DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs)
draft-keoh-tls-multicast-security-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Sye Keoh , Sandeep Kumar , Esko Dijk | ||
Last updated | 2013-04-18 (Latest revision 2012-10-15) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Wireless IP-based systems will be increasingly used for building control systems in the future where wireless devices interconnect with each other, forming low-power and lossy networks (LLNs). The CoAP/6LoWPAN standards are emerging as the de-facto protocols in this area for resource-constrained devices. Both multicast and security are key needs in these networks. This draft presents a method for securing multicast communication in LLNs based on the DTLS security protocol which is already present in CoAP devices. This is achieved by using unicast DTLS-protected communication channel to distribute keying material and security parameters to group members. Group keys consisting of a Traffic Encryption Key (TEK) and a Traffic Authentication Key (TAK) are generated by group members based on the keying material received. A group member uses its DTLS record layer implementation to encrypt a multicast message and provide message authentication using the group keys before sending the message via IP multicast to the group.
Authors
Sye Keoh
Sandeep Kumar
Esko Dijk
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)