<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.6 (Ruby 2.7.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-t2trg-secure-bootstrapping-03" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>

    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
      <address>
        <postal>
          <city>Espoo</city>
          <region></region>
          <code>02150</code>
          <country>Finland</country>
        </postal>
        <email>mohit@iki.fi</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Denpel Informatique</organization>
      <address>
        <postal>
          <street></street> <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country></country>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <street></street>
          <city>Oviedo</city>
          <region></region>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>

    <date year="2022" month="November" day="26"/>

    
    
    

    <abstract>


<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completetion, and the knowledge imparted to the IoT devices after the setup is complete.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Initial security setup for a device refers to any process that takes place before a device can become operational. The phrase "initial security setup" intentionally includes the term "security" as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, configuration of necessary credentials and parameters.</t>

<t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by <xref target="Sethi14">Sethi et al.</xref> while developing a solution for smart displays.</t>

<t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passpharse before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with initial security setup of devices and excludes any discussion on setting up networks.</t>

<t>There are several terms that are used in the context of initial security setup of devices:</t>

<t><list style="symbols">
  <t>Bootstrapping</t>
  <t>Provisioning</t>
  <t>Onboarding</t>
  <t>Enrollment</t>
  <t>Commissioning</t>
  <t>Initialization</t>
  <t>Configuration</t>
  <t>Registration</t>
  <t>Discovery</t>
</list></t>

<t>In addition to using a variety of different terms, initial security setup mechanisms can rely on a number of entities. For example, a companion smartphone device maybe necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverese initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>

<t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>

<t><list style="symbols">
  <t>Terminology used</t>
  <t>Entities or "players" involved</t>
  <t>Initial assumptions about the device</t>
  <t>Processes necessary for completetion</t>
  <t>Knowledge imparted to the device after completion</t>
</list></t>

</section>
<section anchor="usage"><name>Standards and Protocols</name>

<section anchor="device-provisioning-protocol-dpp"><name>Device Provisioning Protocol (DPP)</name>

<t>The Wi-Fi Alliance Device provisioning protocol (DPP) <xref target="dpp"/> describes itself as a standardized protocol for providing user friendly Wi-Fi setup while maintaining or increasing the security. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the network. DPP has the following three phases/sub-protocols:</t>

<t><list style="symbols">
  <t>Bootstrapping: The configurator obtains bootstrapping information from the enrollee using an out-of-band channel such as scanning a QR code or tapping NFC. The bootstrapping information includes the public-key of the device and metadata such as the radio channel on which the device is listening.</t>
  <t>Authentication: In DPP, either the configurator or the enrollee can initiate the authentication protocol. The side initiating the authentication protocol is called as the initiator while the other side is called the responder. The authentication sub-protocol provides authentication of the responder to an initiator. It can optionally authenticate the initiator to the responder (only if the bootstrapping information was exchange out-of-band in both directions).</t>
  <t>Configuration: Using the key established from the authentication protocol, the enrollee asks the configurator for network information such as the SSID and passphrase of the access point.</t>
</list></t>

<t>DPP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, discovery, enrollment, provisioning.</t>
  <t>Players: Authenticator, Client, Configurator, Device, Initiator, Manufacturer, Owner, Peer, Persona, Responder, User, Enrollee</t>
  <t>Initial beliefs assumed in the device: There are two entities involved in the DPP protocol, the Initiator and Responder. These entities as a starting point do not have a trust relation, nor do they share credentials or key material. DPP uses a decentralized architecture with no central authority to coordinate or control authentication and rely on a direct trust model. In DPP, authentication does not rely on a pre-existing trust relation with a third-party or centralized entity, hence all entities involved in DPP need to perform the required validation.</t>
  <t>Processes: Bootstrapping, authentication,  provisioning, and network access.
Bootstrapping: To establish a secure provisioning connection, the devices exchange public bootstrapping keys.
Authentication: To establish trust and build a secure channel, the devices employ the DPP Authentication protocol's bootstrapping keys.
Configuration: The Configurator uses the DPP Configuration protocol to provision the Enrollee through the secure channel created during DPP Authentication.
Network access: The Enrollee establishes network access using the newly provisioned credentials.</t>
  <t>Beliefs imparted to the device after protocol execution: DPP bootstrapping relies on the transfer of the public-key that is expected to be trusted. The beliefs when mutual authentication is run, relies on the trust of a succesfull DPP bootstrapping. When mutual authentication is not supported, a device that can control when and how its own public key is bootstrapped, can peform a weak authentication to any entity that knows its public key.</t>
</list></t>

</section>
<section anchor="open-mobile-alliance-oma-lightweight-m2m-lwm2m"><name>Open Mobile Alliance (OMA) Lightweight M2M (LwM2M)</name>

<t>The OMA LwM2M specification <xref target="oma"/> defines an architecture where a new device (LwM2M client) contacts a Bootstrap-server which is responsible for provisioning essential information such as credentials. After receiving this essential information, the LwM2M client device registers itself with one or more LwM2M Servers which will manage the device during its lifecycle. The current standard defines the following four bootstrapping modes:</t>

<t><list style="symbols">
  <t>Factory Bootstrap: An IoT device in this case is configured with all the necessary bootstrap information during manufacturing and prior to its deployment.</t>
  <t>Bootstrap from Smartcard: An IoT device retrieves and processes all the necessary bootstrap data from a Smartcard.</t>
  <t>Client Initiated Bootstrap: This mode provides a mechanism for an IoT client device to retrieve the bootstrap information from a Bootstrap Server. This requires the client device to have an account at the Bootstrap Server and credentials to obtain the necessary information securely.</t>
  <t>Server Initiated Bootstrap: In this bootstrapping mode, the bootstrapping server configures all the bootstrap information on the IoT device without receiving a request from the client. This means that the bootstrap server
needs to know if a client IoT Device is ready for bootstrapping before it can be configured. For example, a network may inform the bootstrap server of a new connecting IoT client device.</t>
</list></t>

<t>OMA has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, intialization, configuration, registration.</t>
  <t>Players: Bootstrap Server, Client, Device, Manufacturer, Owner, Server, User</t>
  <t>Initial beliefs assumed in the device: The client has as a starting point, the necessary informaiton to trust the LwM2M in the bootstrapping process and later the registration . The client has all the necesary to either get the bootstrap information, from the factory bootstrap (pre-installed), a smartcard, or it has key material to establish a secure communication (DTLS/OSCORE) with the LwM2M bootstrap-server and perform the bootstrapping.</t>
  <t>Processes: Factory Bootstrap, Bootstrap from Smartcard, Client Initiated Bootstrap and Server Initiated Bootstrap.</t>
  <t>Beliefs imparted to the device after protocol execution: After the bootstrapping is performed, the LwM2M client can register with the LwM2M servers.</t>
</list></t>

</section>
<section anchor="open-connectivity-foundation-ocf"><name>Open Connectivity Foundation (OCF)</name>

<t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the process before a device is operational as onboarding.  The first step of this onboarding process is configuring the ownership, i.e., establishing a legitimate user that owns the device. For this, the user is supposed to use an Onboarding tool (OBT) and an Owner Transfer Method (OTM).</t>

<t>The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc. OCF lists several optional OTMs. At the end of the execution of an OTM, the onboarding tool must have provisioned an Owner Credential onto the device. The following owner transfer methods are specified:</t>

<t><list style="symbols">
  <t>Just works: Performs an un-authenticated Diffie-Hellman key exchange over Datagram Transport Layer Security (DTLS). The key exchange results in a symmetric session key which is later used for provisioning. Naturally, this mode is vulnerable to on-path attackers.</t>
  <t>Random PIN: The device generates a PIN code that is entered into the onboarding tool by the user. This pin code is used together with TLS-PSK ciphersuites for establishing a symmetric session key. OCF recommends PIN codes to have an entropy of 40 bits.</t>
  <t>Manufacturer certificate: An onboarding tool authenticates the device by verifying a manufacturer installed certificate. Similarly, the device may authenticate the onboarding tool by verifying its signature.</t>
  <t>Vendor specific: Vendors implement their own transfer method that accommodates any specific device constraints.</t>
</list></t>

<t>Once the onboarding tool and the new device have authenticated and established secure communication, the onboarding tool provisions/configures the device with Owner credentials. Owner credentials may consist of certificates, shared keys, or Kerberos tickets for example.</t>

<t>The OBT additionally configures/provisions information about the Access Management Service (AMS), the Credential Management  Service (CMS), and the credentials for interacting with them. The AMS is responsible for provisioning access control entries, while the CMS provisions security credentials necessary for device operation.</t>

<t>OCF has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, enrollment, onboarding, provisioning, registration,</t>
  <t>Players: Client, Device, Manager, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: The device needs to be associated with an owner in the onboarding process and then go through the provisioning process before being considered as trustworty.</t>
  <t>Processes: Onboarding, provisioning.</t>
  <t>Beliefs imparted to the device after protocol execution: In the provisioning phase the device receives the necessary credentials to interact with provisioning services and any other services or devices that are part of the normal operation of the device.</t>
</list></t>

</section>
<section anchor="bluetooth"><name>Bluetooth</name>

<t>Bluetooth mesh specifies a provisioning protocol.  The goal of the provisioning phase is to securely incorporate a new Bluetooth mesh node, by completing two critical tasks. First, to authenticate the unprovisioned device and second, to create a secure link with said device to share information.</t>

<t>The provisioning process is divided into five distinct stages summarize next:</t>

<t><list style="symbols">
  <t>Beaconing for discover: The new unprovisioned device is discovered by the provisioner</t>
  <t>Negotiation: The unprovisioned device indicates to the provisioner a set of capabilities such as the security algorithms supported, the availability of its public key using an Out-of-Band (OOB) channel and the input/output interfaces supported</t>
  <t>Public-key exchange: The authentication method is selected by the provisioner and both devices exchange Elliptic-curve Diffie–Hellman (ECDH) public keys. These keys may be static or ephemeral. Their exchange can be done in two ways, either via Out-of-Band or directly through a Bluetooth link. Each device then generates a symmetric key, named ECDHSecret, by combining its own private key and the public key of the peer device. The EDCHSecret is used to protect communication between the two devices.</t>
  <t>Authentication: During this phase, the ECDH key exchange is authenticated. The authentication method can be Output OOB, Input OOB, static OOB, or No OOB. With Output OOB, the unprovisioned device chooses a random number and outputs that number in manner consistent with its capabilities. The provisioner then inputs this number. Then, a check confirmation value operation is performed. This involves a cryptographic exchange regarding (in this case) the random number to complete the authentication. With Input OOB, the roles are reversed, being the provisioner the entity that generates the random number. When neither of the previous authentication procedures are feasible, both the provisioner and unprovisioned device generate a random number and require the user supervising the setup to verify that values on the device and provisioner are the same.</t>
  <t>Distribution of provisioning data: At this point, the provisioning process can be protected. This involves the distribution of data such as a Network key, to secure the communications at network layer and a unicast address among other information.</t>
</list></t>

<t>Bluetooth mesh has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Configuration, discovery, provisioning.</t>
  <t>Players: Client, Device, Manager, Manufacturer, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: Previously to the provisioning phase, there is no pre-shared credentials for a trust relation.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: After the provisiong, the device trusts the provisioner entity and any other device in the network sharing its network key.</t>
</list></t>

</section>
<section anchor="fast-identity-online-fido-alliance"><name>Fast IDentity Online (FIDO) alliance</name>

<t>The Fast IDentity Online Alliance (FIDO) is currently specifying an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecycle. The draft specification refers to this feature as "late binding".</t>

<t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as "out-of-scope" but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC9112"/> proxies for IP networks and other forms of tunnelling for non-IP networks.</t>

<t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called as GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>

<t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should used.</t>

<t>FIDO has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, onboarding, commissioning, initialisation.</t>
  <t>Players: Device, Manager, Manufacturer, Owner, Rendezvous Server,  User</t>
  <t>Initial beliefs assumed in the device: In the initial state the device is not yet associated with a specific owner. The DI process has to take place to embed owndership and manufacturing credentials in the device, the first in a chaim to create an ownership voucher that will be used to perform the transfer of ownership of the device.</t>
  <t>Processes: Device Initialize Protocol (DI), Transfer Ownership Protocol 0 (TO0), Transfer Ownership Protocol 1 (TO1), Transfer Ownership Protocol 2 (TO2)</t>
  <t>Beliefs imparted to the device after protocol execution: When the device is powered on, and all TO protocols run, the device figures out by contacting with the rendezvous server, who the owner is, authenticate with the owner. At this point the rendezvous server, and owner are able to authenticate the device.</t>
</list></t>

</section>
<section anchor="enrollment-over-secure-transport-est"><name>Enrollment over Secure Transport (EST)</name>

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="RFC9148"/>. EST assumes that some initial information is already distributed so that EST client and servers can perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines "Bootstrap Distribution of CA Certificates" which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate "fingerprint" received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>

<t>EST has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, enrollment, initialization, configuration.</t>
  <t>Players: Administrator, Client, Device, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: There is a process of distribution of initial information which provides both the EST client and server with the information for the EST client and server to perform mutual authentication as well as for authorization.</t>
  <t>Processes: Distribution of Certificates, Bootstrap, Enrollment</t>
  <t>Beliefs imparted to the device after protocol execution: The EST enrollment process is designed to make establishing automated certificate issuing from a trustworthy CA as simple as possible. After the processe have finished, the device is able to automatically renew its certificates through re-enrollment as it has a trust relation with the ESP server.</t>
</list></t>

</section>
<section anchor="bootstrapping-remote-secure-key-infrastructures-brski"><name>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</name>

<t>The ANIMA working group is working on a bootstrapping solution for devices that relies on 802.1AR vendor certificates called Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/>. In addition to vendor installed IEEE 802.1AR certificates, a vendor based service on the Internet is required. Before being authenticated, a new device only needs link-local connectivity, and does not require a routable address. When a vendor provides an Internet based service, devices can be forced to join only specific domains. The document highlights that the described solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. It claims to scale to thousands of devices located in hostile environments, such as ISP provided CPE devices which are drop-shipped to the end user.</t>

<t>BRSKI has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, enrollment, onboarding.</t>
  <t>Players: Administrator, Client, Cloud Registrar, Configurator, Device, Domain Registrar, Initiator, Join Proxy, JRC, Manufacturer, Owner, Peer, Pledge, Server, User</t>
  <t>Initial beliefs assumed in the device: Every device has an IDevID, installed and signed by the manufacturer, which is used as a basis for establihsing further trust relations. In the initial stage, when the device is deployed in a specific location it cannot securely comunicate with the registrar or JRC, to be integrated into the network, so  the device and the registrar need to establish mutual trust.</t>
  <t>Processes: Discover, self-Identify, joint registrar, imprint registrar, enroll.</t>
  <t>Beliefs imparted to the device after protocol execution: After the process has finished and the device is imprinted, and trusts the registrar/JRC, through a voucer issued by the manufaturer and verified by the device.</t>
</list></t>

</section>
<section anchor="secure-zero-touch-provisioning-sztp"><name>Secure Zero Touch Provisioning (SZTP)</name>

<t><xref target="RFC8572"/> defines a bootstrapping strategy for enabling devices to securely obtain all the configuration information with no installer input, beyond the actual physical placement and connection of cables. Their goal is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment specific network management system (NMS). This bootstrapping method requires the devices to be configured with trust anchors in the form of X.509 certificates. <xref target="RFC8572"/> is similar to BRSKI based on <xref target="RFC8366"/>.</t>

<t>SZTP has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, provisioning, onboarding, enrollment, configuration, discovery.</t>
  <t>Players: Administrator, Bootstrap Server, Client, Device, Manufacturer, Onboarding Server, Owner, Redirect Server, Bootstrap Server, User, Owner</t>
  <t>Initial beliefs assumed in the device: Initially, the device needs have pre-configured a state that allows allows the bootstrap processs. Among other information, the turst anchor for ownership voucher, client &amp; intermediaries certificates, and list of trusted bootstrap servers and their trust anchors.</t>
  <t>Processes: Initial state, Boot sequence, Processing bootstrapping data, validating signed data, procesing redirect information, procesing onboarding information.</t>
  <t>Beliefs imparted to the device after protocol execution: The bootstrapping process provides the device with all the necessary information (onboarding information) to create a trust relation between the device and the bootstrap server. This allows the device to download its boot image and the necessary initial configuration. The enrollment information will allow a device to be bootstrapped and operate establishing secure connections with other systems.</t>
</list></t>

</section>
<section anchor="nimble-out-of-band-authentication-for-eap-eap-noob"><name>Nimble out-of-band authentication for EAP (EAP-NOOB)</name>

<t>EAP-NOOB <xref target="RFC9140"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the server and peer. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server. This method claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels. The exact in-band messages and OOB message contents are specified and not the OOB channel details. EAP-NOOB also supports IoT devices with only output (e.g. display) or only input (e.g. camera). It makes combined use of both secrecy and integrity of the OOB channel for more robust security than the ad-hoc solutions.</t>

<t>EAP-NOOB has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Bootstrapping, configuration, registration.</t>
  <t>Players: Administrator, Authenticator, Client, Device, Manufacturer, Owner, Peer, Server, User</t>
  <t>Initial beliefs assumed in the device: The device does not have to have pre-installed credentails as in onther EAP methods.</t>
  <t>Processes: This EAP exchange is encompassed by Initial Exchange, OOB step, Completion Exchange and Waiting Exchange.</t>
  <t>Beliefs imparted to the device after protocol execution: After EAP-NOOB is run, the device is able to trust the EAP server and the EAP authenticator by extension.</t>
</list></t>

</section>
<section anchor="lpwan"><name>LPWAN</name>

<t>Low Power Wide Area Network (LPWAN) encompasses a wide variety of technologies whose link-layer characteristics are severely constrained in comparison to other typical IoT link-layer technologies such as Bluetooth or IEEE 802.15.4. While some LPWAN technologies rely on proprietary bootstrapping solutions which are not publicly accessible, others simply ignore the challenge of bootstrapping and key distribution. In this section, we discuss the bootstrapping methods used by LPWAN technologies covered in <xref target="RFC8376"/>.</t>

<t><list style="symbols">
  <t>LoRaWAN <xref target="LoRaWAN"/> describes its own protocol to authenticate nodes before allowing them join a LoRaWAN network. This process is called as joining and it is based on pre-shared keys (called AppKeys in the standard). The joining procedure comprises only one exchange (join-request and join-accept) between the joining node and the network server. There are several adaptations to this joining procedure that allow network servers to delegate authentication and authorization to a backend AAA infrastructure <xref target="RFC2904"/>.</t>
  <t>Wi-SUN Alliance Field Area Network (FAN) uses IEEE 802.1X and EAP-TLS for network access authentication. It performs a 4-way handshake to establish a session keys after EAP-TLS authentication.</t>
  <t>NB-IoT relies on the traditional 3GPP mutual authentication scheme based on a shared-secret in the Subscriber Identity Module (SIM) of the device and the mobile operator.</t>
  <t>Sigfox security is based on unique device identifiers and cryptographic keys. As stated in <xref target="RFC8376"/>, although the algorithms and keying details are not publicly available, there is sufficient information to indicate that bootstrapping in Sigfox is based on pre-established credentials between the device and the Sigfox network.</t>
</list></t>

<t>From the above, it is clear that all LPWAN technologies rely on pre-provisioned credentials for authentication between a new device and the network.</t>

<t>LPWAN has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Provisioning, configuration, discovery.</t>
  <t>Players: Administrator, Authenticator, Border Router, Client, Device, Manager, Network Server, User</t>
  <t>Initial beliefs assumed in the device: The device normally has credentials that are used to directly secure the communications or to dervice key material to do so. There is a basic trust in the network server.</t>
  <t>Processes: Provisioning</t>
  <t>Beliefs imparted to the device after protocol execution: Either because of an authentication process that results in newly derived key material or the pre-provisioned key material is used, the device is able to exchange information securerly through the network server.</t>
</list></t>

</section>
<section anchor="thread"><name>Thread</name>

<t>Thread Group commissioning <xref target="threadcommissioning"/> introduces a two phased process i.e. Petitioning and Joining. Entities involved are leader, joiner, commissioner, joiner router, and border router. Leader is the first device in Thread network that must be commissioned using out-of-band process and is used to inject correct user generated Commissioning Credentials (can be changed later) into Thread Network. Joiner is the node that intends to get authenticated and authorized on Thread Network. Commissioner is either within the Thread Network (Native) or connected with Thread Network via a WLAN (External).</t>

<t>Under some topologies, Joiner Router and Border Router facilitate the Joiner node to reach Native and External Commissioner, respectively. Petitioning begins before Joining process and is used to grant sole commissioning authority to a Commissioner. After an authorized Commissioner is designated, eligible thread devices can join network. Pair-wise key is shared between Commissioner and Joiner, network parameters (such as network name, security policy, etc.,) are sent out securely (using pair-wise key) by Joiner Router to Joiner for letting Joiner to join the Thread Network. Entities involved in Joining process depends on system topology i.e. location of Commissioner and Joiner. Thread networks only operate using IPv6. Thread devices can devise GUAs (Global Unicast Addresses) <xref target="RFC4291"/>. Provision also exist via Border Router, for Thread device to acquire individual global address by means of DHCPv6 or using SLAAC (Stateless Address Autoconfiguration) address derived with advertised network prefix.</t>

<t>Thread has the following characteristics:</t>

<t><list style="symbols">
  <t>Terms: Commissioning, discovery, provisioning.</t>
  <t>Players: Administrator, Border Agent, Border Router, Commissioner, Commissioner Candidate, Configurator, Device, End Device, End Device, Endpoint Identifier, Initiator, Joiner, Joiner Router, Owner, Peer, Responder, Server, User</t>
  <t>Initial beliefs assumed in the device: The joiner needs to share credentials with an entity that belongs to the Thread network, prior to the authentication process.</t>
  <t>Processes: Petitioning, Joining</t>
  <t>Beliefs imparted to the device after protocol execution: Once the authentication takes place, a trust relation is established between the Joiner and the Commissioner it receives the network parameters needed to be attached to the Thread network.</t>
</list></t>

</section>
</section>
<section anchor="comp"><name>Comparison</name>

<t>There are several stages before a device becomes fully operational. There is typically a stage where some sort of credential is installed. The nature or purpose of this credential can be varied, form being part of the IoT device authentication, to a credential from a 3rd trusted party, be it the manufacturer or the onwer. Solution differ on this inital process, and in some cases this can even be done in an out-of-band fashion.</t>

<t>After some initial credential is installed, there is a process that typically involves authentication establishing initial trust, after which  credentials and/or parameters are configured or installed into the device.</t>

<t>Finally, when the entities involed in the process are authenticated and the configuration and key material established, the normal operation of the IoT device can take place.</t>

<section anchor="comp-term"><name>Comparison of terminology</name>

<t>The specifics of every term varies depending on the technology, but we enumerate here the basic terminology and what it means for the different solutions.</t>

<t><list style="symbols">
  <t>Bootstrapping:
  <list style="symbols">
      <t>DPP: Client obtains the Controller’s public bootstrapping key and IP address</t>
      <t>OMA: An IoT device retrieves and processes all the bootstrap data</t>
      <t>EST: installation of the Explicit TA database</t>
      <t>BRSKI: A protocol to obtain a local trust anchor.</t>
      <t>SZTP: The process by which obtains "bootstrapping data" such as conveyed information, owner certificate and owner voucher.</t>
      <t>EAP-NOOB: For an IoT device to be registered, authenticated, authorized and for it to derive key material to act as a trustworty entity in the security domain where it is deployed.</t>
    </list></t>
  <t>configuration:
  <list style="symbols">
      <t>DPP: The process performed by a Configurator by which the Enrollee is provisioned.</t>
      <t>OMA: Adding or removing an LwM2M Server Account to or from the LwM2M Client configuration.</t>
      <t>OCF: The necessary information the Device must hold to be considered as ready for normal operation.</t>
      <t>EST: The basic information (e.g., TA database) needed to initiate protocol operation.</t>
      <t>SZTP: The system configuration  to be installed into the device by the bootstrapping process.</t>
      <t>EAP-NOOB: Establishing  necesary information for the device to operate.</t>
      <t>LPWAN: In LoRaWAN, the information ralated to the working of the device and protocol.</t>
    </list></t>
  <t>discovery:
  <list style="symbols">
      <t>DPP: Exchange that allows obtainig specific information such as SSID, operating chanel and band.</t>
      <t>OCF: Making the differnt resources availabe through URIs.</t>
      <t>BRSKI: Locating an entity that needs to take part of the bootstrapping process (e.g., Join proxy)</t>
    </list></t>
  <t>enrollment:
  <list style="symbols">
      <t>EST: The process of obtaining the credentails needed to perform the device normal operation.</t>
      <t>BRSKI: Same process describe as EST.</t>
      <t>SZTP: The process of an owner joining a manufacturer's SZTP program.</t>
    </list></t>
  <t>provisioning:
  <list style="symbols">
      <t>DPP: Securely enabling a device to establish secure associations with other devices in a network.</t>
      <t>OMA: Establishing security credentials and access control lists by a dedicated LwM2M bootstrap-server.</t>
      <t>OCF: A set of processes that take place both during and after the ownership transfer. These entail configuration of credentials, and security-related resources for any services or devices that the provisioned device needs to interact with in the future.</t>
      <t>Bluetooth: The procedure by which a device is authenticated, and a secure link is established, becoming a trustworty node in the network.</t>
      <t>FIDO: Same as FIDO onboarding.</t>
      <t>SZTP: The set of steps that take place to enable a device to establish secure connections with other systems.</t>
      <t>LPWAN: In LoRaWAN, the establishment of configuration data and credentials.</t>
    </list></t>
  <t>intialization:
  <list style="symbols">
      <t>OMA: When Bootstrap-Delete operation is used, to restore a device.</t>
      <t>FIDO: Protoclol (DI), esablishing basic information at manufacture.</t>
    </list></t>
  <t>registration:
  <list style="symbols">
      <t>OMA: Establishing a registration session, which is an association between the client and the server.</t>
      <t>EAP-NOOB: Add information about an IoT device in a server database.</t>
    </list></t>
  <t>onboarding:
  <list style="symbols">
      <t>OCF:  The device is considered to complete the onboarding after the ownership of the Device has been transferred and the Device provisioned.</t>
      <t>FIDO: The procedure of installing configuration information and secretto a device so that it may safely connect to and communicate with an IoT platform.</t>
      <t>SZTP: information related to the boot image a device must be running, an initial configuration the device must commit, and scripts that the device must successfully execute.</t>
    </list></t>
  <t>commissioning:
  <list style="symbols">
      <t>Thread: The process of a Thread device joining a Thread network.</t>
    </list></t>
  <t>imprint:
  <list style="symbols">
      <t>BRSKI: The process by which a device obtains the needed information to act as trustworty entity witin the network or domain</t>
    </list></t>
</list></t>

</section>
<section anchor="comp-players"><name>Comparison of players</name>

<t>In this section we classify the different players.</t>

<t>Human User: user</t>

<t>Device that intends to securely join a network: pledge, device, client, peer, persona, enrollee, candidate</t>

<t>Entity that makes the device: Manufacturer</t>

<t>Entity that owns the device: owner, manager</t>

<t>Entity with which the device establishes a connection: IoT platform, Rendezvous Server, Server,</t>

<t>Entity that aids in  the process: Join Proxy, Bootstrap Server, Onboarding Server, Border Router</t>

<t>Person that manages a deployment or system: Administrator</t>

<t>Entity that steers the process for the IoT device to securely join the network: Configurator, Bootstrap Server, Rendezvous Server, JRC, Onboarding/Redirect Server, Commisioner.</t>

<t>External or third-party entity that intervenes in the process:  Registrar, MASA</t>

</section>
<section anchor="comp-beliefs"><name>Comparison of initial beliefs</name>

<t>The IoT devices may have different initial beliefs depending on the credentials pre-installed, during the manufaturing process or prior to being turned on. There are cases where the initial credentials that need to be shared to establish basic trust, or they are exchanged during one of the procedures after the device is turned on, not installed during manufacturing.</t>

<section anchor="no-initial-trust-established"><name>No initial trust established</name>

<t>EAP-NOOB does not require intitial configuration of credentials to establish trust, since its done using the out-of-band process.</t>

<t>The OCF device starts as unowned. It has to perform an ownership transfer, to establish basic trust to peform onboarding and  provisioning. Depending on the Owener Transfer Mode (OTM) it can be considered to have not initial trust based on the credentials installed.</t>

<t>Bluetooth devices start as unprovisioned. Inital trust is established as a consequence of exchanging public keys and performing the authentication. If the public keys are ephemeral, there is no inital credential establishment.</t>

</section>
<section anchor="initial-trust-based-on-the-credentials-installed"><name>Initial trust based on the credentials installed</name>

<t>These credentials may very from the time of installing, and the entity to which it related. In this sense, they could be from the  manufacturer, onwer or other entity.</t>

<t>FIDO devices have installed during the manufacturing process a set of ownership credentials (i.e., ownership voucher) and additional information to determine the current owner of the device. Hence, there is an initial trust from the IoT device and the onwer. With this basic setup, and and the cooperation among device, owner and rendezvous server, the onboarding process can take place.</t>

<t>EST devices are configured with the needed information to peform mutual authentication and for authorization between the EST client and server.</t>

<t>BRSKI have manufacturer-installed certificates as starting point to establish trust.</t>

<t>SZTP have pre-configured initial state which provides the basis for trust.</t>

<t>LPWAN specifics depends on the technology, but they all have in common some pre-installed credentails that allows the establishment of trust and to secure the communications.</t>

<t>Thread devices, share credentials aswell to establish trust.</t>

<t>OMA devices can have all the necessary information to start working on the network where they are deployed, if they have the factory bootstrap, hence all needed credentials to establish trust. There need to be installed some basic credentials to establish trust with the bootstrap-server and perform the bootstrapping.</t>

<t>DPP initial trust is established during the bootstrapping where the public key is transmitted.</t>

</section>
</section>
<section anchor="comp-process"><name>Comparison of processes</name>

<t>Analysing the different terms used over the different solutions reviewed in this document, we can identify several processes. These are named differently in some cases, and not every technologies consideres them all as part of their the following common concepts:</t>

<t><list style="symbols">
  <t>To refer to the process previous to the device being turned on, in which some information, or credentials are installed into the device. This process is commonly referred to as manufacture. Is in this phase where the IoT devices have installed the needed information (specifics depend on the technology) to provide the basis for trust and to authenticate other entities.</t>
  <t>To refer to the process after the device is turned on and intends to locate the entity with which it has to communicate to start the authentication process to be integrated into the security domain. Here is where the device start the process to get to perform its normal operation.</t>
  <t>To the process by which the device obtains additional credentials, in addition to what it already had installed before being turned on.</t>
  <t>To the process by which the device is authenticated and established a trust relation.</t>
</list></t>

</section>
<section anchor="comp-impart"><name>Comparison of knowledge imparted to the device</name>

<t>Even though the devices might start from a different place, in terms of initial credentals as basis for trust, when they finish their processes, they become trusted parties within the domain they are deployed or at least have a trust relation with a specific entity. The difference may strive in the number of trust relations are stablished during the process, as they may have not only established a trust relation with local entities where they perform their operation, but other external entities as well.</t>

<t>In FIDO, once the onboarding process has taken place, the IoT device is mutually authenticated with the current owner, and the needed secrets and configuration data is installed into the device, which as a result is able to connect and interact securely with the target IoT platform.</t>

<t>In EAP-NOOB, once the bootstrapping is completed, the IoT device not only has a turst relation with the EAP server, but the EAP authenticator can be established aswell, based on the shared credentials that are derived during the authentication process.</t>

<t>In Bluetooth the trust is expanded to the local network as there is key material shared among the different entities of the network.</t>

<t>In Thread once the joiner has succesfully completed the process, it can communicate directly with all Thread devices in the network.</t>

<t>LPWAN has a more limited scope and they usually have specific keys for applications and network communications.</t>

<t>EST provides the devices with the enrollment information such as certificates and symmetric keys that can be used to establish trust with different peers.</t>

<t>BRSKI after running it is able to verify that the communicating entities are who they claim to be, and obtain domain specific certificates to act as trustworty entities within the domain.</t>

<t>SZTP after running, the device has obtained onboarding information and is equiped to establish secure connections with other systems.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of bootstrapping protocols are present in the respective specifications.</t>

<t>Nonetheless, we briefly discuss some important security aspects which are not fully explored in various specifications.</t>

<t>Firstly, an IoT system may deal with authorization for resources and services separately from initial security setup in terms of timing as well as protocols. As an example, two resource-constrained devices A and B may perform mutual authentication using credentials provided by an offline third-party X before device A obtains authorization for running a particular application on device B from an online third-party Y. In some cases, authentication and authorization maybe tightly coupled, e.g., successful authentication also means successful authorization.</t>

<t>Secondly, initial security setup of IoT devices may be necessary several times during the device lifecycle since keys have limited lifetimes and devices may be lost or resold. Protocols and systems must have adequate provisions for revocation and fresh security setup. A rerun of the security setup mechanism must be as secure as the initial security setup regardless of whether it is done manually or automatically over the network.</t>

<t>Lastly, some IoT networks use a common group key for multicast and broadcast traffic. As the number of devices in a network increase over time, a common group key may not be scalable and the same network may need to be split into separate groups with different keys. Bootstrapping and provisioning protocols may need appropriate mechanisms for identifying and distributing keys to the current member devices of each group.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC2904' target='https://www.rfc-editor.org/info/rfc2904'>
<front>
<title>AAA Authorization Framework</title>
<author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'><organization/></author>
<author fullname='P. Calhoun' initials='P.' surname='Calhoun'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='L. Gommans' initials='L.' surname='Gommans'><organization/></author>
<author fullname='G. Gross' initials='G.' surname='Gross'><organization/></author>
<author fullname='B. de Bruijn' initials='B.' surname='de Bruijn'><organization/></author>
<author fullname='C. de Laat' initials='C.' surname='de Laat'><organization/></author>
<author fullname='M. Holdrege' initials='M.' surname='Holdrege'><organization/></author>
<author fullname='D. Spence' initials='D.' surname='Spence'><organization/></author>
<date month='August' year='2000'/>
<abstract><t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS).  It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2904'/>
<seriesInfo name='DOI' value='10.17487/RFC2904'/>
</reference>



<reference anchor='RFC4291' target='https://www.rfc-editor.org/info/rfc4291'>
<front>
<title>IP Version 6 Addressing Architecture</title>
<author fullname='R. Hinden' initials='R.' surname='Hinden'><organization/></author>
<author fullname='S. Deering' initials='S.' surname='Deering'><organization/></author>
<date month='February' year='2006'/>
<abstract><t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t><t>This document obsoletes RFC 3513, &quot;IP Version 6 Addressing Architecture&quot;.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4291'/>
<seriesInfo name='DOI' value='10.17487/RFC4291'/>
</reference>



<reference anchor='RFC3748' target='https://www.rfc-editor.org/info/rfc3748'>
<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='L. Blunk' initials='L.' surname='Blunk'><organization/></author>
<author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'><organization/></author>
<author fullname='J. Carlson' initials='J.' surname='Carlson'><organization/></author>
<author fullname='H. Levkowetz' initials='H.' role='editor' surname='Levkowetz'><organization/></author>
<date month='June' year='2004'/>
<abstract><t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3748'/>
<seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>



<reference anchor='RFC3971' target='https://www.rfc-editor.org/info/rfc3971'>
<front>
<title>SEcure Neighbor Discovery (SEND)</title>
<author fullname='J. Arkko' initials='J.' role='editor' surname='Arkko'><organization/></author>
<author fullname='J. Kempf' initials='J.' surname='Kempf'><organization/></author>
<author fullname='B. Zill' initials='B.' surname='Zill'><organization/></author>
<author fullname='P. Nikander' initials='P.' surname='Nikander'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors.  If not secured, NDP is vulnerable to various attacks.  This document specifies security mechanisms for NDP.  Unlike those in the original NDP specifications, these mechanisms do not use IPsec.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3971'/>
<seriesInfo name='DOI' value='10.17487/RFC3971'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC4120' target='https://www.rfc-editor.org/info/rfc4120'>
<front>
<title>The Kerberos Network Authentication Service (V5)</title>
<author fullname='C. Neuman' initials='C.' surname='Neuman'><organization/></author>
<author fullname='T. Yu' initials='T.' surname='Yu'><organization/></author>
<author fullname='S. Hartman' initials='S.' surname='Hartman'><organization/></author>
<author fullname='K. Raeburn' initials='K.' surname='Raeburn'><organization/></author>
<date month='July' year='2005'/>
<abstract><t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510.  This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4120'/>
<seriesInfo name='DOI' value='10.17487/RFC4120'/>
</reference>



<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
<front>
<title>The Secure Shell (SSH) Transport Layer Protocol</title>
<author fullname='T. Ylonen' initials='T.' surname='Ylonen'><organization/></author>
<author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t><t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP.  The protocol can be used as a basis for a number of secure network services.  It provides strong encryption, server authentication, and integrity protection.  It may also provide compression.</t><t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t><t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4253'/>
<seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>



<reference anchor='RFC4764' target='https://www.rfc-editor.org/info/rfc4764'>
<front>
<title>The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method</title>
<author fullname='F. Bersani' initials='F.' surname='Bersani'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='January' year='2007'/>
<abstract><t>This document specifies EAP-PSK, an Extensible Authentication Protocol (EAP) method for mutual authentication and session key derivation using a Pre-Shared Key (PSK).  EAP-PSK provides a protected communication channel when mutual authentication is successful for both parties to communicate over.  This document describes the use of this channel only for protected exchange of result indications, but future EAP-PSK extensions may use the channel for other purposes.  EAP-PSK is designed for authentication over insecure networks such as IEEE 802.11.  This memo defines an Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4764'/>
<seriesInfo name='DOI' value='10.17487/RFC4764'/>
</reference>



<reference anchor='RFC5191' target='https://www.rfc-editor.org/info/rfc5191'>
<front>
<title>Protocol for Carrying Authentication for Network Access (PANA)</title>
<author fullname='D. Forsberg' initials='D.' surname='Forsberg'><organization/></author>
<author fullname='Y. Ohba' initials='Y.' role='editor' surname='Ohba'><organization/></author>
<author fullname='B. Patil' initials='B.' surname='Patil'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='A. Yegin' initials='A.' surname='Yegin'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document defines the Protocol for Carrying Authentication for Network Access (PANA), a network-layer transport for Extensible Authentication Protocol (EAP) to enable network access authentication between clients and access networks.  In EAP terms, PANA is a UDP-based EAP lower layer that runs between the EAP peer and the EAP authenticator.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5191'/>
<seriesInfo name='DOI' value='10.17487/RFC5191'/>
</reference>



<reference anchor='RFC5272' target='https://www.rfc-editor.org/info/rfc5272'>
<front>
<title>Certificate Management over CMS (CMC)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='M. Myers' initials='M.' surname='Myers'><organization/></author>
<date month='June' year='2008'/>
<abstract><t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t><t>1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t><t>2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t><t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5272'/>
<seriesInfo name='DOI' value='10.17487/RFC5272'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC7030' target='https://www.rfc-editor.org/info/rfc7030'>
<front>
<title>Enrollment over Secure Transport</title>
<author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'><organization/></author>
<author fullname='P. Yee' initials='P.' role='editor' surname='Yee'><organization/></author>
<author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t></abstract>
</front>
<seriesInfo name='RFC' value='7030'/>
<seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>



<reference anchor='RFC7228' target='https://www.rfc-editor.org/info/rfc7228'>
<front>
<title>Terminology for Constrained-Node Networks</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='M. Ersue' initials='M.' surname='Ersue'><organization/></author>
<author fullname='A. Keranen' initials='A.' surname='Keranen'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7228'/>
<seriesInfo name='DOI' value='10.17487/RFC7228'/>
</reference>



<reference anchor='RFC7250' target='https://www.rfc-editor.org/info/rfc7250'>
<front>
<title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author fullname='P. Wouters' initials='P.' role='editor' surname='Wouters'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='J. Gilmore' initials='J.' surname='Gilmore'><organization/></author>
<author fullname='S. Weiler' initials='S.' surname='Weiler'><organization/></author>
<author fullname='T. Kivinen' initials='T.' surname='Kivinen'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).  The new certificate type allows raw public keys to be used for authentication.</t></abstract>
</front>
<seriesInfo name='RFC' value='7250'/>
<seriesInfo name='DOI' value='10.17487/RFC7250'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC7593' target='https://www.rfc-editor.org/info/rfc7593'>
<front>
<title>The eduroam Architecture for Network Roaming</title>
<author fullname='K. Wierenga' initials='K.' surname='Wierenga'><organization/></author>
<author fullname='S. Winter' initials='S.' surname='Winter'><organization/></author>
<author fullname='T. Wolniewicz' initials='T.' surname='Wolniewicz'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia.  The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access.  The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document.  In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t></abstract>
</front>
<seriesInfo name='RFC' value='7593'/>
<seriesInfo name='DOI' value='10.17487/RFC7593'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8366' target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor='RFC8376' target='https://www.rfc-editor.org/info/rfc8376'>
<front>
<title>Low-Power Wide Area Network (LPWAN) Overview</title>
<author fullname='S. Farrell' initials='S.' role='editor' surname='Farrell'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8376'/>
<seriesInfo name='DOI' value='10.17487/RFC8376'/>
</reference>



<reference anchor='RFC8572' target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='I. Farrer' initials='I.' surname='Farrer'><organization/></author>
<author fullname='M. Abrahamsson' initials='M.' surname='Abrahamsson'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC8995' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>


<reference anchor='I-D.ietf-ace-wg-coap-eap'>
   <front>
      <title>EAP-based Authentication Service for CoAP</title>
      <author fullname='Rafael Marin-Lopez' initials='R.' surname='Marin-Lopez'>
         <organization>University of Murcia</organization>
      </author>
      <author fullname='Dan Garcia-Carrillo' initials='D.' surname='Garcia-Carrillo'>
         <organization>University of Oviedo</organization>
      </author>
      <date day='23' month='June' year='2022'/>
      <abstract>
	 <t>   This document specifies an authentication service that uses the
   Extensible Authentication Protocol (EAP) transported employing
   Constrained Application Protocol (CoAP) messages.  As such, it
   defines an EAP lower layer based on CoAP called CoAP-EAP.  One of the
   main goals is to authenticate a CoAP-enabled IoT device (EAP peer)
   that intends to join a security domain managed by a Controller (EAP
   authenticator).  Secondly, it allows deriving key material to protect
   CoAP messages exchanged between them based on Object Security for
   Constrained RESTful Environments (OSCORE), enable the establishment
   of a security association between them.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ace-wg-coap-eap-08'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-ace-wg-coap-eap-08.txt' type='TXT'/>
</reference>



<reference anchor='RFC9112' target='https://www.rfc-editor.org/info/rfc9112'>
<front>
<title>HTTP/1.1</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='M. Nottingham' initials='M.' role='editor' surname='Nottingham'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2022'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns. </t><t>This document obsoletes portions of RFC 7230.</t></abstract>
</front>
<seriesInfo name='STD' value='99'/>
<seriesInfo name='RFC' value='9112'/>
<seriesInfo name='DOI' value='10.17487/RFC9112'/>
</reference>



<reference anchor='RFC9140' target='https://www.rfc-editor.org/info/rfc9140'>
<front>
<title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<author fullname='M. Sethi' initials='M.' surname='Sethi'><organization/></author>
<author fullname='A. Peltonen' initials='A.' surname='Peltonen'><organization/></author>
<date month='December' year='2021'/>
<abstract><t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t></abstract>
</front>
<seriesInfo name='RFC' value='9140'/>
<seriesInfo name='DOI' value='10.17487/RFC9140'/>
</reference>



<reference anchor='RFC9190' target='https://www.rfc-editor.org/info/rfc9190'>
<front>
<title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
<author fullname='J. Preuß Mattsson' initials='J.' surname='Preuß Mattsson'><organization/></author>
<author fullname='M. Sethi' initials='M.' surname='Sethi'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t></abstract>
</front>
<seriesInfo name='RFC' value='9190'/>
<seriesInfo name='DOI' value='10.17487/RFC9190'/>
</reference>



<reference anchor='RFC9148' target='https://www.rfc-editor.org/info/rfc9148'>
<front>
<title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
<author fullname='P. van der Stok' initials='P.' surname='van der Stok'><organization/></author>
<author fullname='P. Kampanakis' initials='P.' surname='Kampanakis'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='S. Raza' initials='S.' surname='Raza'><organization/></author>
<date month='April' year='2022'/>
<abstract><t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t></abstract>
</front>
<seriesInfo name='RFC' value='9148'/>
<seriesInfo name='DOI' value='10.17487/RFC9148'/>
</reference>


<reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
  <front>
    <title>Wi-Fi Simple Configuration</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Version" value="2.0.7"/>
</reference>
<reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
  <front>
    <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Ericsson</organization>
    </author>
    <author initials="E." surname="Oat" fullname="Elena Oat">
      <organization>Aalto University</organization>
    </author>
    <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
      <organization>Aalto University</organization>
    </author>
    <author initials="T." surname="Aura" fullname="Tuomas Aura">
      <organization>Aalto University</organization>
    </author>
    <date year="2014" month="September"/>
  </front>
  <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
</reference>
<reference anchor="dpp" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Easy_Connect_Specification_v2.0.pdf">
  <front>
    <title>Wi-Fi Device Provisioning Protocol (DPP)</title>
    <author >
      <organization>Wi-Fi Alliance</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Wi-Fi Alliance" value="Specification version 1.1"/>
</reference>
<reference anchor="IEEE802.15.4" target="http://standards.ieee.org/findstds/standard/802.15.4-2015.html">
  <front>
    <title>IEEE Standard for Low-Rate Wireless Networks</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
  <seriesInfo name="IEEE Std." value="802.15.4-2015"/>
</reference>
<reference anchor="LoRaWAN" target="https://lora-alliance.org/resource_hub/lorawan-specification-v1-1/">
  <front>
    <title>LoRa Specification V1.1</title>
    <author >
      <organization>LoRa Alliance</organization>
    </author>
    <date year="2017" month="October"/>
  </front>
  <seriesInfo name="LoRa Alliance" value="Version: 1.1"/>
</reference>
<reference anchor="vendorcert" >
  <front>
    <title>Standard for local and metropolitan area networks - secure device identity</title>
    <author >
      <organization>IEEE std. 802.1ar-2009</organization>
    </author>
    <date year="2009" month="December"/>
  </front>
</reference>
<reference anchor="oma" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.pdf">
  <front>
    <title>Lightweight Machine to Machine Technical Specification: Core</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date year="2020" month="November"/>
  </front>
  <seriesInfo name="Approved Version" value="1.2"/>
</reference>
<reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification_v2.2.2.pdf">
  <front>
    <title>OCF Security Specification</title>
    <author >
      <organization>Open Connectivity Foundation</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="Version" value="2.2.2"/>
</reference>
<reference anchor="threadcommissioning" >
  <front>
    <title>Thread Commissioning</title>
    <author >
      <organization>Thread Group</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification</title>
    <author >
      <organization>Fast Identity Online Alliance</organization>
    </author>
    <date year="2021" month="March"/>
  </front>
  <seriesInfo name="Fido Alliance" value="Version: 1.0"/>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

