Vis enkel innførsel

dc.contributor.authorRajmohan, Tanusan
dc.contributor.authorNguyen, Phu Hong
dc.contributor.authorFerry, Nicolas
dc.date.accessioned2022-08-16T14:04:06Z
dc.date.available2022-08-16T14:04:06Z
dc.date.created2022-01-24T17:10:59Z
dc.date.issued2022
dc.identifier.citationCybersecurity. 2022, 5, 2.en_US
dc.identifier.issn2523-3246
dc.identifier.urihttps://hdl.handle.net/11250/3012177
dc.description.abstractSecurity of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010–December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectInternet of Thingsen_US
dc.subjectIoTen_US
dc.subjectSecurityen_US
dc.subjectPrivacyen_US
dc.subjectArchitectureen_US
dc.subjectPatternen_US
dc.subjectReviewen_US
dc.subjectSLRen_US
dc.titleA decade of research on patterns and architectures for IoT securityen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© The Author(s) 2022en_US
dc.source.volume5en_US
dc.source.journalCybersecurityen_US
dc.identifier.doihttps://doi.org/10.1186/s42400-021-00104-7
dc.identifier.cristin1988901
dc.relation.projectEC/H2020/958357en_US
dc.relation.projectEC/H2020/958363en_US
dc.source.articlenumber2en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal