Hi All,

In draft-ietf-6tisch-6top-protocol-03, the security considerations section implies no additional security mechanisms for 6top — instead, the draft relies on existing layer-2 security mechanisms for integrity and confidentiality.

I was curious if others in the WG have considered whether or not a one-hop neighbor is “authorized” to add a cell to another neighbor’s schedule?  We’re assuming if a neighbor has securely joined the network, then all neighbors are implicitly authorized to modify each other’s schedule (or possibly a PCE is authorized).

In looking at the IEEE 802.15.12 ULI work, there may be an opportunity to introduce authorization into the ULI, and the ACE group has one solution for potentially enabling this functionality.

Just curious if anyone on the list has considered authorization as a third security vector for 6top, in addition to confidentiality and integrity.

Thanks!

Randy

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to