Difference between revisions of "FIDO Device Onboarding"

From MgmtWiki
Jump to: navigation, search
(Solutions)
 
Line 10: Line 10:
  
 
==Solutions==
 
==Solutions==
WiFi networks should be configured with a password that must be entered to gain access to the home network.<ref>Geoffrey H. Cooper, ''Device On-boarding Using FDO and the Untrusted Installer Model'' '''CACM 67''' No 4, (2024-94) p 38ff.</ref> This is typically achieved by give the local network owner an app that runs on the owner's [[Smartphone]] or local network controller there requires the owner to enter a network access password.  The owner must then guard the security and availability of this password.
+
WiFi networks should be configured with a password that must be entered to gain access to the home network.<ref>Geoffrey H. Cooper, ''Device On-boarding Using FDO and the Untrusted Installer Model'' '''CACM 67''' No 4, (2024-04) p 38ff.</ref> This is typically achieved by give the local network owner an app that runs on the owner's [[Smartphone]] or local network controller there requires the owner to enter a network access password.  The owner must then guard the security and availability of this password.
  
 
==References==
 
==References==

Latest revision as of 21:09, 13 March 2025

Full Title or Meme

FDO is an attempt to make Internet of Things and other small autonomous devices secure when attached to the Internet.

Context

https://www.linkedin.com/posts/dave-hedge_coolstuff-industrialautomation-itotconvergence-activity-7122572917627920384-xlKz?utm_source=share&utm_medium=member_android

Problems

An attacker can enter the home and attached a device (like a camera) to the local (WiFi) network and then send images to an spy network.

Solutions

WiFi networks should be configured with a password that must be entered to gain access to the home network.[1] This is typically achieved by give the local network owner an app that runs on the owner's Smartphone or local network controller there requires the owner to enter a network access password. The owner must then guard the security and availability of this password.

References

  1. Geoffrey H. Cooper, Device On-boarding Using FDO and the Untrusted Installer Model CACM 67 No 4, (2024-04) p 38ff.