Fig. 6
From: A decade of research on patterns and architectures for IoT security

Architectures and patterns with focus on each security concern
From: A decade of research on patterns and architectures for IoT security
Architectures and patterns with focus on each security concern