Layer-2 security aspects for the IEEE 802.15.4e MAC
draft-piro-6tisch-security-issues-03
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Giuseppe Piro , Gennaro Boggia , Luigi Alfredo Grieco | ||
Last updated | 2015-06-14 (Latest revision 2014-12-11) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The aim of this Internet Draft is to define standard compliant procedures for configuring layer-2 security services in IEEE 802.15.4e-based Low-power and Lossy Networks. In particular, it provides a review of security aspects presented in both IEEE 802.15.4-2011 and IEEE 802.15.4e-2012 specifications, the classification of secure network configurations and layer-2 keys, the description of a set of consecutive steps required to establish a layer-2 secure link, and a lightweight Key Management Protocol designed for negotiating a layer-2 one-hop link key. As the final goal, the document would describe how security MAC attributes can by initialized and updated in order to offer layer-2 security services in real networks.
Authors
Giuseppe Piro
Gennaro Boggia
Luigi Alfredo Grieco
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)