Skip to main content
. 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433

Table 2.

Comparative analysis of related works.

Survey Citation Year Objective
Understanding security requirements and challenges in Internet of Things Hameed et al. [30] 2019 Security vulnerabilities are classified; challenges, existing solutions and open research issues are highlighted.
Survey on blockchain for Internet of Things Wang et al. [40] 2019 Blockchain data structure and consensus protocol enhancement related existing works.
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT Sengupta et al. [11] 2019 Categorize IoT attacks and countermeasures; Detailed IoT and IIoT application-specific blockchain-based solutions.
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations Neshenko et al. [26] 2019 IoT taxonomy, effects and remediation.
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices Meneghello et el. [35] 2019 The security measures used by the most prevalent IoT communication protocols, as well as their flaws.
Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey Rafique et al. [37] 2020 SDN and edge computing for limited resources computed intensive tasks.
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Al-Garadi et al. [27] 2020 IoT security threats and solutions using machine learning and deep learning.
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey Sharma et al. [28] 2020 Threats and countermeasures comparison of existing works for Smart Mobile-Internet of Things.
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things Fernández-Caramés et al. [31] 2020 Comparison of traditional and quantum security vulnerability and impacts.
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues Stoyanova et al. [32] 2020 Discussed present challenges and solution of IoT forensics.
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems Chettri et al. [33] 2020 5G layers, effect of 5G on IoT and review on low-power wide-area network for 5G.
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies Friha et al. [38] 2021 Emerging technology like SDN, NFV, Blockchain in the smart agriculture related application.
A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges Sadawi et al. [41] 2021 Challenges and attacks resistance using blockchain technology.
Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive Survey Song et al. [36] 2021 How IoT can be applied in smart logistics.
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things Alwarafy [39] 2021 Improvement of data processing and resistance of attacks using edge-computing.
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey Khan et al. [34] 2021 Discussed IoT architecture and lightweight cryptographic protocols.
Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey Khor et al. [42] 2021 Discuss the blockchain technology solutions and how it can be used in resource constraint devices.
Machine Learning-Based Security Solutions for Healthcare: An Overview Arora et al. [43] 2022 Healthcare security solutions using machine learning.
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey Barua et al. [29] 2022 Security threats, taxonomy and solutions for Bluetooth based attack.
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system Gaurav et al. [44] 2022 Machine learning based malware detection in the IoT network.
This Paper - - Provided overview and comparison of IoT and IoE network; Provided overview of different IoT applications; Details discussion of IoT taxonomy, effects, and countermeasures; Centralized and blockchain based existing security solutions discussion in depth of IoT applications.