A Systematic Mapping of Patterns and Architectures for IoT Security

被引:1
|
作者
Rajmohan, Tanusan [1 ]
Nguyen, Phu H. [2 ]
Ferry, Nicolas [2 ]
机构
[1] Univ Oslo UiO, Oslo, Norway
[2] SINTEF, Oslo, Norway
关键词
IoT; Security; Privacy; Architecture; Patterns; Review; Survey;
D O I
10.5220/0009583001380149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have entered a vast digital revolution of the IoT era when everything is connected. The popularity of IoT applications makes security for IoT of paramount importance. Security patterns are based on domain-independent time-proven security knowledge and expertise. Can they be applied to IoT? We aim to draw a research landscape of patterns and architectures for IoT security by conducting a systematic mapping study. From more than a thousand of relevant papers, we have systematically identified and analyzed 24 papers that have been published around patterns for IoT security (and privacy). Our analysis shows that there is a rise in the number of publications addressing security patterns in the two recent years. However, there are gaps in this research area that can be filled in to promote the use of patterns for IoT security and privacy.
引用
收藏
页码:138 / 149
页数:12
相关论文
共 50 条
  • [31] ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS IoT Architectures
    Ziegler, Sebastien
    Skarmeta, Antonio
    Bernal, Jorge
    Kim, Eunsook Eunah
    Bianchi, Stefano
    [J]. 2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 442 - 447
  • [32] Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
    Apiecionek, Lukasz
    Grossmann, Marcel
    Krieger, Udo R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (06) : 571 - 590
  • [33] Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
    Ang, Kenneth Li Minn
    Seng, Jasmine Kah Phooi
    Ngharamike, Ericmoore
    [J]. FUTURE INTERNET, 2022, 14 (02):
  • [34] Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications
    Nguyen, Tri
    Nguyen, Huong
    Gia, Tuan Nguyen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 226
  • [35] Self-adaptive architectures in IoT systems: a systematic literature review
    Alfonso, Ivan
    Garces, Kelly
    Castro, Harold
    Cabot, Jordi
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2021, 12 (01)
  • [36] Enterprise engineering, and security - Enterprise frameworks and architectures, and IA patterns
    Heaney, J
    Hybertson, DI
    Reedy, A
    Chapin, S
    Kirwan, M
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 293 - 294
  • [37] SECPAT: Security Patterns for Resilient Automotive E/E Architectures
    Plappert, Christian
    Fenzl, Florian
    Rieke, Roland
    Matteucci, Ilaria
    Costantino, Gianpiero
    De Vincenzi, Marco
    [J]. 30TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2022), 2022, : 255 - 264
  • [38] IoT Serverless Computing at the Edge: A Systematic Mapping Review
    Kjorveziroski, Vojdan
    Filiposka, Sonja
    Trajkovik, Vladimir
    [J]. COMPUTERS, 2021, 10 (10)
  • [39] A Systematic Mapping Study of Deployment and Orchestration Approaches for IoT
    Nguyen, Phu H.
    Ferry, Nicolas
    Erdogan, Gencer
    Song, Hui
    Lavirotte, Stephane
    Tigli, Jean-Yves
    Solberg, Arnor
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 69 - 82
  • [40] Smart Home IoT Cybersecurity Survey: A Systematic Mapping
    Ayavaca-Vallejo, Leonardo
    Avila-Pesantez, Diego
    [J]. 2023 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY, ICTAS, 2023, : 12 - 17