<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.43 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-t2trg-security-setup-iot-devices-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" submissionType="IRTF">
  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>

    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
      <address>
        <postal>
          <city>Espoo</city>
          <region></region>
          <code>02150</code>
          <country>Finland</country>
        </postal>
        <email>mohit@iki.fi</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization></organization>
      <address>
        <postal>
          <street></street> <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country></country>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <street></street>
          <city>Oviedo</city>
          <region></region>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>

    <date year="2023" month="September" day="25"/>

    
    
    

    <abstract>


<?line 155?>

<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completion, and the knowledge imparted to the IoT devices after the setup is complete.</t>



    </abstract>



  </front>

  <middle>


<?line 160?>

<section anchor="introduction"><name>Introduction</name>

<t>Initial security setup for a device refers to any process that takes place before a device can become fully operational. The phrase <strong>initial security setup</strong> intentionally includes the term <em>security</em> as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, configuration of necessary credentials and parameters.</t>

<t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by <xref target="Sethi14">Sethi et al.</xref> while developing a solution for smart displays.</t>

<t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passphrase before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with initial security setup of devices and excludes any discussion on setting up networks.</t>

<t>There are several terms that are used in the context of initial security setup of devices:</t>

<t><list style="symbols">
  <t>Bootstrapping</t>
  <t>Provisioning</t>
  <t>Onboarding</t>
  <t>Enrollment</t>
  <t>Commissioning</t>
  <t>Initialization</t>
  <t>Configuration</t>
  <t>Registration</t>
  <t>Discovery</t>
</list></t>

<t>In addition to using a variety of different terms, initial security setup mechanisms can rely on a number of entities. For example, a companion smartphone device maybe necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverse initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>

<t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>

<t><list style="symbols">
  <t>Terminology used</t>
  <t>Entities or "players" involved</t>
  <t>Initial assumptions about the device</t>
  <t>Processes necessary for completion</t>
  <t>Knowledge imparted to the device after completion</t>
</list></t>

</section>
<section anchor="usage"><name>Standards and Protocols</name>

<section anchor="bluetooth"><name>Bluetooth</name>

<t>Bluetooth mesh specifies a provisioning protocol.  The goal of the provisioning phase is to securely incorporate a new Bluetooth mesh node, by completing two critical tasks. First, to authenticate the unprovisioned device and second, to create a secure link with said device to share information.</t>

<t>The provisioning process is divided into five distinct stages summarize next:</t>

<t><list style="symbols">
  <t>Beaconing for discover: The new unprovisioned device is discovered by the provisioner</t>
  <t>Negotiation: The unprovisioned device indicates to the provisioner a set of capabilities such as the security algorithms supported, the availability of its public key using an Out-of-Band (OOB) channel and the input/output interfaces supported</t>
  <t>Public-key exchange: The authentication method is selected by the provisioner and both devices exchange Elliptic-curve Diffie–Hellman (ECDH) public keys. These keys may be static or ephemeral. Their exchange can be done in two ways, either via Out-of-Band or directly through a Bluetooth link. Each device then generates a symmetric key, named ECDHSecret, by combining its own private key and the public key of the peer device. The EDCHSecret is used to protect communication between the two devices.</t>
  <t>Authentication: During this phase, the ECDH key exchange is authenticated. The authentication method can be Output OOB, Input OOB, static OOB, or No OOB. With Output OOB, the unprovisioned device chooses a random number and outputs that number in manner consistent with its capabilities. The provisioner then inputs this number. Then, a check confirmation value operation is performed. This involves a cryptographic exchange regarding (in this case) the random number to complete the authentication. With Input OOB, the roles are reversed, being the provisioner the entity that generates the random number. When neither of the previous authentication procedures are feasible, both the provisioner and unprovisioned device generate a random number and require the user supervising the setup to verify that values on the device and provisioner are the same.</t>
  <t>Distribution of provisioning data: At this point, the provisioning process can be protected. This involves the distribution of data such as a Network key, to secure the communications at network layer and a unicast address among other information.</t>
</list></t>

<t>Bluetooth mesh has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, provisioning.</t>
  <t>Players: Client, Device, Manager, Manufacturer, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: Previously to the provisioning phase, there is no pre-shared credentials for a trust relation.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: After the provisiong, the device trusts the provisioner entity and any other device in the network sharing its network key.</t>
</list></t>

</section>
<section anchor="device-provisioning-protocol-dpp"><name>Device Provisioning Protocol (DPP)</name>

<t>The Wi-Fi Alliance Device provisioning protocol (DPP) <xref target="dpp"/> describes itself as a standardized protocol for providing user friendly Wi-Fi setup while maintaining or increasing the security. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the network. DPP has the following three phases/sub-protocols:</t>

<t><list style="symbols">
  <t>Bootstrapping: The configurator obtains bootstrapping information from the enrollee using an out-of-band channel such as scanning a QR code or tapping NFC. The bootstrapping information includes the public-key of the device and metadata such as the radio channel on which the device is listening.</t>
  <t>Authentication: In DPP, either the configurator or the enrollee can initiate the authentication protocol. The side initiating the authentication protocol is called as the initiator while the other side is called the responder. The authentication sub-protocol provides authentication of the responder to an initiator. It can optionally authenticate the initiator to the responder (only if the bootstrapping information was exchange out-of-band in both directions).</t>
  <t>Configuration: Using the key established from the authentication protocol, the enrollee asks the configurator for network information such as the SSID and passphrase of the access point.</t>
</list></t>

<t>DPP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, discovery, enrollment, provisioning.</t>
  <t>Players: Authenticator, Client, Configurator, Device, Initiator, Manufacturer, Owner, Peer, Persona, Responder, User, Enrollee</t>
  <t>Initial beliefs assumed in the device: There are two entities involved in the DPP protocol, the Initiator and Responder. These entities as a starting point do not have a trust relation, nor do they share credentials or key material. DPP uses a decentralized architecture with no central authority to coordinate or control authentication and rely on a direct trust model.
 In DPP, authentication does not rely on a pre-existing trust relation with a third-party or centralized entity, hence all entities involved in DPP need to perform the required validation.</t>
  <t>Processes: Bootstrapping, authentication,  provisioning, and network access.
Bootstrapping: To establish a secure provisioning connection, the devices exchange public bootstrapping keys.
Authentication: To establish trust and build a secure channel, the devices employ the DPP Authentication protocol's bootstrapping keys.
Configuration: The Configurator uses the DPP Configuration protocol to provision the Enrollee through the secure channel created during DPP Authentication.
Network access: The Enrollee establishes network access using the newly provisioned credentials.</t>
  <t>Beliefs imparted to the device after protocol execution: DPP bootstrapping relies on the transfer of the public-key that is expected to be trusted. The beliefs when mutual authentication is run, relies on the trust of a succesful DPP bootstrapping. When mutual authentication is not supported, a device that can control when and how its own public key is bootstrapped, can perform a weak authentication to any entity that knows its public key.</t>
</list></t>

</section>
<section anchor="enrollment-over-secure-transport-est"><name>Enrollment over Secure Transport (EST)</name>

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="RFC9148"/>. EST assumes that some initial information is already distributed so that EST client and servers can perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines "Bootstrap Distribution of CA Certificates" which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate "fingerprint" received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>

<t>EST has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, enrollment, initialization, configuration.</t>
  <t>Players: Administrator, Client, Device, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: There is a process of distribution of initial information which provides both the EST client and server with the information for the EST client and server to perform mutual authentication as well as for authorization.</t>
  <t>Processes: Distribution of Certificates, Bootstrap, Enrollment</t>
  <t>Beliefs imparted to the device after protocol execution: The EST enrollment process is designed to make establishing automated certificate issuing from a trustworthy CA as simple as possible. After the processe have finished, the device is able to automatically renew its certificates through re-enrollment as it has a trust relation with the ESP server.</t>
</list></t>

</section>
<section anchor="open-mobile-alliance-oma-lightweight-machine-to-machine-specification-lwm2m"><name>Open Mobile Alliance (OMA) Lightweight Machine to Machine specification (LwM2M)</name>

<t>LwM2M specification developed by OMA <xref target="oma"/> defines a RESTful architecture where a new IoT device (LwM2M client) first contacts an LwM2M Bootstrap-Server for obtaining essential information such credentials for subsequently registering with one or more LwM2M Servers. These one or more LwM2M servers are used for performing device management actions during the device lifecycle (reading sensor data, controlling an actuator, modifying access controls etc.). LwM2M specification does not deal with the initial network configuration of IoT devices and assumes that the IoT client device has network reachability to the LwM2M Bootstrap-Server and LwM2M Server.</t>

<t>The current standard defines the following four bootstrapping modes:</t>

<t><list style="symbols">
  <t>Factory Bootstrap: An IoT device is configured with all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Serverwhile it is manufactured and prior to its deployment.</t>
  <t>Bootstrap from Smartcard: An IoT device retrieves all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server from a Smartcard.</t>
  <t>Client Initiated Bootstrap: If the IoT device in one of the above bootstrapping modes is only configured with information about an LwM2M Bootstrap-Server, then the client device must first communicate securely with the configured LwM2M Bootstrap-Server and obtain necessary information and credentials to subsequently register with one or more LwM2M Servers.</t>
  <t>Server Initiated Bootstrap: In this bootstrapping mode, the LwM2M server triggers the client device to begin the client initiated bootstrap sequence described above.</t>
</list></t>

<t>The LwM2M specification is also quite flexible in terms of the credentials and the transport security mechanism used between the client device and the LwM2M Server or the LwM2M Bootstrap-Server. Credentials such as a pre-shared symmetric key, a raw public key (RPK), or x.509 certificates can be used with various transport protocols such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) as specified in LwM2M transport bindings specification <xref target="oma-transport"/>.</t>

<t>As explained earlier, an LwM2M Bootstrap-Server is responsible for provisioning credentials into an LwM2M Client. When x509 certificates are being provisioned, the asymmetric key pair is generated on the Bootstrap-Server and then sent to the LwM2M client device. This approach is not acceptable in all scenarios and therefore, LwM2M specification also supports a mode where the client device uses the Enrollment over Secure Transport (EST) certificate management protocol for provisioning certificates from the LwM2M Bootstrap-Server to the LwM2M Client.</t>

<t>OMA has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em> and <em>Unbootstrapping</em>: Bootstrapping is used for describing the process of providing an IoT device with credentials and information of one or more LwM2M server. Interestingly, the transport bindings specification <xref target="oma-transport"/> also uses the term unbootstrapping for the process where objects corresponding to an LwM2M Server are deleted on the client.</t>
      <t><em>Provisioning</em> and <em>configuration</em>: terms used to refer to the process of providing some infomration to a LwM2M client.</t>
      <t><em>Discovery</em>: term for the process by which a LwM2M Bootstrap-Server or LwM2M Server discovers objects, object instances, resources, and attributes supported by RESTful interfaces of a LwM2M Client.</t>
      <t><em>Register</em> and <em>De-register</em>: Register is the process by which a client device sets up a secure association with an LwM2M Server and provides the server with information about objects and existing object instances of the client. De-register is the process by which the client deletes information about itself provided to the LwM2M server during the registration process.</t>
      <t><em>Intialization</em>: term for the process by which an LwM2M Bootstrap-Server or LwM2M Server deletes objects on the client before performing any write operations.</t>
    </list></t>
  <t><strong>Players</strong>: Device manufacturers or Smartcard manufacturers are responsible for providing client IoT devices with initial information and credentials of LwM2M Bootstrap-Server and/or LwM2M server.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: The client at the very least has necessary information to trust the LwM2M bootstrap server in the .</t>
  <t><strong>Processes</strong>: LwM2M does not require any actions from the device owner/user. Once the device is registered with the LwM2M server, various actions related to device management can be performed by device owner/user via the LwM2M server.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the bootstrapping is performed, the LwM2M client can register (Security object and Server object) with the LwM2M servers.</t>
</list></t>

</section>
<section anchor="nimble-out-of-band-authentication-for-eap-eap-noob"><name>Nimble out-of-band authentication for EAP (EAP-NOOB)</name>

<t>Extensible Authentication Protocol (EAP) framework provides support for multiple authentication methods. EAP-NOOB <xref target="RFC9140"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the IoT device (peer in EAP terminology) and the server. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server.</t>

<t>The application server where the IoT device is registered once EAP-NOOB is completed may belong to the manufacturer or the local network where the device is being deployed. EAP-NOOB uses the flexibility of the Authentication, Authorization, and Accounting (AAA) <xref target="RFC2904"/> architecture to allow routing of EAP-NOOB sessions to a specific application server.</t>

<t>EAP-NOOB claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels and supports IoT devices with only output (e.g. display) or only input (e.g. camera).</t>

<t>EAP-NOOB has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: term used to describe the entire process involved during the initial security setup of an IoT device. The specification does not use separate terms or distinguish the process of obtaining identifier and credentials for communicating with an application server where the user has an account or for network connectivity.</t>
      <t><em>Registration</em>: term used for describing the process of associating the device with a user account on an application server.</t>
    </list></t>
  <t><strong>Players</strong>: The device owner/user is responsible for transferring an OOB message necessary for protocol completion. The application server where the device is registered may be provided by different service providers including the device manufacturer or device owner. The local network needs standard AAA configuration for routing EAP-NOOB sessions to the application server chosen by the device owner/user.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: EAP-NOOB does not require devices to have any pre-installed credentials but expects all devices to use a standard identifier (noob@eap-noob.arpa) during initial network discovery.</t>
  <t><strong>Processes</strong>: The IoT device performs network discovery and one or more OOB outputs maybe generated. The user is expected EAP exchange is encompassed by Initial Exchange, OOB step, Completion Exchange and Waiting Exchange.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After EAP-NOOB botstrapping process is complete, the device and server establish a long-term secret which can renewed without further user involvement. As a side-effect, the device also obtains identifier and credentials for network and Internet connectivity (via the EAP authenticator).</t>
</list></t>

</section>
<section anchor="open-connectivity-foundation-ocf"><name>Open Connectivity Foundation (OCF)</name>

<t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the process before a device is operational as onboarding.  The first step of this onboarding process is configuring the ownership, i.e., establishing a legitimate user that owns the device. For this, the user is supposed to use an Onboarding tool (OBT) and an Owner Transfer Method (OTM).</t>

<t>The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc. OCF lists several optional OTMs. At the end of the execution of an OTM, the onboarding tool must have provisioned an Owner Credential onto the device. The following owner transfer methods are specified:</t>

<t><list style="symbols">
  <t>Just works: Performs an un-authenticated Diffie-Hellman key exchange over Datagram Transport Layer Security (DTLS). The key exchange results in a symmetric session key which is later used for provisioning. Naturally, this mode is vulnerable to on-path attackers.</t>
  <t>Random PIN: The device generates a PIN code that is entered into the onboarding tool by the user. This pin code is used together with TLS-PSK ciphersuites for establishing a symmetric session key. OCF recommends PIN codes to have an entropy of 40 bits.</t>
  <t>Manufacturer certificate: An onboarding tool authenticates the device by verifying a manufacturer installed certificate. Similarly, the device may authenticate the onboarding tool by verifying its signature.</t>
  <t>Vendor specific: Vendors implement their own transfer method that accommodates any specific device constraints.</t>
</list></t>

<t>Once the onboarding tool and the new device have authenticated and established secure communication, the onboarding tool provisions/configures the device with Owner credentials. Owner credentials may consist of certificates, shared keys, or Kerberos tickets for example.</t>

<t>The OBT additionally configures/provisions information about the Access Management Service (AMS), the Credential Management  Service (CMS), and the credentials for interacting with them. The AMS is responsible for provisioning access control entries, while the CMS provisions security credentials necessary for device operation.</t>

<t>OCF has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, enrollment, onboarding, provisioning, registration,</t>
  <t>Players: Client, Device, Manager, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: The device needs to be associated with an owner in the onboarding process and then go through the provisioning process before being considered as trustworty.</t>
  <t>Processes: Onboarding, provisioning.</t>
  <t>Beliefs imparted to the device after protocol execution: In the provisioning phase the device receives the necessary credentials to interact with provisioning services and any other services or devices that are part of the normal operation of the device.</t>
</list></t>

</section>
<section anchor="fast-identity-online-fido-alliance"><name>Fast IDentity Online (FIDO) alliance</name>

<t>The Fast IDentity Online Alliance (FIDO) is currently specifying an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecycle. The draft specification refers to this feature as "late binding".</t>

<t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as "out-of-scope" but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC7230"/> proxies for IP networks and other forms of tunnelling for non-IP networks.</t>

<t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called as GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>

<t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should used.</t>

<t>FIDO has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, onboarding, commissioning, initialisation.</t>
  <t>Players: Device, Manager, Manufacturer, Owner, Rendezvous Server,  User</t>
  <t>Initial beliefs assumed in the device: In the initial state the device is not yet associated with a specific owner. The DI process has to take place to embed owndership and manufacturing credentials in the device, the first in a chaim to create an ownership voucher that will be used to perform the transfer of ownership of the device.</t>
  <t>Processes: Device Initialize Protocol (DI), Transfer Ownership Protocol 0 (TO0), Transfer Ownership Protocol 1 (TO1), Transfer Ownership Protocol 2 (TO2)</t>
  <t>Beliefs imparted to the device after protocol execution: When the device is powered on, and all TO protocols run, the device figures out by contacting with the rendezvous server, who the owner is, authenticate with the owner. At this point the rendezvous server, and owner are able to authenticate the device.</t>
</list></t>

</section>
<section anchor="bootstrapping-remote-secure-key-infrastructures-brski"><name>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</name>

<t>The ANIMA working group is working on a bootstrapping solution for devices that relies on 802.1AR <xref target="ieee8021ar"/> vendor certificates called Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/>. In addition to vendor installed IEEE 802.1AR certificates, a vendor based service on the Internet is required. Before being authenticated, a new device only needs link-local connectivity, and does not require a routable address. When a vendor provides an Internet based service, devices can be forced to join only specific domains. The document highlights that the described solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. It claims to scale to thousands of devices located in hostile environments, such as ISP provided CPE devices which are drop-shipped to the end user.</t>

<t>BRSKI has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, enrollment, onboarding.</t>
  <t>Players: Administrator, Client, Cloud Registrar, Configurator, Device, Domain Registrar, Initiator, Join Proxy, JRC, Manufacturer, Owner, Peer, Pledge, Server, User</t>
  <t>Initial beliefs assumed in the device: Every device has an IDevID, installed and signed by the manufacturer, which is used as a basis for establishing further trust relations. In the initial stage, when the device is deployed in a specific location it cannot securely communicate with the registrar or JRC, to be integrated into the network, so  the device and the registrar need to establish mutual trust.</t>
  <t>Processes: Discover, self-Identify, joint registrar, imprint registrar, enroll.</t>
  <t>Beliefs imparted to the device after protocol execution: After the process has finished and the device is imprinted, and trusts the registrar/JRC, through a voucher issued by the manufacturer and verified by the device.</t>
</list></t>

</section>
<section anchor="secure-zero-touch-provisioning-sztp"><name>Secure Zero Touch Provisioning (SZTP)</name>

<t><xref target="RFC8572"/> defines a bootstrapping strategy for enabling devices to securely obtain all the configuration information with no installer input, beyond the actual physical placement and connection of cables. Their goal is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment specific network management system (NMS). SZTP requires the devices to be configured with trust anchors in the form of X.509 certificates. <xref target="RFC8572"/> is similar to BRSKI based on <xref target="RFC8366"/>.</t>

<t>SZTP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, onboarding, enrollment, configuration, discovery.</t>
  <t>Players: Administrator, Bootstrap Server, Client, Device, Manufacturer, Onboarding Server, Owner, Redirect Server, Bootstrap Server, User, Owner</t>
  <t>Initial beliefs assumed in the device: Initially, the device needs have pre-configured a state that allows allows the bootstrap processs. Among other information, the trust anchor for ownership voucher, client &amp; intermediaries certificates, and list of trusted bootstrap servers and their trust anchors.</t>
  <t>Processes: Initial state, Boot sequence, Processing bootstrapping data, validating signed data, processing redirect information, processing onboarding information.</t>
  <t>Beliefs imparted to the device after protocol execution: The bootstrapping process provides the device with all the necessary information (onboarding information) to create a trust relation between the device and the bootstrap server. This allows the device to download its boot image and the necessary initial configuration. The enrollment information will allow a device to be bootstrapped and operate establishing secure connections with other systems.</t>
</list></t>

</section>
<section anchor="lpwan"><name>LPWAN</name>

<t>Low Power Wide Area Network (LPWAN) encompasses a wide variety of technologies whose link-layer characteristics are severely constrained in comparison to other typical IoT link-layer technologies such as Bluetooth or IEEE 802.15.4. While some LPWAN technologies rely on proprietary bootstrapping solutions which are not publicly accessible, others simply ignore the challenge of bootstrapping and key distribution. In this section, we discuss the bootstrapping methods used by LPWAN technologies covered in <xref target="RFC8376"/>.</t>

<t><list style="symbols">
  <t>LoRaWAN <xref target="LoRaWAN"/> describes its own protocol to authenticate nodes before allowing them join a LoRaWAN network. This process is called as joining and it is based on pre-shared keys (called AppKeys in the standard). The joining procedure comprises only one exchange (join-request and join-accept) between the joining node and the network server. There are several adaptations to this joining procedure that allow network servers to delegate authentication and authorization to a backend AAA infrastructure <xref target="RFC2904"/>.</t>
  <t>Wi-SUN Alliance Field Area Network (FAN) uses IEEE 802.1X <xref target="ieee8021x"/> and EAP-TLS for network access authentication. It performs a 4-way handshake to establish a session keys after EAP-TLS authentication.</t>
  <t>NB-IoT relies on the traditional 3GPP mutual authentication scheme based on a shared-secret in the Subscriber Identity Module (SIM) of the device and the mobile operator.</t>
  <t>Sigfox security is based on unique device identifiers and cryptographic keys. As stated in <xref target="RFC8376"/>, although the algorithms and keying details are not publicly available, there is sufficient information to indicate that bootstrapping in Sigfox is based on pre-established credentials between the device and the Sigfox network.</t>
</list></t>

<t>From the above, it is clear that all LPWAN technologies rely on pre-provisioned credentials for authentication between a new device and the network.</t>

<t>LPWAN has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, configuration, discovery.</t>
  <t>Players: Administrator, Authenticator, Border Router, Client, Device, Manager, Network Server, User</t>
  <t>Initial beliefs assumed in the device: The device normally has credentials that are used to directly secure the communications or to device key material to do so. There is a basic trust in the network server.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: Either because of an authentication process that results in newly derived key material or the pre-provisioned key material is used, the device is able to exchange information securely through the network server.</t>
</list></t>

</section>
<section anchor="thread"><name>Thread</name>

<t>Thread Group commissioning <xref target="threadcommissioning"/> introduces a two phased process i.e. Petitioning and Joining. Entities involved are leader, joiner, commissioner, joiner router, and border router. Leader is the first device in Thread network that must be commissioned using out-of-band process and is used to inject correct user generated Commissioning Credentials (can be changed later) into Thread Network. Joiner is the node that intends to get authenticated and authorized on Thread Network. Commissioner is either within the Thread Network (Native) or connected with Thread Network via a WLAN (External).</t>

<t>Under some topologies, Joiner Router and Border Router facilitate the Joiner node to reach Native and External Commissioner, respectively. Petitioning begins before Joining process and is used to grant sole commissioning authority to a Commissioner. After an authorized Commissioner is designated, eligible thread devices can join network. Pair-wise key is shared between Commissioner and Joiner, network parameters (such as network name, security policy, etc.,) are sent out securely (using pair-wise key) by Joiner Router to Joiner for letting Joiner to join the Thread Network. Entities involved in Joining process depends on system topology i.e. location of Commissioner and Joiner. Thread networks only operate using IPv6. Thread devices can devise GUAs (Global Unicast Addresses) <xref target="RFC4291"/>. Provision also exist via Border Router, for Thread device to acquire individual global address by means of DHCPv6 or using SLAAC (Stateless Address Autoconfiguration) address derived with advertised network prefix.</t>

<t>Thread has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Commissioning, discovery, provisioning.</t>
  <t>Players: Administrator, Border Agent, Border Router, Commissioner, Commissioner Candidate, Configurator, Device, End Device, End Device, Endpoint Identifier, Initiator, Joiner, Joiner Router, Owner, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device: The joiner needs to share credentials with an entity that belongs to the Thread network, prior to the authentication process.</t>
  <t>Processes: Petitioning, Joining</t>
  <t>Beliefs imparted to the device after protocol execution: Once the authentication takes place, a trust relation is established between the Joiner and the Commissioner it receives the network parameters needed to be attached to the Thread network.</t>
</list></t>

</section>
</section>
<section anchor="comp"><name>Comparison</name>

<t>There are several stages before a device becomes fully operational. There is typically a stage where some sort of credential is installed. The nature or purpose of this credential can be varied, form being part of the IoT device authentication, to a credential from a 3rd trusted party, be it the manufacturer or the owner. Solution differ on this initial process, and in some cases this can even be done in an out-of-band fashion.</t>

<t>After some initial credential is installed, there is a process that typically involves authentication establishing initial trust, after which  credentials and/or parameters are configured or installed into the device.</t>

<t>Finally, when the entities involved in the process are authenticated and the configuration and key material established, the normal operation of the IoT device can take place.</t>

<section anchor="comp-term"><name>Comparison of terminology</name>

<t>The specifics of every term varies depending on the technology, but we enumerate here the basic terminology and what it means for the different solutions.</t>

<t><list style="symbols">
  <t>Bootstrapping:
  <list style="symbols">
      <t>DPP: Client obtains the Controller’s public bootstrapping key and IP address</t>
      <t>OMA: An IoT device retrieves and processes all the bootstrap data</t>
      <t>EST: installation of the Explicit TA database</t>
      <t>BRSKI: A protocol to obtain a local trust anchor.</t>
      <t>SZTP: The process by which obtains "bootstrapping data" such as conveyed information, owner certificate and owner voucher.</t>
      <t>EAP-NOOB: For an IoT device to be registered, authenticated, authorized and for it to derive key material to act as a trustworty entity in the security domain where it is deployed.</t>
    </list></t>
  <t>configuration:
  <list style="symbols">
      <t>DPP: The process performed by a Configurator by which the Enrollee is provisioned.</t>
      <t>OMA: Adding or removing an LwM2M Server Account to or from the LwM2M Client configuration.</t>
      <t>OCF: The necessary information the Device must hold to be considered as ready for normal operation.</t>
      <t>EST: The basic information (e.g., TA database) needed to initiate protocol operation.</t>
      <t>SZTP: The system configuration  to be installed into the device by the bootstrapping process.</t>
      <t>EAP-NOOB: Establishing  necessary information for the device to operate.</t>
      <t>LPWAN: In LoRaWAN, the information related to the working of the device and protocol.</t>
    </list></t>
  <t>discovery:
  <list style="symbols">
      <t>DPP: Exchange that allows obtaining specific information such as SSID, operating channel and band.</t>
      <t>OCF: Making the different resources available through URIs.</t>
      <t>BRSKI: Locating an entity that needs to take part of the bootstrapping process (e.g., Join proxy)</t>
    </list></t>
  <t>enrollment:
  <list style="symbols">
      <t>EST: The process of obtaining the credentials needed to perform the device normal operation.</t>
      <t>BRSKI: Same process describe as EST.</t>
      <t>SZTP: The process of an owner joining a manufacturer's SZTP program.</t>
    </list></t>
  <t>provisioning:
  <list style="symbols">
      <t>DPP: Securely enabling a device to establish secure associations with other devices in a network.</t>
      <t>OMA: Establishing security credentials and access control lists by a dedicated LwM2M bootstrap server.</t>
      <t>OCF: A set of processes that take place both during and after the ownership transfer. These entail configuration of credentials, and security-related resources for any services or devices that the provisioned device needs to interact with in the future.</t>
      <t>Bluetooth: The procedure by which a device is authenticated, and a secure link is established, becoming a trustworthy node in the network.</t>
      <t>FIDO: Same as FIDO onboarding.</t>
      <t>SZTP: The set of steps that take place to enable a device to establish secure connections with other systems.</t>
      <t>LPWAN: In LoRaWAN, the establishment of configuration data and credentials.</t>
    </list></t>
  <t>intialization:
  <list style="symbols">
      <t>OMA: When Bootstrap-Delete operation is used, to restore a device.</t>
      <t>FIDO: Protocol (DI), establishing basic information at manufacture.</t>
    </list></t>
  <t>registration:
  <list style="symbols">
      <t>OMA: Establishing a registration session, which is an association between the client and the server.</t>
      <t>EAP-NOOB: Add information about an IoT device in a server database.</t>
    </list></t>
  <t>onboarding:
  <list style="symbols">
      <t>OCF:  The device is considered to complete the onboarding after the ownership of the Device has been transferred and the Device provisioned.</t>
      <t>FIDO: The procedure of installing configuration information and secret to a device so that it may safely connect to and communicate with an IoT platform.</t>
      <t>SZTP: information related to the boot image a device must be running, an initial configuration the device must commit, and scripts that the device must successfully execute.</t>
    </list></t>
  <t>commissioning:
  <list style="symbols">
      <t>Thread: The process of a Thread device joining a Thread network.</t>
    </list></t>
  <t>imprint:
  <list style="symbols">
      <t>BRSKI: The process by which a device obtains the needed information to act as trustworthy entity within the network or domain</t>
    </list></t>
</list></t>

</section>
<section anchor="comp-players"><name>Comparison of players</name>

<t>In this section we classify the different players.</t>

<t>Human User: user</t>

<t>Device that intends to securely join a network: pledge, device, client, peer, persona, enrollee, candidate</t>

<t>Entity that makes the device: Manufacturer</t>

<t>Entity that owns the device: owner, manager</t>

<t>Entity with which the device establishes a connection: IoT platform, Rendezvous Server, Server,</t>

<t>Entity that aids in  the process: Join Proxy, Bootstrap Server, Onboarding Server, Border Router</t>

<t>Person that manages a deployment or system: Administrator</t>

<t>Entity that steers the process for the IoT device to securely join the network: Configurator, Bootstrap Server, Rendezvous Server, JRC, Onboarding/Redirect Server, Commissioner.</t>

<t>External or third-party entity that intervenes in the process:  Registrar, MASA</t>

</section>
<section anchor="comp-beliefs"><name>Comparison of initial beliefs</name>

<t>The IoT devices may have different initial beliefs depending on the credentials pre-installed, during the manufacturing process or prior to being turned on. There are cases where the initial credentials that need to be shared to establish basic trust, or they are exchanged during one of the procedures after the device is turned on, not installed during manufacturing.</t>

<section anchor="no-initial-trust-established"><name>No initial trust established</name>

<t>EAP-NOOB does not require initial configuration of credentials to establish trust, since its done using the out-of-band process.</t>

<t>The OCF device starts as unowned. It has to perform an ownership transfer, to establish basic trust to perform onboarding and  provisioning. Depending on the Owener Transfer Mode (OTM) it can be considered to have not initial trust based on the credentials installed.</t>

<t>Bluetooth devices start as unprovisioned. Initial trust is established as a consequence of exchanging public keys and performing the authentication. If the public keys are ephemeral, there is no initial credential establishment.</t>

</section>
<section anchor="initial-trust-based-on-the-credentials-installed"><name>Initial trust based on the credentials installed</name>

<t>These credentials may very from the time of installing, and the entity to which it related. In this sense, they could be from the  manufacturer, owner or other entity.</t>

<t>FIDO devices have installed during the manufacturing process a set of ownership credentials (i.e., ownership voucher) and additional information to determine the current owner of the device. Hence, there is an initial trust from the IoT device and the owner. With this basic setup, and and the cooperation among device, owner and rendezvous server, the onboarding process can take place.</t>

<t>EST devices are configured with the needed information to perform mutual authentication and for authorization between the EST client and server.</t>

<t>BRSKI have manufacturer-installed certificates as starting point to establish trust.</t>

<t>SZTP have pre-configured initial state which provides the basis for trust.</t>

<t>LPWAN specifics depends on the technology, but they all have in common some pre-installed credentials that allows the establishment of trust and to secure the communications.</t>

<t>Thread devices, share credentials as well to establish trust.</t>

<t>OMA devices can have all the necessary information to start working on the network where they are deployed, if they have the factory bootstrap, hence all needed credentials to establish trust. There need to be installed some basic credentials to establish trust with the bootstrap server and perform the bootstrapping.</t>

<t>DPP initial trust is established during the bootstrapping where the public key is transmitted.</t>

</section>
</section>
<section anchor="comp-process"><name>Comparison of processes</name>

<t>Analyzing the different terms used over the different solutions reviewed in this document, we can identify several processes. These are named differently in some cases, and not every technologies considers them all as part of their the following common concepts:</t>

<t><list style="symbols">
  <t>To refer to the process previous to the device being turned on, in which some information, or credentials are installed into the device. This process is commonly referred to as manufacture. Is in this phase where the IoT devices have installed the needed information (specifics depend on the technology) to provide the basis for trust and to authenticate other entities.</t>
  <t>To refer to the process after the device is turned on and intends to locate the entity with which it has to communicate to start the authentication process to be integrated into the security domain. Here is where the device start the process to get to perform its normal operation.</t>
  <t>To the process by which the device obtains additional credentials, in addition to what it already had installed before being turned on.</t>
  <t>To the process by which the device is authenticated and established a trust relation.</t>
</list></t>

</section>
<section anchor="comp-impart"><name>Comparison of knowledge imparted to the device</name>

<t>Even though the devices might start from a different place, in terms of initial credentials as basis for trust, when they finish their processes, they become trusted parties within the domain they are deployed or at least have a trust relation with a specific entity. The difference may strive in the number of trust relations are stablished during the process, as they may have not only established a trust relation with local entities where they perform their operation, but other external entities as well.</t>

<t>In FIDO, once the onboarding process has taken place, the IoT device is mutually authenticated with the current owner, and the needed secrets and configuration data is installed into the device, which as a result is able to connect and interact securely with the target IoT platform.</t>

<t>In EAP-NOOB, once the bootstrapping is completed, the IoT device not only has a trust relation with the EAP server, but the EAP authenticator can be established as well, based on the shared credentials that are derived during the authentication process.</t>

<t>In Bluetooth the trust is expanded to the local network as there is key material shared among the different entities of the network.</t>

<t>In Thread once the joiner has successfully completed the process, it can communicate directly with all Thread devices in the network.</t>

<t>LPWAN has a more limited scope and they usually have specific keys for applications and network communications.</t>

<t>EST provides the devices with the enrollment information such as certificates and symmetric keys that can be used to establish trust with different peers.</t>

<t>BRSKI after running it is able to verify that the communicating entities are who they claim to be, and obtain domain specific certificates to act as trustworhty entities within the domain.</t>

<t>SZTP after running, the device has obtained onboarding information and is equipped to establish secure connections with other systems.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of bootstrapping protocols are present in the respective specifications.</t>

<t>Nonetheless, we briefly discuss some important security aspects which are not fully explored in various specifications.</t>

<t>Firstly, an IoT system may deal with authorization for resources and services separately from initial security setup in terms of timing as well as protocols. As an example, two resource-constrained devices A and B may perform mutual authentication using credentials provided by an offline third-party X before device A obtains authorization for running a particular application on device B from an online third-party Y. In some cases, authentication and authorization maybe tightly coupled, e.g., successful authentication also means successful authorization.</t>

<t>Secondly, initial security setup of IoT devices may be necessary several times during the device lifecycle since keys have limited lifetimes and devices may be lost or resold. Protocols and systems must have adequate provisions for revocation and fresh security setup. A rerun of the security setup mechanism must be as secure as the initial security setup regardless of whether it is done manually or automatically over the network.</t>

<t>Lastly, some IoT networks use a common group key for multicast and broadcast traffic. As the number of devices in a network increase over time, a common group key may not be scalable and the same network may need to be split into separate groups with different keys. Bootstrapping and provisioning protocols may need appropriate mechanisms for identifying and distributing keys to the current member devices of each group.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>

</section>


  </middle>

  <back>



    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2904">
  <front>
    <title>AAA Authorization Framework</title>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="L. Gommans" initials="L." surname="Gommans"/>
    <author fullname="G. Gross" initials="G." surname="Gross"/>
    <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
    <author fullname="C. de Laat" initials="C." surname="de Laat"/>
    <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
    <author fullname="D. Spence" initials="D." surname="Spence"/>
    <date month="August" year="2000"/>
    <abstract>
      <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2904"/>
  <seriesInfo name="DOI" value="10.17487/RFC2904"/>
</reference>

<reference anchor="RFC4291">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <date month="February" year="2006"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
      <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4291"/>
  <seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>

<reference anchor="RFC5272">
  <front>
    <title>Certificate Management over CMS (CMC)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
      <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
      <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
      <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5272"/>
  <seriesInfo name="DOI" value="10.17487/RFC5272"/>
</reference>

<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC7228">
  <front>
    <title>Terminology for Constrained-Node Networks</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="M. Ersue" initials="M." surname="Ersue"/>
    <author fullname="A. Keranen" initials="A." surname="Keranen"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7228"/>
  <seriesInfo name="DOI" value="10.17487/RFC7228"/>
</reference>

<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC7230">
  <front>
    <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7230"/>
  <seriesInfo name="DOI" value="10.17487/RFC7230"/>
</reference>

<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>

<reference anchor="RFC8366">
  <front>
    <title>A Voucher Artifact for Bootstrapping Protocols</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8366"/>
  <seriesInfo name="DOI" value="10.17487/RFC8366"/>
</reference>

<reference anchor="RFC8376">
  <front>
    <title>Low-Power Wide Area Network (LPWAN) Overview</title>
    <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8376"/>
  <seriesInfo name="DOI" value="10.17487/RFC8376"/>
</reference>

<reference anchor="RFC8572">
  <front>
    <title>Secure Zero Touch Provisioning (SZTP)</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="I. Farrer" initials="I." surname="Farrer"/>
    <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8572"/>
  <seriesInfo name="DOI" value="10.17487/RFC8572"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC8995">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="RFC9140">
  <front>
    <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
    <author fullname="T. Aura" initials="T." surname="Aura"/>
    <author fullname="M. Sethi" initials="M." surname="Sethi"/>
    <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9140"/>
  <seriesInfo name="DOI" value="10.17487/RFC9140"/>
</reference>

<reference anchor="RFC9148">
  <front>
    <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
    <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Raza" initials="S." surname="Raza"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9148"/>
  <seriesInfo name="DOI" value="10.17487/RFC9148"/>
</reference>


<reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
  <front>
    <title>Wi-Fi Simple Configuration</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Version" value="2.0.7"/>
</reference>
<reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
  <front>
    <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
    </author>
    <author initials="E." surname="Oat" fullname="Elena Oat">
      <organization>Aalto University</organization>
    </author>
    <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2014" month="September"/>
  </front>
  <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
</reference>
<reference anchor="dpp" target="https://www.wi-fi.org/wi-fi-download/35330">
  <front>
    <title>Wi-Fi Easy Connect Specification</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Wi-Fi Alliance" value="Version 3.0"/>
</reference>
<reference anchor="LoRaWAN" target="https://lora-alliance.org/resource_hub/lorawan-specification-v1-1/">
  <front>
    <title>LoRa Specification</title>
    <author >
      <organization>LoRa Alliance</organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="LoRa Alliance" value="Version: 1.1"/>
</reference>
<reference anchor="oma" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Core-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Core</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="oma-transport" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Transport-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Transport Bindings</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification.pdf">
  <front>
    <title>OCF Security Specification</title>
    <author >
      <organization>Open Connectivity Foundation</organization>
    </author>
    <date year="2022" month="October"/>
  </front>
  <seriesInfo name="Version" value="2.2.6"/>
</reference>
<reference anchor="ieee8021ar" target="https://1.ieee802.org/security/802-1ar/">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="ieee8021x" target="https://1.ieee802.org/security/802-1x/">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Port-Based Network Access Control</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="threadcommissioning" >
  <front>
    <title>Thread Commissioning</title>
    <author >
      <organization>Thread Group</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification</title>
    <author >
      <organization>Fast Identity Online Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
  <seriesInfo name="Fido Alliance" value="Version: 1.1"/>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

