|
Article | Adopted methodology | Main focus | Contribution/impact |
|
Alaba et al. [27] | Review | IoT security threats and vulnerabilities | (i) Classification of security threats in the context of applications, architecture, communication, and data (ii) Attack analysis for security scenarios |
Mendez Mena et al. [28] | Review | Security from the perspective of IoT architecture | (i) IoT architecture technology and protocol review by layer (ii) Review of privacy issues (iii) Summarize ongoing security issues of IoT |
Hassija et al. [29] | Review | Security of IoT application | (i) IoT application security related issues and threat sources review (ii) Discussion of technology to increase trust in IoT applications (iii) Discussion of the latest technology to increase the level of security |
Macedo et al. [30] | SLR | IoT security overall | (i) Review of literature over the last 8 years to identify security issues and trends in terms of authentication, access control, data protection, and trust |
Hameed et al. [31] | Review | Requirements of IoT security | (i) Review privacy, lightweight encryption framework, security routing, internal attack detection, and resilience management as security requirements (ii) Explain the latest technology for resilience management and detection of internal attacks |
Obaidat et al. [32] | Review | IoT security overall | (i) Comprehensive investigation of security, privacy, security frameworks, technologies, threats, vulnerabilities, and countermeasures. (ii) Classification of the impact of attacks according to -NIST’s FIPS 199 definitions |
Sharma et al. [7] | Review | Security, privacy, and trust in smart M-IoT | (i) The first survey discussing the security of smart M-IoT (ii) Describe the security framework of smart M-IoT and conduct an in-depth investigation in terms of security, privacy, and trust to provide research tasks, unresolved issues, and research directions |
Our study | Systematic mapping study | IoT security overall | (i) Classify large-volume literature related to IoT security from 2009 to the present (ii) Discussion of research trends through co-occurrence keyword mapping (iii) Discussion of research trends through topic mapping (iv) Provide future research direction |
|