Research Article

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Table 1

Evaluation parameters.

S no.Security servicesAttacks (active or passive) on respective service

1ConfidentialityEavesdropping, sniffing, and wiretapping
2IntegrityModification and insertion
3AuthenticationImpersonation
4NonrepudiationRepudiation
5AvailabilityDenial of service