A survey of secure middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, wi...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2017-05-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-114.pdf |
id |
doaj-1ec18e6c13f0401cb2d32dab1919e6a0 |
---|---|
record_format |
Article |
spelling |
doaj-1ec18e6c13f0401cb2d32dab1919e6a02020-11-24T22:41:49ZengPeerJ Inc.PeerJ Computer Science2376-59922017-05-013e11410.7717/peerj-cs.114A survey of secure middleware for the Internet of ThingsPaul Fremantle0Philip Scott1School of Computing, University of Portsmouth, Portsmouth, United KingdomSchool of Computing, University of Portsmouth, Portsmouth, United KingdomThe rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.https://peerj.com/articles/cs-114.pdfInternet of ThingsSecurityPrivacyIoTMiddlewareSurvey |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Paul Fremantle Philip Scott |
spellingShingle |
Paul Fremantle Philip Scott A survey of secure middleware for the Internet of Things PeerJ Computer Science Internet of Things Security Privacy IoT Middleware Survey |
author_facet |
Paul Fremantle Philip Scott |
author_sort |
Paul Fremantle |
title |
A survey of secure middleware for the Internet of Things |
title_short |
A survey of secure middleware for the Internet of Things |
title_full |
A survey of secure middleware for the Internet of Things |
title_fullStr |
A survey of secure middleware for the Internet of Things |
title_full_unstemmed |
A survey of secure middleware for the Internet of Things |
title_sort |
survey of secure middleware for the internet of things |
publisher |
PeerJ Inc. |
series |
PeerJ Computer Science |
issn |
2376-5992 |
publishDate |
2017-05-01 |
description |
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area. |
topic |
Internet of Things Security Privacy IoT Middleware Survey |
url |
https://peerj.com/articles/cs-114.pdf |
work_keys_str_mv |
AT paulfremantle asurveyofsecuremiddlewarefortheinternetofthings AT philipscott asurveyofsecuremiddlewarefortheinternetofthings AT paulfremantle surveyofsecuremiddlewarefortheinternetofthings AT philipscott surveyofsecuremiddlewarefortheinternetofthings |
_version_ |
1725700663973773312 |