-
Notifications
You must be signed in to change notification settings - Fork 5
/
draft-miller-tmesh-00.txt
840 lines (514 loc) · 28.8 KB
/
draft-miller-tmesh-00.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
Network Working Group J. Miller
Internet-Draft Filament
Intended status: Informational May 16, 2015
Expires: November 17, 2015
TMesh - Thing Mesh PHY/MAC Protocol
draft-miller-tmesh-00
Abstract
A secure PHY/MAC based on telehash [1] designed for low-power sleepy
devices.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 17, 2015.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Miller Expires November 17, 2015 [Page 1]
Internet-Draft tmesh May 2015
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. The Need for Standards . . . . . . . . . . . . . . . . . . 3
1.2. Telehash Native . . . . . . . . . . . . . . . . . . . . . 4
1.3. Vocabulary . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4.1. PHY . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4.2. MAC . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.4.3. Mesh . . . . . . . . . . . . . . . . . . . . . . . . . 7
2. Protocol Definition . . . . . . . . . . . . . . . . . . . . . 7
2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. PHY . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.1. Private Hopping Sequence . . . . . . . . . . . . . . . 8
2.2.2. Medium Types . . . . . . . . . . . . . . . . . . . . . 8
2.3. MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3.1. Encrypted Knock Payload . . . . . . . . . . . . . . . 10
2.3.2. Frame Payload . . . . . . . . . . . . . . . . . . . . 10
2.3.3. PING Payload . . . . . . . . . . . . . . . . . . . . . 11
2.3.4. PING Synchronization . . . . . . . . . . . . . . . . . 11
2.4. Mesh . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.4.1. z-index . . . . . . . . . . . . . . . . . . . . . . . 12
2.4.2. Neighbors . . . . . . . . . . . . . . . . . . . . . . 12
2.4.3. Communities . . . . . . . . . . . . . . . . . . . . . 13
2.4.4. Optimizations . . . . . . . . . . . . . . . . . . . . 14
3. Implementation Notes . . . . . . . . . . . . . . . . . . . . . 14
4. Security Considerations . . . . . . . . . . . . . . . . . . . 14
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . 15
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 15
Miller Expires November 17, 2015 [Page 2]
Internet-Draft tmesh May 2015
1. Introduction
this is a work in progress and under active development, expect
significant breaking changes
As embedded devices continue to increase in capabilities while
falling in cost there is a growing challenge to manage their energy
resources for wirelessly networking them together. While there are
many options for short-range 2.4GHz networks such as Bluetooth Smart
(BLE), low-power WiFi, Zigbee and 802.15.4 based mesh networks, there
are few choices for long-range sub-GHz mesh networking.
TMesh builds on the strong end-to-end encryption and privacy
capabilities of [telehash v3] by adding a uniquely matched secure
Physical RF and Media Access Control protocol.
The key attributes of TMesh are:
o high density - thousands per square kilometer
o very low power - years on coin cell batteries
o wide area - optimized for long-range (>1km) capable radios
o high latency - low minimum duty cycle from seconds to hours
o peer aware meshing - does not require dedicated coordinator
hardware
o high interference resiliency - bi-modal PHY to maximize
connectivity in all conditions
o dynamically resource optimized - powered motes naturally provide
more routing assistance
o zero metadata broadcast - same absolute privacy and security
principles as telehash
o dynamic spectrum - able to use any specialized private or
regionally licensed bands
1.1. The Need for Standards
The existing best choices are all either only partial solutions like
802.15.4, require commercial membership to participate like LoRaWAN,
ZigBee, and Z-Wave, or are focused on specific verticals like DASH7
and Wireless M-Bus.
Miller Expires November 17, 2015 [Page 3]
Internet-Draft tmesh May 2015
All other options only provide incomplete or indadequate security and
privacy, most use only optional AES-128 and often with complicated or
fixed provisioning-based key management. No existing option fully
protects the mote identity and network metadata from monitoring.
1.2. Telehash Native
By leveraging telehash [1] as the native encryption and mote identity
platform, TMesh can start with some strong assumptions:
o each mote will have a unique stable 32-byte identity, the hashname
o two linked motes will have a unique long-lived session id
o all payloads will be encrypted ciphertext with forward secrecy
o retransmissions and acknowledgements happen at a higher level and
are not required in the framing
o motes are members of a private mesh and only communicate with
other verified members
o chunked encoding defines how to serialize variable length packets
into fixed transmission frames
1.3. Vocabulary
o "mote" - a single physical transmitting/receiving device
o "medium" - definition of the specific channels/settings the
physical transceivers use
o "community" - a network of motes using a common medium to create a
large area mesh
o "neighbors" - nearby reachable motes in the same community
o "z-index" - the self-asserted resource level (priority) from any
mote
o "leader" - the highest z-index mote in any set of neighbors
o "knock" - a single transmission
o "window" - the variable period in which a knock is transmitted,
2^16 to 2^32 microseconds (1hr)
Miller Expires November 17, 2015 [Page 4]
Internet-Draft tmesh May 2015
o "window sequence" - each window will change frequency/channels in
a sequence
1.4. Overview
TMesh is the composite of three distinct layers, the physical radio
medium encoding (PHY), the shared management of the spectrum (MAC),
and the networking relationships between 2 or more motes (Mesh).
A community is any set of motes that are using a common medium
definition and have enough trust to establish a telehash link for
sharing peers and acting as a router to facilitate larger scale
meshing. Within any community, the motes that can directly
communicate over a medium are called neighbors, and any neighbor that
has a higher z-index is always considered the current leader that may
have additional responsibilities.
1.4.1. PHY
A "medium" is a compact 5 byte definition of the exact PHY encoding
details required for a radio to operate. The 5 bytes are always
string encoded as 8 base32 characters for ease of use in JSON and
configuration storage, an example medium is "azdhpa5r" which is 0x06,
0x46, 0x77, 0x83, 0xb1.
"Byte 0" is the primary "type" that determines if the medium is for a
public or private community and the overall category of PHY encoding
technique to use. The first/high bit of "byte 0" determins if the
medium is for public communities (bit "0", values from 0-127) or
private communities (bit "1", values from 128-255). The other bits
in the "type" map directly to different PHY modes on transceivers or
different hardware drivers entirely and are detailed in the "PHY"
section.
"Byte 1" is the maximum energy boost requirements for that medium
both for transmission and reception. While a mote may determine that
it can use less energy and optimize it's usage, this byte value sets
an upper bar so that a worst case can always be independently
estimated. The energy byte is in two 4-bit parts, the first half for
the additional TX energy, and the second half for the additional RX
energy. While different hardware devices will vary on exact mappings
of mA to the 1-16 range of values, effort will be made to define
general buckets and greater definitions to encourage compatibility
for efficiency estimation purposes.
Each PHY driver uses the remaining medium "bytes 2, 3, and 4" to
determine the frequency range, number of channels, spreading,
bitrate, error correction usage, regulatory requirements, channel
Miller Expires November 17, 2015 [Page 5]
Internet-Draft tmesh May 2015
dwell time, etc details on the transmission/reception. The channel
frequency hopping and transmission window timing are derived
dynamically and not included in the medium.
Transmitted payloads do not generally need whitening as encrypted
packets are by nature DC-free. They also do not explicitly require
CRC as all telehash packets have authentication bytes included for
integrity verification.
A single fixed 64 byte payload can be transmitted during each window
in a sequence, this is called a "knock". If the payload does not
fill the full 64 byte frame the remaining bytes must contain
additional data so as to not reveal the actual payload size.
WIP - determine a standard filler data format that will add
additional dynamically sized error correction, explore taking
advantage of the fact that the inner and outer bitstreams are
encrypted and bias-free (Gaussian distribution divergence?)
Each transmission window can go either direction between motes, the
actual direction is based on the parity of the current nonce and the
binary ascending sort order of the hashnames of the motes. A parity
of 0 (even) means the low mote transmits and high mote receives,
whereas a parity of 1 (odd) means the low mote receives and high mote
transmits.
1.4.2. MAC
There is no mote addressing or other metadata included in the
transmitted bytes, including there being no framing outside of the
encrypted ciphertext in a knock. The uniqueness of each knock's
timing and PHY encoding is the only mote addressing mechanism.
Every window sequence is a unique individual encrypted session
between the two motes in one community using a randomly rotating
nonce and a shared secret key derived directly from the medium,
community name, and hashnames. All payloads are additionally
encrypted with the ChaCha20 cipher [2] before transmission regardless
of if they are already encrypted via telehash.
Each mote should actively make use of multiple communities to another
mote and regularly test more efficient mediums to optimize the
overall energy usage. Every mote advertises their current local
energy availability level as a "z-index" (single byte value) to
facilitate community-wide optimization strategies.
Miller Expires November 17, 2015 [Page 6]
Internet-Draft tmesh May 2015
1.4.3. Mesh
There is two mechanisms used for enabling a larger scale mesh network
with TMesh, "communities" (MAC layer) and "routers" (telehash/app
layer).
A "community" is defined by motes using a shared medium and the
automatic sharing of other neighboring motes that it has active
windows with in that medium. Each neighbor mote hashname is listed
along with next nonce, last seen, z-index, and the signal strength.
A mote may be part of more than one community but does not share
neighbor mote information outside of each one.
The "leader" is always the neighbor with the highest z-index
reachable directly, this is the mote advertising that it has the most
resources available. The leader inherits the responsibility to
monitor each neighbor's neighbors for other leaders and establish
direct or bridged links with them.
Any mote attempting to connect to a non-local hashname will use their
leader as the telehash router and send it a peer request, whom will
forward it to the next highest leader it is connected to until it
reaches the highest in the community. That highest resourced leader
is responsible for maintaining an index of the available motes in the
community. Additional routing strategies should be employed by a
mesh to optimize the most efficient routes and only rely on the
leaders as a fallback or bootstrapping mechanism.
Any mote that can provide reliable bridged connectivity to another
network (wifi, ethernet, etc) should advertise a higher z-index and
may also forward any telehash peer request to additional telehash
router(s) in the mesh via those networks.
2. Protocol Definition
2.1. Terminology
In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in BCP 14, [RFC
2119] and indicate requirement levels for compliant TMesh
implementations.
2.2. PHY
Miller Expires November 17, 2015 [Page 7]
Internet-Draft tmesh May 2015
2.2.1. Private Hopping Sequence
Most PHY transceivers require specific synchronized channel and
timing inputs, in TMesh these are randomized based on the MAC
encryption layer, using the unique secret and nonce for each pair of
motes and current window with ChaCha20.
The first four bytes (32 bits) of the current nonce are used to
determine the window microsecond offset timing as a network order
unsigned long integer. Each window is from 2^16 to 2^32
microseconds, the 32-bit random offset is scaled by the current
z-index into the possible range of values.
The current channel is determined by a private two byte seed value
that is the ciphertext of "0x0000" using the current window secret/
nonce. While any two motes are synchronizing by sending "PING"
knocks the channel must remain stable by using a fixed zero nonce.
The two channel bytes are the seed for channel selection as a network
order unsigned short integer. The 2^16 total possible channels are
simply mod'd to the number of usable channels based on the current
medium. If there are 50 channels, it would be "channel = seed[1] %
50".
2.2.2. Medium Types
Medium "type byte" (0) table:
+------------+-----------+
| Bit 7 | Community |
+------------+-----------+
| 0b0xxxxxxx | Public |
| 0b1xxxxxxx | Private |
+------------+-----------+
+------------+----------+
| Bits 6-0 | Encoding |
+------------+----------+
| 0bx0000000 | Reserved |
| 0bx0000001 | OOK |
| 0bx0000010 | (G)FSK |
| 0bx0000011 | LoRa |
| 0bx0000100 | (O)QPSK |
+------------+----------+
The "energy byte" (1) table:
Miller Expires November 17, 2015 [Page 8]
Internet-Draft tmesh May 2015
Work In Progress
+------------+-----------+
| Bits 7-4 | Max TX mA |
+------------+-----------+
| 0bx0000000 | 1 |
| 0bx0000001 | 4 |
| 0bx0000010 | 8 |
| 0bx0000011 | 16 |
| 0bx0000100 | 32 |
+------------+-----------+
+------------+-----------+
| Bits 7-4 | Max RX mA |
+------------+-----------+
| 0bx0000000 | 1 |
| 0bx0000001 | 2 |
| 0bx0000010 | 4 |
| 0bx0000011 | 8 |
| 0bx0000100 | 16 |
+------------+-----------+
...
2.2.2.1. OOK
TBD
2.2.2.2. (G)FSK
TBD
2.2.2.3. LoRa
Medium Header
o byte 2 - standard frequency range (see table)
o byte 3 - Bw & CodingRate (RegModemConfig 1)
o byte 4 - SpreadingFactor (RegModemConfig 2)
All preambles are set to the minimum size of 6.
LoRa is used in implicit header mode with a fixed size of 64.
Freq Table:
Miller Expires November 17, 2015 [Page 9]
Internet-Draft tmesh May 2015
+--------+-----+------+----------+-----------------+------+
| Region | Low | High | mW (erp) | Reg | ID |
+--------+-----+------+----------+-----------------+------+
| US | 902 | 928 | 100 | FCC part 15.247 | 0x01 |
| EU | 863 | 870 | | ETSI EN 300-220 | 0x02 |
| Japan | 915 | 930 | | ARIB T-108 | 0x03 |
| China | 779 | 787 | 10 | SRRC | 0x04 |
+--------+-----+------+----------+-----------------+------+
In the US region 0x01 to reach maximum transmit power each window may
not transmit on a channel for more than 400ms, when that limit is
reached a new channel must be derived from the nonce (TBD) and hopped
to. See App Note [3].
Notes on ranges:
o SRRC [4]
o Z-Wave [5]
o Atmel [6]
2.2.2.4. (O)QPSK
TBD
2.3. MAC
2.3.1. Encrypted Knock Payload
A unique 32 byte secret is derived for every pair of motes in any
community. The 32 bytes are the binary digest output of multiple
SHA-256 calculations of source data from the community and hashnames.
The first digest is generated from the medium (5 bytes), that output
is combined with a digest of the community name for a second digest.
The third and fourth digests are generated by combining the previous
one with each mote hashname in binary ascending sorted order.
The 8-byte nonce is initially randomly generated and then rotated for
every window using ChaCha20 identically to the knock payload.
The secret and current nonce are then used to encode/decode the
chipertext of each knock with ChaCha20.
2.3.2. Frame Payload
Each knock transfers a fixed 64 byte ciphertext frame between two
motes. Once the frame is deciphered it consists of one leading flag
Miller Expires November 17, 2015 [Page 10]
Internet-Draft tmesh May 2015
byte and 63 payload bytes. The payload bytes are based on the simple
telehash chunking pattern, where any packet is sent as a sequence of
chunks of fixed size until the final remainder bytes which terminate
a given packet and trigger processing.
The flag byte format is:
o bit 0 is the forwarding request, 1 = forward the frame, 0 =
process it
o bit 1 is the payload format, 1 = full 63 bytes are the next chunk,
0 = the payload is the end of a complete packet and the following
byte is the remainder length (from 1 to 62)
o bit 2-7 is a position number (less than 64) that specifies the
forwarding neighbor based on their list position in the most
recent neighborhood map exchanged
When receiving a forwarded frame the position number is 1 or greater,
a position of 0 means the frame is direct and not forwarded.
2.3.3. PING Payload
When two motes are not in sync they both transmit and receive a
"PING" knock. This knock's frame bytes always begin with the current
8-byte nonce value that was used to generate the ciphertext of the
remaining 56 bytes of the frame and determine the sender's timing of
the knock within the current window.
Once deciphered the first 8 bytes are the next nonce the sender will
be listening for, followed by the 32 bytes of the sending mote's
hashname. All remaining bytes are filled in with random values.
2.3.4. PING Synchronization
The sender should only transmit a "PING" that includes a next nonce
with the opposite parity so that a recipient can immediately respond
in that upcoming window sequence if that "PING" is detected.
Once any mote has detected and validated any incoming "PING" from a
mote it is attempting to synchronize with, it simply uses the
incoming nonce and waits for the next nonce to transmits a "PING" in
the next window.
The original sender can then detect the response "PING" that has the
correct matching nonce, validate the hashname, and become
synchronized.
Miller Expires November 17, 2015 [Page 11]
Internet-Draft tmesh May 2015
Once synchronized the channel seed begins rotating immediately so
that the subsequent windows are randomly hopping different channels
and the knocks become regular frame payloads.
2.4. Mesh
2.4.1. z-index
Every mote calculates its own "z-index", a uint8_t value that
represents the resources it has available to assist with the mesh.
It will vary based on the battery level or fixed power, as well as if
the mote has greater network access (is an internet bridge) or is
well located (based on configuration).
The z-index also serves as a window mask for all of that mote's
receiving window sizes. This enables motes to greatly reduce the
time required waking and listening for low power and high latency
applications.
The first 4 bits is the window mask, and the second 4 bits are the
energy resource level.
The initial/default z-index value is determined by the medium as a
fixed value to ensure every community can bootstrap uniformly. It is
then updated dynamically by any mote in the neighborhood channel by
sending the desired z-index value along with a _future_ nonce at
which it will become active. This ensures that any two motes will
stay in sync given the time scaling factor in the z-index.
2.4.2. Neighbors
Each mote should share enough detail about its active neighbors with
every neighbor so that a neighborhood map can be maintained. This
includes the relative sync time of each mote such that a neighbor can
predict when a mote will be listening or may be transmitting to
another nearby mote.
Neighborhood:
o 8 byte nonce
o 4 byte microseconds ago last knock
o 1 byte z index
o 1 byte rssi
Miller Expires November 17, 2015 [Page 12]
Internet-Draft tmesh May 2015
2.4.3. Communities
Describe communities and routing in more detail, and routers
performing ongoing sync-mode duties.
A community is defined as a single medium and a string name, both of
which must be known to join that community. They are the primary
mechanism to manage and organize motes based on available spectrum
and energy, where each community is bound to a single medium with
predictable energy usage and available capacity.
Any mesh may make use of multiple communities to optimize the overall
availability and reliability, but different communities are not a
trust or secure grouping mechanism, the medium and name are not
considered secrets.
2.4.3.1. Private Community
A private community is not visible to any non-member, other than
randomly timed knock transmissions on random channels there is no
decodeable signals detectable to any third party, it is a dark mesh
network that can only be joined via out-of-band coordination and
explicit mesh membership trust.
In order for any mote to join a private community it must first have
at a minimum the community name, the hashname of one or more
reachable motes in that community, and the medium on which it is
operating. It must also have it's own hashname independently added
as a trusted member to the mesh so that the reachable motes are aware
of the joining one.
The stable seed for the "PING" channel will be unique to each two
motes based on the private secret for the window sequence.
2.4.3.2. Public Community
A public community is inherently visibile to any mote and should only
be used for well-known or shared open services where the existince of
the motes in the community is not private. Any third party will be
able to monitor general participation in a public community, so they
should be used minimally and only with ephemeral generated hashnames
when possible.
Since the hashnames are not known in advance, the public community
window sequence secret is generated with null/zero filled hashnames
so that the "PING" channel is a stable seed. The only difference
from a private community is that the hashnames sent/received in a
"PING" are used as the source to generate a new window sequence
Miller Expires November 17, 2015 [Page 13]
Internet-Draft tmesh May 2015
secret once exchanged.
This functionality should not be enabled/deployed by default, it
should only be used when management policy explicitly requires it for
special/public use cases, temporary pairing/provisioning setup, or
with ephemeral generated hashnames used to bootstrap private
communities.
2.4.4. Optimizations
Since a community includes the automated sharing the time offsets of
neighbors, any mote can then calculate keep-out channels/timing of
other motes based on their shared community windows and optimize the
overall medium usage. In this way, each community will have its own
QoS based on each local neighborhood.
3. Implementation Notes
o if a packet chunk is incomplete in one window, prioritize
subsequent windows from that mote
o prioritize different communities based on their energy
performance, test more efficient ones dynamically
4. Security Considerations
5. References
URIs
[1] <http://telehash.org>
[2] <http://cr.yp.to/chacha.html>
[3] <https://www.semtech.com/images/promo/
FCC_Part15_regulations_Semtech.pdf>
[4] <http://www.srrccn.org/srrc-approval-new2.htm>
[5] <http://image.slidesharecdn.com/
smarthometechshort-13304126815608-phpapp01-120228010616-
phpapp01/95/smart-home-tech-short-14-728.jpg>
[6] <http://blog.atmel.com/2013/04/23/
praise-the-lord-a-new-sub-1ghz-rf-transceiver-supporting-4-
Miller Expires November 17, 2015 [Page 14]
Internet-Draft tmesh May 2015
major-regional-frequency-bands/>
Appendix A. Examples
This appendix provides some examples of the tmesh protocol operation.
Request:
Response:
Author's Address
Jeremie Miller
Filament
Denver
Email: [email protected]
URI:
Miller Expires November 17, 2015 [Page 15]