Page 103 - 2015 Security in Telecommunications and Information Technology
P. 103

Unleashing the potential of the Internet of Things                         3



             Requirement     Requirement       Requirement description          Summary of
                number         category                                       the requirement
                  SP4       Security and    Integration of different security   Integration of different
                            privacy         policies and techniques related   security policies and
                            protection      to the variety of devices and user  techniques is required.
                                            networks in IoT is required.
                  SP5       Security and    Before a device (or an IoT user)   Mutual authentication
                            privacy         can access the IoT, mutual      and authorization is
                            protection      authentication and authorization   required.
                                            is required according to
                                            predefined security policies.
                  SP6       Security and    Any data access or attempt to   Security audit is
                            privacy         access IoT applications are     required to be
                            protection      required to be fully transparent,   supported in IoT.
                                            traceable and reproducible
                                            according to appropriate
                                            regulation and laws.






























































                                                                  Rec. ITU-T Y.4100/Y.2066 (06/2014)       89
   98   99   100   101   102   103   104   105   106   107   108