A decade of research on patterns and architectures for IoT security

被引:8
|
作者
Rajmohan, Tanusan [1 ]
Nguyen, Phu H. [2 ]
Ferry, Nicolas [3 ]
机构
[1] Capgemini, Oslo, Norway
[2] SINTEF, Oslo, Norway
[3] Univ Cote Azur, I3S INRIA Kairos, Sophia Antipolis, France
基金
欧盟地平线“2020”;
关键词
Internet of Things; IoT; Security; Privacy; Architecture; Pattern; Review; SLR; INTERNET; PRIVACY;
D O I
10.1186/s42400-021-00104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010-December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.
引用
收藏
页数:29
相关论文
共 50 条
  • [31] Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities
    Patel, Alay
    Patel, Devam
    Kakkar, Riya
    Oza, Parita
    Agrawal, Smita
    Tanwar, Sudeep
    Sharma, Ravi
    Yamsani, Nagendar
    [J]. SECURITY AND PRIVACY, 2024, 7 (02)
  • [32] Research on scheduling method based on traffic matrix for IoT security
    Cao, Shaohua
    Zhu, Dongjie
    Li, Guofu
    Zhang, Yanwu
    Fan, Xiani
    Geng, Shanshan
    Du, Haiwen
    Cao, Ning
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (02)
  • [33] Research on a Cotton Storage Platform and Security Strategy Based on IoT
    Zhao, Xiaodong
    Li, Yajing
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2014, 14 : 159 - 171
  • [34] Research on SDN-based IoT Security Architecture Model
    Zheng, Shiji
    [J]. PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 575 - 579
  • [35] Current Research Trends in IoT Security: A Systematic Mapping Study
    Lee, Jee Young
    Lee, Jungwoo
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [36] Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security
    Janakiraman, Siva
    Thenmozhi, K.
    Rayappan, John Bosco Balaguru
    Amirtharajan, Rengarajan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31485 - 31513
  • [37] Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security
    Siva Janakiraman
    K. Thenmozhi
    John Bosco Balaguru Rayappan
    Rengarajan Amirtharajan
    [J]. Multimedia Tools and Applications, 2019, 78 : 31485 - 31513
  • [38] Novel Security Models for IoT-Fog-Cloud Architectures in a Real-World Environment
    Aleisa, Mohammed A.
    Abuhussein, Abdullah
    Alsubaei, Faisal S.
    Sheldon, Frederick T.
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [39] IoT Security
    Jamali, Mohammad Ali Jabraeil
    Heidari, Arash
    Allahverdizadeh, Parisa
    Norouzi, Farhad
    Bahrami, Bahareh
    [J]. EAI/Springer Innovations in Communication and Computing, 2020, : 33 - 83
  • [40] Security of IoT
    Gokalp, Erem
    Aydin, Muhammed Ali
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 453 - 457