6lo Bootstrapping, Access for Networked Devices

The scope of this mailing list is mainly to address threat analysis of 6lo networks, secure bootstrapping and evaluating solutions for constrained node devices in constrained-L2-access technology networks. The problem scope is limited to secure network access/bootstrapping of the 6lo nodes. This interest group may also discuss interfaces between network layer and Application layer for sharing security association. The scope of this work does not include Application level security work . The goal is to identify existing candidate technologies or needs for new development of bootstrapping mechanisms.

To contact the list owners, use the following email address:


IETF Mailarchive

Subscription / Unsubscription

To subscribe or unsubscribe from this list, please sign in first. If you have not previously signed in, you may need to set up an account with the appropriate email address.

Sign In

You can also subscribe without creating an account. If you wish to do so, please use the form below.