A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019 - ieeexplore.ieee.org
… In this paper, a detailed survey of IoT security solutions in the existing literature is presented.
First of all, the fundamental constraints to achieve high levels for security in IoT applications …

[PDF][PDF] Modern IoT architectures review: A security perspective

AH Ahmed, NM Omar, HM Ibrahim - … ICT: Big Data, Cloud Security, 2017 - researchgate.net
… protocol stacks and security techniques. The need for … either to IoT applications or architectures
to maintain and secure largescale … IoT architectures and a fair discussion to their security

[HTML][HTML] A survey of IoT security based on a layered architecture of sensing and data analysis

H Mrabet, S Belguith, A Alhomoud, A Jemai - Sensors, 2020 - mdpi.com
… of current challenges facing IoT security solutions, such as the lack of … IoT devices. We also
explore the application of novel techniques to secure IoT, such as the use of Blockchain in IoT

[HTML][HTML] A decade of research on patterns and architectures for IoT security

T Rajmohan, PH Nguyen, N Ferry - Cybersecurity, 2022 - Springer
… Within our SLR, we want to include architectures for IoT security or architectures that
were specifically designed with IoT security concerns in mind. When architectures are not …

New security architecture for IoT network

F Olivier, G Carlos, N Florent - Procedia Computer Science, 2015 - Elsevier
architectures we propose a security model for the IoT. Firstly, the proposed security model
was designed to establish and secure … Secondly, we extended the proposed architecture in …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
… sent to publish/subscribe architecture that discover interesting relationships and data flows.
The FIWARE IoT architecture consists of an IoT services enablement chapter that manages …

IoT architectures and its security: a review

L Kakkar, D Gupta, S Saxena, S Tanwar - Proceedings of the Second …, 2021 - Springer
… Hence, each layer requires security protocols to accomplish a secured IoTIoT, its various
architectures, security conventions, technological, and security challenges in IoT architectures. …

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
… This paper provides a comprehensive study on IoT security issues, … security solutions
for each challenge in a three-layer architectural way, and finally in Section 5 we discuss IoT

Overview of IoT security architecture

J Zhang, H Jin, L Gong, J Cao… - 2019 IEEE Fourth …, 2019 - ieeexplore.ieee.org
… , services can be provisioned using centralized architectures, where … security and privacy
challenges. The purpose of this paper is to show that IoT three-layer security logic architecture

Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions

IH Sarker, AI Khan, YB Abushark, F Alsolami - Mobile Networks and …, 2023 - Springer
… We discuss IoT system architectures with different layers and the associated security issues
… we summarize the security issues through the overall architecture of an IoT system. Several …