Re: [6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt

2019-03-22 Thread Marco Tiloca
Hi Yatch, Thanks for your comments! The attack as such abstracts away from the specific approach that the adversary adopts to previously acquire node addresses. This can possibly rely, for example, on traffic analysis to correlate with physical position and observable events/outcomes triggered

Re: [6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt

2019-03-21 Thread Yasuyuki Tanaka
Hi Marco, I'd like to ask you to help me understand the attack (>_<) https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01#section-3.2 > 3.2. Attack Example > > (snip) > >2. The adversary picks a channel 'f*' at random, and monitors it for >N_C consecutive

[6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt

2018-12-17 Thread Marco Tiloca
Hi all, We have just submitted a new version of our draft describing how to alter the communication pattern of network nodes to counteract selective jamming. https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 This update especially addresses the comments from IETF 103, by