The 6TiSCH WG has produced a set of documents [1,2] that specify the use of 
OSCORE to secure message exchanges at the application layer including network 
access. At the side meeting in Prague two years ago involving several ADs and 
WG chairs, the 6TiSCH chairs have indicated the need for an efficient 
authenticated key exchange protocol that we could use during the network access 
to key OSCORE. We have also restated this request at the SECDISPATCH interim a 
couple of weeks ago. 

The EDHOC specification was discussed on numerous occasions during the 6TiSCH 
working group meetings and the approach on using it for the extension of [1] 
towards zero-touch [3] deployments had a wide consensus. We welcome the work in 
this area to be done, and strongly support any decision of the security ADs 
that leads to the fast progress of this specification. 

[1] [ https://datatracker.ietf.org/doc/draft-ietf-6tisch-minimal-security/ | 
https://datatracker.ietf.org/doc/draft-ietf-6tisch-minimal-security/ ] 
[2] [ https://datatracker.ietf.org/doc/draft-ietf-6tisch-architecture/ | 
https://datatracker.ietf.org/doc/draft-ietf-6tisch-architecture/ ] 
[3] [ 
https://datatracker.ietf.org/doc/draft-ietf-6tisch-dtsecurity-zerotouch-join/ | 
https://datatracker.ietf.org/doc/draft-ietf-6tisch-dtsecurity-zerotouch-join/ ] 

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to