#100: IESG comment #9 -   Bootstrapping security threats
------------------------------------+---------------------------------------
 Reporter:  carle...@…              |        Owner:        
     Type:  enhancement             |       Status:  closed
 Priority:  minor                   |    Milestone:        
Component:  routing-requirements    |      Version:        
 Severity:  -                       |   Resolution:  fixed 
 Keywords:                          |  
------------------------------------+---------------------------------------
Changes (by carle...@…):

  * status:  new => closed
  * resolution:  => fixed


Comment:

 The document was updated to include the following:

 A malicious node can obtain initial configuration information in order to
 appear as a legitimate node and then carry out various types of attacks. A
 malicious node can also keep legitimate nodes busy by broadcasting
 authentication/join requests.

 One possibility for mitigating such threats is the use of mutual
 authentication schemes based on the use of pre-shared keys [1].

 [1]     M. Ikram et al., “A Simple Lightweight Authentic Bootstrapping
 Protocol for IPv6-based Low rate Wireless Personal Area Networks
 (6LoWPANs)”, IWCMC’09, Leipzig, Germany, June 2009.

-- 
Ticket URL: <http://wiki.tools.ietf.org/wg/6lowpan/trac/ticket/100#comment:1>
6lowpan <http://tools.ietf.org/6lowpan/>

_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan

Reply via email to