Device identification: The IoT device can be uniquely identified logically and physically.
Device configuration: The configuration of the IoT device’s software can be changed, and such changes can be performed by authorized entities only.
Data protection: The IoT device can protect the data it stores and transmits from unauthorized access and modification.
Logical access to interfaces: The IoT device can restrict logical access to its local and network interfaces, and the protocols and services used by those interfaces, to authorized entities only.
Software update: The IoT device’s software can be updated by authorized entities only using a secure and configurable mechanism.
Global IoT Market 2020 Share, Trend, Segmentation and Forecast to 2026 texasguardian.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from texasguardian.com Daily Mail and Mail on Sunday newspapers.