Table 4.
Potential security requirements for the IoT identified in the existing literature. Red colour represents ‘standard’ security requirements.
Requirements | [152] | [151] | [148] | [149] | [147] | [154] | [145] | [155] | [156] | [168] | [169] | [153] | [143] | [158] | [157] | [140] | [160] | [170] |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Confidentiality | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Access control | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Authorization | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||
Availability | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||
Key management | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||
Integrity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
Trust | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||
Non-repudiation | ✓ | ✓ | ✓ | ✓ | ||||||||||||||
Accountability | ✓ | ✓ | ✓ | |||||||||||||||
Usability | ✓ | ✓ | ✓ | |||||||||||||||
Scalability | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
Resilience to attacks | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||
Privacy | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||
Identity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Secure storage | ✓ | ✓ | ✓ | |||||||||||||||
Secure communication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||
Secure content | ✓ | ✓ | ✓ | |||||||||||||||
Manageability | ✓ | ✓ | ||||||||||||||||
Location privacy | ✓ | ✓ | ✓ | |||||||||||||||
Decentralization | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||
Energy awareness | ✓ | ✓ | ||||||||||||||||
Quality of service | ✓ | ✓ | ✓ | |||||||||||||||
Anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||
Real-time | ✓ | ✓ | ✓ | ✓ | ||||||||||||||
Data freshness | ✓ | ✓ | ✓ | ✓ | ||||||||||||||
Reliability | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||
Load balancing | ✓ | ✓ | ✓ | |||||||||||||||
Mobility | ✓ | ✓ | ✓ | ✓ | ||||||||||||||
Fault tolerance | ✓ | ✓ | ✓ |