Table of Contents - X.1352 (2022) Amd. 1 (03/2024) - Amendment 1: Additions and corrections
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Security threats/vulnerabilities to IoT devices and gateways 7.1 Security threats/vulnerabilities to IoT devices 7.2 Security threats/vulnerabilities to IoT gateways 8 Security requirements 8.1 Authentication 8.2 Cryptography 8.3 Data security 8.4 Device platform security 8.5 Physical security Annex A – Mapping list between Internet of things security requirements and security threats/vulnerabilities Appendix I – Security capabilities for the Internet of things I.1 Overview I.2 Security capabilities for sensor/device I.3 Security capabilities for gateways I.4 Security capabilities for network I.5 Security capabilities for platforms/service Appendix II – Use cases of applying security requirements for Internet of things devices and gateways II.1 Use case of authentication – Vulnerability to man in the middle attack II.2 Use case of cryptography domain – Weak cryptography algorithm II.3 Use case of data security and cryptography domain – Weak integrity checking of sending data II.4 Use case of device platform security domain – Weak coding against exploit II.5 Use case of physical security domain – Inner interface vulnerability in a printed circuit board Bibliography
|