Existing

Studies

Consolidated Introduction

Illustration of threats and issues at the layers of IoT

Examples of Security and privacy attacks

In-depth research on

security Requirements

Suggestions for future directions

[9]

[11]

[12]

[13]

[14]

[15]

This work