Research Article
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
| | S no. | Security services | Attacks (active or passive) on respective service |
| | 1 | Confidentiality | Eavesdropping, sniffing, and wiretapping | | 2 | Integrity | Modification and insertion | | 3 | Authentication | Impersonation | | 4 | Nonrepudiation | Repudiation | | 5 | Availability | Denial of service |
|
|