6tisch secure join using 6top
draft-richardson-6tisch--security-6top-05
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Michael Richardson | ||
Last updated | 2016-05-23 (Latest revision 2015-11-20) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Reviews | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document details a security architecture that permits a new 6tisch compliant node to join an 802.15.4e network. The process bootstraps the new node authenticating the node to the network, and the network to the node, and configuring the new node with the required 6tisch schedule. Any resemblance to WirelessHART/IEC62591 is entirely intentional.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)