Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A survey of secure middleware for the Internet of Things

View through CrossRef
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.
Title: A survey of secure middleware for the Internet of Things
Description:
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures.
This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware.
We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework.
The paper is composed of three main sections.
Firstly, we propose a matrix of security and privacy threats for IoT.
This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware.
Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches.
We utilise the requirements from the first phase to evaluate.
Finally, we draw a set of conclusions and identify further work in this area.

Related Results

Context-specific middleware specialization techniques for optimizing software product-line architectures
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLAs) are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts, ...
A security survey of middleware for the Internet of Things
A security survey of middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. The purp...
Middleware Technologies for Ubiquitous Computing
Middleware Technologies for Ubiquitous Computing
Middleware handles many important functionalities for ubiquitous computing. The authors distinguish various middleware technologies providing key elements for all applications‘ req...
Middleware Solutions for the Internet of Things: A Survey
Middleware Solutions for the Internet of Things: A Survey
The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (I...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Performance modeling of object middleware
Performance modeling of object middleware
The tremendous growth of the Internet [42] and the ongoing developments in the hardware and software industry have boosted the development of Information and Communication Technolo...
New approaches for resource management and job scheduling for HEP grid computing
New approaches for resource management and job scheduling for HEP grid computing
(English) The Large Hadron Collider (LHC) ALICE (A Large Ion Collider Experiment) experiment uses grid computing for its extensive data processing and analysis. The ALICE Grid is c...
Cloud Security in Middleware Architecture
Cloud Security in Middleware Architecture
The new Internet of Things (IoT) has increased the need for computing, connectivity, and storage capacities as the amount of sensitive data grows. Since it provides on-demand acces...

Back to Top