0% found this document useful (0 votes)
21 views

Systematic Mapping Study

This document summarizes a research paper on security and privacy concerns in Internet of Things (IoT). It discusses: 1) The rapid growth of connected devices and how IoT is enabling new applications across industries. 2) Privacy concerns remain a major challenge in IoT research as sensitive data is often shared over unsecured channels. 3) The paper aims to understand ongoing research topics, issues, and future directions related to IoT security through a systematic mapping study of 24 research papers classified based on contribution type, research type, security aspects, and approaches.

Uploaded by

nasersuliman.07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Systematic Mapping Study

This document summarizes a research paper on security and privacy concerns in Internet of Things (IoT). It discusses: 1) The rapid growth of connected devices and how IoT is enabling new applications across industries. 2) Privacy concerns remain a major challenge in IoT research as sensitive data is often shared over unsecured channels. 3) The paper aims to understand ongoing research topics, issues, and future directions related to IoT security through a systematic mapping study of 24 research papers classified based on contribution type, research type, security aspects, and approaches.

Uploaded by

nasersuliman.07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/345897402

IoT Security and privacy concern:� A Systematic Mapping Study

Article in International Journal of Hyperconnectivity and the Internet of Things · November 2020

CITATIONS READS
0 502

1 author:

Naveed Akhtar
NFC Institute of Engineering and Technology Multan, Pakistan
96 PUBLICATIONS 1,162 CITATIONS

SEE PROFILE

All content following this page was uploaded by Naveed Akhtar on 24 November 2020.

The user has requested enhancement of the downloaded file.


Security in the internet of Things: A systematic Mapping Study

Security in the internet of Things: a systematic


Mapping Study

OMER AZIZ1, NAVEED AKHTER2, NAEEM ASLAM.3


1
School of System and Technology, University of Management and Technology: Lahore 54770,Pakistan

2
Department Computer Science, NFC Institute of Engineering and Technology, Multan 60000,Pakistan

Corresponding author: Omer Aziz ([email protected])

ABSTRACT The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the
time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and
development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that
2000, we are witnessing a new generation of related objects. A massive wide variety of heterogeneous sensors may also
accumulate and dispatch touchy facts from an endpoint to a global community on the Internet. Privacy worries in Iot stay
essential problems in the research. This paper aims to understand and additionally grant continuing doe’s research topic,
challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the
way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and
their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they
categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints
on the possible route for future research.

INDEX TERMS Systematic Mapping Study (SMS), Internet of Things (Iot), Classification, Criteria.

I. INTRODUCTION
The rate of partner material contraptions in the region of us to the Iot is perhaps the great driver of the extraordinary most impressive
Internet is extending quickly. As proven by way of a progressing features of development, for instance, 5G [3]. 5G and Iot are finally,
Gartner statement, existing will exist about8.4 billion associated after right around three decades, making the unrivalled imaginative
factors international in 2020. This variety is structured to create and quick of EngravingWeiser a reality. The Worldwide Principles
to20.4 billion by using 2022 [1]. The utilization of the internet of Activity characterizes [5] the Iot as "a world framework for the
things functions is developing inside all bit of the earth. The facts society, empowering most recommended choices with the
noteworthy riding nations inside the fuse Western and Europe, and information of way of interconnecting completely on current and
North America, and China [1]. The quantity of computer to desktop Evolving interoperable data and Discussion Innovations". This
(M2M) affiliations depended upon creating beginning 5.6 billion restricts however the regular Web "things, for example, laptop and
every 2016 to 27 billion out of 2024 [1]. This jump in numbers PC, the Iot definition consists of components, for example, vehicles,
itself pronounces Iot to be one of the most important predicted attire, and even structures. By interfacing every one of these
markets that ought to shape an institution of the broadening devices8quintessential for constant presence to the Web, new
mechanized economy The Iot commercial enterprise is dependent protection troubles emerge.
upon to create similarly as earnings from $892 billion every 2018 to
$4 trillion through 2025 [2]. M2Maffiliations unfold a broad extent :
of makes use of like sharp city networks brilliant condition, smart
systems, sharp retail, canny developing, and many others [3].
Figure 1indicates the past, current, and future graph of Iot.
Naveed Akhter (Internet of things)

Application of Iot: Iot Security Objective:


There are five applications in Iot Our objective is to measure however, privacy and security are
a. Health Monitoring managed in the completely different context of using IOT, such
b. Traffic monitoring as IOT application, Iot survey paper, and foggy environments.
c. Iot smart agriculture We tend to target analysis to research and to map research
d. Smart grid and energy saving studies that contain security and privacy considerations in the
e. Iot smart Home use of classification criteria. Therefore, we tend to conduct a
f. Iot industrial scientific mapping study to assess knowledge security strategies
IOT Architecture: and the technique of preserving privacy in the field of analysis.
Hardware: Meaning Physical Device We tend to target joint analysis to study research contributions
Cloud infrastructure: This is responsible for storage and and trends in IOT edge, Iot cloud, and fog environments.
processing receivedData. IOT security Scope :
Management App: To control an Iot device on the user side (for a a) Data mixing, cloud security auditing, responsibility for
Smartphone tablet pc) composite services, and therefore the impact of cloud
decentralization remain areas that require a lot of analysis to
provide a more secure Iot.
b) Privacy inside the IOT is of is the majority significant as the
plans use generally bringing together non-public private
information, such as healthiness information. A large amount
has been complete to protect users‘ private information, such as
information.
c) In adding together, important work has been done to get used
to present the protocol to IOT function or generate entirely
original ones for brightness cryptography and protected set of
connections broadcast.
Research objective
Our chosen study objective is using systematic mapping study
to identify the existing research-approach and future –approach
FIGURE 1. IOT Architecture and another is type of research and trend also identify the field
of publication year and publication channel.
Iot Layer: II. Literature Review
There are three Iot layer SLR in smart Farming:
a. Iot Network layer Systematic literature Review the developing interest for food as
b. Iot Perception layer far as feature and amount contain expanded the requirements
c. Iot Application Layer designed for industrialization and escalation in the farming
field. Internet of Things (Iot) is an extremely talented science
with the aim of is given that many modern options to update
Network Layer: discover, connect, as well as Translate Device, Research establishments and scientific businesses are
ended a network. consistently working to supply options and products using
Perception Layer: sensors, actuators, and devices interact with the Iot to tackle distinctive domains of agriculture. This paper
environment. affords a systematic literature review (SLR) by way of
Application Layer: information processing and storage space with surveying Iot applied sciences and their cutting-edge utilization
specialized examine and functionality For Users. in different application domains of the agriculture sector. The
underlying SLR has been compiled via reviewing research
articles posted in well-reputed venues between 2006
and 2019. A whole of sixty-seven papers was carefully chosen
thru a systematic method and labeled accordingly. The most
important aim of this SMS is the series of all applicable lookup
on Iot farming applications, sensors/devices, verbal exchange
protocol, and community sorts.

FIGURE 2. IOT Layer


Naveed Akhter al.: Research Trends in Iot application

III. RESEARCH METHODOLOGY


SLR in smart Healthcare:
[32][33] The Internet of Things (Iot) is a system that integrates Systematic Mapping Study:
bodily things, software programs, as well as hardware en route for There are two main approaches to conduct literature reviews that are
engage with every other. The aging of the population, scarcity of “SM S” and“SLR”. If the researcher aims to identify, classify, and
healthcare resources, and rising scientific expenses make Iot based evaluate results to respond to a specific research question
applied sciences fundamental to be tailor-made to tackle these “Systematic Literature Reviews” is the adequate approach but if he
challenges in healthcare. This systematic literature evaluation has seeks to answer multiples research questions “Systematic Mapping
been carried out to decide the primary utility location of Iot in Study” is the best one. In this paper, we have conducted the formal
healthcare, aspects of Iot structure in healthcare, most essential guidelines of Systematic Mapping Study from Petersen et al. [5]
performed in five steps. The outcome from each step gives the input
applied sciences in Iot, traits of cloud-based architecture protection,
for the next step. SMS starts with the initial research questions built
and interoperability problems in Iot structure and effects, and up to provide a general scope for the study used to find out research
challenges of Iot in healthcare. Sixty applicable papers, posted papers (step 2) from the selected digital libraries (according to the
between 2000 and 2016, have been reviewed and analyzed. This research fields).In the next step, the screening process starts with a
evaluation printed that domestic healthcare providers used to be one set of inclusion and exclusion Criteria to select relevant papers (step
of the major software areas of Iot in healthcare. Cloud-based 3). Finally, the key wording process (step 4)enables classification
architecture, with the aid of presenting first-rate flexibility and and data extraction (step 5) which would have to answer the
scalability, has been deployed in most of their viewed studies. research questions.
Communication applied sciences inclusive of Wi-Fi constancy (Wi-
A. RESEARCH OBJECTIVES
Fi), Bluetooth, radio-frequency identification (RFID), and Low-
Power Wireless Personal Area Networks (Low PAN) had been often Our chosen study objective is using systematic mapping study to
used in exclusive Iot models. The research involving the safety and identify the existing research-approach and future –approach and
interoperability troubles in Iot structure in fitness is nonetheless low another is type of research and trend also identify the field of
in number. With appreciate to the most essential consequences of Iot publication year and publication channel.
in healthcare, this covered capacity of records exchange, reducing
continue to be of hospitalization and healthcare costs. The essential B. Define the Research Question
challenge of Iot in healthcare had been safety and privateness
The general purpose of the research question in our learning is to
difficulty.
better understand the solution calculated to solve the Iot protection
Security in the internet of things: A systematic Mapping system struggle, such as the problems are identified. For a detailed
Our contribution is that a systematic mapping study in iot security. overview of this subject, the methodical plan study deal with six
This paper aims to understand and additionally grant continuing investigates question (RQ). Table 1are presents the six QRs with
research topic, challenge, and Future Direction related to Iot their matching motivation. These question motivations allow us to
security. A systematic mapping finds out about (SMS) is thus categorize present research at Iot Security and recognize future
research plans in the field. Designed for this learns some lookup
utilized on the way to organize the chosen Articles into the following
queries used to be asked, and multiple assessments reviewed. The
classification: contribution type, Type of Research, Iot Security, and study strives to reply to numerous queries that lead to higher
their approach. We take out an overall of twenty-four Articles in thoughtful ideas of lookup and future directions. Mainly, the learn
support of this systematic discover out about also they about tries to reply to the subsequent questions.
categorize the following described criterion. The findings of this
SMS are mentioned and the researcher was once given hints on the FIGURE 3: Research Methodology
possible route for future research
Naveed Akhter al.: Research Trends in ESB Applications

No# Research Question Motivation Then we used that search string above in the major search engines for
academic studies, which are ACM, DBLP, Google Scholar, IEEE,
Science Direct, and Springer. For each digital library, according to their
RQ#1 Which Publication To classify the search search rules, we did some customization to adapt our generic search
channel is in best publication sources string. The most recent collection is the function of security control in
Iot, like "avoid overload". All these chains are combined. To form
Iot Research? can be used. string through variation at the same time as combine search terms with
the reasonable operator AND and OR.IEEE Explore, The Research Plan
RQ#2 Which Type of Search To classify type of ACM Digital Library, Springer Link, and Science Direct databases.
During a search, indexing, and classification of a large quantity of the
in Iot Application? Search in Iot reference, multiple duplicates the references come in their place due to
the large variations Reference indexing in different databases.
RQ#3 What type of Security Find out the overview
Keyword Search Strings
and privacy issue in of studies on security
IOT and confidentially at Iot

RQ#4 How to improve Iot Which define ("the Internet of Things" OR "Iot") AND
Security?
improvement technique Set #1 ("security" OR "privacy")

Set #2 (" the Internet of Things" OR "Iot") AND

("Test" OR "Quality" OR "Security"


Table 1 Research Question
C.Search Scheme/conduct a research Set #3 (" the Internet of Things" OR "Iot") AND
a. Conduct all research papers.
b. Select the most related paper. ("protection" OR "security" OR “authentication"
c. Search for the primary study
d. Use research string in scientific Dataset/Database. O "authorization " O "privacy"
e. We check the keyword, title, abstracts field within the
database
OR "privacy" OR "Test data" OR "security")
D. SEARCH STRATEGY
Set #4 (" the Internet of Things" OR "Iot") AND ("Proof" OR "
According to our research questions, we have built up our
Search Strings formulated using general terms with AND clause
as “IOT AND (security and privacy)”. We adopted the use of Proof" OR "Proof" O "security" O secure" O
Boolean operators such as “AND” to focus our search only on
specific subjects. Therefore, we have restricted our search items "Performance" OR "Security" OR "Confidentiality")
to select from digital libraries only scientific papers, with as the
specified keywords related to security and privacy in IOT.
Set #5 (" the Internet of Things" OR "Iot") AND

("Test" OR "security" OR privacy" O ""

OR "privacy OR "Security" OR "Confidentiality"

OR "Benchmark")

Table 2: Search Indexing


.
Naveed Akhter al.: Research Trends in IOT Applications

Table 3: Search String used in Scientific Libraries F. Paper selection criteria


The archives originate via they seem to be for strings had been
Data Base Name Search Strings chosen or eliminate following the name, the précis, and the grasp
of the whole text. For the period of this collection, the protection
Google Scholar Both 2&3 of the papers was once additionally taken into account. Also,
beautify the dependability of this procedure and limit attainable
subjective series threats, this system used to be made via the first
IEEE Both 3&5 and 2nd writer as well as review by the different authors of this
learning. Some papers may additionally have was once chose nor
ACM Digital Library Both 2&4 eliminate primarily depend on the article title and article abstract.
However, studying the complete -textual content used to be
required for some articles. To decide if the position applies to the
Science Direct Both 3&4 collection. Within this systematic Mapping study, the archives
assembly the following paper has been elected:
Springer Link Both1 &3 1) Documents that deal with the privatives and protection thing of
Iot safety answer in typical terms.
2) Articles' focal point on a unique function of Iot security.
DBLP Both 1&4 3) Industrialized case study, anyplace protection factor are
discussed.
4) Approaches for the internet of things application and Security.
E .Table 3: inclusion and Exclusion Criteria used in selected 5) The full-text collection introduced into the chosen database.
article 6) Articles on hand with crammed reproduction on-line from 2015
towards 2020 The safety aspect, they reflect on consideration on
INCLUSION CRITERIA EXCLUSION CRITERIA all issue associated to the reliability, accuracy, the Iot solution, and
durability. Documents assembly the following standards had been
excluded:
IC1: Study with title Related to EC1:Paper in another 1) Papers now not introduced in English.
IOT. language than English 2) Documents now not precisely related to the potential of this
document.
3) Articles with no entire textual content handy in the chosen one
IC2: Studies Related to EC2:Paper without database
security in IOT. Abstract 4) Books and grey journalism.
5) Documents from the non-peer evaluation sources

IC3:Studies Related to EC3:Paper from workshop G.Quality Assessments


protection and confidentiality Feature evaluation is usually approved out in a methodical review
of the creative writing and also less in methodical map study. On
concern in IOT. the other hand, to improve or learn, literature of questionnaires
was also planned to access the excellence of the selected work.
IC4:Studies presenting safety EC4:Books The study contributes to the security of the IOT. Possible
responses were "of course yes (1) and negative not found No (0)
and also confidentiality moderates (0.5) The research currently an understandable
apprehension in IOT clarification of the safety problem of the IOT.
The plausible reply was once "yes (1)" incompletely (0.5), "no
environments (0)"
The research affords experimental results. Manageable responses
IC5:Studies about security and EC5:Studies about another had been "yes ((1)" and "no (0)" question was related to the
classification of the CORE conference on IT
privacy in IOT cloud issue in the IOT (A, B, C)
environments environment
For surveys, conferences, and workshops Ranking

IC6:Studies about safety and EC6:Paper out of scope (1.5) condition CORE has classified,
confidentiality in IOT fog Condition CORE B is classified.
0.5 (0.5) if CORE C is evaluated.
environments If it is not part of the CORE classification.

For journal Ranking

(2.5) is the rank for RQ1


(1.52) is the rank for RQ2
(0.5) is ranked for RQ3
(2) is ranked for RQ4
(1)is ranked for RQ5
(0) is no ranked RQ6
Naveed Akhter al.: Research Trends in Iot Application


• FIGURE 4 EXLUSION /EXCLUSION CRETRIA
Naveed Akhter al.: Research Trends in Iot Application

H. Data Extraction VI .RESULTS


This section describes the outcome associated with the
At this phase of the study, we extract information as of the device. Map the questions supplied in table 1. A few studies
chosen set of journal papers. This step expected in the had been selected to illustrate examples of the consequences
direction of plan and classify documents to allow us to of every RQs Results. We suppose that they are related and
manage the QR address inside Section III-A. In support of
create an important contribution to Iot security.
an enhanced group and a methodical run of work, we
produced a worksheet pattern (see table III) also with all the A. Selection Results
important information on all things. The sheet is a complete .
page through additional features than what has been initially A total of 220 articles tested in-depth, 196 articles have been
presented by [2], [6], and [3]. For all responsibility, we thrown away and Twenty – Four were subsequently decided
complete the page with ID article, journal title, journal year, on. The twenty -four gadgets diagnosed were analyzed to
names and country of author, position, and region of the
answer are explain on top of table 2 gives the list of those
investigation. To take out and examine the sequence
beginning the sheet, we take two guidelines, physical and selected. Documents with information about the outcomes
active origin. The centre of attention on software boundaries. of the overall category and your satisfactory control
classification result from their RQ.

Table 4: Data Extraction Template Classification


a. Apply on Primary Research paper
information point Value b. Publication Year
c. Publication Channel
d. Research type
learn Digit
e. Quality Assessment
identification f. A total score of each Paper
g. Research topic
Paper Name given name of the Paper
RQ 1: Which Publication channel is fundamental in Iot
Research?
writer Name Given name of Authors
Publication channel found in Systematic mapping study
Conference (8)(0.78)
Year of Calendar year
Journal (9)(0.98)
Publication Workshop (4)(0.48)
Case study (3)(0.34)
Paper channel:
Venue Name of Publication venue

State Name of the country each author


participate

Area of Research Knowledge Area of Research

Research Topic Main topic

Research problem The research problem addressed by


the study

Proposal Proposal solution to the problem

Contribution The main contribution of the


problem

Evaluation Benchmark adopted for evaluation


Process
FIGURE 5 PUBLICATION CHANNEL
Case Study Which case study used?

.
Naveed Akhter al.: Research Trends in ESB Applications Naveed Akhter.: Research Trends in Iot Applications

RQ2: what are the Research Type in Iot?


In systematic mapping study (SMS) identifying six types of
Research
a. Proposal study ( 4 )(0.45)
b. Comparative study (5 )(0.58)
c. Implementation & Evaluation- Research (1 )(0.21)
d. Experimental-Research (5 )(0.68)
e. Conceptual-research ( 4 )(0.48)
f. Analytical Research -study (5 )(0.59)

Research Type:

RQ3: Application found in Iot research?

In systematic mapping study selected article which found


FIGURE 6: TYPE OF RESEARCH application
a. Iot open sources (2)(0.02)
Publication Trend by year b. Iot (5)(0.76)
c. Iot smart Home (3)(0.35)
d. Iot smart farming(4)(0.5)
e. Iot industries (3)(0.4)
f. Iot health (5)(0.78)
g. Iot event Detection(2)(0.02)

FIGURE 7: TREND BY YEAR FIGURE 8: APPLICATION IN RESEARCH


Table 5: Classification Table selected Articles

Reference Paper. Paper Study Type Research Topic Application Approaches QualitAssessment Score
Year .Channel

(A) ( B)
(C)

[12] 2019 Conference Solution Design and Implement Iot open Framework 1.5 1 0 2.5
proposal Iot open source Source

[8] 2017 Workshop Experimental Security and Privacy Iot Iot smart Method 1 0.5 0 1.5
research smart Home Home

[18] 2019 Journal Analytical Test event Generation Iot event Method 1 1.5 0 2.5
Study Iot for Fall Detection Iot Detection
system

[20] 2013 Case Study Comparative- Iot in Mobile Iot Mobile Guideline 1 1 1 3
Study

[14] 2019 Conference comparative Iot Based Efficiency Iot smart app Method 1 0.5 1 2.5
-study Management

[9] 2018 Journal Experimental Implementation and Smart home Method 1 0 0.5 1.5
research

Evaluation Iot in smart


home
Naveed Akhter et al.: Research Trends in iot application

Table 6. Classification Table conti.....

Reference Paper. Paper Study Type Research Topic Application Approaches QualityAssessment Score

Year .Channel

A B C

[11] 2018 conference Research Iot based E-Business &Retail E-business Architecture 0 1 1 2
Proposal IoT

2017 Case study Experimental conceptual study Iot Education Model 0.5 0 0.5 1
research Iot Interconnecting Education

[21]

[15] 2018 conference comparative securing the IOT IOT Security Architecture 1 1 1 3
Study

[22] 2014 Workshop research Internet of thing Iot open Architecture 0 0.5 1 1.5
Proposal sources

Development

[5] 2016 Journal Analytical internet of thing in smart Iot smart Architecture 1 0.5 1 2.5
Study farming farming

[10] 2018 Journal Experimental Implementation and Smart home Method 0.5 1 0 1.5
research

Evaluation Iot in smart


home

[13] 2018 conference Conceptual- internet of thing challenge Guideline 1 1 0.5 2.5
Research and solution Iot security
open sources

[19] 2013 Case study Analytical- internet of thing in industry Method 1 0 1 2


Survey

[16] 2017 Journal Experimental- practical perspective Iot in iot 5G Framework 1 1 0.5 2.5
Study 5G
VOLUME 8, 2020
Naveed Akhter et al.: Research Trends in IOTApplications

Reference Paper. Paper Study Type Research Topic Application Approaches Quality Score

Year .Channel Assessment

A B C

[2] 2014 conference Research Proposal Iot challenges in smart Iot smart Framework 1 0.5 1 2.5
Grid Grid

[32] 2017 Journal Experimental Iot in Digital Health Iot Health Model 0.5 1 1 2.5
research

[15] 2013 conference comparative Study Challenges In Industrial Industrial Architecture 0.5 0.5 1 2
internet using IOT IOT

[23] 2014 Workshop research Proposal Iot architecture for Iot open Architecture 0.5 1 1 2.5
connected Cars sources

[28] 2016 Journal Analytical Study Iot using in wearable Iot devices Model 1 1 1 3
Devices

[6] 2018 Journal Comparative study Challenges in smart Smart Method 0.5 1 0 1.5
farming farming

[27] 2017 conference Conceptual- internet of thing Guideline 0.5 1 1 2.5


Research challenge and solution Iot security
open sources

[23] 2015 Workshop Analytical-Survey Survey internet of thing Industrial Guideline 0.5 0 1 1.5
in industry survey

[24] 2019 Journal Implementation and Security in IOT Iot security Framework 1 0.5 1 2.5
EvaluationResearch

31190 VOLUME 8, 2020


Naveed Akhter al.: Research Trends Iot Application

RQ3: What kind of security issue in Iot?


Table 7: Quality Assessment selected
Safety problems that you have raised through the lookup
Articles
neighbourhood in the latest years and how they had been classified.
Primary research I had 9 classes of concerns. For this SMS, they
have been then categorized into 4 first-rate subgroups recognize the
problem (Key factors – Environment restrictions, susceptible
Reference Total No devices, information privacy; Functional restrictions: enforcement
Score mechanisms, Dependencies between devices, identification,
Authentication, and
authorization; Control.
I) Environments Constraint:
[8][22][9][10][6][23] 1.5 6
ii) Data privacy
iii) Sources of threats
iv) Identification, authentication, and authorization:
V) Attacker Model
[24][27][23][32][2][12 2.5 11 vi) Legislative issue
][18][14][5][13][16] vii) vulnerable devices
Viiii) Cross-device dependencies

[28][15][20][21][3][25 3 7 RQ4: What kind of solution to improve Security?


][4]
Trust Management
Authentication
The quality assessment score for each selected study listed Privacy solution
in table 7. Approximately 56% of the selected study hold
over average score, 25% hold average score, and 9% hold Policy enforcement
the lower score. This quality assessment could iot Security or Fault Tolerance
application researchers and practitioner to select the relevant Secure Communication
papers based on the criteria Secure Routing
DDoS prevention
V. DISCUSSION Spam prevention
The most frequent is privateness concern, recognition,
Regulatory solutions
verification, and authorization issues, and requirements of
administration (e.g. application). Confidentiality on the
internet of things is of extreme significance; due to the fact, VII. FUTURE DIRECTION
the units use to acquire personal and private information, such Our future work will be to entire this work by using writing a survey
as fitness Data a great deal has been accomplished to shield
users' exclusive information, as private as well as bodily to examine as an lot as feasible options to assurance and keep
data(i.e. a authenticate with statistics that a consumer confidentiality in the Iot environment. Finally, the more than one Iot
remember, p. a password), ii) the customers themselves assault vectors are disturbing. Besides the cutting-edge Internet
knowledge-based authentication with clever in performance threats, several new vectors have been introduced. Opening and the
cards or get admission to in performance cards and iii) bodily
traits [18]. Based on the find out about these results, the most community environment of a lot of Iot structures make them
lacking component of Iot protection it is presently especially susceptible to hateful attacks. This is accentuated by way
authentication and authorization. The growing variety of Iot of frequently negative protection deployed on the gadgets
units in users’ day by day lives makes authentication. themselves. Communication via radio waves is in all likelihood of
many sorts of attacks, from spying to direct Do’s attacks. Lack of
VI. CONCLUSION
The article introduced an SMS to learn about summarizing the implementation of the techniques makes it even greater severe,
current lookup in IOT. Out of 265 studies, 220 works have developing extra strain to make structures as fault-tolerant as
been recognized between 2011 and 2020 out of Twenty-four possible. If protection stays a serious hassle in Iot should probably
which had been chosen and labelled following 5 criteria: kind stop the adoption of science via cease customers and consequently
of research, empirical type, kind of approach, pastime and gradual the floor development. Also, look up and evaluate efforts are
find out about plans for the iot. Sour publication trends have wanted to assist system manufacturers, regulators, and performers to
additionally been identified. Results bought confirmed that
prioritize efforts whilst enhance Iot safety strategies By identifying,
growing interest used to be paid to the protection of IOT
inspecting, and classifying the publications, we have carried out a
2017. About half of the articles chosen seemed in workshops,
and solely a small number of articles had reached the maturity systematic mapping find out about for thematic analysis, tendencies,
of a journal publication. The two major sorts of lookup and future work on protection and confidentiality at IOTambient.
determined had been trip papers and proposed solutions. A 220 publications had been selected, solely fifty-four types of
total of 24 papers are selected. research had been deemed relevant according to the inclusion-
exclusion standards that we define. to check present-day
contributions tolookup and your future trends.
REFERENCES
[1] Stankovic, John A. "Research directions for the internet of things."
IEEE Internet of ThingsJournal 1.1 (2014): 3-9.7. [25] A. Zanella, N. Bui, A. P. Castellani, L. Vangelista, and M. Zorzi,
[2] Atzori, Luigi, Antonio Iera, and GiacomoMorabito. "The internet of “Internet of things for smartcities,” IEEE Internet of Things Journal, vol.
things: A survey." Computernetworks 54.15 (2010): 2787-2805. 1, no. 1, pp. 22–32, 2014
[3] S. Latre, P. Leroux, T. Coenen, B. Braem, P. Ballon, and P. [26]A. Krylovskiy, M. Jahn and E. Patti, ”Designing a Smart City Internet
Demeester,´ “City of things: Anintegrated and multi-technology of Things Platform withMicroservice Architecture,” 3rd Int’l Conf. on
testbed for iot smart city experiments,” in IEEE ISC2 2016. IEEE, Future Internet of Things and Cloud, 2015, pp. 25-30.
2016, pp. 1 –8. doi: 10.1109/FiCloud.2015.55
[4] Z. K. Aldein Mohammeda and E. S. Ali Ahmed, ―Internet of [27] Khanna, D. (2019). Internet of Things Challenges and Opportunities.
Things Applications, Challenges “International Journal ForTechnological Research In Engineering”
and Related Future Technologies,‖ no. February, 2017.
OMER AZIZ Received theM.S.degree in computer
[5] A. Whitmore, A. Agarwal, and L. Da Xu, ―The Internet of science from the National College of Business
Things—A survey of topics and trends,‖ Inf. Syst. Front., vol. 17, no. 2, Administration and Economics, Lahore, Pakistan,
pp. 261 – 274, 2015. and the Ph.D. degree in computer science from the
[6] B. L. R. Stojkoska and K. V Trivodaliev, ―A review of Internet of University of Management and Technology,
Things for smart home:Challenges and solutions,‖ J. Clean. Prod., vol. Lahore. He is currently working as a Lecturer with
the Department of Computer Science, NFC
140, pp. 1454–1464, 2017.. Institute of Engineering and Technology, Multan
[7] R. Davies, ―The Internet of Things opportunities and challenges,‖ .He has 14 years of professional experience in
Eur. Parliam. Res. Serv.,2015. education and industry. He developed software
[8] M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, ―Research on applications, websites, and mobile application for
the architecture of Internet ofThings,‖ ICACTE 2010 - 20114 3rd Int. different companies around the globe. He has
strong analysis and software architecture design
Conf. Adv. Comput. Theory Eng. Proc., vol. 5, pp. 484–487,2010 skills
. [9] M. A. Razzaque, M. Milojevic-Jevric, A. Palade, and S. Cla, according to the emerging software market
―Middleware for internet of things: A survey,‖ IEEE Internet Things demand of data science, machine learning, cross
J., vol. 3, no. 1, pp. 70–95, 2016. platform, and artificial intelligence.
.[10] M. Ammar, G. Russello, and B. Crispo, ―Internet of Things: A
survey on the security of IoTframeworks,‖ J. Inf. Secur. Appl., vol. 38, NAVEED AKHTER Received the BS Degree in
pp. 8–27, 2018. 61 computer Software Engineering from Foundation
[11] M. Conti, A. Dehghantanha, K. Franke, and S. Watson, ―Internet University Rawalpindi.
of Things security andforensics: Challenges and opportunities,‖ Futur. He is currently pursuing the M.S. degree
Gener. Comput. Syst., vol. 78, pp. 544–546, 2018. in computer science with the NFC Institute of
[12] B. Xu, L. Da Xu, H. Cai, C. Xie, … J. H.-I. T. on, and U. 2014, Engineering and Technology, Multan, Pakistan.
Ubiquitous data accessing method in IoT-based information system for His research areas include big data, the Iot, and
Software design Architecture, Software Quality
emergency medical services,‖ ieeexplore.ieee.org,2014..
testing
[13] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, ―Future internet:
The internet of things architecture, possible applications and key
challenges,‖ Proc. - 10th Int. Conf. Front. Inf. Technol. FIT 2012, pp.
257–260, 2012.
[14] A Zanella, N. Bui, a Castellani, L. Vangelista, and M. Zorzi,
―Internet of Things for SmartCities,‖ IEEE Internet Things J., vol. 1,
no. 1, pp. 22–32, 2014 NAEEM ASLAM received the Ph.D. degree in
bio informatics from the University of Veteri-
[15] B. L. R. Stojkoska and K. V Trivodaliev, ―A review of Internet
nary and Animal Sciences (UVAS), Lahore. He is
of Things for smart home: Challenges and solutions,‖ J. Clean. Prod.,
currently working as the Head of the Computer
vol. 140, pp. 1454–1464, 2017. Science Department, NFC Institute of Engineer-
[16] A. Al-Fuqaha et al., ―Internet of Things: A Survey on Enabling ing and Technology, Multan. He has 17 years of
Technologies, Protocols, andApplications,‖ vol. 17, no. 4, 2015. professional experience in education and industry
[17] M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, ―Research on worked on versatile projects. He is interested in
the architecture of Internet of Things,‖ ICACTE 2010 - 2010 3rd Int. data science, artificial intelligence, machine learn-
Conf. Adv. Comput. Theory Eng. Proc., vol. 5, pp. 484–487, 20114 ing, and bio informatics.
[18] V. Adat and B. B. Gupta, ―Security in Internet of Things: issues,
challenges, taxonomy, andarchitecture,‖ Telecommun. Syst., vol. 67,
no. 3, pp. 423–441, 201 8.
[19] P. Fremantle, ―A reference architecture for the internet of things,‖
vol. 0, p. 21, 2015.
[20] D. He, R. Ye, S. Chan, M. Guizani, and Y. Xu, ―Privacy in the
Internet of Things for Smart Healthcare,‖ IEEE Commun. Mag., vol.
56, no. 4, pp. 38–44, 2018
[21] I. Yaqoob et al., ―Internet of Things Architecture: Recent
Advances, Taxonomy, Requirements, and Open Challenges,‖ IEEE
Wirel. Commun., vol. 24, no. 3, pp. 10–16, 2017.
[22] A. L. Chan, G. G. Chua, D. Z. L. Chua, S. Guo, P. M. C. Lim, M.
Mak,and W. S. Ng, “Practical experience with smart cities platform
design,” in 4th IEEE WF-IoT 2018. IEEE, 2018, pp. 470–475.
[23] L Calderoni, D. Maio, and S. Rovis, “Deploying a
network of smart cameras for traffic monitoring on a ”city
kernel”,” Expert Syst. Appl.,vol. 41, no. 2, pp. 502–507,
2014
View publication stats

You might also like