Review Article

Current Research Trends in IoT Security: A Systematic Mapping Study

Table 2

Comparison with related review articles.

ArticleAdopted methodologyMain focusContribution/impact

Alaba et al. [27]ReviewIoT security threats and vulnerabilities(i) Classification of security threats in the context of applications, architecture, communication, and data
(ii) Attack analysis for security scenarios
Mendez Mena et al. [28]ReviewSecurity from the perspective of IoT architecture(i) IoT architecture technology and protocol review by layer
(ii) Review of privacy issues
(iii) Summarize ongoing security issues of IoT
Hassija et al. [29]ReviewSecurity of IoT application(i) IoT application security related issues and threat sources review
(ii) Discussion of technology to increase trust in IoT applications
(iii) Discussion of the latest technology to increase the level of security
Macedo et al. [30]SLRIoT security overall(i) Review of literature over the last 8 years to identify security issues and trends in terms of authentication, access control, data protection, and trust
Hameed et al. [31]ReviewRequirements of IoT security(i) Review privacy, lightweight encryption framework, security routing, internal attack detection, and resilience management as security requirements
(ii) Explain the latest technology for resilience management and detection of internal attacks
Obaidat et al. [32]ReviewIoT security overall(i) Comprehensive investigation of security, privacy, security frameworks, technologies, threats, vulnerabilities, and countermeasures.
(ii) Classification of the impact of attacks according to -NIST’s FIPS 199 definitions
Sharma et al. [7]ReviewSecurity, privacy, and trust in smart M-IoT(i) The first survey discussing the security of smart M-IoT
(ii) Describe the security framework of smart M-IoT and conduct an in-depth investigation in terms of security, privacy, and trust to provide research tasks, unresolved issues, and research directions
Our studySystematic mapping studyIoT security overall(i) Classify large-volume literature related to IoT security from 2009 to the present
(ii) Discussion of research trends through co-occurrence keyword mapping
(iii) Discussion of research trends through topic mapping
(iv) Provide future research direction