Confidentiality: Store and transmits in encryption;
Integrity: Authenticates to avoid unauthorized modification;
Anti-replay: Rejects duplicate packets to prevent network attacks;
Layered access control for different roles;
Independent access control for DB;
Exclusive Resource for each Carrier;
Fault and interruption isolation;