<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-t2trg-security-setup-iot-devices-06" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>

    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
      <address>
        <postal>
          <city>Espoo</city>
          <region></region>
          <code>02150</code>
          <country>Finland</country>
        </postal>
        <email>mohit@iki.fi</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <postal>
          <city></city>
          <region></region>
          <code></code>
          <country></country>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <city>Oviedo</city>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>

    <date year="2026" month="January" day="17"/>

    
    
    

    <abstract>


<?line 160?>

<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completion, and the knowledge imparted to the IoT devices after the setup is complete.</t>



    </abstract>



  </front>

  <middle>


<?line 165?>

<section anchor="introduction"><name>Introduction</name>

<t>Initial security setup for a device refers to any process that takes place before a device can become fully operational. The phrase <strong>initial security setup</strong> intentionally includes the term <em>security</em> as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, and configuration of necessary credentials and parameters.</t>

<t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by [Sethi et al. <xref target="Sethi14"/> while developing a solution for smart displays.</t>

<t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passphrase before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with the initial security setup of devices and excludes any discussion on setting up networks.</t>

<t>There are several terms that are used in the context of initial security setup of devices:</t>

<t><list style="symbols">
  <t>Bootstrapping</t>
  <t>Provisioning</t>
  <t>Onboarding</t>
  <t>Enrollment</t>
  <t>Commissioning</t>
  <t>Initialization</t>
  <t>Configuration</t>
  <t>Registration</t>
  <t>Discovery</t>
</list></t>

<t>In addition to using a variety of different terms, initial security setup mechanisms can rely on several entities. For example, a companion smartphone device may be necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverse initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>

<t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>

<t><list style="symbols">
  <t>Terminology used</t>
  <t>Entities or "players" involved</t>
  <t>Initial assumptions about the device</t>
  <t>Processes necessary for completion</t>
  <t>Knowledge imparted to the device after completion</t>
</list></t>

</section>
<section anchor="standards"><name>Standards and Protocols</name>

<section anchor="bluetooth-mesh-provisioning"><name>Bluetooth Mesh Provisioning</name>

<t>Bluetooth Mesh <xref target="bt-mesh"/> specifies a provisioning protocol to securely incorporate a new device into an existing Bluetooth mesh network. Provisioning includes authenticating an unprovisioned device and securely delivering network specific secrets and addressing information that allow the device to become a mesh node. The process relies on a Provisioner, typically a smartphone application or a dedicated management device, which interacts with the unprovisioned device (called provisionee) and assigns it a unicast address and one or more Network Keys. Once provisioned, the device becomes a <em>node</em> in the mesh network. Within the network, one or more nodes may take on the role of Configuration Manager, using device specific Device Keys to configure nodes and distribute Application Keys that are required for secure application layer communication.</t>

<t>Bluetooth Mesh provisioning proceeds through several well defined phases. It begins with beaconing and discovery, where an unprovisioned device advertises its presence and Device UUID, allowing a Provisioner to identify it. This is followed by a capabilities exchange, during which the device reports its supported cryptographic algorithms, available authentication methods, and I/O capabilities. The Provisioner then selects an authentication method and the two parties perform an ECDH key exchange. The provisionee public key may be static and transferred using an out of band mechanism, or ephemeral and sent directly over-the-air bearer. Both sides derive a shared ECDH secret, which is used to establish session keys that protect the remainder of the provisioning protocol. During the authentication phase, the method selected based on the capabilities exchange, namely Output OOB, Input OOB, Static OOB, or No OOB, is used to authenticate the key exchange and confirm user intent. The selected input or output method determines the direction in which a random value, either encoded into the device during manufacturing or generated at runtime, is transferred. Once authentication is complete, the Provisioner securely distributes the provisioning data, including the Network Key, unicast address, and other network parameters. After this step, the device is fully provisioned and can participate securely in mesh communication.</t>

<t>Since Bluetooth Mesh version 1.1, certificate based provisioning is also supported. In this mode, the unprovisioned device is provisioned during manufacturing with a device certificate that binds its public key and UUID to a certificate authority operated by the vendor. During provisioning, the device sends this certificate to the Provisioner, which verifies it against a configured trust anchor certificate authority. In this case, the user can view a list of unprovisioned devices and select the device intended for provisioning without performing explicit actions to transfer keys or random values using out of band mechanisms. The user may be assisted by the selected device providing a visual or audible indication to confirm physical identity. Alternatively, the user may scan a QR code or device URI printed on the device or its packaging, which encodes the UUID. The Provisioner then receives the corresponding certificate containing the same UUID and provisions the device. This enables automated authentication of device identity without relying solely on user mediated out of band mechanisms. Bluetooth Mesh also supports remote provisioning, where the Provisioner does not need to be in direct radio range of the unprovisioned device. Instead, provisioning messages are relayed through already provisioned mesh nodes, allowing devices to be added to large or geographically distributed deployments without local access.</t>

<t>Bluetooth mesh has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Provisioning</em>: is the central term used to refer to the complete process of securely adding a new device, called a provisionee, to an existing mesh network with the help of a Provisioner. It includes discovery, authentication, establishment of shared keys, and delivery of network specific credentials and addressing information.</t>
      <t><em>Beaconing and discovery</em>: describe the mechanism by which unprovisioned devices announce their presence to Provisioners so that the provisioning process can be initiated.</t>
      <t><em>Configuration</em>: describes the post provisioning process by which a node is prepared for participation in the mesh network. Configuration includes the distribution of Application Keys for instance. Note, distribution of the Network Key, unicast address, and Device Key is considered essential and is therefore part of provisioning rather than the optional configuration phase.</t>
      <t><em>Reprovisioning</em>: refers to the process of provisioning a device again, either to add it to a new mesh network or to restore it after removal from a previous network.</t>
    </list></t>
  <t><strong>Players</strong>: In deployments where the device being provisioned uses a static asymmetric key pair, the device manufacturer is responsible for equipping each device with that key pair and making the corresponding public key and related metadata available to the user, for example by printing it on the device or its packaging, often encoded as a QR code or URI. In certificate based provisioning deployments, the manufacturer additionally provisions the device with a unique X.509v3 device certificate. The Provisioner plays a central role in the protocol and is typically implemented as a smartphone application provided by the device manufacturer or system integrator. The device owner/user is responsible for initiating the provisioning process and selecting the correct physical device to add to the mesh network. Depending on the provisioning method, the user may scan a QR code or URI containing the device public key or UUID. If Output OOB, Input OOB, or Static OOB authentication is negotiated, the user is also responsible for transferring the required out of band information, for example by observing a blinking LED or numeric display on the device and entering the value into the Provisioner, or vice versa. When using certificate based provisioning, the user may scan the UUID printed on the device or its packaging, or select the device from a list of unprovisioned devices identified by vendor, model, and UUID. The user may be assisted in selecting the correct physical device being provisioned through visual or audio cues emitted by the device. In larger deployments, already provisioned mesh nodes may relay provisioning messages, enabling remote provisioning of devices that are not within direct radio range of the Provisioner.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: Each device must have a unique Device UUID, which is used during discovery to identify the device to a Provisioner. The device may also be provisioned with a device specific static asymmetric key pair that is used in the ECDH key exchange during provisioning. In this case, the public key is typically made available to the Provisioner out-of-band via a QR code or NFC tag printed on the device or its packaging. In deployments that use certificate based provisioning, the device is additionally provisioned at manufacturing time with an X.509 Device Certificate that binds the device public key and the UUID. The corresponding trust anchor CA for validating this certificate is assumed to be available to the Provisioner.</t>
  <t><strong>Processes</strong>: Once an unprovisioned device is powered on, it advertises its presence using unprovisioned beacons. The user or owner then uses a Provisioner application to discover nearby unprovisioned devices. The user may select the correct device based on information such as make, model, and Device UUID displayed by the Provisioner. In deployments that use static public keys or certificate based provisioning, the user may also scan a QR code or URI on the device or its packaging to transfer the device public key and or UUID to the Provisioner prior to authentication. Thereafter, the unprovisioned device and the Provisioner perform a capabilities exchange to determine supported cryptographic algorithms, authentication methods, and available input and output interfaces. At this stage, the user or owner may be assisted by visual or audio cues emitted by the device, as permitted by its reported capabilities, to clearly identify the physical device that is being provisioned. Based on the exchanged capabilities, the Provisioner selects an authentication method and initiates an Elliptic Curve Diffie Hellman key exchange. The key exchange is then authenticated using one of the supported methods, such as Input OOB, Output OOB, or Static OOB, in which case the user assists by transferring or confirming authentication data between the device and the Provisioner. The specification also allows certificate based authentication, where the device presents a manufacturer issued certificate that is verified by the Provisioner, removing the need for user mediated out of band transfer. Upon successful authentication, the Provisioner derives session keys and a Device Key and securely delivers the provisioning data, including the Network Key and unicast address, to the device. After provisioning is complete, the device becomes a node in the mesh network and can securely participate in network communication. Subsequent configuration is performed using the Device Key to distribute Application Keys.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After the provisioning process is complete, the device possesses one or more Network Keys that enable it to encrypt and authenticate mesh network messages. The device is also assigned a unique unicast address that defines its identity and addressing within the mesh network. In addition, the device holds a Device Key that is shared only with the Provisioner or Configuration Manager and is used to authenticate and protect future configuration messages without requiring reprovisioning. The device may also receive one or more Application Keys that allow it to participate in specific application level communication contexts.</t>
</list></t>

</section>
<section anchor="device-provisioning-protocol-dpp"><name>Device Provisioning Protocol (DPP)</name>

<t>The Wi-Fi Alliance Device Provisioning Protocol (DPP) <xref target="dpp"/> (also called Wi-Fi Easy Connect) is a standardized protocol for providing user-friendly Wi-Fi setup for devices. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the local network. DPP also supports cloud managed environments where the configurator is not directly reachable on the local network. In this variant, referred to as DPP over TCP, the enrollee communicates with a local relay, typically the Wi Fi access point (AP), which encapsulates DPP messages into a TCP connection to a remote configurator.</t>

<t>In DPP, an enrollee is typically provisioned during manufacturing with a static bootstrapping asymmetric key pair. The configurator may also possess a static bootstrapping key pair generated when the application is first installed or initialized, or it may generate a bootstrapping key pair dynamically. DPP defines four conceptual phases. During the initial <em>bootstrapping</em> phase, the most common deployment model uses unidirectional authentication of the enrollee bootstrapping public key. In this case, the configurator possesses an authenticated copy of the enrollee public key, for example obtained through a QR code printed on the device packaging, while the enrollee does not authenticate the configurator at this stage and instead relies on the configurator having prior knowledge of its public key. Bidirectional authentication of bootstrapping public keys is also supported when enrollee and configurator input and output capabilities permit it, such as through PKEX, where the user inputs a short shared secret code on both sides, or through bidirectional NFC exchanges.</t>

<t>After successful unidirectional or bidirectional bootstrapping authentication, the protocol proceeds to the <em>authentication</em> phase, during which the configurator and enrollee perform a mutually authenticated key exchange using fresh ephemeral keys and the previously authenticated bootstrapping keys. At the conclusion of this phase, both parties derive shared key material. This key material is then used in the <em>configuration</em> phase to securely provision the enrollee with network access information. This includes a Connector (a modern credential containing a tuple of the network identity and an access key instead of a network wide password) and traditional network parameters such as the SSID. In the final <em>access</em> phase, the enrollee uses the Connector together with the network introduction protocol to authenticate to and establish connectivity with the Wi Fi access point (AP), completing the DPP provisioning process.</t>

<t>DPP has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: refers to the initial establishment of trust between the configurator and the enrollee through an out of band exchange of bootstrapping public keys. Only concerned with public key authentication rather than network configuration.</t>
      <t><em>Discovery</em>: refers to the mechanisms by which devices locate each other and determine how DPP messages should be exchanged.</t>
      <t><em>Enrollment</em>: used informally to refer to the act of authorizing a device to join a specific network domain</t>
      <t><em>Configuration</em>: refers to the phase in which the configurator provisions the enrollee with the information required to join a network domain. This includes delivery of a DPP configuration object containing network parameters and a Connector.</t>
      <t><em>Reconfiguration</em>: refers to the ability of an already provisioned device to obtain updated network configuration information from a configurator without repeating the initial bootstrapping phase.</t>
      <t><em>Provisioning</em>: used more broadly in DPP to describe the overall process of securely configuring a device for network access. It encompasses bootstrapping, authentication, configuration, and access, rather than referring to a single protocol step.</t>
    </list></t>
  <t><strong>Players</strong>: The device manufacturer is responsible for provisioning each device with a bootstrapping asymmetric key pair during manufacturing. In many deployments, the manufacturer is also responsible for encoding the corresponding bootstrapping public key, together with associated metadata, as a QR code printed on the device or its packaging. The device owner/user is responsible for securely transferring this bootstrapping public key information to the configurator. The configurator required to perform the DPP protocol and enable new devices to join the Wi Fi network can be provided through functionality built into mobile operating systems such as Android or iOS, or through a dedicated application supplied by the device manufacturer. In enterprise or cloud managed deployments, the configurator may be part of a remote IoT platform, in which case the local Wi-Fi access point acts as a relay and must be configured with the network location of the remote configurator.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: DPP requires devices to have a bootstrapping asymmetric key pair, which is typically installed in the factory. The corresponding bootstrapping public key is intended to be conveyed securely to the configurator through an out of band mechanism. Depending on the selected DPP variant and the device capabilities, this may require the device to support specific I/O interfaces. For example, devices may present the bootstrapping public key and associated metadata encoded as a QR code or NFC tag, or they may support limited user input to enable password based bootstrapping using PKEX.</t>
  <t><strong>Processes</strong>: DPP provisioning process begins with bootstrapping, during which a user initiates an out-of-band transfer of public keys between the configurator and the enrollee. In a typical unidirectional deployment, the user employs a configurator, such as a smartphone application, to scan a QR code associated with the enrollee, thereby providing the configurator with an authenticated copy of the enrollee bootstrapping public key. Bidirectional variants are also supported, including NFC based exchanges and PKEX, where both the configurator and the enrollee authenticate each other using a short-shared secret input by the user. Once the configurator possesses the enrollee authenticated bootstrapping key, the devices proceed to the authentication phase, performing cryptographic exchanges to verify the bootstrapping keys and establish a secure encrypted channel using derived shared key material. During the subsequent configuration phase, the configurator uses this protected channel to provision the enrollee with a DPP configuration object containing deployment specific network parameters and a Connector. The Connector is a cryptographically protected credential that binds the network identity to a device specific access key and replaces legacy network wide passwords. In the access phase, the enrollee presents the Connector to a Wi-Fi AP to establish secure association with the network. If network settings change or credentials expire, the device can also undergo reconfiguration by using its stored keys to obtain updated configuration information without repeating the initial physical bootstrapping steps.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After successful completion of the DPP provisioning process, the enrollee device and the configurator establish shared key material that is used to protect the subsequent information provisioned onto the device. The information includes a Connector, which is a signed and cryptographically protected structure containing a group identifier, a network role, and a network access key. The Connector replaces traditional network wide passwords and allows the device to prove to other peers that it has been authorized by the configurator to join the network. The device also receives and trusts the configurator public signing key, which it uses to verify Connectors presented by other devices such as APs. In addition, the device gains knowledge of deployment specific network parameters, typically including the SSID, supported operating channels, security policies of the domain, and privacy protection keys (used to protect identity of the enrollee when requesting reconfiguration by the configurator).</t>
</list></t>

</section>
<section anchor="enrollment-over-secure-transport-est"><name>Enrollment over Secure Transport (EST)</name>

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="RFC9148"/>. EST assumes that the enrolling device already has IP connectivity to the EST server and some initial information is already distributed so that EST client and server to perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines "Bootstrap Distribution of CA Certificates" which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate "fingerprint" received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>

<t>EST has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used for the process when the client device has not been configured with an Implicit Trust Anchor (TA) database and device owner or administrator manually verifies the fingerprint of the EST CA certificate. This manual verification is only needed once, as the device establishes an explicit TA database for subsequent TLS authentication of the EST server.</t>
      <t><em>Enrollment</em>: describes the entire process of obtaining a client certificate from the EST CA. This includes learning the EST CA certificate, discovering required attributes for the Certificate Signing Request (CSR), submitting the CSR, and receiving the final client certificate.</t>
      <t><em>Initialization</em>: term used to refer to the essential initialization data that the device needs for completing the enrollment including the trust anchors, the EST server URI, and credentials for TLS authentication.</t>
    </list></t>
  <t><strong>Players</strong>: The network administrator is responsible for deploying and maintaining the EST CA and EST server before a device can be enrolled into the network. The device manufacturer must install a client identity certificate (such as an IEEE 802.1AR certificate), a shared secret for TLS authentication without certificates, and/or a username and password for HTTP Basic <xref target="RFC7617"/> or Digest <xref target="RFC7616"/> authentication. Additionally, the manufacturer may configure trust anchors for verifying the EST server and set the EST server URI. However, the EST specification allows for manual configuration of all required information, including the manual verification of the EST CA certificate fingerprint.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: A device acting as an EST client is assumed to possess an existing credential for authenticating itself during the TLS handshake with the EST server. This credential may be a previously issued EST client certificate or a certificate from a distinct PKI, such as an IEEE 802.1AR manufacturer-installed certificate. Alternatively, the client may authenticate using a shared secret-based credential, such as a pre-installed symmetric key, or a username and password, either as a standalone method or in combination with TLS authentication. To verify the EST server, the client relies on a trust anchor database, which may be explicit, used to authenticate certificates issued by the EST CA, including the EST server certificate, or implicit, allowing authentication of the EST server when it presents a certificate issued by an external CA. The implicit trust anchor database may initially contain pre-installed CA certificates and can be disabled once the EST CA certificate is obtained. The EST client must also be configured with a Uniform Resource Identifier (URI) to locate the EST server.</t>
  <t><strong>Processes</strong>: Before a device can enroll using EST, the necessary network infrastructure must be in place, including the deployment of the EST server and CA. The device can discover the EST server URI through various methods, such as manual configuration or preconfigured settings from the manufacturer. If the device lacks an explicit Trust Anchor (TA) database, it may require bootstrapping, where the owner or administrator manually verifies the fingerprint of the EST CA certificate. Once the EST server is authenticated, the device retrieves the EST CA certificate, learns the required attributes for generating a Certificate Signing Request (CSR), and submits the CSR to obtain a client certificate. After enrollment, the device can securely authenticate to the network using its newly issued certificate and renew it before expiration.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After completing the enrollment process, the device obtains a client certificate issued by the EST CA, which it can use for authentication in subsequent communications. During enrollment, the device also learns the EST CA certificate, along with any intermediate certificates needed to build a complete trust chain to the EST CA trust anchor. The client also discovers the attributes it should include in a Certificate Signing Request (CSR), such as key usage, extended key usage, etc. Depending on the enrollment method, the device may generate its own key pair and submit a CSR or receive both a server-generated key pair and certificate. If the client requested a Full PKI, it may also receive information such as certificate revocation lists (CRLs), policy and name constriants etc. as defined in <xref target="RFC5272"/>.</t>
</list></t>

</section>
<section anchor="open-mobile-alliance-oma-lightweight-machine-to-machine-specification-lwm2m"><name>Open Mobile Alliance (OMA) Lightweight Machine to Machine specification (LwM2M)</name>

<t>LwM2M specification developed by OMA <xref target="oma"/> defines a RESTful architecture where a new IoT device (LwM2M client) first contacts an LwM2M Bootstrap-Server for obtaining essential information such credentials for subsequently registering with one or more LwM2M Servers. These one or more LwM2M servers are used for performing device management actions during the device lifecycle (reading sensor data, controlling an actuator, modifying access controls etc.). LwM2M specification does not deal with the initial network configuration of IoT devices and assumes that the IoT client device has network reachability to the LwM2M Bootstrap-Server and LwM2M Server.</t>

<t>The current standard defines the following four bootstrapping modes:</t>

<t><list style="symbols">
  <t>Factory Bootstrap: An IoT device is configured with all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server while it is manufactured and prior to its deployment.</t>
  <t>Bootstrap from Smartcard: An IoT device retrieves all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server from a Smartcard.</t>
  <t>Client Initiated Bootstrap: If the IoT device in one of the above bootstrapping modes is only configured with information about an LwM2M Bootstrap-Server, then the client device must first communicate securely with the configured LwM2M Bootstrap-Server and obtain the necessary information and credentials to subsequently register with one or more LwM2M Servers.</t>
  <t>Server Initiated Bootstrap: In this bootstrapping mode, the LwM2M server triggers the client device to begin the client initiated bootstrap sequence described above.</t>
</list></t>

<t>The LwM2M specification is also quite flexible in terms of the credentials and the transport security mechanism used between the client device and the LwM2M Server or the LwM2M Bootstrap-Server. Credentials such as a pre-shared symmetric key, a raw public key (RPK), or X.509 certificates can be used with various transport protocols such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) as specified in LwM2M transport bindings specification <xref target="oma-transport"/>.</t>

<t>As explained earlier, an LwM2M Bootstrap-Server is responsible for provisioning credentials into an LwM2M Client. When X.509 certificates are being provisioned, the asymmetric key pair is generated on the Bootstrap-Server and then sent to the LwM2M client device. This approach is not acceptable in all scenarios and therefore, LwM2M specification also supports a mode where the client device uses the Enrollment over Secure Transport (EST) certificate management protocol for provisioning certificates from the LwM2M Bootstrap-Server to the LwM2M Client.</t>

<t>OMA has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em> and <em>Unbootstrapping</em>: Bootstrapping is used for describing the process of providing an IoT device with credentials and information of one or more LwM2M servers. Interestingly, the transport bindings specification <xref target="oma-transport"/> also uses the term unbootstrapping for the process where objects corresponding to an LwM2M Server are deleted on the client.</t>
      <t><em>Provisioning</em> and <em>configuration</em>: terms used to refer to the process of providing some information to a LwM2M client.</t>
      <t><em>Discovery</em>: term for the process by which a LwM2M Bootstrap-Server or LwM2M Server discovers objects, object instances, resources, and attributes supported by RESTful interfaces of a LwM2M Client.</t>
      <t><em>Register</em> and <em>De-register</em>: Register is the process by which a client device sets up a secure association with an LwM2M Server and provides the server with information about objects and existing object instances of the client. De-register is the process by which the client deletes information about itself provided to the LwM2M server during the registration process.</t>
      <t><em>Intialization</em>: term for the process by which an LwM2M Bootstrap-Server or LwM2M Server deletes objects on the client before performing any write operations.</t>
    </list></t>
  <t><strong>Players</strong>: Device manufacturers or Smartcard manufacturers are responsible for providing client IoT devices with initial information and credentials of LwM2M Bootstrap-Server and/or LwM2M server.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: The client at the very least has the necessary information to trust the LwM2M bootstrap server.</t>
  <t><strong>Processes</strong>: LwM2M does not require any actions from the device owner/user. Once the device is registered with the LwM2M server, various actions related to device management can be performed by device owner/user via the LwM2M server.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After the bootstrapping is performed, the LwM2M client can register (Security object and Server object) with the LwM2M servers.</t>
</list></t>

</section>
<section anchor="nimble-out-of-band-authentication-for-eap-eap-noob"><name>Nimble out-of-band authentication for EAP (EAP-NOOB)</name>

<t>Extensible Authentication Protocol (EAP) framework provides support for multiple authentication methods. EAP-NOOB <xref target="RFC9140"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the IoT device (peer in EAP terminology) and the server. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server.</t>

<t>The application server where the IoT device is registered once EAP-NOOB is completed may belong to the manufacturer or the local network where the device is being deployed. EAP-NOOB uses the flexibility of the Authentication, Authorization, and Accounting (AAA) <xref target="RFC2904"/> architecture to allow routing of EAP-NOOB sessions to a specific application server.</t>

<t>EAP-NOOB claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels and supports IoT devices with only output (e.g. display) or only input (e.g. camera).</t>

<t>EAP-NOOB has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of an IoT device. The specification does not use separate terms or distinguish the process of obtaining identifier and credentials for communicating with an application server where the user has an account or for network connectivity.</t>
      <t><em>Registration</em>: describes the process of associating the device with a user account on an application server.</t>
    </list></t>
  <t><strong>Players</strong>: The device owner/user is responsible for transferring an OOB message necessary for protocol completion. The application server where the device is registered may be provided by different service providers including the device manufacturer or device owner. The local network needs standard AAA configuration for routing EAP-NOOB sessions to the application server chosen by the device owner/user.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: EAP-NOOB does not require devices to have any pre-installed credentials but expects all devices to use a standard identifier (noob@eap-noob.arpa) during initial network discovery. The devices also populate the PeerInfo JSON object using during the boostrapping process and may contain information such as the MAC Address, Manufacturer name, and model information.</t>
  <t><strong>Processes</strong>: The IoT device performs network discovery and one or more OOB outputs may be generated. The user is expected EAP exchange is encompassed by Initial Exchange, OOB step, Completion Exchange and Waiting Exchange.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After EAP-NOOB bootstrapping process is complete, the device and server establish a long-term secret, which can be renewed without further user involvement. As a side-effect, the device also obtains identifier and credentials for network and Internet connectivity (via the EAP authenticator).</t>
</list></t>

</section>
<section anchor="open-connectivity-foundation-ocf"><name>Open Connectivity Foundation (OCF)</name>

<t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the set of procedures required to bring a device from an unowned, factory default state into an operational and managed state as onboarding. A central element of onboarding is ownership transfer, which establishes a legitimate device owner and forms the root of trust for all subsequent security configuration and access control. Ownership transfer is performed with the assistance of an Onboarding Tool (OBT), a logical entity under the control of the user or administrator that interacts with the device to authenticate it, establish secure communication, and provision initial security credentials. The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc.</t>

<t>OCF specifies several standardized Ownership Transfer Methods (OTMs) that define how the device and the OBT authenticate each other and establish a secure channel during onboarding. These include Just Works, which performs an unauthenticated Diffie–Hellman exchange using DTLS and provides confidentiality but no protection against on-path attackers; Random PIN, where the device presents a user-visible PIN that is entered into the OBT and used as the PSK for DTLS-PSK to authenticate the exchange; and Manufacturer Certificate-based ownership transfer, in which the device authenticates itself using a manufacturer-installed X.509 certificate and the OBT verifies this certificate against a configured CA trust anchor. In certificate-based OTMs, mutual authentication may also be achieved if the device validates the OBT’s credentials. OCF additionally allows vendor-specific OTMs to support proprietary hardware capabilities or deployment-specific requirements, provided they conform to the overall security architecture.</t>

<t>Upon successful completion of an OTM, the OBT provisions the device with Owner Credentials, formally transitioning the device from an unowned to an owned state. These credentials establish a long-term trust relationship between the device and its owner and may take the form of certificates, shared secrets, or other credential types defined by the OCF security framework. As part of onboarding, the OBT also provisions information required for interaction with core OCF security services, including the Access Management Service (AMS) and the Credential Management Service (CMS). The AMS is responsible for managing access control policies and permissions, while the CMS manages the lifecycle of security credentials used by the device during normal operation. Together, these steps ensure that the device is securely owned, authenticated, and ready for controlled participation in an OCF ecosystem.</t>

<t>OCF has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Onboarding</em>: is the umbrella process that transitions a device from an initial unowned state to a fully operational managed state and includes discovery, ownership transfer, credential provisioning, and initialization of access control and credential management services.</t>
      <t><em>Discovery</em>: process by which an Onboarding Tool (OBT) locates unowned or owned devices on the network and learns their basic identifiers, security state, and supported Ownership Transfer Methods.</t>
      <t><em>Enrollment</em>: used in the context of certificate enrollment to obtain a certificate from the CMS after onboarding is complete.</t>
      <t><em>Configuration</em>: refers to the act of setting or modifying the state of device resources through their exposed interfaces. Configuration applies to both functional resources and security related resources such as identity and credentials.</t>
      <t><em>Provisioning</em>: refers to security focused configuration operations performed during and after ownership transfer that establish or modify the trust relationships of a device. Provisioning includes the configuration of ownership information, security credentials, trust anchors, access control policies, and security service endpoints, and defines the security domain in which the device operates.</t>
      <t><em>Registration</em>: act of associating a device with its security domain and management services after ownership transfer. Registration typically includes provisioning the locations and identities of the Access Management Service (AMS) and Credential Management Service (CMS).</t>
    </list></t>
  <t>Players: The device manufacturer is responsible for provisioning the device during manufacturing with a unique device identity (UUID) and, where certificate based ownership transfer is used, a manufacturer issued X.509v3 certificate and corresponding trust anchors. The Onboarding Tool (OBT) may be implemented as a smartphone application, a home gateway, or a dedicated device management system, and is often provided by the device manufacturer or platform vendor. The device owner/user is responsible for initiating the onboarding process and establishing ownership of the device using the OBT. During the ownership transfer process, the user may be required to input a randomly generated PIN or explicitly approve a Just Works transfer, with the expectation that this occurs in a physically and logically secure environment. For certificate based ownership transfer methods, the user or owner typically selects the correct device from a list presented by the OBT, identified by its Device UUID or additional device metadata. After onboarding is complete and information about the Credential Management Service (CMS) and the Access Management Service (AMS) has been provisioned into the device, these services become responsible for ongoing security provisioning, including credential lifecycle management, access control configuration, and authorization policy updates.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: OCF requires devices to have a unique device identityty (UUID). Depending on the supported Ownership Transfer Methods, the device may also have a manufacturer issued X.509 certificate and corresponding private key. Additionally, the device is initialized with a default, restrictive Access Control List (ACL) that permits anonymous, unauthenticated access only to the specific security resources required for onboarding while blocking access to all other device resources until ownership is established.</t>
  <t>Processes: OCF onboarding process begins when a device that is in an unowned or reset state is discovered by an Onboarding Tool (OBT) using OCF discovery mechanisms. Once discovered, the OBT initiates an Ownership Transfer Method (OTM) to establish a secure relationship between the device and the new owner. Depending on the selected OTM, the device and OBT perform an authenticated or unauthenticated key establishment procedure, such as a Just Works Diffie Hellman exchange, a PIN based authenticated key exchange, or a certificate based authentication using manufacturer installed credentials. During this phase, a secure communication channel is established and ownership of the device is transferred by provisioning an Owner Credential and updating the device ownership state. Upon successful ownership transfer, the device accepts privileged configuration operations from the OBT, regardless of existing access control entries. The OBT then provisions the device with security relevant information required for operational use, including credentials and trust anchors for interacting with the Credential Management Service (CMS) and the Access Management Service (AMS), as well as initial access control policies. After these provisioning steps are completed, the device transitions into an owned and operational state. Subsequent security provisioning and configuration operations are performed through the CMS and AMS, allowing credentials, access control entries, and other security parameters to be updated over the device lifetime without repeating the ownership transfer process.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: Upon successful completion of the OCF onboarding and Ownership Transfer process, the device transitions from an unowned state to an owned and operational state. The device now possesses an Owner Credential, which cryptographically binds the device to its legitimate owner and allows it to mutually authenticate the Device Ownership Transfer Service (DOTS) in the future. This credential may take the form of a shared secret, a public key certificate, or another credential type defined by the selected Ownership Transfer Method. In addition, the device is provisioned with the identities and network locations of core OCF security services, including the Credential Management Service (CMS) and the Access Management Service (AMS). The device trusts these services to manage security credentials and access control policies on behalf of the owner.</t>
</list></t>

</section>
<section anchor="bootstrapping-remote-secure-key-infrastructures-brski"><name>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</name>

<t>Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/> defines a bootstrapping solution that enables devices to securely join the device owner's network domain using manufacturer-installed IEEE 802.1AR <xref target="ieee8021ar"/> certificates, together with a manufacturer-provided Internet service called the Manufacturer Authorized Signing Authority (MASA).The document highlights that the solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. The goal of the protocol is to securely provide a new device (called pledge in the specification) with the CA fingerprint of the owner's network domain, allowing the device to identify and trust future interactions within the owner network. If the owner network provides an Enrollment over Secure Transport (EST) service, the device may also enroll and obtain a locally issued certificate bound to the owner domain. To enable this process, the owner operates a registrar that authenticates devices using their manufacturer installed certificates and requests authorization vouchers from the MASA based on its list of trusted manufacturers and device serial numbers. Prior to full network access, the device may rely on link local connectivity via an owner provided proxy (Join Proxy), allowing it to complete authentication and trust establishment before being assigned a routable network address.</t>

<t>BRSKI has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used to describe the overall process by which a device transitions from an unaffiliated factory state to being a trusted member of an owner network. In BRSKI, bootstrapping encompasses device discovery of the local domain, interaction with the registrar and manufacturer authorized signing authority, validation of a voucher, and establishment of trust in the owner domain. The term broadly covers all protocol steps required before the device can securely operate in the network.</t>
      <t><em>Provisioning</em>: sed in a general sense to refer to the act of supplying a device with the information and trust anchors it needs to operate securely in a specific domain. In BRSKI, provisioning primarily occurs when the device accepts the domain trust anchor conveyed in the voucher and optionally receives a locally issued device certificate. The term is not used as a formally distinct protocol phase and is largely interchangeable with bootstrapping in descriptive text.</t>
      <t><em>Enrollment</em>: used to refer specifically to the process of obtaining a locally issued identity within the owner domain. This typically occurs after imprinting and is realized through Enrollment over Secure Transport, where the device enrolls with a local certification authority to obtain a Locally Issued Device Identifier certificate.</t>
      <t><em>Onboarding</em>: not used as a primary or formally defined term. It appears informally to generally refer to the broader act of bringing a device under the control of an owner network.</t>
      <t><em>Join</em>: used to describe the act of a device attempting to attach itself to a specific owner network. It reflects the device intent to become a member of the domain but does not by itself imply trust has been established.</t>
      <t><em>Imprint</em>: used to describe the transition where the device accepts the owner domain trust anchor provided in the voucher. Imprinting marks the point at which the device irrevocably binds itself to the owner domain by trusting the pinned domain certificate.</t>
    </list></t>
  <t><strong>Players</strong>: The device manufacturer is responsible for installing the IEEE 802.1AR IDevID certificate and private key during manufacturing, along with the trust anchor required to verify vouchers signed by the Manufacturer Authorized Signing Authority (MASA) and the MASA service location itself. The manufacturer must also operate the MASA service, which authorizes devices to join specific owner domains by issuing signed vouchers, and maintain sufficient asset tracking to associate device identities such as serial numbers with authorized owners.  <vspace blankLines='1'/>
On the owner side, the network into which the device is deployed must provide initial connectivity, often via a proxy, to allow the device to communicate with the registrar and indirectly with the MASA before it has full network access. The device owner operates a registrar that authenticates devices using their manufacturer installed certificates, maintains a list of trusted manufacturers and corresponding MASA services, and tracks the identities of devices that are permitted to join the domain. If the owner intends to issue locally scoped identity credentials, the owner must additionally deploy and operate an Enrollment over Secure Transport (EST) server to provision domain specific certificates to devices after successful bootstrapping.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: BRSKI requires each device to possess an IEEE 802.1AR Initial Device Identifier (IDevID) certificate and associated private key. In addition, the device must include a built in trust anchor that enables it to validate vouchers signed by the manufacturer’s Manufacturer Authorized Signing Authority (MASA). The device is also configured with the MASA service location, typically expressed as a URI embedded in the IDevID certificate.</t>
  <t><strong>Processes</strong>: BRSKI assumes that devices are manufactured with an IEEE 802.1AR Initial Device Identifier certificate and the information required to contact the manufacturer authorized signing authority. When a device is powered on in the owner network, it discovers the owner proxy using link local discovery mechanisms and establishes provisional network connectivity. Through this proxy, the device connects to the domain registrar using a provisional (unauthenticated) TLS connection and presents its IDevID for identification. The device then generates a voucher request and sends it to the registrar, which validates the request and contacts the appropriate MASA. The manufacturer verifies the device identity and issues a signed voucher that authorizes the device to join the owner domain. This voucher is relayed back to the device via the registrar, where the device verifies the manufacturer signature and associated freshness information. Upon successful verification, the device imprints by accepting the owner domain certificate conveyed in the voucher as a new trust anchor. If supported by the owner network, the device then enrolls with a local EST server to obtain a locally issued device identifier certificate for ongoing authentication and management. After these steps are completed, the device is able to securely participate in the owner network. With BRSKI, once the required infrastructure such as the registrar, proxy, and manufacturer services is in place, it enables a bootstrapping experience that requires only physical installation, connectivity, and powering up of the device.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After the BRSKI bootstrapping process, the device obtains the CA fingerprint of the owner's network domain, which establishes the basis for trusting future interactions with the owner network. If enrollment is performed, the device additionally obtains a Locally Issued Device Identifier (LDevID) certificate. With this trust anchor and optional local identity in place, the device can securely communicate with domain services, participate in secure routing, and be managed by the owner using domain specific management protocols.</t>
</list></t>

</section>
<section anchor="secure-zero-touch-provisioning-sztp"><name>Secure Zero Touch Provisioning (SZTP)</name>

<t><xref target="RFC8572"/> defines a bootstrapping strategy that enables devices to securely obtain all configuration information with minimal installer input, beyond physical placement and cable connections. The goal of this bootstrapping protocol is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment-specific network management system (NMS). Devices receive signed and optionally encrypted information about the owner's NMS, which they authenticate using an owner certificate and an ownership voucher <xref target="RFC8366"/> signed by the device manufacturer. The owner certificate and ownership voucher can be delivered to the device via Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers. Devices may be redirected to multiple servers before acquiring the necessary credentials to verify and connect to the designated NMS.</t>

<t>SZTP has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of devices. It involves the device authenticating itself with manufacturer-issued certificates, fetching the owner certificate and ownership voucher, and retrieving the signed or encrypted onboarding information, such as the boot image, initial configuration, and scripts.</t>
      <t><em>Provisioning</em>: refers to the process of providing all the necessary bootstrap information to a device so that it can become functional. In some sense, the terms bootstrapping and provisioning are used interchangeably because, for provisioning the bootstrap information onto the device, it is necessary to bootstrap the device. In fact, the specification also refers to Secure Zero Touch Provisioning (SZTP) as a <em>bootstrapping strategy</em>. Interestingly, even though the title of the protocol specification includes the word provisioning, it is used much less than bootstrapping in the specification text.</t>
      <t><em>Onboarding</em>: used to refer to the information that the device needs to join the owner's network. In particular, the onboarding information includes the boot image the device must run, an initial configuration the device must use, and scripts that the device must successfully execute. Note that in SZTP, onboarding information is not the entire set of information that the device needs for bootstrapping. Prior to obtaining the onboarding information, the device also needs the owner certificate and ownership voucher to verify the onboarding information received later.</t>
      <t><em>Enrollment</em>: describes the process by which the device owner registers with the device manufacturer, ensuring that the manufacturer recognizes the owner and issues the necessary ownership vouchers. This crucial association is later used by the manufacturer to provide the owner with the serial numbers of the devices based on the order. The owner then uses these serial numbers during the bootstrapping process to verify the devices as their own.</t>
      <t><em>Discovery</em>: used for describing the process by which devices discover sources of information, particularly bootstrap servers that are not already known to the device. This discovery typically happens via redirects from trusted bootstrapping servers.</t>
    </list></t>
  <t><strong>Players</strong>: SZTP requires significant involvement of the device manufacturer. The manufacturer is responsible for installing the client identity certificate and trust anchors for verifying botstrapping server certificates and ownership vouchers during the manufacturing process. Additionally, the device manufacturer must support the enrollment of the owner by verifying the owner certificate and issuing an ownership voucher. After receiving an order for devices from an enrolled owner, the manufacturer needs to inform the owner of the serial numbers corresponding to the ordered devices. This naturally necessitates robust asset tracking systems. Lastly, the manufacturer may also need to operate well-known bootstrapping servers that the device contacts to retrieve the owner certificate and ownership voucher. At the same time, the device owner also carries substantial responsibility, including enrolling in the manufacturer's SZTP program, managing the keys associated with the owner certificate, and maintaining the network infrastructure to authenticate the device's serial number and confirm its association with the order placed with the manufacturer. Once authenticated, the owner is responsible for sending signed and/or encrypted onboarding information to the device.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: SZTP requires devices to have a pre-configured state, including a client X.509 certificate for TLS client authentication to bootstrap servers. While the specification allows the use of HTTP authentication with passwords, it typically relies on X.509 certificates in the form of IDevID certificates, as defined in <xref target="ieee8021ar"/>. Additionally, devices must have a list of trusted bootstrap servers and trust anchor certificates for verifying bootstrap server certificates and ownership vouchers signed by the manufacturer. All this information, including the client TLS certificate and trust anchors, must be installed during manufacturing.</t>
  <t><strong>Processes</strong>: A precursor for the device to bootstrap and join the owner's network is the enrollment of the owner with the manufacturer and the setup of all necessary network infrastructure to authenticate the device. Thereafter, the device can use various sources such as Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP) options, removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers to locate the owner certificate and ownership voucher. These methods can be used in parallel to expedite the process. Once the owner certificate and ownership voucher are obtained and verified, the device receives, verifies/decrypts the signed and/or encrypted onboarding information, including boot images, configuration details, and scripts. With the image, configuration, and scripts, the device can securely join the owner's network management system (NMS). Unlike other protocols, once all the infrastructure has been set up, no actions are needed on the device itself other than its physical placement, cabling, and booting up.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After the SZTP bootstrapping process, the device possesses all necessary information, called as bootstrapping data, for secure communication with the deployment-specific NMS. This bootstrapping data includes the ownership voucher, the owner certificate, and onboarding information. The owner certificate and ownership voucher are used to verify the onboarding information, which encompasses the boot image and its hash or signature, initial configuration, and pre- and post-configuration scripts to be executed by the device.</t>
</list></t>

</section>
<section anchor="fido-device-onboard-fdo"><name>FIDO Device Onboard (FDO)</name>

<t>The Fast IDentity Online Alliance (FIDO) has specified an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecycle. The draft specification refers to this feature as "late binding".</t>

<t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as "out-of-scope" but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC9112"/> proxies.</t>

<t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into a Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>

<t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should use.</t>

<t>FIDO has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Onboarding</em>: is the central term used in FDO and represents the complete automated process that transitions a device from its factory state to operational use under the owner's management. It covers the discovery of the owner through the rendezvous server, the execution of TO1 and TO2, and the mutual authentication and secure exchange of configuration and credentials between the device and the owner's onboarding service. The ability to determine the final owner and configuration long after the device has been manufactured is referred to as <em>late binding</em>.</t>
      <t><em>Provisioning</em>: used interchangeably with the term onboaring to refer to the entire process of making the device operational. The introduction section of the specification even states <em>FDO is a device onboarding scheme from the FIDO Alliance, sometimes called "device provisioning"</em></t>
      <t><em>Initialization</em>: used to refer to the Device Initialization (DI) protocol, which occurs during device manufacturing and installs on the device all initial information, including the attestation key pair, unique identifier (GUID), rendezvous server information, manufacturer public key hash, and the secret used for computing the device HMAC. During the same phase, the manufacturer's tools generate the ownership voucher that corresponds to the device's credentials.</t>
      <t><em>Resale</em>: refers to the protocol actions that the current device owner can perform to transfer ownership of the device to a new owner without the involvement of the original manufacturer. This is made possible by the ability of the owner to update the device's credentials and generate a new ownership voucher during the onboarding process.</t>
      <t><em>Re-provisioning</em>: refers to the complete onboarding process being executed again for a new owner.</t>
    </list></t>
  <t><strong>Players</strong>: The device manufacturer plays a significant role in FDO. During production, the manufacturer provisions each device with a unique identifier (GUID), an asymmetric key pair used for cryptographic attestation (based on Intel EPID or standard ECDSA), a hash of the manufacturer's public key (used for verifying the ownership voucher chain), and detailed rendezvous information describing how the device can later locate its onboarding infrastructure. These rendezvous instructions may include DNS names, IP addresses, certificate hashes for TLS pinning, and even information such as a Wi-Fi SSID and passphrase to enable initial connectivity to the rendezvous server. The manufacturer also ensures that the device generates a symmetric secret, which is then used to compute an HMAC value over elements such as the device's GUID, rendezvous information, and manufacturer public key. This HMAC, unique to each unit, is embedded into a signed ownership voucher created by the manufacturer and transferred separately through the supply chain, establishing a verifiable link between the physical device and its digital identity. The specification does not prescribe who operates the rendezvous servers and refers to them generically as Internet services; in practice, they are often maintained by the manufacturer but could be hosted by other entities.  <vspace blankLines='1'/>
The final device owner, who seeks long-term management of the device for tasks such as retrieving data and performing software updates, either operates a dedicated onboarding service or delegates this function to another entity. The owner maintains a key pair whose public key is linked to the last entry in the ownership voucher and uses it to register device ownership with a rendezvous server. During the TO2 onboarding protocol, the owner authenticates to the device using its private key and the voucher, while the device attests its identity in return. Once mutual trust is established, the owner's onboarding service securely provisions operational credentials and configuration data, after which the device updates its internal FDO credentials to enable future resale or re-onboarding as needed.  <vspace blankLines='1'/>
FDO can be seen as a more elaborate evolution of SZTP. While both rely on manufacturer-installed credentials and trusted servers for redirection, FDO introduces a tighter cryptographic binding between the device and its ownership voucher through the embedded HMAC mechanism and supports verifiable ownership transfers across multiple entities. This design adds complexity but provides the important advantage that devices remain manageable even if the original manufacturer ceases operation, since ownership and onboarding continuity can be maintained by the last legitimate owner, who can update all information except the device's attestation keys.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: FDO assumes that each device is provisioned during manufacturing with a unique device identifier (GUID), a cryptographic key pair used for device attestation, a hash of the manufacturer's public key for verifying the ownership voucher chain, and the rendezvous information needed to discover onboarding services. The rendezvous information may include DNS names, IP addresses, supported communication protocols, certificate hashes for authenticating the rendezvous server, and even Wi-Fi SSID and passphrase details to enable initial network connectivity. The device also holds a symmetric secret used to compute and verify HMAC values that cryptographically bind the device's internal identity to its ownership voucher.</t>
  <t><strong>Processes</strong>: A precursor for an FDO device to onboard is the DI protocol, which imparts the information stated above. At the same time, the manufacturer creates an ownership voucher linked to the device through a device-generated HMAC value. The final owner, after receiving this voucher, possibly transferred through several intermediaries in the supply chain, registers the address of its onboarding service with a rendezvous server using the device GUID through the TO0 protocol. When the device is powered on, it follows its stored rendezvous instructions and performs the TO1 protocol to contact a rendezvous server, from which it retrieves the signed blob of data containing the network location of the owner's onboarding service. The device may optionally authenticate the rendezvous server through TLS if the rendezvous information specifies HTTPS and includes certificate hashes for pinning. The device then initiates a direct connection to the onboarding service, where the TO2 protocol is executed to perform mutual authentication and ownership transfer. During this process, the owner proves ownership using the ownership voucher, while the device authenticates itself using its attestation credentials. The device also verifies the authenticity of the signed blob received from the rendezvous server using the now-trusted owner key. After successful verification on both sides, a secure communication channel is established through which the owner's onboarding service transfers operational data such as network configuration parameters, addresses and endpoints of management servers or IoT platforms, authentication credentials such as keys, certificates, tokens, or shared secrets. The device applies these configurations and updates its internal FDO credentials with new information provided by the owner, which may include an updated device identifier, new rendezvous information, and a new trust anchor derived from the owner's public key. Similar to SZTP, once the supporting infrastructure such as the ownership voucher and rendezvous server registration has been set up, FDO enables an experience where only the physical installation and powering of the device are required for it to securely join the owner's management system or IoT platform. The specification does mention a <em>Trusted Installer</em> mode where the device is provided with advice and input during the onboarding process from the installer, however this is currently not defined and is left for future releases.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After the FDO onboarding process is complete, the device possesses all configuration and credential information necessary for secure operation under the new owner's management domain. This includes data transferred from the owner's onboarding service, which may contain network configuration parameters, the address and endpoint URLs of the final management server or IoT platform, and the credentials such as keys, certificates, tokens, or shared secrets required for the device to authenticate securely to these services. The data may also include instructions for installing required agents, drivers, or firmware updates. In addition, the device may receive and update its internal FDO credentials with new information supplied by the owner, which can include an updated device identifier (GUID), revised rendezvous server information, and a new hash of the owner's public key to establish a renewed trust anchor.</t>
</list></t>

</section>
<section anchor="thread"><name>Thread</name>

<t>Thread Mesh Commissioning Protocol (MeshCoP) <xref target="threadcommissioning"/> enables new Thread devices to securely join an existing Thread mesh network. That is, MeshCoP ensures that the network wide Thread Network Key, which is used to protect all link layer and mesh control communications, is securely transferred to a device that the owner/user intends to add to the mesh. MeshCoP relies on a dedicated Commissioner, which may be implemented as a smartphone application, to guide and authorize the commissioning process. Within the Thread mesh, one node acts as the Leader and is responsible for coordinating network wide state. Devices that wish to act as the active Commissioner must petition the Leader for this role. A new device seeking to join the network, called a Joiner, does not yet possess network credentials and therefore relies on an existing mesh node, called a Joiner Router, to relay commissioning traffic. A Border Router hosts a Border Agent and provides connectivity between the IEEE 802.15.4 Thread mesh and external IP networks such as Wi-Fi or Ethernet, enabling interaction with external Commissioners.</t>

<t>Before authorizing Joiners, the Commissioner must first authenticate its own authority to the Thread network. This is achieved by establishing a mutually authenticated DTLS J-PAKE session with the Border Agent using the network’s commissioning credential, known as the PSKc. The PSKc is a key derived from a human-readable passphrase (the Commissioning Credential) chosen by the user during the initial network setup and is typically entered by the user into the Commissioner user interface. Following successful authentication, the Commissioner petitions the network Leader to become the active Commissioner for the mesh network partition. Once accepted, the Commissioner is authorized to manage commissioning and the network begins accepting join attempts for specific Joiner devices that have been enabled by the user.</t>

<t>A new Joiner device scans available radio channels and listens for Discovery Response messages transmitted by nearby routers, which advertise commissioning support. The owner/user facilitates the joining device's entry by providing its unique PSKd printed on the device or its packaging. Using this PSKd, the Commissioner and the Joiner initiate a DTLS J-PAKE handshake that is relayed through a nearby Joiner Router and the Border Agent to reach the Commissioner. Upon successful authentication, a secure Joiner Session is established and the Commissioner performs the Joiner Entrust phase, during which it securely delivers the Thread Network Key and other operational parameters, such as the Mesh Local Prefix, protected by a session derived Key Encryption Key. After receiving these credentials, the Joiner terminates the commissioning session and uses its newly acquired Network Key to perform the Mesh Link Establishment attach procedure with a parent router, thereby becoming a fully authenticated and operational node in the Thread mesh network.</t>

<t>Thread has the following characteristics:</t>

<t><list style="symbols">
  <t><strong>Terms</strong>:
  <list style="symbols">
      <t><em>Commissioning</em>: refers to the entire process by which a new device is authorized to join an existing Thread network. It encompasses the discovery of commissioning-capable networks, authentication of the Commissioner, authentication of the Joiner using a device-specific PSKd, and the secure delivery of network credentials to the Joiner.</t>
      <t><em>Petitioning</em>: refers specifically to the process by which a prospective Commissioner requests authority from the Thread network to act as the active Commissioner.</t>
      <t><em>Discovery</em>: used for the mechanisms by which Joiner devices identify Thread networks that are currently accepting new devices.</t>
      <t><em>Provisioning</em>: refer narrowly to the act of delivering credentials to a Joiner once it has been authenticated.</t>
      <t><em>Entrust</em>: protocol step in which the Commissioner securely provides the Joiner with the Thread Network Key and other essential network parameters. Entrusting marks the transition point at which the joining device gains the cryptographic material required to participate as a trusted member of the mesh.</t>
      <t><em>Attach</em>: refers to the process that follows commissioning, in which the newly provisioned device uses the Network Key to perform Mesh Link Establishment (MLE) with a parent router.</t>
      <t><em>Join</em>: act of a device that is not yet a member of the Thread mesh network joining the mesh network</t>
    </list></t>
  <t><strong>Players</strong>: The device manufacturer is responsible for provisioning each device with a unique EUI-64 identifier and a Pre-Shared Key for the Device (PSKd), making this credential available to the user via physical labels or packaging. The device owner/user is responsible for establishing the Thread network infrastructure prior to commissioning. This includes deploying a functioning Thread mesh with at least one Border Router and selecting a human-readable Commissioning Credential (passphrase). This passphrase is used to derive the PSKc (Pre-Shared Key for the Commissioner), which allows the Commissioner to authenticate and communicate securely with the network's Border Agent. Additionally, the user must ensure an existing Thread device is in the vicinity of the new Joiner to serve as the Joiner Router relay. The Commissioner role may be fulfilled by functionality built into mobile operating systems (Android/iOS) or via a manufacturer-supplied application. Once the infrastructure is ready, the user is responsible for inputting the new device's PSKd into the Commissioner to initiate the mutually authenticated joining process.</t>
  <t><strong>Initial beliefs assumed in the device</strong>: Thread mesh commissioning assumes that a device is manufactured with a unique EUI-64 and a Pre Shared Key for the Device (PSKd), which is a short human-readable string intended to be conveyed out-of-band to an authorized commissioner. This PSKd is typically printed on the device itself, on an attached label, or on the original packaging, and may also be encoded in a QR code to facilitate user entry. The commissioning process relies on the assumption that this PSKd is securely transferred by the user to the commissioner, such as a smartphone application, and is used to initiate a mutually authenticated commissioning exchange.</t>
  <t><strong>Processes</strong>: The Thread mesh commissioning process begins when a user authorized Commissioner, commonly implemented as an application or service associated with a border router, discovers the target Thread network via a Border Agent. In parallel, a prospective device, known as a Joiner, is powered on and placed into joining mode, where it actively scans available IEEE 802.15.4 channels and transmits Discovery Request messages. Existing network nodes that are permitted to assist commissioning, such as routers or router eligible end devices, respond with Discovery Responses that advertise network identifiers and Steering Data, enabling the Joiner to identify a compatible network. Before authorizing new devices, the Commissioner must authenticate itself by establishing a mutually authenticated DTLS session with the Border Agent using the network commissioning credential and by petitioning the network Leader to become the active Commissioner for the partition. Once authorized, and after the user supplies the Joiner specific PSKd to the Commissioner, the Joiner initiates a DTLS based authentication exchange that is relayed through a nearby Joiner Router and the Border Agent. This exchange uses a password authenticated key exchange to mutually prove possession of the PSKd. Upon successful authentication, a secure commissioning session is established and the Commissioner performs the Joiner Entrust procedure, securely delivering the Thread Network Key and other operational parameters to the Joiner. With these credentials installed, the Joiner terminates the commissioning session and proceeds to attach to the mesh by executing the Mesh Link Establishment protocol with a parent router, thereby completing commissioning and becoming a fully authenticated and operational node in the Thread network.</t>
  <t><strong>Knowledge imparted to the device after protocol execution</strong>: After completion of the Thread mesh commissioning process, the device possesses all information required to securely participate as a node in the Thread network. This includes information such as the network name, channel, PAN identifier, and security policy. The device is also provided the thread network key, which serves as the root of trust for securing link-layer frames and Mesh Link Establishment (MLE) communications; this allows the device to mutually authenticate neighboring nodes as legitimate members of the same security domain. In addition, the device acquires addressing and identity information (Mesh-Local Endpoint Identifier (ML-EID) and Routing Locator (RLOC)) to facilitate efficient IPv6 routing and forwarding within the network.</t>
</list></t>

</section>
</section>
<section anchor="comp"><name>Comparison</name>

<t>This section presents a comparative analysis of the protocols for initial security setup of IoT devices. While the protocols originate from different standards bodies and target diverse deployment environments, they all address the same fundamental challenge of transitioning a device from a factory default state to a secure and operational state within a specific administrative, network, or ownership domain. The comparison is structured along the terminology used by each protocol, the players involved, the initial beliefs assumed on the device, the process steps required to complete onboarding, and finally, the knowledge imparted to the device after protocol execution. The section also discusses broader implications such as privacy considerations, resilience to supply chain attacks, support for resale and reuse, and the trade offs between user involvement and automation.</t>

<section anchor="comp-term"><name>Comparison of terminology</name>

<t>The ten protocols covered in <xref target="standards"/> highlight the lack of a common lexicon for specifying initial security setup mechanisms for IoT devices. While these protocols broadly aim to achieve the same outcome, namely transitioning a device from a factory default state to an operational and trusted network node, the terminology used to describe this process is fragmented and often inconsistent. Although it is difficult to identify strict patterns, several noteworthy observations emerge from a comparison of the terminology used across the protocols.</t>

<t>IETF protocols such as BRSKI, EAP NOOB, and SZTP predominantly rely on <em>bootstrapping</em> as the umbrella term for the entire process of transitioning a device from a factory default state to an operational state. Notably, SZTP includes the word provisioning in its title but explicitly describes itself as a bootstrapping strategy within the specification. In contrast, Wi-Fi DPP uses <em>bootstrapping</em> more narrowly as only the initial step of establishing trust through mechanisms such as QR codes or NFC. This differs from the IETF usage, where bootstrapping typically encompasses the complete process.</t>

<t>OCF and FDO use <em>onboarding</em> as the umbrella term for the entire initial security setup. This terminology reflects a consumer or enterprise management mindset, where a device is brought on board into an administrative or ownership domain. In both protocols, onboarding is closely tied to the concept of ownership transfer, treating the device as an asset that moves between legal or administrative entities such as manufacturers and owners. It is also worth noting a subtle semantic distinction OCF and FDO define onboarding primarily as a verb describing the process of transitioning the device, whereas SZTP defines <em>onboarding information</em> as a noun referring to the payload, such as boot images, configuration, and scripts, that the device receives.</t>

<t>Bluetooth Mesh and Wi Fi DPP use <em>provisioning</em> as the umbrella term for the entire process. This choice is potentially confusing, as provisioning has traditionally referred to a specific sub step involving the delivery of configuration data or credentials. By elevating provisioning to describe the full lifecycle of initial security setup, these protocols blur the conceptual boundary between establishing trust and configuring operational parameters.</t>

<t>Thread uses the term <em>commissioning</em> to describe entire initial setup process. This term has possible roots in building automation and industrial control systems, where it implies a technician physically installing, verifying, and activating equipment. The choice of commissioning reflects Thread’s emphasis on local installation and user assisted setup within a constrained network environment.</t>

<t>The term <em>provisioning</em> exhibits the most severe semantic overloading across protocols. In Wi Fi DPP and Bluetooth Mesh, provisioning refers to the entire process of adding a device, including discovery, authentication, and key distribution. In Thread and OCF, provisioning is a more narrowly defined step that refers specifically to the delivery of credentials and security related information after authentication or ownership transfer. SZTP uses the term more loosely and often interchangeably with bootstrapping, further contributing to ambiguity.</t>

<t>The term <em>enrollment</em> is predominantly used in protocols that rely on X.509 certificates. EST and BRSKI use enrollment in its strict PKI sense, referring to the process by which a device obtains a certificate from a Certificate Authority. In contrast, Wi Fi DPP uses enrollment more informally to mean authorizing a device to join a network, largely detached from its PKI origins. SZTP uses enrollment in a completely different manner, referring to the device owner enrolling with the manufacturer, which reverses the more common direction of device enrolling into a network or domain.</t>

<t>While strict harmonization of terminology across diverse standards is impractical, this analysis reveals that much of the ambiguity arises when terms describing atomic actions, such as transferring credentials, are conflated with terms describing broader lifecycle phases, such as transitioning a device from a factory state to an operational state. To improve clarity, it is beneficial to adopt clear umbrella terms such as <em>onboarding</em> or <em>bootstrapping</em> to describe the comprehensive process. <em>Onboarding</em> is preferable when emphasizing ownership or administrative control transitions, as seen in OCF and FDO, while <em>bootstrapping</em> is more suitable for network centric state transitions, as in BRSKI and SZTP. Action oriented terms such as <em>provisioning</em> and <em>authentication</em> should be reserved for specific sub phases within the umbrella process. In particular, provisioning should ideally refer to the secure delivery of configuration data or credentials, rather than the entire initial security setup lifecycle.</t>

</section>
<section anchor="comp-players"><name>Comparison of players</name>

<t>The burden of initial security setup can never truly be eliminated; it is instead shifted between the entities involved. In some protocols, this burden is placed primarily on the user, for example by requiring QR code scanning or PIN entry, while in others it is placed on the manufacturer, for example by requiring the operation of online authorization services. In this section, we compare the protocols based on the players involved and the expectations placed upon them.</t>

<t>One important distinction lies in the role of the manufacturer. At one end of the spectrum are protocols with zero preconfiguration, such as EAP NOOB or Bluetooth Mesh using Just Works, which require minimal manufacturer involvement. These protocols do not demand preinstalled unique credentials or cryptographic secrets. Next are protocols such as Thread, Bluetooth Mesh, and Wi Fi DPP, where the manufacturer responsibility is largely limited to the factory. In these cases, the manufacturer must generate a unique identifier, such as an EUI 64, and provision a static bootstrapping secret or key, such as a PSKd or a bootstrapping public key. This information is typically made available physically on the device or its packaging, for example as a printed label or QR code. OCF similarly requires provisioning a unique device UUID and optionally a manufacturer certificate. Once the device leaves the factory, the manufacturer security role largely ends. At the other end of the spectrum are protocols that require sustained manufacturer involvement. BRSKI, SZTP, and FDO require manufacturers to install specific trust anchors and IEEE 802.1AR IDevID certificates and to operate high availability online services. In BRSKI, this role is fulfilled by the Manufacturer Authorized Signing Authority. In SZTP and FDO, manufacturers issue ownership vouchers and may also operate redirect or rendezvous services. These protocols further require manufacturers to track device serial numbers in order to validate ownership claims, introducing significant logistical and operational complexity.</t>

<t>The user or installer occupies very different positions across the protocols. User centric protocols require active participation, such as scanning QR codes, entering PINs, confirming device identity, or approving commissioning actions. This is common in Wi Fi DPP, Bluetooth Mesh, Thread, and OCF Just Works or Random PIN modes. In contrast, protocols designed for minimal or no user interaction at the device level, such BRSKI, SZTP, and FDO largely front load the user responsibilities to system preparation activities such as configuring backend services and defining policies, after which devices can complete the protocol without further user involvement.</t>

<t>Administrator responsibilities also vary significantly between protocols. Infrastructure centric protocols require the deployment and operation of specific components. BRSKI requires a Registrar and often an EST server. LwM2M requires a Bootstrap Server. FDO requires a Rendezvous Server and an onboarding service. For EAP NOOB, the administrator must configure the AAA infrastructure, such as RADIUS, to route the special NAI noob@eap-noob.arpa to the appropriate application server. In SZTP, the network must support specific DHCP options or DNS records to allow devices to discover bootstrap servers. In BRSKI, a Join Proxy is required to facilitate communication between an unauthenticated pledge and the registrar.</t>

<t>The relationship between owner, user, and administrator is not always clearly delineated. In a home network using Bluetooth Mesh or Thread, the owner, administrator, and user are often the same individual. In contrast, when BRSKI is used for large scale deployments such as ISP provided CPE, the administrator and owner may be the service provider, while the end user has little or no role in the onboarding process beyond physically connecting the device.</t>

<t>Another important dimension of comparison is whether a protocol relies primarily on local actors or remote infrastructure. Protocols such as Thread, Bluetooth Mesh, and Wi Fi DPP are largely local in nature and can operate without continuous Internet connectivity. Others, such as BRSKI, SZTP, EST, and FDO, introduce additional remote players operated by manufacturers or service providers, including certificate authorities, manufacturer authorization services, bootstrap servers, and rendezvous services. EAP NOOB also relies on a remote authentication server, although this server may be colocated with local infrastructure such as an access point. One advantage of EAP based approaches is that devices can communicate securely with remote servers before obtaining full IP connectivity, a capability that is inherent to EAP. A general trend across protocols is the gradual introduction of optional remote components even in traditionally local schemes, such as DPP over TCP or remote provisioning in Bluetooth Mesh, reflecting the practical benefits of centralizing logic and state in backend services.</t>

</section>
<section anchor="comp-beliefs"><name>Comparison of initial beliefs</name>

<t>Protocols can be grouped into four broad categories based on the type and strength of identity and credentials that are imparted to the device during manufacturing or prior to deployment. The choice of category has significant implications for supply chain complexity, user involvement, scalability, and achievable security properties.</t>

<t><list style="symbols">
  <t><strong>The Blank Slate (No Cryptographic Secrets)</strong>: In this category, devices are assumed to have no pre-installed cryptographic secrets or unique credentials. Trust is established entirely through user-assisted mechanisms. Examples include OCF Just Works, OCF Random PIN, and EAP-NOOB. Security in this category relies heavily on the user’s ability to correctly associate the physical device in their possession and complete the procedure securely (e.g. using Just Works in a physically secure environment).</t>
  <t><strong>Static Symmetric Secrets</strong>: These protocols assume that a shared secret or password is installed at manufacturing time. In Thread, the device holds a unique EUI-64 and a PSKd (Pre-Shared Key for Device). The trust model assumes that possession of the PSKd, typically obtained by reading a label or scanning a QR code, implies authorization to commission the device. In LwM2M Factory or Smartcard modes, a symmetric key known to both the device and the Bootstrap Server is used, enabling automated bootstrapping without direct user interaction.</t>
  <t><strong>Raw Asymmetric Keys</strong>: Devices in this category possess a unique asymmetric key pair but no certificate signed by a trusted authority. In Wi-Fi DPP, the device holds a bootstrapping key pair and the public key is encoded in a QR code or URI that is transferred to the configurator. Similar approaches are used in Bluetooth Mesh with Static OOB authentication and in LwM2M Raw Public Key (RPK) mode. In these protocols, knowledge of the device public key is sufficient to provision or onboard the device.</t>
  <t><strong>Certificates and Supporting Infrastructure</strong>: The most infrastructure-intensive category assumes that devices are provisioned during manufacturing with X.509 certificates and corresponding trust anchors. BRSKI, SZTP, FDO, EST, OCF in certificate-based modes, and Bluetooth Mesh v1.1 certificate provisioning fall into this category. In BRSKI, the device must possess an IEEE 802.1AR IDevID certificate and a trust anchor to verify vouchers issued by the Manufacturer Authorized Signing Authority (MASA). SZTP similarly assumes an IDevID and trust anchors for verifying manufacturer-signed ownership vouchers and bootstrap servers. FDO assumes a GUID, an attestation key pair, a hash of the manufacturer public key, rendezvous information, and a device-specific HMAC secret used to validate ownership vouchers. EST assumes an existing credential, commonly an IEEE 802.1AR certificate, to mutually authenticate the TLS session with the EST server. OCF certificate-based modes and Bluetooth Mesh v1.1 support optional manufacturer-installed certificates that enable automated device authentication during ownership transfer or provisioning.</t>
</list></t>

<t>The nature of the initial beliefs assumed on the devices by various protocols have other consequences worth considering:</t>

<t><list style="symbols">
  <t><strong>Privacy</strong>: Protocols that expose static identifiers can pose privacy risks. Bluetooth Mesh and Thread often advertise a Device UUID or EUI-64 in the clear during discovery, creating a persistent digital fingerprint that can be passively observed. EAP-NOOB includes a PeerInfo field, which may contain information such as MAC address or device make and model. However, this information is revealed only after the server responds to the initial generic identity noob@eap-noob.arpa, ensuring that disclosure occurs only to a server that actively participates in the EAP exchange rather than continuously via broadcast beacons. Another privacy consideration is protection from the device manufacturer. Vendor-mediated protocols such as FDO, SZTP, and BRSKI achieve convenience and minimal user interaction by requiring the device to contact a manufacturer-operated service such as a Rendezvous Server, MASA, or bootstrap server. As a result, the manufacturer or cloud provider can retain a permanent record of when and from which network a device is onboarded. The owner cannot install the device without the manufacturer becoming aware of its activation. In contrast, local sovereignty protocols operate entirely within the local deployment context and remain invisible to the manufacturer. A user can deploy a device in an isolated environment without the vendor ever learning that it was activated.</t>
  <t><strong>Vulnerability to label swapping</strong>: Protocols in the static symmetric secret and raw asymmetric key categories rely heavily on the physical integrity of device labels. If an attacker can photograph or copy a QR code in the supply chain or replace it with a malicious one, they may be able to claim the device as soon as it comes online or perform a man-in-the-middle attack. Damage to or loss of the label can also render a device unusable unless the manufacturer retains and can recover the associated public key. If the QR code is not attached to the device itself and the device is resold on a secondary market, the new owner may be unable to onboard it. In some ecosystems, devices cannot be transferred to a new owner without cooperation from the previous owner, leading to devices being resold but effectively unusable.</t>
  <t><strong>Raw public keys vs. certificates</strong>: Protocols based on raw public keys, such as Wi Fi DPP with Static OOB authentication, prevent passive eavesdropping but can be vulnerable to misbinding attacks <xref target="Sethi19"/>. An attacker can print a QR code containing their own public key and attach it to a different device. If the user scans this code, the protocol may complete successfully with an attacker controlled device. In contrast, certificate based approaches allow a device to cryptographically prove contextual information such as its manufacturer, model, or serial number, reducing the risk that initial security setup is completed with the wrong or malicious device. Both raw public keys and certificates introduce cost factors, since factory installed credentials require secure manufacturing processes to ensure that keys and certificates are generated, stored, and injected without leakage. While the use of certificates is becoming increasingly common and provides the additional benefit of signed contextual information, the complexity and cost of operating a public key infrastructure cannot always be ignored by manufacturers. Commercial private PKI services, such as those offered by cloud providers like Amazon Web Services (AWS), typically charge per issued certificate, which may be prohibitive for certain types of devices.</t>
</list></t>

</section>
<section anchor="comp-process"><name>Comparison of processes</name>

<t>All protocols solve the same sequence of problems: discovering a device or service endpoint, establishing initial trust, authorizing the device for a specific domain or owner, and delivering the credentials and configuration required for operational use. The protocols differ primarily in where these steps occur, who participates in them, and how much user involvement is required.</t>

<t>A first distinguishing factor is <strong>discovery</strong>. Local and user centric protocols such as Bluetooth Mesh, Thread, and Wi Fi DPP rely on link local discovery mechanisms, including beaconing, active scanning, or out-of-band identifiers such as QR codes or NFC. In these protocols, discovery is tightly coupled to physical proximity and user intent. In contrast, infrastructure centric protocols such as SZTP, BRSKI, FDO, and LwM2M rely on network based discovery mechanisms. Devices locate bootstrap services using DHCP options, DNS records, well known URLs, or rendezvous services. EAP NOOB occupies a hybrid position, where the device uses a well-known identity to trigger bootstrapping with any network willing to route EAP exchange.</t>

<t>The <strong>establishment of initial trust</strong> is another major point of divergence. User assisted protocols typically rely on out-of-band mechanisms such as PINs, QR codes, shared secrets, or visual confirmation to authenticate the first exchange. Examples include Thread PSKd entry, Bluetooth Mesh OOB authentication, Wi-Fi DPP QR code scanning, and OCF Random PIN. These approaches trade automation for user visibility and local control. Infrastructure centric protocols instead rely on manufacturer installed credentials and third-party validation. In BRSKI, the device presents an IDevID certificate and receives a voucher validated by the manufacturer. In SZTP and FDO, ownership vouchers and manufacturer signatures play a similar role. EST assumes the existence of a credential that allows immediate mutual authentication with a server. In these protocols, trust is anchored in a PKI or manufacturer operated service rather than in user mediated actions.</t>

<t>Protocols also differ in <strong>where authorization decisions are made</strong>. In network centric schemes such as Thread, Bluetooth Mesh, and DPP, authorization is implicit in possession of shared credentials or group membership. Once a device demonstrates knowledge of the appropriate key material, it is accepted as part of the network. In contrast, owner centric protocols such as FDO, OCF, and LwM2M explicitly model ownership and administrative domains. Authorization involves verifying ownership artifacts, registering devices with backend services, or associating them with specific management endpoints. BRSKI similarly requires explicit authorization through voucher validation, binding the device to a specific domain before it is allowed to enroll for credentials.</t>

<t>The <strong>delivery of credentials and configuration</strong> also varies in scope and timing. Some protocols deliver only the minimum information required for secure communication, such as a network key or access credential, leaving higher level configuration to later stages. Thread and Bluetooth Mesh are examples of this approach. Other protocols deliver a richer set of information during onboarding itself. SZTP may deliver boot images, configuration files, and scripts. FDO, OCF, and LwM2M provision management service endpoints, access control parameters, and long-term credentials as part of the onboarding flow. In these protocols, initial security setup is tightly coupled with lifecycle management.</t>

<t>Finally, the protocols differ in their <strong>support for repetition, reset, and ownership transfer</strong>. Some protocols treat onboarding as a one time event, with reset and reprovisioning possible but not explicitly modeled. Thread and Bluetooth Mesh fall largely into this category. Others explicitly design for reuse and transfer. FDO and OCF include mechanisms to update internal credentials and ownership state, enabling resale or reassignment without manufacturer involvement. These differences have significant implications for device longevity, secondary markets, and operational flexibility.</t>

</section>
<section anchor="comp-impart"><name>Comparison of knowledge imparted to the device</name>

<t>Although all surveyed protocols aim to securely transition a device into an operational state, they differ significantly in what beliefs are imparted to the device once the protocol has completed. These post execution beliefs define not only how the device authenticates and communicates afterwards, but also how it interprets authority, ownership, and its position within a broader administrative or security domain.</t>

<t><list style="symbols">
  <t><strong>Network centric</strong>: Protocols focused primarily on connectivity impart, at minimum, the cryptographic material required to communicate at the data link or network layer. The device learns how to communicate securely with its neighbors, but not necessarily who manages it or what its long term application behavior should be. For example, Thread imparts the Thread Network Key along with network parameters such as PAN ID and channel, and provides addressing information including ML EID and RLOC, enabling the device to participate in IPv6 routing. Bluetooth Mesh similarly imparts a Network Key and a unicast address, allowing the device to encrypt and authenticate mesh traffic. Wi Fi DPP imparts a Connector, a signed credential containing a group identifier and a network access key, and also provisions the configurator public signing key, which functions as a trust anchor for verifying other network participants. In these protocols, trust is implicitly placed in peers that demonstrate possession of the same credentials. They generally do not encode an explicit concept of ownership, and authorization is derived from membership in a network or group. Bluetooth Mesh partially blurs this boundary by also provisioning Application Keys and a Device Key, enabling continued security provisioning and application level protection beyond basic network access.</t>
  <t><strong>Infrastructure centric</strong>: Protocols in this category focus on imparting trust anchors and embedding the device into a public key infrastructure domain. Examples include BRSKI, EST, and SZTP. These protocols impart the belief that the device is now a member of a specific PKI domain and that trust relationships are mediated through certificates and certificate authorities. After execution, the device typically holds a locally issued certificate, trust anchors for the domain, and in some cases vouchers or ownership related artifacts that bind its identity to the domain. Authorization decisions are derived from PKI membership and policy rather than from direct user interaction or shared secrets. SZTP goes further than most by also imparting onboarding information that can include boot images, configuration scripts, and software updates. In this case, the knowledge imparted to the device is not limited to credentials, but can extend to defining the complete executable and operational personality of the device.</t>
  <t><strong>Service centric</strong>: Protocols such as FDO, OCF, LwM2M, and EAP NOOB impart the belief that the device belongs to a specific owner or administrative entity and should report to a specific service endpoint. Upon completion, the device holds an Owner Credential or ownership related trust anchor that cryptographically binds it to an owner or management domain. This belief is stronger and more persistent than simple network membership and enables fine grained authorization, delegation, and lifecycle management. Rather than binding the device solely to a network, these protocols bind it to a logical service or platform. Crucially, they impart service knowledge: the device completes the protocol knowing exactly which URL or service endpoint to contact for configuration, credential updates, software updates, and access control decisions. In protocols such as OCF and FDO, the device is explicitly provisioned with the identities and endpoints of management services, including Credential Management Services and Access Management Services. The device therefore believes not only who owns it, but also where to obtain policies, credentials, and updates throughout its operational lifetime.</t>
</list></t>

<t>The extent to which a device is prepared for reuse and ownership transfer also varies significantly across protocols. Protocols such as FDO and OCF explicitly update internal state and credentials to support future resale or re-execution of the protocol for initial security setup, imparting the belief that ownership and trust relationships are mutable over time. By contrast, Thread and Bluetooth Mesh generally treat commissioning as a one time event, with reset and reprovisioning possible but not explicitly modeled as ownership transitions. A particularly challenging case arises in protocols that rely on physical labels. If possession of a label or QR code is sufficient to claim a device, then an unauthorized individual with temporary access to the device or its packaging may be able to take control of it. In other cases, a device reset may not be sufficient to make the device reusable until the previous owner explicitly removes it from their management system. These differences have significant implications for secondary markets, device longevity, and long term sustainability.</t>

</section>
<section anchor="other-observations"><name>Other observations</name>

<t>TODO Discuss several protocols require temporary connectivity via border router authenticator etc. Even DPP and Bluetooth support provisioner not in radio coverage</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of each protocol is present in the respective specifications.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2904">
  <front>
    <title>AAA Authorization Framework</title>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="L. Gommans" initials="L." surname="Gommans"/>
    <author fullname="G. Gross" initials="G." surname="Gross"/>
    <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
    <author fullname="C. de Laat" initials="C." surname="de Laat"/>
    <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
    <author fullname="D. Spence" initials="D." surname="Spence"/>
    <date month="August" year="2000"/>
    <abstract>
      <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2904"/>
  <seriesInfo name="DOI" value="10.17487/RFC2904"/>
</reference>

<reference anchor="RFC5272">
  <front>
    <title>Certificate Management over CMS (CMC)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
      <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
      <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
      <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5272"/>
  <seriesInfo name="DOI" value="10.17487/RFC5272"/>
</reference>

<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC7228">
  <front>
    <title>Terminology for Constrained-Node Networks</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="M. Ersue" initials="M." surname="Ersue"/>
    <author fullname="A. Keranen" initials="A." surname="Keranen"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7228"/>
  <seriesInfo name="DOI" value="10.17487/RFC7228"/>
</reference>

<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC7616">
  <front>
    <title>HTTP Digest Access Authentication</title>
    <author fullname="R. Shekh-Yusef" initials="R." role="editor" surname="Shekh-Yusef"/>
    <author fullname="D. Ahrens" initials="D." surname="Ahrens"/>
    <author fullname="S. Bremer" initials="S." surname="Bremer"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) provides a simple challenge- response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7616"/>
  <seriesInfo name="DOI" value="10.17487/RFC7616"/>
</reference>

<reference anchor="RFC7617">
  <front>
    <title>The 'Basic' HTTP Authentication Scheme</title>
    <author fullname="J. Reschke" initials="J." surname="Reschke"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document defines the "Basic" Hypertext Transfer Protocol (HTTP) authentication scheme, which transmits credentials as user-id/ password pairs, encoded using Base64.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7617"/>
  <seriesInfo name="DOI" value="10.17487/RFC7617"/>
</reference>

<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>

<reference anchor="RFC8366">
  <front>
    <title>A Voucher Artifact for Bootstrapping Protocols</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8366"/>
  <seriesInfo name="DOI" value="10.17487/RFC8366"/>
</reference>

<reference anchor="RFC8572">
  <front>
    <title>Secure Zero Touch Provisioning (SZTP)</title>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="I. Farrer" initials="I." surname="Farrer"/>
    <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8572"/>
  <seriesInfo name="DOI" value="10.17487/RFC8572"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC8995">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="RFC9112">
  <front>
    <title>HTTP/1.1</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
      <t>This document obsoletes portions of RFC 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="99"/>
  <seriesInfo name="RFC" value="9112"/>
  <seriesInfo name="DOI" value="10.17487/RFC9112"/>
</reference>

<reference anchor="RFC9140">
  <front>
    <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
    <author fullname="T. Aura" initials="T." surname="Aura"/>
    <author fullname="M. Sethi" initials="M." surname="Sethi"/>
    <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9140"/>
  <seriesInfo name="DOI" value="10.17487/RFC9140"/>
</reference>

<reference anchor="RFC9148">
  <front>
    <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
    <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Raza" initials="S." surname="Raza"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9148"/>
  <seriesInfo name="DOI" value="10.17487/RFC9148"/>
</reference>


<reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
  <front>
    <title>Wi-Fi Simple Configuration</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Version" value="2.0.7"/>
</reference>
<reference anchor="Sethi19" target="https://doi.org/10.1145/3321705.3329813">
  <front>
    <title>Misbinding Attacks on Secure Device Pairing and Bootstrapping</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
    </author>
    <author initials="A." surname="Peltonen" fullname="Aleksi Peltonen">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2019" month="July"/>
  </front>
  <seriesInfo name="Proceedings" value="of the 2019 ACM Asia Conference on Computer and Communications Security (AsiaCCS '19), pp. 453-464, Auckland, New Zealand"/>
</reference>
<reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
  <front>
    <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
    </author>
    <author initials="E." surname="Oat" fullname="Elena Oat">
      <organization>Aalto University</organization>
    </author>
    <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2014" month="September"/>
  </front>
  <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
</reference>
<reference anchor="dpp" target="https://www.wi-fi.org/wi-fi-download/35330">
  <front>
    <title>Wi-Fi Easy Connect Specification</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Wi-Fi Alliance" value="Version 3.0"/>
</reference>
<reference anchor="bt-mesh" target="https://www.bluetooth.com/wp-content/uploads/Files/Specification/HTML/MshPRT_v1.1/out/en/index-en.html">
  <front>
    <title>Mesh Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
  <seriesInfo name="v1.1" value=""/>
</reference>
<reference anchor="oma" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Core-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Core</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="oma-transport" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Transport-V1_2_1-20221209-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Transport Bindings</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2022" month="December"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2.1"/>
</reference>
<reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification.pdf">
  <front>
    <title>OCF Security Specification</title>
    <author >
      <organization>Open Connectivity Foundation</organization>
    </author>
    <date year="2022" month="October"/>
  </front>
  <seriesInfo name="Version" value="2.2.6"/>
</reference>
<reference anchor="ieee8021ar" target="https://1.ieee802.org/security/802-1ar/">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="threadcommissioning" target="https://www.threadgroup.org/ThreadSpec">
  <front>
    <title>Thread Specification</title>
    <author >
      <organization>Thread Group</organization>
    </author>
    <date year="2024"/>
  </front>
  <seriesInfo name="Version: 1.4.0" value=""/>
</reference>
<reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification</title>
    <author >
      <organization>Fast Identity Online Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
  <seriesInfo name="Fido Alliance" value="Version: 1.1"/>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

