Layer-2 security aspects for the IEEE 802.15.4e MAC
draft-piro-6tisch-security-issues-03
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Giuseppe Piro , Gennaro Boggia , Luigi Alfredo Grieco | ||
| Last updated | 2015-06-14 (Latest revision 2014-12-11) | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-piro-6tisch-security-issues-03.txt
Abstract
The aim of this Internet Draft is to define standard compliant procedures for configuring layer-2 security services in IEEE 802.15.4e-based Low-power and Lossy Networks. In particular, it provides a review of security aspects presented in both IEEE 802.15.4-2011 and IEEE 802.15.4e-2012 specifications, the classification of secure network configurations and layer-2 keys, the description of a set of consecutive steps required to establish a layer-2 secure link, and a lightweight Key Management Protocol designed for negotiating a layer-2 one-hop link key. As the final goal, the document would describe how security MAC attributes can by initialized and updated in order to offer layer-2 security services in real networks.
Authors
Giuseppe Piro
Gennaro Boggia
Luigi Alfredo Grieco
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)