
|
Security Goals Authentication + Secrecy (unicast + multicast) Peer Entity , Data Origin, Implicit Destination Authn, Replay Protection Authorisation (by a Trusted Third Party) Key Agreement Properties Perfect Forward Secrecy (PFS) Secure capabilities negotiation (Resistance against Downgrading and Negotiation Attacks) “Anonymity” Identity Protection against Peer Non-repudiation Proof of Origin Proof of Delivery “Accountability” Limited DoS Resistance Sender Invariance Temporal Logic Properties (Fair Exchange, Service Delivery) Session Formation Consistent View Key naming |