Chapter 8 – Security Requirements for the IoT