FYI. Related to the security design. --Pekka http://www.slideshare.net/cpswan/security-protocols-in-constrained-environments