{"draft":"draft-ietf-roll-security-threats-11","doc_id":"RFC7416","title":"A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)","authors":["T. Tsao","R. Alexander","M. Dohler","V. Daza","A. Lozano","M. Richardson, Ed."],"format":["ASCII","HTML"],"page_count":"40","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Routing Over Low power and Lossy networks","abstract":"This document presents a security threat analysis for the Routing\r\nProtocol for Low-Power and Lossy Networks (RPLs). The development\r\nbuilds upon previous work on routing security and adapts the\r\nassessments to the issues and constraints specific to low-power and\r\nlossy networks. A systematic approach is used in defining and\r\nevaluating the security threats. Applicable countermeasures are\r\napplication specific and are addressed in relevant applicability\r\nstatements.","pub_date":"January 2015","keywords":["LLN","ROLL","security"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7416","errata_url":null}