msec-4----Page:7
1  2  3  4  5  6  7  8 

Solution 3: MIKEYv2, a re-design(3/3)
More design choices:
Is ID protection necessary?
What kind?
Active/Passive Initiator/Responder ID protection are the choices
SIGMA can provide this
Who starts the KM protocol?
Answerer, it seems like
The answerer does have an idea of who the offerer is
No Active Responder ID protection possible
PPT Version