Deterministic Networking (DetNet) Security Considerations
draft-sdt-detnet-security-01
Document | Type |
Replaced Internet-Draft
(candidate for detnet WG)
Expired & archived
|
|
---|---|---|---|
Authors | Tal Mizrahi , Ethan Grossman , Andrew J. Hacker , Subir Das , John Dowdell , Henrik Austad , Kevin Stanton , Norman Finn | ||
Last updated | 2017-09-12 (Latest revision 2017-07-02) | ||
Replaced by | draft-ietf-detnet-security | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Call For Adoption By WG Issued | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-detnet-security | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
A deterministic network is one that can carry data flows for real- time applications with extremely low data loss rates and bounded latency. Deterministic networks have been successfully deployed in real-time operational technology (OT) applications for some years (for example [ARINC664P7]). However, such networks are typically isolated from external access, and thus the security threat from external attackers is low. IETF Deterministic Networking (DetNet) specifies a set of technologies that enable creation of deterministic networks on IP-based networks of potentially wide area (on the scale of a corporate network) potentially bringing the OT network into contact with Information Technology (IT) traffic and security threats that lie outside of a tightly controlled and bounded area (such as the internals of an aircraft). These DetNet technologies have not previously been deployed together on a wide area IP-based network, and thus can present security considerations that may be new to IP- based wide area network designers. This draft, intended for use by DetNet network designers, provides insight into these security considerations. In addition, this draft collects all security- related statements from the various DetNet drafts (Architecture, Use Cases, etc) into a single location Section 7.
Authors
Tal Mizrahi
Ethan Grossman
Andrew J. Hacker
Subir Das
John Dowdell
Henrik Austad
Kevin Stanton
Norman Finn
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)