You are on page 1of 6

Topic Identification Matrix

Group No. 9 Course, Year & Section: BSCPE - 1A

Instructor: Ms. Mary Joy Yambao

Field of Study Bachelor of Science in Computer Engineering

Major Topic

Area of Interest

Specific

Variables/Topic

Title

Researchers Reyes, Eul Jeremy

Salazar, Jhasmine Joyce

Sanchez, Alexandria Beatrix

Santarromana, Niniel Jann

Santos, Ashly

Serrano, Julius Amiel


Related Literature

No. Title of the Study Author/s Year Findings/Result/Related References

Studies

1. Top 12 layer-wise  Sriranga January -Around 1.5 billion Sciencedirect.com/

security challenges Narasimha 2023 science/article/pii/


smart device attacks
and a secure
GandhiArya S0045790622007029
architectural occurred in the first
valli
solution for half of 2021, with
HemanthaK
internet of things
umar attackers looking to

steal sensitive data

and mine

cryptocurrencies. A

few of the attacks,

such as the Annke

NVR flaw, could

allow attackers to

take control of

security cameras.

-The research also


needs to focus on

dealing with

scanning delays, and

in-line scans and

improving an

efficient

authentication and

authorization

process with less

resource intensity to

help narrow band

IoT build strong

trust, and avoid

token maintenance.

The application

versus performance

of a secure

application protocol

stack

implementation can

also be tuned to
support a Layer 7

(application)

security filtering

mechanism, such as

a Web Application

firewall.

-As the Internet of

Things market

grows, hackers'

focus has shifted to

gaining control of

IOT devices via

various means. This

research looked into

layer-by-layer

security challenges

for IoT applications

in Physical,

Network, and

Application layers.

The study
recommends a

unified secure

architectural

solution for

architecting,

designing IOT

applications. This

design philosophy

suggests a Shift Left

Design approach

when identifying

security measures

for the framework.

In the study, the

author identified

future directions and

research gaps in

Operation Security

and concludes this

paper by posing a

challenge to enable a
wager between

performance and

building security

controls when

designing IoT

architectures. 

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12.

You might also like