Fig. 2From: A decade of research on patterns and architectures for IoT securityOverview of the search and selection stepsBack to article page