Review Article
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey
Table 2
Comparison of features of this survey with the existing survey articles.
| S. No. | Author | Year | Cyberattacks and security | Cybercrime | Security in IoT devices | Privacy in IoT devices | Patents reported | Discussions on real-time applications |
| 1 | Burhan et al. | 2018 | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | 2 | Williams et al. | 2018 | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | 3 | Huang et al. | 2018 | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | 4 | Bhat and Dutta | 2019 | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | 5 | Mrabet et al. | 2018 | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | 6 | Tounsi and Rais | 2017 | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ | 7 | Jian-hua Li | 2018 | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | 8 | Khadam et al. | 2020 | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | 9 | Shafiq et al. | 2018 | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ | 10 | Weichbroth and Lysik | 2020 | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | 11 | This survey | 2021 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|