Skip to main content

table of contents for security architecture
draft-richardson-6tisch-table-of-contents-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Author Michael Richardson
Last updated 2014-06-03
RFC stream (None)
Formats
Additional resources
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-richardson-6tisch-table-of-contents-00
Network Working Group                                      M. Richardson
Internet-Draft                                                       SSW
Intended status: Informational                             June 03, 2014
Expires: December 05, 2014

              table of contents for security architecture
              draft-richardson-6tisch-table-of-contents-00

Abstract

   This is a template for a security architecture.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 05, 2014.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Richardson              Expires December 05, 2014               [Page 1]
Internet-Draft          6tisch-table-of-contents               June 2014

Table of Contents

   1.  security requirements . . . . . . . . . . . . . . . . . . . .   2
     1.1.  thread model  . . . . . . . . . . . . . . . . . . . . . .   2
     1.2.  implementation cost . . . . . . . . . . . . . . . . . . .   2
     1.3.  denial of service . . . . . . . . . . . . . . . . . . . .   2
   2.  protocol requirements/constraints/assumptions . . . . . . . .   2
     2.1.  inline/offline  . . . . . . . . . . . . . . . . . . . . .   2
   3.  time sequence diagram . . . . . . . . . . . . . . . . . . . .   3
     3.1.  explanation of each step  . . . . . . . . . . . . . . . .   3
     3.2.  size of each packet . . . . . . . . . . . . . . . . . . .   3
   4.  resulting security properties obtained from this process  . .   3
   5.  deployment scenarios underlying protocol requirements . . . .   3
   6.  device identification . . . . . . . . . . . . . . . . . . . .   3
     6.1.  PCE/Proxy vs Node identification  . . . . . . . . . . . .   3
     6.2.  Time source authentication / time validation  . . . . . .   3
     6.3.  description of certificate contents . . . . . . . . . . .   3
     6.4.  privacy aspects . . . . . . . . . . . . . . . . . . . . .   3
   7.  slotframes to be used during join . . . . . . . . . . . . . .   3
   8.  configuration aspects . . . . . . . . . . . . . . . . . . . .   3
   9.  authorization aspects . . . . . . . . . . . . . . . . . . . .   3
     9.1.  how to determine a proxy/PCE from a end node  . . . . . .   3
     9.2.  security considerations . . . . . . . . . . . . . . . . .   3
   10. security architecture . . . . . . . . . . . . . . . . . . . .   4
   11. Posture Maintenance . . . . . . . . . . . . . . . . . . . . .   4
   12. Security Considerations . . . . . . . . . . . . . . . . . . .   4
   13. Other Related Protocols . . . . . . . . . . . . . . . . . . .   4
   14. IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   15. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   4
   16. Normative references  . . . . . . . . . . . . . . . . . . . .   4
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   4

1.  security requirements

1.1.  thread model

1.2.  implementation cost

   (storage of security material, computational cost)

1.3.  denial of service

   other communication impacts of security protocol mechanics

2.  protocol requirements/constraints/assumptions

2.1.  inline/offline

Richardson              Expires December 05, 2014               [Page 2]
Internet-Draft          6tisch-table-of-contents               June 2014

   dependencies on centralized or external functionality, inline and
   offline

3.  time sequence diagram

3.1.  explanation of each step

3.2.  size of each packet

   and number of frames needed to contain it.

4.  resulting security properties obtained from this process

5.  deployment scenarios underlying protocol requirements

6.  device identification

6.1.  PCE/Proxy vs Node identification

6.2.  Time source authentication / time validation

   Note: RPL Root authentication is a chartered item

6.3.  description of certificate contents

6.4.  privacy aspects

7.  slotframes to be used during join

   how is this communicated in the (extended) beacon.

8.  configuration aspects

   (allocation of slotframes after join, network statistics,
   neighboetc.)

9.  authorization aspects

   lifecycle (key management, trust management)

9.1.  how to determine a proxy/PCE from a end node

9.2.  security considerations

   what prevents a node from transmitting when it is not their turn
   (part one: jamming)

Richardson              Expires December 05, 2014               [Page 3]
Internet-Draft          6tisch-table-of-contents               June 2014

   can a node successfully communicate with a peer at a time when not
   supposed to, may be tied to link layer security, or will it be
   policed by receiver?

10.  security architecture

   security architecture and fit of e.g. join protocol and provisioning
   into this

11.  Posture Maintenance

   (SACM related work)

12.  Security Considerations

13.  Other Related Protocols

14.  IANA Considerations

15.  Acknowledgements

16.  Normative references

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

Author's Address

   Michael C. Richardson
   Sandelman Software Works
   470 Dawson Avenue
   Ottawa, ON  K1Z 5V7
   CA

   Email: mcr+ietf@sandelman.ca
   URI:   http://www.sandelman.ca/

Richardson              Expires December 05, 2014               [Page 4]