For network layer security, two models are applicable: end-to-end security, e.g. using IPsec transport mode, or security that is limited to the wireless portion of the network, e.g. using a security gateway and IPsec tunnel mode. The disadvantage of the latter is the larger header size, which is significant at the 6lowpan frame MTUs. To simplify


I am not in favor of security gateway, but if we do, it will not necessarily increase the packet overhead of lowpan becuase I assume the security gateway will be at the edge
of the lowpan network - right ?
If we implement IPSec tunnel mode - in lowpan then there is a significant overhead which is not desirtable. Should we even consider IPSec tunnel mode within the 6lowpan network? Or does the above mean that the IPSec tunnel at the security gateway?

In conjunction with IPSec, we also need to mention that 6lowpan will need to choose an
appropriate key-management scheme applicable for 6lowpan characteristics.

Sorry, I don't have  a replacement text prepared to provide right away.

Regards,
-Samita

6lowpan implementations, it would be beneficial to identify a preferred set of ciphersuites that are appropriate given the 6lowpan constraints.



_______________________________________________
6lowpan mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/6lowpan




_______________________________________________
6lowpan mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/6lowpan

Reply via email to