Secure and Scalable Provisioning for Embedded Systems: A Comparative Study of Techniques, Trust Models, and Future Trends
DOI:
https://doi.org/10.63412/8839ks08Keywords:
BLE, embedded systems, provisioning, Matter, FDO, IETF SUIT, ECDH, TLS, TPMAbstract
Provisioning is a foundational step in embedded system deployment, enabling secure, authenticated, and efficient onboarding of devices into trusted networks. This paper surveys prevalent provisioning techniques tailored to embedded environments, categorizing them by mechanism—manual, QR-code-based, out-of-band, and zero-touch. It examines associated cryptographic algorithms, including ECDH, PSK, and certificate-based schemes, and introduces a scalable trust-chaining model for delegated provisioning. A comparative analysis is presented based on security, scalability, user effort, and hardware dependency. The paper concludes with key challenges and future directions such as post-quantum resilience, blockchain-based trust revocation, and standardized onboarding frameworks like FDO and IETF SUIT.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Global Innovations and Solutions

This work is licensed under a Creative Commons Attribution 4.0 International License.