Table 1.
Layer | Security Requirements |
---|---|
Perception | Lightweight Encryption |
Authentication | |
Key Agreement | |
Data Confidentiality | |
Network | Communication Security |
Routing Security | |
Authentication | |
Key Management | |
Intrusion Detection | |
Application | Authentication |
Privacy protection | |
Information Security Management |