Table 1 Related surveys.
Ref. no | Year | Security requirements | Attacks | Applications | Security protocols | Existing security technique | Integration of technologies | Evaluation tools | Performance evaluation parameters | Aspects considered |
|---|---|---|---|---|---|---|---|---|---|---|
2018 | ✓ | ✓ | ✓ | ✓ | ✓ | ★ | ✗ | ✗ | Existing IoT architectures | |
2019 | ✓ | ✓ | ✓ | ✓ | ✓ | ★ | ✓ | ✓ | Social relationships | |
2020 | ✓ | ✗ | ✓ | ✓ | ★ | ★ | ✗ | ✓ | Resource Discovery | |
2023 | ✓ | ✓ | ✓ | ✓ | ✗ | ★ | ✓ | ✓ | False service advertisement | |
2023 | ✓ | ✓ | ✓ | ✓ | ★ | ★ | ✓ | ✗ | Malicious code injection attack | |
2023 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ★ | ★ | Review of decentralization | |
2023 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ★ | ★ | Challenges and attacks in SIoT | |
2024 | ✓ | ✓ | ✓ | ★ | ✓ | ★ | ✗ | ★ | SIoT architecture | |
2024 | ✓ | ✓ | ✓ | ✓ | ✓ | ★ | ✓ | ✓ | Types of IoT attacks | |
2025 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Trust Management | |
Our survey | 2025 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Provides a survey on all aspects listed in the table. |