A survey of secure middleware for the Internet of Things
- Published
- Accepted
- Subject Areas
- Computer Networks and Communications, Embedded Computing, Real-Time and Embedded Systems, Security and Privacy, World Wide Web and Web Science
- Keywords
- Internet of Things, Security, Privacy, IoT, Middleware, Survey
- Copyright
- © 2017 Fremantle et al.
- Licence
- This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
- Cite this article
- 2017. A survey of secure middleware for the Internet of Things. PeerJ Preprints 5:e1241v2 https://doi.org/10.7287/peerj.preprints.1241v2
Abstract
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.
Author Comment
This updated version of the paper adds a new analysis based on Spiekermann and Cranor's Three Layer Privacy Model, as well as reviewing a further 59 papers published since the last analysis, together with an increase in the number of middlewares reviewed.