Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

News and Announcements

NIST News and Announcements

  •  

Related Information:

  • R. L. Kelly, “Text - H.R.1668 - 116th Congress (2019-2020): IoT Cybersecurity Improvement Act of 2020,” 04-Dec-2020. [Online]. Available: https://www.congress.gov/bill/116th-congress/house-bill/1668/text. [Accessed: 08-Dec-2020]

  • D. Montgomery et al., “Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)” [Online]. Available: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/iot-ddos-nist-sp1800-15-draft.pd

  • “Project Connected Home over IP,” Project Connected Home over IP. [Online]. Available: https://www.connectedhomeip.com. [Accessed: 29-Sep-2020]

  • S. Pal, M. Hitchens, and V. Varadharajan, “Modeling Identity for the Internet of Things: Survey, Classification and Trends,” in 2018 12th International Conference on Sensing Technology (ICST), 2018, pp. 45–51, doi: 10.1109/ICSensT.2018.8603595.

  • A. R. R. Shaikh and S. Devane, “Verification of security properties of payment protocol using AVISPA,” in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, pp. 1–6, doi: 10.1109/ICITST.2009.5402598.

  • M. Malik, M. Dutta, and J. Granjal, “A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things,” IEEE Access, vol. 7, pp. 27443–27464, 2019, doi: 10.1109/ACCESS.2019.2900957.

  • S. L. Keoh, S. S. Kumar, and H. Tschofenig, “Securing the Internet of Things: A Standardization Perspective,” IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265–275, Jun. 2014, doi: 10.1109/JIOT.2014.2323395.

  • H. H. Gharakheili, A. Sivanathan, A. Hamza, and V. Sivaraman, “Network-Level Security for the Internet of Things: Opportunities and Challenges,” Computer, vol. 52, no. 8, pp. 58–62, Aug. 2019, doi: 10.1109/MC.2019.2917972.

  • “802.1AR: Secure Device Identity |.” [Online]. Available: https://1.ieee802.org/security/802-1ar/. [Accessed: 30-Jun-2019]

  • “IoT Onboarding - the challenges and solutions to onboarding IoT devices,” TechSee, 16-Oct-2018. [Online]. Available: https://techsee.me/blog/iot-onboarding/. [Accessed: 27-Jun-2019]

  • “Manufacturer Usage Description (MUD) - Cisco DevNet.” [Online]. Available: https://developer.cisco.com/site/mud/. [Accessed: 28-Aug-2018]

Created April 6, 2020, Updated April 5, 2022