Current Research Trends in IoT Security: A Systematic Mapping Study
Table 4
Specifications of keyword co-occurrence network.
Cluster
Keywords
X
Y
Weight (occurrences)
Weight (links)
Weight (total link strength)
1
SDN
0.292
−0.598
32
35
30
Machine learning
0.178
−0.393
27
29
23
Deep learning
0.498
−0.244
17
25
16
Game theory
0.322
−0.537
11
17
9
Social IoT
0.464
−0.378
11
11
8
2
ECC
−0.294
0.170
39
46
37
5G
−0.057
−0.207
16
25
15
Lightweight cryptography
−0.412
−0.279
12
13
10
Lightweight encryption
−0.763
−0.342
5
9
4
3
Privacy preservation
−0.047
0.570
79
49
53
Cloud computing
−0.203
0.114
62
46
55
Fog computing
−0.120
0.506
39
39
35
Edge computing
−0.296
0.228
29
38
27
4
WSN
−0.084
0.142
62
55
50
CPS (Cyber-physical systems)
−0.363
−0.155
20
24
19
IoT device
−0.021
−0.345
9
12
8
Smart object
−0.409
−0.759
6
8
6
5
Key management
0.045
0.366
15
25
15
Authentication protocol
0.029
0.668
10
10
9
Signcryption
−0.677
0.809
6
8
6
Digital signature
−0.549
0.769
5
10
4
6
Sensor
0.465
−0.137
28
43
27
Smart home
1.090
−0.013
27
26
23
Raspberry Pi
1.378
−0.086
16
10
9
Arduino
1.323
0.012
7
10
7
7
Privacy
0.163
−0.150
138
82
126
Healthcare
0.514
0.553
20
22
17
Information security
0.150
0.185
20
21
14
E-health
0.660
0.484
10
20
10
8
Security
−0.052
−0.142
360
119
306
Blockchain
−0.487
0.141
86
57
68
Industrial IoT
−0.525
0.456
41
37
37
Smart contract
−0.746
−0.022
7
11
7
9
Mutual authentication
0.157
0.673
19
25
17
Key agreement
0.391
0.789
17
21
17
BAN (Burrows–Abadi–Needham) logic
0.441
1.195
6
11
5
User authentication
0.512
1.028
6
9
6
10
Smart city
0.295
−0.005
31
35
27
Cybersecurity
0.306
−0.028
23
32
20
Mobile edge computing
0.761
0.491
5
7
5
Secure energy efficiency
0.750
0.536
5
5
5
Note. Column keywords contain the four most representative words (from most to least important) for each cluster. Columns X and Y indicate the coordinates in the corresponding axes of the keyword node on the network shown in Figure 6.