Research Article
Security Evaluation Framework for Military IoT Devices
Table 10
Example of selected INS security controls.
| SC | Description | SC | Description |
| AC-17 | Remote Access | IA-2 | Identification and Authentication | AC-18 | Wireless Access | IA-3 | Device Identification and Authentication |
|
|