Skip to main content
. 2020 Oct 19;20(20):5897. doi: 10.3390/s20205897

Table 4.

Potential security requirements for the IoT identified in the existing literature. Red colour represents ‘standard’ security requirements.

Requirements [152] [151] [148] [149] [147] [154] [145] [155] [156] [168] [169] [153] [143] [158] [157] [140] [160] [170]
Confidentiality
Access control
Authentication
Authorization
Availability
Key management
Integrity
Trust
Non-repudiation
Accountability
Usability
Scalability
Resilience to attacks
Privacy
Identity
Secure storage
Secure communication
Secure content
Manageability
Location privacy
Decentralization
Energy awareness
Quality of service
Anonymity
Real-time
Data freshness
Reliability
Load balancing
Mobility
Fault tolerance