A Systematic Mapping of Patterns and Architectures for IoT Security

被引:1
|
作者
Rajmohan, Tanusan [1 ]
Nguyen, Phu H. [2 ]
Ferry, Nicolas [2 ]
机构
[1] Univ Oslo UiO, Oslo, Norway
[2] SINTEF, Oslo, Norway
关键词
IoT; Security; Privacy; Architecture; Patterns; Review; Survey;
D O I
10.5220/0009583001380149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have entered a vast digital revolution of the IoT era when everything is connected. The popularity of IoT applications makes security for IoT of paramount importance. Security patterns are based on domain-independent time-proven security knowledge and expertise. Can they be applied to IoT? We aim to draw a research landscape of patterns and architectures for IoT security by conducting a systematic mapping study. From more than a thousand of relevant papers, we have systematically identified and analyzed 24 papers that have been published around patterns for IoT security (and privacy). Our analysis shows that there is a rise in the number of publications addressing security patterns in the two recent years. However, there are gaps in this research area that can be filled in to promote the use of patterns for IoT security and privacy.
引用
收藏
页码:138 / 149
页数:12
相关论文
共 50 条
  • [1] Research Landscape of Patterns and Architectures for IoT Security: A Systematic Review
    Rajmohan, Tanusan
    Nguyen, Phu H.
    Ferry, Nicolas
    [J]. 2020 46TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2020), 2020, : 463 - 470
  • [2] A decade of research on patterns and architectures for IoT security
    Tanusan Rajmohan
    Phu H. Nguyen
    Nicolas Ferry
    [J]. Cybersecurity, 5
  • [3] A decade of research on patterns and architectures for IoT security
    Rajmohan, Tanusan
    Nguyen, Phu H.
    Ferry, Nicolas
    [J]. CYBERSECURITY, 2022, 5 (01)
  • [4] Security patterns: A systematic mapping study
    Jafari, Abbas Javan
    Rasoolzadegan, Abbas
    [J]. JOURNAL OF COMPUTER LANGUAGES, 2020, 56
  • [5] Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns
    Alshohoumi, Fatma
    Sarrab, Mohammed
    AlHamadani, Abdulla
    Al-Abri, Dawood
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (07) : 232 - 251
  • [6] Current Research Trends in IoT Security: A Systematic Mapping Study
    Lee, Jee Young
    Lee, Jungwoo
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [7] IoT Security (IoTSec) Considerations, Requirements, and Architectures
    Minoli, Daniel
    Sohraby, Kazem
    Kouns, Jacob
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1006 - 1007
  • [8] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    [J]. IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [9] Systematic Mapping of Architectures for Telemedicine Systems
    de Sousa e Silva, Glauco
    Nunes Guimaraes, Ana Paula
    de Oliveira, Hugo Neves
    Tavares, Tatiana Aires
    dos Anjos, Eudisley Gomes
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2013), PT III, 2013, 7973 : 214 - 229
  • [10] A Survey of Security Architectures for Edge Computing-Based IoT
    Fazeldehkordi, Elahe
    Gronli, Tor-Morten
    [J]. IOT, 2022, 3 (03): : 332 - 365