Skip to main content
. 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433

Table 3.

IoT devices security constraints.

Hardware Limitation Software Limitation Network Limitation
Computational and energy constraint Embedded software constraint Mobility
Memory constraint Dynamic security patch Scalability
Tamper resistant packaging Multiplicity of communication medium
Multi-Protocol Networking
Dynamic network topology