HI ACE ML!

We just updated a new I-D. "Lightweight Authenticated Time (LATe)
Synchronization Protocol"

The document defines a secure time synchronization protocol for
constrained environments; the protocol is first described from an
abstract point on view and later is also mapped on top of the ACE
architecture. The goal is to define the simplest yet-'secure' protocol
for time synchronization possible.

The need for a secure source of time is getting clearer on ACE (either
that, or mechanisms to assure freshness of each transaction), and we
hope that with this protocol we are giving the first step to come up
with a constrained-resource friendly solution.

The base protocol definition, I hope, can be read fast and in an easy way.
Feedback will be very appreciated!

Security is not optional nor approximate, so further work will be done
in analyzing/testing the security properties and attacks of the base
protocol.

Regards,

Renzo

---------- Forwarded message ----------
From: <[email protected]>
Date: Mon, Oct 31, 2016 at 3:05 PM
Subject: New Version Notification for
draft-navas-ace-secure-time-synchronization-00.txt
To: Ludwig Seitz <[email protected]>, Renzo Navas
<[email protected]>, Goeran Selander
<[email protected]>



A new version of I-D, draft-navas-ace-secure-time-synchronization-00.txt
has been successfully submitted by Renzo Navas and posted to the
IETF repository.

Name:           draft-navas-ace-secure-time-synchronization
Revision:       00
Title:          Lightweight Authenticated Time (LATe) Synchronization Protocol
Document date:  2016-10-31
Group:          Individual Submission
Pages:          20
URL:
https://www.ietf.org/internet-drafts/draft-navas-ace-secure-time-synchronization-00.txt
Status:
https://datatracker.ietf.org/doc/draft-navas-ace-secure-time-synchronization/
Htmlized:
https://tools.ietf.org/html/draft-navas-ace-secure-time-synchronization-00


Abstract:
   This documents defines the Lightweight Authenticated Time (LATe)
   Synchronization Protocol, a secure time synchronization protocol for
   constrained environments.  The messages are encoded using Concise
   Binary Object Representation (CBOR) and basic security services are
   provided by CBOR Object Signing and Encryption (COSE).  A secure
   source of time is a base assumption for many other services,
   including security services.  LATe Synchronization protocol enables
   these time-dependent services to run in the context of a constrained
   environment.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to