datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Security Framework and Key Management Protocol Requirements for 6TSCH
draft-ohba-6tsch-security-01

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2014-01-13 (latest revision 2013-07-12)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
http://tools.ietf.org/id/draft-ohba-6tsch-security

Abstract

Since 6TSCH forms layer 3 meshes over IPv6, use of key management protocols defined at layer 3 or above matches the target architecture so they can apply for the process by a new device of joining the mesh to extend it. This document details that particular operation within the whole 6TSCH architecture.

Authors

Stephen Chasko <stephen.chasko@landisgyr.com>
Subir Das <sdas@appcomsci.com>
Rafael Lopez <rafa@um.es>
Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp>
Pascal Thubert <pthubert@cisco.com>
Alper Yegin <alper.yegin@yegin.org>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)