4. Adapt the public key infrastructure to the
IoT environment in the framework
5. Ensure the physical level security issues
such as physical tampering and power
deprivation attacks are addressed
6. Develop threat models for Man in the
Middle and Eavesdropping attacks and
evaluate threat index for those attacks and
respond to them in real time.
7. Develop methods to ensure secure IPSec
and transport layer without depending on
intermediate nodes in order to assure
complete end-to-end security