Table 1 Related surveys.

From: A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics

Ref. no

Year

Security requirements

Attacks

Applications

Security protocols

Existing security technique

Integration of technologies

Evaluation tools

Performance evaluation parameters

Aspects considered

1

2018

Existing IoT architectures

8

2019

Social relationships

3

2020

Resource Discovery

4

2023

False service advertisement

6

2023

Malicious code injection attack

7

2023

Review of decentralization

9

2023

Challenges and attacks in SIoT

5

2024

SIoT architecture

10

2024

Types of IoT attacks

2

2025

Trust Management

Our survey

2025

Provides a survey on all aspects listed in the table.

  1. Legend: = Fully covered; = Covered; ✗ = Not covered