Device Provisioning Protocol
E556085
Device Provisioning Protocol is a Wi‑Fi Alliance standard that securely bootstraps and configures devices onto wireless networks using modern cryptographic methods, often as a successor to WPS.
Statements (43)
| Predicate | Object |
|---|---|
| instanceOf |
Wi‑Fi Alliance standard
ⓘ
Wi‑Fi configuration protocol ⓘ network security protocol ⓘ |
| aimsTo | simplify secure Wi‑Fi onboarding ⓘ |
| alsoKnownAs | Wi‑Fi Easy Connect NERFINISHED ⓘ |
| canProvision |
consumer electronics
ⓘ
headless IoT devices ⓘ smart home devices ⓘ |
| canUse |
Bluetooth Low Energy for device onboarding
ⓘ
NFC for device onboarding ⓘ QR codes for device onboarding ⓘ |
| designedFor |
Internet of Things devices
ⓘ
consumer Wi‑Fi devices ⓘ |
| enables |
configuration without sharing Wi‑Fi password in plaintext
ⓘ
mutual authentication between configurator and device ⓘ |
| featureOf | Wi‑Fi CERTIFIED Easy Connect program NERFINISHED ⓘ |
| focusesOn |
secure initial network configuration
ⓘ
user‑friendly onboarding flows ⓘ |
| hasAbbreviation | DPP NERFINISHED ⓘ |
| hasGoal |
enhance security of device provisioning
ⓘ
improve usability of secure Wi‑Fi onboarding ⓘ |
| improvesOn | security of Wi‑Fi Protected Setup ⓘ |
| introducedBy | Wi‑Fi Alliance in late 2010s ⓘ |
| partOf | Wi‑Fi security ecosystem ⓘ |
| provides |
protection against brute‑force attacks compared to WPS
ⓘ
protection against eavesdropping during provisioning ⓘ |
| relatedTo |
WPA3
NERFINISHED
ⓘ
Wi‑Fi Protected Setup NERFINISHED ⓘ |
| replaces | Wi‑Fi Protected Setup NERFINISHED ⓘ |
| requires | support in both configurator and enrollee devices ⓘ |
| standardizedBy | Wi‑Fi Alliance NERFINISHED ⓘ |
| successorTo | Wi‑Fi Protected Setup NERFINISHED ⓘ |
| supports |
bootstrapping devices onto Wi‑Fi networks
ⓘ
configuration of Wi‑Fi devices ⓘ onboarding to WPA2‑Personal networks ⓘ onboarding to WPA3‑Enterprise networks ⓘ onboarding to WPA3‑Personal networks ⓘ secure device onboarding ⓘ |
| usedIn |
enterprise Wi‑Fi networks
ⓘ
home Wi‑Fi networks ⓘ public Wi‑Fi deployments ⓘ |
| uses |
modern cryptographic methods
ⓘ
public key cryptography ⓘ |
Referenced by (2)
Full triples — surface form annotated when it differs from this entity's canonical label.