@techreport{richardson-6tisch-security-architecture-02, number = {draft-richardson-6tisch-security-architecture-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-richardson-6tisch-security-architecture/02/}, author = {Michael Richardson}, title = {{security architecture for 6top: requirements and structure}}, pagetotal = 13, year = 2014, month = apr, day = 28, abstract = {This document details security requirements for 6tisch nodes that use 6top in an industrial settings. Layer-2 and a layer-4 authentication and authorization requirements and assumptions are identified. Two approaches to accomplishing these requirements are outlined, with the goal of eventually picking one. This internet-draft is intended for later inclusion into the 6tisch architecture document.}, }