**Session Date/Time:** 26 Jul 2023 22:30 # iotops ## Summary The IoT Operations (iotops) working group meeting at IETF 117 covered several key topics including an IoT security survey draft, a comparison of COAP security protocols, device schema extensions to the SCIM model, and a draft proposing certificate-less enrollment protocol for constrained IoT devices (Bruskey CLE). Discussions revolved around the direction and improvement of these drafts, soliciting co-authors and reviewers, and addressing security considerations. ## Key Discussion Points * **IoT Security Survey Draft:** * Purpose: To map security requirements from existing standards to IETF and related technologies. * Current Status: Covers ALISA baseline and NIST IoT cybersecurity capability core baseline. * Need for co-authors and reviewers due to the expected growth of the document. * Discussion on whether this document should become an RFC or remain a perpetually updated draft. * **Comparison of COAP Security Protocols:** * Discussion of the progress of the draft, including addressing comments from IETF 116 and early IUT review. * Concerns were raised about terminology, key exchange, and security considerations, with plans to address them. * Decision needed on whether to wait for CTLS to be published before moving to working group last call. * **Device Schema Extensions to SCIM:** * Goal: To abstract onboarding mechanisms and offer a provisioning interface. * The communication reverses, and partners who are providing IoT devices into an enterprise environment will call into SCIM and also link to an ALG. * Updates to the endpoint application schema were discussed. * Open API model provided in the appendix for testing. * **Bruskey CLE (Certificate-Less Enrollment Protocol):** * Draft proposes an alternative to certificate-based authentication for constrained IoT devices using certificate-less cryptography. * Discussion about the claimed improvements in computational efficiency and transmission overhead compared to certificate-based methods. * Concerns were raised about the reliance on IBC and its scalability and security considerations. ## Decisions and Action Items * **IoT Security Survey Draft:** * Seek additional co-authors and reviewers. * Continue development as a draft for now; revisit RFC status later. * **Comparison of COAP Security Protocols:** * Sean to address Russ’s comments and submit version 03. * Chairs to check with TLS working group about CTLS publication timeline. * Working group to decide whether to wait for CTLS publication before last call. * **Device Schema Extensions to SCIM:** * Elliot to correct language clarity issues. * Elliot to correct regex inconsistencies for MAC addresses. * Intend to release LSS code for testing. * **Bruskey CLE:** * Author to address concerns raised about IBC and its security implications, especially scalability and potential vulnerabilities with centralized key generation. * Author to clarify comparisons with TLS in later presentations. ## Next Steps * Continue development and refinement of all drafts based on feedback. * Seek additional co-authors and reviewers for the IoT security survey. * Address comments and issues raised during the meeting. * Determine a timeline for progressing the COAP security protocols comparison draft to working group last call. * IoT Net is potentially being utilized in Prague, but its status is currently unsupported.