This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage to guarantee continuity of security from one stage to another stage.
This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage (Device, transmission of data, data on reset, service, and user). Also, it combines these items in one stack to deal with different IoT platforms, this made integration between items to assure the continuity of security from one stage to another stage and helps to have a full tracing of data from IoT device through the middleware to the user and vice versa. Also this paper presents different studies on available IoT platforms.