Fig. 6From: A decade of research on patterns and architectures for IoT securityArchitectures and patterns with focus on each security concernBack to article page