| ABAC | attribute-based access control |
| ACL | access control list |
| API | application programming interface |
| CA | certificate authority |
| CBAC | capability-based access control |
| CIA | confidentiality, integrity, and availability |
| CRL | certificate revocation list |
| DDoS | distributed denial-of-service |
| H2M | human-to-machine |
| ICS | industrial control system |
| IdM | identity management |
| IoT | Internet of Things |
| IPFS | InterPlanetary File System |
| JSON | JavaScript object notation |
| M2M | machine-to-machine |
| MSP | membership service provider |
| PBFT | practical byzantine fault tolerance |
| PM | particulate matter |
| RBAC | role-based access control |
| RPS | read per second |
| RTT | round-trip time |
| SDK | software development kit |
| SPOF | single point of failure |
| SUT | system under test |
| TLS | transport layer security |
| TPS | transaction per second |
| URI | UNIFORM RESOURCE IDENTIFIER |
| UUID | universally unique identifier |