Another emerging pattern of new nodes is the ability to configure resource definitions for external resources that are used within a message flow, independently of the nodes that use those resources.
The new protocol enjoys many secure properties such as the reliability of the node's identity, the message integrity, the forward security and the session key independence.