Skip to main content

Table 2 Application domains and security & privacy concerns from the primary studies

From: A decade of research on patterns and architectures for IoT security

Primary study #* f Domain Security P
C I Av AuthN AuthZ
Vithya Vijayalakshmi and Arockiam (2020) A Healthcare X X X X X X
Portal et al. (2020) A Industrial Environments   X X X X X
Karaarslan et al. (2020) A Laboratorium   X   X   X
Koshy et al. (2020) A Smart Home   X   X   X
Attia et al. (2019) A Healthcare X   X    X
Pacheco et al. (2019) A Cloud Services    X    X
Pacheco et al. (2018) A Smart Water System X X X X X  
Ntuli and Abu-Mahfouz (2016) A Smart Water System   X   X X  
Pacheco et al. (2016) A Smart Car X X    X  
Goncalves et al. (2013) A Healthcare    X X X  
Ur-Rehman and Zivic (2015) P Smart Metering X X     X
Vijayakumaran et al. (2020) A Generic X X   X X X
Perera et al. (2020) A Generic       X
Dhieb et al. (2020) A Generic     X X X
Koo et al. (2020) A Generic X X   X X  
Robles Enciso et al. (2020) A Generic X X   X X X
Park (2020) A Generic X X   X   
Tiburski et al. (2019) A Generic X X   X   
Zhang et al. (2019) A Generic     X X X
Karmakar et al. (2019) A Generic     X X  
Durresi et al. (2019) A Generic X    X   
Jerald et al. (2019) A Generic X X   X X X
Petroulakis et al. (2019) A Generic    X X   
Witti and Konstantas (2018) A Generic X X   X X X
Zhu and Badr (2018) A Generic     X X  
Alphand et al. (2018) A Generic   X    X X
Ye and Qian (2017) A Generic X X   X   
Lessa dos Santos et al. (2015) A Generic     X   
Vučinić et al. (2015) A Generic X X   X X  
Garcia-Morchon et al. (2013) A Generic X X   X X  
Pape and Rannenberg (2019) P Generic     X   X
Fysarakis et al. (2019) P Generic X X X    X
Syed et al. (2018) P Generic    X X X X
Pahl et al. (2018) P Generic X X   X   
Schuß et al. (2018) P Generic X X X X   
Lee and Law (2017) P Generic     X X  
Number of patterns and architectures that       
address the corresponding quality characteristic 19 22 10 29 20 18
  1. * The paper number is referenced from Table 1
  2. f, focus; P, pattern; A, architecture
  3. C, confidentiality; I, integrity; Av, availability; AuthN, authentication; AuthZ, authorization; P, privacy