%% You should probably cite draft-li-dhc-secure-dhcpv6-deployment-03 instead of this revision. @techreport{li-dhc-secure-dhcpv6-deployment-00, number = {draft-li-dhc-secure-dhcpv6-deployment-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-li-dhc-secure-dhcpv6-deployment/00/}, author = {Lishan Li and Yong Cui and Jianping Wu}, title = {{Opportunistic Security for DHCPv6}}, pagetotal = 6, year = 2015, month = oct, day = 10, abstract = {The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to configure network parameters. To secure DHCPv6, the authentication and encryption mechanisms are proposed to protect the DHCPv6 privacy information. However, how to deploy the secure DHCPv6 mechanisms for DHCPv6 is not specified. This draft analysis the DHCPv6 threat model and various key management schemes for DHCPv6 deployment, and recommend the opportunistic security for DHCPv6 deployment.}, }