Offline-Capable Trust: Maintaining Device Identity Without Network Connectivity
Overview
Most device identity systems are designed assuming network availability. That assumption fails in the field.
Industrial deployments operate with intermittent LTE. Remote infrastructure runs on duty-cycled connectivity. Edge devices go offline for hours or days during normal operation. Environments with restricted network access are a deliberate design requirement in critical infrastructure.
When a device identity system assumes it can reach a validation endpoint at the moment of authentication, it fails — silently or loudly — across all of these scenarios. The problem is not that connectivity is unavailable. The problem is that the identity architecture was not designed for the environment it was deployed into.
This article defines the offline trust problem precisely, documents the architecture that addresses it, and maps the tradeoffs inherent in each design decision.
Definitions
Offline-capable trust
An identity architecture in which a device can assert and have its identity verified without a live connection to a network authority at the moment of verification. Offline capability does not mean permanent offline operation — it means the identity system functions correctly across connectivity gaps of a defined duration.
Credential validity window
The time period during which a credential is considered valid without requiring online verification. In online-first systems, this is typically the certificate's notBefore/notAfter range. In offline-capable systems, validity windows are sized to the expected maximum offline period of the deployment.
Revocation state
The current status of a credential — valid, suspended, or revoked. In online systems, revocation state is queried in real time via OCSP or CRL. In offline-capable systems, revocation state must be pre-loaded and locally cached, with a defined staleness policy.
SE RTC (Secure Element Real-Time Clock)
An internal clock maintained by the secure element, independent of the host system clock. Used for time-bounded credential operations in offline environments. SE RTCs drift at 1–5 ppm — a source of validity verification errors over extended offline periods if not accounted for in the architecture.
The Problem: Online-First Identity Assumptions
The following assumptions are standard in enterprise and cloud identity systems. Each becomes a point of failure in offline-capable deployments:
Real-time certificate revocation checking. OCSP and CRL distribution points require outbound network access at authentication time. In offline environments, this access is unavailable. A device with a valid, unrevoked credential will fail authentication if the architecture requires a live revocation check it cannot complete.
Credential freshness validated against a live issuing authority. Systems that require the issuing authority to confirm credential freshness at authentication time cannot operate offline. This pattern is common in zero-trust architectures that were designed for enterprise network environments.
Attestation challenges requiring live responses. Challenge-response attestation protocols that require the verifier to issue a nonce and receive a signed response — where the verifier must be network-reachable — cannot operate when the verifier is unavailable.
Session tokens that cannot be renewed without network access. Short-lived tokens are a standard security practice in cloud environments. In embedded deployments with duty-cycled connectivity, a token that expires during an offline period cannot be renewed until the device reconnects — interrupting operations that may have safety or continuity requirements.
Architecture: Four Design Decisions
Decision 1 — Hardware-resident credential storage
The device's identity credential must reside in the secure element, not in session state or application memory. A credential held in the SE is:
- Not dependent on network state for existence or accessibility
- Bound to specific hardware at manufacturing time
- Tamper-resistant against a compromised application processor
- Available for authentication operations regardless of connectivity state
This is the foundational requirement for offline-capable identity. If the credential is session-derived or depends on a live token, offline capability cannot be achieved.
Decision 2 — Pre-loaded revocation state with bounded validity windows
Rather than checking revocation at authentication time, the offline-capable architecture pre-loads revocation state during the last available OTA sync window.
Validity window sizing. Certificates issued for offline-capable deployments carry validity windows sized to the expected maximum offline period — not two years (the enterprise PKI default), but:
- 24–72 hours for high-frequency deployments with regular connectivity
- 7–30 days for infrastructure with longer duty cycles
- Up to 90 days for remote deployments with constrained connectivity, where revocation latency risk has been assessed and accepted
When a validity window expires, the device cannot authenticate until it reconnects and the credential is refreshed. This is a deliberate constraint — it bounds the maximum period during which a compromised credential could remain valid in the field.
Revocation list pre-loading. During each OTA sync window, the device downloads the current revocation list for its issuing CA. The list is stored in SE non-volatile memory. Revocation checks at authentication time use the local list, not a live query.
Decision 3 — Local attestation without live verification
Device attestation in offline-capable systems is structured so that the verifier holds a public key trust anchor — provisioned during device onboarding — and can verify a locally-generated attestation without calling back to a network authority.
The attestation includes a timestamp counter maintained by the SE's internal RTC, not by the OS clock. This prevents clock manipulation attacks on time-bounded credentials, since the SE RTC is not accessible to application software.
Clock discipline requirement. Because attestation timestamps are SE RTC-derived and the RTC drifts, the architecture must include RTC resynchronisation during OTA sync windows. Unsynchronised SE RTCs produce attestation timestamps that diverge increasingly from wall time over extended offline periods, causing validity verification failures.
Decision 4 — Explicit degradation policy, not silent failure or silent pass
When a credential cannot be verified offline — because the revocation list has expired, the validity window has closed, or the SE RTC has drifted beyond the tolerance margin — the system must behave according to an explicitly defined degradation policy.
Two policies are architecturally valid. Neither is a default; both are deliberate choices:
Fail-secure: The device halts authenticated operations and signals that reconnection and credential refresh are required before resuming. Appropriate when the cost of operating with a potentially stale credential exceeds the cost of operational interruption.
Fail-open with audit: The device continues operations but flags the credential verification failure for review on next reconnection. Appropriate when operational continuity is paramount and the deployment's threat model accepts bounded periods of credential staleness.
The policy must be specified in the system design, not determined by firmware defaults.
Tradeoffs
Credential freshness vs. operational availability
Short validity windows maximise freshness and bound the maximum period of potential staleness — but require frequent reconnection. Long validity windows extend offline capability but increase the window during which a revoked credential could remain valid. The correct value depends on the deployment's connectivity profile and threat model. There is no universally correct answer.
Revocation latency
Pre-loaded revocation lists are always stale by the time a device uses them. The relevant question is: what is the maximum acceptable staleness, and does the deployment's threat model include an attacker capable of compromising a credential and then preventing the device from reconnecting long enough to receive the revocation?
In most industrial deployments, this attack is operationally impractical. In high-value infrastructure deployments — where a compromised device could cause significant harm if it operates after credential revocation — it is a genuine design constraint that must be explicitly addressed.
SE RTC drift
Over a 30-day offline period, drift on a typical SE RTC reaches several seconds to several minutes. For validity windows measured in days, this drift is manageable with a conservative tolerance buffer. For validity windows measured in hours, drift becomes a meaningful source of spurious validity failures that must be accounted for in the architecture.
Summary
Offline-capable trust architecture is not a caching problem. It is a set of deliberate design decisions about how credential validity is asserted, how revocation state is maintained, how attestation operates without a live verifier, and how the system degrades when a credential cannot be fully verified.
Each decision carries a tradeoff. Each tradeoff must be made explicitly, before deployment, by architects who understand both the security requirements and the operational environment of the specific deployment.
Systems that leave these decisions to defaults will fail — silently or loudly — in the offline scenarios they will inevitably encounter.
Related Articles
- Trust Chain Architecture: From Manufacturing HSM to Deployed Device
- Hardware-Backed Authentication: SE vs TEE vs TPM
- PKI for Embedded Systems: Five Enterprise Assumptions That Break
- SCP03-Protected OTA Channel: What It Does and What It Doesn't Protect
Related capability: IoT Security · Trust chain architecture