1 Scope
2 References
3 Terms and Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Functional architecture and framework
8 Security threats to the Internet of things
8.1 Security threats to IoT sensors/devices
8.2 Security threats to IoT gateways
8.3 Security threats to the network
8.4 Security threats to platform/services
9 Requirements for Internet of things
10 Security capabilities for the Internet of things
10.1 Overview
10.2 Security capabilities for sensors/devices
10.3 Security capabilities for gateways
10.4 Security capabilities for the network
10.5 Security capabilities for platforms/services
Annex A – Security and privacy requirements described in ITU-T Y.4100/Y.2066
A.1 Communication security
A.2 Data management security
A.3 Service provision security
A.4 Integration of security policies and techniques
A.5 Mutual authentication and authorization
A.6 Security audit
Appendix I – Security and privacy capabilities described in ITU-T
Y.4401/Y.2068
I.1 Communication security capability
I.2 Data management security capability
I.3 Service provision security capability
I.4 Security integration capability
I.5 Mutual authentication and authorization capability
I.6 Security audit capability
Appendix II – Implementation view of the IoT functional framework building over
the next generation network functional architecture in ITU-T Y.4401/Y.2068
Bibliography