|
Author (year) | Ideology | Parameters | Advantages | Security issues discussed |
|
Atzori et al. (2010) [32] | A survey of internet of things (IoT). | Applications, service management, logistics. | Applications of IoT were discussed in a detailed manner. | ✗ |
Miorandi et al. (2012) [33] | A survey of applications and issues of security in IoT. | Applications, security issues of IoT, research challenges. | Research challenges and issues of securities were explained in detail. | ✓ |
Gubbi et al. (2013) [35] | Application and cloud computing-oriented survey of IoT. | Applications, addressing schemes, cloud computing. | Cloud computing and its applications in IoT were discussed. | ✓ |
Aggarwal et al. (2013) [36] | A survey of applications, data management, and research challenges in IoT. | Applications, data management and analytics, security, privacy. | Data management in IoT and applications were discussed in detail. | ✓ |
Said (2013) [37] | Evaluation of different IoT architectures is presented. | Hierarchical architecture, distributed architecture. | Different IoT architectures were discussed in detail. | ✗ |
Perera et al. (2013) [38] | The authors presented context-aware computing for IoT devices. | Context reasoning, context modelling, context distribution. | Different contexts related to the IoT were presented. | ✗ |
Granja let al. (2015 ) [39] | Communication protocols and security parameters are discussed in detail. | Different protocols of IoT communications, application layer, physical layer, and MAC layer security. | The security of different layers in IoT communications was discussed in detail. | ✓ |
Sicari et al. (2015) [40] | Research challenges and existing solutions in IoT security are presented in the survey. | Mobile security in IoT, Trust, and privacy in IoT, enforcement in IoT, authentication, confidentiality, and access control in IoT. | Security of IoT was discussed referring to ongoing projects on securing the IoT. | ✓ |
Abomhara and Køein (2015) [41] | Research directions concerning IoT security and privacy are presented. | Different cyberattacks in IoT, security and privacy challenges in IoT, security threats and challenges. | Threats to IoT security were discussed in detail. | ✓ |
Mahmoud et al. (2015) [42] | IoT layer architecture and security features are the key aspects of this paper. | IoT architecture, IoT security issues, IoT security countermeasures. | Basic architectures of IoT and security issues were discussed in detail. | ✓ |
Pescatore and Shpantzer (2016) [43] | Surveyed perceptions on IoT, IoT applications, and industry representation by IoT. | Applications, threats to IoT, risk management in IoT, data monitoring. | The survey conducted with participants was discussed concerning different parameters related to IoT. | ✓ |
Gil et al. (2016) [44] | A general survey of IoT and context awareness of IoT. | IoT applications domain, services for IoT, data mining for IoT. | Services and data as services were discussed. Applications of IoT are also presented. | ✗ |
Iqbal et al. (2017) [232] | A review of security solutions against threats on IoT devices. | Different techniques of attacks on IoT, security and privacy requirements, security solutions in IoT. | The threats to IoT security and its measures to counter the threats were explained in detail. | ✓ |
Vignesh and Samydurai (2017) [46] | A survey on IoT layer architecture and security threats on each layer. | Security features of IoT, architecture, security remedies. | Security issues in IoT and future directions regarding 5G were discussed in the paper. | ✓ |
Razzaq et al. (2017) [47] | A survey on different types of threats in IoT and their solutions is discussed. | Applications of IoT, Threats to IoT, analysis of different types of attacks. | Applications of IoT and analysis of different types of security threats were done. | ✓ |
Maple (2017) [48] | A survey of applications of IoT, authentication, and identity management of IoT, security issues of IoT in different applications. | Applications of IoT in automobiles, health, industry 4.0, agriculture, entertainment, and media. | Security issues on various applications like health and in automobiles were discussed along with privacy challenges in detail. | ✓ |
Rughani (2017) [49] | The authors discussed the architecture of IoT devices along with the security aspects and their application in forensics. | IoT architecture, IoT security issues, and digital security in IoT. | Discussions on forensics in IoT and security issues were discussed. | ✓ |
Corser et al. (2017) [50] | The authors laid prime emphasis on the security of IoT devices. | IoT hardware security, dynamic testing, securing IoT networks. | Certain security issues from a hardware and software perspective were discussed in detail. | ✓ |
Burhan et al. (2018) [51] | Compared the different application domains of IoT and discussed the key elements of IoT. | Applications of IoT, different architecture layers of IoT. | Identity management framework, security mechanisms for IoT, and improved layered architecture for IoT were discussed. | ✓ |
Noor and Hassan (2018) [52] | A survey on IoT security, possible attacks on IoT architecture layers are presented. | IoT security attacks on layer review on IoT authentication, trust management, and secure routing. | Attacks on the IoT architecture layer were explained in detail. Secure routing was presented with key features. | ✓ |
MacDermott et al. (2018) [53] | The authors discussed the IoT, the possible crime using, or in IoT devices. | Forensic handling regarding IoT and crime using IoT devices. | Forensic evidence handling in the smart city was discussed in detail. | ✗ |
Riahi Sfar et al. (2018) [54] | A survey on IoT security including discussion on smart manufacturing. | A cognitive approach for IoT, recent research in data privacy trust management system. | Cognitive and systemic security along with adaptive and context-aware security was discussed in detail. | ✓ |
Neshenko et al. (2018) [55] | A survey on the exploitation of different IoT devices. | IoT architecture security in IoT, IoT vulnerabilities at different architectural layers. | The security aspects of the layer-wise architecture of IoT devices were discussed in detail. | ✓ |
Zhou et al. (2018) [56] | A survey on security features and privacy in IoT. | Attacks on IoT, threats, and challenges in IoT devices. | Threats to IoT hardware devices were discussed in detail. | ✓ |
Lu and Xu (2018) [11] | A survey article on IoT cyberattacks and security schemes. | Different cyberattack and layer-wise security schemes. | Security schemes for different layered architectures were explained in detail. | ✓ |
Aydos et al. (2019) [57] | A survey of risk and threat assessment on different architecture layers of IoT. | IoT applications, platforms for IoT, IoT protocols, security, threats, and vulnerabilities in IoT. | Attack on a different layer in IoT was presented along with a risk-based layered approach for IoT security assessment in detail. | ✓ |
Nasiri et al. (2019) [58] | An article on healthcare-based secure IoT environment. | Security requirements in IoT. | Cybersecurity requirements were discussed. | ✗ |
Tabassum et al. (2019) [59] | An article on various security issues in IoT. | IoT security requirements and architecture of IoT. | Security issues on perception, application, and network layer were discussed in detail. | ✓ |
Servida and Casey (2019) [12] | An article on IoT forensics and detection of traces in IoT. | Digital forensics, privacy, and IoT forensics. | IoT forensics and detection, extraction, and parsing of traces from IoT devices were discussed in detail. | ✗ |
Blythe et al. (2019) [60] | An article on cyber hygiene advice for IoT devices. | Security features of IoT devices, design code of practice for IoT devices. | Standardization of security protocols was the main emphasis. | ✓ |
Adesola et al. (2019) [61] | An article on crime management with IoT-based architecture. | IoT architecture, data collection, and framework for IoT devices. | A crime prediction and monitoring model was proposed. | ✗ |
Abdullah et al. (2019) [16] | A review of cybersecurity issues and challenges. | Cyberattacks, cybersecurity, IoT architecture, and security techniques. | Security techniques at different layers are discussed in detail. The blockchain is implemented to secure the IoT network. | ✓ |
Butun et al. (2019) [1] | A survey on different kinds of attacks and their countermeasures in IoT devices. | IoT applications, security attacks on IoT devices, attacks on different layers of IoT architecture. | Defence against different passive and active attacks on different layers of IoT architecture was discussed in detail. | ✓ |
Stoyanova et al. (2020) [62] | A survey on IoT forensics and its challenges. | IoT forensic components, IoT attacks, IoT security, IoT protocols, IoT layered architecture. | IoT forensics challenges and their solution, secure cloud service models were discussed in detail. | ✓ |
Tawalbeh et al. (2020) [63] | An article on security and privacy in IoT devices. | Generic IoT layers and proposed system model for secure IoT devices. | A system model was proposed using the cloud edge nodes and IoT nodes. | ✓ |
Atlam et al. (2020) [64] | An article on cybercrime, security, and digital forensics for IoT devices. | IoT applications, IoT architecture, characteristics, and communication technologies in IoT, security threats in IoT. | The security solution of four-layered IoT architecture was discussed in detail. | ✓ |
|