Minimal Security Framework for 6TiSCH

The information below is for an old version of the document
Document Type None Internet-Draft (6tisch WG)
Last updated 2017-03-12
Replaces draft-vucinic-6tisch-minimal-security
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None)
Document shepherd No shepherd assigned
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document describes the minimal mechanisms required to support secure enrollment of a pledge, a device being added to an IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) network. It assumes that the pledge has been provisioned with a credential that is relevant to the deployment - the "one-touch" scenario. The goal of this configuration is to set link-layer keys, and to establish a secure end-to-end session between each pledge and the join registrar who may use that to further configure the pledge. Additional security behaviors and mechanisms may be added on top of this minimal framework.


Mališa Vučinić (
Jonathan Simon (
Kris Pister (
Michael Richardson (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)