Security Architectural Design Considerations for Low-Power Wireless Sensor Networks
draft-struik-6lowapp-security-considerations-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Rene Struik | ||
Last updated | 2009-10-20 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
We discuss security architectural design considerations for general-purpose multi-hop ad-hoc networks. The security architecture fits extremely constrained wireless environments, such as sensor networks, while remaining uniform and general enough to fit any wireless network. The design is tailored towards low overall implementation cost, supports semi-automatic lifecycle management, including ease of installation and configuration, scalability, survivability, mobility, and is adaptable towards network topology changes and towards different trust models underlying network operations.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)