers or worker threads can be replicated.
It also improves visibility because message traces contain all the information to understand the logged interactions.
Furthermore, the Stateless constraint enables caching.</t>
        <t>For IoT, the scaling properties of REST become particularly important.
Note that being self-contained does not necessarily mean that all information has to be inlined.
Constrained IoT devices may choose to externalize metadata and hypermedia controls using Web linking, so that only the dynamic content needs to be sent and the static content such as schemas or controls can be cached.</t>
      </section>
      <section anchor="cache">
        <name>Cache</name>
        <t>This constraint requires responses to have implicit or explicit cache-control metadata.
This enables clients and intermediaries to store responses and re-use them to locally answer future requests.
The cache-control metadata is necessary to decide whether the information in the cached response is still fresh or stale and needs to be discarded.</t>
        <t>A cache improves performance, as less data needs to be transferred and response times can be reduced significantly.
Needing fewer transfers also improves scalability, as origin servers can be protected from too many requests.
Local caches furthermore improve reliability, since requests can be answered even if the origin server is temporarily not available.</t>
        <t>Introducing additional components to perform caching only makes sense when the data is used by multiple participants (otherwise client-side caching would be enough).
In IoT systems, however, it might make sense to cache also individual data to protect constrained devices and networks from frequent requests of data that does not change often.
Security often hinders the ability to cache responses.
For IoT systems, object security <xref target="RFC8613"/> may be preferable over transport layer security, as it enables intermediaries to cache responses while preserving security <xref target="I-D.amsuess-core-cachable-oscore"/>.</t>
      </section>
      <section anchor="sec-uniform-interface">
        <name>Uniform Interface</name>
        <t>All RESTful APIs use the same, uniform interface independent of the application.
This simple interaction model is enabled by exchanging representations and modifying state locally, which simplifies the interface between clients and servers to a small set of methods to retrieve, update, and delete state.
This small set can apply to many different applications.</t>
        <t>In contrast, in a service-oriented RPC approach, state is modified remotely, directly by the server, and only the instruction what to modify is exchanged.
Also retrieving state for local use is usually solved through specific instructions depending on the individual information.
This requires to model all the necessary instructions beforehand and assign them to named procedures.
This results in a application-specific interface with a large set of methods/procedures.
Moreover, it is also likely that different parties come up with different ways how to modify state, including the naming of the procedures.
Hence, even very similar applications are likely not interoperable.</t>
        <t>A REST interface is fully defined by:</t>
        <ul spacing="normal">
          <li>
            <t>URIs to identify resources</t>
          </li>
          <li>
            <t>representation formats to represent and manipulate resource state</t>
          </li>
          <li>
            <t>self-descriptive messages with a standard set of methods (e.g., GET, POST, PUT, DELETE with their guaranteed properties)</t>
          </li>
          <li>
            <t>hypermedia controls within representations</t>
          </li>
        </ul>
        <t>The concept of hypermedia controls is also known as HATEOAS: Hypermedia As The Engine Of Application State <xref target="HATEOAS"/>.
The origin server embeds controls for the interface into its representations and thereby informs the client about possible next requests.
The most used control for RESTful systems today is Web Linking <xref target="RFC8288"/>.
Hypermedia forms are more powerful controls that describe how to construct more complex requests, including representations to modify resource state.</t>
        <t>While this is the most complex constraint (in particular the hypermedia controls), it improves many key properties.
It improves simplicity, as uniform interfaces are easier to understand.
The self-descriptive messages improve visibility.
The limitation to a known set of representation formats fosters portability.
Most of all, however, this constraint is the key to modifiability, as hypermedia-driven, uniform interfaces allow clients and servers to evolve independently, and hence enable a system to evolve.</t>
        <t>For a large number of IoT applications, the hypermedia controls are mainly used for the discovery of resources, as they often serve sensor data.
Such resources are "dead ends", as they usually do not link any further and only have one form of interaction: fetching the sensor value.
For IoT, the critical parts of the Uniform Interface constraint are the descriptions of messages and representation formats used.
Simply using, for instance, "application/json" does not help machine clients to understand the semantics of the representation.
Yet defining very precise media types limits the re-usability and interoperability.
Representation formats such as SenML <xref target="RFC8428"/> try to find a good trade-off between precision and re-usability.
Another approach is to combine a generic format such as JSON or CBOR with syntactic (see <xref target="I-D.handrews-json-schema-validation"/> and <xref target="RFC8610"/>) as well as semantic annotations (e.g., <xref target="W3C-TD"/>).</t>
      </section>
      <section anchor="layered-system">
        <name>Layered System</name>
        <t>This constraint enforces that a client cannot see beyond the server with which it is interacting.</t>
        <t>A layered system is easier to modify, as topology changes become transparent (i.e., remain unnoticed by previous layers).
This in turn helps scalability, as reverse proxies such as load balancers can be introduced without changing the client side.
The clean separation of concerns in layers helps with simplicity.</t>
        <t>IoT systems greatly benefit from this constraint, as it allows to effectively shield constrained devices behind intermediaries.
It is also the basis for gateways, which are used to integrate other (IoT) ecosystems.</t>
      </section>
      <section anchor="code-on-demand">
        <name>Code-on-Demand</name>
        <t>This principle enables origin servers to ship code to clients.</t>
        <t>Code-on-Demand improves modifiability, since new features can be deployed during runtime (e.g., support for a new representation format).
It also improves performance, as the server can provide code for local pre-processing before transferring the data.</t>
        <t>As of today, code-on-demand has not been explored much in IoT systems.
Aspects to consider are that either one or both nodes are constrained and might not have the resources to host or dynamically fetch and execute such code.
Moreover, the origin server often has no understanding of the actual application a mashup client realizes.
Still, code-on-demand can be useful for small polyfills <xref target="POLYFILLS"/>, e.g., to decode payloads, and potentially other features in the future.</t>
      </section>
    </section>
    <section anchor="hypermedia-driven-applications">
      <name>Hypermedia-driven Applications</name>
      <t>Hypermedia-driven applications take advantage of hypermedia controls, i.e., links and forms, which are embedded in representations or response message headers.
A hypermedia client is a client that is capable of processing these hypermedia controls.
Hypermedia links can be used to give additional information about a resource representation (e.g., the source URI of the representation) or pointing to other resources.
The forms can be used to describe the structure of the data that can be sent (e.g., with a POST or PUT method) to a server, or how a data retrieval (e.g., GET) request for a resource should be formed.
In a hypermedia-driven application the client interacts with the server using only the hypermedia controls, instead of selecting methods and/or constructing URIs based on out-of-band information, such as API documentation.
The Constrained RESTful Application Language (CoRAL) <xref target="I-D.ietf-core-coral"/> provides a hypermedia-format that is suitable for constrained IoT environments.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>The advantage of this approach is increased evolvability and extensibility.
This is important in scenarios where servers exhibit a range of feature variations, where it's expensive to keep evolving client knowledge and server knowledge in sync all the time, or where there are many different client and server implementations.
Hypermedia controls serve as indicators in capability negotiation.
In particular, they describe available resources and possible operations on these resources using links and forms, respectively.</t>
        <t>There are multiple reasons why a server might introduce new links or forms:</t>
        <ul spacing="normal">
          <li>
            <t>The server implements a newer version of the application.
Older clients ignore the new links and forms, while newer clients are able to take advantage of the new features by following the new links and submitting the new forms.</t>
          </li>
          <li>
            <t>The server offers links and forms depending on the current state.
The server can tell the client which operations are currently valid and thus help the client navigate the application state machine.
The client does not have to have knowledge which operations are allowed in the current state or make a request just to find out that the operation is not valid.</t>
          </li>
          <li>
            <t>The server offers links and forms depending on the client's access control rights.
If the client is unauthorized to perform a certain operation, then the server can simply omit the links and forms for that operation.</t>
          </li>
        </ul>
      </section>
      <section anchor="knowledge">
        <name>Knowledge</name>
        <t>A client needs to have knowledge of a couple of things for successful interaction with a server.
This includes what resources are available, what representations of resource states are available, what each representation describes, how to retrieve a representation, what state changing operations on a resource are possible, how to perform these operations, and so on.</t>
        <t>Some part of this knowledge, such as how to retrieve the representation of a resource state, is typically hard-coded in the client software.
For other parts, a choice can often be made between hard-coding the knowledge or acquiring it on-demand.
The key to success in either case is the use of in-band information for identifying the knowledge that is required.
This enables the client to verify that it has all the required knowledge or to acquire missing knowledge on-demand.</t>
        <t>A hypermedia-driven application typically uses the following identifiers:</t>
        <ul spacing="normal">
          <li>
            <t>URI schemes that identify communication protocols,</t>
          </li>
          <li>
            <t>Internet Media Types that identify representation formats,</t>
          </li>
          <li>
            <t>link relation types or resource types that identify link semantics,</t>
          </li>
          <li>
            <t>form relation types that identify form semantics,</t>
          </li>
          <li>
            <t>variable names that identify the semantics of variables in templated links, and</t>
          </li>
          <li>
            <t>form field names that identify the semantics of form fields in forms.</t>
          </li>
        </ul>
        <t>The knowledge about these identifiers as well as matching implementations have to be shared a priori in a RESTful system.</t>
      </section>
      <section anchor="interaction">
        <name>Interaction</name>
        <t>A client begins interacting with an application through a GET request on an entry point URI.
The entry point URI is the only URI a client is expected to know before interacting with an application.
From there, the client is expected to make all requests by following links and submitting forms that are provided in previous responses.
The entry point URI can be obtained, for example, by manual configuration or some discovery process (e.g., DNS-SD <xref target="RFC6763"/> or Resource Directory <xref target="RFC9176"/>).
For Constrained RESTful environments "/.well-known/core", a relative URI is defined as a default entry point for requesting the links hosted by servers with known or discovered addresses <xref target="RFC6690"/>.</t>
      </section>
      <section anchor="hypermedia-driven-design-guidance">
        <name>Hypermedia-driven Design Guidance</name>
        <t>Assuming self-describing representation formats (i.e., human-readable with carefully chosen terms or processable by a formatting tool) and a client supporting the URI scheme used, a good rule of thumb for a good hypermedia-driven design is the following:
A developer should only need an entry point URI to drive the application.
All further information how to navigate through the application (links) and how to construct more complex requests (forms) are published by the server(s).
There must be no need for additional, out-of-band information (e.g., an API specification).</t>
        <t>For machines, a well-chosen set of information needs to be shared a priori to agree on machine-understandable semantics.
Agreeing on the exact semantics of terms for relation types and data elements will of course also help the developer.
<xref target="I-D.hartke-core-apps"/> proposes a convention for specifying the set of information in a structured way.</t>
      </section>
    </section>
    <section anchor="design-patterns">
      <name>Design Patterns</name>
      <t>Certain kinds of design problems are often recurring in a variety of domains, and often re-usable design patterns can be applied to them.
Also, some interactions with a RESTful IoT system are straightforward to design;
a classic example of reading a temperature from a thermometer device is almost always implemented as a GET request to a resource that represents the current value of the thermometer.
However, certain interactions, for example data conversions or event handling, do not have as straightforward and well established ways to represent the logic with resources and REST methods.</t>
      <t>The following sections describe how common design problems such as different interactions can be modeled with REST and what are the benefits of different approaches.</t>
      <section anchor="collections">
        <name>Collections</name>
        <t>A common pattern in RESTful systems across different domains is the collection.
A collection can be used to combine multiple resources together by providing resources that consist of set of (often partial) representations of resources, called items, and links to resources.
The collection resource also defines hypermedia controls for managing and searching the items in the collection.</t>
        <t>Examples of the collection pattern in RESTful IoT systems include the CoRE Resource Directory <xref target="RFC9176"/>, CoAP pub/sub broker <xref target="I-D.ietf-core-coap-pubsub"/>, and resource discovery via ".well-known/core".
Collection+JSON <xref target="CollectionJSON"/> is an example of a generic collection Media Type.</t>
      </section>
      <section anchor="sec-calling-procedure">
        <name>Calling a Procedure</name>
        <t>To modify resource state, clients usually use GET to retrieve a representation from the server, modify that locally, and transfer the resulting state back to the server with a PUT (see <xref target="sec-uniform-interface"/>).
Sometimes, however, the state can only be modified on the server side, for instance, because representations would be too large to transfer or part of the required information shall not be accessible to clients.
In this case, resource state is modified by calling a procedure (or "function").
This is usually modeled with a POST request, as this method leaves the behavior semantics completely to the server.
Procedure calls can be divided into two different classes based on how long they are expected to execute: "instantly" returning and long-running.</t>
        <section anchor="instantly-returning-procedures">
          <name>Instantly Returning Procedures</name>
          <t>When the procedure can return within the expected response time of the system, the result can be directly returned in the response.
The result can either be actual content or just a confirmation that the call was successful.
In either case, the response does not contain a representation of the resource, but a so-called action result.
Action results can still have hypermedia controls to provide the possible transitions in the application state machine.</t>
        </section>
        <section anchor="long-running-procedures">
          <name>Long-running Procedures</name>
          <t>When the procedure takes longer than the expected response time of the system, or even longer than the response timeout, it is a good pattern to create a new resource to track the "task" execution.
The server would respond instantly with a "Created" status (HTTP code 201 or CoAP 2.01) and indicate the location of the task resource in the corresponding header field (or CoAP option) or as a link in the action result.
The created resource can be used to monitor the progress, to potentially modify queued tasks or cancel tasks, and to eventually retrieve the result.</t>
          <t>Monitoring information would be modeled as state of the task resource, and hence be retrievable as representation.
CoAP Observe can help to be notified efficiently about completion or other changes to this information.
The result -- when available -- can be embedded in the representation or given as a link to another sub-resource.
Modifying tasks can be modeled with forms that either update sub-resources via PUT or do a partial write using PATCH or POST.
Canceling a task would be modeled with a form that uses DELETE to remove the task resource.</t>
        </section>
        <section anchor="conversion">
          <name>Conversion</name>
          <t>A conversion service is a good example where REST resources need to behave more like a procedure call.
The knowledge of converting from one representation to another is located only at the server to relieve clients from high processing or storing lots of data.
There are different approaches that all depend on the particular conversion problem.</t>
          <t>As mentioned in the previous sections, POST requests are a good way to model functionality that does not necessarily affect resource state.
When the input data for the conversion is small and the conversion result is deterministic, however, it can be better to use a GET request with the input data in the URI query part.
The query is parameterizing the conversion resource, so that it acts like a look-up table.
The benefit is that results can be cached also for HTTP (where responses to POST are not cacheable).
In CoAP, cacheability depends on the response code, so that also a response to a POST request can be made cacheable through a 2.05 Content code.</t>
          <t>When the input data is large or has a binary encoding, it is better to use POST requests with a proper Media Type for the input representation.
A POST request is also more suitable, when the result is time-dependent and the latest result is expected (e.g., exchange rates).</t>
        </section>
        <section anchor="events-as-state">
          <name>Events as State</name>
          <t>In event-centric paradigms such as Publish-Subscribe (pub/sub), events are usually represented by an incoming message that might even be identical for each occurrence.
Since the messages are queued, the receiver is aware of each occurrence of the event and can react accordingly.
For instance, in an event-centric system, ringing a doorbell would result in a message being sent that represents the event that it was rung.</t>
          <t>In resource-oriented paradigms such as REST, messages usually carry the current state of the remote resource, independent from the changes (i.e., events) that have lead to that state.
In a naive yet natural design, a doorbell could be modeled as a resource that can have the states unpressed and pressed.
There are, however, a few issues with this approach.
Polling (i.e., periodically retrieving) the doorbell resource state is not a good option, as the client is highly unlikely to be able to observe all the changes in the pressed state with any realistic polling interval.
When using CoAP Observe with Confirmable notifications, the server will usually send two notifications for the event that the doorbell was pressed:
notification for changing from unpressed to pressed and another one for changing back to unpressed.
If the time between the state changes is very short, the server might drop the first notification, as Observe guarantees eventual consistency only (see <xref section="1.3" sectionFormat="of" target="RFC7641"/>).</t>
          <t>The solution is to pick a state model that fits better to the application.
In the case of the doorbell -- and many other event-driven resources -- the solution could be a counter that counts how often the bell was pressed.
The corresponding action is taken each time the client observes a change in the received representation.
In the case of a network outage, this could lead to a ringing sound long after the bell was rung.
Also including a timestamp of the last counter increment in the state can help to suppress ringing a sound when the event has become obsolete. Another solution would be to change the client/server roles of the doorbell button and the ringer, as described in <xref target="sec-server-push"/>.</t>
        </section>
      </section>
      <section anchor="sec-server-push">
        <name>Server Push</name>
        <t>Overall, a universal mechanism for server push, that is, change-of-state notifications and stand-alone event notifications, is still an open issue that is being discussed in the Thing-to-Thing Research Group.
It is connected to the state-event duality problem and custody transfer, that is, the transfer of the responsibility that a message (e.g., event) is delivered successfully.</t>
        <t>A proficient mechanism for change-of-state notifications is currently only available for CoAP: Observing resources <xref target="RFC7641"/>.
The CoAP Observe mechanism offers eventual consistency, which guarantees "that if the resource does not undergo a new change in state, eventually all registered observers will have a current representation of the latest resource state".
It intrinsically deals with the challenges of lossy networks, where notifications might be lost, and constrained networks, where there might not be enough bandwidth to propagate all changes.</t>
        <t>For stand-alone event notifications, that is, where every single notification contains an identifiable event that must not be lost, observing resources is not a good fit.
A better strategy is to model each event as a new resource, whose existence is notified through change-of-state notifications of an index resource <xref target="I-D.bormann-t2trg-stp"/>.
Large numbers of events will cause the notification to grow large, as it needs to contain a large number of Web links.
Block-wise transfers <xref target="RFC7959"/> or pagination can help here.
When the links are ordered by freshness of the events, the first block or page can already contain all links to new events.
Then, observers do not need to retrieve the remaining blocks or pages from the server, but only the representations of the new event resources.</t>
        <t>An alternative pattern is to exploit the dual roles of IoT devices, in particular when using CoAP: they are usually client and server at the same time.
An endpoint interested in observing the events would subscribe to them by registering a callback URI at the origin server, e.g., using a POST request with the URI or a hypermedia document in the payload, and receiving the location of a temporary "subscription resource" as handle in the response.
The origin server would then publish events by sending requests containing the event data to the observer's callback URI; here POST can be used to add events to a collection located at the callback URI or PUT can be used when the event data is a new state that shall replace the outdated state at the callback URI.
The cancellation can be modeled through deleting the subscription resource.
This pattern makes the origin server responsible for delivering the event notifications.
This goes beyond retransmissions of messages;
the origin server is usually supposed to queue all undelivered events and to retry until successful delivery or explicit cancellation.
In HTTP, this pattern is known as REST Hooks.</t>
        <t>Methods for configuring server push and notification conditions with CoAP are provided by the CoRE Dynamic Resource Linking specification <xref target="I-D.ietf-core-dynlink"/>.</t>
        <t>In HTTP, there exist a number of workarounds to enable server push, e.g., long polling and streaming <xref target="RFC6202"/> or server-sent events <xref target="W3C.REC-html5-20141028"/>.
In IoT systems, long polling can introduce a considerable overhead, as the request has to be repeated for each notification.
Streaming and server-sent events (the latter is actually an evolution of the former) are more efficient, as only one request is sent.
However, there is only one response header and subsequent notifications can only have content.
Individual status and metadata needs to be included in the content message.
This reduces HTTP again to a pure transport, as its status signaling and metadata capabilities cannot be used.</t>
      </section>
    </section>
    <section anchor="sec-sec">
      <name>Security Considerations</name>
      <t>This document does not define new functionality and therefore does not introduce new security concerns.
We assume that system designers apply classic Web security on top of the basic RESTful guidance given in this document.
Thus, security protocols and considerations from related specifications apply to RESTful IoT design.
These include:</t>
      <ul spacing="normal">
        <li>
          <t>Transport Layer Security (TLS): <xref target="RFC8446"/>, <xref target="RFC5246"/>, and <xref target="RFC6347"/></t>
        </li>
        <li>
          <t>Internet X.509 Public Key Infrastructure: <xref target="RFC5280"/></t>
        </li>
        <li>
          <t>HTTP security: <xref section="11" sectionFormat="of" target="RFC9112"/>, <xref section="17" sectionFormat="of" target="RFC9110"/>, etc.</t>
        </li>
        <li>
          <t>CoAP security: <xref section="11" sectionFormat="of" target="RFC7252"/></t>
        </li>
        <li>
          <t>URI security: <xref section="7" sectionFormat="of" target="RFC3986"/></t>
        </li>
      </ul>
      <t>IoT-specific security is an active area of standardization at the time of writing.
First finalized specifications include:</t>
      <ul spacing="normal">
        <li>
          <t>(D)TLS Profiles for the Internet of Things: <xref target="RFC7925"/></t>
        </li>
        <li>
          <t>CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/></t>
        </li>
        <li>
          <t>CBOR Web Token <xref target="RFC8392"/></t>
        </li>
        <li>
          <t>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs) <xref target="RFC8747"/></t>
        </li>
        <li>
          <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/></t>
        </li>
        <li>
          <t>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework <xref target="RFC9200"/></t>
        </li>
        <li>
          <t>ACE profiles for DTLS <xref target="RFC9202"/> and OSCORE <xref target="RFC9203"/></t>
        </li>
      </ul>
      <t>Further IoT security considerations are available in <xref target="RFC8576"/>.</t>
    </section>
    <section anchor="acknowledgement">
      <name>Acknowledgement</name>
      <t>The authors would like to thank Mike Amundsen, Heidi-Maria Back, Carsten Bormann, Tero Kauppinen, Michael Koster, Mert Ocak, Robby Simpson, Ravi Subramaniam, Dave Thaler, Niklas Widell, and Erik Wilde for the reviews and feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="REST">
          <front>
            <title>Architectural Styles and the Design of Network-based Software Architectures</title>
            <author initials="R." surname="Fielding">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
          <seriesInfo name="Ph.D. Dissertation, University of California, Irvine" value=""/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9039">
          <front>
            <title>Uniform Resource Names for Device Identifiers</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes a new Uniform Resource Name (URN) namespace for hardware device identifiers. A general representation of device identity can be useful in many applications, such as in sensor data streams and storage or in equipment inventories. A URN-based representation can be passed along in applications that need the information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9039"/>
          <seriesInfo name="DOI" value="10.17487/RFC9039"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="W3C.REC-exi-20110310" target="https://www.w3.org/TR/2011/REC-exi-20110310/">
          <front>
            <title>Efficient XML Interchange (EXI) Format 1.0</title>
            <author fullname="John Schneider" role="editor"/>
            <author fullname="Takuki Kamiya" role="editor"/>
            <date day="10" month="March" year="2011"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-exi-20110310"/>
          <seriesInfo name="W3C" value="REC-exi-20110310"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC6202">
          <front>
            <title>Known Issues and Best Practices for the Use of Long Polling and Streaming in Bidirectional HTTP</title>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="S. Salsano" initials="S." surname="Salsano"/>
            <author fullname="G. Wilkins" initials="G." surname="Wilkins"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>On today's Internet, the Hypertext Transfer Protocol (HTTP) is often used (some would say abused) to enable asynchronous, "server- initiated" communication from a server to a client as well as communication from a client to a server. This document describes known issues and best practices related to such "bidirectional HTTP" applications, focusing on the two most common mechanisms: HTTP long polling and HTTP streaming. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6202"/>
          <seriesInfo name="DOI" value="10.17487/RFC6202"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="W3C.REC-html5-20141028" target="https://www.w3.org/TR/2014/REC-html5-20141028/">
          <front>
            <title>HTML5</title>
            <author fullname="Erika Doyle Navara" role="editor"/>
            <author fullname="Ian Hickson" role="editor"/>
            <author fullname="Robin Berjon" role="editor"/>
            <author fullname="Silvia Pfeiffer" role="editor"/>
            <author fullname="Steve Faulkner" role="editor"/>
            <author fullname="Theresa O'Connor" role="editor"/>
            <author fullname="Travis Leithead" role="editor"/>
            <date day="28" month="October" year="2014"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-html5-20141028"/>
          <seriesInfo name="W3C" value="REC-html5-20141028"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 by adding a column on the "URI Schemes"
   registry as well as a note on how that registry cooperates with the
   "CRI Scheme Numbers for Certain Unregistered Scheme Names" registry
   created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision -27 is a fixup to revision -26, which was missing
   // the fixes for Éric Vyncke's COMMENTs.  This is now intended to be
   // ready for document approval.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-27"/>
        </reference>
        <reference anchor="I-D.ietf-core-coral">
          <front>
            <title>The Constrained RESTful Application Language (CoRAL)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>ARM</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   The Constrained RESTful Application Language (CoRAL) defines a data
   model and interaction model as well as a compact serialization
   formats for the description of typed connections between resources on
   the Web ("links"), possible operations on such resources ("forms"),
   and simple resource metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coral-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-dynlink">
          <front>
            <title>Dynamic Resource Linking for Constrained RESTful Environments</title>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Bill Silverajan" initials="B." surname="Silverajan">
              <organization>Tampere University</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   This specification defines Link Bindings, which provide dynamic
   linking of state updates between resources, either on an endpoint or
   between endpoints, for systems using CoAP (RFC7252).

Editor note

   The git repository for the draft is found at https://github.com/core-
   wg/dynlink

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dynlink-14"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HATEOAS" target="https://roy.gbiv.com/untangled/2008/rest-apis-must-be-hypertext-driven">
          <front>
            <title>REST APIs must be hypertext-driven</title>
            <author initials="R." surname="Fielding">
              <organization/>
            </author>
            <date year="2008" month="October"/>
          </front>
        </reference>
        <reference anchor="RFC5789">
          <front>
            <title>PATCH Method for HTTP</title>
            <author fullname="L. Dusseault" initials="L." surname="Dusseault"/>
            <author fullname="J. Snell" initials="J." surname="Snell"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>Several applications extending the Hypertext Transfer Protocol (HTTP) require a feature to do partial resource modification. The existing HTTP PUT method only allows a complete replacement of a document. This proposal adds a new HTTP method, PATCH, to modify an existing HTTP resource. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5789"/>
          <seriesInfo name="DOI" value="10.17487/RFC5789"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8428">
          <front>
            <title>Sensor Measurement Lists (SenML)</title>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This specification defines a format for representing simple sensor measurements and device parameters in Sensor Measurement Lists (SenML). Representations are defined in JavaScript Object Notation (JSON), Concise Binary Object Representation (CBOR), Extensible Markup Language (XML), and Efficient XML Interchange (EXI), which share the common SenML data model. A simple sensor, such as a temperature sensor, could use one of these media types in protocols such as HTTP or the Constrained Application Protocol (CoAP) to transport the measurements of the sensor or to be configured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8428"/>
          <seriesInfo name="DOI" value="10.17487/RFC8428"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="I-D.bormann-t2trg-stp">
          <front>
            <title>The Series Transfer Pattern (STP)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
              <organization>Ericsson</organization>
            </author>
            <date day="7" month="April" year="2020"/>
            <abstract>
              <t>   Many applications make use of Series of data items, i.e., an array of
   data items where new items can be added over time.  Where such Series
   are to be made available using REST protocols such as CoAP or HTTP,
   the Series has to be mapped into a structure of one or more resources
   and a protocol for a client to obtain the Series and to learn about
   new items.

   Various protocols have been standardized that make Series-shaped data
   available, with rather different properties and objectives.  The
   present document is an attempt to extract a common underlying pattern
   and to define media types and an access scheme that can be used right
   away for further protocols that provide Series-shaped data.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-t2trg-stp-03"/>
        </reference>
        <reference anchor="I-D.handrews-json-schema-validation">
          <front>
            <title>JSON Schema Validation: A Vocabulary for Structural Validation of JSON</title>
            <author fullname="Austin Wright" initials="A." surname="Wright">
         </author>
            <author fullname="Henry Andrews" initials="H." surname="Andrews">
         </author>
            <author fullname="Ben Hutton" initials="B." surname="Hutton">
              <organization>Wellcome Sanger Institute</organization>
            </author>
            <date day="17" month="September" year="2019"/>
            <abstract>
              <t>   JSON Schema (application/schema+json) has several purposes, one of
   which is JSON instance validation.  This document specifies a
   vocabulary for JSON Schema to describe the meaning of JSON documents,
   provide hints for user interfaces working with JSON data, and to make
   assertions about what a valid document must look like.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-handrews-json-schema-validation-02"/>
        </reference>
        <reference anchor="I-D.hartke-core-apps">
          <front>
            <title>CoRE Applications</title>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
              <organization>Ericsson</organization>
            </author>
            <date day="22" month="October" year="2018"/>
            <abstract>
              <t>   The application programmable interfaces of RESTful, hypermedia-driven
   Web applications consist of a number of reusable components such as
   Internet media types and link relation types.  This document proposes
   "CoRE Applications", a convention for application designers to build
   the interfaces of their applications in a structured way, so that
   implementers can easily build interoperable clients and servers, and
   other designers can reuse the components in their own applications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hartke-core-apps-08"/>
        </reference>
        <reference anchor="I-D.amsuess-core-cachable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-11"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-safe-method-w-body">
          <front>
            <title>The HTTP QUERY Method</title>
            <author fullname="Julian Reschke" initials="J." surname="Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <author fullname="James M. Snell" initials="J. M." surname="Snell">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="29" month="September" year="2025"/>
            <abstract>
              <t>   This specification defines the QUERY method for HTTP.  A QUERY
   requests that the request target process the enclosed content in a
   safe/idempotent manner and then respond with the result of that
   processing.  This is similar to POST requests but can be
   automatically repeated or restarted without concern for partial state
   changes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-safe-method-w-body-12"/>
        </reference>
        <reference anchor="W3C-TD" target="https://www.w3.org/TR/wot-thing-description/">
          <front>
            <title>Web of Things (WoT) Thing Description</title>
            <author initials="S." surname="Kaebisch">
              <organization/>
            </author>
            <author initials="T." surname="Kamiya">
              <organization/>
            </author>
            <author initials="M." surname="McCool">
              <organization/>
            </author>
            <author initials="V." surname="Charpenay">
              <organization/>
            </author>
            <author initials="M." surname="Kovatsch">
              <organization/>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="IANA-media-types" target="http://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-CoAP-media" target="http://www.iana.org/assignments/core-parameters/core-parameters.xhtml#content-formats">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CollectionJSON" target="http://amundsen.com/media-types/collection/format/">
          <front>
            <title>Collection+JSON - Document Format</title>
            <author initials="M." surname="Amundsen">
              <organization/>
            </author>
            <date year="2013" month="February"/>
          </front>
        </reference>
        <reference anchor="BTCorev5.3" target="https://www.bluetooth.com/specifications/specs/core-specification-5-3/">
          <front>
            <title>Core Specification 5.3</title>
            <author>
              <organization>Bluetooth Special Interest Group</organization>
            </author>
            <date year="2021" month="July"/>
          </front>
        </reference>
        <reference anchor="POLYFILLS" target="https://www.w3.org/2001/tag/doc/polyfills/">
          <front>
            <title>Polyfills and the evolution of the Web</title>
            <author>
              <organization>W3C Technical Architecture Group (TAG)</organization>
            </author>
            <date year="2017" month="February"/>
          </front>
        </reference>
        <reference anchor="HCI" target="https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed">
          <front>
            <title>The Encyclopedia of Human-Computer Interaction</title>
            <author>
              <organization>Interaction Design Foundation</organization>
            </author>
            <date year="2013"/>
          </front>
          <refcontent>2nd Ed.</refcontent>
        </reference>
        <reference anchor="I-D.ietf-asdf-sdf">
          <front>
            <title>Semantic Definition Format (SDF) for Data and Interactions of Things</title>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>KTC Control AB</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>   The Semantic Definition Format (SDF) is concerned with Things, namely
   physical objects that are available for interaction over a network.
   SDF is a format for domain experts to use in the creation and
   maintenance of data and interaction models that describe Things.  An
   SDF specification describes definitions of SDF Objects/SDF Things and
   their associated interactions (Events, Actions, Properties), as well
   as the Data types for the information exchanged in those
   interactions.  Tools convert this format to database formats and
   other serializations as needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-asdf-sdf-25"/>
        </reference>
        <reference anchor="RFC8075">
          <front>
            <title>Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Castellani" initials="A." surname="Castellani"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="A. Rahman" initials="A." surname="Rahman"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="E. Dijk" initials="E." surname="Dijk"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document provides reference information for implementing a cross-protocol network proxy that performs translation from the HTTP protocol to the Constrained Application Protocol (CoAP). This will enable an HTTP client to access resources on a CoAP server through the proxy. This document describes how an HTTP request is mapped to a CoAP request and how a CoAP response is mapped back to an HTTP response. This includes guidelines for status code, URI, and media type mappings, as well as additional interworking advice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8075"/>
          <seriesInfo name="DOI" value="10.17487/RFC8075"/>
        </reference>
        <reference anchor="RFC8820">
          <front>
            <title>URI Design and Ownership</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t>
              <t>This document provides guidance on the specification of URI substructure in standards.</t>
              <t>This document obsoletes RFC 7320 and updates RFC 3986.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="190"/>
          <seriesInfo name="RFC" value="8820"/>
          <seriesInfo name="DOI" value="10.17487/RFC8820"/>
        </reference>
        <reference anchor="RFC6943">
          <front>
            <title>Issues in Identifier Comparison for Security Purposes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>Identifiers such as hostnames, URIs, IP addresses, and email addresses are often used in security contexts to identify security principals and resources. In such contexts, an identifier presented via some protocol is often compared using some policy to make security decisions such as whether the security principal may access the resource, what level of authentication or encryption is required, etc. If the parties involved in a security decision use different algorithms to compare identifiers, then failure scenarios ranging from denial of service to elevation of privilege can result. This document provides a discussion of these issues that designers should consider when defining identifiers and protocols, and when constructing architectures that use multiple protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6943"/>
          <seriesInfo name="DOI" value="10.17487/RFC6943"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub">
          <front>
            <title>A publish-subscribe architecture for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>Dogtiger Labs</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a publish-subscribe architecture for the
   Constrained Application Protocol (CoAP), extending the capabilities
   of CoAP communications for supporting endpoints with long breaks in
   connectivity and/or up-time.  CoAP clients publish on and subscribe
   to a topic via a corresponding topic resource at a CoAP server acting
   as broker.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-18"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC8576">
          <front>
            <title>Internet of Things (IoT) Security: State of the Art and Challenges</title>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="S. Kumar" initials="S." surname="Kumar"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>The Internet of Things (IoT) concept refers to the usage of standard Internet protocols to allow for human-to-thing and thing-to-thing communication. The security needs for IoT systems are well recognized, and many standardization steps to provide security have been taken -- for example, the specification of the Constrained Application Protocol (CoAP) secured with Datagram Transport Layer Security (DTLS). However, security challenges still exist, not only because there are some use cases that lack a suitable solution, but also because many IoT devices and systems have been designed and deployed with very limited security capabilities. In this document, we first discuss the various stages in the lifecycle of a thing. Next, we document the security threats to a thing and the challenges that one might face to protect against these threats. Lastly, we discuss the next steps needed to facilitate the deployment of secure IoT systems. This document can be used by implementers and authors of IoT specifications as a reference for details about security considerations while documenting their specific security challenges, threat models, and mitigations.</t>
              <t>This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8576"/>
          <seriesInfo name="DOI" value="10.17487/RFC8576"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
