Review Article

IoT Security Review: A Case Study of IIoT, IoV, and Smart Home

Table 2

Distribution papers in the field of IIoT data security.

AuthorTitleContributions

Lesjak et al. [24]Security in industrial IoT-quo vadis?Used a broker-based data exchange infrastructure and hardware-based security
Rajmohan and Srinivasan. [25]Safety and security measurement in industrial environment based on smart IOT technology based augmented data recognizing schemeProposed a system design via employing the augmented data recognizing algorithm
Zahed et al. [26]Content caching in industrial IoT: security and energy considerationsExplored the optimum location for the TCNs and found secured routes
Mosteiro-Sanchez et al. [27]Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0Presented an analysis of the most relevant security rules