< draft-thubert-6lo-rfc6775-update-reqs-03.txt   draft-thubert-6lo-rfc6775-update-reqs-04.txt >
6Lo P. Thubert, Ed. 6Lo P. Thubert, Ed.
Internet-Draft cisco Internet-Draft cisco
Intended status: Standards Track August 20, 2014 Intended status: Standards Track August 22, 2014
Expires: February 19, 2015 Expires: February 21, 2015
Requirements for an update to 6LoWPAN ND Requirements for an update to 6LoWPAN ND
draft-thubert-6lo-rfc6775-update-reqs-03 draft-thubert-6lo-rfc6775-update-reqs-04
Abstract Abstract
Work presented at the ROLL, 6lo, 6TiSCH and 6MAN Working Groups Work presented at the ROLL, 6lo, 6TiSCH and 6MAN Working Groups
suggest that enhancements to the 6LoWPAN ND mechanism are now needed. suggest that enhancements to the 6LoWPAN ND mechanism are now needed.
This document elaborates on those requirements and suggests This document elaborates on those requirements and suggests
approaches to serve them. approaches to serve them.
Status of this Memo Status of this Memo
skipping to change at page 1, line 33 skipping to change at page 1, line 33
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on February 19, 2015. This Internet-Draft will expire on February 21, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (http://trustee.ietf.org/ Provisions Relating to IETF Documents (http://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 2, line 11 skipping to change at page 2, line 11
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1. RPL Leaf Support in 6LoWPAN ND . . . . . . . . . . . . . . 5 3.1. RPL Leaf Support in 6LoWPAN ND . . . . . . . . . . . . . . 5
3.2. registration Failures Due to Movement . . . . . . . . . . 6 3.2. registration Failures Due to Movement . . . . . . . . . . 6
3.3. Proxy registration . . . . . . . . . . . . . . . . . . . . 6 3.3. Proxy registration . . . . . . . . . . . . . . . . . . . . 6
3.4. Target Registration . . . . . . . . . . . . . . . . . . . 6 3.4. Target Registration . . . . . . . . . . . . . . . . . . . 6
3.5. RPL root vs. 6LBR . . . . . . . . . . . . . . . . . . . . 7 3.5. RPL root vs. 6LBR . . . . . . . . . . . . . . . . . . . . 7
3.6. Securing the Registration . . . . . . . . . . . . . . . . 7 3.6. Securing the Registration . . . . . . . . . . . . . . . . 7
4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 8 4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1. Requirements Related to Mobility . . . . . . . . . . . . . 8 4.1. Requirements Related to Mobility . . . . . . . . . . . . . 8
4.2. Requirements Related to Routing Protocols . . . . . . . . 8 4.2. Requirements Related to Routing Protocols . . . . . . . . 9
4.3. Requirements Related to the Variety of Low-Power Link types 9 4.3. Requirements Related to the Variety of Low-Power Link types 9
4.4. Requirements Related to Proxy Operations . . . . . . . . . 10 4.4. Requirements Related to Proxy Operations . . . . . . . . . 10
4.5. Requirements Related to Security . . . . . . . . . . . . . 10 4.5. Requirements Related to Security . . . . . . . . . . . . . 10
4.6. Requirements Related to Low-Power devices . . . . . . . . 10 4.6. Requirements Related to Low-Power devices . . . . . . . . 11
5. Suggested Changes to Protocol Elements . . . . . . . . . . . . 10 5. Suggested Changes to Protocol Elements . . . . . . . . . . . . 11
5.1. ND Neighbor Solicitation (NS) . . . . . . . . . . . . . . 10 5.1. ND Neighbor Solicitation (NS) . . . . . . . . . . . . . . 11
5.2. ND Router Advertisement (RA) . . . . . . . . . . . . . . . 11 5.2. ND Router Advertisement (RA) . . . . . . . . . . . . . . . 12
5.3. RPL DODAG Information Object (DIO) . . . . . . . . . . . . 11 5.3. RPL DODAG Information Object (DIO) . . . . . . . . . . . . 12
5.4. ND Enhanced Address Registration Option (EARO) . . . . . . 11 5.4. ND Enhanced Address Registration Option (EARO) . . . . . . 12
6. Security Considerations . . . . . . . . . . . . . . . . . . . 12 6. Security Considerations . . . . . . . . . . . . . . . . . . . 13
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 14
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
9.1. Normative References . . . . . . . . . . . . . . . . . . . 13 9.1. Normative References . . . . . . . . . . . . . . . . . . . 14
9.2. Informative References . . . . . . . . . . . . . . . . . . 14 9.2. Informative References . . . . . . . . . . . . . . . . . . 15
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 15 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 16
1. Introduction 1. Introduction
A number of use cases, including the Industrial Internet, require a A number of use cases, including the Industrial Internet, require a
large scale deployment of sensors that can not be realized with wires large scale deployment of sensors that can not be realized with wires
and is only feasible over wireless Low power and Lossy Network (LLN) and is only feasible over wireless Low power and Lossy Network (LLN)
technologies. When simpler hub-and-spoke topologies are not technologies. When simpler hub-and-spoke topologies are not
sufficient for the expected throughput and density, mesh networks sufficient for the expected throughput and density, mesh networks
must be deployed, which implies the concepts of hosts and routers, must be deployed, which implies the concepts of hosts and routers,
whether operated at Layer-2 or Layer-3. whether operated at Layer-2 or Layer-3.
skipping to change at page 3, line 45 skipping to change at page 3, line 45
Readers are expected to be familiar with all the terms and concepts Readers are expected to be familiar with all the terms and concepts
that are discussed in "Neighbor Discovery for IP version 6" that are discussed in "Neighbor Discovery for IP version 6"
[RFC4861], "IPv6 Stateless Address Autoconfiguration" [RFC4862], [RFC4861], "IPv6 Stateless Address Autoconfiguration" [RFC4862],
"IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs):
Overview, Assumptions, Problem Statement, and Goals" [RFC4919], Overview, Assumptions, Problem Statement, and Goals" [RFC4919],
Neighbor Discovery Optimization for Low-power and Lossy Networks Neighbor Discovery Optimization for Low-power and Lossy Networks
[RFC6775] and "Transmission of IPv6 Packets over IEEE 802.15.4 [RFC6775] and "Transmission of IPv6 Packets over IEEE 802.15.4
Networks" [RFC4944]. Networks" [RFC4944].
Additionally, this document uses terminology from 6TiSCH [I-D.ietf- Additionally, this document uses terminology from 6TiSCH [I-D.ietf-
6tisch-terminology] and ROLL [I-D.ietf-roll-terminology]. 6tisch-terminology] and ROLL [RFC7102].
3. Overview 3. Overview
The 6TiSCH architecture [I-D.ietf-6tisch-architecture] expects that The 6TiSCH architecture [I-D.ietf-6tisch-architecture] expects that
a 6LoWPAN device can connect as a leaf to a RPL network, where the a 6LoWPAN device can connect as a leaf to a RPL network, where the
leaf support is the minimal functionality to connect as a host to a leaf support is the minimal functionality to connect as a host to a
RPL network without the need to participate to the full routing RPL network without the need to participate to the full routing
protocol. The support of leaf can be implemented as a minor protocol. The support of leaf can be implemented as a minor
increment to 6LoWPAN ND, with the additional capability to carry a increment to 6LoWPAN ND, with the additional capability to carry a
sequence number that is used to track the movements of the device, sequence number that is used to track the movements of the device,
skipping to change at page 8, line 19 skipping to change at page 8, line 19
each individual ND lookup/advertisement in a peer to peer model where each individual ND lookup/advertisement in a peer to peer model where
each lookup may be between different parties. This is not the case each lookup may be between different parties. This is not the case
in a 6LoWPAN ND LLN where, as illustrated in Figure 2, the 6LBR in a 6LoWPAN ND LLN where, as illustrated in Figure 2, the 6LBR
terminates all the flows and may store security information for later terminates all the flows and may store security information for later
validation. validation.
Additionally SEND requires considerably enlarged ND messages to carry Additionally SEND requires considerably enlarged ND messages to carry
cryptographic material, and requires that each protected address is cryptographic material, and requires that each protected address is
generated cryptographically, which implies the computation of a generated cryptographically, which implies the computation of a
different key for each Cryptographically Generated Address (CGA). different key for each Cryptographically Generated Address (CGA).
SEND as defined in [RFC3971] is thus largely unsuitable for
application in a LLN.
Once an Address is registered, the 6LBR maintains a state for that Once an Address is registered, the 6LBR maintains a state for that
Address and is in position to bind securely the first registration Address and is in position to bind securely the first registration
with the Node that placed it, whether the Address is CGA or not. It with the Node that placed it, whether the Address is CGA or not. It
should thus be possible to protect the ownership of all the addresses should thus be possible to protect the ownership of all the addresses
of a 6LoWPAN Node with a single key, and there should not be a need of a 6LoWPAN Node with a single key, and there should not be a need
to carry the cryptographic material more than once to the 6LBR. to carry the cryptographic material more than once to the 6LBR.
The energy constraint is usually a foremost factor, and attention
should be paid to minimize the burden on the CPU. Hardware-assisted
support of variants of the Counter with CBC-MAC [RFC3610] (CCM)
authenticated encryption block cipher mode such as CCM* are common in
LowPower ship-set implementations, and 6LoWPAN ND security mechanism
should be capable to reuse them when applicable.
Finally, the code footprint in the device being also an issue, the
capability to reuse not only hardware-assist mechanisms but also
software across layers has to be considered. For instance, if code
has to be present for upper-layer operations, e.g AES-CCM Cipher
Suites for Transport Layer Security (TLS) [RFC6655], then the
capability to reuse that code should be considered.
4. Requirements 4. Requirements
4.1. Requirements Related to Mobility 4.1. Requirements Related to Mobility
Due to the nature of LLN networks, even a fixed 6LoWPAN Node may Due to the nature of LLN networks, even a fixed 6LoWPAN Node may
change its point of attachment (a 6LR) and may not be able to notify change its point of attachment (a 6LR) and may not be able to notify
the 6LR that it has disconnected from. It results that the previous the 6LR that it has disconnected from. It results that the previous
6LR may still attract traffic that it cannot deliver any more. When 6LR may still attract traffic that it cannot deliver any more. When
the 6LR changes, there is thus a need to identify stale states and the 6LR changes, there is thus a need to identify stale states and
restore reachability timely. restore reachability timely.
skipping to change at page 9, line 36 skipping to change at page 10, line 4
Req2.3: Depending on their applicability to LLNs, other standard mesh Req2.3: Depending on their applicability to LLNs, other standard mesh
/MANET protocols MAY be considered as well. /MANET protocols MAY be considered as well.
4.3. Requirements Related to the Variety of Low-Power Link types 4.3. Requirements Related to the Variety of Low-Power Link types
6LoWPAN ND [RFC6775] was defined with a focus on IEEE802.15.4 and in 6LoWPAN ND [RFC6775] was defined with a focus on IEEE802.15.4 and in
particular the capability to derive a unique Identifier from a particular the capability to derive a unique Identifier from a
globally unique MAC-64 address. At this point, the 6lo Working Group globally unique MAC-64 address. At this point, the 6lo Working Group
is extending the 6LoWPAN Header Compression (HC) [RFC6282] technique is extending the 6LoWPAN Header Compression (HC) [RFC6282] technique
to other link types ITU-T G.9959 [I-D.brandt-6man-lowpanz], Master- to other link types ITU-T G.9959 [I-D.brandt-6man-lowpanz], Master-
Slave/Token-Passing [I-D.ietf-6man-6lobac], DECT Ultra Low Energy Slave/Token-Passing [I-D.ietf-6lo-6lobac], DECT Ultra Low Energy [I-D
[I-D.mariager-6lowpan-v6over-dect-ule], Near Field Communication [I-D .ietf-6lo-dect-ule], Near Field Communication [I-D.hong-6lo-ipv6
.hong-6lo-ipv6-over-nfc], as well as IEEE1901.2 Narrowband Powerline -over-nfc], as well as IEEE1901.2 Narrowband Powerline Communication
Communication Networks [I-D.popa-6lo-6loplc-ipv6-over- Networks [I-D.popa-6lo-6loplc-ipv6-over-ieee19012-networks] and
ieee19012-networks] and BLUETOOTH(R) Low Energy [I-D.ietf-6lo-btle]. BLUETOOTH(R) Low Energy [I-D.ietf-6lo-btle].
Related requirements are: Related requirements are:
Req3.1: The support of the registration mechanism SHOULD be extended Req3.1: The support of the registration mechanism SHOULD be extended
to more LLN links, matching at least the links that are considered by to more LLN links, matching at least the links that are considered by
6lo as well as other popular Low-Power links such as Low-Power Wi-Fi. 6lo as well as other popular Low-Power links such as Low-Power Wi-Fi.
Req3.2: As part of this extension, a mechanism to compute a unique Req3.2: As part of this extension, a mechanism to compute a unique
Identifier should be provided, with the capability to form a Link- Identifier should be provided, with the capability to form a Link-
Local Address that can not be a duplicate. The Identifier SHOULD be Local Address that can not be a duplicate. The Identifier SHOULD be
skipping to change at page 10, line 22 skipping to change at page 10, line 42
Related requirements are: Related requirements are:
Req4.1: The registration mechanism SHOULD enable a third party to Req4.1: The registration mechanism SHOULD enable a third party to
proxy register an Address on behalf of a 6LoWPAN node that may be proxy register an Address on behalf of a 6LoWPAN node that may be
sleeping or located deeper in an LLN mesh. sleeping or located deeper in an LLN mesh.
4.5. Requirements Related to Security 4.5. Requirements Related to Security
In order to guarantee the operations of the 6LoWPAN ND flows, the In order to guarantee the operations of the 6LoWPAN ND flows, the
spoofing of the 6LR, 6LBR and 6BBRs roles should be avoided. Once a spoofing of the 6LR, 6LBR and 6BBRs roles should be avoided. Once a
node successfully registers an address, 6LoWPAN ND should provide the node successfully registers an address, 6LoWPAN ND should provide
means to protect that ownership even if the node is sleeping. In energy-efficient means to protect that ownership even if the node is
particular, the 6LR and the 6LBR then should be able to verify sleeping. In particular, the 6LR and the 6LBR then should be able to
whether a subsequent registration for a same Address comes from a verify whether a subsequent registration for a same Address comes
same node or is a duplicate. from a same node or is a duplicate.
Related requirements are: Related requirements are:
Req5.1: 6LoWPAN ND SHOULD provide a mechanism for the 6LR, 6LBR and Req5.1: 6LoWPAN ND security mechanisms SHOULD provide a mechanism for
6BBR to authenticate and authorize one another for their respective the 6LR, 6LBR and 6BBR to authenticate and authorize one another for
roles, as well as with the 6LoWPAN Node for the role of 6LR. their respective roles, as well as with the 6LoWPAN Node for the role
of 6LR.
Req5.2: 6LoWPAN ND SHOULD provide a mechanism for the 6LR and the Req5.2: 6LoWPAN ND security mechanisms SHOULD provide a mechanism for
6LBR to validate whether a new registration corresponds to a same the 6LR and the 6LBR to validate whether a new registration
6LoWPAN Node, and, if not, determine the rightful owner, and deny or corresponds to a same 6LoWPAN Node, and, if not, determine the
clean-up the registration that is deemed in excess. rightful owner, and deny or clean-up the registration that is deemed
in excess.
Req5.3: 6LoWPAN ND security mechanisms SHOULD lead to small packet
sizes. In particular, the NS, NA, DAR and DAC messages for a re-
registration flow SHOULD NOT exceed 80 octets so as to fit in a
secured IEEE802.15.4 frame.
Req5.4: Recurrent 6LoWPAN ND security operations MUST NOT be
computationally intensive on the LoWPAN Node CPU. When a Key hash
calculation is employed, a mechanism lighter than SHA-1 SHOULD be
preferred.
Req5.5: The number of Keys that the 6LoWPAN Node needs to manipulate
SHOULD be minimized.
Req5.6: The 6LoWPAN ND security mechanisms SHOULD enable CCM* for use
at both Layer 2 and Layer 3, and SHOULD enable the reuse of security
code that has to be present on the device for upper layer security
such as TLS.
Req5.7: Public key and signature sizes SHOULD be minimized while
maintaining adequate confidentiality and data origin authentication
for multiple types of applications with various degrees of
criticality.
4.6. Requirements Related to Low-Power devices 4.6. Requirements Related to Low-Power devices
The ND registration method is designed to save energy on Low-Power The ND registration method is designed to save energy on Low-Power
devices, and in particular enable duty-cycled devices that are devices, and in particular enable duty-cycled devices that are
sleeping most of the time and not capable to defend their own sleeping most of the time and not capable to defend their own
Addresses against always-on devices. Addresses against always-on devices.
Related requirements are: Related requirements are:
skipping to change at page 11, line 4 skipping to change at page 11, line 51
Related requirements are: Related requirements are:
Req6.1: The registration mechanism SHOULD be applicable to a Low- Req6.1: The registration mechanism SHOULD be applicable to a Low-
Power device regardless of the link type, and enable a 6BBR to Power device regardless of the link type, and enable a 6BBR to
operate as a proxy to defend the registered Addresses on its behalf. operate as a proxy to defend the registered Addresses on its behalf.
5. Suggested Changes to Protocol Elements 5. Suggested Changes to Protocol Elements
5.1. ND Neighbor Solicitation (NS) 5.1. ND Neighbor Solicitation (NS)
The NS message used for registration should use a source address that The NS message used for registration should use a source address that
respects the rules in [RFC6775], [RFC4861], and [RFC4429] for DAD. respects the rules in [RFC6775], [RFC4861], and [RFC4429] for DAD.
The SLLA Option may be present but only if the address passed DAD, The SLLA Option may be present but only if the address passed DAD,
and it is used to allow the 6LR to respond as opposed to as a and it is used to allow the 6LR to respond as opposed to as a
registration mechanism. registration mechanism.
The address that is being registered is the target address in the NS The address that is being registered is the target address in the NS
message and the TLLA Option must be present. message and the TLLA Option must be present.
5.2. ND Router Advertisement (RA) 5.2. ND Router Advertisement (RA)
[I-D.chakrabarti-nordmark-6man-efficient-nd] adds an 'E' bit in the [I-D.chakrabarti-nordmark-6man-efficient-nd] adds an 'E' bit in the
Router Advertisement flag, as well as a new Registrar Address Option Router Advertisement flag, as well as a new Registrar Address Option
(RAO). These fields are probably pertinent to LLNs inclusion into a (RAO). These fields are probably pertinent to LLNs inclusion into a
revised 6LoWPAN ND should be studied. revised 6LoWPAN ND should be studied. If the new 6LoWPAN flows
require a change of behaviour (e.g. registering the Target of the NS
message) then the RA must indicate that the router supports the new
capability, and the NS must indicate that the Target is registered as
opposed to the Source in an unequivocal fashion.
There is some amount of duplication between the options in the RPL There is some amount of duplication between the options in the RPL
DIO [RFC6550] and the options in the ND RA messages. At the same DIO [RFC6550] and the options in the ND RA messages. At the same
time, there are a number of options, including the 6LoWPAN Context time, there are a number of options, including the 6LoWPAN Context
Option (6CO) [RFC6775], the MTU and the SLLA Options [RFC4861] that Option (6CO) [RFC6775], the MTU and the SLLA Options [RFC4861] that
can only be found in the RA messages. Considering that these options can only be found in the RA messages. Considering that these options
are useful for a joining node, the recommendation would be to are useful for a joining node, the recommendation would be to
associate the RA messages to the join beacon, and make them rare when associate the RA messages to the join beacon, and make them rare when
the network is stable. On the other hand, the DIO message is to be the network is stable. On the other hand, the DIO message is to be
used as the propagated heartbeat of the RPL network and provide the used as the propagated heartbeat of the RPL network and provide the
skipping to change at page 12, line 36 skipping to change at page 13, line 31
Status: 8-bit integer. A new value of 3 is suggested to indicate a Status: 8-bit integer. A new value of 3 is suggested to indicate a
rejection due to an obsolete TID, typically an indication of a rejection due to an obsolete TID, typically an indication of a
movement. movement.
RPLInstanceID: 8-bit integer. This field is set to 0 when unused. RPLInstanceID: 8-bit integer. This field is set to 0 when unused.
Otherwise it contains the RPLInstanceID for which this address is Otherwise it contains the RPLInstanceID for which this address is
registered, as specified in RPL [RFC6550], and discussed in registered, as specified in RPL [RFC6550], and discussed in
particular in section 3.1.2. particular in section 3.1.2.
P: One bit flag. Indicates that the address is to be redistributed P: One bit flag. When the bit is set, the address being registered
to obtain reachability, e.g. into the RPL protocol, or for ND is Target of the NS as opposed to the Source, for instance to
proxy operation. enable ND proxy operation.
N: One bit flag. Set if the device moved. If not set, the 6BBR will N: One bit flag. Set if the device moved. If not set, the 6BBR will
refrain from sending gratuitous NA(O) or other form of distributed refrain from sending gratuitous NA(O) or other form of distributed
ND cache clean-up over the backbone. For instance, the flag ND cache clean-up over the backbone. For instance, the flag
should be reset after the DAD operation upon address formation. should be reset after the DAD operation upon address formation.
6. Security Considerations 6. Security Considerations
This specification expects that the link layer is sufficiently This specification expects that the link layer is sufficiently
protected, either by means of physical or IP security for the protected, either by means of physical or IP security for the
skipping to change at page 14, line 17 skipping to change at page 15, line 17
[RFC6282] Hui, J. and P. Thubert, "Compression Format for IPv6 [RFC6282] Hui, J. and P. Thubert, "Compression Format for IPv6
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, Datagrams over IEEE 802.15.4-Based Networks", RFC 6282,
September 2011. September 2011.
[RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., [RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R.,
Levis, P., Pister, K., Struik, R., Vasseur, JP. and R. Levis, P., Pister, K., Struik, R., Vasseur, JP. and R.
Alexander, "RPL: IPv6 Routing Protocol for Low-Power and Alexander, "RPL: IPv6 Routing Protocol for Low-Power and
Lossy Networks", RFC 6550, March 2012. Lossy Networks", RFC 6550, March 2012.
[RFC6655] McGrew, D. and D. Bailey, "AES-CCM Cipher Suites for
Transport Layer Security (TLS)", RFC 6655, July 2012.
[RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E. and C. Bormann, [RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E. and C. Bormann,
"Neighbor Discovery Optimization for IPv6 over Low-Power "Neighbor Discovery Optimization for IPv6 over Low-Power
Wireless Personal Area Networks (6LoWPANs)", RFC 6775, Wireless Personal Area Networks (6LoWPANs)", RFC 6775,
November 2012. November 2012.
[RFC6830] Farinacci, D., Fuller, V., Meyer, D. and D. Lewis, "The [RFC6830] Farinacci, D., Fuller, V., Meyer, D. and D. Lewis, "The
Locator/ID Separation Protocol (LISP)", RFC 6830, January Locator/ID Separation Protocol (LISP)", RFC 6830, January
2013. 2013.
9.2. Informative References 9.2. Informative References
skipping to change at page 14, line 45 skipping to change at page 15, line 48
Wasserman, "Wired and Wireless IPv6 Neighbor Discovery Wasserman, "Wired and Wireless IPv6 Neighbor Discovery
Optimizations", Internet-Draft draft-chakrabarti-nordmark- Optimizations", Internet-Draft draft-chakrabarti-nordmark-
6man-efficient-nd-04, October 2013. 6man-efficient-nd-04, October 2013.
[I-D.hong-6lo-ipv6-over-nfc] [I-D.hong-6lo-ipv6-over-nfc]
Hong, Y., Choi, Y., Youn, J., Kim, D. and J. Choi, Hong, Y., Choi, Y., Youn, J., Kim, D. and J. Choi,
"Transmission of IPv6 Packets over Near Field "Transmission of IPv6 Packets over Near Field
Communication", Internet-Draft draft-hong-6lo-ipv6-over- Communication", Internet-Draft draft-hong-6lo-ipv6-over-
nfc-01, August 2014. nfc-01, August 2014.
[I-D.ietf-6lo-6lobac]
Lynn, K., Martocci, J., Neilson, C. and S. Donaldson,
"Transmission of IPv6 over MS/TP Networks", Internet-Draft
draft-ietf-6lo-6lobac-00, July 2014.
[I-D.ietf-6lo-btle] [I-D.ietf-6lo-btle]
Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Nieminen, J., Savolainen, T., Isomaki, M., Patil, B.,
Shelby, Z. and C. Gomez, "Transmission of IPv6 Packets Shelby, Z. and C. Gomez, "Transmission of IPv6 Packets
over BLUETOOTH(R) Low Energy", Internet-Draft draft-ietf- over BLUETOOTH(R) Low Energy", Internet-Draft draft-ietf-
6lo-btle-02, June 2014. 6lo-btle-02, June 2014.
[I-D.ietf-6man-6lobac] [I-D.ietf-6lo-dect-ule]
Lynn, K., Martocci, J., Neilson, C. and S. Donaldson, Mariager, P., Petersen, J., Shelby, Z., Logt, M. and D.
"Transmission of IPv6 over MS/TP Networks", Internet-Draft Barthel, "Transmission of IPv6 Packets over DECT Ultra Low
draft-ietf-6man-6lobac-01, March 2012. Energy", Internet-Draft draft-ietf-6lo-dect-ule-00, June
2014.
[I-D.ietf-6tisch-architecture] [I-D.ietf-6tisch-architecture]
Thubert, P., Watteyne, T. and R. Assimiti, "An Thubert, P., Watteyne, T. and R. Assimiti, "An
Architecture for IPv6 over the TSCH mode of IEEE Architecture for IPv6 over the TSCH mode of IEEE
802.15.4e", Internet-Draft draft-ietf-6tisch- 802.15.4e", Internet-Draft draft-ietf-6tisch-
architecture-01, February 2014. architecture-01, February 2014.
[I-D.ietf-6tisch-terminology] [I-D.ietf-6tisch-terminology]
Palattella, M., Thubert, P., Watteyne, T. and Q. Wang, Palattella, M., Thubert, P., Watteyne, T. and Q. Wang,
"Terminology in IPv6 over the TSCH mode of IEEE "Terminology in IPv6 over the TSCH mode of IEEE
802.15.4e", Internet-Draft draft-ietf-6tisch- 802.15.4e", Internet-Draft draft-ietf-6tisch-
terminology-00, November 2013. terminology-00, November 2013.
[I-D.ietf-roll-terminology]
Vasseur, J., "Terms used in Routing for Low power And
Lossy Networks", Internet-Draft draft-ietf-roll-
terminology-13, October 2013.
[I-D.mariager-6lowpan-v6over-dect-ule]
Mariager, P., Petersen, J. and Z. Shelby, "Transmission of
IPv6 Packets over DECT Ultra Low Energy", Internet-Draft
draft-mariager-6lowpan-v6over-dect-ule-03, July 2013.
[I-D.popa-6lo-6loplc-ipv6-over-ieee19012-networks] [I-D.popa-6lo-6loplc-ipv6-over-ieee19012-networks]
Popa, D. and J. Hui, "6LoPLC: Transmission of IPv6 Packets Popa, D. and J. Hui, "6LoPLC: Transmission of IPv6 Packets
over IEEE 1901.2 Narrowband Powerline Communication over IEEE 1901.2 Narrowband Powerline Communication
Networks", Internet-Draft draft-popa-6lo-6loplc-ipv6-over- Networks", Internet-Draft draft-popa-6lo-6loplc-ipv6-over-
ieee19012-networks-00, March 2014. ieee19012-networks-00, March 2014.
[RFC3610] Whiting, D., Housley, R. and N. Ferguson, "Counter with
CBC-MAC (CCM)", RFC 3610, September 2003.
[RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A. and P. [RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A. and P.
Thubert, "Network Mobility (NEMO) Basic Support Protocol", Thubert, "Network Mobility (NEMO) Basic Support Protocol",
RFC 3963, January 2005. RFC 3963, January 2005.
[RFC3971] Arkko, J., Kempf, J., Zill, B. and P. Nikander, "SEcure [RFC3971] Arkko, J., Kempf, J., Zill, B. and P. Nikander, "SEcure
Neighbor Discovery (SEND)", RFC 3971, March 2005. Neighbor Discovery (SEND)", RFC 3971, March 2005.
[RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)",
RFC 3972, March 2005. RFC 3972, March 2005.
[RFC4389] Thaler, D., Talwar, M. and C. Patel, "Neighbor Discovery [RFC4389] Thaler, D., Talwar, M. and C. Patel, "Neighbor Discovery
Proxies (ND Proxy)", RFC 4389, April 2006. Proxies (ND Proxy)", RFC 4389, April 2006.
[RFC4919] Kushalnagar, N., Montenegro, G. and C. Schumacher, "IPv6 [RFC4919] Kushalnagar, N., Montenegro, G. and C. Schumacher, "IPv6
over Low-Power Wireless Personal Area Networks (6LoWPANs): over Low-Power Wireless Personal Area Networks (6LoWPANs):
Overview, Assumptions, Problem Statement, and Goals", RFC Overview, Assumptions, Problem Statement, and Goals", RFC
4919, August 2007. 4919, August 2007.
[RFC7102] Vasseur, JP., "Terms Used in Routing for Low-Power and
Lossy Networks", RFC 7102, January 2014.
Author's Address Author's Address
Pascal Thubert, editor Pascal Thubert, editor
Cisco Systems, Inc Cisco Systems, Inc
Building D Building D
45 Allee des Ormes - BP1200 45 Allee des Ormes - BP1200
MOUGINS - Sophia Antipolis, 06254 MOUGINS - Sophia Antipolis, 06254
FRANCE FRANCE
Phone: +33 497 23 26 34 Phone: +33 497 23 26 34
Email: pthubert@cisco.com Email: pthubert@cisco.com
 End of changes. 21 change blocks. 
54 lines changed or deleted 106 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/