Fernández (2011) [41] |
Patterns |
Catalog of security patterns |
Not specific for IoT, Trade-offs not addressed |
Fernández (2020) [44] |
Patterns |
Pattern for a Secure IoT Architecture |
Trade-offs not addressed |
Fernández et al. (2020) [45] |
Patterns |
Secure Publish/Subscribe pattern for IoT |
Trade-offs not addressed |
Fernández et al. (2022) [47] |
Patterns |
Secure IoT Thing design pattern |
Trade-offs not addressed |
Fernández et al. (2022) [49] |
Patterns |
Abstract Security Patterns |
Not specific for IoT, Trade-offs not addressed |
Orellana et al. (2019) [50] |
Patterns |
Taxonomy for Security Patterns |
Trade-offs addressed only for case study |
Orellana et al. (2022) [1] |
Patterns |
Pattern for Secure Sensor Node |
Trade-offs not addressed |
Orellana et al. (2022) [51] |
Patterns |
Pattern for Secure Actuator Node |
Trade-offs not addressed |
Schumacher et al. (2013) [42] |
Patterns |
Security Patterns for IT systems |
Not specific for IoT, Trade-offs not addressed |
Bass et al. (2021) [55] |
Tactics |
Taxonomy for Security Tactics |
Not specific for IoT, Trade-offs not addressed |
Colesky et al. (2016) [67] |
Tactics |
Taxonomy for Privacy |
Not specific for IoT, Trade-offs not addressed, Privacy-centric |
Erder et al. (2021) [62] |
Tactics |
Taxonomy for Security Tactics |
Not specific for IoT, Trade-offs not addressed |
Fernández et al. (2015) [65] |
Tactics |
Taxonomy for Security Tactics |
Not specific for IoT, Trade-offs not addressed |
Rozanski and Woods (2011) [60] |
Tactics |
Taxonomy for Security Tactics |
Not specific for IoT, Trade-offs not addressed |
Ryoo et al. (2012) [66] |
Tactics |
Taxonomy for Security Tactics |
Not specific for IoT, Trade-offs not addressed |
Bashir et al. (2022) [73] |
Reference Architectures |
Reference architecture for IoT smart buildings |
Domain-specific, Not security-focused, Trade-offs not addressed |
ISO/IEC 30141 (2024) [34] |
Reference Architectures |
Reference Architecture for IoT |
Not security-focused, Insufficient Design Guidance, Trade-offs not addressed |
Szmeja et al. (2023) [74] |
Reference Architectures |
Reference Architecture for Next Generation IoT (NGIoT) |
Not security-focused, Trade-offs not addressed |
Syed et al. (2018) [79] |
Threat Modeling |
A Misuse Pattern for DDoS in IoT |
Focus on misuse, Trade-offs not addressed |