A decade of research on patterns and architectures for IoT security

被引:8
|
作者
Rajmohan, Tanusan [1 ]
Nguyen, Phu H. [2 ]
Ferry, Nicolas [3 ]
机构
[1] Capgemini, Oslo, Norway
[2] SINTEF, Oslo, Norway
[3] Univ Cote Azur, I3S INRIA Kairos, Sophia Antipolis, France
基金
欧盟地平线“2020”;
关键词
Internet of Things; IoT; Security; Privacy; Architecture; Pattern; Review; SLR; INTERNET; PRIVACY;
D O I
10.1186/s42400-021-00104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010-December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] A decade of research on patterns and architectures for IoT security
    Tanusan Rajmohan
    Phu H. Nguyen
    Nicolas Ferry
    [J]. Cybersecurity, 5
  • [2] Research Landscape of Patterns and Architectures for IoT Security: A Systematic Review
    Rajmohan, Tanusan
    Nguyen, Phu H.
    Ferry, Nicolas
    [J]. 2020 46TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2020), 2020, : 463 - 470
  • [3] A Systematic Mapping of Patterns and Architectures for IoT Security
    Rajmohan, Tanusan
    Nguyen, Phu H.
    Ferry, Nicolas
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2020, : 138 - 149
  • [4] IoT Security (IoTSec) Considerations, Requirements, and Architectures
    Minoli, Daniel
    Sohraby, Kazem
    Kouns, Jacob
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1006 - 1007
  • [5] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    [J]. IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [6] Reflections on a Decade of Mobile Security Research
    Enck, William
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 2 - 2
  • [7] A Survey of Security Architectures for Edge Computing-Based IoT
    Fazeldehkordi, Elahe
    Gronli, Tor-Morten
    [J]. IOT, 2022, 3 (03): : 332 - 365
  • [8] IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey
    Burhan, Muhammad
    Rehman, Rana Asif
    Khan, Bilal
    Kim, Byung-Seo
    [J]. SENSORS, 2018, 18 (09)
  • [9] Reference Architectures for Security-by-design IoT: Comparative Study
    Vallois, Valentin
    Guenane, Fouad
    Mehaoua, Ahmed
    [J]. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2019,
  • [10] Research on IoT Privacy Security Risks
    Xi, Wang
    Ling, Luo
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS - COMPUTING TECHNOLOGY, INTELLIGENT TECHNOLOGY, INDUSTRIAL INFORMATION INTEGRATION (ICIICII), 2016, : 259 - 262