Date Published: September 8, 2020
Comments Due: October 8, 2020 (public comment period is CLOSED)
Email Questions to: mitigating-iot-ddos-nccoe@nist.gov
, ,
This paper provides background information on trusted IoT device network-layer onboarding and lifecycle management. It defines a taxonomy of onboarding characteristics that will enable stakeholders to have a common language to describe and express their onboarding capabilities and fully capture the elements required to characterize potential onboarding solutions in protocol and product-agnostic terms. It also presents a proposed set of security considerations for network-layer onboarding.
We define network-layer onboarding of an IoT device as the provisioning of network credentials to that device at the time of the device’s deployment on a network. The trusted aspect of network-layer onboarding indicates that the device is provided with unique network credentials after the device and the network have had the opportunity to authenticate each other and establish an encrypted channel without user knowledge of the credentials, thereby mitigating unauthorized credential disclosure.
The benefits of a using a trusted network-layer onboarding mechanism are that it helps:
None selected
Publication:
White Paper (DOI)
Supplemental Material:
Local Download (pdf)
Related NIST Publications:
Document History:
09/08/20: White Paper (Draft)
Security and Privacy
authentication; security programs & operations
Technologies
hardware; networks
Applications
Internet of Things