Review Article
IoT Security Review: A Case Study of IIoT, IoV, and Smart Home
Table 2
Distribution papers in the field of IIoT data security.
| Author | Title | Contributions |
| Lesjak et al. [24] | Security in industrial IoT-quo vadis? | Used a broker-based data exchange infrastructure and hardware-based security | Rajmohan and Srinivasan. [25] | Safety and security measurement in industrial environment based on smart IOT technology based augmented data recognizing scheme | Proposed a system design via employing the augmented data recognizing algorithm | Zahed et al. [26] | Content caching in industrial IoT: security and energy considerations | Explored the optimum location for the TCNs and found secured routes | Mosteiro-Sanchez et al. [27] | Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0 | Presented an analysis of the most relevant security rules |
|
|