Review Article
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
Table 1
Identified list of security features presented by researchers.
| References | Features |
| [30] | Maximum signal range | Variety of network topologies | Safety and security of data transfer | Reliability and dependability of WCT | Throughput and data rate | Applicability of WCT | Wireless power transfer | Minimum latency |
| [17] | Confidentiality | Availability | Integrity | Authentication | Access control | Authorization | Auditing | Trust | Privacy | Reputation metering | Accountability | Replay protection | Anonymization | Resilience to attacks | Fault tolerance | Nonrepudiation |
| [31] | Confidentiality | Integrity | Availability | Fault tolerance | Accountability | System trust |
| [32] | Privacy and security | Technology | Communication | Culture | Job | Legal regulation |
| [33] | Privacy protection | Node information certificate | Secure cloud computing | Encryption mechanism | Anti-DDoS | Platform security | Secure multiparty computation | Information application security | Antiattack security | Heterogeneous network recognition |
|
|