2).Completeness:
The existing security mechanism is mostly used for
a single application or field. The design of the security
architecture should consider future application trends,
incorporating any possible security module.
This paper presents an analysis of all attacks and
security threats that may arise in the IoT. Accordingly,
this study proposes related security technologies and a
design of a universal security architecture that integrates
logically related technologies.