Secure communication between a resource-constrained device and remote
network nodes over a network with the resource-constrained acting as a
network node. The remote network nodes communicate with the
resource-constrained device using un-modified network clients and
servers. Executing on the resource-constrained device, a communications
module implements one or more link layer communication protocols,
operable to communicate with a host computer, operable to communicate
with remote network nodes and operable to implement network security
protocols thereby setting a security boundary inside the
resource-constrained device.