Dear all,

Do need an alternative security design instead of the current public key 
protocols in key establishment? It's one of arguments in previous WG meeting.

My answer is yes. Actually, the similar discussion had been raised in mobile 
IPv6 WG (RFC4225).

Besides the authentication, another major check is the reachability checking to 
verify if the claimed mobile node is reachable (section 4.1). RFC4225 also 
explains why the current Public Key Infrastructure (i.e. IKE) is not accepted 
in mobile IPv6 (section 5.2).
  
Frankly, the scheme used in KEMP is not fresh new. It is in style of the 
popular Kerberos. Instead of sending the ticket to visiting server from client 
directly in Kerberos, the ticket is sent to the visiting server (new nearby 
router in KEMP) from the KDC (base station in KEMP). The benefit of this 
modification includes: 1) reduce the communication; 2) the client (mobile node 
in KEMP) is check if reachable from the 3rd party (new nearby router); 3) 
revocation in time.

Thank to many WG participants commenting on the draft (inclusive Rene Struik, 
Steve Childress, Shoichi Sakane, Greg Zaverucha, Matthew Campagna), the draft 
should be more mature and stronger.

Regards
Qiu Ying


> -----Original Message-----
> From: QIU Ying [mailto:[email protected]]
> Sent: Tuesday, October 23, 2012 11:57 AM
> To: '[email protected]'; '[email protected]'
> Subject: FW: New Version Notification for draft-qiu-roll-kemp-02.txt
> 
> Hi,
> 
> The KEMP draft is updated. The messages in the draft will be carried in
> KMP format proposed by IEEE802.15.9 working group so that the KEMP
> protocol is compatible with IEEE802.15.9 and could be deployed in layer
> 2.
> 
> Regards
> Qiu Ying
> 
> 
> -----Original Message-----
> 
> A new version of I-D, draft-qiu-roll-kemp-02.txt has been successfully
> submitted by Ying Qiu and posted to the IETF repository.
> 
> Filename:      draft-qiu-roll-kemp
> Revision:      02
> Title:                 Lightweight Key Establishment and Management
> Protocol in Dynamic Sensor Networks (KEMP)
> Creation date:         2012-10-22
> WG ID:                 Individual Submission
> Number of pages: 20
> URL:             http://www.ietf.org/internet-drafts/draft-qiu-roll-
> kemp-02.txt
> Status:          http://datatracker.ietf.org/doc/draft-qiu-roll-kemp
> Htmlized:        http://tools.ietf.org/html/draft-qiu-roll-kemp-02
> Diff:            http://www.ietf.org/rfcdiff?url2=draft-qiu-roll-kemp-
> 02
> 
> Abstract:
>    When a sensor node roams within a very large and distributed
> wireless
>    sensor network, which consists of numerous sensor nodes, its routing
>    path and neighborhood keep changing.  In order to provide a high
>    level of security in this environment, the moving sensor node needs
>    to be authenticated to new neighboring nodes as well as to establish
>    a key for secure communication.  The document proposes an efficient
>    and scalable protocol to establish and update the secure key in a
>    dynamic wireless sensor network environment.  The protocol
> guarantees
>    that two sensor nodes share at least one key with probability 1
>    (100%) with less memory and energy cost, while not causing
>    considerable communication overhead.
> 
> 
> 
> 
> The IETF Secretariat

Institute for Infocomm Research disclaimer:  "This email is confidential and 
may be privileged. If you are not the intended recipient, please delete it and 
notify us immediately. Please do not copy or use it for any purpose, or 
disclose its contents to any other person. Thank you."
_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan

Reply via email to