65
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A survey of secure middleware for the Internet of Things

      research-article
      ,
      PeerJ Computer Science
      PeerJ Inc.
      Internet of Things, Security, Privacy, IoT, Middleware, Survey

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.

          Most cited references161

          • Record: found
          • Abstract: not found
          • Article: not found

          Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Elliptic curve cryptosystems

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A survey of trust and reputation systems for online service provision

                Bookmark

                Author and article information

                Contributors
                Journal
                peerj-cs
                peerj-cs
                PeerJ Comput. Sci.
                PeerJ Computer Science
                PeerJ Comput. Sci.
                PeerJ Inc. (San Francisco, USA )
                2376-5992
                8 May 2017
                : 3
                : e114
                Affiliations
                [-1] School of Computing, University of Portsmouth , Portsmouth, United Kingdom
                Article
                cs-114
                10.7717/peerj-cs.114
                6b6bbfd7-451f-4b5b-b188-bb65c688c2ae
                ©2017 Fremantle and Scott

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 16 July 2015
                : 11 April 2017
                Funding
                The authors received no funding for this work.
                Categories
                Computer Networks and Communications
                Embedded Computing
                Real-Time and Embedded Systems
                Security and Privacy
                World Wide Web and Web Science

                Computer science
                Security,Privacy,Survey,Middleware,Internet of Things,IoT
                Computer science
                Security, Privacy, Survey, Middleware, Internet of Things, IoT

                Comments

                Comment on this article