|
Method name | Layer | Description | Issues focused on the method |
|
Risk-based adaptive framework | Network | Each portion of the four portions performs its tasks and acknowledges the other. | It keeps watching for attacks. It removes the incoming attack at the second portion [115]. |
Preference-based privacy protection | Application | The service provider, client, and third party initiate communication in a secure environment. | Between the client and the service provider, the third party acts as a bridge and keeps a check on the security provided to the client through the service provider [121]. |
OpenHab in the application layer | Application | Provision of security. | The device mismatch is not supported but registration is simple [124]. |
PKI protocol | Perception | A message is sent by the base station to the destination consisting of a public key. | The message is delivered independently without compromising security [108]. |
IoTOne | Application | OpenHab technology issues are solved. | A device mismatch is allowed. The request is sent by the client to the server for the verification of the user [124]. |
Security framework based on identity | Application | Registration, policy, client, and user authentication are part of this system. | Admin describes the policies. Users and all other resources are managed by the framework based on policies [125]. |
Encryption based on Hash | Perception | Encryption algorithms and Hash functions are used in parallel. | The integrity of the message is checked [106]. |
Mechanism-based on the secure authorization | Perception | RBAC and ABAC mechanisms and systems are based on client-server. | Resources are provided by the server to the client on request, thus making the system more secure [109]. |
Lightweight cryptographic algorithms | Perception | Messages are converted by using keys. | Plain text from the message is converted to a cipher using Hash functions and symmetric and asymmetric keys [233]. |
Embedded framework of security | Perception | Memory operating system and run-time environment are secured. | More secure memory management, secondary storage, and run-time environment to the users [112]. |
The framework of identity management | Network | Communication is done via service and identity. | Information about the user is confirmed by the identity module to protect the users from the attackers [114]. |
SDN with IoT | Network | Low cost and lesser hardware are used for better performance. | IoT agents and controllers are provided security by SDN as all communications are done through SDN [116]. |
Mechanism-based on reputation | Network | Data structures, namely, the reputation table and watchdog mechanism, are maintained by the node to prevent intruders. | Ad hoc communication-based system [118]. |
Heterogeneous fusion mechanism in IoT | Transport | Prevents disclosure of data and information. | Roaming authentication security in the heterogeneous environment [234]. |
|