Skip to main content
. 2024 Nov 15;24(22):7314. doi: 10.3390/s24227314

Table 1.

Summary of approaches for designing secure IoT systems.

Reference Type Contributions Limitations
Fernández (2011) [41] Patterns Catalog of security patterns Not specific for IoT, Trade-offs not addressed
Fernández (2020) [44] Patterns Pattern for a Secure IoT Architecture Trade-offs not addressed
Fernández et al. (2020) [45] Patterns Secure Publish/Subscribe pattern for IoT Trade-offs not addressed
Fernández et al. (2022) [47] Patterns Secure IoT Thing design pattern Trade-offs not addressed
Fernández et al. (2022) [49] Patterns Abstract Security Patterns Not specific for IoT, Trade-offs not addressed
Orellana et al. (2019) [50] Patterns Taxonomy for Security Patterns Trade-offs addressed only for case study
Orellana et al. (2022) [1] Patterns Pattern for Secure Sensor Node Trade-offs not addressed
Orellana et al. (2022) [51] Patterns Pattern for Secure Actuator Node Trade-offs not addressed
Schumacher et al. (2013) [42] Patterns Security Patterns for IT systems Not specific for IoT, Trade-offs not addressed
Bass et al. (2021) [55] Tactics Taxonomy for Security Tactics Not specific for IoT, Trade-offs not addressed
Colesky et al. (2016) [67] Tactics Taxonomy for Privacy Not specific for IoT, Trade-offs not addressed, Privacy-centric
Erder et al. (2021) [62] Tactics Taxonomy for Security Tactics Not specific for IoT, Trade-offs not addressed
Fernández et al. (2015) [65] Tactics Taxonomy for Security Tactics Not specific for IoT, Trade-offs not addressed
Rozanski and Woods (2011) [60] Tactics Taxonomy for Security Tactics Not specific for IoT, Trade-offs not addressed
Ryoo et al. (2012) [66] Tactics Taxonomy for Security Tactics Not specific for IoT, Trade-offs not addressed
Bashir et al. (2022) [73] Reference Architectures Reference architecture for IoT smart buildings Domain-specific, Not security-focused, Trade-offs not addressed
ISO/IEC 30141 (2024) [34] Reference Architectures Reference Architecture for IoT Not security-focused, Insufficient Design Guidance, Trade-offs not addressed
Szmeja et al. (2023) [74] Reference Architectures Reference Architecture for Next Generation IoT (NGIoT) Not security-focused, Trade-offs not addressed
Syed et al. (2018) [79] Threat Modeling A Misuse Pattern for DDoS in IoT Focus on misuse, Trade-offs not addressed