Fig. 5From: A decade of research on patterns and architectures for IoT securitySecurity concerns based on the contributionBack to article page