Understanding security requirements and challenges in Internet of Things |
Hameed et al. [30] |
2019 |
Security vulnerabilities are classified; challenges, existing solutions and open research issues are highlighted. |
Survey on blockchain for Internet of Things |
Wang et al. [40] |
2019 |
Blockchain data structure and consensus protocol enhancement related existing works. |
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT |
Sengupta et al. [11] |
2019 |
Categorize IoT attacks and countermeasures; Detailed IoT and IIoT application-specific blockchain-based solutions. |
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations |
Neshenko et al. [26] |
2019 |
IoT taxonomy, effects and remediation. |
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices |
Meneghello et el. [35] |
2019 |
The security measures used by the most prevalent IoT communication protocols, as well as their flaws. |
Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey |
Rafique et al. [37] |
2020 |
SDN and edge computing for limited resources computed intensive tasks. |
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security |
Al-Garadi et al. [27] |
2020 |
IoT security threats and solutions using machine learning and deep learning. |
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey |
Sharma et al. [28] |
2020 |
Threats and countermeasures comparison of existing works for Smart Mobile-Internet of Things. |
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things |
Fernández-Caramés et al. [31] |
2020 |
Comparison of traditional and quantum security vulnerability and impacts. |
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues |
Stoyanova et al. [32] |
2020 |
Discussed present challenges and solution of IoT forensics. |
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems |
Chettri et al. [33] |
2020 |
5G layers, effect of 5G on IoT and review on low-power wide-area network for 5G. |
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies |
Friha et al. [38] |
2021 |
Emerging technology like SDN, NFV, Blockchain in the smart agriculture related application. |
A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges |
Sadawi et al. [41] |
2021 |
Challenges and attacks resistance using blockchain technology. |
Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive Survey |
Song et al. [36] |
2021 |
How IoT can be applied in smart logistics. |
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things |
Alwarafy [39] |
2021 |
Improvement of data processing and resistance of attacks using edge-computing. |
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey |
Khan et al. [34] |
2021 |
Discussed IoT architecture and lightweight cryptographic protocols. |
Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey |
Khor et al. [42] |
2021 |
Discuss the blockchain technology solutions and how it can be used in resource constraint devices. |
Machine Learning-Based Security Solutions for Healthcare: An Overview |
Arora et al. [43] |
2022 |
Healthcare security solutions using machine learning. |
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey |
Barua et al. [29] |
2022 |
Security threats, taxonomy and solutions for Bluetooth based attack. |
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system |
Gaurav et al. [44] |
2022 |
Machine learning based malware detection in the IoT network. |
This Paper
|
- |
- |
Provided overview and comparison of IoT and IoE network; Provided overview of different IoT applications; Details discussion of IoT taxonomy, effects, and countermeasures; Centralized and blockchain based existing security solutions discussion in depth of IoT applications. |