Research Article

Security Evaluation Framework for Military IoT Devices

Table 7

Comparison with other approaches.

Our frameworkRMFCybersecurity T&ECC based approaches

PurposeIntegrated into arms import processIntegrated into acquisition systemEliminate vulnerabilitiesSecurity evaluation of information products

For international useX

Functional test

Operational testX

Risk managementXX