Authenticity:

Only legal users should be allowed to access the system or sensitive information [16] .

Authorization:

The privileges of device components and applications should be limited as so they are able to access only the resources they need to do their addressed tasks [25] .

Confidentiality:

Information transmission between the nodes should be protected from intruders [18] .

Integrity:

Related information should not be tampered [19] .

Availability and Continuity:

In order to avoid any potential operational failures and interruptions, availability and continuity in the provision of security services should be ensured [26] .