Security Requirements Five functional components of security are defined in IoT reference architecture: Identity Management (IDM) Authentication Authorisation Key Exchange and Management (KEM) Trust and Reputation Layer 1 Security Attack Solution Security depends on the devices and technology used. Security solution for BLE at link-level is AES-CCM 128 authenticated encryption algorithm for confidentiality […]