Table of Contents - X.1352 (2022) Amd. 1 (03/2024) - Amendment 1: Additions and corrections
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Security threats/vulnerabilities to IoT devices and gateways 7.1 Security threats/vulnerabilities to IoT devices 7.2 Security threats/vulnerabilities to IoT gateways 8 Security requirements 8.1 Authentication 8.2 Cryptography 8.3 Data security 8.4 Device platform security 8.5 Physical security Annex A � Mapping list between Internet of things security requirements and security threats/vulnerabilities Appendix I � Security capabilities for the Internet of things I.1 Overview I.2 Security capabilities for sensor/device I.3 Security capabilities for gateways I.4 Security capabilities for network I.5 Security capabilities for platforms/service Appendix II � Use cases of applying security requirements for Internet of things devices and gateways II.1 Use case of authentication�� Vulnerability to man in the middle attack II.2 Use case of cryptography domain�� Weak cryptography algorithm II.3 Use case of data security and cryptography domain�� Weak integrity checking of sending data II.4 Use case of device platform security domain�� Weak coding against exploit II.5 Use case of physical security domain�� Inner interface vulnerability in a printed circuit board Bibliography
|