Research Article
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things
Table 1
Comparison of significant context-aware security and privacy solutions in IoT.
| Work | Context information security | Context information reliability | Context sources’ trust mgmt. | Communication protocol | Artificial intelligence technique | Implemented and evaluated |
| [6] | No | No | No | Not specified | No | Yes | [2] | No | No | No | Not specified | No | No | [17] | No | No | No | Not specified | No | Yes | [19] | No | No | No | Not specified | No | No | [18] | Yes | No | No | Not specified | No | No | [22] | Yes | No | No | CoAP | No | Yes | [24] | Yes | No | No | MQTT | No | Yes | [25] | Yes | No | No | Not specified | No | No | [26] | No | No | Yes | Not specified | No | Yes | [27] | No | No | Yes | Not specified | Yes | Yes | [28] | No | No | Yes | Not specified | Yes | Yes | Our work | Yes | Yes | Yes | MQTT | Yes | Yes |
|
|