IETF 100 IoT Sessions Guide

Discover key IoT working groups and sessions at IETF 100 in Singapore shaping the future of connected devices.

By Sneha Tete, Integrated MA, Certified Relationship Coach
Created on

The Internet Engineering Task Force (IETF) plays a crucial role in defining the technical standards that power the Internet, including the rapidly expanding field of the Internet of Things (IoT). At IETF 100, held in Singapore, several sessions focused on IoT challenges, addressing everything from network constraints to security and interoperability. This guide provides an overview of the most significant IoT-related working groups and their agendas, offering insights into how these efforts are paving the way for scalable, secure, and efficient connected ecosystems.

Understanding the IETF’s Role in IoT Evolution

The IETF is the primary standards body for Internet protocols, producing Requests for Comments (RFCs) that detail everything from basic addressing to advanced application-layer technologies. In the IoT domain, the IETF tackles unique hurdles posed by resource-limited devices, such as sensors, smart appliances, and industrial controllers. These devices often operate on low-power networks with intermittent connectivity, necessitating specialized adaptations of core Internet protocols like IPv6.

Unlike traditional computing environments, IoT deployments demand lightweight solutions that minimize bandwidth, energy consumption, and computational overhead. IETF working groups collaborate openly, relying on ‘rough consensus and running code’ to validate proposals. At IETF 100, IoT sessions underscored ongoing progress in making the full Internet protocol stack viable for billions of constrained nodes expected by the end of the decade.

Core Working Group: Constrained RESTful Environments

The Constrained RESTful Environments (CoRE) Working Group stands out as one of the IETF’s most dynamic IoT initiatives. Its mission is to adapt the REST architectural style—familiar from the World Wide Web—to severely resource-constrained networks and devices. RESTful interactions rely on standard HTTP methods like GET, POST, and PUT, but CoRE optimizes these for tiny embedded systems with kilobytes of memory and milliwatts of power.

Key outputs include CoAP (Constrained Application Protocol), defined in RFC 7252, which mirrors HTTP over UDP for low-latency, multicast-capable communication. At IETF 100, the group convened twice—Monday and Tuesday afternoons—to review progress on resource directories, proxying mechanisms, and semantic interoperability. Resource directories act like lightweight DNS for IoT, enabling discovery of services across domains. These advancements are critical for smart cities, where thousands of devices must interoperate seamlessly.

  • CoAP Enhancements: Discussions on DTLS-secured group communications for secure pub/sub patterns.
  • Semantic Tools: Building on prior workshops, integrating JSON-LD and other formats for machine-readable descriptions.
  • Proxy Developments: Forwarding traffic between CoAP and HTTP realms efficiently.

This WG’s work ensures IoT devices can leverage Web-friendly architectures without sacrificing efficiency, fostering a unified application layer.

Adapting IPv6 for Resource-Scarce Networks

Full IPv6 adoption is foundational for IoT scalability, but standard IPv6 packets are too heavy for many low-power links. The IPv6 over Networks of Resource-constrained Nodes (6Lo) Working Group addresses this by devising compression and adaptation layers for diverse physical mediums. Their efforts enable native IPv6 connectivity, eliminating the need for protocol gateways that complicate management and security.

Published RFCs cover Bluetooth Low Energy (RFC 7668), Z-Wave (RFC 7428), DECT Ultra Low Energy, and even wired protocols like MS/TP over RS-485, common in HVAC systems. At IETF 100, sessions delved into emerging radio technologies and 6LoWPAN header compression refinements. This work directly supports Thread and other mesh networking stacks used in home automation.

TechnologyRFCApplications
Bluetooth LE7668Wearables, Beacons
Z-Wave7428Home Security
DECT ULE8103Cordless Devices
MS/TP8065Building Automation

By standardizing these adaptations, 6Lo ensures IoT devices join the global IPv6 Internet directly, enabling end-to-end security and mobility.

Routing Protocols for Low-Power Lossy Networks

Efficient routing is a cornerstone of IoT networks, where nodes form dynamic meshes over unreliable links. The Routing Over Low power and Lossy networks (ROLL) Working Group develops RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks), specified in RFC 6550. RPL constructs destination-oriented directed acyclic graphs (DODAGs), optimizing paths based on metrics like energy cost or latency.

IETF 100’s Wednesday afternoon slot featured ROLL discussions on industrial applications, urban sensor grids, and 6TiSCH integration for time-slotted channel access. RPL’s objective function allows customization for specific use cases, from upward routes to root gateways in smart metering to peer-to-peer in factory automation. Recent drafts address multicast efficiency and P2P route discovery, vital for video surveillance feeds in IoT.

  • Key Features: Loop avoidance, trickle timers for low overhead, and rank-based topology control.
  • Extensions: Support for multiple sinks and store-and-forward operations.
  • Real-World Impact: Deployed in Contiki-NG and OpenThread stacks.

Emerging Focus: Secure Firmware Updates

Software updates represent a critical vulnerability in IoT, where devices often lack robust update mechanisms. The Software Updates for Internet of Things (SUIT) Working Group, evolving from a BoF, held its inaugural formal session at IETF 100 on Monday afternoon. SUIT aims to standardize metadata and delivery formats for firmware images, ensuring integrity, authenticity, and rollback capabilities.

Four initial Internet-Drafts outlined a manifest structure, including component identification, invocation rules, and dependency handling. This addresses the ‘firmware update problem’—delivering large binaries over constrained links while resisting tampering. SUIT builds on CBOR (RFC 8949) for compact encoding and integrates with existing security protocols like CMS.

Challenges discussed included delta updates for bandwidth savings, trusted execution environments, and supply-chain verification. As IoT deployments proliferate, SUIT’s work will mitigate risks like Mirai botnets, which exploited outdated firmware.

Research Coordination and Interoperability Efforts

Beyond chartered WGs, the Thing-to-Thing Research Group (T2TRG) coordinates semantic and hypermedia approaches. Stemming from a Prague workshop, T2TRG explores knowledge graphs and link relations to enhance device discovery and mashups. IETF 100 sessions reviewed draft outputs on WoT (Web of Things) bindings and SenML media types for sensor data.

These efforts promote horizontal interoperability, allowing devices from different vendors to interact via standard descriptions rather than proprietary APIs.

Why IETF 100 Matters for IoT Stakeholders

For developers, manufacturers, and policymakers, IETF 100 highlighted the collaborative, pragmatic nature of Internet standardization. Sessions drew global experts, fostering consensus on thorny issues like power profiling and encryption overhead. Attendees could engage via datatracker.ietf.org, submitting feedback on drafts post-meeting.

Looking ahead, these protocols form the bedrock for 5G IoT, edge computing, and AI-driven networks. Participation is open—no membership fees, just technical contributions.

Frequently Asked Questions

What is the IETF?

The IETF develops voluntary Internet standards through open working groups, producing RFCs that underpin global connectivity.

How does CoAP differ from HTTP?

CoAP uses UDP for lower overhead and supports multicast, ideal for battery-powered devices, while confirming HTTP’s semantics.

Why is IPv6 essential for IoT?

IPv6 provides vast addressing space and end-to-end connectivity, enabling direct Internet access without NAT complications.

What is RPL routing?

RPL is a distance-vector protocol for lossy networks, forming efficient tree-like topologies with customizable metrics.

How will SUIT improve IoT security?

SUIT standardizes secure manifest formats, ensuring firmware authenticity and enabling safe remote updates.

References

  1. Introduction to the IETF — IETF. 2023-10-01. https://www.ietf.org/about/introduction/
  2. RFC 7252: The Constrained Application Protocol (CoAP) — IETF. 2014-06-01. https://datatracker.ietf.org/doc/html/rfc7252 (Authoritative standard for CoAP, remains relevant as foundational IoT protocol).
  3. RFC 6550: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks — IETF. 2012-03-01. https://datatracker.ietf.org/doc/html/rfc6550 (Core RPL specification, widely deployed and updated via extensions).
  4. RFC 8949: Concise Binary Object Representation (CBOR) — IETF. 2020-12-01. https://datatracker.ietf.org/doc/html/rfc8949
  5. The Tao of IETF — IETF. 2006-10-01. https://datatracker.ietf.org/doc/html/rfc4677 (Informational guide on IETF processes).
Sneha Tete
Sneha TeteBeauty & Lifestyle Writer
Sneha is a relationships and lifestyle writer with a strong foundation in applied linguistics and certified training in relationship coaching. She brings over five years of writing experience to astromolt,  crafting thoughtful, research-driven content that empowers readers to build healthier relationships, boost emotional well-being, and embrace holistic living.

Read full bio of Sneha Tete