TY - JOUR KW - Information Technology KW - Security KW - Internet of things KW - Network KW - Data Security AU - Carlos Enrique Montenegro-Marín AU - Paulo Alonso Gaona-García AU - Juan David Prieto AU - Yuri Vanessa Nieto AB - Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT), security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology. IS - Special Issue on Advances and Applications in the Internet of Things and Cloud Computing M1 - 3 N2 - Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT), security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology. PY - 2017 SP - 55 EP - 60 T2 - International Journal of Interactive Multimedia and Artificial Intelligence TI - Analysis of Security Mechanisms Based on Clusters IoT Environments UR - http://www.ijimai.org/journal/sites/default/files/files/2016/08/ijimai20174_3_8_pdf_20224.pdf VL - 4 SN - 1989-1660 ER -