IPv6 over Low Power WPAN Security Analysis (draft-daniel-6lowpan-security-analysis-02) - PowerPoint PPT Presentation

About This Presentation
Title:

IPv6 over Low Power WPAN Security Analysis (draft-daniel-6lowpan-security-analysis-02)

Description:

Considering how to make a secure 6lowpan. In a nutshell. Security threats ... Suggesting example scenarios with solutions in different cases. Moving forward ... – PowerPoint PPT presentation

Number of Views:93
Avg rating:3.0/5.0
Slides: 7
Provided by: Dan5329
Learn more at: https://www.ietf.org
Category:

less

Transcript and Presenter's Notes

Title: IPv6 over Low Power WPAN Security Analysis (draft-daniel-6lowpan-security-analysis-02)


1
IPv6 over Low Power WPAN Security
Analysis(draft-daniel-6lowpan-security-analysis-0
2)
  • Soohong Daniel Park
  • K. Kim, E. Seo, S. Chakrabarti, J. Laganier

2
Changes from 01
  • Pulling TBDs out
  • Adding a new author (Julien Laganier)
  • Editorial improvements

3
Background
  • The RFC4919 describes two security concerns as
    follows
  • In Section 4.6 Security Although IEEE 802.15.4
    provides AES link layer security, a complete
    end-to-end security is needed.
  • In Section 5 Goals Security threats at different
    layers must be clearly understood and documented.
    Bootstrapping of devices into a secure network
    could also be considered given the location,
    limited display, high density and ad hoc
    deployment of devices.

4
Outlook on the draft
  • Focusing on the IP security
  • MAC security is out of scope
  • Focusing on the problem spaces
  • Solution is out of scope
  • 6lowpan can support IP security as it is ?
  • Describing difficulties of adopting IPSec to
    6lowpan
  • Considering how to make a secure 6lowpan

5
In a nutshell
  • Security threats
  • Security analysis
  • IEEE 802.15.4 security analysis
  • IP Security analysis
  • Key Management in 6lowpan
  • Security consideration in bootstrapping a 6lowpan
    node
  • Collaborating with 6lowpan commissioning/bootstrap
    ping
  • Possible scenario using different levels of
    security
  • Suggesting example scenarios with solutions in
    different cases

6
Moving forward
  • Further contributions are needed
  • Starting point not to waste much time
  • Stamp ietf on the draft to be moved forward
Write a Comment
User Comments (0)
About PowerShow.com