Internet of Things (IoT) technology is expected to encompass many application areas. This broad range of applications present challenges such as reliability, low power and low latency. This paper presents an extension to the new bootstrapping mechanism in the IETF 6TiSCH protocol. It is aimed to distribute the keys used in the proposed method to the trusted nodes of the network to carry out an effective authentication and bootstrapping process. By using a distributed approach, we aim to reduce the communication cost of the standard IETF 6TiSCH authentication protocol and to reduce the message traffic on the network by keeping the authentication parameters at the edge of the network.