I-D ACTION:draft-struik-6lowapp-security-considerations-00.txt

Internet-Drafts@ietf.org Tue, 20 October 2009 18:45 UTC

Return-Path: <root@core3.amsl.com>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 682D828C119; Tue, 20 Oct 2009 11:45:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D ACTION:draft-struik-6lowapp-security-considerations-00.txt
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20091020184501.682D828C119@core3.amsl.com>
Date: Tue, 20 Oct 2009 11:45:01 -0700
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i-d-announce>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2009 18:45:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts 
directories.


	Title		: Security Architectural Design Considerations for Low-Power Wireless Sensor Networks
	Author(s)	: R. Struik
	Filename	: draft-struik-6lowapp-security-considerations-00.txt
	Pages		: 21
	Date		: 2009-10-20
	
We discuss security architectural design considerations for
     general-purpose multi-hop ad-hoc networks. The security
     architecture fits extremely constrained wireless environments,
     such as sensor networks, while remaining uniform and general
     enough to fit any wireless network. The design is tailored towards
     low overall implementation cost, supports semi-automatic lifecycle
     management, including ease of installation and configuration,
     scalability, survivability, mobility, and is adaptable towards
     network topology changes and towards different trust models
     underlying network operations.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-struik-6lowapp-security-considerations-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.
ftp://ftp.ietf.org/internet-drafts/draft-struik-6lowapp-security-considerations-00.txt"><ftp://ftp.ietf.org/internet-drafts/draft-struik-6lowapp-security-considerations-00.txt>