>  
> > Since we are routing at the link-layer, it would be better if we
> > have tighter link-level security and then application level security
> > using crypto.   Perhaps the protocols running on top of LowPan
> > can run some security protocols  that are appropriate for this kind
> > of network.
> > 
> > Comments?
> 
> Current draft said; (in both problem statements and goals)
> 
> 4.6  Security
> 
> Although IEEE 802.15.4 provides AES link layer security, a complete
> end-to-end security is needed.
> 
> 8.  Security threats at different layers must be clearly understood
> and documented.  Bootstrapping of devices into a secure network
> could also be considered given the location, limited display,
> high density and ad hoc deployment of devices.
> 
>

Ok. Thanks. I missed the text in Section 8.
 
> 
> So, I prefer not to address more specific something in Security 
Considerations. Just refering them into Security Considerations would be fine 
for me. If rechartering requires more details on security issue, it could be a 
separated document (at least *6lowpan security threat analysis*).

Makes sense to me.

-Samita


_______________________________________________
6lowpan mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/6lowpan

Reply via email to