{"id":12947,"date":"2026-02-18T07:55:11","date_gmt":"2026-02-18T15:55:11","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=12947"},"modified":"2026-03-04T04:53:39","modified_gmt":"2026-03-04T12:53:39","slug":"iot-dns-security-and-privacy-with-ucl-and-inria","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/","title":{"rendered":"IoT DNS Security and Privacy with UCL and Inria"},"content":{"rendered":"<h3>Introduction<\/h3>\n<p>If we think about our home networks, we likely have more Internet of Things (IoT) and Operational Technology (OT) devices than traditional computers, and within enterprise networks these devices perform critical roles in security systems, building controls, manufacturing sensors and healthcare.<\/p>\n<p>University College London (UCL) and the Institut national de recherche en sciences et technologies du num\u00e9rique (Inria) have been collaborating on research into the security of these devices for some time. Using a large IoT testbed these organizations uncovered serious anomalies in the DNS behavior of these devices.<\/p>\n<p>In the DNS world, IoT devices came to prominence in 2016 with the attack on Dyn, a major provider of DNS services. They suffered a massive distributed denial of service (DDoS) attack, disrupting access to major websites including Twitter, Spotify, Reddit, GitHub and Netflix. The attack was powered by the Mirai botnet, which hijacked thousands of insecure IoT devices. IoT botnet activity continues, as recently highlighted by Brian Krebs\u2019 article on the Kimwolf Botnet.<sup>1<\/sup><\/p>\n<p>While the \u201cnormal\u201d (bad) DNS behavior of devices and those of compromised devices are not directly related, there is an overlap in some of the mitigations that points us to how we can move toward security-by-design in the manufacture and operations of IoT. This article discusses the risks identified by the research, how these might be addressed and the mitigations network operators can use.<\/p>\n<h3>Research Results<\/h3>\n<p>Using a large-scale IoT testbed, researchers at UCL and Inria analyzed 30 consumer IoT devices across categories such as cameras, doorbells, lights, sensors and medical devices.<sup>2<\/sup> The methodology included passive traffic inspection and active testing.<\/p>\n<p>Key findings included:<\/p>\n<ul class=\"list-spacing\">\n<li><strong>No support for Encrypted DNS (DoH\/DoT\/DoQ)<\/strong>: This means queries would be visible, which could lead to device fingerprinting and privacy issues.<\/li>\n<li><strong>Hardcoded DNS Resolvers<\/strong>: Some devices ignored network DNS resolver settings and instead used well-known open DNS resolvers such as Google\u2019s 8.8.8.8 DNS service. If this is permitted on a network, it would bypass local security controls or those a home network service provider is delivering to its customers. Conversely, if a device has a hardcoded resolver as shipped it may not work if that open resolver is blocked due to network policy.<\/li>\n<li><strong>Poor Source Randomization<\/strong>: Devices used predictable source ports and transaction IDs, increasing the risk of cache poisoning and spoofed responses.<\/li>\n<li><strong>No DNSSEC Adoption<\/strong>: None of the devices validated DNS responses, making them vulnerable to spoofing.<\/li>\n<li><strong>Time to Live (TTL) Mismanagement<\/strong>: Devices ignored TTL values, causing erratic query behavior and inefficiencies.<\/li>\n<li><strong>Fragmentation Issues<\/strong>: Limited support for Extension Mechanisms for DNS (EDNS0) UDP message size led to inefficient handling of large DNS queries that testing showed could lead to operational issues.<\/li>\n<\/ul>\n<p>Andrew Losty, a PhD student at UCL and one of the Internet Draft authors, presented research findings at RIPE 91,<sup>3<\/sup> and the slides and recording of this are available <a href=\"https:\/\/ripe91.ripe.net\/programme\/meeting-plan\/sessions\/52\/TCAFQK\/\" target=\"_blank\"><strong>here<\/strong><\/a>. As one example, the following graph shows the lack of transaction ID randomization in some devices, making it more likely to accept a spoofed DNS response.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-figure1.jpeg\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1. Transaction ID results<\/p>\n<h3>Risk Mitigations<\/h3>\n<p><strong>Strengthening DNS Security in IoT Devices<\/strong><\/p>\n<p>To address the DNS-related vulnerabilities uncovered in the UCL and Inria research, we are working together on an Internet Engineering Task Force (IETF) Best Current Practice draft via the IoT working group. This is the logical place for this work as the DNS protocol is developed within the IETF and the IoT working group has a focus on the management and operations of the types of devices tested.<\/p>\n<p>Manufacturers of IoT\/OT devices need to ensure adherence to the following:<\/p>\n<ul class=\"list-spacing\">\n<li>Compliance to encrypted DNS standards such as DNS over TLS (DoT), DNS over HTTPS (DoH) or DNS over QUIC (DoQ) for enhanced privacy, security and compatibility<\/li>\n<li>Support for the configuration of DNS servers manually, via device management software, IPv6 router advertisements, DHCP and discovery of designated resolver standards; devices should not have hardcoded resolvers for security and operational reasons.<\/li>\n<li>DNS source port and transaction ID randomization to reduce the risk of spoofed responses being accepted by the device<\/li>\n<li>Devices honoring DNS record TTL values, perhaps with a maximum for operational reasons, with manufacturers also setting management domain records to appropriate values<\/li>\n<li>Support for EDNS0 to improve device efficiency and not impact the operation of a device when responses exceed the traditional 512 byte UDP limit<\/li>\n<li>Develop support for DNSSEC, for instance checking the Authenticated Data bit in resolvers\u2019 responses; manufacturers must sign their public zones used for device management and any data collection<\/li>\n<\/ul>\n<p>More details can be found in the Internet Draft IoT DNS Security and Privacy Guidelines.<sup>4<\/sup><\/p>\n<p><strong>Network Operator Mitigations<\/strong><\/p>\n<p>There are broadly two network operator types where IoT devices are deployed: service providers of consumer networks, for instance the networks we have at home, and organizations managing their own infrastructure. The main difference from a DNS perspective is that a consumer may use any DNS server, while an organization managing its own network should restrict DNS traffic to its own resolvers for security and policy reasons. In the consumer case it is advantageous for the end user to use the provider\u2019s resolvers and most home networks would do this in any case.<\/p>\n<p>Operators can restrict networks where IoT devices are deployed to only query domain names in management zones via Protective DNS.<sup>5<\/sup> They can see what these are via analyzing DNS traffic, but we are calling on manufacturers to provide these, either by simply publishing them or via the use of the Manufacturer Usage Description (MUD) specification.<sup>6<\/sup><\/p>\n<p>This means that the networks would be operated on a Zero Trust DNS basis, along the lines of Microsoft\u2019s Zero Trust DNS.7 This mitigates against devices being compromised, including in the supply chain.<\/p>\n<p>Where DNS resolution needs to be more open, such as on consumer networks where any device can be deployed, the network operator can still use Protective DNS to block malicious domains used in the compromise or control of devices.<\/p>\n<p>Operators should have resolvers validate responses via DNSSEC in any case, but specifically in the context of IoT it will allow devices to take advantage of manufacturers signing their public zones.<\/p>\n<p><strong>Regulation Improvements<\/strong><\/p>\n<p>Having improved standards that are enforced through certification will move us to a more secure-by-design paradigm.<\/p>\n<p>While organizations such as ETSI, ISO\/IEC, ITU-T and National Institute of Standards and Technology (NIST) have varying amounts of guidance on DNS security as it applies to IoT\/OT, there are certainly gaps here. Developing a Best Current Practice Draft within the IETF IoT Operations working group will allow this to be referenced by organizations such as ETSI where work for the certification of IoT devices is ongoing.<\/p>\n<p>As an example, provision 5.5-5 in the ETSI EN 303 645 V3.1.3 (2024-09) standard states \u201cConsumer IoT device functionality that allows security-relevant changes in configuration via a network interface shall only be accessible after authentication. The exception is for network service protocols that are relied upon by the consumer IoT device and where the manufacturer cannot guarantee what configuration will be required for the consumer IoT device to operate.\u201d One of the exceptions is for DNS.<\/p>\n<p>This should not exist as a blanket exemption. Rather than manufacturers complying with just device security, standards should consider the wider security context, especially where it is in same manufacturer\u2019s control. The ETSI standard states \u201cTo increase security, multi-factor authentication, such as use of a password plus OTP procedure, can be used to better protect the consumer IoT device or an associated service.\u201d The multi-factor authentication service and infrastructure is outside of the device and the manufacturer\u2019s control, whereas public management domains can be cryptographically signed, and devices can check if this has been verified\u2014all within one manufacturer\u2019s control.<\/p>\n<p>The natural tension in this is keeping regulation generic enough to allow for developments in tech and to document intent or outcomes versus being protocol specific. This is where IETF Drafts and RFCs can be referenced to bridge the gap and mean standards bodies do not need to maintain specific detail on protocol compliance.<\/p>\n<h3>Conclusion<\/h3>\n<p>The message can be boiled down to manufacturers following the DNS standards we already have (as detailed in the Draft we published), helping operators by providing management domain information to secure networks, pushing the use of PKI to manage devices in the form of DNSSEC (we do this with certs) and regulators referencing this in their standards.<\/p>\n<p>As we continue to work on the Draft, turning research findings into actionable guidelines, we invite you to join the conversation via the IETF whether you\u2019re a device manufacturer, network operator or security professional.<\/p>\n<p>If you are a network operator or security professional there are some practices in the Draft that will improve network security and you can help practically, for instance ask the manufacturers of the devices you use to let you know the management domains names so you can lock down communications to only those domains via Protective DNS.<\/p>\n<p>The Internet-Draft discussed in this blog has been authored by Jim Mozley (Infoblox), Abhishek Mishra (Inria), Andrew Losty (UCL), Anna Maria Mandalari (UCL) and Mathieu Cunche (INSA-Lyon &#038; Inria).<\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li>The Kimwolf Botnet is Stalking Your Local Network, Krebs, Brian, Krebs on Security, January 2, 2026. <a href=\"https:\/\/krebsonsecurity.com\/2026\/01\/the-kimwolf-botnet-is-stalking-your-local-network\/\" target=\"_blank\"><strong>https:\/\/krebsonsecurity.com\/2026\/01\/the-kimwolf-botnet-is-stalking-your-local-network\/<\/strong><\/a><\/li>\n<li>Towards Operational and Security Best Practices for DNS in the Internet of Things, Losty, Andrew, Mishra, Abhishek, Cunche, Mathieu, Mandalari, Anna, ANRW 2025 &#8211; Applied Networking Research Workshop, July 2025. <a href=\"https:\/\/hal.science\/hal-05110445\/\" target=\"_blank\"><strong>https:\/\/hal.science\/hal-05110445\/<\/strong><\/a><\/li>\n<li>Towards Operational and Security Best Practices for DNS in the Internet of Things (RIPE 91 presentation), Losty, Andrew, R\u00e9seaux IP Europ\u00e9ens (RIPE), October 24, 2025. <a href=\"https:\/\/ripe91.ripe.net\/programme\/meeting-plan\/sessions\/52\/TCAFQK\/\" target=\"_blank\"><strong>https:\/\/ripe91.ripe.net\/programme\/meeting-plan\/sessions\/52\/TCAFQK\/<\/strong><\/a><\/li>\n<li>IoT DNS Security and Privacy Guidelines, Mishra, Abhishek, Losty, Andrew, Mandalari, Anna, Mozley, Jim, Cunche, Internet Engineering Task Force (IETF), January 23, 2026. <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-iotops-iot-dns-guidelines\/\" target=\"_blank\"><strong>https:\/\/datatracker.ietf.org\/doc\/draft-ietf-iotops-iot-dns-guidelines\/<\/strong><\/a><\/li>\n<li>What is Protective DNS (PDNS)? Infoblox. <a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-faq\/what-is-protective-dns-pdns\/\" target=\"_blank\"><strong>https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-faq\/what-is-protective-dns-pdns\/<\/strong><\/a><\/li>\n<li>Manufacturer Usage Description Specification (RFC8250), Lear, Eliot, Droms, Ralph, Romascanu, Dan, Internet Engineering Task Force (IETF), March 2019. <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8520\" target=\"_blank\"><strong>https:\/\/datatracker.ietf.org\/doc\/html\/rfc8520<\/strong><\/a><\/li>\n<li>Zero Trust DNS, Microsoft. <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/network-security\/zero-trust-dns\/\" target=\"_blank\"><strong>https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/network-security\/zero-trust-dns\/<\/strong><\/a><\/li>\n<\/ol>\n<style>\n.savy-seahorse-table {\nfont-size:14px;\nword-break: keep-all;\n}\n.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {\npadding-right:10px;\n}\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\nmargin-top:auto;\n}\n.list-spacing li{margin-bottom:20px}\n.img-container, .img-container-3-col {\ndisplay: flex;\nflex-wrap: wrap;\njustify-content: space-between;\n}\n.img-container img {\nwidth: 49%;\nmargin-bottom: 10px;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n.grid-container {\n    grid-template-columns: 1fr!important;\n  }\n}\n@media (min-width: 767px) {\n.img-50{width:50%;}\n}\n.grid-container {\n  display: grid;\n  grid-template-columns: repeat(2, 1fr);\n  gap: 40px;\n  max-width: 800px;\n  margin: 0 auto;\n  align-items: stretch;\n}\n.grid-item {\n   display: flex;\n  flex-direction: column;\n  justify-content: flex-start;\n}\n.grid-item img {\n  width: 100%;\n  height: auto;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">IoT DNS Security and Privacy<\/span> with UCL and Inria');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction If we think about our home networks, we likely have more Internet of Things (IoT) and Operational Technology (OT) devices than traditional computers, and within enterprise networks these devices perform critical roles in security systems, building controls, manufacturing sensors and healthcare. University College London (UCL) and the Institut national de recherche en sciences et [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":12949,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[234,30,1545,908,1546],"class_list":{"0":"post-12947","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-iot","9":"tag-dns","10":"tag-internet-of-things","11":"tag-ietf","12":"tag-standards","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IoT DNS Security and Privacy with UCL and Inria<\/title>\n<meta name=\"description\" content=\"IoT DNS Security and Privacy with UCL and Inria\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT DNS Security and Privacy with UCL and Inria\" \/>\n<meta property=\"og:description\" content=\"IoT DNS Security and Privacy with UCL and Inria\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T15:55:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T12:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Mozley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"IoT DNS Security and Privacy with UCL and Inria\" \/>\n<meta name=\"twitter:description\" content=\"IoT DNS Security and Privacy with UCL and Inria\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Mozley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/\"},\"author\":{\"name\":\"Jim Mozley\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\"},\"headline\":\"IoT DNS Security and Privacy with UCL and Inria\",\"datePublished\":\"2026-02-18T15:55:11+00:00\",\"dateModified\":\"2026-03-04T12:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/\"},\"wordCount\":1677,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iot-dns-security-thumbnail.jpeg\",\"keywords\":[\"IoT\",\"DNS\",\"Internet of Things\",\"IETF\",\"Standards\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/\",\"name\":\"IoT DNS Security and Privacy with UCL and Inria\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iot-dns-security-thumbnail.jpeg\",\"datePublished\":\"2026-02-18T15:55:11+00:00\",\"dateModified\":\"2026-03-04T12:53:39+00:00\",\"description\":\"IoT DNS Security and Privacy with UCL and Inria\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iot-dns-security-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iot-dns-security-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/iot-dns-security-and-privacy-with-ucl-and-inria\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IoT DNS Security and Privacy with UCL and Inria\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\",\"name\":\"Jim Mozley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"caption\":\"Jim Mozley\"},\"description\":\"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jim-mozley\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IoT DNS Security and Privacy with UCL and Inria","description":"IoT DNS Security and Privacy with UCL and Inria","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/","og_locale":"en_US","og_type":"article","og_title":"IoT DNS Security and Privacy with UCL and Inria","og_description":"IoT DNS Security and Privacy with UCL and Inria","og_url":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/","og_site_name":"Infoblox Blog","article_published_time":"2026-02-18T15:55:11+00:00","article_modified_time":"2026-03-04T12:53:39+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Jim Mozley","twitter_card":"summary_large_image","twitter_title":"IoT DNS Security and Privacy with UCL and Inria","twitter_description":"IoT DNS Security and Privacy with UCL and Inria","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","twitter_misc":{"Written by":"Jim Mozley","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/"},"author":{"name":"Jim Mozley","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10"},"headline":"IoT DNS Security and Privacy with UCL and Inria","datePublished":"2026-02-18T15:55:11+00:00","dateModified":"2026-03-04T12:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/"},"wordCount":1677,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","keywords":["IoT","DNS","Internet of Things","IETF","Standards"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/","url":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/","name":"IoT DNS Security and Privacy with UCL and Inria","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","datePublished":"2026-02-18T15:55:11+00:00","dateModified":"2026-03-04T12:53:39+00:00","description":"IoT DNS Security and Privacy with UCL and Inria","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iot-dns-security-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/iot-dns-security-and-privacy-with-ucl-and-inria\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"IoT DNS Security and Privacy with UCL and Inria"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10","name":"Jim Mozley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","caption":"Jim Mozley"},"description":"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.","url":"https:\/\/www.infoblox.com\/blog\/author\/jim-mozley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12947"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12947\/revisions"}],"predecessor-version":[{"id":12960,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12947\/revisions\/12960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12949"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}