Techniques are presented herein that allow Manufacturer Usage Description (MUD)-based access controls to be applied to an Internet of things (IoT) device before the device is powered on or before the device is connected to a network in some secure manner, thus addressing a weakness in existing IoT device security. Aspects of the presented techniques employ a secure radio-frequency identification (RFID) tag to protect against the actions of a bad actor (such as a bad actor replacing a legitimate RFID tag with a malicious tag or altering the Uniform Resource Identifier (URI) content that is emitted by a tag) that may harm the network to which an IoT device is to be connected.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.