6band -- 6lo Bootstrapping, Access for Networked Devices | |
|
|
About 6band | |
The scope of this mailing list is mainly to address threat analysis of 6lo networks, secure bootstrapping and evaluating solutions for constrained node devices in constrained-L2-access technology networks. The problem scope is limited to secure network access/bootstrapping of the 6lo nodes. This interest group may also discuss interfaces between network layer and Application layer for sharing security association. The scope of this work does not include Application level security work . The goal is to identify existing candidate technologies or needs for new development of bootstrapping mechanisms. To see the collection of prior postings to the list, visit the 6band Archives. |
|
Using 6band | |
To post a message to all the list members, send email to
6band@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to 6band | |
Subscribe to 6band by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. This is a private list, which means that the list of members is not available to non-members. | |
6band Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |