IoT access control security requirements |
Reliability |
– |
Data mutability |
Data immutability |
Data mutability |
Availability |
Data mutability |
Single point of failure |
Decentralized architecture/fault tolerance |
– |
Integrity |
– |
Centralized authority/data mutability |
Data immutability/transaction conformation |
– |
Confidentiality |
– |
Centralized authority/exposed data |
Owner-controlled data/encrypted data |
– |
Transparency |
– |
Centralized authority |
Decentralized authority |
– |
IoT access control performance requirements |
Performance |
High transaction performance/low latency |
– |
– |
Low transaction performance/high latency |
Scalability |
High Scalability |
– |
– |
Scalability comes with price |
Capacity |
Easy to run at any capacity |
– |
– |
Resource and energy-intensive consumption |
Usability |
Easy to use and to deploy |
– |
– |
Configuration of different components |
Maintenance |
Low cost |
– |
– |
High cost |