2021
DOI: 10.17487/rfc8995
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping Remote Secure Key Infrastructure (BRSKI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…For example, how to securely provision a time source is an open issue. The latest available relevant standards, such as BRSKI, allow IoT devices to ignore the certificate validity periods during initial authentication if the device has not yet been given a reliable current time [25]. In the following, we assume that the deployment-specific bootstrapping issues have been solved.…”
Section: Deployment and Initial Enrollmentmentioning
confidence: 99%
“…For example, how to securely provision a time source is an open issue. The latest available relevant standards, such as BRSKI, allow IoT devices to ignore the certificate validity periods during initial authentication if the device has not yet been given a reliable current time [25]. In the following, we assume that the deployment-specific bootstrapping issues have been solved.…”
Section: Deployment and Initial Enrollmentmentioning
confidence: 99%
“…With the goal of radically simplifying the deployment of HTTPS in the web context, the Automatic Certificate Management Environment (ACME), specified in IETF RFC 8555 [39], describes a protocol by which an applicant can obtain a signed certificate from a CA. The Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol, specified in IETF RFC 8995 [35], provides a solution for the automated bootstrapping of a remote secure key infrastructure of new (unconfigured) devices using manufacturer-installed X.509 certificates.…”
Section: Approaches Presented In Standards Predominantly Originating ...mentioning
confidence: 99%
“…[22,23] PROFINET 1st IEC Spec. [22,23] TAMP draft [24] Certificate and CRL Profile RFC [12] CMC RFC [19] OPC UA Part 2: Security, V1.01 [25] IEEE 802.1AR 1st [26] TAMP RFC [24] EST draft [27] Fischer et al [28] Fernbach et al [29] Hausmann et al [30] OCSP Stapling Draft [31] OCSP RFC [15] OCSP Stapling RFC [31] EST RFC [27] Kim et al [32] Falk et al [33] Runde et al [34] BRSKI draft [35] OPC UA Part 12: GDS, V1.03 [36] CIP Security [37] OPC UA Part 2: Security, V1.03 [38] ACME draft [39] EALS draft [40] Karthikeyan et al [41] Duan et al [42] OPC UA Part 12: GDS, V1.04 [43] IEC/IEEE 60802 draft 0.0 [44] IEEE 802.1AR 2nd [26] Danilchenko et al [45] ACME RFC [39] Höglund et al [46] Boudagdigue et al [47] Park et al [48] SCEP RFC [17] Kulik et al [49] Yunakovsky et al [50] Astorga et al [11] Kohnhauser et al [51] PROFINET IEC Spec. 2.4MU2 [52] BRSKI RFC […”
Section: Approaches Presented In Standards Predominantly Originating ...mentioning
confidence: 99%
“…A method for efficient and regular distribution of new keys is discussed by Gunleifsen et al [16]. Protocols like BRSKI [29] may also be used for key and certificate distribution.…”
Section: A Assumptionsmentioning
confidence: 99%