Table of Contents

 1     Scope          
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere           
 4     Abbreviations           
 5     Overview of USN middleware security             
        5.1     USN middleware for applications            
        5.2     USN middleware for sensor networks     
        5.3     USN middleware system            
 6     Security threats to USN middleware   
        6.1     System security threats
        6.2     Security threats on data              
        6.3     Security threats on communication         
 7     Security requirements for USN middleware     
        7.1     Security requirements for the system      
        7.2     Security requirements for data  
        7.3     Security requirements for communication            
 8     Guidelines for USN middleware security         
        8.1     Middleware system security      
        8.2     Access control              
        8.3     Stored data protection 
        8.4     Transmission/receipt data security          
        8.5     Secure channel