2019
DOI: 10.17487/rfc8520
|View full text |Cite
|
Sign up to set email alerts
|

Manufacturer Usage Description Specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
143
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 144 publications
(144 citation statements)
references
References 0 publications
0
143
0
1
Order By: Relevance
“…For this reason, the MUD standard could be considered as a relevant effort to define the devices' intended behavior during the manufacturing phase. The aim of the MUD standard [2] is to reduce the attack surface of a certain specific-purpose device by delegating the task of creating a behavioral profile to the manufacturers rather than a network administrator. Some examples of these restrictions could be "allow communications between devices of the same manufacturer" or "deny the access to a specific service though a specific port".…”
Section: Motivation Challenges and Proposed Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…For this reason, the MUD standard could be considered as a relevant effort to define the devices' intended behavior during the manufacturing phase. The aim of the MUD standard [2] is to reduce the attack surface of a certain specific-purpose device by delegating the task of creating a behavioral profile to the manufacturers rather than a network administrator. Some examples of these restrictions could be "allow communications between devices of the same manufacturer" or "deny the access to a specific service though a specific port".…”
Section: Motivation Challenges and Proposed Solutionsmentioning
confidence: 99%
“…One of the main initiatives to enhance security aspects in IoT devices is the usage of behavioral profiles, which describe the intended behavior of a device. Indeed, the realization of this concept has been mainly driven by the recent Manufacturer Usage Description (MUD) [2], which is an IETF standard encouraging manufacturers to represent the allowed/denied network communications of their devices through a simple and flexible data format. The behavioral profiles can be used to configure the device before it joins the network, in order to reduce the attack surface as well as to monitor its behavior to detect suspicious behaviors (e.g., due to an ongoing attack).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Existing works using offline/pre-defined policies such as manufacturer usage descriptions (MUD) [23] are not sufficient for dynamic IoT environments [19]. The MUDs are defined offline by IoT vendors to specifiy what network access is required for a particular IoT device to work properly [23]. For example, a coffee maker may only require inbound and outbound access to a cloud service on TCP port 443.…”
Section: Introductionmentioning
confidence: 99%