Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

News and Announcements

NIST News and Announcements

  •  

Related Information:

  • R. L. Kelly, “Text - H.R.1668 - 116th Congress (2019-2020): IoT Cybersecurity Improvement Act of 2020,” 04-Dec-2020. [Online]. Available: https://www.congress.gov/bill/116th-congress/house-bill/1668/text. [Accessed: 08-Dec-2020]

  • D. Montgomery et al., “Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)” [Online]. Available: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/iot-ddos-nist-sp1800-15-draft.pd

  • “Project Connected Home over IP,” Project Connected Home over IP. [Online]. Available: https://www.connectedhomeip.com. [Accessed: 29-Sep-2020]

  • S. Pal, M. Hitchens, and V. Varadharajan, “Modeling Identity for the Internet of Things: Survey, Classification and Trends,” in 2018 12th International Conference on Sensing Technology (ICST), 2018, pp. 45–51, doi: 10.1109/ICSensT.2018.8603595.

  • A. R. R. Shaikh and S. Devane, “Verification of security properties of payment protocol using AVISPA,” in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, pp. 1–6, doi: 10.1109/ICITST.2009.5402598.

  • M. Malik, M. Dutta, and J. Granjal, “A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things,” IEEE Access, vol. 7, pp. 27443–27464, 2019, doi: 10.1109/ACCESS.2019.2900957.

  • S. L. Keoh, S. S. Kumar, and H. Tschofenig, “Securing the Internet of Things: A Standardization Perspective,” IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265–275, Jun. 2014, doi: 10.1109/JIOT.2014.2323395.

  • H. H. Gharakheili, A. Sivanathan, A. Hamza, and V. Sivaraman, “Network-Level Security for the Internet of Things: Opportunities and Challenges,” Computer, vol. 52, no. 8, pp. 58–62, Aug. 2019, doi: 10.1109/MC.2019.2917972.

  • “802.1AR: Secure Device Identity |.” [Online]. Available: https://1.ieee802.org/security/802-1ar/. [Accessed: 30-Jun-2019]

  • “IoT Onboarding - the challenges and solutions to onboarding IoT devices,” TechSee, 16-Oct-2018. [Online]. Available: https://techsee.me/blog/iot-onboarding/. [Accessed: 27-Jun-2019]

  • “Manufacturer Usage Description (MUD) - Cisco DevNet.” [Online]. Available: https://developer.cisco.com/site/mud/. [Accessed: 28-Aug-2018]

Created April 6, 2020, Updated April 5, 2022
Was this page helpful?