Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A security survey of middleware for the Internet of Things

View through CrossRef
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. The purpose of this paper is to review the current literature on the challenges and approaches to security and privacy in the Internet of Things, with an especial focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we look at the general security and privacy challenges around IoT. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. Finally, we draw a set of conclusions and identify further work in this area.
Title: A security survey of middleware for the Internet of Things
Description:
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures.
The purpose of this paper is to review the current literature on the challenges and approaches to security and privacy in the Internet of Things, with an especial focus on how these aspects are handled in IoT middleware.
We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework.
The paper is composed of three main sections.
Firstly, we look at the general security and privacy challenges around IoT.
Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches.
Finally, we draw a set of conclusions and identify further work in this area.

Related Results

Context-specific middleware specialization techniques for optimizing software product-line architectures
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLAs) are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts, ...
A survey of secure middleware for the Internet of Things
A survey of secure middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This pap...
Middleware Technologies for Ubiquitous Computing
Middleware Technologies for Ubiquitous Computing
Middleware handles many important functionalities for ubiquitous computing. The authors distinguish various middleware technologies providing key elements for all applications‘ req...
Novel architectures and strategies for security offloading
Novel architectures and strategies for security offloading
Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects...
Middleware Solutions for the Internet of Things: A Survey
Middleware Solutions for the Internet of Things: A Survey
The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (I...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Cloud Security in Middleware Architecture
Cloud Security in Middleware Architecture
The new Internet of Things (IoT) has increased the need for computing, connectivity, and storage capacities as the amount of sensitive data grows. Since it provides on-demand acces...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...

Back to Top