Table of Contents

 1     Scope          
 2     References
 3     Terms and Definitions          
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview  
 7     Functional architecture and framework       
 8     Security threats to the Internet of things     
        8.1     Security threats to IoT sensors/devices            
        8.2     Security threats to IoT gateways          
        8.3     Security threats to the network           
        8.4     Security threats to platform/services
 9     Requirements for Internet of things
10     Security capabilities for the Internet of things          
       10.1     Overview     
       10.2     Security capabilities for sensors/devices         
       10.3     Security capabilities for gateways      
       10.4     Security capabilities for the network
       10.5     Security capabilities for platforms/services   
Annex A – Security and privacy requirements described in ITU-T Y.4100/Y.2066    
        A.1     Communication security         
        A.2     Data management security    
        A.3     Service provision security       
        A.4     Integration of security policies and techniques             
        A.5     Mutual authentication and authorization        
        A.6     Security audit               
Appendix I – Security and privacy capabilities described in ITU-T Y.4401/Y.2068    
        I.1     Communication security capability       
        I.2     Data management security capability  
        I.3     Service provision security capability     
        I.4     Security integration capability
        I.5     Mutual authentication and authorization capability      
        I.6     Security audit capability            
Appendix II – Implementation view of the IoT functional framework building over the next generation network functional architecture in ITU-T Y.4401/Y.2068    
Bibliography