A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories
Abstract
:1. Introduction
1.1. IoT Evolution Overview
- Diversity of attack domainsIoT systems across a broad range of domains have been targeted, reflecting the extensive integration of IoT technologies in both consumer and industrial sectors. Attacks on consumer devices, including wearables and smart home systems (e.g., Mirai Botnet, Ring Doorbell Hacks, Garmin Ransomware), highlight the vulnerabilities inherent in devices used daily by individuals. Similarly, industrial systems (e.g., the Jeep Cherokee Hack) and critical infrastructure (e.g., Colonial Pipeline Ransomware, Oldsmar Water Treatment Attack) have been compromised, emphasizing the risks to operational continuity, public safety, and essential services.
- Economic and social impactThe financial and operational consequences of IoT-related attacks have been profound. High-profile incidents such as the Garmin Ransomware, WannaCry Ransomware, and Colonial Pipeline Ransomware illustrate the significant economic losses incurred through ransom payments, downtime, and operational disruptions. These attacks also underscore the social ramifications, including the erosion of public trust, exposure of sensitive personal and organizational data, and heightened concerns regarding the reliability and security of IoT-enabled systems. For instance, breaches of consumer devices like Ring cameras not only caused privacy violations but also instilled a sense of insecurity among users regarding the safety of their connected environments.
- Evolving threat landscapeOver the past decade, the sophistication of IoT-related cyberattacks has escalated markedly. Early attacks, such as the Mirai Botnet, exploited relatively simple vulnerabilities like default credentials and unsecured interfaces. However, more recent incidents, including the MOVEit Data Breach, demonstrate the increasing prevalence of zero-day exploits and advanced, targeted attacks. This evolution highlights the growing technical capabilities of attackers and underscores the urgent need for robust security measures and proactive defense mechanisms in IoT ecosystems.
1.2. Regulatory Overview
1.3. Previous Reviews and Our Work
- Identification of critical security weaknesses frequently addressed in IoT research.
- Examination of the specific difficulties involved in securing IoT devices.
- Review and evaluation of existing solutions designed to mitigate IoT-related security risks.
- Analysis of key trends, best practices, and emerging technologies, including Artificial Intelligence, Blockchain, Machine Learning, and Edge Computing, which are shaping the future of IoT security.
- Emphasis on the need for robust and comprehensive security strategies to protect sensitive data and strengthen public trust in IoT technologies.
1.4. IoT Architectural Overview
- Cellular connections utilizing LPWAN, such as LTE-M and NB-IoT standards, as well as unlicensed solutions like LoRa and Sigfox;
- Local and personal area networks, including Wi-Fi and Bluetooth;
- Mesh protocols, with Zigbee and RFID being the most common.
2. Research Methodology and Paper Structure
2.1. Selection of Article Sources
- MDPI, A robust platform that encourages scientific exchange and provides a vast database of articles, offering advanced search capabilities using keywords and topics;
- IEEE Xplore, a comprehensive digital library providing access to a wide range of technical literature in engineering, computer science, and related fields;
- Cornell University Arxiv, an open-access repository of preprints spanning multiple disciplines, including computer science and cybersecurity;
- Informatics in Education, which provides access to educational and research-focused papers in informatics;
- Elsevier, which provides a wide range of services, including access to a vast collection of academic journals, books, and research databases;
- Springer, a platform that provides access to scholarly articles and books on a variety of topics, including advanced technologies and IoT security;
- Other sources, including Nature, Informatics in Education, Acadlore, Migration Letters, and Sciendo, each providing valuable contributions to academic research, open-access publishing, and interdisciplinary studies across diverse fields.
2.2. Search Method
- Machine Learning for Cybersecurity: Threat Detection and Mitigation;
- Network Security in Artificial Intelligence Systems;
- Data Security Approaches for Autonomous Systems, IoT, and Smart Sensing Systems;
- Advanced 5G and beyond Networks;
- Key Enabling Technologies for Beyond 5G Network;
- Advances in Internet of Things Technologies and Cybersecurity.
2.3. Articles Selection Method
2.3.1. Identification and Screening
2.3.2. Eligibility
- The primary focus diverged from IoT security;
- They were editorials, opinion pieces, or predominantly literature reviews without new solutions or insights;
- They lacked a clearly defined or described solution, framework, or implementation related to IoT security.
2.3.3. Evaluation of Methodological Rigor
- Are they explicitly stated, well-defined, and aligned with IoT security challenges?
- Are the chosen research methods appropriate for addressing the defined objectives? Do they follow established IoT security research frameworks?
- Are the techniques sufficiently detailed, transparent, and reproducible? Are statistical analyses validated?
- Does the study propose novel insights, frameworks, or technological advancements?
- Identification—Articles were retrieved from MDPI (601 articles), Springer (72 articles), IEEE Xplore (65 articles), Elsevier (218 articles), Arxiv (5 articles), or Other (10 articles);
- Screening—Articles irrelevant to IoT security were excluded after title, keywords, abstract, and conclusion reviews;
- Eligibility—Articles lacking methodological rigor or well-defined solutions were excluded during detailed analysis.
3. Category Identification and Analysis
3.1. Attack Detection
3.2. Data Management and Protection
3.3. Securing Identity Management
3.4. Communication and Networking
3.5. Emergent Technologies
3.6. Risk Management
4. Identified Challenges and Solutions
4.1. Attack Detection
4.1.1. Intrusion and Anomaly Detection and Concept Drift Detection and Adaption
4.1.2. DDoS Attacks
4.1.3. Botnet
4.1.4. Eavesdropping Attacks
4.2. Data Management and Protection
4.2.1. Data Security and Privacy
4.2.2. Digital Identity and Identity-Based Encryption
4.2.3. Generative AI
4.3. Securing Identity Management
4.3.1. Device Identification
4.3.2. Authentication
4.4. Communication and Networking
4.4.1. Network Security
4.4.2. Firmware
4.4.3. 5G and 6G Networks
4.5. Emergent Technologies
4.5.1. Machine Learning
4.5.2. Blockchain
4.5.3. Artificial Intelligence
4.5.4. Edge Computing and Fog Computing
4.6. Risk Management
5. Discussion
5.1. Securing Identity Management
5.2. Attack Detection
5.3. Communication and Networking and Data Management and Protection
5.3.1. Communication and Networking
5.3.2. Data Management and Protection
5.4. Risk Management
5.5. Identified Challenges and Limitations of Integrating Emerging Technologies
5.5.1. Robust ML-Based Frameworks
- Architecture complexity which involves difficult diagnose process, maintenance, optimisation and scalability;
- Training pipeline sophistication to keep a stable model behavior;
- Incremental learning could deteriorate pretrained foundation, introducing errors and vulnerabilities;
- Communication overhead introduced by the need of data exchange between devices and central server, as well as between source domain and target domain;
- Computational effort persists.
5.5.2. AI and Blockchain-Based Frameworks
6. Conclusions and Future Work
- Quantum-Resistant CryptographyWith the impending rise of quantum computing, the exploration and adoption of quantum-resistant cryptographic techniques must be prioritized. Algorithms like lattice-based cryptography, hash-based signatures, and quantum key distribution could offer robust protection against future threats posed by quantum computers.
- Data Integrity and Privacy-Preserving TechniquesSecure management of LSTM IoT data should focus on blockchain-based frameworks for data integrity. Privacy-preserving methods, such as homomorphic encryption and differential privacy, must be integrated to ensure secure data sharing without compromising user privacy.
- System Resilience and Fallback StrategiesResearch should focus on developing secure fallback mechanisms to ensure system resilience during failures or breaches. Techniques like redundant architectures, automated recovery protocols, and distributed denial-of-service (DDoS) mitigation frameworks are essential for reliable IoT deployments.
- Optimising Resource Management Using AI and MLEfficient resource allocation in IoT systems remains a pressing challenge, particularly for resource-constrained devices. AI-driven solutions should be explored to optimise computational efficiency, improve adaptability to evolving threats, and minimise latency.
- Policy and Standards DevelopmentThe establishment of international standards and regulatory frameworks is crucial to promote consistency and interoperability across IoT ecosystems. Policymakers, researchers, and industry stakeholders should collaborate to develop compliance-oriented guidelines that address security and privacy concerns. Future policies should focus on harmonized global compliance, mandatory security baselines, legal accountability, and emergent technologies integration. Simultaneously, international standardization bodies should develop adaptive, interoperable security frameworks, advance post-quantum cryptography adoption, and explore self-healing IoT architectures. These directions will pave the way for a secure, resilient, and trustworthy IoT ecosystem, ensuring long-term sustainability and public confidence in IoT technologies.
- Focus on Securing Neglected IoT DevicesMany IoT devices, particularly in smart homes, remain overlooked in terms of security. Targeted research is needed to develop lightweight security protocols, automated firmware updates, and user-friendly mechanisms to protect these devices, which often operate in resource-constrained environments.
- Interference Mitigation in Dynamic Spectrum SharingAs dynamic spectrum sharing grows, mitigating interference and unauthorized spectrum access is critical. Future research should explore AI-driven spectrum sensing, cognitive radio techniques, adaptive interference control, and blockchain-based spectrum management to enhance secure and efficient spectrum utilization.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
2FA | Two-factor authentication |
ACE | Associative Cryptographic Encryption |
ADWIN | Adaptive Windowing |
AI | Artificial Intelligence |
ARF | Adaptive Random Forest |
CBAM | Convolutional Block Attention Module |
CoAP | The Constrained Application Protocol |
CP-ABE | Ciphertext-Policy Attribute-Based Encryption |
CRA | Cyber Resilience Act |
CTGAN | Conditional Tabular Generative Adversarial Networks |
CVSS | Common Vulnerability Scoring System |
DAM | Distributed Authentication Mechanism |
DBO | Dung Beetle Optimiser |
DDM | Deep Drift Model |
DDoS | Distributed Denial of Service |
DNN | Deep Neural Network |
DT | Decision Tree |
ECC | Elliptic Curve Cryptography |
ECC-AES | Elliptic Curve Cryptography with Advanced Encryption Standard |
EPA | Extended Protocol Architecture |
FSMFA | Firmware-Secure Multi-Factor Authentication |
GA | Genetic Algorithms |
GDPR | General Data Protection Regulation |
GRU | Gated Recurrent Unit |
HIDS | Host Intrusion Detection Systems |
HRA | Honest Re-encryption Attacks |
ICN-IoT | Information-Centric Networking for IoT |
ICS | Industrial Control Systems |
IDS | Intrusion Detection Systems |
IoT | Internet of Things |
IOTA-SRM | IoT architecture-based Security Risk Management |
IoTSRM2 | IoT Security Risk Management Strategy Model |
IPS | Intrusion Prevention Systems |
ISO | International Organization for Standardization |
KNN | k-Nearest Neighbours |
LPWAN | Low-Power Wide-Area Networks |
LSTM | Long Short-Term Memory |
LTE-M | Long Term Evolution for Machines |
LWE | Learning With Errors |
MFA | Multi-factor authentication |
ML | Machine Learning |
MQTT | Message Queuing Telemetry Transport |
MUD | Manufacturer Usage Description |
NB-IoT | Narrow Band-Internet of Things |
NIDS | Network Intrusion Detection Systems |
NFT | Non-Fungible Token |
NIST | National Institute of Standards and Technology |
OTP | One-Time Password |
PKI | Public Key Infrastructure |
PUF | Physically Unclonable Function |
RF | Random Forest |
RFC | Request For Comments |
RFID | Radio Frequency Identification |
SCADA | Supervisory Control and Data Acquisition |
SI-AO | Self-Improved Aquila Optimiser |
SRPs | Sampled Randomized Pooling Strategy |
SSL-VPN | Secure Sockets Layer Virtual Private Network |
SVM | Support Vector Machine |
TCN | Temporal Convolutional Network |
TEE | Trusted Execution Environment |
TL | Transfer Learning |
VGG16 | Visual Geometry Group 16 (number of layers with learnable parameters) |
VNSFs | Virtual Network Security Functions |
References
- Greengard, S. Internet of Things. In Encyclopedia Britannica; 2024; Available online: https://www.britannica.com/science/Internet-of-Things (accessed on 3 January 2025).
- Satyajit, S. State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally; IoT Analytics: Hamburg, Germany, 2024. [Google Scholar]
- Greenberg, A. Hackers Remotely Kill a Jeep on the Highway—With Me in It. Available online: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ (accessed on 17 January 2025).
- Antonakakis, M.; April, T.; Bailey, M. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, 16 August 2017. [Google Scholar]
- Smart, W. Lessons Learned Review of the WannaCry Ransomware Cyber Attack; Department of Health and Social Care: London, UK, 2018. [Google Scholar]
- Brewster, T. Hackers Used a Fish Tank to Breach a Casino’s High-Roller Database. Forbes. 2018. Available online: https://www.forbes.com/sites/thomasbrewster/2018/07/19/fish-tank-hack-into-casino/ (accessed on 17 January 2025).
- Kari, P. Dozens Sue Amazon’s Ring after Camera Hack Leads to Threats and Racial Slurs. The Guardian, 23 December 2020. Available online: https://www.theguardian.com/technology/2020/dec/23/amazon-ring-camera-hack-lawsuit-threats (accessed on 17 January 2025).
- Cimpanu, C. Garmin Services and Production Go Down After Ransomware Attack. Available online: https://www.zdnet.com/article/garmin-services-and-production-go-down-after-ransomware-attack/ (accessed on 17 January 2025).
- Easterly, J. The Attack on Colonial Pipeline: What We’ve Learned & What We’ve Done Over the Past Two Years. 2023. Available online: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years (accessed on 15 November 2024).
- Montalbano, E. Breach Exposes Verkada Security Camera Footage at Tesla, Cloudflare. Threatpost 10 March 2021. Available online: https://threatpost.com/breach-verkada-security-camera-tesla-cloudflare/164635/ (accessed on 17 January 2025).
- Gartenberg, C. Security Startup Verkada Hack Exposes 150,000 Security Cameras in Tesla Factories, Jails, and More. 2021. Available online: https://www.theverge.com/2021/3/9/22322122/verkada-hack-150000-security-cameras-tesla-factory-cloudflare-jails-hospitals (accessed on 15 November 2024).
- Greenberg, A. A Hacker Tried to Poison a Florida City’s Water Supply, Officials Say. Available online: https://www.wired.com/story/oldsmar-florida-water-utility-hack/ (accessed on 17 January 2025).
- Kapko, M. MOVEit Liabilities Mount for Progress Software. Cybersecurity Dive. 2024. Available online: https://www.cybersecuritydive.com/news/moveit-liabilities-progress/706015/ (accessed on 17 January 2025).
- Ptrosyan, A. Annual Number of Internet of Things (IoT) Malware Attacks Worldwide from 2018 to 2022. Statista, Cyber Crime & Security. 2024. Available online: https://www.statista.com/statistics/1377569/worldwide-annual-internet-of-things-attacks/ (accessed on 17 January 2025).
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). Off. J. Eur. Union 2016, L119, 1–88.
- H.R.1668—IoT Cybersecurity Improvement Act of 2020. Available online: https://www.congress.gov/bill/116th-congress/house-bill/1668 (accessed on 17 January 2025).
- AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic Form IoT Cybersecurity Alliance. 2017. Available online: https://about.att.com/story/iot_cybersecurity_alliance.html (accessed on 1 February 2025).
- Caindec, K.; Buchheit, M.; Zarkout, B.; Schrecker, S.; Hirsch, F.; Dungana, I.; Martin, R.; Tseng, M. An Industry IoT Foundational Publication; AT&T Inc.: Dallas, TX, USA, 2017. [Google Scholar]
- CoAP RFC 7252 Constrained Application Protocol. Available online: https://datatracker.ietf.org/doc/html/rfc7252 (accessed on 15 November 2024).
- ISO/IEC 30141:2024; Internet of Things (IoT)—Reference Architecture. International Organization for Standardization: Geneva, Switzerland, 2024.
- ETSI EN 303 645; Cyber Security for Consumer Internet of Things: Baseline Requirements. European Standard. June 2020. Available online: https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf (accessed on 9 January 2025).
- Dritsas, E.; Trigka, M. A Survey on Cybersecurity in IoT. Future Internet 2025, 17, 30. [Google Scholar] [CrossRef]
- Szymoniak, S.; Piątkowski, J.; Kurkowski, M. Defense and Security Mechanisms in the Internet of Things: A Review. Appl. Sci. 2025, 15, 499. [Google Scholar] [CrossRef]
- Singh, N.; Buyya, R.; Kim, H. Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors 2024, 25, 79. [Google Scholar] [CrossRef]
- Krzysztoń, E.; Rojek, I.; Mikołajewski, D. A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An Experimental Study. Appl. Sci. 2024, 14, 11545. [Google Scholar] [CrossRef]
- Alshamsi, O.; Shaalan, K.; Butt, U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information 2024, 15, 631. [Google Scholar] [CrossRef]
- Fatima, M.; Rehman, O.; Rahman, I.M.H.; Ajmal, A.; Park, S.J. Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices. Future Internet 2024, 16, 368. [Google Scholar] [CrossRef]
- Kikissagbe, B.R.; Adda, M. Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review. Electronics 2024, 13, 3601. [Google Scholar] [CrossRef]
- Dritsas, E.; Trigka, M. Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey. Future Internet 2024, 16, 324. [Google Scholar] [CrossRef]
- Roy, S.; Sankaran, S.; Zeng, M. Green Intrusion Detection Systems: A Comprehensive Review and Directions. Sensors 2024, 24, 5516. [Google Scholar] [CrossRef]
- Alkhayyal, M.; Mostafa, A. Recent Developments in AI and ML for IoT: A Systematic Literature Review on LoRaWAN Energy Efficiency and Performance Optimization. Sensors 2024, 24, 4482. [Google Scholar] [CrossRef] [PubMed]
- Isong, B.; Kgote, O.; Abu-Mahfouz, A. Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems. Electronics 2024, 13, 2370. [Google Scholar] [CrossRef]
- Gelgi, M.; Guan, Y.; Arunachala, S.; Samba Siva Rao, M.; Dragoni, N. Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors 2024, 24, 3571. [Google Scholar] [CrossRef]
- Rafique, S.H.; Abdallah, A.; Musa, N.S.; Murugan, T. Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends. Sensors 2024, 24, 1968. [Google Scholar] [CrossRef]
- Bukhowah, R.; Aljughaiman, A.; Rahman, M.M.H. Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions. Electronics 2024, 13, 1031. [Google Scholar] [CrossRef]
- Alhamarneh, R.A.; Mahinderjit Singh, M. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications. Appl. Sci. 2024, 14, 1700. [Google Scholar] [CrossRef]
- Hossain, M.; Kayas, G.; Hasan, R.; Skjellum, A.; Noor, S.; Islam, S.M.R. A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet 2024, 16, 40. [Google Scholar] [CrossRef]
- AlSalem, T.; Almaiah, M.; Lutfi, A. Cybersecurity Risk Analysis in the IoT: A Systematic Review. Electronics 2023, 12, 3958. [Google Scholar] [CrossRef]
- Alotaibi, B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors 2023, 23, 7470. [Google Scholar] [CrossRef] [PubMed]
- Alahmadi, A.A.; Aljabri, M.; Alhaidari, F.; Alharthi, D.J.; Rayani, G.E.; Marghalani, L.A.; Alotaibi, O.B.; Bajandouh, S.A. DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions. Electronics 2023, 12, 3103. [Google Scholar] [CrossRef]
- Chui, K.T.; Gupta, B.B.; Liu, J.; Arya, V.; Nedjah, N.; Almomani, A.; Chaurasia, P. A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information 2023, 14, 388. [Google Scholar] [CrossRef]
- Pritika, P.; Shanmugam, B.; Azam, S. Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies 2023, 11, 31. [Google Scholar] [CrossRef]
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
- Taherdoost, H. Security and Internet of Things: Benefits, Challenges, and Future Perspectives. Electronics 2023, 12, 1901. [Google Scholar] [CrossRef]
- Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef]
- Sun, P.; Wan, Y.; Wu, Z.; Fang, Z.; Li, Q. A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies, Protection Measures and Future Directions. Comput. Secur. 2025, 148, 104097. [Google Scholar] [CrossRef]
- Kumar, S.; Kumar, D.; Dangi, R.; Choudhary, G.; Dragoni, N.; You, I. A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices. Comput. Mater. Contin. 2024, 78, 31–63. [Google Scholar] [CrossRef]
- Chaurasia, N.; Kumar, P. A Comprehensive Study on Issues and Challenges Related to Privacy and Security in IoT. e-Prime—Adv. Electr. Eng. Electron. Energy 2023, 4, 100158. [Google Scholar] [CrossRef]
- Narciandi-Rodriguez, D.; Aveleira-Mata, J.; García-Ordás, M.T.; Alfonso-Cendón, J.; Benavides, C.; Alaiz-Moretón, H. A Cybersecurity Review in IoT 5G Networks. Internet Things 2025, 30, 101478. [Google Scholar] [CrossRef]
- Bala, B.; Behal, S. AI Techniques for IoT-Based DDoS Attack Detection: Taxonomies, Comprehensive Review and Research Challenges. Comput. Sci. Rev. 2024, 52, 100631. [Google Scholar] [CrossRef]
- Kumari, P.; Jain, A.K. A Comprehensive Study of DDoS Attacks over IoT Network and Their Countermeasures. Comput. Secur. 2023, 127, 103096. [Google Scholar] [CrossRef]
- Makhdoom, I.; Abolhasan, M.; Franklin, D.; Lipman, J.; Zimmermann, C.; Piccardi, M.; Shariati, N. Detecting Compromised IoT Devices: Existing Techniques, Challenges, and a Way Forward. Comput. Secur. 2023, 132, 103384. [Google Scholar] [CrossRef]
- Unpacking IoT Architecture: Layers and Components Explained. Available online: https://deviceauthority.com/unpacking-iot-architecture-layers-and-components-explained/ (accessed on 3 December 2024).
- Domínguez-Bolaño, T.; Campos, O.; Barral, V.; Escudero, C.J.; García-Naya, J.A. An Overview of IoT Architectures, Technologies, and Existing Open-Source Projects. Internet Things 2022, 20, 100626. [Google Scholar] [CrossRef]
- Rai, S. How to Greatly Improve Battery Power Efficiency for IoT Devices, Analog Devices, Technical Articles, March 6 2023. Available online: https://www.analog.com/en/resources/technical-articles/greatly-improve-battery-power-efficiency-for-iot-devices.html (accessed on 18 January 2025).
- Borres, B.; Tenorio, N. How Integrated On/Off Controllers Contribute to Energy Efficient System Designs. Available online: https://www.analog.com/en/resources/analog-dialogue/articles/integrated-on-off-controllers-contribute-to-energy-eff.html (accessed on 1 February 2025).
- Rottleuthner, M.; Schmidt, T.C.; Wählisch, M. Dynamic Clock Reconfiguration for the Constrained IoT and Its Application to Energy-Efficient Networking. arXiv 2021, arXiv:2102.10353. [Google Scholar]
- Tkhir, P. 4 Types of IoT Networks: Overview and Use Cases. 2023. Available online: https://euristiq.com/types-of-iot-networks/ (accessed on 18 January 2025).
- Alabsi, B.; Anbar, M.; Rihan, S. Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks. Sensors 2023, 23, 5644. [Google Scholar] [CrossRef]
- Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access 2021, 9, 59353–59377. [Google Scholar] [CrossRef]
- Garg, U.; Kumar, S.; Mahanti, A. IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet 2024, 16, 212. [Google Scholar] [CrossRef]
- Chen, Z.; Liu, J.; Shen, Y.; Simsek, M.; Kantarci, B.; Mouftah, H.T.; Djukic, P. Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. ACM Comput. Surv. 2023, 55, 105. [Google Scholar] [CrossRef]
- Woodiss-Field, A.; Johnstone, M.N.; Haskell-Dowland, P. Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors 2024, 24, 1027. [Google Scholar] [CrossRef] [PubMed]
- Beshah, Y.K.; Abebe, S.L.; Melaku, H.M. Drift Adaptive Online DDoS Attack Detection Framework for IoT System. Electronics 2024, 13, 1004. [Google Scholar] [CrossRef]
- Altulaihan, E.; Almaiah, M.A.; Aljughaiman, A. Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms. Sensors 2024, 24, 713. [Google Scholar] [CrossRef] [PubMed]
- Farraj, A.; Hammad, E. A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments. Sensors 2024, 24, 5171. [Google Scholar] [CrossRef]
- Li, M.; Dou, Z. Active Eavesdropping Detection: A Novel Physical Layer Security in Wireless IoT. EURASIP J. Adv. Signal Process. 2023, 2023, 119. [Google Scholar] [CrossRef]
- Kim, M.; Suh, T. Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices. Sensors 2021, 21, 8207. [Google Scholar] [CrossRef] [PubMed]
- Moubayed, A. A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. Future Internet 2024, 16, 331. [Google Scholar] [CrossRef]
- Kilichev, D.; Turimov, D.; Kim, W. Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models. Mathematics 2024, 12, 571. [Google Scholar] [CrossRef]
- Abdelhamid, S.; Hegazy, I.; Aref, M.; Roushdy, M. Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection. BDCC 2024, 8, 116. [Google Scholar] [CrossRef]
- Chen, J.; Xiao, J.; Xu, J. VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-Image Conversion and Deep Learning. Electronics 2024, 13, 3639. [Google Scholar] [CrossRef]
- Hu, L.; Zhao, B.; Wang, G. A Network Device Identification Method Based on Packet Temporal Features and Machine Learning. Appl. Sci. 2024, 14, 7954. [Google Scholar] [CrossRef]
- Aroon, N.; Liu, V.; Kane, L.; Li, Y.; Tesfamicael, A.D.; McKague, M. An Architecture of Enhanced Profiling Assurance for IoT Networks. Electronics 2024, 13, 2832. [Google Scholar] [CrossRef]
- Habibi, O.; Chemmakha, M.; Lazaar, M. Imbalanced Tabular Data Modelization Using CTGAN and Machine Learning to Improve IoT Botnet Attacks Detection. Eng. Appl. Artif. Intell. 2023, 118, 105669. [Google Scholar] [CrossRef]
- Alani, M.M. BotStop: Packet-Based Efficient and Explainable IoT Botnet Detection Using Machine Learning. Comput. Commun. 2022, 193, 53–62. [Google Scholar] [CrossRef]
- de Caldas Filho, F.L.; Soares, S.C.M.; Oroski, E.; de Oliveira Albuquerque, R.; da Mata, R.Z.A.; de Mendonça, F.L.L.; de Sousa Júnior, R.T. Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning. Sensors 2023, 23, 6305. [Google Scholar] [CrossRef]
- Negera, W.G.; Schwenker, F.; Debelee, T.G.; Melaku, H.M.; Feyisa, D.W. Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT. Appl. Sci. 2023, 13, 4699. [Google Scholar] [CrossRef]
- Thakkar, A.; Lohiya, R. Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based Deep Neural Network. IEEE Internet Things J. 2023, 10, 11888–11895. [Google Scholar] [CrossRef]
- Yang, C.; Guan, W.; Fang, Z. IoT Botnet Attack Detection Model Based on DBO-Catboost. Appl. Sci. 2023, 13, 7169. [Google Scholar] [CrossRef]
- Hossain, M.A.; Islam, M.S. A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection. Sci. Rep. 2023, 13, 21207. [Google Scholar] [CrossRef] [PubMed]
- He, M.; Huang, Y.; Wang, X.; Wei, P.; Wang, X. A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping. IEEE Internet Things J. 2024, 11, 2935–2949. [Google Scholar] [CrossRef]
- Awajan, A. A Novel Deep Learning-Based Intrusion Detection System for IoT Networks. Computers 2023, 12, 34. [Google Scholar] [CrossRef]
- Eghmazi, A.; Ataei, M.; Landry, R.J.; Chevrette, G. Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy. IoT 2024, 5, 20–34. [Google Scholar] [CrossRef]
- Khan, B.U.I.; Goh, K.W.; Khan, A.R.; Zuhairi, M.F.; Chaimanee, M. Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities. Processes 2024, 12, 1825. [Google Scholar] [CrossRef]
- Wei, P.; Wang, D.; Zhao, Y.; Tyagi, S.K.S.; Kumar, N. Blockchain Data-Based Cloud Data Integrity Protection Mechanism. Future Gener. Comput. Syst. 2020, 102, 902–911. [Google Scholar] [CrossRef]
- Jena, S.K.; Barik, R.C.; Priyadarshini, R. A Systematic State-of-Art Review on Digital Identity Challenges with Solutions Using Conjugation of IOT and Blockchain in Healthcare. Internet Things 2024, 25, 101111. [Google Scholar] [CrossRef]
- Song, Z.; Yan, E.; Song, J.; Jiang, R.; Yu, Y.; Chen, T. A Blockchain-Based Digital Identity System with Privacy, Controllability, and Auditability. Arab. J. Sci. Eng. 2024. [Google Scholar] [CrossRef]
- Xu, H.; Li, Y.; Balogun, O.; Wu, S.; Wang, Y.; Cai, Z. Security Risks Concerns of Generative AI in the IoT. IEEE Internet Things Mag. 2024, 7, 62–67. [Google Scholar] [CrossRef]
- Wang, X.; Wan, Z.; Hekmati, A.; Zong, M.; Alam, S.; Zhang, M.; Krishnamachari, B. IoT in the Era of Generative AI: Vision and Challenges. arXiv 2024, arXiv:2401.01923. [Google Scholar]
- Wang, F.; Gai, Y.; Zhang, H. Blockchain User Digital Identity Big Data and Information Security Process Protection Based on Network Trust. J. King Saud. Univ.—Comput. Inf. Sci. 2024, 36, 102031. [Google Scholar] [CrossRef]
- Yang, Z.; Liu, Y.; Jin, X.; Luo, X.; Xu, Y.; Li, M.; Chen, P.; Tang, B.; Lin, B. BDIDA-IoT: A Blockchain-Based Decentralized Identity Architecture Enhances the Efficiency of IoT Data Flow. Appl. Sci. 2024, 14, 1807. [Google Scholar] [CrossRef]
- Maeng, J.; Heo, Y.; Joe, I. Hyperledger Fabric-Based Lightweight Group Management (H-LGM) for IoT Devices. IEEE Access 2022, 10, 56401–56409. [Google Scholar] [CrossRef]
- Mohammed, M.A.; Wahab, H.B.A. Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption. Comput. Model. Eng. Sci. 2024, 138, 1731–1748. [Google Scholar] [CrossRef]
- Fan, S.; Wang, J. Multi-Dimension-Precision Chaotic Encryption Mechanism for Internet of Things. Internet Things 2024, 26, 101202. [Google Scholar] [CrossRef]
- Jose Diaz Rivera, J.; Muhammad, A.; Song, W.-C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [Google Scholar] [CrossRef]
- Bojič Burgos, J.; Pustišek, M. Decentralized IoT Data Authentication with Signature Aggregation. Sensors 2024, 24, 1037. [Google Scholar] [CrossRef] [PubMed]
- Saideh, M.; Jamont, J.-P.; Vercouter, L. Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things. Sensors 2024, 24, 4621. [Google Scholar] [CrossRef] [PubMed]
- Munshi, A.; Alshawi, B. Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. J. Sens. Actuator Netw. 2024, 13, 41. [Google Scholar] [CrossRef]
- Tun, N.W.; Mambo, M. Secure PUF-Based Authentication Systems. Sensors 2024, 24, 5295. [Google Scholar] [CrossRef]
- Zhang, B.; Zhang, T.; Xi, Z.; Chen, P.; Wei, J.; Liu, Y. Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption. Electronics 2024, 13, 984. [Google Scholar] [CrossRef]
- Wang, J.; Li, J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Appl. Sci. 2024, 14, 1743. [Google Scholar] [CrossRef]
- Fenner, J.; Galeas, P.; Escobar, F.; Neira, R. Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums. Appl. Sci. 2024, 14, 5354. [Google Scholar] [CrossRef]
- Höglund, J.; Bouget, S.; Furuhed, M.; Preuß Mattsson, J.; Selander, G.; Raza, S. AutoPKI: Public Key Infrastructure for IoT with Automated Trust Transfer. Int. J. Inf. Secur. 2024, 23, 1859–1875. [Google Scholar] [CrossRef]
- El-Hajj, M.; Beune, P. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems. Information 2024, 15, 304. [Google Scholar] [CrossRef]
- Zhang, J.; Ouda, A.; Abu-Rukba, R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet 2024, 16, 209. [Google Scholar] [CrossRef]
- Baird, I.; Ghaleb, B.; Wadhaj, I.; Russell, G.; Buchanan, W.J. Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics 2024, 13, 3467. [Google Scholar] [CrossRef]
- Zerrouki, F.; Ouchani, S.; Bouarfa, H. PUF-Based Mutual Authentication and Session Key Establishment Protocol for IoT Devices. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 12575–12593. [Google Scholar] [CrossRef]
- Nimmy, K.; Sankaran, S.; Achuthan, K. A Novel Lightweight PUF Based Authentication Protocol for IoT without Explicit CRPs in Verifier Database. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 6227–6242. [Google Scholar] [CrossRef]
- Ramachandraiah, K.R.D.; Bommagani, N.J.; Jayapal, P.K. Enhancing Healthcare Data Security in IoT Environments Using Blockchain and DCGRU with Twofish Encryption. Inf. Dyn. Appl. 2023, 2, 173–185. [Google Scholar] [CrossRef]
- Zhang, S.; Du, X.; Liu, X. A Novel and Quantum-Resistant Handover Authentication Protocol in IoT Environment. Wirel. Netw. 2023, 29, 2873–2890. [Google Scholar] [CrossRef]
- Chen, Z.; Cheng, Z.; Luo, W.; Ao, J.; Liu, Y.; Sheng, K.; Chen, L. FSMFA: Efficient Firmware-Secure Multi-Factor Authentication Protocol for IoT Devices. Internet Things 2023, 21, 100685. [Google Scholar] [CrossRef]
- Román, R.; Arjona, R.; Baturone, I. A Quantum-Safe Authentication Scheme for IoT Devices Using Homomorphic Encryption and Weak Physical Unclonable Functions with No Helper Data. Internet Things 2024, 28, 101389. [Google Scholar] [CrossRef]
- Rehman, M.U.; Shafqiue, A. Robust Encryption Framework for IoT Devices Based on Bit-Plane Extraction, Chaotic Sine Models, and Quantum Operations. Internet Things 2024, 27, 101241. [Google Scholar] [CrossRef]
- Hou, J.; Peng, C.; Tan, W. A Lattice-Based Data Sharing Functional Encryption Scheme with HRA Security for IoT. Expert. Syst. Appl. 2024, 254, 124355. [Google Scholar] [CrossRef]
- Deng, W.; Li, J.; Yan, H.; Voundi Koe, A.S.; Huang, T.; Wang, J.; Peng, C. Self-Sovereign Identity Management in Ciphertext Policy Attribute Based Encryption for IoT Protocols. J. Inf. Secur. Appl. 2024, 86, 103885. [Google Scholar] [CrossRef]
- Gasmi, M.; Kerdoudi, M.L.; Bachir, A. Load-Balanced Attribute-Based Outsourced Encryption for Constrained IoT Devices. Comput. Electr. Eng. 2024, 118, 109424. [Google Scholar] [CrossRef]
- Velmurugan, P.; Senthil kumar, K.; Sridhar, S.S.; Gotham, E. An Advanced and Effective Encryption Methodology Used for Modern IoT Security. Mater. Today Proc. 2023, 81, 389–394. [Google Scholar] [CrossRef]
- Achkouty, F.; Gallon, L.; Chbeir, R. RDSC: Range-Based Device Spatial Clustering for IoT Networks. Sensors 2024, 24, 5851. [Google Scholar] [CrossRef]
- Ehmer, J.; Savaria, Y.; Granado, B.; David, J.-P.; Denoulet, J. Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic. Electronics 2024, 13, 3318. [Google Scholar] [CrossRef]
- Canavese, D.; Mannella, L.; Regano, L.; Basile, C. Security at the Edge for Resource-Limited IoT Devices. Sensors 2024, 24, 590. [Google Scholar] [CrossRef]
- Singh, C.; Kumar, M.; Upadhyay, M.; Chauhan, P.; Sharma, M. A 6G Network: Future of Nations? Challenges in 6G Communications. Tuijin Jishu/J. Propuls. Technol. 2023, 44, 73–76. [Google Scholar]
- Maduranga, M.W.P.; Tilwari, V.; Rathnayake, R.M.M.R.; Sandamini, C. AI-Enabled 6G Internet of Things: Opportunities, Key Technologies, Challenges, and Future Directions. Telecom 2024, 5, 804–822. [Google Scholar] [CrossRef]
- Bakhshi, T.; Ghita, B.; Kuzminykh, I. A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors 2024, 24, 708. [Google Scholar] [CrossRef]
- Al Hanif, A.; Ilyas, M. Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments. Sensors 2024, 24, 1782. [Google Scholar] [CrossRef]
- Long, Z.; Yan, H.; Shen, G.; Zhang, X.; He, H.; Cheng, L. A Transformer-Based Network Intrusion Detection Approach for Cloud Security. J. Cloud Comput. 2024, 13, 5. [Google Scholar] [CrossRef]
- Rajan, D.M.; Aravindhar, D.J. Detection and Mitigation of DDOS Attack in SDN Environment Using Hybrid CNN-LSTM. Migr. Lett. 2023, 20, 407–419. [Google Scholar] [CrossRef]
- Sarhan, M.; Layeghy, S.; Moustafa, N.; Gallagher, M.; Portmann, M. Feature Extraction for Machine Learning-Based Intrusion Detection in IoT Networks. Digit. Commun. Netw. 2024, 10, 205–216. [Google Scholar] [CrossRef]
- Hu, Z. Knowledge Graph Based Large Scale Network Security Threat Detection Techniques. Appl. Math. Nonlinear Sci. 2024, 9. [Google Scholar] [CrossRef]
- Oktian, Y.E.; Le, T.-T.-H.; Jo, U.; Laksmono, A.M.A.; Kim, H. Secure Decentralized Firmware Update Delivery Service for Internet of Things. Internet Things 2024, 26, 101136. [Google Scholar] [CrossRef]
- Nguyen, H.D.; Le Sommer, N.; Mahéo, Y. Over-the-Air Firmware Update in LoRaWAN Networks: A New Module-Based Approach. Procedia Comput. Sci. 2024, 241, 154–161. [Google Scholar] [CrossRef]
- Cheng, Y.; Yang, S.; Lang, Z.; Shi, Z.; Sun, L. VERI: A Large-Scale Open-Source Components Vulnerability Detection in IoT Firmware. Comput. Secur. 2023, 126, 103068. [Google Scholar] [CrossRef]
- Verderame, L.; Ruggia, A.; Merlo, A. PARIOT: Anti-Repackaging for IoT Firmware Integrity. J. Netw. Comput. Appl. 2023, 217, 103699. [Google Scholar] [CrossRef]
- Kaushik, K.; Bhardwaj, A.; Dahiya, S. Framework to Analyze and Exploit the Smart Home IoT Firmware. Meas. Sens. 2025, 37, 101406. [Google Scholar] [CrossRef]
- Xu, J.; Zhaojun, X.; Wenli, Y.; Hu, W.; Cabani, A.; Xinrong, H. An Intelligent Mechanism for Dynamic Spectrum Sharing in 5G IoT Networks. Expert Syst. Appl. 2024, 252, 124122. [Google Scholar] [CrossRef]
- Alkhaldi, T.M.; Darem, A.A.; Alhashmi, A.A.; Al-Hadhrami, T.; Osman, A.E. Enhancing Smart City IoT Communication: A Two-Layer NOMA-Based Network with Caching Mechanisms and Optimized Resource Allocation. Comput. Netw. 2024, 255, 110857. [Google Scholar] [CrossRef]
- Ortiz-Ruiz, E.; Bermejo, J.R.; Sicilia, J.A.; Bermejo, J. Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia. Electronics 2024, 13, 824. [Google Scholar] [CrossRef]
- Valencia-Arias, A.; González-Ruiz, J.D.; Verde Flores, L.; Vega-Mori, L.; Rodríguez-Correa, P.; Sánchez Santos, G. Machine Learning and Blockchain: A Bibliometric Study on Security and Privacy. Information 2024, 15, 65. [Google Scholar] [CrossRef]
- El-Sofany, H.; El-Seoud, S.A.; Karam, O.H.; Bouallegue, B. Using Machine Learning Algorithms to Enhance IoT System Security. Sci. Rep. 2024, 14, 12077. [Google Scholar] [CrossRef]
- Priyadarshini, I. Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. Big Data Cogn. Comput. 2024, 8, 21. [Google Scholar] [CrossRef]
- Alrubayyi, H.; Alshareef, M.S.; Nadeem, Z.; Abdelmoniem, A.M.; Jaber, M. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. Future Internet 2024, 16, 85. [Google Scholar] [CrossRef]
- Tekin, N.; Acar, A.; Aris, A.; Uluagac, A.S.; Gungor, V.C. Energy Consumption of On-Device Machine Learning Models for IoT Intrusion Detection. Internet Things 2023, 21, 100670. [Google Scholar] [CrossRef]
- Coppolino, L.; D’Antonio, S.; Mazzeo, G.; Uccello, F. The Good, the Bad, and the Algorithm: The Impact of Generative AI on Cybersecurity. Neurocomputing 2025, 623, 129406. [Google Scholar] [CrossRef]
- Xie, H.; Zheng, J.; He, T.; Wei, S.; Hu, C. TEBDS: A Trusted Execution Environment-and-Blockchain-Supported IoT Data Sharing System. Future Gener. Comput. Syst. 2023, 140, 321–330. [Google Scholar] [CrossRef]
- Kandasamy, K.; Srinivas, S.; Achuthan, K.; Rangan, V.P. IoT Cyber Risk: A Holistic Analysis of Cyber Risk Assessment Frameworks, Risk Vectors, and Risk Ranking Process. EURASIP J. Inf. Secur. 2020, 2020, 8. [Google Scholar] [CrossRef]
- Parsons, E.K.; Panaousis, E.; Loukas, G.; Sakellari, G. A Survey on Cyber Risk Management for the Internet of Things. Appl. Sci. 2023, 13, 9032. [Google Scholar] [CrossRef]
- Affia, A.O.; Nolte, A.; Matulevičius, R. IoT Security Risk Management: A Framework and Teaching Approach. Inform. Educ. 2023, 22, 555–588. [Google Scholar] [CrossRef]
- Popescu, T.; Popescu, A.; Prostean, G. IoT Security Risk Management Strategy Reference Model (IoTSRM2). Future Internet 2021, 13, 148. [Google Scholar] [CrossRef]
- Shaffique, M.R. Cyber Resilience Act 2022: A Silver Bullet for Cybersecurity of IoT Devices or a Shot in the Dark? Comput. Law Secur. Rev. 2024, 54, 106009. [Google Scholar] [CrossRef]
- Czekster, R.M.; Webber, T.; Furstenau, L.B.; Marcon, C. Dynamic Risk Assessment Approach for Analysing Cyber Security Events in Medical IoT Networks. Internet Things 2025, 29, 101437. [Google Scholar] [CrossRef]
- Halgamuge, M.N.; Niyato, D. Adaptive Edge Security Framework for Dynamic IoT Security Policies in Diverse Environments. Comput. Secur. 2025, 148, 104128. [Google Scholar] [CrossRef]
- Beyrouti, M.; Lounis, A.; Lussier, B.; Bouabdallah, A.; Samhat, A.E. Vulnerability-Oriented Risk Identification Framework for IoT Risk Assessment. Internet Things 2024, 27, 101333. [Google Scholar] [CrossRef]
Year | Attack | Targeted IoT Domain | Process Description | Impact |
---|---|---|---|---|
2015 | Jeep Cherokee Hack [3,4] | Automotive IoT | Security researchers remotely controlled a Jeep via its IoT-connected systems. | Chrysler recalled 1.4M vehicles for security upgrades. |
2016 | Mirai Botnet Attack [4] | IoT Consumer Devices | Malware infected IoT devices like routers and cameras, creating a massive botnet. | Major websites disrupted; large-scale DDoS attacks. |
2017 | WannaCry Ransomware [5] | Industrial IoT | Exploited unpatched systems in IoT-connected healthcare devices and networks. | $4 billion in damages globally; disrupted hospitals and critical infrastructure. |
2018 | Casino IoT Thermometer Hack [6] | Smart Aquarium | Attackers used an IoT-connected thermometer to access a casino’s high-roller database. | Sensitive customer data stolen; significant reputational damage. |
2019 | Ring Doorbell Hacks [7] | Consumer IoT Devices | Hackers accessed poorly secured Ring IoT cameras, spying on and harassing users. | Privacy violations; public outcry over security flaws. |
2020 | Garmin Ransomware Attack [8] | IoT Fitness Devices | Ransomware disabled Garmin’s IoT-connected services, including aviation and fitness. | Multi-day outage; $10M ransom reportedly paid. |
2021 | Colonial Pipeline Ransomware [9] | Energy Infrastructure | Hackers exploited compromised credentials to access pipeline’s IoT-linked systems. | Shutdown of pipeline; $4.4M ransom paid; fuel shortages. |
2021 | Verkada Camera Hack [10,11] | IoT Surveillance Cameras | Attackers accessed 150,000 IoT cameras due to exposed admin credentials. | Exposure of videos from Tesla, hospitals, and jails. |
2023 | Oldsmar Water Treatment Attack [12] | Public Utilities | Hackers attempted to change chemical levels in drinking water via IoT SCADA systems. | Potential public health threat; system restored quickly. |
2023–2024 | MOVEit Data Breach [13] | Managed File Transfer Tool | Exploitation of a zero-day vulnerability in IoT-adjacent systems. | Data of millions exposed; over $100M in regulatory fines/penalties. |
Review | Attack Detection | Data Management and Protection | Securing Identity Management | Communication and Networking | Emerging Technologies | Risk Management | Domain |
---|---|---|---|---|---|---|---|
Our Work | √ | √ | √ | √ | √ | √ | √ |
[22] | - | √ | √ | √ | partially | - | General |
[23] | √ | - | - | √ | - | - | General |
[24] | √ | √ | - | √ | - | - | General |
[25] | √ | - | - | - | partially | - | Consumer |
[26] | √ | - | √ | - | - | - | Smart Homes |
[27] | √ | - | - | - | partially | - | General |
[28] | √ | - | - | - | partially | - | General |
[29] | - | √ | - | - | √ | - | Smart cities |
[30] | √ | - | - | - | partially | - | General |
[31] | - | - | - | √ | √ | - | General |
[32] | √ | - | - | - | partially | - | General |
[33] | √ | - | - | - | partially | - | General |
[34] | √ | - | - | - | partially | - | General |
[35] | √ | - | - | - | partially | - | ICN-IoT |
[36] | - | - | √ | √ | - | - | General |
[37] | √ | √ | √ | √ | partially | - | General |
[38] | √ | - | - | √ | partially | - | General |
[39] | √ | - | - | √ | partially | - | IIoT |
[40] | √ | - | - | - | partially | - | General |
[41] | √ | - | - | - | partially | - | General |
[42] | - | - | - | - | - | √ | IoMT |
[43] | √ | √ | - | √ | √ | - | General |
[44] | - | - | √ | √ | √ | - | General |
[45] | - | √ | - | √ | - | - | General |
[46] | - | √ | √ | √ | partially | - | General |
[47] | - | √ | √ | - | - | - | Resource-constrained |
[48] | √ | - | - | - | - | - | General |
[49] | - | - | - | √ | - | - | General |
[50] | √ | √ | √ | √ | partially | - | General |
[51] | √ | - | - | - | partially | - | General |
[52] | √ | - | - | √ | - | - | General |
Categories | Related Challenges | Targeted Issues | References |
---|---|---|---|
Attack detection | Increasing number of cyberattacks on IoT devices, difficulty in detecting attacks in real time. | Intrusion and anomaly detection; DDoS attacks; Eavesdropping attacks; Concept drift detection and adaptation; Botnet detection; Cyberattacks | [35,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83] |
Data management and protection | Vulnerabilities in the storage and transfer of sensitive data, privacy risks. | Data security; Data privacy; Digital Identity and Identity-based encryption; Generative AI | [84,85,86,87,88,89,90,91,92,93,94,95] |
Securing identity management | Authentication of users and devices, management of unauthorised access. | Device identification; Authorization; | [73,85,87,88,91,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118] |
Communication and Networking | Security of communications between IoT devices, risks associated with open networks. | Network security; Firmware; 5G and 6G networks | [62,72,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136] |
Emergent technologies | Integrating emerging technologies into IoT security solutions. | Machine learning; Blockchain; Artificial intelligence; Edge Computing; Fog Computing | [35,59,61,62,63,64,65,69,70,71,72,73,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,96,102,110,119,120,121,123,127,128,129,130,132,137,138,139,140,141,142,143,144] |
Risk management | Identify, address, and mitigate potential risks associated with security and privacy in IoT. | Risk management frameworks | [145,146,147,148,149,150,151,152] |
Challenge | Related Challenges | Key Threats | Solutions |
---|---|---|---|
Anomaly detection in IoT | Managing data diversity and scalability in the IoT ecosystem | Limited scalability and resilience in detecting cyberattacks | Integration of ML techniques such as Incremental Learning, Transfer Learning, and Deep Learning to obtain scalable and adaptable models able to handle concept drift |
References | [60,69,70,71,83] | ||
Detection and Prevention of DDoS and Botnet attacks | Response time optimisation, limited computational resources of devices | Continuous evolution of DDoS, Botnet attacks, and inability of the system to adapt in real time | Using ML techniques to improve response time, system adaptability, and network traffic classification |
References | [35,59,61,62,63,64,65,72,73,75,76,77,78,80,81,82] | ||
Anomaly detection efficiency | High number of false alarms, balancing detection accuracy and resource consumption | High resource consumption required by traditional detection systems | Use of ML methods for intrusion detection, collaborative systems for effort sharing; Selection of the right architecture |
References | [61,66,71,74,79] | ||
Eavesdropping attack detection | Unauthorised interception of communication signal, difficulty of detection in low signal-to-noise ratio environments | Balancing the effectiveness of signal disruption for malicious devices without degradation of quality for legitimate users, detection of interception when signal is weak | Introducing intentional signal perturbations to disrupt eavesdroppers; Backpropagation neural network model specifically designed for detecting eavesdropping attacks in low SNR scenarios; Signal encryption or modulation techniques to protect against unauthorised interception |
References | [66,67,68] |
Challenge | Related Challenges | Key Threats | Solutions |
---|---|---|---|
Data Privacy and Security | Ensuring data integrity and secure storage on decentralised networks and in the Cloud | Data access by unauthorised entities and attacks on data integrity | Blockchain-based frameworks (Hyperledger Fabric), decentralised data management, encrypted data structures, and federated learning to ensure data privacy by preventing unauthorised access |
References | [84,85,86,92,93,94,95] | ||
Securing Digital Identity | Mitigating unauthorised access and maintaining accurate lifecycle management of identities | Handling a large number of transactions and identity verifications efficiently in a decentralised system, protecting against brute-force and advanced cryptographic attacks, ensuring encryption mechanisms are robust and dynamic | Separation of identity verification and credential issuance; Linkable ring signatures, smart contracts, encrypted SSL-VPN channels; Robust security classifications and access controls |
References | [87,88,91] | ||
Data privacy and integrity in context of Generative AI technologies | Protecting sensitive data across distributed systems while balancing security, computational efficiency, and privacy during AI model training, aggregation, and inference | Data breaches, unauthorised access, exploitation of sensitive user inputs, and privacy leakage during Federated Learning model aggregation | Employing encryption, anonymization, and multi-level security mechanisms, Using Trusted Execution Environments to protect data inputs during model inference |
References | [89,90] |
Challenge | Related Challenges | Key Threats | Solutions |
---|---|---|---|
Device identification | Device identification management | Unauthorised access, data breaches, instability of wireless channels, single points of failure, identity privacy vulnerabilities, and insufficient protection in IoT and blockchain-based identity systems | Blockchain and Edge Computing based multilevel frameworks; Cryptographic techniques like zero-knowledge proofs, AES, ring signatures, distributed authentication mechanisms, and secure data-sharing protocols; Device identification using time series; Physically Unclonable Functions with Fuzzy Extractors; Geometric threshold secret-sharing in PUFs; Firmware-Secure Multi-Factor Authentication; Zero-trust digital identity model; |
References | [73,87,88,91,96,100,101,102,107,108,109,110,112,113,118] | ||
Authentication | Securing credentials in low-resource environments | Increased vulnerability due to limited resources in the authentication context | Using Ethereum Layer 2 roll-ups; mutual authentication, decentralised PKI, one-time pad encryption, sensor-based verification, ECC-AES encryption, and automated IoT trust transfer; Lattice cipher NTRU based protocol; Lattice-based proxy re-encryption (ACPRE) with dual access policies; Quantum-enhanced encryption frameworks; |
References | [85,97,98,99,103,104,105,106,111,114,115,116,117] |
Challenge | Related Challenges | Key Threats | Solutions |
---|---|---|---|
Firmware security | Ensuring firmware security in context of diverse IoT device ecosystems | Firmware vulnerabilities leading to unauthorised access, data breaches, and exploitation by attackers through unpatched or outdated software. | Developing IoT security standards, leveraging emerging technologies for adaptive solutions, employing reverse engineering for firmware analysis, and implementing hybrid frameworks for unified security approaches; Blockchain-based decentralized firmware update mechanism; Large-scale vulnerability detection system; Self-protecting anti-tampering firmware scheme |
References | [124,130,131,132,133,134] | ||
Network Scalability and Load Balancing | Dealing with the diversity of connected device types and resource requirements; Optimise resource allocation | Scalability with increasing devices connected to the system, impacting load management and resource utilisation | Grouping devices based on capacity and coverage; Load balancing optimisation protocols; Dynamic feature selection for efficient data processing |
References | [72,119,120,121,125,126,127,128,129,136] | ||
Integrating 6G in IoT | Managing high-speed data transfer, spectrum allocation, and latency requirements | Spectrum availability and security issues in 6G applications | Dynamic spectrum-sharing, AI and blockchain integration for secure 6G applications and protocol development for real-time response in 6G networks in IoT systems |
References | [72,122,123,135] |
Challenge | Related Challenges | Key Threats | Solutions |
---|---|---|---|
Lack of standardisation in risk management approach | Identifying threats and managing vulnerabilities, ensuring resilience in compliance with data protection standards | Balancing security constraints and devices; Performing real-time updates; Complying with GDPR and IoT-specific regulations while maintaining system functionality | Creating risk assessment models; Threat modelling; Using ML for real-time risk assessment; Compliance-oriented frameworks; IOTA-SRM framework for risk management; Lightweight dynamic risk assessment using scenario-based simulations; Adaptive edge security framework; Regulatory approaches such as the Cyber Resilience Act; |
References | [145,146,147,148,149,150,151,152] |
Learning Method | Challenges |
---|---|
Transfer Learning | Need of closely related source and target domains; Model performance degradation if knowledge from source is conflicting or not relevant to target domain; Could inherit vulnerabilities from source domain; Improper adjustment may lead to loss of generalization capabilities; Adjusting the target involves high computational and memory costs; Selecting the right source model not to waste computational resources. |
Incremental Learning | Not suitable for systems with large amount of data because of possibility of forgetting issues when new data is included; Could involve accidental model drift degrading model performance; Unexpected domain changes lead to instability; Used in resource constrained environments conducts to suboptimal updates. |
Deep Learning | Vulnerable to adversarial attacks, causing prediction alteration; Difficulties with distribution shift between training and real-world data; Need of large amount of labeled training data; Failures on edge cases; Training involves substantial computational resources. |
Federated Learning | Learning based on non-IID devices generated data leads to poor generalization; Model poisoning caused by an infected device; Adversarial attacks targeting local or global data; Data synchronization issues because of different speed of the connected devices; Computational limitations lead to incorrect model updates. |
Focus point | Summary | Number of Articles |
---|---|---|
Most Addressed Categories | The most studied areas are Emergent Technologies, Attack Detection, and Securing Identity Management, highlighting their significance in IoT security. Risk Management is the least explored | 51 (Emergent Technologies), 26 (Attack Detection), 28 (Identity Management), 8 (Risk Management) |
Emergent Technologies Adoption | Widely used for attack detection, anomaly detection, and secure identity management. ML, Blockchain, and AI are the most discussed | 51 |
Challenges of Emergent Technologies | Vulnerabilities and resource constraints inherent to IoT devices, training artificial intelligence and machine learning models requires substantial computational resources, and regulatory issues and ethical dilemmas arise | - |
Identity Protection | Focuses on preventing unauthorized access and credential theft through multi-factor authentication, access controls, and blockchain-based identity management. Future directions suggest biometric authentication with AI for enhanced security | 28 |
Attack Detection | Highlights the need for real-time monitoring, fast response times, and adaptability to evolving threats. ML-based approaches improve accuracy but face issues with concept drift, false alarms, and resource limitations. | 26 |
Secure Communication and Networking | Protocols tailored for 5G and 6G networks, along with AI integration, are proposed to enhance data flow reliability Addresses challenges from diverse connected devices and spectrum allocation, proposing solutions like grouping devices by capacity and coverage, dynamic spectrum sharing, and IoT security standards | 20 |
Data Security | Encryption, backup strategies, and compliance with data protection regulations are emphasized to prevent breaches. Post-quantum cryptography is identified as a growing area of concern. | 12 |
Risk Management | Building robust cybersecurity methodologies for IoT systems, incorporating ML and AI for dynamic rule adaptation and identification of latent risks Emphasizes the need for standardization, proposing compliance-oriented frameworks, threat modelling techniques, and risk assessment models | 8 |
Regulatory Framework | Highlights the need for global standards to govern IoT security. Future efforts should focus on AI governance, blockchain compliance, and adaptive regulations to keep up with evolving threats. | - |
Category | Future Directions |
---|---|
Attack detection | Develop AI and ML-based techniques to improve real-time anomaly detection and threat prediction Securing smart home systems with weak credentials |
Data management and protection | Integrating blockchain and privacy-preserving techniques |
Securing identity management | Decentralized identity solutions and advanced authentication mechanisms |
Communication and Networking | Quantum-resistant cryptography Interference mitigation strategies in dynamic spectrum sharing |
Emergent technologies | Optimise resource management using AI and ML |
Risk management | Investigate secure fallback strategies International standards and regulatory framework development |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sebestyen, H.; Popescu, D.E.; Zmaranda, R.D. A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. Computers 2025, 14, 61. https://doi.org/10.3390/computers14020061
Sebestyen H, Popescu DE, Zmaranda RD. A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. Computers. 2025; 14(2):61. https://doi.org/10.3390/computers14020061
Chicago/Turabian StyleSebestyen, Hannelore, Daniela Elena Popescu, and Rodica Doina Zmaranda. 2025. "A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories" Computers 14, no. 2: 61. https://doi.org/10.3390/computers14020061
APA StyleSebestyen, H., Popescu, D. E., & Zmaranda, R. D. (2025). A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. Computers, 14(2), 61. https://doi.org/10.3390/computers14020061