Skip to main content

Deterministic Networking (DetNet) Security Considerations
draft-sdt-detnet-security-01

Document Type Replaced Internet-Draft (candidate for detnet WG)
Expired & archived
Authors Tal Mizrahi , Ethan Grossman , Andrew J. Hacker , Subir Das , John Dowdell , Henrik Austad , Kevin Stanton , Norman Finn
Last updated 2017-09-12 (Latest revision 2017-07-02)
Replaced by draft-ietf-detnet-security
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-detnet-security
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

A deterministic network is one that can carry data flows for real- time applications with extremely low data loss rates and bounded latency. Deterministic networks have been successfully deployed in real-time operational technology (OT) applications for some years (for example [ARINC664P7]). However, such networks are typically isolated from external access, and thus the security threat from external attackers is low. IETF Deterministic Networking (DetNet) specifies a set of technologies that enable creation of deterministic networks on IP-based networks of potentially wide area (on the scale of a corporate network) potentially bringing the OT network into contact with Information Technology (IT) traffic and security threats that lie outside of a tightly controlled and bounded area (such as the internals of an aircraft). These DetNet technologies have not previously been deployed together on a wide area IP-based network, and thus can present security considerations that may be new to IP- based wide area network designers. This draft, intended for use by DetNet network designers, provides insight into these security considerations. In addition, this draft collects all security- related statements from the various DetNet drafts (Architecture, Use Cases, etc) into a single location Section 7.

Authors

Tal Mizrahi
Ethan Grossman
Andrew J. Hacker
Subir Das
John Dowdell
Henrik Austad
Kevin Stanton
Norman Finn

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)