Data Availability: Availability of data is very vital for proper functioning of the network. Services of the network should be available whenever necessary. Users should be able to use the resources whenever they intend to [13].
Data Authentication: The attacker can not only alter the information contained in the packets but can also introduce fallacious packets in the network. So verification of sender and receiver identities needs to be carried out as a defensive step against the action of any malicious …show more content…
The intermediate nodes must not change the information contained in the packets. Malicious activity should not corrupt the data [15].
Data Privacy: The privacy of data is the most important goal in the network security. It is the ability to hide the message from the passive attacker. It is necessary to build a secured channel in wireless sensor networks because the nodes may carry highly sensitive data like key distribution. Moreover the identity of sensors and public keys should be encrypted to some extent so that they can be protected from traffic analysis attack.
Some of the most prominent security issues plaguing the entire development of IoT system arise out of the security issues present in the technologies used in IoT for information relay from one device to another. As such some of the well researched security issues stemming out from the communication technology are the