<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-t2trg-security-setup-iot-devices-05" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>

    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
      <address>
        <postal>
          <city>Espoo</city>
          <region></region>
          <code>02150</code>
          <country>Finland</country>
        </postal>
        <email>mohit@iki.fi</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization></organization>
      <address>
        <postal>
          <city></city>
          <region></region>
          <code></code>
          <country></country>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <city>Oviedo</city>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>

    <date year="2025" month="October" day="19"/>

    
    
    

    <abstract>


<?line 149?>

<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completion, and the knowledge imparted to the IoT devices after the setup is complete.</t>



    </abstract>



  </front>

  <middle>


<?line 154?>

<section anchor="introduction"><name>Introduction</name>

<t>Initial security setup for a device refers to any process that takes place before a device can become fully operational. The phrase <strong>initial security setup</strong> intentionally includes the term <em>security</em> as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, and configuration of necessary credentials and parameters.</t>

<t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by <xref target="Sethi14">Sethi et al.</xref> while developing a solution for smart displays.</t>

<t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passphrase before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with the initial security setup of devices and excludes any discussion on setting up networks.</t>

<t>There are several terms that are used in the context of initial security setup of devices:</t>

<t><list style="symbols">
  <t>Bootstrapping</t>
  <t>Provisioning</t>
  <t>Onboarding</t>
  <t>Enrollment</t>
  <t>Commissioning</t>
  <t>Initialization</t>
  <t>Configuration</t>
  <t>Registration</t>
  <t>Discovery</t>
</list></t>

<t>In addition to using a variety of different terms, initial security setup mechanisms can rely on several entities. For example, a companion smartphone device may be necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverse initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>

<t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>

<t><list style="symbols">
  <t>Terminology used</t>
  <t>Entities or "players" involved</t>
  <t>Initial assumptions about the device</t>
  <t>Processes necessary for completion</t>
  <t>Knowledge imparted to the device after completion</t>
</list></t>

</section>
<section anchor="usage"><name>Standards and Protocols</name>

<section anchor="bluetooth"><name>Bluetooth</name>

<t>Bluetooth mesh specifies a provisioning protocol.  The goal of the provisioning phase is to securely incorporate a new Bluetooth mesh node, by completing two critical tasks. First, to authenticate the unprovisioned device and second, to create a secure link with said device to share information.</t>

<t>The provisioning process is divided into five distinct stages summarize next:</t>

<t><list style="symbols">
  <t>Beaconing for discovery: The new unprovisioned device is discovered by the provisioner</t>
  <t>Negotiation: The unprovisioned device indicates to the provisioner a set of capabilities such as the security algorithms supported, the availability of its public key using an Out-of-Band (OOB) channel and the input/output interfaces supported</t>
  <t>Public-key exchange: The authentication method is selected by the provisioner and both devices exchange Elliptic-curve Diffie-Hellman (ECDH) public keys. These keys may be static or ephemeral. Their exchange can be done in two ways, either via Out-of-Band or directly through a Bluetooth link. Each device then generates a symmetric key, named ECDHSecret, by combining its own private key and the public key of the peer device. The EDCHSecret is used to protect communication between the two devices.</t>
  <t>Authentication: During this phase, the ECDH key exchange is authenticated. The authentication method can be Output OOB, Input OOB, static OOB, or No OOB. With Output OOB, the unprovisioned device chooses a random number and outputs that number in manner consistent with its capabilities. The provisioner then inputs this number. Then, a check confirmation value operation is performed. This involves a cryptographic exchange regarding (in this case) the random number to complete the authentication. With Input OOB, the roles are reversed, being the provisioner the entity that generates the random number. When neither of the previous authentication procedures are feasible, both the provisioner and unprovisioned device generate a random number and require the user supervising the setup to verify that values on the device and provisioner are the same.</t>
  <t>Distribution of provisioning data: At this point, the provisioning process can be protected. This involves the distribution of data such as a Network key, to secure the communications at network layer and a unicast address among other information.</t>
</list></t>

<t>Bluetooth mesh has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, provisioning.</t>
  <t>Players: Client, Device, Manager, Manufacturer, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: Previously to the provisioning phase, there are no pre-shared credentials for a trust relation.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: After the provisioning, the device trusts the provisioner entity and any other device in the network sharing its network key.</t>
</list></t>

</section>
<section anchor="device-provisioning-protocol-dpp"><name>Device Provisioning Protocol (DPP)</name>

<t>The Wi-Fi Alliance Device provisioning protocol (DPP) <xref target="dpp"/> describes itself as a standardized protocol for providing user-friendly Wi-Fi setup while maintaining or increasing the security. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the network. DPP has the following three phases/sub-protocols:</t>

<t><list style="symbols">
  <t>Bootstrapping: The configurator obtains bootstrapping information from the enrollee using an out-of-band channel such as scanning a QR code or tapping NFC. The bootstrapping information includes the public-key of the device and metadata such as the radio channel on which the device is listening.</t>
  <t>Authentication: In DPP, either the configurator or the enrollee can initiate the authentication protocol. The side initiating the authentication protocol is called the initiator while the other side is called the responder. The authentication sub-protocol provides authentication of the responder to an initiator. It can optionally authenticate the initiator to the responder (only if the bootstrapping information was exchanged out-of-band in both directions).</t>
  <t>Configuration: Using the key established from the authentication protocol, the enrollee asks the configurator for network information such as the SSID and passphrase of the access point.</t>
</list></t>

<t>DPP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, discovery, enrollment, provisioning.</t>
  <t>Players: Authenticator, Client, Configurator, Device, Initiator, Manufacturer, Owner, Peer, Persona, Responder, User, Enrollee</t>
  <t>Initial beliefs assumed in the device: There are two entities involved in the DPP protocol, the Initiator and Responder. These entities as a starting point do not have a trust relation, nor do they share credentials or key material. DPP uses a decentralized architecture with no central authority to coordinate or control authentication and rely on a direct trust model.
 In DPP, authentication does not rely on a pre-existing trust relation with a third-party or centralized entity, hence all entities involved in DPP need to perform the required validation.</t>
  <t>Processes: Bootstrapping, authentication,  provisioning, and network access.
Bootstrapping: To establish a secure provisioning connection, the devices exchange public bootstrapping keys.
Authentication: To establish trust and build a secure channel, the devices employ the DPP Authentication protocol's bootstrapping keys.
Configuration: The Configurator uses the DPP Configuration protocol to provision the Enrollee through the secure channel created during DPP Authentication.
Network access: The Enrollee establishes network access using the newly provisioned credentials.</t>
  <t>Beliefs imparted to the device after protocol execution: DPP bootstrapping relies on the transfer of the public-key that is expected to be trusted. The beliefs when mutual authentication is run, relies on the trust of a successful DPP bootstrapping. When mutual authentication is not supported, a device that can control when and how its own public key is bootstrapped, can perform a weak authentication to any entity that knows its public key.</t>
</list></t>

</section>
<section anchor="enrollment-over-secure-transport-est"><name>Enrollment over Secure Transport (EST)</name>

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="RFC9148"/>. EST assumes that the enrolling device already has IP connectivity to the EST server and some initial information is already distributed so that EST client and server to perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines "Bootstrap Distribution of CA Certificates" which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate "fingerprint" received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>

<t>EST has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used for the process when the client device has not been configured with an Implicit Trust Anchor (TA) database and device owner or administrator manually verifies the fingerprint of the EST CA certificate. This manual verification is only needed once, as the device establishes an explicit TA database for subsequent TLS authentication of the EST server.</t>
      <t><em>Enrollment</em>: describes the entire process of obtaining a client certificate from the EST CA. This includes learning the EST CA certificate, discovering required attributes for the Certificate Signing Request (CSR), submitting the CSR, and receiving the final client certificate.</t>
      <t><em>Initialization</em>: term used to refer to the essential initialization data that the device needs for completing the enrollment including the trust anchors, the EST server URI, and credentials for TLS authentication.</t>
    </list></t>
  <t><strong>Players</strong>: The network administrator is responsible for deploying and maintaining the EST CA and EST server before a device can be enrolled into the network. The device manufacturer must install a client identity certificate (such as an IEEE 802.1AR certificate), a shared secret for TLS authentication without certificates, and/or a username and password for HTTP Basic or Digest authentication. Additionally, the manufacturer may configure trust anchors for verifying the EST server and set the EST server URI. However, the EST specification allows for manual configuration of all required information, including the manual verification of the EST CA certificate fingerprint.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: A device acting as an EST client is assumed to possess an existing credential for authenticating itself during the TLS handshake with the EST server. This credential may be a previously issued EST client certificate or a certificate from a distinct PKI, such as an IEEE 802.1AR manufacturer-installed certificate. Alternatively, the client may authenticate using a shared secret-based credential, such as a pre-installed symmetric key, or a username and password, either as a standalone method or in combination with TLS authentication. To verify the EST server, the client relies on a trust anchor database, which may be explicit, used to authenticate certificates issued by the EST CA, including the EST server certificate, or implicit, allowing authentication of the EST server when it presents a certificate issued by an external CA. The implicit trust anchor database may initially contain pre-installed CA certificates and can be disabled once the EST CA certificate is obtained. The EST client must also be configured with a Uniform Resource Identifier (URI) to locate the EST server.</t>
  <t><strong>Processes</strong>: Before a device can enroll using EST, the necessary network infrastructure must be in place, including the deployment of the EST server and CA. The device can discover the EST server URI through various methods, such as manual configuration or preconfigured settings from the manufacturer. If the device lacks an explicit Trust Anchor (TA) database, it may require bootstrapping, where the owner or administrator manually verifies the fingerprint of the EST CA certificate. Once the EST server is authenticated, the device retrieves the EST CA certificate, learns the required attributes for generating a Certificate Signing Request (CSR), and submits the CSR to obtain a client certificate. After enrollment, the device can securely authenticate to the network using its newly issued certificate and renew it before expiration.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After completing the enrollment process, the device obtains a client certificate issued by the EST CA, which it can use for authentication in subsequent communications. During enrollment, the device also learns the EST CA certificate, along with any intermediate certificates needed to build a complete trust chain to the EST CA trust anchor. The client also discovers the attributes it should include in a Certificate Signing Request (CSR), such as key usage, extended key usage, etc. Depending on the enrollment method, the device may generate its own key pair and submit a CSR or receive both a server-generated key pair and certificate. If the client requested a Full PKI, it may also receive information such as certificate revocation lists (CRLs), policy and name constriants etc. as defined in <xref target="RFC5272"/>.</t>
</list></t>

</section>
<section anchor="open-mobile-alliance-oma-lightweight-machine-to-machine-specification-lwm2m"><name>Open Mobile Alliance (OMA) Lightweight Machine to Machine specification (LwM2M)</name>

<t>LwM2M specification developed by OMA <xref target="oma"/> defines a RESTful architecture where a new IoT device (LwM2M client) first contacts an LwM2M Bootstrap-Server for obtaining essential information such credentials for subsequently registering with one or more LwM2M Servers. These one or more LwM2M servers are used for performing device management actions during the device lifecycle (reading sensor data, controlling an actuator, modifying access controls etc.). LwM2M specification does not deal with the initial network configuration of IoT devices and assumes that the IoT client device has network reachability to the LwM2M Bootstrap-Server and LwM2M Server.</t>

<t>The current standard defines the following four bootstrapping modes:</t>

<t><list style="symbols">
  <t>Factory Bootstrap: An IoT device is configured with all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server while it is manufactured and prior to its deployment.</t>
  <t>Bootstrap from Smartcard: An IoT device retrieves all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server from a Smartcard.</t>
  <t>Client Initiated Bootstrap: If the IoT device in one of the above bootstrapping modes is only configured with information about an LwM2M Bootstrap-Server, then the client device must first communicate securely with the configured LwM2M Bootstrap-Server and obtain the necessary information and credentials to subsequently register with one or more LwM2M Servers.</t>
  <t>Server Initiated Bootstrap: In this bootstrapping mode, the LwM2M server triggers the client device to begin the client initiated bootstrap sequence described above.</t>
</list></t>

<t>The LwM2M specification is also quite flexible in terms of the credentials and the transport security mechanism used between the client device and the LwM2M Server or the LwM2M Bootstrap-Server. Credentials such as a pre-shared symmetric key, a raw public key (RPK), or X.509 certificates can be used with various transport protocols such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) as specified in LwM2M transport bindings specification <xref target="oma-transport"/>.</t>

<t>As explained earlier, an LwM2M Bootstrap-Server is responsible for provisioning credentials into an LwM2M Client. When X.509 certificates are being provisioned, the asymmetric key pair is generated on the Bootstrap-Server and then sent to the LwM2M client device. This approach is not acceptable in all scenarios and therefore, LwM2M specification also supports a mode where the client device uses the Enrollment over Secure Transport (EST) certificate management protocol for provisioning certificates from the LwM2M Bootstrap-Server to the LwM2M Client.</t>

<t>OMA has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em> and <em>Unbootstrapping</em>: Bootstrapping is used for describing the process of providing an IoT device with credentials and information of one or more LwM2M servers. Interestingly, the transport bindings specification <xref target="oma-transport"/> also uses the term unbootstrapping for the process where objects corresponding to an LwM2M Server are deleted on the client.</t>
      <t><em>Provisioning</em> and <em>configuration</em>: terms used to refer to the process of providing some information to a LwM2M client.</t>
      <t><em>Discovery</em>: term for the process by which a LwM2M Bootstrap-Server or LwM2M Server discovers objects, object instances, resources, and attributes supported by RESTful interfaces of a LwM2M Client.</t>
      <t><em>Register</em> and <em>De-register</em>: Register is the process by which a client device sets up a secure association with an LwM2M Server and provides the server with information about objects and existing object instances of the client. De-register is the process by which the client deletes information about itself provided to the LwM2M server during the registration process.</t>
      <t><em>Intialization</em>: term for the process by which an LwM2M Bootstrap-Server or LwM2M Server deletes objects on the client before performing any write operations.</t>
    </list></t>
  <t><strong>Players</strong>: Device manufacturers or Smartcard manufacturers are responsible for providing client IoT devices with initial information and credentials of LwM2M Bootstrap-Server and/or LwM2M server.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: The client at the very least has the necessary information to trust the LwM2M bootstrap server.</t>
  <t><strong>Processes</strong>: LwM2M does not require any actions from the device owner/user. Once the device is registered with the LwM2M server, various actions related to device management can be performed by device owner/user via the LwM2M server.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the bootstrapping is performed, the LwM2M client can register (Security object and Server object) with the LwM2M servers.</t>
</list></t>

</section>
<section anchor="nimble-out-of-band-authentication-for-eap-eap-noob"><name>Nimble out-of-band authentication for EAP (EAP-NOOB)</name>

<t>Extensible Authentication Protocol (EAP) framework provides support for multiple authentication methods. EAP-NOOB <xref target="RFC9140"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the IoT device (peer in EAP terminology) and the server. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server.</t>

<t>The application server where the IoT device is registered once EAP-NOOB is completed may belong to the manufacturer or the local network where the device is being deployed. EAP-NOOB uses the flexibility of the Authentication, Authorization, and Accounting (AAA) <xref target="RFC2904"/> architecture to allow routing of EAP-NOOB sessions to a specific application server.</t>

<t>EAP-NOOB claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels and supports IoT devices with only output (e.g. display) or only input (e.g. camera).</t>

<t>EAP-NOOB has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of an IoT device. The specification does not use separate terms or distinguish the process of obtaining identifier and credentials for communicating with an application server where the user has an account or for network connectivity.</t>
      <t><em>Registration</em>: describes the process of associating the device with a user account on an application server.</t>
    </list></t>
  <t><strong>Players</strong>: The device owner/user is responsible for transferring an OOB message necessary for protocol completion. The application server where the device is registered may be provided by different service providers including the device manufacturer or device owner. The local network needs standard AAA configuration for routing EAP-NOOB sessions to the application server chosen by the device owner/user.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: EAP-NOOB does not require devices to have any pre-installed credentials but expects all devices to use a standard identifier (noob@eap-noob.arpa) during initial network discovery.</t>
  <t><strong>Processes</strong>: The IoT device performs network discovery and one or more OOB outputs may be generated. The user is expected EAP exchange is encompassed by Initial Exchange, OOB step, Completion Exchange and Waiting Exchange.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After EAP-NOOB bootstrapping process is complete, the device and server establish a long-term secret, which can be renewed without further user involvement. As a side-effect, the device also obtains identifier and credentials for network and Internet connectivity (via the EAP authenticator).</t>
</list></t>

</section>
<section anchor="open-connectivity-foundation-ocf"><name>Open Connectivity Foundation (OCF)</name>

<t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the process before a device is operational as onboarding.  The first step of this onboarding process is configuring the ownership, i.e., establishing a legitimate user that owns the device. For this, the user is supposed to use an Onboarding tool (OBT) and an Owner Transfer Method (OTM).</t>

<t>The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc. OCF lists several optional OTMs. At the end of the execution of an OTM, the onboarding tool must have provisioned an Owner Credential onto the device. The following owner transfer methods are specified:</t>

<t><list style="symbols">
  <t>Just works: Performs an un-authenticated Diffie-Hellman key exchange over Datagram Transport Layer Security (DTLS). The key exchange results in a symmetric session key which is later used for provisioning. Naturally, this mode is vulnerable to on-path attackers.</t>
  <t>Random PIN: The device generates a PIN code that is entered into the onboarding tool by the user. This pin code is used together with TLS-PSK ciphersuites for establishing a symmetric session key. OCF recommends PIN codes to have an entropy of 40 bits.</t>
  <t>Manufacturer certificate: An onboarding tool authenticates the device by verifying a manufacturer-installed certificate. Similarly, the device may authenticate the onboarding tool by verifying its signature.</t>
  <t>Vendor specific: Vendors implement their own transfer method that accommodates any specific device constraints.</t>
</list></t>

<t>Once the onboarding tool and the new device have authenticated and established secure communication, the onboarding tool provisions/configures the device with Owner credentials. Owner credentials may consist of certificates, shared keys, or Kerberos tickets for example.</t>

<t>The OBT additionally configures/provisions information about the Access Management Service (AMS), the Credential Management  Service (CMS), and the credentials for interacting with them. The AMS is responsible for provisioning access control entries, while the CMS provisions security credentials necessary for device operation.</t>

<t>OCF has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, enrollment, onboarding, provisioning, registration,</t>
  <t>Players: Client, Device, Manager, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: The device needs to be associated with an owner in the onboarding process and then go through the provisioning process before being considered as trustworthy.</t>
  <t>Processes: Onboarding, provisioning.</t>
  <t>Beliefs imparted to the device after protocol execution: In the provisioning phase the device receives the necessary credentials to interact with provisioning services and any other services or devices that are part of the normal operation of the device.</t>
</list></t>

</section>
<section anchor="bootstrapping-remote-secure-key-infrastructures-brski"><name>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</name>

<t>The ANIMA working group is working on a bootstrapping solution for devices that rely on 802.1AR <xref target="ieee8021ar"/> vendor certificates called Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/>. In addition to vendor installed IEEE 802.1AR certificates, a vendor based service on the Internet is required. Before being authenticated, a new device only needs link-local connectivity, and does not require a routable address. When a vendor provides an Internet based service, devices can be forced to join only specific domains. The document highlights that the described solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. It claims to scale to thousands of devices located in hostile environments, such as ISP provided CPE devices which are drop-shipped to the end user.</t>

<t>BRSKI has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, enrollment, onboarding.</t>
  <t>Players: Administrator, Client, Cloud Registrar, Configurator, Device, Domain Registrar, Initiator, Join Proxy, JRC, Manufacturer, Owner, Peer, Pledge, Server, User</t>
  <t>Initial beliefs assumed in the device: Every device has an IDevID, installed and signed by the manufacturer, which is used as a basis for establishing further trust relations. In the initial stage, when the device is deployed in a specific location it cannot securely communicate with the registrar or JRC, to be integrated into the network, so  the device and the registrar need to establish mutual trust.</t>
  <t>Processes: Discover, self-Identify, joint registrar, imprint registrar, enroll.</t>
  <t>Beliefs imparted to the device after protocol execution: After the process has finished and the device is imprinted, and trusts the registrar/JRC, through a voucher issued by the manufacturer and verified by the device.</t>
</list></t>

</section>
<section anchor="secure-zero-touch-provisioning-sztp"><name>Secure Zero Touch Provisioning (SZTP)</name>

<t><xref target="RFC8572"/> defines a bootstrapping strategy that enables devices to securely obtain all configuration information with minimal installer input, beyond physical placement and cable connections. The goal of this bootstrapping protocol is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment-specific network management system (NMS). Devices receive signed and optionally encrypted information about the owner's NMS, which they authenticate using an owner certificate and an ownership voucher <xref target="RFC8366"/> signed by the device manufacturer. The owner certificate and ownership voucher can be delivered to the device via Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers. Devices may be redirected to multiple servers before acquiring the necessary credentials to verify and connect to the designated NMS.</t>

<t>SZTP has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of devices. It involves the device authenticating itself with manufacturer-issued certificates, fetching the owner certificate and ownership voucher, and retrieving the signed or encrypted onboarding information, such as the boot image, initial configuration, and scripts.</t>
      <t><em>Provisioning</em>: refers to the process of providing all the necessary bootstrap information to a device so that it can become functional. In some sense, the terms bootstrapping and provisioning are used interchangeably because, for provisioning the bootstrap information onto the device, it is necessary to bootstrap the device. In fact, the specification also refers to Secure Zero Touch Provisioning (SZTP) as a <em>bootstrapping strategy</em>. Interestingly, even though the title of the protocol specification includes the word provisioning, it is used much less than bootstrapping in the specification text.</t>
      <t><em>Onboarding</em>: used to refer to the information that the device needs to join the owner's network. In particular, the onboarding information includes the boot image the device must run, an initial configuration the device must use, and scripts that the device must successfully execute. Note that in SZTP, onboarding information is not the entire set of information that the device needs for bootstrapping. Prior to obtaining the onboarding information, the device also needs the owner certificate and ownership voucher to verify the onboarding information received later.</t>
      <t><em>Enrollment</em>: describes the process by which the device owner registers with the device manufacturer, ensuring that the manufacturer recognizes the owner and issues the necessary ownership vouchers. This crucial association is later used by the manufacturer to provide the owner with the serial numbers of the devices based on the order. The owner then uses these serial numbers during the bootstrapping process to verify the devices as their own.</t>
      <t><em>Discovery</em>: used for describing the process by which devices discover sources of information, particularly bootstrap servers that are not already known to the device. This discovery typically happens via redirects from trusted bootstrapping servers.</t>
    </list></t>
  <t><strong>Players</strong>: SZTP requires significant involvement of the device manufacturer. The manufacturer is responsible for installing the client identity certificate and trust anchors for verifying botstrapping server certificates and ownership vouchers during the manufacturing process. Additionally, the device manufacturer must support the enrollment of the owner by verifying the owner certificate and issuing an ownership voucher. After receiving an order for devices from an enrolled owner, the manufacturer needs to inform the owner of the serial numbers corresponding to the ordered devices. This naturally necessitates robust asset tracking systems. Lastly, the manufacturer may also need to operate well-known bootstrapping servers that the device contacts to retrieve the owner certificate and ownership voucher. At the same time, the device owner also carries substantial responsibility, including enrolling in the manufacturer's SZTP program, managing the keys associated with the owner certificate, and maintaining the network infrastructure to authenticate the device's serial number and confirm its association with the order placed with the manufacturer. Once authenticated, the owner is responsible for sending signed and/or encrypted onboarding information to the device.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: SZTP requires devices to have a pre-configured state, including a client X.509 certificate for TLS client authentication to bootstrap servers. While the specification allows the use of HTTP authentication with passwords, it typically relies on X.509 certificates in the form of IDevID certificates, as defined in <xref target="ieee8021ar"/>. Additionally, devices must have a list of trusted bootstrap servers and trust anchor certificates for verifying bootstrap server certificates and ownership vouchers signed by the manufacturer. All this information, including the client TLS certificate and trust anchors, must be installed during manufacturing.</t>
  <t><strong>Processes</strong>: A precursor for the device to bootstrap and join the owner's network is the enrollment of the owner with the manufacturer and the setup of all necessary network infrastructure to authenticate the device. Thereafter, the device can use various sources such as Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP) options, removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers to locate the owner certificate and ownership voucher. These methods can be used in parallel to expedite the process. Once the owner certificate and ownership voucher are obtained and verified, the device receives, verifies/decrypts the signed and/or encrypted onboarding information, including boot images, configuration details, and scripts. With the image, configuration, and scripts, the device can securely join the owner's network management system (NMS). Unlike other protocols, once all the infrastructure has been set up, no actions are needed on the device itself other than its physical placement, cabling, and booting up.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the SZTP bootstrapping process, the device possesses all necessary information, called as bootstrapping data, for secure communication with the deployment-specific NMS. This bootstrapping data includes the ownership voucher, the owner certificate, and onboarding information. The owner certificate and ownership voucher are used to verify the onboarding information, which encompasses the boot image and its hash or signature, initial configuration, and pre- and post-configuration scripts to be executed by the device.</t>
</list></t>

</section>
<section anchor="fido-device-onboard-fdo"><name>FIDO Device Onboard (FDO)</name>

<t>The Fast IDentity Online Alliance (FIDO) has specified an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecycle. The draft specification refers to this feature as "late binding".</t>

<t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as "out-of-scope" but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC7230"/> proxies.</t>

<t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into a Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>

<t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should use.</t>

<t>FIDO has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Onboarding</em>: is the central term used in FDO and represents the complete automated process that transitions a device from its factory state to operational use under the owner's management. It covers the discovery of the owner through the rendezvous server, the execution of TO1 and TO2, and the mutual authentication and secure exchange of configuration and credentials between the device and the owner's onboarding service. The ability to determine the final owner and configuration long after the device has been manufactured is referred to as <em>late binding</em>.</t>
      <t><em>Provisioning</em>: used interchangeably with the term onboaring to refer to the entire process of making the device operational. The introduction section of the specification even states <em>FDO is a device onboarding scheme from the FIDO Alliance, sometimes called "device provisioning"</em></t>
      <t><em>Initialization</em>: used to refer to the Device Initialization (DI) protocol, which occurs during device manufacturing and installs on the device all initial information, including the attestation key pair, unique identifier (GUID), rendezvous server information, manufacturer public key hash, and the secret used for computing the device HMAC. During the same phase, the manufacturer's tools generate the ownership voucher that corresponds to the device's credentials.</t>
      <t><em>Resale</em>: refers to the protocol actions that the current device owner can perform to transfer ownership of the device to a new owner without the involvement of the original manufacturer. This is made possible by the ability of the owner to update the device's credentials and generate a new ownership voucher during the onboarding process.</t>
      <t><em>Re-provisioning</em>: refers to the complete onboarding process being executed again for a new owner.</t>
    </list></t>
  <t><strong>Players</strong>: The device manufacturer plays a significant role in FDO. During production, the manufacturer provisions each device with a unique identifier (GUID), an asymmetric key pair used for cryptographic attestation (based on Intel EPID or standard ECDSA), a hash of the manufacturer's public key (used for verifying the ownership voucher chain), and detailed rendezvous information describing how the device can later locate its onboarding infrastructure. These rendezvous instructions may include DNS names, IP addresses, certificate hashes for TLS pinning, and even information such as a Wi-Fi SSID and passphrase to enable initial connectivity to the rendezvous server. The manufacturer also ensures that the device generates a symmetric secret, which is then used to compute an HMAC value over elements such as the device's GUID, rendezvous information, and manufacturer public key. This HMAC, unique to each unit, is embedded into a signed ownership voucher created by the manufacturer and transferred separately through the supply chain, establishing a verifiable link between the physical device and its digital identity. The specification does not prescribe who operates the rendezvous servers and refers to them generically as Internet services; in practice, they are often maintained by the manufacturer but could be hosted by other entities.  <vspace blankLines='1'/>
The final device owner, who seeks long-term management of the device for tasks such as retrieving data and performing software updates, either operates a dedicated onboarding service or delegates this function to another entity. The owner maintains a key pair whose public key is linked to the last entry in the ownership voucher and uses it to register device ownership with a rendezvous server. During the TO2 onboarding protocol, the owner authenticates to the device using its private key and the voucher, while the device attests its identity in return. Once mutual trust is established, the owner's onboarding service securely provisions operational credentials and configuration data, after which the device updates its internal FDO credentials to enable future resale or re-onboarding as needed.  <vspace blankLines='1'/>
FDO can be seen as a more elaborate evolution of SZTP. While both rely on manufacturer-installed credentials and trusted servers for redirection, FDO introduces a tighter cryptographic binding between the device and its ownership voucher through the embedded HMAC mechanism and supports verifiable ownership transfers across multiple entities. This design adds complexity but provides the important advantage that devices remain manageable even if the original manufacturer ceases operation, since ownership and onboarding continuity can be maintained by the last legitimate owner, who can update all information except the device's attestation keys.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: FDO assumes that each device is provisioned during manufacturing with a unique device identifier (GUID), a cryptographic key pair used for device attestation, a hash of the manufacturer's public key for verifying the ownership voucher chain, and the rendezvous information needed to discover onboarding services. The rendezvous information may include DNS names, IP addresses, supported communication protocols, certificate hashes for authenticating the rendezvous server, and even Wi-Fi SSID and passphrase details to enable initial network connectivity. The device also holds a symmetric secret used to compute and verify HMAC values that cryptographically bind the device's internal identity to its ownership voucher.</t>
  <t><strong>Processes</strong>: A precursor for an FDO device to onboard is the DI protocol, which imparts the information stated above. At the same time, the manufacturer creates an ownership voucher linked to the device through a device-generated HMAC value. The final owner, after receiving this voucher, possibly transferred through several intermediaries in the supply chain, registers the address of its onboarding service with a rendezvous server using the device GUID through the TO0 protocol. When the device is powered on, it follows its stored rendezvous instructions and performs the TO1 protocol to contact a rendezvous server, from which it retrieves the signed blob of data containing the network location of the owner's onboarding service. The device may optionally authenticate the rendezvous server through TLS if the rendezvous information specifies HTTPS and includes certificate hashes for pinning. The device then initiates a direct connection to the onboarding service, where the TO2 protocol is executed to perform mutual authentication and ownership transfer. During this process, the owner proves ownership using the ownership voucher, while the device authenticates itself using its attestation credentials. The device also verifies the authenticity of the signed blob received from the rendezvous server using the now-trusted owner key. After successful verification on both sides, a secure communication channel is established through which the owner's onboarding service transfers operational data such as network configuration parameters, addresses and endpoints of management servers or IoT platforms, authentication credentials such as keys, certificates, tokens, or shared secrets. The device applies these configurations and updates its internal FDO credentials with new information provided by the owner, which may include an updated device identifier, new rendezvous information, and a new trust anchor derived from the owner's public key. Similar to SZTP, once the supporting infrastructure such as the ownership voucher and rendezvous server registration has been set up, FDO enables an experience where only the physical installation and powering of the device are required for it to securely join the owner's management system or IoT platform. The specification does mention a <em>Trusted Installer</em> mode where the device is provided with advice and input during the onboarding process from the installer, however this is currently not defined and is left for future releases.</t>
  <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the FDO onboarding process is complete, the device possesses all configuration and credential information necessary for secure operation under the new owner's management domain. This includes data transferred from the owner's onboarding service, which may contain network configuration parameters, the address and endpoint URLs of the final management server or IoT platform, and the credentials such as keys, certificates, tokens, or shared secrets required for the device to authenticate securely to these services. The data may also include instructions for installing required agents, drivers, or firmware updates. In addition, the device may receive and update its internal FDO credentials with new information supplied by the owner, which can include an updated device identifier (GUID), revised rendezvous server information, and a new hash of the owner's public key to establish a renewed trust anchor.</t>
</list></t>

</section>
<section anchor="lpwan"><name>LPWAN</name>

<t>Low Power Wide Area Network (LPWAN) encompasses a wide variety of technologies whose link-layer characteristics are severely constrained in comparison to other typical IoT link-layer technologies such as Bluetooth or IEEE 802.15.4. While some LPWAN technologies rely on proprietary bootstrapping solutions which are not publicly accessible, others simply ignore the challenge of bootstrapping and key distribution. In this section, we discuss the bootstrapping methods used by LPWAN technologies covered in <xref target="RFC8376"/>.</t>

<t><list style="symbols">
  <t>LoRaWAN <xref target="LoRaWAN"/> describes its own protocol to authenticate nodes before allowing them join a LoRaWAN network. This process is called as joining and it is based on pre-shared keys (called AppKeys in the standard). The joining procedure comprises only one exchange (join-request and join-accept) between the joining node and the network server. There are several adaptations to this joining procedure that allow network servers to delegate authentication and authorization to a backend AAA infrastructure <xref target="RFC2904"/>.</t>
  <t>Wi-SUN Alliance Field Area Network (FAN) uses IEEE 802.1X <xref target="ieee8021x"/> and EAP-TLS for network access authentication. It performs a 4-way handshake to establish a session keys after EAP-TLS authentication.</t>
  <t>NB-IoT relies on the traditional 3GPP mutual authentication scheme based on a shared-secret in the Subscriber Identity Module (SIM) of the device and the mobile operator.</t>
  <t>Sigfox security is based on unique device identifiers and cryptographic keys. As stated in <xref target="RFC8376"/>, although the algorithms and keying details are not publicly available, there is sufficient information to indicate that bootstrapping in Sigfox is based on pre-established credentials between the device and the Sigfox network.</t>
</list></t>

<t>From the above, it is clear that all LPWAN technologies rely on pre-provisioned credentials for authentication between a new device and the network.</t>

<t>LPWAN has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, configuration, discovery.</t>
  <t>Players: Administrator, Authenticator, Border Router, Client, Device, Manager, Network Server, User</t>
  <t>Initial beliefs assumed in the device: The device normally has credentials that are used to directly secure the communications or to device key material to do so. There is a basic trust in the network server.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: Either because of an authentication process that results in newly derived key material or the pre-provisioned key material is used, the device is able to exchange information securely through the network server.</t>
</list></t>

</section>
<section anchor="thread"><name>Thread</name>

<t>Thread Group commissioning <xref target="threadcommissioning"/> introduces a two phased process i.e. Petitioning and Joining. Entities involved are leader, joiner, commissioner, joiner router, and border router. Leader is the first device in Thread network that must be commissioned using out-of-band process and is used to inject correct user generated Commissioning Credentials (can be changed later) into Thread Network. Joiner is the node that intends to get authenticated and authorized on Thread Network. Commissioner is either within the Thread Network (Native) or connected with Thread Network via a WLAN (External).</t>

<t>Under some topologies, Joiner Router and Border Router facilitate the Joiner node to reach Native and External Commissioner, respectively. Petitioning begins before Joining process and is used to grant sole commissioning authority to a Commissioner. After an authorized Commissioner is designated, eligible thread devices can join network. Pair-wise key is shared between Commissioner and Joiner, network parameters (such as network name, security policy, etc.,) are sent out securely (using pair-wise key) by Joiner Router to Joiner for letting Joiner to join the Thread Network. Entities involved in Joining process depends on system topology i.e. location of Commissioner and Joiner. Thread networks only operate using IPv6. Thread devices can devise GUAs (Global Unicast Addresses) <xref target="RFC4291"/>. Provision also exist via Border Router, for Thread device to acquire individual global address by means of DHCPv6 or using SLAAC (Stateless Address Autoconfiguration) address derived with advertised network prefix.</t>

<t>Thread has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Commissioning, discovery, provisioning.</t>
  <t>Players: Administrator, Border Agent, Border Router, Commissioner, Commissioner Candidate, Configurator, Device, End Device, End Device, Endpoint Identifier, Initiator, Joiner, Joiner Router, Owner, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device: The joiner needs to share credentials with an entity that belongs to the Thread network, prior to the authentication process.</t>
  <t>Processes: Petitioning, Joining</t>
  <t>Beliefs imparted to the device after protocol execution: Once the authentication takes place, a trust relation is established between the Joiner and the Commissioner it receives the network parameters needed to be attached to the Thread network.</t>
</list></t>

</section>
</section>
<section anchor="comp"><name>Comparison</name>

<t>There are several stages before a device becomes fully operational. There is typically a stage where some sort of credential is installed. The nature or purpose of this credential can be varied, form being part of the IoT device authentication, to a credential from a 3rd trusted party, be it the manufacturer or the owner. Solution differ on this initial process, and in some cases this can even be done in an out-of-band fashion.</t>

<t>After some initial credential is installed, there is a process that typically involves authentication establishing initial trust, after which  credentials and/or parameters are configured or installed into the device.</t>

<t>Finally, when the entities involved in the process are authenticated and the configuration and key material established, the normal operation of the IoT device can take place.</t>

<section anchor="comp-term"><name>Comparison of terminology</name>

<t>The specifics of every term varies depending on the technology, but we enumerate here the basic terminology and what it means for the different solutions.</t>

<t><list style="symbols">
  <t>Bootstrapping:
  <list style="symbols">
      <t>DPP: Client obtains the Controller's public bootstrapping key and IP address</t>
      <t>OMA: An IoT device retrieves and processes all the bootstrap data</t>
      <t>EST: installation of the Explicit TA database</t>
      <t>BRSKI: A protocol to obtain a local trust anchor.</t>
      <t>SZTP: The process by which obtains "bootstrapping data" such as conveyed information, owner certificate and owner voucher.</t>
      <t>EAP-NOOB: For an IoT device to be registered, authenticated, authorized and for it to derive key material to act as a trustworty entity in the security domain where it is deployed.</t>
    </list></t>
  <t>configuration:
  <list style="symbols">
      <t>DPP: The process performed by a Configurator by which the Enrollee is provisioned.</t>
      <t>OMA: Adding or removing an LwM2M Server Account to or from the LwM2M Client configuration.</t>
      <t>OCF: The necessary information the Device must hold to be considered as ready for normal operation.</t>
      <t>EST: The basic information (e.g., TA database) needed to initiate protocol operation.</t>
      <t>SZTP: The system configuration  to be installed into the device by the bootstrapping process.</t>
      <t>EAP-NOOB: Establishing  necessary information for the device to operate.</t>
      <t>LPWAN: In LoRaWAN, the information related to the working of the device and protocol.</t>
    </list></t>
  <t>discovery:
  <list style="symbols">
      <t>DPP: Exchange that allows obtaining specific information such as SSID, operating channel and band.</t>
      <t>OCF: Making the different resources available through URIs.</t>
      <t>BRSKI: Locating an entity that needs to take part of the bootstrapping process (e.g., Join proxy)</t>
    </list></t>
  <t>enrollment:
  <list style="symbols">
      <t>EST: The process of obtaining the credentials needed to perform the device normal operation.</t>
      <t>BRSKI: Same process describe as EST.</t>
      <t>SZTP: The process of an owner joining a manufacturer's SZTP program.</t>
    </list></t>
  <t>provisioning:
  <list style="symbols">
      <t>DPP: Securely enabling a device to establish secure associations with other devices in a network.</t>
      <t>OMA: Establishing security credentials and access control lists by a dedicated LwM2M bootstrap server.</t>
      <t>OCF: A set of processes that take place both during and after the ownership transfer. These entail configuration of credentials, and security-related resources for any services or devices that the provisioned device needs to interact with in the future.</t>
      <t>Bluetooth: The procedure by which a device is authenticated, and a secure link is established, becoming a trustworthy node in the network.</t>
      <t>FIDO: Same as FIDO onboarding.</t>
      <t>SZTP: The set of steps that take place to enable a device to establish secure connections with other systems.</t>
      <t>LPWAN: In LoRaWAN, the establishment of configuration data and credentials.</t>
    </list></t>
  <t>intialization:
  <list style="symbols">
      <t>OMA: When Bootstrap-Delete operation is used, to restore a device.</t>
      <t>FIDO: Protocol (DI), establishing basic information at manufacture.</t>
    </list></t>
  <t>registration:
  <list style="symbols">
      <t>OMA: Establishing a registration session, which is an association between the client and the server.</t>
      <t>EAP-NOOB: Add information about an IoT device in a server database.</t>
    </list></t>
  <t>onboarding:
  <list style="symbols">
      <t>OCF:  The device is considered to complete the onboarding after the ownership of the Device has been transferred and the Device provisioned.</t>
      <t>FIDO: The procedure of installing configuration information and secret to a device so that it may safely connect to and communicate with an IoT platform.</t>
      <t>SZTP: information related to the boot image a device must be running, an initial configuration the device must commit, and scripts that the device must successfully execute.</t>
    </list></t>
  <t>commissioning:
  <list style="symbols">
      <t>Thread: The process of a Thread device joining a Thread network.</t>
    </list></t>
  <t>imprint:
  <list style="symbols">
      <t>BRSKI: The process by which a device obtains the needed information to act as trustworthy entity within the network or domain</t>
    </list></t>
</list></t>

</section>
<section anchor="comp-players"><name>Comparison of players</name>

<t>In this section we classify the different players.</t>

<t>Human User: user</t>

<t>Device that intends to securely join a network: pledge, device, client, peer, persona, enrollee, candidate</t>

<t>Entity that makes the device: Manufacturer</t>

<t>Entity that owns the device: owner, manager</t>

<t>Entity with which the device establishes a connection: IoT platform, Rendezvous Server, Server,</t>

<t>Entity that aids in  the process: Join Proxy, Bootstrap Server, Onboarding Server, Border Router</t>

<t>Person that manages a deployment or system: Administrator</t>

<t>Entity that steers the process for the IoT device to securely join the network: Configurator, Bootstrap Server, Rendezvous Server, JRC, Onboarding/Redirect Server, Commissioner.</t>

<t>External or third-party entity that intervenes in the process:  Registrar, MASA</t>

</section>
<section anchor="comp-beliefs"><name>Comparison of initial beliefs</name>

<t>The IoT devices may have different initial beliefs depending on the credentials pre-installed, during the manufacturing process or prior to being turned on. There are cases where the initial credentials that need to be shared to establish basic trust, or they are exchanged during one of the procedures after the device is turned on, not installed during manufacturing.</t>

<section anchor="no-initial-trust-established"><name>No initial trust established</name>

<t>EAP-NOOB does not require initial configuration of credentials to establish trust, since its done using the out-of-band process.</t>

<t>The OCF device starts as unowned. It has to perform an ownership transfer, to establish basic trust to perform onboarding and  provisioning. Depending on the Owener Transfer Mode (OTM) it can be considered to have not initial trust based on the credentials installed.</t>

<t>Bluetooth devices start as unprovisioned. Initial trust is established as a consequence of exchanging public keys and performing the authentication. If the public keys are ephemeral, there is no initial credential establishment.</t>

</section>
<section anchor="initial-trust-based-on-the-credentials-installed"><name>Initial trust based on the credentials installed</name>

<t>These credentials may very from the time of installing, and the entity to which it related. In this sense, they could be from the  manufacturer, owner or other entity.</t>

<t>FIDO devices have installed during the manufacturing process a set of ownership credentials (i.e., ownership voucher) and additional information to determine the current owner of the device. Hence, there is an initial trust from the IoT device and the owner. With this basic setup, and and the cooperation among device, owner and rendezvous server, the onboarding process can take place.</t>

<t>EST devices are configured with the needed information to perform mutual authentication and for authorization between the EST client and server.</t>

<t>BRSKI have manufacturer-installed certificates as starting point to establish trust.</t>

<t>SZTP have pre-configured initial state which provides the basis for trust.</t>

<t>LPWAN specifics depends on the technology, but they all have in common some pre-installed credentials that allows the establishment of trust and to secure the communications.</t>

<t>Thread devices, share credentials as well to establish trust.</t>

<t>OMA devices can have all the necessary information to start working on the network where they are deployed, if they have the factory bootstrap, hence all needed credentials to establish trust. There need to be installed some basic credentials to establish trust with the bootstrap server and perform the bootstrapping.</t>

<t>DPP initial trust is established during the bootstrapping where the public key is transmitted.</t>

</section>
</section>
<section anchor="comp-process"><name>Comparison of processes</name>

<t>Analyzing the different terms used over the different solutions reviewed in this document, we can identify several processes. These are named differently in some cases, and not every technologies considers them all as part of their the following common concepts:</t>

<t><list style="symbols">
  <t>To refer to the process previous to the device being turned on, in which some information, or credentials are installed into the device. This process is commonly referred to as manufacture. Is in this phase where the IoT devices have installed the needed information (specifics depend on the technology) to provide the basis for trust and to authenticate other entities.</t>
  <t>To refer to the process after the device is turned on and intends to locate the entity with which it has to communicate to start the authentication process to be integrated into the security domain. Here is where the device start the process to get to perform its normal operation.</t>
  <t>To the process by which the device obtains additional credentials, in addition to what it already had installed before being turned on.</t>
  <t>To the process by which the device is authenticated and established a trust relation.</t>
</list></t>

</section>
<section anchor="comp-impart"><name>Comparison of knowledge imparted to the device</name>

<t>Even though the devices might start from a different place, in terms of initial credentials as basis for trust, when they finish their processes, they become trusted parties within the domain they are deployed or at least have a trust relation with a specific entity. The difference may strive in the number of trust relations are stablished during the process, as they may have not only established a trust relation with local entities where they perform their operation, but other external entities as well.</t>

<t>In FIDO, once the onboarding process has taken place, the IoT device is mutually authenticated with the current owner, and the needed secrets and configuration data is installed into the device, which as a result is able to connect and interact securely with the target IoT platform.</t>

<t>In EAP-NOOB, once the bootstrapping is completed, the IoT device not only has a trust relation with the EAP server, but the EAP authenticator can be established as well, based on the shared credentials that are derived during the authentication process.</t>

<t>In Bluetooth the trust is expanded to the local network as there is key material shared among the different entities of the network.</t>

<t>In Thread once the joiner has successfully completed the process, it can communicate directly with all Thread devices in the network.</t>

<t>LPWAN has a more limited scope and they usually have specific keys for applications and network communications.</t>

<t>EST provides the devices with the enrollment information such as certificates and symmetric keys that can be used to establish trust with different peers.</t>

<t>BRSKI after running it is able to verify that the communicating entities are who they claim to be, and obtain domain specific certificates to act as trustworhty entities within the domain.</t>

<t>SZTP after running, the device has obtained onboarding information and is equipped to establish secure connections with other systems.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of bootstrapping protocols are present in the respective specifications.</t>

<t>Nonetheless, we briefly discuss some important security aspects which are not fully explored in various specifications.</t>

<t>Firstly, an IoT system may deal with authorization for resources and services separately from initial security setup in terms of timing as well as protocols. As an example, two resource-constrained devices A and B may perform mutual authentication using credentials provided by an offline third-party X before device A obtains authorization for running a particular application on device B from an online third-party Y. In some cases, authentication and authorization maybe tightly coupled, e.g., successful authentication also means successful authorization.</t>

<t>Secondly, initial security setup of IoT devices may be necessary several times during the device lifecycle since keys have limited lifetimes and devices may be lost or resold. Protocols and systems must have adequate provisions for revocation and fresh security setup. A rerun of the security setup mechanism must be as secure as the initial security setup regardless of whether it is done manually or automatically over the network.</t>

<t>Lastly, some IoT networks use a common group key for multicast and broadcast traffic. As the number of devices in a network increase over time, a common group key may not be scalable and the same network may need to be split into separate groups with different keys. Bootstrapping and provisioning protocols may need appropriate mechanisms for identifying and distributing keys to the current member devices of each group.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2904">
  <front>
    <title>AAA Authorization Framework</title>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="L. Gommans" initials="L." surname="Gommans"/>
    <author fullname="G. Gross" initials="G." surname="Gross"/>
    <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
    <author fullname="C. de Laat" initials="C." surname="de Laat"/>
    <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
    <author fullname="D. Spence" initials="D." surname="Spence"/>
    <date month="August" year="2000"/>
    <abstract>
      <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2904"/>
  <seriesInfo name="DOI" value="10.17487/RFC2904"/>
</reference>

<reference anchor="RFC4291">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <date month="February" year="2006"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
      <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4291"/>
  <seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>

<reference anchor="RFC5272">
  <front>
    <title>Certificate Management over CMS (CMC)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
      <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
      <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
      <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5272"/>
  <seriesInfo name="DOI" value="10.17487/RFC5272"/>
</reference>

<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC7228">
  <front>
    <title>Terminology for Constrained-Node Networks</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="M. Ersue" initials="M." surname="Ersue"/>
    <author fullname="A. Keranen" initials="A." surname="Keranen"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7228"/>
  <seriesInfo name="DOI" value="10.17487/RFC7228"/>
</reference>

<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC7230">
  <front>
    <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7230"/>
  <seriesInfo name="DOI" value="10.17487/RFC7230"/>
</reference>

<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>

<reference anchor="RFC8366">
  <front>
    <title>A Voucher Artifact for Bootstrapping Protocols</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8366"/>
  <seriesInfo name="DOI" value="10.17487/RFC8366"/>
</reference>

<reference anchor="RFC8376">
  <front>
    <title>Low-Power Wide Area Network (LPWAN) Overview</title>
    <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8376"/>
  <seriesInfo name="DOI" value="10.17487/RFC8376"/>
</reference>

<reference anchor="RFC8572">
  <front>
    <title>Secure Zero Touch Provisioning (SZTP)</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="I. Farrer" initials="I." surname="Farrer"/>
    <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8572"/>
  <seriesInfo name="DOI" value="10.17487/RFC8572"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC8995">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="RFC9140">
  <front>
    <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
    <author fullname="T. Aura" initials="T." surname="Aura"/>
    <author fullname="M. Sethi" initials="M." surname="Sethi"/>
    <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9140"/>
  <seriesInfo name="DOI" value="10.17487/RFC9140"/>
</reference>

<reference anchor="RFC9148">
  <front>
    <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
    <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Raza" initials="S." surname="Raza"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9148"/>
  <seriesInfo name="DOI" value="10.17487/RFC9148"/>
</reference>


<reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
  <front>
    <title>Wi-Fi Simple Configuration</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Version" value="2.0.7"/>
</reference>
<reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
  <front>
    <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
    </author>
    <author initials="E." surname="Oat" fullname="Elena Oat">
      <organization>Aalto University</organization>
    </author>
    <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2014" month="September"/>
  </front>
  <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
</reference>
<reference anchor="dpp" target="https://www.wi-fi.org/wi-fi-download/35330">
  <front>
    <title>Wi-Fi Easy Connect Specification</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Wi-Fi Alliance" value="Version 3.0"/>
</reference>
<reference anchor="LoRaWAN" target="https://lora-alliance.org/resource_hub/lorawan-specification-v1-1/">
  <front>
    <title>LoRa Specification</title>
    <author >
      <organization>LoRa Alliance</organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="LoRa Alliance" value="Version: 1.1"/>
</reference>
<reference anchor="oma" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Core-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Core</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="oma-transport" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Transport-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Transport Bindings</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification.pdf">
  <front>
    <title>OCF Security Specification</title>
    <author >
      <organization>Open Connectivity Foundation</organization>
    </author>
    <date year="2022" month="October"/>
  </front>
  <seriesInfo name="Version" value="2.2.6"/>
</reference>
<reference anchor="ieee8021ar" target="https://1.ieee802.org/security/802-1ar/">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="ieee8021x" target="https://1.ieee802.org/security/802-1x/">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Port-Based Network Access Control</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="threadcommissioning" >
  <front>
    <title>Thread Commissioning</title>
    <author >
      <organization>Thread Group</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification</title>
    <author >
      <organization>Fast Identity Online Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
  <seriesInfo name="Fido Alliance" value="Version: 1.1"/>
</reference>


    </references>




  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA819+3LjRtbf/3oKlP2HpQnJmZHHN6VSWY6ksbWeGSmS/PlL
UikXRIAkdkCAC4DScF2uyjvkDfMkOdfu0w1AI3u9SbZqPRSJS19On/M79+l0
etB2aZX9kpZ1lZ8kXbPLD4ptQ5/a7vjFi+9eHB9k9aJKN/Bz1qTLblo03XLa
HXfNatrmi11TdHv40O2206Lupll+XyzydlqmXd52B4u0O0mKalkftLu7TdG2
RV11+y087OL69s3Btjg5SJKuXpwkX+zz9gv4Y1Fvtumi81+0+02TL1vzRd10
4Tcw5KruimWRZ/BlVdNVXVP4x3RFV8JLv7jNm01R1WW92icw8WTb1DDaNm+T
Zd3AQIuuSMtE55XQvJJ6mVzUt4lM7YuD9O6uye9P6MvhWw7SXbeum5ODKVwA
A303S27ybl3AuHgp39XronPf1c3qJJmnZVcnP1XFfd608CRcC/jnJDlvt3UN
fzX5ClYPJsHLlOF8Xhy//OoF/72rugauflNUJcwMvso3aVGeJBt81V+KD8Vs
Weh4XsN40qb4kO5TN6TX+XqRd/Z7HJYbBb11aAjB2+kveXErT/pLkef5DB6m
bz+bJd+nzaJIp6dp0xRlWbtBnKXVwG+0Pn5lcEMu72Gzazc6/ycP6ssvj198
E4zsZpsWlR/cil6SpdVfdlVR3xezvD1AOm02aQfvwXlfvzk9/u7FK/n46vi7
l/Lxq+NvjuXj18ev9NtvXnz5Qj8eH3/rPn517D66C7598cp9/PLrr93Hb9zH
r9wrvv3u1Xfu43dfycfvXronwEd6W1tstmW+qKsK/4JjlTarHE7Auuu27cnz
5w8PD7OHYroscC+eZ/VDVdZpNtuut/95WZT5f3oOa5u3z7N8me7K7jl+1z7f
NsU9HOXnPxfTN8UvN/SKX07ralmsdg0sVV39cpsv1lWxSMtfbrb5Ak7hgr+/
P569mH0z22ZLHg4fQXpQwg9KggfRVXpw8POUN57vmJdlkVaLnH7JYEgnyfGL
l9/Rn23eFHmL28c3Jsm/IaUgpdIY4Es6ai9f9VcGFib7OMtqXpWXL2YvX776
6vnx10BAr76d8b/f2Qnc4EnPk9d13QGPSbfbolohRZ6W9S6bvkurdJVnyU93
xd93RVfv2uSsaLdlum8H5hczB/zfEIPA/9FanANTa1tZK7n/fJZcpl1w93mZ
V6n5dozB2DGcFcmbBle4XdThUOAc10M/f/Kpt7NkDpsbPO12V2/S1n4//hi3
za+mL8Z2+go5eJ7BJsALYRvmp++Si6rLm4qICljzX+ui6ojU8iaHCSR1lVzl
zX3awstICpjNOgXxs+twSw/hW/yL3n80SbbbWfLNl99Nv/nqxQQ2Ju2AGibJ
TzdzGEi23T7lzNGnqZ68519+9eWXL/pn4zxt9zjcKl8ABdgj9UdOyLcj6xbe
AyxTjkzy5YwEytv6Ov15/n54WmXdpNNU7qWpNXlb75pF/st6d0c/P6TVtLWD
n96/nL58bqeLr3jaBOnK4fl9M335YmSKwV1+hifJy9lLnCIQ4vD06m1ebeo7
YIDRHOGLNn/+tlitu4cc//vu+N3zf3v5y/EvL6fHL46PXx6/+G46f375bj69
vZmG1wHXbPJp7+KYP35h7oKjt1gXVQ4IyX103DZcuZMEH//F2AJewoyAp+CU
htfx+Hj68nhkHb+YbwEn3QNXkxX8ApfwePaS13AKXLACjNJ042fgX7Oit/ri
f+Gyunckr4uK2Mz/g0VeLMcJdcGcorgHrkmLiqeufX55+uaXGwGloWCOlwau
TPTKpx1HmuipeW/yBmBW5u+xEx47nUZEH8++RhQPMPFbALRpMzzZlzO5gmcp
I34OX0zhnoCzXJyfnyc3qNqkTUbQ/m2Ne4vMfpN3Tb2tywJ+TtImT5Mq7x7q
5kP7v//n/xLhfkZQP7nI8qpTYTSwDviaPrfVeXz8/dP4+OfM4gqPxGs4WFny
nr9N5gvUc3DT4L7yyRM6xt3r1vD8DBQzUeDgEJzYcd7S7yg6/QVjb5Brv29q
0JKCpfsK/lwWWY3kO7xy+GvAPgL50jpIS4po9Jsd75uLs0vd4svqrsbVfRLd
v0nbzhEF3Foi5xg76S9ejRD+G5jGuFiaTqdJeofIctEdHBzcros2AQ18t4G3
orp6X2SgrcKmA69oQOt5QNADcGfTwj6lHdIC6tCbuir3yQ5J4GENpzUr2sUO
NgeATbfOH9N0CTuBIgif4eXA75JDUHSPVP2dJeGQ0rKtYVx5C3/AuJI7mO4y
udt1CShvO5wH6lNJu2vuc9LcYA6g8NdlS3TcCnnDX/egmKV3wDufrIrPgO80
SQ4s3D11kjzA7GiLlnuaamdUflyPCX1LewgbAy+6r8t7/Vpfm7btbrMl0uEf
vKEAmB58SJs9jRPNFWWOF05oPnjth6p+KPNsBY/bbNOmgz0ASYO/mLEn6RJG
Rt/y1GBR5WH57IDIYFNkWZkfHHyOm9LU2W5BxHlwMbw2OJxUHg+aOqDdFt+b
VnsdPVNIl36A14NKApfd5XBX7m9bAGHdgQ65gV3YlUBBIGEaAdK487AQ6wYY
S/Ls2fAOPXsGa9jh6uIt8ICiWpQ7JFndi+SZ3vEMltnvq67LQwHnDsgnzfK/
7+A4+RfA/PBH1C2YTftNgcWr6qSsqxWsaQq8btshKfGQR2hJ7oZ9g8MCKhwM
EPcDSX6iZNEqW6UDhEeO7UYtAJeF7DpzVmQXOG3mIEwMC6ve4hw97SyanIg0
lXMAdALqEaxPO3t0gy0FIcWsYZHzaoXnGvYtBQJnkir+keMLYTvxDp3EfYrM
KFk29Qb2fAE8uMzt2iOZ5lVLLAU2oYWRwVpkOcj7jNTcip4OSm+pYAIAT5Pj
wkz8uIKXtsSStkS/cBLuYAF5HGzIuYdH1w0vAl7Y7bcIw4By1rgc9SqvclTM
4KHM5WhsyOMqZC4Fch0eVtEk2/oB9rDdwfj2E2KDu0oGCqS9TQGawXLSL6Dl
+e8X9C0OARawIQpulimdUuVKwvd0wWnZRghL5v8A1C2cqOCJ/3fS55Mcuebs
fxx+LkaJI2DRiBlh/fKyJntCmrR1uaPx4a63G2AjSIJkSBinELuVbh2JQzt6
ZhEicmDDB6rF845mVaZRppUAV9I5Wu6qBZ9rMcKlfCroOpih8BBYJaB4PExl
sSngh1ny6eHWwA0rZru58CkalY5mDYt5l8MlfGc63TZF3RRkOiF1Hb9EXIQU
Af/nRdS7iw4O7DI6MCI9PqbIdCe08y3cv4e7mGPr8eUjpc9CM0ZyiEsLV8Go
blAMw7RhIIINYLub5PDm5uLsCGmBNW09DUdy3NtWOKmw4AokuS4Gc2Ge6iyE
JsAwdyDuUuanoRI/aFVLfv3VGwZ/+w1OVbmVufJS6sBmyQ9weuggd4GEL/CA
lSjuFoQn6iqQqaEZHeZVL4oUyYFI63Gw4WQhPCP/KIICBZbCFWSbtOe6x260
CI1yFF0NLhQMG14QwSAabVEpu+jyj90jp9YP5+Tg4Flo38MvrvDgKLqFvwU5
yl/nFcDqEtcL/wqhMHwhB6D4B+NLusSaPuGL63xVMFziv89U4OBpB2mYFbSd
QJe7lqnbcNGsWJJ1q+M1mIxNcgNqbloV7YaJDPTvPS8wL6CiouhopOyVqfD9
xIq267rK9bzjkbnLI1xEh/eTg7DSY0g6Z3D4Wjj7ACAzsgwOIjTAywgYcJtl
SHc5rpCcnznBZT+Z6pPjoikxLxLI5B9dCAvFzVUiTxEAT9s1EF2WfMj5TKTA
/loiOHKmwS+OGzkugQtdEE56yo4xmjR77RwWTBdmlAwuPTiNNpR2xzwZ50tn
XBQMGDxOAzcSEQVPshKVSIgYNRvaOBZeBJ/4SZ5v5iA66wZBnKCkBeuftDTA
YooGJEe558MM6wMHtGVcNarqsKzyWgNzH9Eo/ojm4JaBgf4SjnH9QAcMJ/AR
kQ6ojXsjyok/3EZqBTMBUSrg2Z+hqIYV+cxpGIYPPEq9wmw+oW7gVT+OKhoj
ZHCA//vc2RR4+a7c8v36OUC+Vf4bXvR58rrc5R1wwfXBgfsIq9UCXmCJhJvj
DwMume7ELCHAsAJ1XfFaeN0aJV9BgJOxPGsKdbMVciF5GL22qjOg3bu9mxCC
mAeQ07DNZLrr0vYDHamm7Sak+3hQzkJ8V9nDq6tEgB5IM6ObAJrzEETLAC3/
g+CktHA34cjxwNtDKHQcLwlRPkrUAikaRRLcvCyIqbUwi0WHBL3KUbZvgL0i
dsezAHSWJAmIIqBTfhiSgFNEThI+NA/Ds6IX8qWMPoNdyBt5+Pt8VQNJirFz
bInQ9ImL2CqBmQfRShGjcxC7yEOc4s5iWq6AgXTrTUsovUaa5XMnQLtQbAmQ
Ldnu7uD0ESsSmVcll7tuWi+nr3HTDi8vXx8hpAMEWjr1u6gA2z+HM7VFI4SH
8u6FMvMrevoUnw7YAx6yynkFQlUOTW3rOsP1ZK1vcDXp7XdIqopp9JnJOcAz
OOqL6QJtICDXl3B0pj/kABdgPofnp2c/HJmpkoUlh+OBn1W4tqisLJCv5FuA
7Sis6bKi8e8R1JihaEbUAyfjAbSFSZIXhMbvizRYPaIlZsBo4qt3K5Rk/swh
3c+Sc+SRSvNoSUKFrCFSSDE2Aw2RPPAJQeMswQnd5HCKOj2sd4zHcUvrB2Tt
5FN2kpKW0m+1MowcxswvZvXj/OxUnot7QeCuq4nloKMsVPbuQNSitkBGB1gI
ZfsHuPfPknmwwyfJGVAnaUQo3ZE3MU3iTBJLH/hiy1Oy2SMEI/txyYQIpDoB
9u8+yo7SZ9iJ9zV+nAGih5W3t4xyrcW6rglxg7YFKvQmqXabOyFEJn6BwvI9
kMQGD0pDqjMwHkQQbE/p2uDoiqHHEDdtPJ2rlheJn0kXVoQP1/niAwt+BST3
KVCStx8RcIKjCLySl61ovVIKD2j2265eAd5ew6q49W7yFWPs5JCAPGpwsD1H
tCzhvElhY/sZM5RgU2RlzQbQE+oyZ/tEkxO8BGbE2DE+3s5muOdF9aegNxJ4
FS5XJcfOyT/YNjRkRMRicC6OY5mnbXGHGI2YyRCXGaQGHc8gOTT533eFqLFk
4ABWiIjKmYMZIsEKwiKw3RSmSBuoxhUrK4MByWNbOPp6us5Qjynudmr1CuRh
lnbpSTLv5LChb34STtNKTTlDcsj7hEMji16Hb3DSJ3UeEOJQDm+IUmh4Blzb
OYhO2E1gPF3RokEya8jSZ8yFofCPcdJaxJ/HlEDWaNiHVQbBv2hPeMEQS7Yn
oUo48YJ+EqzNjG65YnQJN5VFjkvI/oxJwgEoDX3YgeDrYLLw11WO/70RyP4T
EAE9RvHoXQ6PWbai9DitmTf9BCAiEy9KinpgtxzLFIW8qq1GZG2dbKQmjQi1
T1k5mpFC3pNQ1WYExMN7FOYq+ATuAVvMjH3ujOx2wBN7M42l7Z00OexEAtVe
ttuhocAihNNU+VZ5apsRihY/k52SQ9zJ4dnV1RGDxsiUI7cNomu+Lfn112y7
/e03GFQLCPgODa9s5iKyVxUJwKTXkGj5vQUQecF02QABZbCzPAJmBazTWWMa
aVYIjQ3TYFA3S2A4uJkFc4vU2L1rILZ8tprhgLzhwNiPJ2wtMEa8sgwWG/CL
2NpyMrHkOVk37AbwAPqHDf2WORNn+7zd3U2doti38DDyswNP6jucewuM2EZ6
WZ2b7OgsGXhoHqbWDLTuyA0gAFV5UgtcTQyU/+WaIhZxdTt5wfs3pyyAx98b
+FS2HsaKqDGsGqBIGvBDllZZUbtRwfNgtxfryMhREkIgfnPQB0wXFa65g5Zd
b+2acF0WzuoyKJ2N4nhL3otMDT2dUtvIDWTTZfrwpkYcAVMwfsfUxM8MLgZu
vgWlT3BM/AZLMMYaEV4kK+6exA43P4xZctHR5Out84j1lFI/aGFr/nGHZJUp
+C3jBIGuBsVMWUB7cFJYKyGkj2LuaNYzP56AQNB1JrjbovesaNfwMEfjIxsw
CTcaNfA+OeAZd9YvM25LlWgvj23jsrxiPCKwAKMfPu2PitbgrE9Cx1wgaXNn
x31U6przgCxOhfBpwPhUJF/o/sZC+fKh8rL5Ch4MFDJJrnX3WU5PxLac579H
YnvjOKo/PW+3Xo5LGe6kGyztxXVwRFrjN1ch09AJpa0B1RMkf8f22ljIg3aI
CicR+F5MJxYYwI9IekAYsIOo3eLQdqzgZPkCLmvQfo4+l2axLhAOIowjBQbg
hlygJspuz/pAjcoDnjOynbHtMSJkBshsB0/lnMjYN8CaS9h55XbRnVmN9rm6
M7cj6sk/klVnFS2AmooB9zbZFHEMebTtzBhzTJI1hamiJBzcOFwZ9VGJSiVs
g2B+hsi9yBSURtgqOgmx2zrCSbg4enD5FM4oiiWWnbXnGd5wFoAXdSfiSzyh
GjOJWABCJkf2EHpjLIGCV/JKkwlmV5SZH4IIueiVoCXWe0f/82HG9kUs+f1Y
IuaJwsOefCZbfXzojXMShU0XvD5sbFAWqrYYh7HcNMQ0CUof2yv6o+fxvQ92
jAfoHu+ZexttraAXRlYP6g0QPdOcVSGqPwzKcdjh0nrwSAYbDLlcGtXZIxxS
TAukmi1b4uCdd7l6WAQ3ybgo7mmz63Zp78yji3oHhBi/d8cOG4JLuCLLXdkf
rej3o09GjmCMm6m3nqWMBZQR0QCRaNf1gzeOeUNYYSkQH4U364FPk4c8/RC/
XuJ9rKUCo5HayJzKqon3WZKHRTMbfMTr4fnNLagnT7sO9BHJgiGdZFlU6h9Y
Fhxlcpo3HTuyc1FT/TNP390kh6fvTuUxmGLz22+zBB5sNumHPcye3Li3SiJe
lfrh9vaKnet+YG9JjXfBrYe3b2+OCIwI10Hag5eitt6SAZ7UPUQUABRJptvQ
GFYI9IeFn43c513ffqa4KXMnkw5P50fBjbNkbn2r1tMv3jccIq4CrZKwg9N6
zgiIQjs4LMKqe7SEmBakSxjEVXi8RvYYOa0lxmXu6akXV0Hwh55rfBD7/Nhj
Yj28gXbSuqc500yO1/Pr8TGyhOx4oScaUTZ8sCRMAs9OUe1w5CRPveJgyW+5
a0SFZDL8zMmrnnHqdG7psv1MlCEhgg1McEOo3Tk1MzMDSxa6FCqLFrDnLeF/
T8DrHZr8OfrCW9vGEDEMzdBK8hnMZZU3W2D93Wfw0EVeICAgwmArcWCaToDY
jdR13nBiy4a/ee8g89silnvAWbcTN2HiQZxzo4ThMTNdq9LJaZX733Ny5uH5
AO4Dq/0UtE8y6dkzAvzPnnGwLXwRIJVnJ+w3WNbOKESCjzgxaS320NNrkZvT
CTMEoP7wiw17h4Hj4J7Pac+By8AhR6X7DlUYnJ88rka4j5gvzZCuKNgD/gKS
2BGJETkUAh3MZqscxJUI10fMofwEud8LItIdEShS0A5qIrKMMh6LBChCQmcz
98Mn68zurgVoiQuDNDWsAnvuMNOl93ID1t1bqdSU7gM48RlMImwV6dOJV0N5
EZwdWAwhZZ42lYKX/jp5FY/RhuDktBPu1DqKsDLqpljRM69x8rC/h6c310eT
hDKZO2eYgC8nokTgidSvlxjXMTATtzphSBCsEAXHqluL4nfdAWtbhl7KZDQE
g0w7cYQK7ngbRAvIkMw55YXTHwKWNYmZ/U/XFxLOGtlx+8Qwk0MoejIcQ/FR
C8wM6B5BGKmX5PBg33aOyJxNaGEsn9lX/MkMbziEWS0S4m0PrIW3axO75PVx
EDwtrgycCtC8HBUWGu9vyfHQ+RcqTtPAfI6X82t70RFiPzGBt+y3HF41F/Js
OR8t+XOylqO8oKhDtY7ANJiHIeZJXqctu4bPihWSaez4mkvoGIcZ4UqEsw4i
dgJSoHewkLJ7YEFA3g2QSxBKKD8G0Eak69Jxv36oNO6BO6hGQk4i2h3ifaP8
0nJVpdUnGVSQkucOKy3oSPHuGzhT+JsRztSocAtnFYuAP0HsCDE7xf4DNN9n
6ozOiVbWGIS9Tj/kPqDS8FqJSvbPlYCB1Dkc0X4IowpwS7AmRGM9Xpv64JSr
Hy8myRjBW1qayuFBddEKqXkp+bj3uZKgjIMC7aw9VGMbg3MzvaNcJj9LMxwy
ufj3RhEJ4+fH2a6NtwSrYKj3nvwdErxg7DcDPA9NEc5vajcnmKn1j9hD5kTt
RACTbKBK44kTCcE6BRhK9vdub8g+PifmhAaCEee50VelLvbtEzKeEVPR2cwf
S0J+RET+tP2lyO3cvXB4IWgFRNAx8CbwGO5zhBNZPkkATNFiwD5jnjFGgPCI
EIdaDczhIDkgqlUf9mGSOukp15LyHER9A/c7ws0qa2feD5ERiUc1xyFbeT0g
v1h4ee1vIgJMQwGNLb1JQZ7u2BhKA78j/ySl98Q0wOKVle7ejuIK6gaZoShw
GmDzzlKFgcgY2sBHp/Wnc5i5o1UoN+sq3r/WgzzLVECFCtxaMLEPEV4dRd8T
JFEkJ42AuAutnw9kJScn0b8Am19a+pNliwOIAld0g5wr17iGIRhLOLcNrb0R
ipVIEGajT4CzJMYJ0raKZ41WOwTGVYm0vpIupBoX1Bk6uwIgJuTNXvMHL6bs
MWVcjTGORadID/a9aAK4+QctkSTUgwjZPlB2SWLmeeoYHlRUhnkxs/aC7X87
0ati02FlNa0wNmWmIWoja07cyhDHEO2geFup7rrnyEjAKkVPnIjKiKZVsab7
wCo6aqB8F5U1C8GrLCtnJqJGHhyachEenaFYWJIWsG+ZqS6XENE9SQ1jHsPR
oekKZoiCpsokBl+/6xaweHEGm9lhZlrBaiLHcAFVapjFZ27TojEHBgcKpwW2
Uqwx7GtN5bBP9RlZeHNwlIS5OZRAc8RTnbzZgQgg7CVMjFZS3zRkNLJ0COiv
FsLiYPvD0+u3LdYxqYFrcmALgSJOpCtSFOK0WPAgtpsRBrbmWI4LHypzkBxe
vgO++4kiC6EScPj24d3xuyN4KH2IfpVkOD5K8HAYSL1JA9PyNZAeWrBChyA7
Piku2gf8y8tkmY+AgzdIxwgtFh1JE/7dWYumHCpF59SbJqwiHi1/rBz7o1zu
qW5W27H1gQ4gAk0UL8jP+M38Phf827+Aaar1mU0Uy8M2U2PI3XjDesoOf6tQ
qAwtlvliv4ANPERDLSfLVK2AsIl6KEoJZkFJzP7rTZ2JMhgmdDDpHM2Swa1U
P2mWw8r10sJMwmGoAgbZ0mwmDK3YeMGAxU6e12B6h0aUC7Ma2WV8ut0GCeQH
GdawVVNqMCjthbbIJcDAyGaKnmOOMnoDi1cDZHPvBJlTWcqkvO8IY8LB5xXy
RBalV6l8NWLCM/dHpokWBTtTiZMpSHs1sCuTSM+Co1KQCXr0OAvCpxi23WB4
1wIWKZ6fBzX/N6clOqwbFQe9MK1IiAPM0WyK8GG7MRWfQolBuavv4xAc2mVn
aY130U6Tc3xGp0DSZ8gCTYhemZUuSe7XyR0m8/JHaFxAXahMBOOMzHwYLzvE
yD7FxXC15b3Dq10NeRo2lODjz6n6hppitVLsEK4PuX9XRbB0hXuhe3rCM1jk
zgyd8YbKQR/iWoW417AyGJz2Mv9IZspeHnqUyO8c2OSAdIkvPreQeLfNTwhn
pM8IqFmM08M7O0tOzRhCw4iaUUKrCMaIP1hP8+H11Y9HZAv499lXL74L4aCo
1VxLBLdd1T0/TZ+Bp6//hA8WrZUgaVZNunnk0jO6FiMmJeGMEAmvgn/5ndRl
ivaP8IKvTUXwZU6RAyWp/QmgZVj5ZvIIZxkwUYdBLWbhyc7sHsWsRkIFBhYV
pThnGpggC8mECnaLYSMMxINJwbCDJ5z4SEuJwFbiBTQmRsMUC05hdo/ELPiy
GYTBgVm3i7zCvXaU3ZAGNhk8L3RYJO4ByQ8Ps1GwQyp3ETJPjC2wyNYgnH5c
s9sZu9jOrjCyzcFSyc4BLEXU+dQ4w085HmkFn/1U3UXuyLCMpOY1sS+EOJVJ
RlFXmQ/gTgNJS4cz5keWu6ObbQxXzrjyT06GarXS/v5DxmTgtpd9WuGsh7yv
DWrVf8sRiy/qRuJfaermTCmZN8jGUR11R2EheyZLb4PtZeUDcCnOtnbY2za4
0hLtEORbp8Hhcm93ifvq04vnCwqNBBmMEWSMZrz6LKs0kQ/srqooTF5LMLLr
yCrZLhoJX61ak8mMpJCnkPplLtci72UVz/KpIgCYnP5IibzD8wtPfZvD/mKM
vwayqOPfh0fGe63pRhrtrubnYYClNMT1JMTpEq+Uk9zCos2kRmcScDAkvXbg
7eK/kfFmIVuRgRtdrDEFH/SNxjs84BweJ6RRCdajJBm9rlRwgNTCZrRKtBQ9
NIiAXCZfO+DlPeu7Uymk1+Hv6CdOuRuQrHTYZDRW/5MN70cbxYgVNvcpakJo
kH+yD9DatVgHpZJQWMWyc7JiGFojNZCNzNOExaej/gG+1MQasyUbN0YVfCff
bKDJc3R7GSO0qc4j1G5rtNhVmTiEpy+gGGam6L6ZQXP0NLkTybI3EMo+jl/0
p9lv8eK7WJK6AVmVQi22VPxEDv2hQ5zCKpCm9PzQN0fDC9WKRex9sUEitnkX
kW0X6ft8fgVoZn41fY9p6wcH52itZPKPQpB9UCNcfgTbm25yMmk4VigcnT3o
u7IrsO7PYBoyCHZ9p4sLDCI0KxqYeD09XuvHtbITlhyYlDgGh6QgU6Wdd5iS
b9Uca4yj3O6C32xqCR057Ue92xdkl6CKchmXW0oZCPcixYN6WQHnIA5JOQmS
lmh05WiWMXgS7koZjV2yzzt7drQYWpQ2ZA1IJtHNOE5lhUMbUPBg+MptmqkL
mIlzmAz5ckaCWA6RDyWVCVU7mH+jfxurHmzRQQ+oe5tDbqzwunIM+NU8yhWY
23IwDDrmCyq4Twnb8/lconmxjD5CQ2unRfyEkDppaq63DS9xo8DACWI8hLIU
cg4sJ8YH6k0L0Os2rUSEE8BVSumAHOEbyuGdrusx0uEicxRh3nlNZoOcFntW
kGyhFzF1SwFLva4nrcgoJGUoDikJUgq4kfrLiV2V/3GRYlkHzM7yU/qztI8T
h3TV/iFekCAKz+WYGJAyXk0n0D0kb2/Y7Iv+rjbHCoddrsaTRsJLVjvK31iP
xAL6UkmDEWjDZsJHTx0JozUHsqRMrUmUoRZUvguRsNMfwnBGM3YHaUOLu8QO
0Nvda6vh0Y5E0fVl6oB5QnMnGlEPkYokuj2ytTp5aqtEfZJpDTIsCVlxwBcB
gCtS1Up9PPm10ajNaIFiPmZny+MKuRpHOTrLPDCbyIGAc1TeMshYuuG5LtZ1
CyJLHLh9RPV7IaN7dw/CmdQCTpmjSq02ysXSO5bU5bQXtqSbu/GA+Yxve2gO
q7q++0sOIBg/zNJmmx7p8Y79Ly4LchCG3oYSS8DVWH1Ua2bAuWtBEqEUZ8vi
nVVidlk9iAtszRWscr7ByC0mLl37c7lkQu/gOPVTH86uP9OIfk4LJgX58k/D
nm5/Q6Fi6j6p+A499j73wabOoWifkrLXSgkdxiACsikWQnA7qpya6CBlS4l/
k4eGqt5R0vM0h5O4GAgX0DCGT/BYF7wLv7ni0EF+yKFie9w2A4fq5mjmPcYj
9eIBMZ6+kRoIn74ODU6LpYGvgTocRVKhY8aXL0bwWLuajVKhjF0rlLWgyQ/+
mnAPmbco1yKG0K4LoLhils8mfhM58KYE7tgVGw5pJA0FYAXcZAPwuQgdvnTi
RVMh4F7kNR3tyhSbhC9RMbh8fXskxSk4jdinRL1jKH94efvuSHAoXE31wLzz
oyVaW1HZNJstJgeUKoYiISnix1Cdks+0qhsuN9W7HNZoJVvBpB/Svcl8M8oi
jl6CMrDvAIcmaPlJTZJPYOiYGqW5SpkiUHf8BIDAdbx0dbQ+5DcjpmpzGN1a
eYcJ3BkceKl06/AWx4W5jETRqbjqqDolyM/7V3wjlSY9wVRuZo4Y7FNNw7Sc
qP5XUF6KTOBPdYzwUIP7AQ3A7rQcQ+PdCCL16FqJRGoT1OgbE0lgk92T9ykI
Yg0YR89wzdUT7nclcm5EGxgjVk23KeKarksXH9Tvd831h64u3ge4xdYNg9+4
7oXL56wYSbhg/XhDRRyzTYPcF1sKz+VhCbpd5cQMNVB3enXzY7IotliYEp14
zM+igzq4SkycGKQIP1aw3zpgK6xx0E29JfXo1Yvkruh4/jbH3/ohyDEez8vS
RpCcc7c3kffpk8Ksb4pNUaaNGu9NMFOv5MTA8vq3obO/LVYV0kBOU/o3KtLt
8P2JfNF6PoFPLRoKlIoOC+8xYt4NUJEE6+69UqdRg76eN7zSWa166yUGAl8u
WbYjOGNk/zVFLDSN2sbUDTMOdwza585MEOwLERdzEZsS3f9KEytaqQIbJnf4
YrEt+V1/zJu7vKnhVQWcpE5Ileu1GiaemlwO7/PHNm067AG7NOnuHK5j0m61
bvXh/N3NES+GYYvmQn/lKV2pWxADBXIoSG6Emss2zKTgFZ/0pUYVYvFwFbhS
vpAL5gibiTqV1A4k1HEUvSsKQMqCg/2n1eWy0ZieksLKIZPA0D/5Q9W7gkIh
f7SIl+HFrDyxpSSu2I3FaoiW5fYBPOQczStk1r5awWAJN0FlbHGi85ARq8c9
QHs4yMxuve/VALscWc7ZP1d74KIaGClVozW3S4xlbM2PAmOU3l0isn+i6Lxt
VD7Mfe1I01Qrp9rOgnMqPMGlKZ4YVHaaHXAd388j7/F1vqkxXpaZ3Y85Kko2
P6BNDl9f3/x4IWh7/v7i3ZwgC968wo48eEj1C4J9j9hYgwloBRTNCvr1V9/N
CdA6N3mIw0pIgv3BKbBhERtiYo57VCBdXufF5FiKHrpK9Wo2b6u1Qoy7TuEh
7sUB9zNN2WCSjsL5UyuaXAZuS9VUp2zCsMoTs9O+d4dMF4SzpOyghJK44dr6
2G6UwRx8Qw5RHmHQCz4qf6spuK20YrjGdEup/elq/6+L1brEcF4Tdem1CEcP
GE1SCMthnFdSNUUAiE6uw6+HqCqhnRbYwvF/6EUZY9vU335znYaU/MlUgeuK
T9P2G5lP58QKW87028ICS6KB9C+xfQY4K4feuK6B05MWc180dYWzNYkrFzdX
3px1enUeeRMoBAGw3xQ1wK3NhOcOInBCiUz/yTJVoRgZFjZxYSqbvmIKU2Fz
UtdioBmrVHVGRGCvM7WrsI8mcuiPQLR/vT59vJgVlSX/47LqnCxJJqgXqRxG
eXE2MceabCgAVH2+xSYYktN1SD8gDRVOSDGgB6gdJSzZREExoRm8o6QCVy/A
1NoWX4roXnqsSg3C59wPqg3TD3I1uZ0KFsgISsvMYhqlzaoR6g0TabCefxLb
lsJnabkob2qSKhs04Z7w1RAW7MpQLqeS4Ab7/jeq89V4+gAB3ERfMZ3+k3I6
KNxJOAKpYIm0vZadD9dfBkIsGH/0VT3d0J7zcrpS1/c1nHYyudiUncAQjY+S
1K8sNAmzZUsE1X8D6J7c4uPCQp+HN//tFgt8irT6CrMoTAJDXGcDt3clhpi8
Qu7fWjOvIxzNzSrj1LqgJiBSlNQvcWemYZcTVjne1xhbs963ZAOifEHOGqBM
SpQ8vniIiAVfz78XumvrMSKdVSy7VPN6f357evn+Da8DNs2GdQD6xlgk/z12
xYbvTc0SRy0aee7a+jmzpLEttfu2yzfJ4ft3aBw5k4XThBlhFGSd9sUY84oq
T4c55kZvIij8RZvAMye2oslQ0rIC5ziBTX9AYeGIjmf85ddfw4xDHjbgEOHl
H356/9GaBwtnj4v/h4cOrbXC6N9jAtCNLNvZe9TuzvZVuoH1/QHdpWHtMlO2
9ofTqyNUbDb1PW10CxICXUzkysSuyK9BPiKE5qhi3xEPqOchL8spflPFB0Aj
EXXrxBgJU6CqfDwTZ3/UhBg1+y4QOql9dhS1S6a2tGejHstuedjoAa+B3Ybz
jYf3/2sXrFa1pzCJoCS2sNfB+gLMGAJ7Ui/xEqDQMu8W68Dc/WnS00IolPGh
9wp1o8h1h80olUFtB1v+CIkD2DoJXF2DqHAnAQBYzG3XDgd/nphGiJGj1kTR
Sl6KpxkfmNUL+dRQxtpFCgQ9E7VDGiEH7lWTV9pPgH3fIdEHBdXpC9+5Cq5n
wy6csb3295v0TSe6Wv0hR9btiST6+JkiuHB3WjM4DB/pgwc+EOnt1/VJMpDR
17NhifesF3yc3xPAcpYF6txqWskwH4oSNmxVZCqREuLnwveN2OAoS+mIGbMh
gaLhw7HqnCMxb5swxzqIIQ7IZrA+j2phVsh4laYic0Cx2JVp0zNUjpaC9icm
ECQEaXdV0PoqxA3x1URm5nD15kBX+SJiKEgJuwHhvK87tetXCe79ZHTsrPMa
Nih9ZD69engEoqKMV5qr5qNHxtet7w2VXfkdYrYLyn6MzNGVaSN3y1NKYw3G
HgcVxDTyovVawwBmQCDeqhSRNQywLbo3VlXxj9xOm1IGUBzExq/e/FtXe2a3
kJZWLpY7dC8NAWstf5rZ8gtuOi3VAJYWFm1o/TKBiHRnk4X4iAyTGsbW9p5l
BOuwwz7cVpd/2noPx2Ck/6fyNtx26hNdYQ2J2o8If2I4QLnvhQobwyHl7kjB
RYZVPY+m6QW1tx1Wsa5o1RIiVJCl0cTSs24YoR30I5QILIn5it1HdHoqh0xs
2ZFRiBvQyIDHQPQYXdzHSnQ5LXCkmtVdf2L9kjJ9qrcE5EdrCGio4NZotTGN
42Ue6FOhluZUBL65cQaFp9aqIXbUWrHDl6jDq/DkBKZcTpqtfO20mm06vdPr
RBgTrBmVjDw6dL2cHndy88yjWKLTSj3PwnuKjjajqe9oK1uqOAb4m2zUrPHB
rW/Tthutbub4O0mHLZd1+JQW0hM8rlgAyXrOaf498sLFM2CrHAA0mzAeSNgv
DnWRNg3HVdxhTBfJa3cQpIOxj6HzpVwFTdj5A6iggwm0iSEFE1aXlZCow9hQ
x9belCaDBflGyhANNd7jWX7RhpShahh2jSK3cy8hyBEKWyjMGEPmQQ7jgco6
4srqc5JWCoJ4s8DzJ2goEWv9vbGAIZPsxf/F0enYIywo4uQSqnoZpa60oGan
9OpC9yQIehTUtTpYng9/2HEXBio0OFC10JVTawlfe9Hiy50NJL/KuhDrwDoP
ZNiN/TJRFRLrT4pZrC6kj/rpN1/tC9BYQEQ5o5GwCO9+kqQYN01jSbySzWiP
lDaUraRdfUywTUzhLzWNi5QKJNRgXOecinHtmlaCoA1LCogG3zqmsGja3JgE
GzyzJtdDI8rL8tM1zsaZy4ybXpBNuVeQCulYs5oUcKmx4c8wholNsf1XGcWi
mnJPljm3hIE1bM2m8hekYyK1UDMCjL3NCnm8gzI+DueJSlHa5K6wXmA9jwqd
sYN94uqqPc9y4rytNRk9kSnbc+NV4DZq8wLvhmGVbWg14raApLKzpWncwjRe
5Gz0XIwap3+qyuKDtiZy1RMmnPpj6qRYykdLJNd6Bwi022JDFZegR3qAVnoO
PCNs8+MXkbGDOgH0zP4TsvkX2vMDlxGXc7f9U3P0SP4Nql3B4krpVCkZM5hO
6bqCpbFBjSsY+WoyUWdQozL3nQpo92UY2n9maGoZMH0+ApyG6fb3WfWdXfAp
dgf1VfjA+Z6FiHSGjvxqa2RHLuLvUWsrIhT+ACxxGh4wZyyquYApGYT6bjP0
m725OLvUpGGxpiWHb84uJTTlDabTAixgre4SDktla43h3Ud0HnxhEG5PXuP0
F1HMki8RYXO0fv11WWQ1PgABxW3s3oocWmqs6BUW62Wix6FwYa2elOIucDr4
DDh+Hd6pIa36TgFgTATUyYiavdI62vtUYhdeh0OjABlf2FcdYlBf+EviPBo4
txH4swZzdJXnRBR4zj6jx0oliM8kKpF2ksbkFoxZjiQ+UCC7FJ6QDQ8rn4MA
vTgyUwfa+tIHs2PKnTsKh7eX/so2ub18MYH/vMT/HM+8RPbdPLBaZIVxuyTu
QIAvCljF10WF3OSSk32vc6lhK6M5fX157cKLXn2HeYu+tqyrdJFL4wWbQMRN
Q/u1cE5NCMzcXO8hBDb00AYqx18ds3PUNWemF92eXk1Mc2aKoHdrv+Zy2/0K
ac7C+Wh3D7T+VFn+j3tCR5J6e27jIwSqMluIn8CZO1SLFSOKOg7BBXqRxOB2
AUr3Z5TA1I0Q3bqgGsKd6Bwpg6In9HuRNaOuH7DyHwvqGXHbU2ko2MnHTFEw
UcVn9j7XQFtFrWcXnh6lKLMAbMfUVIWR6m4Ct/t2nvhk56D2Zn4pPZtn/dra
k/rFhbDkMIaq4wAuXWzguY9gSg6vL8+PQgggJZcHSifQWCitGq0OTrxRx9u/
7zyEMOlkInS//wn0tSE/yZFammAJiSx4uQYMMxLU05dzLmhH8r24bCm9aQeH
Zx9WHw3SBA8OJEbOh4Vg7ZmPAkW3cEokcVtkEvJyY+OS23y1lVSRnETuUVc8
F24nZckHzs6V4wGHnklRa6LL46MgK179cvi59yAfa+0Gmhym1lxvBJ1E/R2x
2T/v84Deo5A9aipHoFNh4USGjH2dyt9u24eE7bs1hrvfj9SdwKLrlyuql30B
13OBSLVYQEIIJYgD/nEXfeDIEyVWOwn6dhxAbQBNxLXtCp7TtVoXV6BHnnk3
Ai0/sq1CILrOgKysiLyUeRDH9LZJToFChXXHLUWNYuEVCo579DV1vX0/UL1t
ePYAfZHWbpOqgFKVUD31DXdk4gxGgtg+gWkZKV1xRmGf9t1bdI59mpa8ZF/K
E1Q5qhrBiIhbrXj/VTgCYh+pU0FMTCEpU0HNS7ITYvY0w2y45pnFPM/GggwG
/fVO0yBK4lmJ+Tvs7tLrhbNJP0TZ0YYylJ/DCct22tppYaPEQ8lHrvSWrejP
kI4LQ4t2rYH7bkyjHTpairknFMuARmsXuP2ZKmtmKT57NtrdZtBN/gRAqJpM
vUAj1aig1VAKsYD12taX5ZAIjC1uadchV+s0WQ5r701UHFo5iAKQAqCiExU+
PBB4ptwiqlz+dElvGOdARKayi+sH/PBufuqKgDsvgm+8Hlv9MZnJ1wwcVlmZ
R3nfTBsK1S/asOmjK4TQpmU+FFkjAF5MEk7+aBXdwNFhWxlSZSTF+26QofAg
+ONlj+Y/s5mk51+sm2JFTCH2MBYt17nN2MhA3gDBAmlY7ETYZ53stlnPiRHX
iXHrbMYYrLRxGvbzaczSTrePRS85cTOQk8PJCA6fpisESVRl3g9pyG97O+Ke
xEIlnELuPbkg03ORho4Wt44NDYA8k61FmCIqhjF6rlCZH6iC6Y9IADfsqT10
wQGI0srk/AqQKlo3tDjC+enZzZxaM7HhYzl0emxpVPfSASdsGHaJuFTy49jW
GIJDC71NkAA2/4wMixw7IeZeqj8fGHmMUVANvMFr+FdadW6lwoX1z97fUMX3
doIanKSVkJnU2J5wUXLf3mtbVL4RMEmSobrzafJzMX1TDLbw9sHAxqrU6y05
gKFve/4C1FIY3PY1XJtdbFN6bQ0FBniVE0XMaCmVF9krtk3eSQ52zlmtbRCQ
6I4/UulkZGsnkSYXcH5hQfg2J1ZwgfBswJ8wUlSaVC0TpU/jJ/sEJ92AxwLX
XS0Yygni+jvlPoCEVqXq1TBg2zztHWYvBdjNWZANiKMi4cB4OxSyEpLxaGEg
xNIcCvuwdp75dpggWsHfhh9utMATeRzRtKF5UJpo9x/Jy0GWOFGy9uyhADhY
OXf2yBKivWJBygYMENOF+Do2pWvxA2KpWkui8ushWiXOq83zD60p7GGcAqGM
I2Ne2n7wVGciackETWfLF2dsYR4PZBcmGdW6nlZuKRHoZZIU3cfVnIdY5itZ
djT3SQQrF141c91ba7WuHL7AcecHLJwT9S9GuvG+ghLNuqhe7RPrMAnN3JxC
RRoiwUUp0mfXlW4QITLAOQxKAjVmyBhsjfVRBn5gVvAdarZNcY/8EeelwM1Z
/n2Ksp4GkkjcddkFJxVoWwXSqsStZjNw6Nz7hHUzvkGFyBuVjYS12mMMUCJP
GLlIWCfqKdhCSzz2Sjp3od4QBdILV1/uyDzcECrkVihTM+BU28nIQaEHsS21
RV6Scqlo1CHL9K4mEJXfa14hnA90GWmkAnVX0VTTsYoIcT128f8rF6GyUBLr
RuyaVCLRpujEdJjvmMcgQ1TAMQVWusT0ALZntY6tk6zx9eCDInKG5fqnKR/H
epwNoNZ+CRaN8aMMBhTtWnToIxIeMrKgiG6xwbchokuze/iHA4ZT3+y6yckj
zpyKRsOy/xF0DSgibXNDhROsGROc2MgTpq2cMW6PKaLPkIljmFo6hq2SV5+x
OWt3xrD5ESuZhzI7Uu18DOOTg3fIBmQN7BbSso3XVZoZCr+IYO+AdVXRb0R6
ffwbsBmFHU8EtE+Gsl5DHQGxvk+Ui2XtsypJHRt5xJPwqS9fHbpyjd98BMJG
CTCPGFmJvsdRrMQODKDZwaKBVqsi2Lquy2wImg5g0Uy9ux6TCr0FVEGYB5lS
SOaOYzuxI91b+rEhB08JB0rZ9um1cNlhtZYaV4mD2RQh0GoIg9cWxDFEfTdG
giFDjkL4dsRNECILHZ/L7eQvTAcuv5ozg9aEn6RRdCxBISfexVKwDwC1vkpr
V/l2ahS7qc6RAF/7wH0yODCFU9x3NyjlxyCO4BIzcXLIWGlze/nCbYyUDjCX
I7dyzhCK3GPbOUt9jFuKVVejUxoQ2sq7XnrzD9EyRcoOjXzC9kXXDi/seKgB
c2V9R+ltCHml/Wcccuryqq255hHjsSmGZLI/e5Fk/aXWRUVtWOTfCC/TWISW
oiVvxBwpTrURBiX6dTBG0lG1iQ1BeAIrA3mx/cnalpaIfW0Ug7MNYTiDmN7G
Lft9+GGANUs7H7fDSBoFYG45jSfTgXCZPmgOgLhEEXgEbgV4UHkp5rVBq073
UGPas2Tm8nOc3fux01bVD1MFlDxnUurZ5enToaJu1BUDVyx8QwVHBuOStGR2
qAg48vMw/RGtwANFqwvQMVKNcrjZGtoGNuhTwfGp4GW5WGXbmpzz5Jfw4WwC
pyWoRv11eP94SW3TsjGU2UhG9Ye84lpYQe/naIMxfMKl9gST4PE+SXshvkpN
Rc3xtdVr3TrbpsyKUxzuzPoYbkKPfcwyxObYsPFx3oQkqFtsDUdS3I0SLiWp
TkIzBR71jYOB8WpY0+4Te9CVohdyiCuplQm4BS+MnRprSROXqtyH9iHRzDxj
IcGDg428w41paUsxVF1Q86AXY9mPrYxocdT0hPfQaJJnt3KYL7Q+wrO4b1GE
7zNNQQDNyel+VMX7URO/31tXiWHionY6cUuIowRTX6hZ4tIF0aIlJV9yuX+n
cJekcDkY96cEaOL+jhVAHShiGwZqPub5jRSHftM/U+zKu72d5yLcb65VpP4c
FbHE5yxE652nYXmp51sbjX+aRVr0Zplk8tP1WxfGsFQVOWSZMZUO19P7Q5wy
PD+R88wiHXeomEQ4SdIoa7SSLnPKN+Y1IDBKxvPNqFdcSIkC3RseJWb3WDNl
UK+rV6tS63V4bv4HmDnh7mKEmS/S6knM3Lh5QbEfivQZY+9WE+8z87AQT+qK
OgctlDlO9u3Vz/P3ya+fl9uHtPrt4OBt/ZBcIQMFXRVGPwcNKXkv9HpIFx8F
Mb8pLE/GmQ+5AKB8saZuGwVVs0KTLZcmo+DFKHCG69wik+J6RT6OkYqvIqcp
WsajEmHOCUBE4eaxwUuVtn0wIx4JV6Htq9krtfdR/QReguAJagIE9rTFiQUl
G6KWDmELD94ERP6E1dD/O+GhY7rOBnU1AIe19qzTamO4cP2yDbiV2MWA2mxR
PLe2tWzVuPjAgTm71odfm3aXkpWhSdIDMyWrSu5LpH375TdfUyfDZ8nb+jol
4vhVPlFpIc0k167VVi8LeEBF1Wy1dooGTpFXhURt6l7gqhLcGtxPIsFF4OMd
LgKjC5rFmC6UlG6oIYTz7fZH/FsVZfHPSlVjfSC9LRO0DHtNFkbqq1GZqKND
vHwqvbNdptKUGxqG8Xb6YJy+CYnjE2Rcj03uaR8VpCzddgIzNTK6P0ZOyaau
JuEjWw5aYk/LkLaV2lYqHOxwhyWVK+5sEOE601SFSOHnYnrz03sfIP+myMss
Yg5vkDWQY8UftX83eXUfJdAZy9mjrhuUfufSrOG4KQDN2QHS5NX0IcXQliqD
7f6Qx0zOVFduBYzoq6Ln4ozev54iC/FZhLhNcHA06y/58vurqxHtVQKZTLsi
pr+pmNyE4m52d3xYgPmorexdne2wKfbNxbujgehFslBx43NGK8Snn2GH+mX9
0RfosfQ/Zu0Vv0xs6G2pcr+YysJTDwKmNCVR0nIFFNOtN60yIw6MYkNln+Hd
w/cp8buOyJsKzS8BVUjT3CDHFZ0dYhQBku7VR5EJx+fcKq5PDPqTJymPOTh4
o6CN7IRatWUBYLdx5+txmWCCaPJ+O4OIWHRoQdnOiC/AqPiFv7Oa41VQfmYx
UkX48QKOc9tOYZK85lzo63pHAbmj5YP12P8ZtYKpFm3JyQOBD1ALULjCVpqw
IIi+W0dGDjIX+B5yKD/Rq0MJ4fg1qHu1ct9CqzUu1ENaDfHquHKhXfN/rgLh
ObvSpeqSNByIqCcI9jXF94GWyr3T64N5uhaOIZkG10iZogAa43pIrLbvjGIR
r8P0xgocL5aUDYYlxnwQwJUdffgNMybom++pCjBuWtFqAadff+Wrgm9BWoRO
04eaoxF9BDQVe73KO2LZig7+ykJzlpxr9whX8gxJCY55hvSKshX/9e/031Jp
XPXb3PGB4K9myVu6X50T3N1DF7DSaeuqcMMLyewwb8rE4mf72tnS177hADz0
b2yabchESx08vM/hNFhH26X7UDyevJFSHeiII35klO8Vdv2VZy1zqnzbBOqK
R9BilXcDFfAVVDCDjh97apaWrI5M76hOyVEL70gO31OyDHUvE1u0GkOiK7Ge
TJr8/BZY5iF2OUS9DVuR/ESKPaH6rt4K557oBJmp0cgDNodx8hiaqTZ6uZwX
AiNE0A3LY2MEI28MZkjtcbfkoINDEtIldZB3WPivFtb1dxxkNerydZlHx0RW
WzOq7MvVQiwMRPYk3gBff3CSANNaUXAqHz3nmEeyIXjuQPlVWjTTB0xrk5Ab
Adsq2IK36AlkQyVvljdsJIexlRjdsROPa2DLisWe27dMjgQgYxjTzlS1PeTD
s7XjOkL1JtxmWCT5AqVymXdkwJSvbHG0mG77jAMujDcty7d0NpAxsnFQCG7P
bMm6j0ZWaBaxC1U8pH4Mz/Li6v5rd6HdpIxMBsn3PwGaO/y+rO+AHn9COQjc
Zq4Wdklfe3X83UvMQXWyS0IdsYExnaVI6lNwpn0lUdyCK4cjcrsvMsTFK36t
WqpgCzZ5WpGBCmsW3H+NJ5nncfN2Pj8F3IuHjOriyRgRf9QBcjlyz1PxpuZQ
NFLhIXGE1eTL4uPMyZbf3XXBnK6g60K/HcAYepKFm68IJcXgKWAPARWcAhkU
GaVvDxfKPgcyGfnMlsAL4xKIamjnTcTyotrZ1xyN/8+2ehBh6Uo1EV/oW864
j43r/8TNRV0cXHgEcOmlyF7gWwvAUB+SeVY70YP6z0EzV5UirnIDemfLNQ3Q
zxYW8449a1Ypke1Q3B9y5i7uB9Hjmz4Q5i7nZkhrP5twCbFsNPWoE8vZr5+j
YYMAWGxzoPztflczLjWKkZqlY0c+MYiRs6/Dk0oaODs0uCBpzY0mrHG+9aVj
2ADDpQCQQWx3DSZxu8R4c5uAGLIuZhOu58N5CLaZhUmWD/drwpLSPJALkCVf
Nj5uD5+0n1Bxm4EahrVJj5slNxo3yN0n2W5gEpedz5q9Nrwci7TV4FecDwUC
YfVktDAV1KHT4sBl2q7ZSCFOX3yEi2wfXlGjcadRfqDbJ1e+NyLpICRb30Nr
EwZwxnGPWDfFUCgdfV9YKmiOUUQd0EAHL6Swkqtznw8JXdZjBCU1Qz2YWAOM
vUKBrtOLeh3rfWLICPcJzzofdTGVm0NFZm7XVVrOGAVf/xbmhpMszLkqIoZm
33PwDqMHUgHE8qSWBqREADsPuCK7DSMB5yoUbdW8GWf7IGWCWfY6z4zvj6qm
apzHNGwBcUJ88uzqSjsFuaaNzKYozba07oXQVKPRyj6ejh54+W5OzcjMkvpA
HKPtiF8vsFyTc4iecn5zexK6d2WnzqUYQHI7p6vRRsQMH3ticIyZt0prMXvp
7xo6QfAudHezSOvV0tTV+KxfruUz52cAArzPuTODcdY8UnbFR8jRNKW/5wl1
awy6HgvH951wJ+EZmFi4T9zD+bUZPPVMIBQ21arswtZIexXPaihXMM5OUGHs
bCVz/byRkIJzZwjJLqSYb9n9kAZYJ6w/y/Vq8zjOdWbIKeMD03ABLNb3k7cP
747fCYzR5uC06Y33zvI1Qt/BqOXxp2941IOFgOgRZ6YqMYZaysaE3aa4BAbZ
tSMWM/P0fOvOsX2HVPAy9HxkhL7Ganmyjp7sKViUkZAnug4fIxxZnZiDhZNi
Ig3KdowsWd89LFoNP4yMndQqS1xAE4lcsGWNy9QgNtczaijhn2MQkSQdhjfk
6Jr0eudJa0o4u9JMQ3lnGKk7MW2CNIaKDEPwH0M/70xKtWO9wBClFJyzjjvz
2U/XF7K2wrXe1hJFHCFmB7BZIhngM1xfWGiJuulgxZL9ES6NL513EhKjSQsP
C1uHXe+UFl1ObWzAjWlSZnVDacROa5Z0LFhbGMAY+2VTKLNK5/l7rOwoSzar
thkCuFHDAcUV8bM8YXoXkhiVTYVQ0WDY86zKN7eKUrDt2FNwLAY7B5LFLOxB
yN1piTX6NCpmV3FBSENqcy1j7qUogz2HWDgeMPNZ6748wVDY5S2FaGCFoiIO
sglgvJa2k9lN9ZB6MueI7v14IzqBdD6PQUjI1/u1Pe+0CM6OG4USWalT35AM
+UadOLHVWWJpSQEUstGUchinRZHywzRimgeyLTB0EPBwsIiBEDnQNJU0iFtn
GebM24bdoPtbZpvaPEKepmeOpU4tVPwYf3XP0tTAftJWXE6DD1ZRmeoJJ57m
Kerb4cnpWc654w5YezcDWlEp6ttNzi6fKXV5cRRlifZlJTWR9vWPcIA2pvBk
5EymYeShuItN6i7lhPvqwFZ915q3rqCCP5FeMAJACcdJPX5CPMe9uxitqKSn
GXiiOfEH3XrJuEW4og1J6KD17sKAwKGjrmWnotIkNpZN53YWFd1QDMY7FR45
KijvQrTGO0UJ00Df+EiLE4zLatOlBAFp0xxOLIx6mMmCuiBMc8YeARC2LqEL
BhPPTLNzOejDlQmDCDK8iQzz3R/tYMHg2RgfecvZjtOXhJEp1gvEnuEHjyp3
KTuxInhQs/EVWozCJ2I+7knDOoPlh4JPjC9HrVbI8ElxUF9gqDZv2ZCqKrP8
CVrzQRTahCowNXJ0jRIcqpKbYMI/7LDDORovqf5Lc3BwpikOof8qjPJ18vsE
nsV9BLVM1kIc3luylAIng3Gn2nIuxwvUcntwcB60tf8QtEY6CZoXhtfCuQwv
leBBDuX0FxO599JnbVWs1IiDkyjq89rHEqqVV/4NR5MWVC4usdaWk6AXo+Pw
7kG+rJX7KrB9Hxxc0crp2lRcLTHxJVEpuJRkVmRTDwcHF2g2kwt0Ft0i1JL7
Ydxui0MDe38yAwtFffz8JJ9fSz6vuyBwvsGQ1SNIYyuabEpWxQDGE7K5zyuf
u+UW2/bDfDe/mQ+enCKyzMsJkj/F7mTrj24oWurenpz4GT07lMWrGEFgTIyf
aktBply13rORFnPRyTdsI97YHOrj3/u2zdbrPaK5issxwEMmdGMiZlquvaDR
Cy5JFg2tvrMTy662X7ELzdo64AnFNn2q2jls0ufJ+zoJzKYWT8I+Kj7ot+Ad
FjUh4A6nLJPltGcqhoFTM0lQ/XgCbe1++sZJ3Y6SJ1MsXYiMJ6M4O/Kdee0u
yIhUmDAZ3QB7q4UiMI7QmQbwIqK4yweMZvD1N98h0j68vH135FufRciHiJr3
x6570LUnrG2pnoeDAx8TrMeE1oOXw4Ie5wkbKp/AJjQcFYaEUhL6UumOjoQL
xQ6yGV0VsDjOUYjT3oWEvMU4wyYtjX2/qgcOTIjshS4vfufiEKG04Y/IQsh4
7WxpmEkb4j6fX+DzgU36JaEwG7iszer2vvaJe3rUX0pKUDZJUCZEijLq/hE1
9E7qOJtKVQ3zBG6nTC2kJ/1spiNWHl1biBgkhRUDtSRZ0LNGy6X+kFcLGyVp
YCdvllsP69myRQxdVXkOkKRs7w7Tp2iMzi/iNbF0U7uidrqug+lZvV5wumw9
l8j5jRc1kffHFSYcxpOfzg3VOEofsWy1MXyz0chc7Jl2xL4PfXi2dkfQVEPO
Ps2SfOp9ZuubdN7ncfMU07IZdRMi+aAKhm8Frc/iKE/vHDJRJENeIBZpZak0
TlpDLW7FQDwPxE36Fis9vV9dIJlHTkIxNpbSB1bINk8GXPywiNhZYnjpQAkP
Yla4c0qvGWZEHsyQncU3VC8cbmBZrw6JiaROC+Iho5EUP3WGtEmyzrX7gRDm
45JWUYsBIn7BaQ/47D3+FH8aej1ejGjo23Nh/c6uriLOEImh0V5zHl6F5ZJI
lIPq2pEwHFDPnEVRFTT+AuDlHJje/h99Gzf3HKXotfo+H3U+Uo4TZSEVIgqy
erHjzhAP7HGV2PW9C1Bwo1ETJQWdp+hOcm8g17ZxtDMPRHSgbtcg24VxBJ2L
DVFC2lqTesHjNxFEfOIWmAwLWv4JRuPfRkVGnbMLp4isNHKuhFgYS4IKtxDf
vnUaNuHpah7x2gzky9BgqTlSUGM2KBd+0bodoHhaQytWe4jE6gg3P4x5WZ+V
HdnuBgNsUflQkDzUq4H2yLI/CuQlEsMZAkyLm7ynZRcOB1urk2NJfehmezoS
d+jyVSOZFTLKyJ2K0p+lfi8D2L/EPHWVB+AaQX/f3SKrY28dbO4plh4DYgLb
fuGTJhnEsW3O1/bPDEFI1FCs6D1xKLFpnrNcLcCOgqsGuZVvcDQS4SVMjH9F
I9N51PbX6cpYkkt2QGKEAnsTdTauhNcZZTwShRFp+/iWPWbrkkggHuMYmyBh
6e5sQ5Ioe9Kb18QZ3xN8VDEeK1ilvjNZFJYmRV6co9NW29NJSmosphree0cH
t9BzgEGfKFmbg2LIR0C1PFhnhUCWTMzpsW3mwXKghgsJMjLfSMuisaXAEC4J
01BbjLtfMMqMbIyoO5jaBgNIl1gAIN1KNz5C4ljfl5BrVN/F4N4A/tsi+8RA
NZt6uG5eENkV83x1V5D+yfkgNnFDbefK9MiTFvaHIeacNshXQjM6Lo4aK8wC
RalZPk8/6y2M2+G1jzCJdpbg+/zKKRvasgO/S20mkmr+kdKN+zgJlVmxDQ0m
DmkEsSHQsZhSnL43DtAqOcT1cQsL6pkLk6fLXWy9JhdE28jAWPUKUZEjTdEM
vQn/wuVRuB2QOFvqRmTdCW4jwoMnVhMrwVzeFLMCQD1RQHns2TTpaFI8sSwA
NSLtYqsVJeg9wL6dpG7d+6A3tmCQDueb0TC5+9IHkaaBOl2gPOnQHNmY3n9D
oRq9folBeWctcGba040hdcP3c/YysF4pJbzYVyTxUHruXLssrUjup4c1sx0j
argQLVs/yrTYMHCQHl4cpyac3i1mMLG+N2atZuZBgaH6azD4IO0L99j10xvp
SSoZKmi33G7jpXuiXxrlN4diIBg6FSDO+4+KJioE1LfH2UnJ2oDBBNgJjNyN
UYAaZufnjT1Hfu96oTHSLkWS5dEkdaMr7KM1glH1c/L9Y1Lqp0CNOvTw+PSf
sCQMzv19DYS/psQH0nbumiJflnuXus+KgCua6QaU0iPjGgPqTQQEIKn7rvFk
/OI3mKCGgbbiNZXwMBTKWQ48ihlCYGnh+qUubkkMLGwq9TWeuceIWkB0vNxp
0wKlruBoCjETpL5TESciU40f6o00oRQ/ffPU1oJQXjDn3C0a/uNGJLaJh94M
X30JrdvLZcnGOu+t+XcFtXI05h4x91dI+EBquqgHvbrqSh/z2rW9lsZs9p3/
lUyjgfr6qeR9mD02CkPESlJgtyX/DEd9mRph8YMw5YdjhKOL3KORWwASrbJy
PxnbXGynGzmZ7qwxR3V3buVhBK+shmsQJ24MYs4kPlTE4BV8Nxe6D15UYqNU
odAys42QmOcTt7F9ejPgWhI6qXWMmcLva2twhOeto6kCfcJlsNG+53iwEr7C
rgYSpK0PIgt8W9GdTb4CLluKgx/gLbFKCbFFlw4q7CRX2Q7KTQf5CzWxGFkt
rcmJiHBvXD4ZphWnasJYUeatFmilCr+ULEaxjE2dZvQXHDlM2aezGeoAQ/Fv
WOWmwSpRMi4qsznwRtw85FzoyoN5cJSTBtNg7JTvZ7oP/H5wnjrGwMp7+Klt
LKu5ssHrXgkV630y/Nu9By6lGi/4ZLehUn1IzFH6KF+JhQPffdcMQfubnNZK
FwpdQpg5SgMWAXgxfz8fEH7qG61qviISROzyNiYz0oaT+cIpwNRL4ODgZ4yU
RacKNX+l4aXVh+R2BxSEqXZNOkl+wBDWNrltF+t6mVeFOHDegYRJ8zK5xn+b
rBU+x2yTUAzoVTAqOFNLWDgsHmK5+nW6TJN32H9o+hak8j/oZnL4cPE4ik6Z
TqnoyMH/AfiOZgYYDAEA

-->

</rfc>

