Difference between revisions of "FIDO Device Onboarding"
From MgmtWiki
| (3 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
| − | + | FDO is an attempt to make [[Internet of Things]] and other small autonomous devices secure when attached to the Internet. | |
| + | |||
| + | ==Context== | ||
| + | |||
| + | https://www.linkedin.com/posts/dave-hedge_coolstuff-industrialautomation-itotconvergence-activity-7122572917627920384-xlKz?utm_source=share&utm_medium=member_android | ||
| + | |||
| + | ==Problems== | ||
| + | An attacker can enter the home and attached a device (like a camera) to the local (WiFi) network and then send images to an spy network. | ||
| + | |||
| + | ==Solutions== | ||
| + | WiFi networks should be configured with a password that must be entered to gain access to the home network.<ref>Geoffrey H. Cooper, ''Device On-boarding Using FDO and the Untrusted Installer Model'' '''CACM 67''' No 4, (2024-04) p 38ff.</ref> This is typically achieved by give the local network owner an app that runs on the owner's [[Smartphone]] or local network controller there requires the owner to enter a network access password. The owner must then guard the security and availability of this password. | ||
==References== | ==References== | ||
Latest revision as of 21:09, 13 March 2025
Full Title or Meme
FDO is an attempt to make Internet of Things and other small autonomous devices secure when attached to the Internet.
Context
Problems
An attacker can enter the home and attached a device (like a camera) to the local (WiFi) network and then send images to an spy network.
Solutions
WiFi networks should be configured with a password that must be entered to gain access to the home network.[1] This is typically achieved by give the local network owner an app that runs on the owner's Smartphone or local network controller there requires the owner to enter a network access password. The owner must then guard the security and availability of this password.
References
- ↑ Geoffrey H. Cooper, Device On-boarding Using FDO and the Untrusted Installer Model CACM 67 No 4, (2024-04) p 38ff.