6tisch secure join using 6top
draft-richardson-6tisch--security-6top-04
Document | Type |
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
|
|
---|---|---|---|
Author | Michael Richardson | ||
Last updated | 2015-05-15 (Latest revision 2014-11-11) | ||
RFC stream | (None) | ||
Formats | |||
Reviews |
SECDIR Early review
by Tero Kivinen
Not ready
SECDIR Early review
by Hilarie Orman
Not ready
|
||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document details a security architecture that permits a new 6tisch compliant node to join an 802.15.4e network. The process bootstraps the new node authenticating the node to the network, and the network to the node, and configuring the new node with the required 6tisch schedule. Any resemblance to WirelessHART/IEC62591 is entirely intentional.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)