<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc compact="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-t2trg-secure-bootstrapping-01" category="info">

  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>

    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>Hirsalantie 11</street>
          <city>Jorvas</city>
          <region></region>
          <code>02420</code>
          <country>Finland</country>
        </postal>
        <email>mohit@piuha.net</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Denpel Informatique</organization>
      <address>
        <postal>
          <street></street> <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country></country>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <street></street>
          <city>Oviedo</city>
          <region></region>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>

    <date year="2021" month="October" day="23"/>

    
    
    

    <abstract>


<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completetion, and the knowledge imparted to the IoT devices after the setup is complete.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Initial security setup for a device refers to any process that takes place before a device can become operational. The phrase “initial security setup” intentionally includes the term “security” as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, configuration of necessary credentials and parameters.</t>

<t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by <xref target="Sethi14">Sethi et al.</xref> while developing a solution for smart displays.</t>

<t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passpharse before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with initial security setup of devices and excludes any discussion on setting up networks.</t>

<t>There are several terms that are used in the context of initial security setup of devices:</t>

<t><list style="symbols">
  <t>Bootstrapping</t>
  <t>Provisioning</t>
  <t>Onboarding</t>
  <t>Enrollment</t>
  <t>Commissioning</t>
  <t>Initialization</t>
  <t>Configuration</t>
  <t>Registration</t>
  <t>Discovery</t>
</list></t>

<t>In addition to using a variety of different terms, initial security setup mechanisms can rely on a number of entities. For example, a companion smartphone device maybe necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverese initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>

<t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>

<t><list style="symbols">
  <t>Terminology used</t>
  <t>Entities or “players” involved</t>
  <t>Initial assumptions about the device</t>
  <t>Processes necessary for completetion</t>
  <t>Knowledge imparted to the device after completion</t>
</list></t>

</section>
<section anchor="usage" title="Standards and Protocols">

<section anchor="device-provisioning-protocol-dpp" title="Device Provisioning Protocol (DPP)">

<t>The Wi-Fi Alliance Device provisioning protocol (DPP) <xref target="dpp"/> describes itself as a standardized protocol for providing user friendly Wi-Fi setup while maintaining or increasing the security. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the network. DPP has the following three phases/sub-protocols:</t>

<t><list style="symbols">
  <t>Bootstrapping: The configurator obtains bootstrapping information from the enrollee using an out-of-band channel such as scanning a QR code or tapping NFC. The bootstrapping information includes the public-key of the device and metadata such as the radio channel on which the device is listening.</t>
  <t>Authentication: In DPP, either the configurator or the enrollee can initiate the authentication protocol. The side initiating the authentication protocol is called as the initiator while the other side is called the responder. The authentication sub-protocol provides authentication of the responder to an initiator. It can optionally authenticate the initiator to the responder (only if the bootstrapping information was exchange out-of-band in both directions).</t>
  <t>Configuration: Using the key established from the authentication protocol, the enrollee asks the configurator for network information such as the SSID and passphrase of the access point.</t>
</list></t>

<t>DPP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, discovery, enrollment, provisioning.</t>
  <t>Players: Authenticator, Bootstrap Server, Client, Configurator, Device, Initiator, Manager, Manufacturer, Owner, Peer, Peer, Persona, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="open-mobile-alliance-oma-lightweight-m2m-lwm2m" title="Open Mobile Alliance (OMA) Lightweight M2M (LwM2M)">

<t>The OMA LwM2M specification <xref target="oma"/> defines an architecture where a new device (LwM2M client) contacts a Bootstrap-server which is responsible for provisioning essential information such as credentials. After receiving this essential information, the LwM2M client device registers itself with one or more LwM2M Servers which will manage the device during its lifecycle. The current standard defines the following four bootstrapping modes:</t>

<t><list style="symbols">
  <t>Factory Bootstrap: An IoT device in this case is configured with all the necessary bootstrap information during manufacturing and prior to its deployment.</t>
  <t>Bootstrap from Smartcard: An IoT device retrieves and processes all the necessary bootstrap data from a Smartcard.</t>
  <t>Client Initiated Bootstrap: This mode provides a mechanism for an IoT client device to retrieve the bootstrap information from a Bootstrap Server. This requires the client device to have an account at the Bootstrap Server and credentials to obtain the necessary information securely.</t>
  <t>Server Initiated Bootstrap: In this bootstrapping mode, the bootstrapping server configures all the bootstrap information on the IoT device without receiving a request from the client. This means that the bootstrap server
needs to know if a client IoT Device is ready for bootstrapping before it can be configured. For example, a network may inform the bootstrap server of a new connecting IoT client device.</t>
</list></t>

<t>OMA has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, intialization, configuration, registration.</t>
  <t>Players: Bootstrap Server, Client, Device, Manufacturer, Owner, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="open-connectivity-foundation-ocf" title="Open Connectivity Foundation (OCF)">

<t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the process before a device is operational as onboarding.  The first step of this onboarding process is configuring the ownership, i.e., establishing a legitimate user that owns the device. For this, the user is supposed to use an Onboarding tool (OBT) and an Owner Transfer Method (OTM).</t>

<t>The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc. OCF lists several optional OTMs. At the end of the execution of an OTM, the onboarding tool must have provisioned an Owner Credential onto the device. The following owner transfer methods are specified:</t>

<t><list style="symbols">
  <t>Just works: Performs an un-authenticated Diffie-Hellman key exchange over Datagram Transport Layer Security (DTLS). The key exchange results in a symmetric session key which is later used for provisioning. Naturally, this mode is vulnerable to on-path attackers.</t>
  <t>Random PIN: The device generates a PIN code that is entered into the onboarding tool by the user. This pin code is used together with TLS-PSK ciphersuites for establishing a symmetric session key. OCF recommends PIN codes to have an entropy of 40 bits.</t>
  <t>Manufacturer certificate: An onboarding tool authenticates the device by verifying a manufacturer installed certificate. Similarly, the device may authenticate the onboarding tool by verifying its signature.</t>
  <t>Vendor specific: Vendors implement their own transfer method that accommodates any specific device constraints.</t>
</list></t>

<t>Once the onboarding tool and the new device have authenticated and established secure communication, the onboarding tool provisions/configures the device with Owner credentials. Owner credentials may consist of certificates, shared keys, or Kerberos tickets for example.</t>

<t>The OBT additionally configures/provisions information about the Access Management Service (AMS), the Credential Management  Service (CMS), and the credentials for interacting with them. The AMS is responsible for provisioning access control entries, while the CMS provisions security credentials necessary for device operation.</t>

<t>OCF has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, enrollment, onboarding, provisioning, registration,</t>
  <t>Players: Client, Device, Manager, Manufacturer, Owner, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="bluetooth" title="Bluetooth">

<t>Bluetooth mesh specifies a provisioning protocol.  The goal of the provisioning phase is to securely incorporate a new Bluetooth mesh node, by completing two critical tasks. First, to authenticate the    unprovisioned device and second, to create a secure link with said device to share information.</t>

<t>The provisioning process is divided into five distinct stages summarize next:</t>

<t><list style="symbols">
  <t>Beaconing for discover: The new unprovisioned device is discovered by the provisioner</t>
  <t>Negotiation: The unprovisioned device indicates to the provisioner a set of capabilities such as the security algorithms supported, the availability of its public key using an Out-of-Band (OOB) channel and the input/output interfaces supported</t>
  <t>Public-key exchange: The authentication method is selected by the provisioner and both devices exchange Elliptic-curve Diffie–Hellman (ECDH) public keys. These keys may be static or ephemeral. Their exchange can be done in two ways, either via Out-of-Band or directly through a Bluetooth link. Each device then generates a symmetric key, named ECDHSecret, by combining its own private key and the public key of the peer device. The EDCHSecret is used to protect communication between the two devices.</t>
  <t>Authentication: During this phase, the ECDH key exchange is authenticated. The authentication method can be Output OOB, Input OOB, static OOB, or No OOB. With Output OOB, the unprovisioned device chooses a random number and outputs that number in manner consistent with its capabilities. The provisioner then inputs this number. Then, a check confirmation value operation is performed. This involves a cryptographic exchange regarding (in this case) the random number to complete the authentication. With Input OOB, the roles are reversed, being the provisioner the entity that generates the random number. When neither of the previous authentication procedures are feasible, both the provisioner and unprovisioned device generate a random number and require the user supervising the setup to verify that values on the device and provisioner are the same.</t>
  <t>Distribution of provisioning data: At this point, the provisioning process can be protected. This involves the distribution of data such as a Network key, to secure the communications at network layer and a unicast address among other information.</t>
</list></t>

<t>Bluetooth mesh has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, provisioning.</t>
  <t>Players: Client, Device, Manager, Manufacturer, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="fast-identity-online-fido-alliance" title="Fast IDentity Online (FIDO) alliance">

</section>
<section anchor="fast-identity-online-fido-alliance-1" title="Fast IDentity Online (FIDO) alliance">

<t>The Fast IDentity Online Alliance (FIDO) is currently specifying an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecyle. The draft specification refers to this feature as “late binding”.</t>

<t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as “out-of-scope” but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC7230"/> proxies for IP networks and other forms of tunneling for non-IP networks.</t>

<t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called as GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>

<t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should used.</t>

<t>FIDO has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, onboarding, commissioning, initialization.</t>
  <t>Players: Device, Manager, Manufacturer, Owner, Rendezvous Server, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="enrollment-over-secure-transport-est" title="Enrollment over Secure Transport (EST)">

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="I-D.ietf-ace-coap-est"/>. EST assumes that some initial information is already distributed so that EST client and servers can perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines “Bootstrap Distribution of CA Certificates” which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate “fingerprint” received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>

<t>EST has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, enrollment, initialization, configuration.</t>
  <t>Players: Administrator, Client, Device, Manufacturer, Owner, Peer, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="bootstrapping-remote-secure-key-infrastructures-brski" title="Bootstrapping Remote Secure Key Infrastructures (BRSKI)">

<t>The ANIMA working group is working on a bootstrapping solution for devices that relies on 802.1AR vendor certificates called Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/>. In addition to vendor installed IEEE 802.1AR certificates, a vendor based service on the Internet is required. Before being authenticated, a new device only needs link-local connectivity, and does not require a routable address. When a vendor provides an Internet based service, devices can be forced to join only specific domains. The document highlights that the described solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. It claims to scale to thousands of devices located in hostile environments, such as ISP provided CPE devices which are drop-shipped to the end user.</t>

<t>BRSKI has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, enrollment, onboarding.</t>
  <t>Players: Administrator, Client, Cloud Registrar, Configurator, Device, Domain Registrar, Initiator, Join Proxy, JRC, Manufacturer, Owner, Peer, Pledge, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="secure-zero-touch-provisioning" title="Secure Zero Touch Provisioning">

<t><xref target="RFC8572"/> defines a bootstrapping strategy for enabling devices to securely obtain all the configuration information with no installer input, beyond the actual physical placement and connection of cables. Their goal is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment specific network management system (NMS). This bootstrapping method requires the devices to be configured with trust anchors in the form of X.509 certificates. <xref target="RFC8572"/> is similar to BRSKI based on <xref target="RFC8366"/>.</t>

<t>SZTP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, onboarding, enrollment, configuration, discovery.</t>
  <t>Players: Administrator, Bootstrap Server, Client, Device, Manufacturer, Onboarding Server, Owner, Redirect Server, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="nimble-out-of-band-authentication-for-eap-eap-noob" title="Nimble out-of-band authentication for EAP (EAP-NOOB)">

<t>EAP-NOOB <xref target="I-D.ietf-emu-eap-noob"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the server and peer. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server. This method claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels. The exact in-band messages and OOB message contents are specified and not the OOB channel details. EAP-NOOB also supports IoT devices with only output (e.g. display) or only input (e.g. camera). It makes combined use of both secrecy and integrity of the OOB channel for more robust security than the ad-hoc solutions.</t>

<t>EAP-NOOB has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, registration.</t>
  <t>Players: Administrator, Authenticator, Client, Device, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="lpwan" title="LPWAN">

<t>Low Power Wide Area Network (LPWAN) encompasses a wide variety of technologies whose link-layer characteristics are severely constrained in comparison to other typical IoT link-layer technologies such as Bluetooth or IEEE 802.15.4. While some LPWAN technologies rely on proprietary bootstrapping solutions which are not publicly accessible, others simply ignore the challenge of bootstrapping and key distribution. In this section, we discuss the bootstrapping methods used by LPWAN technologies covered in <xref target="RFC8376"/>.</t>

<t><list style="symbols">
  <t>LoRaWAN <xref target="LoRaWAN"/> describes its own protocol to authenticate nodes before allowing them join a LoRaWAN network. This process is called as joining and it is based on pre-shared keys (called AppKeys in the standard). The joining procedure comprises only one exchange (join-request and join-accept) between the joining node and the network server. There are several adaptations to this joining procedure that allow network servers to delegate authentication and authorization to a backend AAA infrastructure <xref target="RFC2904"/>.</t>
  <t>Wi-SUN Alliance Field Area Network (FAN) uses IEEE 802.1X and EAP-TLS for network access authentication. It performs a 4-way handshake to establish a session keys after EAP-TLS authentication.</t>
  <t>NB-IoT relies on the traditional 3GPP mutual authentication scheme based on a shared-secret in the Subscriber Identity Module (SIM) of the device and the mobile operator.</t>
  <t>Sigfox security is based on unique device identifiers and cryptographic keys. As stated in <xref target="RFC8376"/>, although the algorithms and keying details are not publicly available, there is sufficient information to indicate that bootstrapping in Sigfox is based on pre-established credentials between the device and the Sigfox network.</t>
</list></t>

<t>From the above, it is clear that all LPWAN technologies rely on pre-provisioned credentials for authentication between a new device and the network.</t>

<t>LPWAN has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, configuration, discovery.</t>
  <t>Players: Administrator, Authenticator, Border Router, Client, Device, Manager, Network Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
<section anchor="thread" title="Thread">

<t>Thread Group commissioning <xref target="threadcommissioning"/> introduces a two phased process i.e. Petitioning and Joining. Entities involved are leader, joiner, commissioner, joiner router, and border router. Leader is the first device in Thread network that must be commissioned using out-of-band process and is used to inject correct user generated Commissioning Credentials (can be changed later) into Thread Network. Joiner is the node that intends to get authenticated and authorized on Thread Network. Commissioner is either within the Thread Network (Native) or connected with Thread Network via a WLAN (External).</t>

<t>Under some topologies, Joiner Router and Border Router facilitate the Joiner node to reach Native and External Commissioner, respectively. Petitioning begins before Joining process and is used to grant sole commissioning authority to a Commissioner. After an authorized Commissioner is designated, eligible thread devices can join network. Pair-wise key is shared between Commissioner and Joiner, network parameters (such as network name, security policy, etc.,) are sent out securely (using pair-wise key) by Joiner Router to Joiner for letting Joiner to join the Thread Network. Entities involved in Joining process depends on system topology i.e. location of Commissioner and Joiner. Thread networks only operate using IPv6. Thread devices can devise GUAs (Global Unicast Addresses) <xref target="RFC4291"/>. Provision also exist via Border Router, for Thread device to acquire individual global address by means of DHCPv6 or using SLAAC (Stateless Address Autoconfiguration) address derived with advertised network prefix.</t>

<t>Thread has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Commissioning, discovery, provisioning.</t>
  <t>Players: Administrator, Border Agent, Border Router, Commissioner, Commissioner Candidate, Configurator, Device, End Device, End Device, Endpoint Identifier, Initiator, Joiner, Joiner Router, Owner, Peer, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device:</t>
  <t>Processes:</t>
  <t>Beliefs imparted to the device after protocol execution:</t>
</list></t>

</section>
</section>
<section anchor="comp" title="Comparison">

<t>There are several stages before a device becomes fully operational. This typically involves establishing some initial trust after which credentials and other parameters are configured. For DPP, bootstrapping is the first step before authentication and provisioning of credentials can occur. For EST, bootstrapping happens as the first step when the client devices have no certificates available for starting enrollment. Provisioning/configuring are terms used for providing additional information to devices before they are fully operational. For example, credentials are provisioned onto the device. But before credential provisioning, a device is bootstrapped and authenticated. Some protocols may only deal with parts of the process. For example, TLS maybe used for authentication after bootstrapping. A separate device management protocol then may run over this TLS tunnel for provisioning operational information and credentials.</t>

</section>
<section anchor="comp-term" title="Comparison of terminology">

</section>
<section anchor="comp-players" title="Comparison of players">

</section>
<section anchor="comp-beliefs" title="Comparison of initial beliefs">

</section>
<section anchor="comp-process" title="Comparison of processes">

</section>
<section anchor="comp-impart" title="Comparison of knowledge imparted to the device">

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of bootstrapping protocols are present in the respective specifications.</t>

<t>Nonetheless, we briefly discuss some important security aspects which are not fully explored in various specifications.</t>

<t>Firstly, an IoT system may deal with authorization for resources and services separately from initial security setup in terms of timing as well as protocols. As an example, two resource-constrained devices A and B may perform mutual authentication using credentials provided by an offline third-party X before device A obtains authorization for running a particular application on device B from an online third-party Y. In some cases, authentication and authorization maybe tightly coupled, e.g., successful authentication also means successful authorization.</t>

<t>Secondly, initial security setup of IoT devices may be necessary several times during the device lifecycle since keys have limited lifetimes and devices may be lost or resold. Protocols and systems must have adequate provisions for revocation and fresh security setup. A rerun of the security setup mechanism must be as secure as the initial security setup regardless of whether it is done manually or automatically over the network.</t>

<t>Lastly, some IoT networks use a common group key for multicast and broadcast traffic. As the number of devices in a network increase over time, a common group key may not be scalable and the same network may need to be split into separate groups with different keys. Bootstrapping and provisioning protocols may need appropriate mechanisms for identifying and distributing keys to the current member devices of each group.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC2904' target='https://www.rfc-editor.org/info/rfc2904'>
<front>
<title>AAA Authorization Framework</title>
<author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'><organization/></author>
<author fullname='P. Calhoun' initials='P.' surname='Calhoun'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='L. Gommans' initials='L.' surname='Gommans'><organization/></author>
<author fullname='G. Gross' initials='G.' surname='Gross'><organization/></author>
<author fullname='B. de Bruijn' initials='B.' surname='de Bruijn'><organization/></author>
<author fullname='C. de Laat' initials='C.' surname='de Laat'><organization/></author>
<author fullname='M. Holdrege' initials='M.' surname='Holdrege'><organization/></author>
<author fullname='D. Spence' initials='D.' surname='Spence'><organization/></author>
<date month='August' year='2000'/>
<abstract><t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS).  It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2904'/>
<seriesInfo name='DOI' value='10.17487/RFC2904'/>
</reference>



<reference anchor='RFC4291' target='https://www.rfc-editor.org/info/rfc4291'>
<front>
<title>IP Version 6 Addressing Architecture</title>
<author fullname='R. Hinden' initials='R.' surname='Hinden'><organization/></author>
<author fullname='S. Deering' initials='S.' surname='Deering'><organization/></author>
<date month='February' year='2006'/>
<abstract><t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t><t>This document obsoletes RFC 3513, &quot;IP Version 6 Addressing Architecture&quot;.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4291'/>
<seriesInfo name='DOI' value='10.17487/RFC4291'/>
</reference>



<reference anchor='RFC3748' target='https://www.rfc-editor.org/info/rfc3748'>
<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='L. Blunk' initials='L.' surname='Blunk'><organization/></author>
<author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'><organization/></author>
<author fullname='J. Carlson' initials='J.' surname='Carlson'><organization/></author>
<author fullname='H. Levkowetz' initials='H.' role='editor' surname='Levkowetz'><organization/></author>
<date month='June' year='2004'/>
<abstract><t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3748'/>
<seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>



<reference anchor='RFC3971' target='https://www.rfc-editor.org/info/rfc3971'>
<front>
<title>SEcure Neighbor Discovery (SEND)</title>
<author fullname='J. Arkko' initials='J.' role='editor' surname='Arkko'><organization/></author>
<author fullname='J. Kempf' initials='J.' surname='Kempf'><organization/></author>
<author fullname='B. Zill' initials='B.' surname='Zill'><organization/></author>
<author fullname='P. Nikander' initials='P.' surname='Nikander'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors.  If not secured, NDP is vulnerable to various attacks.  This document specifies security mechanisms for NDP.  Unlike those in the original NDP specifications, these mechanisms do not use IPsec.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3971'/>
<seriesInfo name='DOI' value='10.17487/RFC3971'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC4120' target='https://www.rfc-editor.org/info/rfc4120'>
<front>
<title>The Kerberos Network Authentication Service (V5)</title>
<author fullname='C. Neuman' initials='C.' surname='Neuman'><organization/></author>
<author fullname='T. Yu' initials='T.' surname='Yu'><organization/></author>
<author fullname='S. Hartman' initials='S.' surname='Hartman'><organization/></author>
<author fullname='K. Raeburn' initials='K.' surname='Raeburn'><organization/></author>
<date month='July' year='2005'/>
<abstract><t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510.  This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4120'/>
<seriesInfo name='DOI' value='10.17487/RFC4120'/>
</reference>



<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
<front>
<title>The Secure Shell (SSH) Transport Layer Protocol</title>
<author fullname='T. Ylonen' initials='T.' surname='Ylonen'><organization/></author>
<author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t><t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP.  The protocol can be used as a basis for a number of secure network services.  It provides strong encryption, server authentication, and integrity protection.  It may also provide compression.</t><t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t><t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4253'/>
<seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>



<reference anchor='RFC4764' target='https://www.rfc-editor.org/info/rfc4764'>
<front>
<title>The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method</title>
<author fullname='F. Bersani' initials='F.' surname='Bersani'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='January' year='2007'/>
<abstract><t>This document specifies EAP-PSK, an Extensible Authentication Protocol (EAP) method for mutual authentication and session key derivation using a Pre-Shared Key (PSK).  EAP-PSK provides a protected communication channel when mutual authentication is successful for both parties to communicate over.  This document describes the use of this channel only for protected exchange of result indications, but future EAP-PSK extensions may use the channel for other purposes.  EAP-PSK is designed for authentication over insecure networks such as IEEE 802.11.  This memo defines an Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4764'/>
<seriesInfo name='DOI' value='10.17487/RFC4764'/>
</reference>



<reference anchor='RFC5191' target='https://www.rfc-editor.org/info/rfc5191'>
<front>
<title>Protocol for Carrying Authentication for Network Access (PANA)</title>
<author fullname='D. Forsberg' initials='D.' surname='Forsberg'><organization/></author>
<author fullname='Y. Ohba' initials='Y.' role='editor' surname='Ohba'><organization/></author>
<author fullname='B. Patil' initials='B.' surname='Patil'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='A. Yegin' initials='A.' surname='Yegin'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document defines the Protocol for Carrying Authentication for Network Access (PANA), a network-layer transport for Extensible Authentication Protocol (EAP) to enable network access authentication between clients and access networks.  In EAP terms, PANA is a UDP-based EAP lower layer that runs between the EAP peer and the EAP authenticator.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5191'/>
<seriesInfo name='DOI' value='10.17487/RFC5191'/>
</reference>



<reference anchor='RFC5272' target='https://www.rfc-editor.org/info/rfc5272'>
<front>
<title>Certificate Management over CMS (CMC)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='M. Myers' initials='M.' surname='Myers'><organization/></author>
<date month='June' year='2008'/>
<abstract><t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t><t>1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t><t>2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t><t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5272'/>
<seriesInfo name='DOI' value='10.17487/RFC5272'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC7030' target='https://www.rfc-editor.org/info/rfc7030'>
<front>
<title>Enrollment over Secure Transport</title>
<author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'><organization/></author>
<author fullname='P. Yee' initials='P.' role='editor' surname='Yee'><organization/></author>
<author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t></abstract>
</front>
<seriesInfo name='RFC' value='7030'/>
<seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>



<reference anchor='RFC7228' target='https://www.rfc-editor.org/info/rfc7228'>
<front>
<title>Terminology for Constrained-Node Networks</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='M. Ersue' initials='M.' surname='Ersue'><organization/></author>
<author fullname='A. Keranen' initials='A.' surname='Keranen'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7228'/>
<seriesInfo name='DOI' value='10.17487/RFC7228'/>
</reference>



<reference anchor='RFC7250' target='https://www.rfc-editor.org/info/rfc7250'>
<front>
<title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author fullname='P. Wouters' initials='P.' role='editor' surname='Wouters'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='J. Gilmore' initials='J.' surname='Gilmore'><organization/></author>
<author fullname='S. Weiler' initials='S.' surname='Weiler'><organization/></author>
<author fullname='T. Kivinen' initials='T.' surname='Kivinen'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).  The new certificate type allows raw public keys to be used for authentication.</t></abstract>
</front>
<seriesInfo name='RFC' value='7250'/>
<seriesInfo name='DOI' value='10.17487/RFC7250'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC7230' target='https://www.rfc-editor.org/info/rfc7230'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems.  This document provides an overview of HTTP architecture and its associated terminology, defines the &quot;http&quot; and &quot;https&quot; Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='7230'/>
<seriesInfo name='DOI' value='10.17487/RFC7230'/>
</reference>



<reference anchor='RFC7593' target='https://www.rfc-editor.org/info/rfc7593'>
<front>
<title>The eduroam Architecture for Network Roaming</title>
<author fullname='K. Wierenga' initials='K.' surname='Wierenga'><organization/></author>
<author fullname='S. Winter' initials='S.' surname='Winter'><organization/></author>
<author fullname='T. Wolniewicz' initials='T.' surname='Wolniewicz'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia.  The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access.  The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document.  In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t></abstract>
</front>
<seriesInfo name='RFC' value='7593'/>
<seriesInfo name='DOI' value='10.17487/RFC7593'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8366' target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor='RFC8376' target='https://www.rfc-editor.org/info/rfc8376'>
<front>
<title>Low-Power Wide Area Network (LPWAN) Overview</title>
<author fullname='S. Farrell' initials='S.' role='editor' surname='Farrell'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8376'/>
<seriesInfo name='DOI' value='10.17487/RFC8376'/>
</reference>



<reference anchor='RFC8572' target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='I. Farrer' initials='I.' surname='Farrer'><organization/></author>
<author fullname='M. Abrahamsson' initials='M.' surname='Abrahamsson'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC8995' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>


<reference anchor='I-D.ietf-ace-wg-coap-eap'>
   <front>
      <title>EAP-based Authentication Service for CoAP</title>
      <author fullname='Rafa Marin-Lopez'>
	 <organization>University of Murcia</organization>
      </author>
      <author fullname='Dan Garcia-Carrillo'>
	 <organization>University of Oviedo</organization>
      </author>
      <date day='26' month='July' year='2021'/>
      <abstract>
	 <t>   This document specifies an authentication service that uses the
   Extensible Authentication Protocol (EAP) transported employing
   Constrained Application Protocol (CoAP) messages.  As such, it
   defines an EAP lower-layer based on CoAP called CoAP-EAP.  One of the
   primer goals is to authenticate a CoAP-enabled device (EAP peer) that
   intends to join a security domain managed by a domain Controller (EAP
   authenticator).  Secondly, it allows deriving key material to protect
   CoAP messages exchanged between them based on Object Security for
   Constrained RESTful Environments (OSCORE), enabling the establishment
   of a security association between them.  This document also provides
   guidelines on how to generate key material for other types of
   security associations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ace-wg-coap-eap-03'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ace-wg-coap-eap-03.txt' type='TXT'/>
</reference>


<reference anchor='I-D.oflynn-core-bootstrapping'>
   <front>
      <title>Security Bootstrapping of Resource-Constrained Devices</title>
      <author fullname='Behcet Sarikaya'>
	 </author>
      <author fullname='Yoshihiro Ohba'>
	 </author>
      <author fullname='Zhen Cao'>
	 </author>
      <author fullname='Robert Cragie'>
	 </author>
      <date day='7' month='November' year='2010'/>
      <abstract>
	 <t>The Internet of Things is marching its way towards completion.  Nodes
can use standards from the 6LoWPAN and ROLL WG to achieve IP
connectivity.  IEEE Standards ensure connectivity at lower layers for
resource-constrained devices.  Yet a central problem remains at a
more basic layer without a suitable answer: how to initially
configure the network.  Without configuration the network never
advances beyond a large box of nodes.  Current solutions tend to be
specific to a certain vendor, node type, or application.

This document outlines exactly what problems are faced in solving
this problem.  General problems faced in any low-power wireless
network are outlined first; followed by how these apply to
bootstrapping.  A selection of currently proposed techniques is
presented.  From these a more generic approach is presented, which
can solve the problem for a wide range of situations.

An emphasis is on performing this bootstrapping in a secure manner.
This document does not cover operation of the network securely.  This
document does provide the basis for allowing the network to operate
securely however, by providing standard methods for key exchanges and
authentication.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-oflynn-core-bootstrapping-03'/>
   <format target='https://www.ietf.org/archive/id/draft-oflynn-core-bootstrapping-03.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-emu-eap-noob'>
   <front>
      <title>Nimble out-of-band authentication for EAP (EAP-NOOB)</title>
      <author fullname='Tuomas Aura'>
	 <organization>Aalto University</organization>
      </author>
      <author fullname='Mohit Sethi'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Aleksi Peltonen'>
	 <organization>Aalto University</organization>
      </author>
      <date day='3' month='September' year='2021'/>
      <abstract>
	 <t>   The Extensible Authentication Protocol (EAP) provides support for
   multiple authentication methods.  This document defines the EAP-NOOB
   authentication method for nimble out-of-band (OOB) authentication,
   and key derivation.  The EAP method is intended for bootstrapping all
   kinds of Internet-of-Things (IoT) devices that have no pre-configured
   authentication credentials.  The method makes use of a user-assisted
   one-directional OOB message between the peer device and
   authentication server to authenticate the in-band key exchange.  The
   device must have a non-network input or output interface, such as a
   display, microphone, speaker, or blinking light, which can send or
   receive dynamically generated messages of tens of bytes in length.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-emu-eap-noob-06'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-emu-eap-noob-06.txt' type='TXT'/>
</reference>


<reference anchor='I-D.sethi-gba-constrained'>
   <front>
      <title>Using Generic Bootstrapping Architecture with Constrained Devices</title>
      <author fullname='Mohit Sethi'>
	 </author>
      <author fullname='Vesa Lehtovirta'>
	 </author>
      <author fullname='Patrik Salmela'>
	 </author>
      <date day='13' month='February' year='2014'/>
      <abstract>
	 <t>   This document discusses the use of the 3GPP Generic Bootstrapping
   Architecture (GBA) for authenticating and securing constrained
   devices.  While GBA re-uses the 3GPP credentials, it does not require
   mobile network access, such as LTE, but requires only IP
   connectivity.  Though building devices that employ GBA is obviously
   well known, this document specifically focuses on techniques
   necessary to minimize memory and energy consumption which is
   essential for constrained device networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-sethi-gba-constrained-01'/>
   <format target='https://www.ietf.org/archive/id/draft-sethi-gba-constrained-01.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-emu-eap-tls13'>
   <front>
      <title>Using EAP-TLS with TLS 1.3 (EAP-TLS 1.3)</title>
      <author fullname='John Preuß Mattsson'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Mohit Sethi'>
	 <organization>Ericsson</organization>
      </author>
      <date day='20' month='October' year='2021'/>
      <abstract>
	 <t>   The Extensible Authentication Protocol (EAP), defined in RFC 3748,
   provides a standard mechanism for support of multiple authentication
   methods.  This document specifies the use of EAP-Transport Layer
   Security (EAP-TLS) with TLS 1.3 while remaining backwards compatible
   with existing implementations of EAP-TLS.  TLS 1.3 provides
   significantly improved security and privacy, and reduced latency when
   compared to earlier versions of TLS.  EAP-TLS with TLS 1.3 (EAP-TLS
   1.3) further improves security and privacy by always providing
   forward secrecy, never disclosing the peer identity, and by mandating
   use of revocation checking, when compared to EAP-TLS with earlier
   versions of TLS.  This document also provides guidance on
   authentication, authorization, and resumption for EAP-TLS in general
   (regardless of the underlying TLS version used).  This document
   updates RFC 5216.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-emu-eap-tls13-21'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-emu-eap-tls13-21.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-ace-coap-est'>
   <front>
      <title>EST over secure CoAP (EST-coaps)</title>
      <author fullname='Peter van der Stok'>
	 <organization>Consultant</organization>
      </author>
      <author fullname='Panos Kampanakis'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Michael C. Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Shahid Raza'>
	 <organization>RISE SICS</organization>
      </author>
      <date day='6' month='January' year='2020'/>
      <abstract>
	 <t>   Enrollment over Secure Transport (EST) is used as a certificate
   provisioning protocol over HTTPS.  Low-resource devices often use the
   lightweight Constrained Application Protocol (CoAP) for message
   exchanges.  This document defines how to transport EST payloads over
   secure CoAP (EST-coaps), which allows constrained devices to use
   existing EST functionality for provisioning certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ace-coap-est-18'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ace-coap-est-18.txt' type='TXT'/>
</reference>


<reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
  <front>
    <title>Wi-Fi Simple Configuration</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Version" value="2.0.7"/>
</reference>
<reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
  <front>
    <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
    </author>
    <author initials="E." surname="Oat" fullname="Elena Oat">
      <organization>Aalto University</organization>
    </author>
    <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2014" month="September"/>
  </front>
  <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
</reference>
<reference anchor="dpp" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Device_Provisioning_Protocol_Specification_v1.1_1.pdf">
  <front>
    <title>Wi-Fi Device Provisioning Protocol (DPP)</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Wi-Fi Alliance" value="Specification version 1.1"/>
</reference>
<reference anchor="IEEE802.15.4" target="http://standards.ieee.org/findstds/standard/802.15.4-2015.html">
  <front>
    <title>IEEE Standard for Low-Rate Wireless Networks</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
  <seriesInfo name="IEEE Std." value="802.15.4-2015"/>
</reference>
<reference anchor="LoRaWAN" target="https://lora-alliance.org/resource_hub/lorawan-specification-v1-1/">
  <front>
    <title>LoRa Specification V1.1</title>
    <author >
      <organization>LoRa Alliance</organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="LoRa Alliance" value="Version: 1.1"/>
</reference>
<reference anchor="vendorcert" >
  <front>
    <title>Standard for local and metropolitan area networks - secure device identity</title>
    <author >
      <organization>IEEE std. 802.1ar-2009</organization>
    </author>
    <date year="2009" month="December"/>
  </front>
</reference>
<reference anchor="oma" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Core</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2020" month="November"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2"/>
</reference>
<reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification_v2.2.2.pdf">
  <front>
    <title>OCF Security Specification</title>
    <author >
      <organization>Open Connectivity Foundation</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="Version" value="2.2.2"/>
</reference>
<reference anchor="threadcommissioning" >
  <front>
    <title>Thread Commissioning</title>
    <author >
      <organization>Thread Group</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification</title>
    <author >
      <organization>Fast Identity Online Alliance</organization>
    </author>
    <date year="2021" month="March"/>
  </front>
  <seriesInfo name="Fido Alliance" value="Version: 1.0"/>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

