This paper provides background information on trusted IoT device network-layer onboarding and lifecycle management. It defines a taxonomy of onboarding characteristics that will enable stakeholders to have a common language to describe and express their onboarding capabilities and fully capture the elements required to characterize potential onboarding solutions in protocol and product-agnostic terms. It also presents a proposed set of security considerations for network-layer onboarding.
We define network-layer onboarding of an IoT device as the provisioning of network credentials to that device at the time of the device’s deployment on a network. The trusted aspect of network-layer onboarding indicates that the device is provided with unique network credentials after the device and the network have had the opportunity to authenticate each other and establish an encrypted channel without user knowledge of the credentials, thereby mitigating unauthorized credential disclosure.
The benefits of a using a trusted network-layer onboarding mechanism are that it helps:
- prevent unauthorized devices from connecting to the network
- protect devices from being taken over by unauthorized networks