Vijayakumaran et al. (2020) | 2020 | A reliable next generation cyber security architecture for industrial internet of things environment (https://www.scopus.com/record/display.uri?eid=2-s2.0-85073370260&origin=resultslist&sort=plf-f&src=s&st1=A+reliable+next+generation+cyber+security+architecture+for+industrial+internet+of+things+environment&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=115&s=TITLE-ABS-KEY%28A+reliable+next+generation+cyber+security+architecture+for+industrial+internet+of+things+environment%29&relpos=0&citeCnt=2&searchTerm=) | C | A |
Vithya Vijayalakshmi and Arockiam (2020) | 2020 | A secured architecture for IoT healthcare system (https://www.scopus.com/record/display.uri?eid=2-s2.0-85083648091&origin=resultslist&sort=plf-f&src=s&st1=A+Secured+Architecture+for+IoT+Healthcare+System&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=63&s=TITLE-ABS-KEY%28A+Secured+Architecture+for+IoT+Healthcare+System%29&relpos=0&citeCnt=1&searchTerm=) | C | A |
Portal et al. (2020) | 2020 | An edge decentralized security architecture for industrial IoT applications (https://ieeexplore.ieee.org/document/9221176) | C | A |
Karaarslan et al. (2020) | 2020 | Design and implementation of SDN-based secure architecture for IoT-Lab (https://www.scopus.com/record/display.uri?eid=2-s2.0-85083427175&origin=resultslist&sort=plf-f&src=s&st1=Design+and+Implementation+of+SDN-Based+Secure+Architecture+for+IoT-Lab&st2=&sid=6def2778e8748aeeae199dcd24e81ae5&sot=b&sdt=b&sl=85&s=TITLE-ABS-KEY%28Design+and+Implementation+of+SDN-Based+Secure+Architecture+for+IoT-Lab%29&relpos=0&citeCnt=0&searchTerm=) | C | A |
Perera et al. (2020) | 2020 | Designing privacy-aware internet of things applications (https://www.sciencedirect.com/science/article/pii/S0020025519309120) | J | A |
Dhieb et al. (2020) | 2020 | Scalable and secure architecture for distributed IoT systems (https://ieeexplore.ieee.org/document/9140108) | C | A |
Koo et al. (2020) | 2020 | Security architecture for cloud-based command and control system in IoT environment (https://www.scopus.com/record/display.uri?eid=2-s2.0-85081588195&origin=resultslist&sort=plf-f&src=s&st1=Security+Architecture+for+Cloud-Based+Command+and+Control+System+in+IoT+Environment&st2=&sid=8baa12fe1401019180971c95019fe27a&sot=b&sdt=b&sl=98&s=TITLE-ABS-KEY%28Security+Architecture+for+Cloud-Based+Command+and+Control+System+in+IoT+Environment%29&relpos=0&citeCnt=1&searchTerm=) | J | A |
Robles Enciso et al. (2020) | 2020 | Security architecture for defining and enforcing security profiles in DLT/SDN-based IoT systems (https://www.scopus.com/record/display.uri?eid=2-s2.0-85082792671&origin=resultslist&sort=plf-f&src=s&st1=Security+architecture+for+defining+and+enforcing+security+profiles+in+DLT%2fSDN-based+IoT+systems&st2=&sid=8baa12fe1401019180971c95019fe27a&sot=b&sdt=b&sl=110&s=TITLE-ABS-KEY%28Security+architecture+for+defining+and+enforcing+security+profiles+in+DLT%2fSDN-based+IoT+systems%29&relpos=0&citeCnt=1&searchTerm=) | J | A |
Park (2020) | 2019 | Security architecture for secure multicast CoAP applications (https://ieeexplore.ieee.org/document/8974263) | J | A |
Koshy et al. (2020) | 2020 | Sliding window blockchain architecture for Internet of Things (https://ieeexplore.ieee.org/document/8974263) | J | A |
Attia et al. (2019) | 2019 | An IoT-blockchain architecture based on hyperledger framework for healthcare monitoring application (https://ieeexplore.ieee.org/document/8763849) | C | A |
Pape and Rannenberg (2019) | 2019 | Applying privacy patterns to the Internet of Things’ (IoT) architecture (https://www.scopus.com/record/display.uri?eid=2-s2.0-85054572626&origin=resultslist&sort=plf-f&src=s&st1=Applying+Privacy+Patterns+to+the+Internet+of+Things+Architecture&st2=&sid=94e759f4e7106d7f9b416c4471289e65&sot=b&sdt=b&sl=79&s=TITLE-ABS-KEY%28Applying+Privacy+Patterns+to+the+Internet+of+Things+Architecture%29&relpos=1&citeCnt=0&searchTerm=) | J | P |
Fysarakis et al. (2019) | 2019 | Architectural patterns for secure IoT orchestrations (https://ieeexplore.ieee.org/document/8766425/) | C | P |
Tiburski et al. (2019) | 2019 | Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices (https://ieeexplore.ieee.org/document/8647115) | J | A |
Zhang et al. (2019) | 2019 | Overview of IoT security architecture (https://ieeexplore.ieee.org/document/8923665/) | C | A |
Karmakar et al. (2019) | 2019 | SDN enabled secure IoT architecture (https://ieeexplore.ieee.org/document/8717819/) | C | A |
Durresi et al. (2019) | 2019 | Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring (https://link.springer.com/article/10.1007/s12652-018-0759-6) | J | A |
Jerald et al. (2019) | 2019 | Secured architecture for integrated IoT enabled smart services (https://www.scopus.com/record/display.uri?eid=2-s2.0-85073499499&origin=resultslist&sort=plf-f&src=s&st1=Secured+architecture+for+integrated+IoT+enabled+smart+services&st2=&sid=4c4a3ce90627aab79cc656fe0eed1fc2&sot=b&sdt=b&sl=77&s=TITLE-ABS-KEY%28Secured+architecture+for+integrated+IoT+enabled+smart+services%29&relpos=0&citeCnt=0&searchTerm=) | J | A |
Petroulakis et al. (2019) | 2019 | SEMIoTICS architectural framework: end-to-end security, connectivity and interoperability for industrial IoT (https://ieeexplore.ieee.org/document/8766399/) | C | A |
Syed et al. (2018) | 2018 | A misuse pattern for DDoS in the IoT (https://dl.acm.org/doi/abs/10.1145/3282308.3282343) | C | P |
Witti and Konstantas (2018) | 2018 | A secure and privacy-preserving Internet of Things framework for smart city (https://dl.acm.org/doi/abs/10.1145/3301551.3301607) | C | A |
Pahl et al. (2018) | 2018 | An architecture pattern for trusted orchestration in IoT edge clouds (https://ieeexplore.ieee.org/document/8364046) | C | P |
Zhu and Badr (2018) | 2018 | Fog computing security architecture for the Internet of Things using blockchain-based social networks (https://ieeexplore.ieee.org/document/8726571) | C | A |
Schuß et al. (2018) | 2018 | IoT device security the hard(ware) way (https://dl.acm.org/doi/abs/10.1145/3282308.3282329) | C | P |
Alphand et al. (2018) | 2018 | IoTChain: a blockchain security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/8377385) | C | A |
Pacheco et al. (2019) | 2018 | Security framework for IoT cloud services (https://ieeexplore.ieee.org/document/8612808/) | C | A |
Lee and Law (2017) | 2017 | A case study in applying security design patterns for IoT software system (https://ieeexplore.ieee.org/document/7988402/) | C | P |
Ye and Qian (2017) | 2017 | A security architecture for networked Internet of Things devices (https://www.scopus.com/record/display.uri?eid=2-s2.0-85046455493&origin=resultslist&sort=plf-f&src=s&st1=A+Security+Architecture+for+Networked+Internet+of+Things+Devices&st2=&sid=69f79eb51b98090742db2d001e68b1e9&sot=b&sdt=b&sl=79&s=TITLE-ABS-KEY%28A+Security+Architecture+for+Networked+Internet+of+Things+Devices%29&relpos=12&citeCnt=4&searchTerm= ) | C | A |
Pacheco et al. (2018) | 2017 | IoT security framework for smart water system (https://ieeexplore.ieee.org/document/8308438/) | C | A |
Ntuli and Abu-Mahfouz (2016) | 2016 | A simple security architecture for smart water management system (https://www.sciencedirect.com/science/article/pii/S1877050916302721) | J | A |
Pacheco et al. (2016) | 2016 | IoT security development framework for building trustworthy smart car services (https://ieeexplore.ieee.org/document/7745481/) | C | A |
Lessa dos Santos et al. (2015) | 2015 | A DTLS-based security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/7405613/) | C | A |
Vučinić et al. (2015) | 2015 | OSCAR: object security architecture for the Internet of Things (https://ieeexplore.ieee.org/document/6918975) | J | A |
Ur-Rehman and Zivic (2015) | 2015 | Secure design patterns for security in smart metering systems (https://ieeexplore.ieee.org/document/7579841/) | C | P |
Garcia-Morchon et al. (2013) | 2013 | Securing the IP-based internet of things with HIP and DTLS (https://dl.acm.org/doi/abs/10.1145/2462096.2462117) | C | A |
Goncalves et al. (2013) | 2013 | Security architecture for mobile E-health applications in medication control (https://ieeexplore.ieee.org/document/6671901/) | C | A |