Skip to main content
. 2022 Feb 10;22(4):1361. doi: 10.3390/s22041361

Table 1.

Overview of related work.

Publication Published Summary
Noor et al. [5] 2019 A comprehensive overview of authentication and authorization research for years between 2016 and 2018.
Trnka et al. [6] 2018 Mapping study for authentication and authorization articles from 2012 to 2017.
Chanal et al. [8] 2020 Survey providing an overview of architectures, privacy and research challenges, and differences of solutions between domains.
Milovlaskaya et al. [7] 2019 Great overview of IoT back-end security issues, general hardware, and application security, along with a summary of IoT security management and security standards.
Al-Naji et al. [9] 2020 Focused survey on continuous authentication methods.
Tange et al. [10] 2020 Focused survey on industrial IoT security issues.