Review Article

Current Research Trends in IoT Security: A Systematic Mapping Study

Table 5

STM-based topic extraction results and top words per topic according to four criteria.

Topic (proportions)Top wordsTopic label
Highest probabilityFrequency and exclusivityLift weightScore

1 (15%)SecurityDiscussAttitudeLayerIoT security issues
IssueIssueSocietySecurity
ChallengeChallengeTaxonomyWSN
2 (9%)DataPatientBiometricPatientSecure data sharing for healthcare
AccessMedicalCiphertext-policyMedical
EncryptHealthcareCP-ABE (Ciphertext-policy attribute-based encryptionSignature
3 (6.5%)AlgorithmPUF (Physical unclonable functionScalarPUFLightweight encryption
EncryptFPGA (field programmable gate array)SimeckS-box (substitution-box)
PowerS-boxAES-GCM (advanced encryption standard-Galois counter mode)FPGA
4 (7.6%)DeviceSDNOpenFlowDetectSecurity with ML
AttackLearningSDN-IoTAttack
DetectIntrusionCyber-attackSDN
5 (9%)ModelRiskANP (analytic network process)WorkforceRisk assessment
DevelopAssessCasualRisk
RiskMeasureDiagramAssess
6 (8.5%)AuthenticationAuthenticationBANAuthenticationMutual authentication protocol
ProtocolMutualPMIPv6 (Proxy mobile IPv6)Protocol
AttackProtocolAVISPA (automated validation of Internet security protocols)Mutual
7 (7.4%)CloudEdgeColludingFogMEC security
EdgeEavesdroppingSSR (secrecy sum rate)Eavesdropping
FogFogTensor-basedOffload
8 (8%)NodeRoutAcyclicRoutEnergy-efficient routing protocol
EnergyRPL (routing protocol for low-power and lossy networks)LeachEnergy
RoutClusterRPLCluster
9 (6.5%)SensorCameraBurglarArduinoSecure home automation system
ControlArduinoCautionCamera
HomeRaspberryDiabetesGadget
10 (6%)SmartCityCommerceBlockchainIntegration of blockchain and IoT
BlockchainBlockchainCampusSmart
HomeSmartCartCity
11 (8.5%)PrivacyPrivacyCyber-physicsPrivacyPrivacy preservation
UserPreservingMilePreserving
CollectUserParticipantData
12 (8%)DeviceDTLS (datagram transport layer security)EDHOC (ephemeral Diffie-Hellman over common open software environment)DTLSEnd-to-end security
ProtocolCoAPRekeyTLS
KeyEnd-endAEAD (authenticated encryption with associated data)CoAP