All You Need To Know About FIDO Device Onboard (FDO) Protocol

FIDO Alliance has announced the new FIDO Device Onboard (FDO) protocol, an IoT boarding standard that reportedly enables devices to simply and safely on board to obscure existing management platforms.

Before moving forward, it is imperative to understand –

FIDO

What is Device Onboarding?

Device onboarding is the process of encryption and configuration data on a device, so that it can connect and share securely with the IoT platform. The IoT platform may be based on an application on a user’s computer, phone or tablet, depending on the business server, in a cloud service covering multiple regions of the world. The device owner uses the IoT platform to manage the device by installing security risks, installing or updating software, retrieving sensor data, interacting with actuators, and more.

At this rate, the FIDO Alliance addresses the security challenges, costs and complexities associated with the use of IoT devices on a scale. FIDO Device Onboard furthers the core vision of the Alliance, which brings together 250+ influential and strategic companies and government agencies from around the world to address cyber security to eliminate data breaches and allow secure online experiences.

Benefits of FIDO device onboarding standard

FDO is an automatedboardboard protocol for IoT devices, which uses asymmetric key key cryptography to provide the industrial IoT industry with a fast and secure access to any device in any device management system.

Business benefits from the FIDO Device Onboard level include:

Simplifying – Businesses no longer have to pay more for a longer and more sophisticated installation process than they do for the devices themselves. The default FDO procedure can be performed by people of any level of experience quickly and effectively.

Adaptability – Businesses can decide which cloud platforms they want to install on the devices where they are installed (as opposed to being made). A single SKU device can be mounted on any platform, thus simplifying the performance of the device series.

Security – The FDO uses the “unreliable installer” method, which means the installer no longer needs – and does not have access – to any sensitive infrastructure / access control information to add a device to the network.

This is the latest step for FIDO Alliance in its goal of reducing global reliance on passwords through simple, powerful authentication to prevent alarming attacks and account fraud.

Key features of the FIDO Device Onboard Standard

  1. Device Owner Can Choose IoT Platform On Latest Stage

A unique feature of FIDO Device Onboard is the owner’s ability to select an IoT platform in the near term of the device’s life cycle. Setup data or secrets can also be created or selected later. This feature is called ‘late arrest’.

The most common case of board intrusion occurs when the device is first installed. The device connects to a potential IoT platform over the communication system, with the goal of establishing trust and engaging in a ride chat. Due to late binding, this device does not yet have an IoT platform to connect to. That’s why the IoT platform shares information about its network address with ‘Rendezvous Server‘. The device connects to one or more servers until it decides how to communicate with an upcoming IoT speaker.

  1. FIDO Device Onboard Establishes Identity During Production

FIDO Device Onboard works by determining device ownership at the time of production, and then tracking device ownership transfers until it is delivered and used. This way, the device mounting problem can be identified as a ‘transfer ownership’ problem or a transmission problem. Between its production and the first time to install and access the Internet, the phone can transfer ownership several times. A digital document called a ‘Copyright Voucher’ is used to transfer digital identity certificates from owner to owner without enabling the device.

  1. Installer Performs IoT Device Installation

Upon entering the board, the installer performs the physical installation of the IoT device. In the default installer model, the device does not have a guide to how to log in. In a trusted installer model, the device can take direction from the installer, making it easier to mount.

  1. FIDO Protocol Onboard Protocol Does Not Limit Owner Verification During Ride

During the ride, the FIDO Device Onboard protocol does not limit or authorize the authentication of the owner of a specific device. Allows the holder to assign multiple keys, secrets, credentials, and other data to a device that will be remotely controlled to install the app properly.

  1. Once Under Management, FIDO Device Onboard is Updated for Future Use in Recovering Device

As long as the device is under control, the FIDO Device Onboard goes into sleep mode, and the device goes into normal IoT operation. The manager may make future updates without the FIDO Device Onboard. However, if the device is sold or re-sold, the administrator can erase all verification and data and re-enable FIDO Device Onboard.

  1. Functional, Interoperable, Privacy and Security by construction

FIDO Device Onboard has many protocol features that make it difficult for hackers to track the progress of the device from production to ownership to restore or remove it. All buttons displayed by the FIDO Device Onboard protocol may be restricted for use only on the FIDO Device Onboard. The FIDO certification system for the future is expected to ensure a certain level of security assurance, performance compliance and cooperation.

  1. IoT device Secure transmission

FIDO has successfully switched from traditional authentication systems to a password-free country and this new protocol is expected to bring this balance between ease of use and security in the IoT industry thus promoting secure device deployment.

 

Back to Blog

Share:

Related Posts

Cybersecurity – Hacking and Data-Breaches in 2019

Cybersecurity must be a top priority of all organizations to protect and…

Read More

Improving Cyber Security With a Pragmatic Approach

With time, more and more businesses are realizing that security is a…

Read More

Why it is Essential For Small Businesses to Migrate the Cloud Computing

Cloud computing is without a doubt the biggest and most influential by-product…

Read More