Table 3.
IoT devices security constraints.
Hardware Limitation | Software Limitation | Network Limitation |
---|---|---|
Computational and energy constraint | Embedded software constraint | Mobility |
Memory constraint | Dynamic security patch | Scalability |
Tamper resistant packaging | Multiplicity of communication medium | |
Multi-Protocol Networking | ||
Dynamic network topology |