Research Article

Security Evaluation Framework for Military IoT Devices

Table 10

Example of selected INS security controls.

SCDescriptionSCDescription

AC-17Remote AccessIA-2Identification and Authentication
AC-18Wireless AccessIA-3Device Identification and Authentication