The 6TiSCH WG has produced a set of documents [1,2] that specify the use of OSCORE to secure message exchanges at the application layer including network access. At the side meeting in Prague two years ago involving several ADs and WG chairs, the 6TiSCH chairs have indicated the need for an efficient authenticated key exchange protocol that we could use during the network access to key OSCORE. We have also restated this request at the SECDISPATCH interim a couple of weeks ago.
The EDHOC specification was discussed on numerous occasions during the 6TiSCH working group meetings and the approach on using it for the extension of [1] towards zero-touch [3] deployments had a wide consensus. We welcome the work in this area to be done, and strongly support any decision of the security ADs that leads to the fast progress of this specification. [1] [ https://datatracker.ietf.org/doc/draft-ietf-6tisch-minimal-security/ | https://datatracker.ietf.org/doc/draft-ietf-6tisch-minimal-security/ ] [2] [ https://datatracker.ietf.org/doc/draft-ietf-6tisch-architecture/ | https://datatracker.ietf.org/doc/draft-ietf-6tisch-architecture/ ] [3] [ https://datatracker.ietf.org/doc/draft-ietf-6tisch-dtsecurity-zerotouch-join/ | https://datatracker.ietf.org/doc/draft-ietf-6tisch-dtsecurity-zerotouch-join/ ]
_______________________________________________ 6tisch mailing list [email protected] https://www.ietf.org/mailman/listinfo/6tisch
