Review Article

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Table 1

Identified list of security features presented by researchers.

ReferencesFeatures

[30]Maximum signal range
Variety of network topologies
Safety and security of data transfer
Reliability and dependability of WCT
Throughput and data rate
Applicability of WCT
Wireless power transfer
Minimum latency

[17]Confidentiality
Availability
Integrity
Authentication
Access control
Authorization
Auditing
Trust
Privacy
Reputation metering
Accountability
Replay protection
Anonymization
Resilience to attacks
Fault tolerance
Nonrepudiation

[31]Confidentiality
Integrity
Availability
Fault tolerance
Accountability
System trust

[32]Privacy and security
Technology
Communication
Culture
Job
Legal regulation

[33]Privacy protection
Node information certificate
Secure cloud computing
Encryption mechanism
Anti-DDoS
Platform security
Secure multiparty computation
Information application security
Antiattack security
Heterogeneous network recognition