PRICES include / exclude VAT
Homepage>IEEE Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.110 Networking>IEEE/ISO/IEC 8802.1AR-2014 - ISO/IEC/IEEE International Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AR: Secure device identity
Released: 15.02.2014

IEEE/ISO/IEC 8802.1AR-2014 - ISO/IEC/IEEE International Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AR: Secure device identity

ISO/IEC/IEEE International Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AR: Secure device identity

Format
Availability
Price and currency
English PDF
Immediate download
188.18 EUR
English Hardcopy
In stock
230.95 EUR
Standard number:IEEE/ISO/IEC 8802.1AR-2014
Released:15.02.2014
ISBN:978-0-7381-8943-7
Pages:82
Status:Active
Language:English
DESCRIPTION

IEEE/ISO/IEC 8802.1AR-2014

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.

This standard defines a standard identifier for IEEE 802 devices that is cryptographically bound to that device, and defines a standard mechanism to authenticate a device’s identity. A verifiable unique device identity allows establishment of the trustworthiness of devices. This facilitates secure device provisioning.

Adoption Standard - Active. A secure device identifier (DevID) is cryptographically bound to a device and supports authentication of the device’s identity. Locally significant identities can be securely associated with an initial manufacturer-provisioned DevID and used in provisioning and authentication protocols to allow a network administrator to establish the trustworthiness of a device and select appropriate policies for transmission and reception of data and control protocols to and from the device.