@techreport{ohba-6tisch-security-01, number = {draft-ohba-6tisch-security-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ohba-6tisch-security/01/}, author = {Stephen Chasko and Subir Das and Rafael Marin-Lopez and Yoshihiro Ohba and Pascal Thubert and Alper E. Yegin}, title = {{Security Framework and Key Management Protocol Requirements for 6TiSCH}}, pagetotal = 11, year = 2014, month = mar, day = 22, abstract = {6TiSCH is enabling IPv6 over the TSCH mode of the IEEE802.15.4e standard that allows the IEEE 802.15.4e TSCH wireless networks and nodes to connect to the backbone network via layer 3 meshes over IPv6. In this operation of network architecture, understanding the security framework and requirements for key management protocols are critical. This document discusses such security framework and key management protocol requirements by highlighting different phases of key management in which a new node can securely join the network under the purview of overall 6TiSCH architecture.}, }