Review Article

Current Research Trends in IoT Security: A Systematic Mapping Study

Table 4

Specifications of keyword co-occurrence network.

ClusterKeywordsXYWeight (occurrences)Weight (links)Weight (total link strength)

1SDN0.292−0.598323530
Machine learning0.178−0.393272923
Deep learning0.498−0.244172516
Game theory0.322−0.53711179
Social IoT0.464−0.37811118
2ECC−0.2940.170394637
5G−0.057−0.207162515
Lightweight cryptography−0.412−0.279121310
Lightweight encryption−0.763−0.342594
3Privacy preservation−0.0470.570794953
Cloud computing−0.2030.114624655
Fog computing−0.1200.506393935
Edge computing−0.2960.228293827
4WSN−0.0840.142625550
CPS (Cyber-physical systems)−0.363−0.155202419
IoT device−0.021−0.3459128
Smart object−0.409−0.759686
5Key management0.0450.366152515
Authentication protocol0.0290.66810109
Signcryption−0.6770.809686
Digital signature−0.5490.7695104
6Sensor0.465−0.137284327
Smart home1.090−0.013272623
Raspberry Pi1.378−0.08616109
Arduino1.3230.0127107
7Privacy0.163−0.15013882126
Healthcare0.5140.553202217
Information security0.1500.185202114
E-health0.6600.484102010
8Security−0.052−0.142360119306
Blockchain−0.4870.141865768
Industrial IoT−0.5250.456413737
Smart contract−0.746−0.0227117
9Mutual authentication0.1570.673192517
Key agreement0.3910.789172117
BAN (Burrows–Abadi–Needham) logic0.4411.1956115
User authentication0.5121.028696
10Smart city0.295−0.005313527
Cybersecurity0.306−0.028233220
Mobile edge computing0.7610.491575
Secure energy efficiency0.7500.536555

Note. Column keywords contain the four most representative words (from most to least important) for each cluster. Columns X and Y indicate the coordinates in the corresponding axes of the keyword node on the network shown in Figure 6.