Review Article
Current Research Trends in IoT Security: A Systematic Mapping Study
Table 5
STM-based topic extraction results and top words per topic according to four criteria.
| Topic (proportions) | Top words | Topic label | Highest probability | Frequency and exclusivity | Lift weight | Score |
| 1 (15%) | Security | Discuss | Attitude | Layer | IoT security issues | Issue | Issue | Society | Security | Challenge | Challenge | Taxonomy | WSN | 2 (9%) | Data | Patient | Biometric | Patient | Secure data sharing for healthcare | Access | Medical | Ciphertext-policy | Medical | Encrypt | Healthcare | CP-ABE (Ciphertext-policy attribute-based encryption | Signature | 3 (6.5%) | Algorithm | PUF (Physical unclonable function | Scalar | PUF | Lightweight encryption | Encrypt | FPGA (field programmable gate array) | Simeck | S-box (substitution-box) | Power | S-box | AES-GCM (advanced encryption standard-Galois counter mode) | FPGA | 4 (7.6%) | Device | SDN | OpenFlow | Detect | Security with ML | Attack | Learning | SDN-IoT | Attack | Detect | Intrusion | Cyber-attack | SDN | 5 (9%) | Model | Risk | ANP (analytic network process) | Workforce | Risk assessment | Develop | Assess | Casual | Risk | Risk | Measure | Diagram | Assess | 6 (8.5%) | Authentication | Authentication | BAN | Authentication | Mutual authentication protocol | Protocol | Mutual | PMIPv6 (Proxy mobile IPv6) | Protocol | Attack | Protocol | AVISPA (automated validation of Internet security protocols) | Mutual | 7 (7.4%) | Cloud | Edge | Colluding | Fog | MEC security | Edge | Eavesdropping | SSR (secrecy sum rate) | Eavesdropping | Fog | Fog | Tensor-based | Offload | 8 (8%) | Node | Rout | Acyclic | Rout | Energy-efficient routing protocol | Energy | RPL (routing protocol for low-power and lossy networks) | Leach | Energy | Rout | Cluster | RPL | Cluster | 9 (6.5%) | Sensor | Camera | Burglar | Arduino | Secure home automation system | Control | Arduino | Caution | Camera | Home | Raspberry | Diabetes | Gadget | 10 (6%) | Smart | City | Commerce | Blockchain | Integration of blockchain and IoT | Blockchain | Blockchain | Campus | Smart | Home | Smart | Cart | City | 11 (8.5%) | Privacy | Privacy | Cyber-physics | Privacy | Privacy preservation | User | Preserving | Mile | Preserving | Collect | User | Participant | Data | 12 (8%) | Device | DTLS (datagram transport layer security) | EDHOC (ephemeral Diffie-Hellman over common open software environment) | DTLS | End-to-end security | Protocol | CoAP | Rekey | TLS | Key | End-end | AEAD (authenticated encryption with associated data) | CoAP |
|
|