Review Article

AI-Enabled Sensing and Decision-Making for IoT Systems

Table 3

Techniques and literature wise categorization.

Ref. no.DomainDescription

[85]IoTExamined the issues, challenges, and open problems of IoT security
[86]IoTDescribed vulnerabilities, aims, and goals of security for IoT
[87]IoT/mobile computingSecurity challenges and issues of mobile computing and IoT
[88]IoT/mobile computingSecurity study of IoT-based smart phone
[89]IoTExamine identification of IoT application, threats, and impacts
[90]IoT/mobile computingTool of mobile application for IoT threat analysis
[91]IoTEmphases on requirement-based IoT security analysis
[92]IoTOffered a threat categorization based on dimensions of security
[93]IoTModel of classification for analyzing the relation between possible risk and possible vulnerabilities in devices of home automation
[94]IoTDescribed the IoT problem analysis and delivered planned way out
[95]IoTThreats and attacks based IoT analysis
[96]IoTAnalyzing areas of IoT security
[97]Mobile computingSecurity study of mobile device to device network through android operating system
[98]IoTDescribed the layer-based IoT security analysis
[99]IoTArchitecture-based analysis in light of security requirements
[100]IoTStudy of vulnerability, privacy, and security concerns for IoT
[101]IoTAnalysis of associated IoT attack surfaces and vulnerabilities from IoT OWASP framework
[102]IoTDescribed classification of IoT threat and vulnerabilities
[103]IoTIoT threats and attacks based study
[104]IoTModel of risk evaluation for tackling the issues of security in IoT ecosystem
[105]IoTAnalyzing trust-based IoT recommendation approaches in IoT