Skip to main content
. 2019 Jan 15;19(2):326. doi: 10.3390/s19020326

Table 2.

Security Requirement Evaluation.

Requirement Model Solution Reference
Confidentiality Proof of Authority, Public Key Section 6
Authorization Using Public Key and Lightweight Digital Signature Section 5.2
User control Proof of Authority Section 7
Integrity Hashing of data blocks Section 4
Availability Achieved by limiting acceptable transactions Section 4
Anonymity Lightweight Ring Signature Section 5.3