Skip to main content

Table 8 All attributes identified from various sources of literature

From: Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review

Ref#

Security features

[40]

Confidentiality, Authentication, Access Control, Availability, Authorization, Auditing,

Trustworthiness, Integrity

[64]

Authentication, Key agreement, Privacy protection, Anti DDOS, Privacy, Encryption,

Platform protection, User access control

[79]

Resilience to attacks, Confidentiality, Availability, Authentication, Auditing, Access control, Non-repudiation, Anonymity, Reply protection, Integrity, Authorization, Privacy, Trust

[1]

Attack detection, Privacy, Confidentiality, R.R management, Secure routing

[74]

Confidentiality, Availability, Authorization, Identification, Integrity

[65]

Confidentiality, Availability, Integrity, Non repudiation, Continuity, Physical Security

[60]

Confidentiality, Integrity, Availability

[42]

Anonymity, Integrity, Availability, Non-repudiation, Authorization, Access control, Resiliency, Self-organization, Information Protection, Exception Handling

[43]

Identification, Lightweight Protocol, Permission, Cryptography, Data protection, Communication Security, Physical protection

[44]

Authentication, Access Control, Attack resilience,

[58]

Non Repudiation, Intrusion Detection Contextual integrity, Authentication, Access control, Authorization, Integrity,

[59]

Privacy, Tracking, Integrity, Authentication, Digital forgetting, Mutual trust

[61]

Resilience to attack, Client Privacy, Authentication, Access Control

[62]

Physical protection, User authentication, Network Monitoring, Secure key management Device authentication

[63]

Key Management, Policies, Confidentiality, Authentication, Light weight algorithm, Heterogeneity, Integrity, Availability,

[80]

Identity management, Resilience to attack, Data authentication, Access control, Secure data communication, Temper resistance, Availability, Secure storage, Secure content, Secure environment execution, Secure N/W Access, User identification, Client privacy

[75]

Theft resistance, Authorization, Cloud federated authentication

[41]

Access control, End to End security, Authorization, Authentication,