Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

by   Maha Driss, et al.

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelligent devices over the Internet such as sensors, monitoring systems, and smart appliances to control, store, exchange, and analyze collected data. The main issue in IoT environments is that they can present potential vulnerabilities to be illegally accessed by malicious users, which threatens the safety and privacy of gathered data. To face this problem, several recent works have been conducted using microservices-based architecture to minimize the security threats and attacks related to IoT data. By employing microservices, these works offer extensible, reusable, and reconfigurable security features. In this paper, we aim to provide a survey about microservices-based approaches for securing IoT applications. This survey will help practitioners understand ongoing challenges and explore new and promising research opportunities in the IoT security field. To the best of our knowledge, this paper constitutes the first survey that investigates the use of microservices technology for securing IoT applications.


page 1

page 2

page 3

page 4


The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

The future of Internet of Things (IoT) is already upon us. IoT applicati...

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

As technology becomes more widely available, millions of users worldwide...

A Survey of Analysis Methods for Security and Safety verification in IoT Systems

Internet of Things (IoT) has been rapidly growing in the past few years ...

The Dark Side of The Internet of Vehicles: A Survey of the State of IoV and its Security Vulnerabilities

For the smart vehicular network, we studied two technologies to realize ...

Information flow based defensive chain for data leakage detection and prevention: a survey

Mobile and IoT applications have greatly enriched our daily life by prov...

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

Despite the numerous pompous statements regarding 5G, it is indisputable...

A Survey on RISC-V Security: Hardware and Architecture

The Internet of Things (IoT) is an ongoing technological revolution. Emb...

Please sign up or login with your details

Forgot password? Click here to reset