“…Highlighted IoT Privacy Threats cryptographic algorithms, control access management tools, data minimization techniques, and privacy or context awareness protocols (Table I). [1], [67], [44], [36], [18], [53], [22], [5], [64], [30], [7], [13], [77], [59], [73] Data minimization 3 [15], [7], [59] Access control 6 [1], [31], [30], [13], [39], [59] Privacy awareness or context awareness 12 [1], [31], [55], [5], [81], [7], [71], [70], [77], [69], [59], [8] Differential Privacy 0 Other (introspection, trust assessment and evaluation) 3 [34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [...…”