#100: IESG comment #9 - Bootstrapping security threats
------------------------------------+---------------------------------------
Reporter: carle...@… | Owner:
Type: enhancement | Status: closed
Priority: minor | Milestone:
Component: routing-requirements | Version:
Severity: - | Resolution: fixed
Keywords: |
------------------------------------+---------------------------------------
Changes (by carle...@…):
* status: new => closed
* resolution: => fixed
Comment:
The document was updated to include the following:
A malicious node can obtain initial configuration information in order to
appear as a legitimate node and then carry out various types of attacks. A
malicious node can also keep legitimate nodes busy by broadcasting
authentication/join requests.
One possibility for mitigating such threats is the use of mutual
authentication schemes based on the use of pre-shared keys [1].
[1] M. Ikram et al., “A Simple Lightweight Authentic Bootstrapping
Protocol for IPv6-based Low rate Wireless Personal Area Networks
(6LoWPANs)”, IWCMC’09, Leipzig, Germany, June 2009.
--
Ticket URL: <http://wiki.tools.ietf.org/wg/6lowpan/trac/ticket/100#comment:1>
6lowpan <http://tools.ietf.org/6lowpan/>
_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan