A Systematic Mapping of Patterns and Architectures for IoT Security

被引:1
|
作者
Rajmohan, Tanusan [1 ]
Nguyen, Phu H. [2 ]
Ferry, Nicolas [2 ]
机构
[1] Univ Oslo UiO, Oslo, Norway
[2] SINTEF, Oslo, Norway
关键词
IoT; Security; Privacy; Architecture; Patterns; Review; Survey;
D O I
10.5220/0009583001380149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have entered a vast digital revolution of the IoT era when everything is connected. The popularity of IoT applications makes security for IoT of paramount importance. Security patterns are based on domain-independent time-proven security knowledge and expertise. Can they be applied to IoT? We aim to draw a research landscape of patterns and architectures for IoT security by conducting a systematic mapping study. From more than a thousand of relevant papers, we have systematically identified and analyzed 24 papers that have been published around patterns for IoT security (and privacy). Our analysis shows that there is a rise in the number of publications addressing security patterns in the two recent years. However, there are gaps in this research area that can be filled in to promote the use of patterns for IoT security and privacy.
引用
收藏
页码:138 / 149
页数:12
相关论文
共 50 条
  • [41] Systematic security analysis for service-oriented software architectures
    Liu, Yanguo
    Traore, Issa
    [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 612 - 621
  • [42] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
    Nazir, Ahsan
    He, Jingsha
    Zhu, Nafei
    Wajahat, Ahsan
    Ma, Xiangjun
    Ullah, Faheem
    Qureshi, Sirajuddin
    Pathan, Muhammad Salman
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [43] A Systematic Mapping on Security Threats in Mobile Devices
    Lacerda, Anselmo
    de Queiroz, Ruy
    Barbosa, Marcio
    [J]. 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 286 - 291
  • [44] A systematic mapping study on security for systems of systems
    Olivero, Miguel Angel
    Bertolino, Antonia
    Dominguez-Mayo, Francisco Jose
    Escalona, Maria Jose
    Matteucci, Ilaria
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 787 - 817
  • [45] Security and Privacy for Blockchain: A Systematic Mapping Study
    Yang, Jinmei
    Bi, Huang
    Dai, Fei
    Liang, Zhihong
    Qiang, Zhenping
    [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 446 - 453
  • [46] Security In The Internet Of Things - A Systematic Mapping Study
    Porras, Jari
    Pankalainen, Jouni
    Knutas, Antti
    Khakurel, Jayden
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 3750 - 3759
  • [47] A systematic mapping study of usability vs security
    Merdanoglu, Nur
    Onay Durdu, Pinar
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING & INFORMATION TECHNOLOGY (CEIT), 2018,
  • [48] A systematic mapping study on security for systems of systems
    Miguel Angel Olivero
    Antonia Bertolino
    Francisco José Dominguez-Mayo
    María José Escalona
    Ilaria Matteucci
    [J]. International Journal of Information Security, 2024, 23 : 787 - 817
  • [49] Mapping of natural patterns by liquid architectures implementing neural cliques
    Odinaev, Karina
    Raichelgauz, Igal
    Zeevi, Yehoshua Y.
    [J]. APPLICATIONS OF SOFT COMPUTING: RECENT TRENDS, 2006, : 123 - +
  • [50] Applying Security Patterns for authorization of users in IoT Based Applications
    Ali, Ishfaq
    Asif, Muhammad
    [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING & EMERGING TECHNOLOGIES (ICEET), 2018, : 77 - 81