I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This informational draft discusses the terminology used in networks of constrained-devices that will elucidate further standardization work and research in this area. The security considerations section does exist and defers relevant security aspects to i) the general considerations of constrained-device (RFC7252) security mechanisms, ii) specific constrained-device protocol RFCs (e.g., RFC7416 for Routing Protocol for Low-Power and Lossy Networks (RLP)), iii) the implementation security considerations of security protocols on constrained devices (RFC7815), and iv) a high-level view of constrained-device security (RFC8576). I agree with these assertions and appears to be comprehensive. General comments: None. Editorial comments: None.