Skip to main content

Table 1 Overview of the primary IoT security pattern and architecture studies

From: A decade of research on patterns and architectures for IoT security

Paper #

Year

Title (click to open the corresponding publication)

\(\mathrm {v}\)  

\(\mathrm {f}\)

Vijayakumaran et al. (2020)

2020

A reliable next generation cyber security architecture for industrial internet of things environment (https://www.scopus.com/record/display.uri?eid=2-s2.0-85073370260&origin=resultslist&sort=plf-f&src=s&st1=A+reliable+next+generation+cyber+security+architecture+for+industrial+internet+of+things+environment&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=115&s=TITLE-ABS-KEY%28A+reliable+next+generation+cyber+security+architecture+for+industrial+internet+of+things+environment%29&relpos=0&citeCnt=2&searchTerm=)

C

A

Vithya Vijayalakshmi and Arockiam (2020)

2020

A secured architecture for IoT healthcare system (https://www.scopus.com/record/display.uri?eid=2-s2.0-85083648091&origin=resultslist&sort=plf-f&src=s&st1=A+Secured+Architecture+for+IoT+Healthcare+System&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=63&s=TITLE-ABS-KEY%28A+Secured+Architecture+for+IoT+Healthcare+System%29&relpos=0&citeCnt=1&searchTerm=)

C

A

Portal et al. (2020)

2020

An edge decentralized security architecture for industrial IoT applications (https://ieeexplore.ieee.org/document/9221176)

C

A

Karaarslan et al. (2020)

2020

Design and implementation of SDN-based secure architecture for IoT-Lab (https://www.scopus.com/record/display.uri?eid=2-s2.0-85083427175&origin=resultslist&sort=plf-f&src=s&st1=Design+and+Implementation+of+SDN-Based+Secure+Architecture+for+IoT-Lab&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=85&s=TITLE-ABS-KEY%28Design+and+Implementation+of+SDN-Based+Secure+Architecture+for+IoT-Lab%29&relpos=0&citeCnt=0&searchTerm=)

C

A

Perera et al. (2020)

2020

Designing privacy-aware internet of things applications (https://www.sciencedirect.com/science/article/pii/S0020025519309120)

J

A

Dhieb et al. (2020)

2020

Scalable and secure architecture for distributed IoT systems (https://ieeexplore.ieee.org/document/9140108)

C

A

Koo et al. (2020)

2020

Security architecture for cloud-based command and control system in IoT environment (https://www.scopus.com/record/display.uri?eid=2-s2.0-85081588195&origin=resultslist&sort=plf-f&src=s&st1=Security+Architecture+for+Cloud-Based+Command+and+Control+System+in+IoT+Environment&st2=&sid=8baa12fe1401019180971c95019fe27a&sot=b&sdt=b&sl=98&s=TITLE-ABS-KEY%28Security+Architecture+for+Cloud-Based+Command+and+Control+System+in+IoT+Environment%29&relpos=0&citeCnt=1&searchTerm=)

J

A

Robles Enciso et al. (2020)

2020

Security architecture for defining and enforcing security profiles in DLT/SDN-based IoT systems (https://www.scopus.com/record/display.uri?eid=2-s2.0-85082792671&origin=resultslist&sort=plf-f&src=s&st1=Security+architecture+for+defining+and+enforcing+security+profiles+in+DLT%2fSDN-based+IoT+systems&st2=&sid=8baa12fe1401019180971c95019fe27a&sot=b&sdt=b&sl=110&s=TITLE-ABS-KEY%28Security+architecture+for+defining+and+enforcing+security+profiles+in+DLT%2fSDN-based+IoT+systems%29&relpos=0&citeCnt=1&searchTerm=)

J

A

Park (2020)

2019

Security architecture for secure multicast CoAP applications (https://ieeexplore.ieee.org/document/8974263)

J

A

Koshy et al. (2020)

2020

Sliding window blockchain architecture for Internet of Things (https://ieeexplore.ieee.org/document/8974263)

J

A

Attia et al. (2019)

2019

An IoT-blockchain architecture based on hyperledger framework for healthcare monitoring application (https://ieeexplore.ieee.org/document/8763849)

C

A

Pape and Rannenberg (2019)

2019

Applying privacy patterns to the Internet of Things’ (IoT) architecture (https://www.scopus.com/record/display.uri?eid=2-s2.0-85054572626&origin=resultslist&sort=plf-f&src=s&st1=Applying+Privacy+Patterns+to+the+Internet+of+Things+Architecture&st2=&sid=94e759f4e7106d7f9b416c4471289e65&sot=b&sdt=b&sl=79&s=TITLE-ABS-KEY%28Applying+Privacy+Patterns+to+the+Internet+of+Things+Architecture%29&relpos=1&citeCnt=0&searchTerm=)

J

P

Fysarakis et al. (2019)

2019

Architectural patterns for secure IoT orchestrations (https://ieeexplore.ieee.org/document/8766425/)

C

P

Tiburski et al. (2019)

2019

Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices (https://ieeexplore.ieee.org/document/8647115)

J

A

Zhang et al. (2019)

2019

Overview of IoT security architecture (https://ieeexplore.ieee.org/document/8923665/)

C

A

Karmakar et al. (2019)

2019

SDN enabled secure IoT architecture (https://ieeexplore.ieee.org/document/8717819/)

C

A

Durresi et al. (2019)

2019

Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring (https://link.springer.com/article/10.1007/s12652-018-0759-6)

J

A

Jerald et al. (2019)

2019

Secured architecture for integrated IoT enabled smart services (https://www.scopus.com/record/display.uri?eid=2-s2.0-85073499499&origin=resultslist&sort=plf-f&src=s&st1=Secured+architecture+for+integrated+IoT+enabled+smart+services&st2=&sid=4c4a3ce90627aab79cc656fe0eed1fc2&sot=b&sdt=b&sl=77&s=TITLE-ABS-KEY%28Secured+architecture+for+integrated+IoT+enabled+smart+services%29&relpos=0&citeCnt=0&searchTerm=)

J

A

Petroulakis et al. (2019)

2019

SEMIoTICS architectural framework: end-to-end security, connectivity and interoperability for industrial IoT (https://ieeexplore.ieee.org/document/8766399/)

C

A

Syed et al. (2018)

2018

A misuse pattern for DDoS in the IoT (https://dl.acm.org/doi/abs/10.1145/3282308.3282343)

C

P

Witti and Konstantas (2018)

2018

A secure and privacy-preserving Internet of Things framework for smart city (https://dl.acm.org/doi/abs/10.1145/3301551.3301607)

C

A

Pahl et al. (2018)

2018

An architecture pattern for trusted orchestration in IoT edge clouds (https://ieeexplore.ieee.org/document/8364046)

C

P

Zhu and Badr (2018)

2018

Fog computing security architecture for the Internet of Things using blockchain-based social networks (https://ieeexplore.ieee.org/document/8726571)

C

A

Schuß et al. (2018)

2018

IoT device security the hard(ware) way (https://dl.acm.org/doi/abs/10.1145/3282308.3282329)

C

P

Alphand et al. (2018)

2018

IoTChain: a blockchain security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/8377385)

C

A

Pacheco et al. (2019)

2018

Security framework for IoT cloud services (https://ieeexplore.ieee.org/document/8612808/)

C

A

Lee and Law (2017)

2017

A case study in applying security design patterns for IoT software system (https://ieeexplore.ieee.org/document/7988402/)

C

P

Ye and Qian (2017)

2017

A security architecture for networked Internet of Things devices (https://www.scopus.com/record/display.uri?eid=2-s2.0-85046455493&origin=resultslist&sort=plf-f&src=s&st1=A+Security+Architecture+for+Networked+Internet+of+Things+Devices&st2=&sid=69f79eb51b98090742db2d001e68b1e9&sot=b&sdt=b&sl=79&s=TITLE-ABS-KEY%28A+Security+Architecture+for+Networked+Internet+of+Things+Devices%29&relpos=12&citeCnt=4&searchTerm= )

C

A

Pacheco et al. (2018)

2017

IoT security framework for smart water system (https://ieeexplore.ieee.org/document/8308438/)

C

A

Ntuli and Abu-Mahfouz (2016)

2016

A simple security architecture for smart water management system (https://www.sciencedirect.com/science/article/pii/S1877050916302721)

J

A

Pacheco et al. (2016)

2016

IoT security development framework for building trustworthy smart car services (https://ieeexplore.ieee.org/document/7745481/)

C

A

Lessa dos Santos et al. (2015)

2015

A DTLS-based security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/7405613/)

C

A

Vučinić et al. (2015)

2015

OSCAR: object security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/6918975)

J

A

Ur-Rehman and Zivic (2015)

2015

Secure design patterns for security in smart metering systems (https://ieeexplore.ieee.org/document/7579841/)

C

P

Garcia-Morchon et al. (2013)

2013

Securing the IP-based internet of things with HIP and DTLS (https://dl.acm.org/doi/abs/10.1145/2462096.2462117)

C

A

Goncalves et al. (2013)

2013

Security architecture for mobile E-health applications in medication control (https://ieeexplore.ieee.org/document/6671901/)

C

A

  1. \(^{\mathrm {v}}\)Venue type: J = Journal (11), C = Conference (25)
  2. \(^{\mathrm {f}}\)Focus: P = pattern (7), A = Architecture (29)
  3. * sorted by year of publication