dtnrg-1----Page:7
1  2  3  4  5  6  7 

Tentative Requirements
1. No single KM scheme will work for all DTNs therefore a set of schemes, or a framework, is REQUIRED.
2. All schemes MUST support some well-defined BSP ciphersuite(s).
3. At least one scheme SHOULD be defined for each of:
1. Manual keying, i.e. pre-shared secrets or pre-installed public keys;
2. Key transport & key agreement options.
4. Schemes SHOULD be able to use extension blocks to piggy-back KM information with application-data handling bundles.
5. Schemes MAY involve use of specific bundle payloads.
6. Some schemes MUST be defined using standard, well-known techniques (e.g. RSA key transport).
7. DTN node connectivity, computation and storage capabilities vary enormously, so some scheme for highly challenged nodes SHOULD be defined.
PPT Version