Research Article
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
| S no. | Security services | Attacks (active or passive) on respective service |
| 1 | Confidentiality | Eavesdropping, sniffing, and wiretapping | 2 | Integrity | Modification and insertion | 3 | Authentication | Impersonation | 4 | Nonrepudiation | Repudiation | 5 | Availability | Denial of service |
|
|