Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions
Abstract
1. Introduction
1.1. IoE and Security: Surge in Security and Privacy Issues Driven by the Proliferation of IoE
- Scalability Challenges: The explosive growth of connected devices generates enormous volumes of data, challenging the capacity of centralized security architectures.
- Data Privacy Risks: IoE environments collect sensitive personal, financial, and medical data, often requiring privacy-preserving AI techniques to ensure confidentiality.
- Cybersecurity Threats: IoE is inherently vulnerable to Man-in-the-Middle (MITM) attacks, Distributed Denial of Service (DDoS) attacks, and adversarial AI-driven threats.
- Quantum Computing Risks: The rise in quantum computing threatens traditional cryptographic standards, making cryptographic agility and post-quantum security essential requirements.
1.2. Emerging Security Paradigms in IoE: Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions
- Blockchain for Secure IoE Operations and Data Integrity: Blockchain offers a robust solution for ensuring data integrity and access control through its distributed ledger architecture. Particularly, Decentralized Identity (DID) and Self-Sovereign Identity (SSI) models provide decentralized security frameworks for authorization and secure data sharing in IoE environments [19,20,21].
- Edge Computing for Privacy-Preserving and Low-Latency Security: Edge Computing enables IoE devices to process large volumes of data at the network edge rather than relying on centralized cloud servers. While this approach reduces latency, it also introduces new security threats [22,23,24]. Edge AI shifts computation to local edge nodes, such as IoT gateways, 5G edge servers, and AI-enabled microcontrollers, minimizing the need to transfer data to central cloud servers. This facilitates real-time threat detection, AI-driven anomaly detection, and localized privacy-preserving processing [25,26,27,28].
- Quantum-Resilient Security for Future-Proofing IoE: Quantum computing poses significant risks to classical encryption schemes, making quantum-resilient cryptographic methods essential for long-term IoE security. Approaches such as lattice-based cryptography, hash-based signatures, and multivariate polynomial cryptographic techniques offer quantum-resistant alternatives to traditional cryptographic standards [33,34,35].
- IoE Security and Privacy Risks
- Blockchain-Based Trust and Data Integrity in IoE
- Low-Latency, Privacy-Preserving Security through Edge AI
- Quantum-Resilient Cryptographic Solutions for Future IoE Networks
1.3. Main Contributions of the Study
- Layered Classification of IoE Security and Privacy Risks: Security threats across all IoE architecture layers have been systematically classified, providing a holistic understanding of vulnerabilities and facilitating the development of targeted countermeasures.
- Comparative Analysis of Key Security Paradigms: Blockchain, Edge AI, and Quantum-Resilient Cryptography have been comparatively analyzed, with their strengths, weaknesses, and application scenarios identified, and IoE-specific threats mapped to the most suitable defense mechanisms.
- Evaluation of Privacy-Preserving AI and Post-Quantum Solutions: Privacy-preserving AI techniques such as Federated Learning, Differential Privacy, and Secure Multi-Party Computation, along with post-quantum cryptographic methods, have been analyzed, and their practical applicability in IoE environments has been assessed.
- Proposed Integrated and Hybrid Security Architecture for IoE: An integrated layered security architecture combining Blockchain, AI, and Quantum-Resilient Technologies has been proposed, enhancing authentication, data integrity, and threat mitigation. Its functional components and workflows have been described with attention to both theoretical and practical deployment aspects.
- Identification of Future Research Directions and Remaining Literature Gaps: Current limitations and literature gaps have been identified, and clear priorities have been outlined for advancing hybrid, scalable, and quantum-resilient IoE security solutions.
1.4. Methodology
- Database and Publication Selection: Studies published in peer-reviewed journals indexed in leading academic databases such as IEEE Xplore, Elsevier ScienceDirect, Springer, MDPI, Wiley, ACM, and Taylor & Francis were selected. In the selection process, no publisher priority was applied; instead, the content relevance, contribution value, and recency of the studies were prioritized.
- Inclusion Criteria: The following criteria were used to include literature in the study:
- Studies analyzing multi-layered security threats (physical, network, data, application layers) in IoE environments,
- Architectures integrating blockchain-based decentralized security solutions into IoE,
- AI-supported security models (particularly Edge AI, Federated Learning, Anomaly Detection),
- Studies focusing on post-quantum cryptography (PQC) and quantum-resilient system solutions,
- Literature examining methods such as ABAC, SMPC, and Zero-Knowledge Proof in the context of data privacy and access control,
- Publications that include systematic proposals, architectural models, and comparative analyses at the intersection of multiple technologies.
- Keyword-Based Search: The literature review was conducted using keyword combinations. Prominent terms include:“Edge AI security”, “Blockchain-enabled IoT”, “quantum-resistant cryptography”, “ABAC in IoT”, “Federated Learning for edge devices”, “IoE security threats”, “IoT anomaly detection”, “zero-trust IoT architecture”, “quantum-safe identity”, “cross-domain healthcare blockchain”, and similar expressions.
- Thematic Structuring of Content: The content of the study was designed based on a predefined thematic plan (table of content). The main topics of the review, IoE security, privacy, and quantum-resilient solutions, have been systematically structured within a multi-layered content framework.
- 5.
- Presentation of Analyses and Visualization: The content presented in the study is supported by figures and tables to ensure that the reader can clearly understand the relationships, advantages, and limitations between different technologies. In this context, comparative solution maps, diagrams classifying security threats by layers, and tables showing performance differences in Edge AI devices are included.
- 6.
- Scope and Limitations: While this review provides a comprehensive overview of AI, Blockchain, Edge Computing, and Quantum-Resilient Security solutions for IoE, it does not claim to cover the entire body of IoE security literature. Instead, the focus is on works that offer layered security perspectives and multi-technology integrations relevant to emerging IoE ecosystems.
1.5. Paper Organization
2. Security and Privacy Challenges in IoE
2.1. Fundamental Security Risks in IoE
2.1.1. Identity Management and Authorization Problems
- Man-in-the-Middle (MitM) attacks: Due to the lack of robust authentication mechanisms during data transmission, attackers can intercept and manipulate communications between devices [37].
2.1.2. Data Privacy and Confidentiality Risks
2.1.3. Comparison of Centralized and Decentralized Security Models
2.1.4. Layered Classification of IoE Security
2.2. Next-Generation Attack Vectors in IoE
2.2.1. AI-Based Cyber Attacks: Adversarial AI, Model Poisoning
2.2.2. Quantum Computing-Based Security Threats
2.2.3. Risks in Edge and Cloud Security for IoE
3. Security and Privacy-Preserving Solutions for IoE
3.1. Blockchain-Based Security Solutions
3.1.1. Blockchain-Based Data Storage and Security Models
- On-Chain Storage: Small-scale IoE data is stored directly on the blockchain.
- Off-Chain Storage: For large-scale IoE data, integration with IPFS and decentralized databases is applied.
- Hybrid Storage: A mixed model where frequently accessed data is stored on-chain, while large-volume data is stored off-chain.
3.1.2. Blockchain for Authentication in IoE: DID and SSI Methods
3.1.3. ZKP Approach for Privacy Protection in IoE-Based Systems
- Completeness: If the stated assertion is correct, the verifier always accepts the proof. Mathematically, this can be expressed as: ∀x ∈ L, if P(x) is honest ⇒ V(x) = accept, can be expressed as.
- Soundness: For an incorrect assertion, the probability of a malicious prover convincing the verifier is negligible. This is expressed as: ∀x ∉ L, Probability[V(x) = accept] < ε.
- Zero-Knowledge: The verifier is convinced of the correctness of the assertion but gains no additional knowledge beyond this fact [78].
- User authentication: Users can authenticate themselves without revealing biometric data.
- Proof of data ownership: For example, a patient can prove possession of a medical document without sharing its content.
- Access control: In smart building systems, users can prove they have access rights to certain areas.
3.1.4. Blockchain-Based Access Control Solutions
- RBAC: Determines access permissions based on user roles.
- ABAC: Dynamically determines access permissions based on user behavior.
3.1.5. Blockchain-Based Use Cases in IoE Security
- Decentralized Identity (DID): Enables users and devices to perform identity authentication without relying on central servers.
- Smart Contracts: Allow access policies to be autonomously enforced, reducing the risk of human error.
- Data Integrity and Provenance: Through the chained record structure, IoE data becomes tamper-proof, increasing reliability.
- Consensus Mechanisms (PoS, PBFT, Directed Acyclic Graph (DAG)): Improve the scalability and transaction efficiency of blockchain, enabling real-time secure transactions in IoE systems.
3.1.6. Performance of Blockchain Systems
3.2. Edge AI and Secure Computing in IoE
3.2.1. The Role of Edge AI in Ensuring Security in IoE
- Detects anomalies in real-time, allowing immediate responses to attacks or unexpected behaviors [106].
3.2.2. Privacy-Preserving Data Processing in IoE with Edge Computing and AI
3.2.3. Federated Learning-Based Edge AI Solutions
3.2.4. Edge AI Security Mechanisms for IoE
3.2.5. AI Performance Metrics of Edge Computing Devices
3.3. Quantum-Resilient Security Approaches
3.3.1. Post-Quantum Cryptographic Methods
- Hardware Layer: This bottom layer involves physical components such as cryptographic accelerators and secure hardware modules. These devices enable post-quantum algorithms in the upper layers to operate securely and efficiently [70].
3.3.2. Quantum-Resilient Blockchain Protocols: Post-Quantum Digital Signatures
3.3.3. Security Optimization in IoE with Quantum AI
3.3.4. Security and Performance Comparison of Post-Quantum Encryption Algorithms
3.4. Real-World Problems and Technology Mapping
3.5. Integration of Different Security Layers
3.5.1. Security Layer Combinations According to IoE Use Cases
3.5.2. Multi-Layered Security Architectures
3.5.3. Proposed Integrated Layered Architecture
Algorithm 1. AI-Based risk labeling for IoE streams |
Input: S_i //Raw data from the IoE device M_AI //Trained AI model Output: Risk_Label: {Low, Medium, High}, Filtered_Data 1: Receive data stream S_i from IoE device 2: X_i ← preprocess(S_i) 3: threat_features ← ExtractFeatures(X_i) 4: threat_score ← M_AI(threat_features) 5: if threat_score ≥ 0.8 then 6: Risk_Label ← “High” 7: else if Threat_Score ≥ 0.5 then 8: Risk_Label ← “Medium” 9: else 10: Risk_Label ← “Low” 11: endif 12: Filtered_Data ← summarize(X_i, threat_features) 13: return Risk_Label, Filtered_Data |
Algorithm 2. Federated learning phase on edge devices |
Input: Filtered_Data_i //Processed data from the i-th edge device M_local_i //Local model on the edge node E //Epoch η //Learning rate Output: Model_Update_i //Weight update of the i-th device 1: Initialize M_local_i ← Global_Model 2: for epoch = 1 to E do 3: Mini_Batch ← CreateBatches(Filtered_Data_i) 4: foreach (x, y) ∈ Mini_Batch do 5: y_pred ← M_local_i(x) 6: loss ← ComputeLoss(y_pred, y) //Update of model parameters (weights and biases) 7: M_local_i ← M_local_i − η ∇loss 8: endforeach 9: endfor 10: Model_Update_i ← M_local_i − Global_Model 11: return Model_Update_i //to aggregator on blockchain or //secure aggregator node |
Algorithm 3. Secure global aggregation and blockchain logging |
Input: LocalModelUpdates[] //Updated model parameters from each IoE device group PublicKey_QR //Public key for Quantum-Resilient Encryption SmartContract_SC //Access control and logging smart contract //running on the blockchain Output: BlockchainRecord //Secure and immutable record of the updated model AggregatedModel //Securely aggregated (global) model 1: Initialize AggregatedModel ← ZeroModel 2: foreach LocalModel in LocalModelUpdates[] do 3: AggregatedModel ← AggregatedModel + Weighted(LocalModel) 4: endforeach 5: EncryptedModel ← Encrypt_QR(AggregatedModel, PublicKey_QR) 6: TX ← FormatTransaction(EncryptedModel, Metadata) 7: if ValidateSmartContract(SC, TX) == True then 8: BlockchainRecord ← CommitToBlockchain(TX) 9: else 10: Raise Error(“Smart Contract Rejected the Aggregation Record”) 11: endif 12: return BlockchainRecord, AggregatedModel |
Algorithm 4. Quantum AI-Based threat analysis and proactive alerting |
Input: BlockchainLog[] //Encrypted model updates and event logs stored on the blockchain QuantumModel_QAI //Pre-trained Quantum AI threat analysis model Threshold_Threat //Risk score threshold Output: ThreatPrediction //List of potential threats with confidence scores ProactiveAlerts[] //Early warnings and in-system defense triggers 1: DecryptedData ← Decrypt_QR(BlockchainLog[], PrivateKey_QR) 2: StructuredInput ← Preprocess(DecryptedData) 3: ThreatScores ← QuantumModel_QAI.Predict(StructuredInput) 4: ThreatPrediction ← [] 5: ProactiveAlerts ← [] 6: foreach score in ThreatScores do 7: if score > Threshold_Threat then 8: Append(ThreatPrediction, (EventID, score)) 9: alert ← GenerateAlert(EventID, score, “HIGH-RISK”) 10: Append(ProactiveAlerts, alert) 11: else 12: continue 13: endforeach 14: return ThreatPrediction, ProactiveAlerts |
4. Open Challenges and Future Research Directions
4.1. Challenges of Blockchain-Based Security Models in IoE
- Development of lightweight and scalable blockchain consensus mechanisms
- Investigation of decentralized identity management systems for IoE scalability
- Protection of smart contracts against cyberattacks
4.2. Future Research on the Impact of Quantum Computing on IoE Security
4.3. AI-Driven Security: Federated Learning and Edge AI Challenges
- Data synchronization and model update frequencies must be optimized for IoE environments.
- Blockchain-based verification mechanisms should be incorporated to ensure the reliability of model sharing.
- Efficient implementation of FL in IoE devices and Edge AI
- Optimization of Edge AI for real-time IoE security
- Protection of AI models against Adversarial Attacks and Model Poisoning
- Secure sharing of AI model updates using blockchain-supported mechanisms
4.4. Interoperability and Trust Management
4.5. Holistic Future Challenges and Strategic Opportunities
5. Discussions
5.1. Evaluation of Existing Solutions for IoE Security
5.2. Emerging Security Risks with the Expansion of IoE
5.3. Effectiveness and Limitations of Blockchain, AI, and Quantum-Resilient Solutions
5.4. Critical Open and Deployment Issues in IoE Security
- How can Blockchain scalability be achieved in IoE environments?
- How can Edge AI models be made more resilient to attacks?
- How can the impact of quantum computing on IoE security be minimized?
- How can autonomous self-protecting security systems be developed for IoE devices?
5.5. Emerging Directions and Practical Considerations for IoE Security
5.5.1. Split Learning (SL) and Federated Learning (FL) Synergies
5.5.2. Non-Terrestrial Networks (NTNs) for Secure IoE Connectivity
5.5.3. Regulatory and Interdisciplinary Perspectives
5.6. Proposed Research Roadmap and Future Directions
- The individual technological maturation timelines,
- The evolutionary steps of integrated security architectures.
5.6.1. Timeline of Core Technology Maturity
5.6.2. Strategic Roadmap for Integrated Cyber-Physical Systems
6. Conclusions
- 1.
- IoE Security Requires Multi-Layered and Context-Aware Architectures: Traditional security methods based on centralized structures are not suitable for the distributed nature of IoE. Blockchain-based identity and access control systems such as DID and SSI can play a critical role in addressing this gap.
- 2.
- Edge AI Can Reduce Privacy and Latency Issues in IoE: Processing data at the edge device, without relying on centralized cloud systems, not only reduces privacy risks but also improves decision-making processes with lower latency. Models like FL enable local machine learning without sharing data with a central server.
- 3.
- Quantum Computing Threatens IoE Security and Existing Infrastructures, Requiring New Cryptographic Solutions: Algorithms like Shor’s and Grover’s undermine the foundations of classical cryptography. PQC, including lattice-based encryption, hash-based methods, and quantum-safe blockchain protocols, is critical to the future evolution of security.
- 4.
- Security Solutions Vary by Application Context: Each security layer (blockchain, Edge AI, quantum security) has different advantages and trade-offs in terms of scalability, energy consumption, and computational load. Therefore, hybrid solutions and context-aware strategies must be developed.
- 5.
- Open Research Areas Remain:
- How can threat prediction systems be developed using Quantum AI to optimize IoE security?
- How can blockchain-based security protocols become more scalable for IoE environments?
- How can energy-efficient, low-computation, privacy-preserving solutions be built for edge devices?
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Farias da Costa, V.C.; Oliveira, L.; de Souza, J. Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 2021, 21, 568. [Google Scholar] [CrossRef]
- Mohd Ali, F.; Md Yunus, N.A.; Mohamed, N.N.; Mat Daud, M.; Sundararajan, E.A. A systematic mapping: Exploring internet of everything technologies and innovations. Symmetry 2023, 15, 1964. [Google Scholar] [CrossRef]
- Souza, D.; Iwashima, G.; Farias da Costa, V.C.; Barbosa, C.E.; de Souza, J.M.; Zimbrão, G. Architectural trends in collaborative computing: Approaches in the internet of everything era. Future Internet 2024, 16, 445. [Google Scholar] [CrossRef]
- Galabuzi, C.; Kaidi, H.M.; Omalla, M.K.T. Interactive IoE smart city dashboard in enhancing urban data analysis. In Proceedings of the IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), Langkawi, Kedah, Malaysia, 21–23 December 2024; pp. 508–511. [Google Scholar]
- Simionescu, M.; Strielkowski, W. The role of the internet of things in enhancing sustainable urban energy systems: A review of lessons learned from the COVID-19 pandemic. J. Urban Technol. 2025, 32, 103–132. [Google Scholar] [CrossRef]
- Goel, P.K.; Saraswat, B.K. Security and privacy in IoE systems: Computer vision approaches for surveillance and threat detection. In Computer Vision and Internet of Everything (IoE) for Societal Needs; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 301–318. [Google Scholar]
- Al-Zewairi, M.; Almajali, S.; Ayyash, M.; Rahouti, M.; Martinez, F.; Quadar, N. Multi-stage enhanced zero trust intrusion detection system for unknown attack detection in internet of things and traditional networks. ACM Trans. Priv. Secur. 2025. [Google Scholar] [CrossRef]
- Meydani, A.; Shahinzadeh, H.; Ramezani, A.; Gharehpetian, G.B.; Tanwar, S. Analysis of the cybersecurity and privacy protection of blockchain-empowered internet of energy (IoE). In Proceedings of the 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT), Mashhad, Iran, 14–15 May 2024; pp. 213–228. [Google Scholar]
- Karaduman, Ö.; Gülhas, G. Blockchain-enabled supply chain management: A review of security, traceability, and data integrity amid the evolving systemic demand. Appl. Sci. 2025, 15, 2076–3417. [Google Scholar] [CrossRef]
- Iqbal, S.; Majeed, S.; Shah, S.A.H. Future cybersecurity challenges for IoE networks. In Cybersecurity Vigilance and Security Engineering of Internet of Everything; Springer Nature: Cham, Switzerland, 2023; pp. 75–86. [Google Scholar]
- Mathur, N.; Sinha, S. Security model and access control mechanisms for attack mitigation in IoE. In Blockchain Technology for IoE, 1st ed.; CRC Press: Boca Raton, FL, USA, 2023; pp. 67–99. [Google Scholar]
- Rao, P.M.; Deebak, B.D. A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks 2023, 146, 103159. [Google Scholar] [CrossRef]
- Abdalla, R.S.; Ali, E.S.; Mahbub, S.A.; Mokhtar, R.A.; Ahmed, Z.E. Internet of Energy (IoE): A Comprehensive Review of Design, Principles, and Architectural Frameworks. In International Conference on e-Infrastructure and e-Services for Developing Countries; Springer Nature: Cham, Switzerland, 2023; pp. 83–99. [Google Scholar]
- Iftikhar, A.; Qureshi, K.N. Future privacy and trust challenges for IoE networks. In Cybersecurity Vigilance and Security Engineering of Internet of Everything; Springer Nature: Cham, Switzerland, 2023; pp. 193–218. [Google Scholar]
- Sheikh, A.M.; Islam, M.R.; Habaebi, M.H.; Zabidi, S.A.; Bin Najeeb, A.R.; Kabbani, A. A Survey on edge computing (EC) security challenges: Classification, threats, and mitigation strategies. Future Internet 2025, 17, 175. [Google Scholar] [CrossRef]
- Shafee, A.; Hasan, S.R.; Awaad, T.A. Privacy and security vulnerabilities in edge intelligence: An analysis and countermeasures. Comput. Electr. Eng. 2025, 123, 110146. [Google Scholar] [CrossRef]
- Syllaidopoulos, I.; Ntalianis, K.; Salmon, I. A Comprehensive survey on AI in counter-terrorism and cybersecurity: Challenges and ethical dimensions. IEEE Access 2025, 13, 91740–91764. [Google Scholar] [CrossRef]
- Chen, S.J.; Tsai, Y.H. Quantum-safe networks for 6G an integrated survey on PQC, QKD, and satellite QKD with future perspectives. Comput. AI Connect. 2025, 2, 1–10. [Google Scholar]
- Pailkar, H.; Murugan, T. A Literature study on blockchain-based access control for electronic health records. In Cybersecurity and Data Science Innovations for Sustainable Development of HEICC; CRC Press: Boca Raton, FL, USA, 2025; pp. 167–183. [Google Scholar]
- Labonno, S.I.; Chowdhury, M.T.A. Blockchain and IoE transforming industry applications. In Convergence of Blockchain, Internet of Everything, and Federated Learning for Security; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 177–208. [Google Scholar]
- da Silva Costa, R.; Rupino Da Cunha, P. Self-Sovereign identities: Brief history and survey of the field. In Advances in Information Systems Development; Springer: Cham, Switzerland, 2025; pp. 43–62. [Google Scholar]
- Shah, I.A.; Ahmed, M. Edge computing, emerging trends, and drone technology for the business industry. In Computer Vision and Edge Computing Technologies for the Drone Industry; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 89–104. [Google Scholar]
- Albshaier, L.; Almarri, S.; Albuali, A. Federated learning for cloud and edge security: A systematic review of challenges and AI opportunities. Electronics 2025, 14, 1019. [Google Scholar] [CrossRef]
- Kaki, S.S.; Kantareddygari, J.R.; Aishwarya, R. Privacy and security concerns in edge-cloud systems: An in-depth analysis. In Proceedings of the 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 5–7 February 2023; pp. 435–441. [Google Scholar]
- Hakeem, S.A.A.; Kim, H. Advancing intrusion detection in V2X networks: A comprehensive survey on machine learning, federated learning, and edge AI for V2X security. IEEE Trans. Intell. Transp. Syst. 2025; 1–69, Early Access. [Google Scholar] [CrossRef]
- Islam, M.R.; Farid, F.A. Advancements in AI-based anomaly detection for smart manufacturing. In Artificia l Intelligence for Smart Manufacturing and Industry X.0; Springer: Cham, Switzerland, 2025; pp. 37–68. [Google Scholar]
- Garcia, A.; Tardos, J.; Lainez, W. Microcontroller based network for industrial edge AI. In International Conference on Innovative Intelligent Industrial Production and Logistics; Springer Nature: Cham, Switzerland, 2024; pp. 475–485. [Google Scholar]
- Zhang, X.; Zhou, Y.; Wu, D.; Sheng, Q.Z.; Riaz, S.; Hu, M.; Xiao, L. A Survey on privacy-preserving caching at network edge: Classification, solutions, and challenges. ACM Comput. Surv. 2025, 57, 114. [Google Scholar] [CrossRef]
- Standen, M.; Kim, J.; Szabo, C. Adversarial machine learning attacks and defences in multi-agent reinforcement learning. ACM Comput. Surv. 2025, 57, 124. [Google Scholar] [CrossRef]
- Vadillo, J.; Santana, R.; Lozano, J.A. Adversarial attacks in explainable machine learning: A survey of threats against models and humans. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2025, 15, e1567. [Google Scholar] [CrossRef]
- Pérez, B.; Resino, M.; Seco, T.; García, F.; Al-Kaff, A. Innovative approaches to traffic anomaly detection and classification using AI. Appl. Sci. 2025, 15, 5520. [Google Scholar] [CrossRef]
- Verma, N.; Kumar, N.; Sheikh, Z.A.; Koul, N.; Ashish, A. machine learning for the cybersecurity of robotic cyber-physical systems: A review. Procedia Comput. Sci. 2025, 259, 1817–1826. [Google Scholar] [CrossRef]
- Turnip, T.N.; Andersen, B.; Vargas-Rosales, C. Towards 6G authentication and key agreement protocol: A survey on hybrid post quantum cryptography. IEEE Commun. Surv. Tutor. 2025; Early Access. [Google Scholar] [CrossRef]
- Nguyen, H.; Huda, S.; Nogami, Y.; Nguyen, T.T. Security in post-quantum era: A comprehensive survey on lattice-based algorithms. IEEE Access 2025, 13, 89003–89024. [Google Scholar] [CrossRef]
- Mansoor, K.; Afzal, M.; Iqbal, W.; Abbas, Y. Securing the future: Exploring post-quantum cryptography for authentication and user privacy in IoT devices. Clust. Comput. 2025, 28, 93. [Google Scholar] [CrossRef]
- Madanian, S.; Chinbat, T.; Subasinghage, M.; Airehrour, D.; Hassandoust, F.; Yongchareon, S. Health IoT threats: Survey of risks and vulnerabilities. Future Internet 2024, 16, 389. [Google Scholar] [CrossRef]
- Mohamed, N.; Ahmed, A.A. AI in combatting man-in-the-middle attacks: A comprehensive review. In Proceedings of the 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24–28 June 2024; pp. 1–6. [Google Scholar]
- Verma, R.; Soni, G.; Sahu, S.; Chandrawanshi, K. Security requirements, issues, and challenges in IoE. In Blockchain Technology for IoE; CRC Press: Boca Raton, FL, USA, 2023; pp. 21–43. [Google Scholar]
- Sharma, A.; Suganya, R.; Krishna, P.B.; Raj, R.; Murugesan, R.K. Network efficient hierarchical authentication algorithm for secure communication in IoT and IoE. IEEE Access 2024, 12, 195926–195942. [Google Scholar] [CrossRef]
- Lin, I.C.; Yeh, I.; Chang, C.C.; Liu, J.C.; Chang, C.C. Designing a secure and scalable data sharing mechanism using decentralized identifiers (DID). CMES-Comput. Model. Eng. Sci. 2024, 141, 809–822. [Google Scholar] [CrossRef]
- Shuaib, M.; Alam, S.; Alam, M.S.; Nasir, M.S. Self-sovereign identity for healthcare using blockchain. Mater. Today Proc. 2023, 81, 203–207. [Google Scholar] [CrossRef]
- Jimo, S.; Abdullah, T.; Jamal, A. IoE security risk analysis in a modern hospital ecosystem. In Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022; Springer International Publishing: Cham, Switzerland, 2023; pp. 451–467. [Google Scholar]
- Singh, S.; Sharma, P.K.; Moon, S.Y.; Park, J.H. Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions. J. Ambient. Intell. Humaniz. Comput. 2024, 15, 1625–1642. [Google Scholar] [CrossRef]
- Podda, E. Big Data Analysis Systems in IoE Environments for Managing Privacy and Data Protection: Pseudonymity, De-anonymization and the Right to be Forgotten. Ph.D. Thesis, University of Bologna, Bologna, Italy, 2023. [Google Scholar]
- Bhade, P.; Paturel, J.; Sentieys, O.; Sinha, S. Lightweight hardware-based cache side-channel attack detection for edge devices (edge-cascade). ACM Trans. Embed. Comput. Syst. 2024, 23, 56. [Google Scholar] [CrossRef]
- Liu, Y.; Ju, J.; Li, Z. Privacy-preserving electric vehicle charging recommendation by incorporating full homomorphic encryption and secure multi-party computing. World Electr. Veh. J. 2024, 15, 446. [Google Scholar] [CrossRef]
- Zeydan, E.; Blanco, L.; Mangues-Bafalluy, J.; Arslan, S.S.; Turk, Y.; Yadav, A.K.; Liyanage, M. Blockchain-based self-sovereign identity: Taking control of identity in federated learning. IEEE Open J. Commun. Soc. 2024, 5, 5764–5781. [Google Scholar] [CrossRef]
- Prasad, S.; Tiwari, N. Zero-knowledge proofs in blockchain-enabled supply chain management. In Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Springer Nature: Singapore, 2024; pp. 47–70. [Google Scholar]
- Pandey, S.; Bhushan, B.; Hameed, A.A. Securing healthcare 5.0: Zero-knowledge proof (zkp) and post quantum cryptography (pqc) solutions for medical data security. In Soft Computing in Industry 5.0 for Sustainability; Springer Nature: Cham, Switzerland, 2024; pp. 339–355. [Google Scholar]
- Gong, G. Uni/multi variate polynomial embeddings for zkSNARKs. Cryptogr. Commun. 2024, 16, 1257–1288. [Google Scholar] [CrossRef]
- Dervisevic, E.; Tankovic, A.; Fazel, E.; Kompella, R.; Fazio, P.; Voznak, M.; Mehic, M. Quantum key distribution networks-key management: A survey. ACM Comput. Surv. 2025, 57, 257. [Google Scholar] [CrossRef]
- Prajapat, S.; Thakur, G.; Kumar, P.; Das, A.K.; Jamal, S.S.; Susilo, W. Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Comput. Electr. Eng. 2025, 123, 110028. [Google Scholar] [CrossRef]
- Akçay, L.; Yalçın, B.Ö. Lightweight asip design for lattice-based post-quantum cryptography algorithms. Arab. J. Sci. Eng. 2025, 50, 835–849. [Google Scholar] [CrossRef]
- Wu, F.; Zhou, B.; Song, J.; Xie, L. Quantum-resistant blockchain and performance analysis. J. Supercomput. 2025, 81, 498. [Google Scholar] [CrossRef]
- Zheng, X. Research on blockchain smart contract technology based on resistance to quantum computing attacks. PLoS ONE 2024, 19, e0302325. [Google Scholar] [CrossRef] [PubMed]
- Gilbert, C.; Gilbert, M. Unlocking Privacy in Blockchain: Exploring Zero-Knowledge Proofs and Secure Multi-Party Computation Techniques; SSRN: Rochester, NY, USA, 2024. [Google Scholar]
- Arazzi, M.; Lax, G.; Nocera, A. Evading model poisoning attacks in federated learning by a long-short-term-memory-based approach. Integr. Comput.-Aided Eng. 2025, 32, 111–125. [Google Scholar] [CrossRef]
- Shafee, A.; Awaad, T.A.; Moro, A. A survey of edge computing privacy and security threats and their countermeasures. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Knoxville, TN, USA, 1–3 July 2024; pp. 484–489. [Google Scholar]
- Baimukhanov, S.; Ali, H.; Yazici, A. Enhancing ML-based anomaly detection in data management for security through integration of IoT, cloud, and edge computing. Expert Syst. Appl. 2025, 293, 128700. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhang, J.; Cao, Y. Manipulating vulnerability: Poisoning attacks and countermeasures in federated cloud–edge–client learning for image classification. Knowl.-Based Syst. 2023, 259, 110072. [Google Scholar] [CrossRef]
- Baniecki, H.; Biecek, P. Adversarial attacks and defenses in explainable artificial intelligence: A survey. Inf. Fusion 2024, 107, 102303. [Google Scholar] [CrossRef]
- Hoang, V.T.; Ergu, Y.A.; Nguyen, V.L.; Chang, R.G. Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey. J. Netw. Comput. Appl. 2024, 232, 104031. [Google Scholar] [CrossRef]
- Olutimehin, A.T.; Ajayi, A.J.; Metibemu, O.C.; Balogun, A.Y.; Oladoyinbo, T.O.; Olaniyi, O.O. Adversarial Threats to AI-Driven Systems: Exploring the Attack Surface of Machine Learning Models and Countermeasures; SSRN: Rochester, NY, USA, 2025. [Google Scholar]
- Yang, L.; Miao, Y.; Liu, Z.; Liu, Z.; Li, X.; Kuang, D.; Li, H.; Deng, R.H. Enhanced model poisoning attack and multi-strategy defense in federated learning. IEEE Trans. Inf. Forensics Secur. 2025, 20, 3877–3892. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Parizi, R.M. A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inf. Forensics Secur. 2024, 19, 6693–6708. [Google Scholar] [CrossRef]
- Mohammed, A. Cyber security implications of quantum computing: Shor’s algorithm and beyond. Innov. Comput. Sci. J. 2024, 10, 1–23. [Google Scholar]
- Modi, P.; Asgola, A.; Mishra, H.; Charanya, R. The threat of quantum computing to the cryptographic security of blockchain. In Proceedings of the IEEE Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), Vellore, India, 22–23 February 2024; pp. 1–13. [Google Scholar]
- Yoon, C.S.; Hong, C.H.; Kang, M.S.; Choi, J.W.; Yang, H.J. Quantum asymmetric key crypto scheme using Grover iteration. Sci. Rep. 2023, 13, 3810. [Google Scholar] [CrossRef]
- Soni, L.; Chandra, H.; Gupta, D.S. Post-quantum attack resilience blockchain-assisted data authentication protocol for smart healthcare system. Softw. Pract. Exp. 2024, 54, 2170–2190. [Google Scholar] [CrossRef]
- Castiglione, A.; Esposito, J.G.; Loia, V.; Nappi, M.; Pero, C.; Polsinelli, M. Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices. IEEE Trans. Ind. Inform. 2024, 21, 1674–1683. [Google Scholar] [CrossRef]
- Savadatti, S.G.; Krishnamoorthy, S.; Delhibabu, R. Survey of distributed ledger technology (DLT) for secure and scalable computing. IEEE Access 2025, 13, 8393–8415. [Google Scholar] [CrossRef]
- Doan, T.V.; Psaras, Y.; Ott, J.; Bajpai, V. Toward decentralized cloud storage with IPFS: Opportunities, challenges, and future considerations. IEEE Internet Comput. 2022, 26, 7–15. [Google Scholar] [CrossRef]
- Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security challenges and performance trade-offs in on-chain and off-chain blockchain storage: A comprehensive review. Appl. Sci. 2025, 15, 3225. [Google Scholar] [CrossRef]
- Sharma, P.; Wilfred Godfrey, W.; Trivedi, A. When blockchain meets IoT: A comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain. Clust. Comput. 2024, 27, 269–284. [Google Scholar] [CrossRef]
- Akli, A.; Chougdali, K. IOTA-assisted self-sovereign identity framework for decentralized authentication and secure data sharing. IEEE Access 2025, 13, 80191–80205. [Google Scholar] [CrossRef]
- Xue, Y.; Wang, J. Design of a blockchain-based traceability system with a privacy-preserving scheme of zero-knowledge proof. Secur. Commun. Netw. 2022, 2022, 5842371. [Google Scholar] [CrossRef]
- Xing, Z.; Zhang, Z.; Zhang, Z.; Li, Z.; Li, M.; Liu, J.; Zhang, Z.; Zhao, Y.; Sun, Q.; Zhu, L.; et al. Zero-knowledge proof-based verifiable decentralized machine learning in communication network: A comprehensive survey. IEEE Commun. Surv. Tutor. 2025; Early access. [Google Scholar] [CrossRef]
- Ishii, D. Mathematical definiton of zero-knowledge proofs: Concepts and examples. Res. Propos. 2025. [Google Scholar] [CrossRef]
- Roelink, O. Benchmarking the zk-Snark, zk-Stark, and Bulletproof Non-Interactive Zero-Knowledge Proof Protocols in an Equivalent Practical Application. Master’s Thesis, University of Twente, Enschede, The Netherlands, June 2024. [Google Scholar]
- Samantray, B.S.; Reddy, K.H.K. A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance. Peer-Peer Netw. Appl. 2025, 18, 16. [Google Scholar] [CrossRef]
- Guo, H.; Yu, X. A survey on blockchain technology and its security. Blockchain Res. Appl. 2022, 3, 100067. [Google Scholar] [CrossRef]
- Shi, G.; Qi, M.; Zhong, Q.; Li, N.; Gao, W.; Zhang, L.; Gao, L. MEDACCESSX: A Blockchain-enabled dynamic access control framework for IoMT networks. Sensors 2025, 25, 1857. [Google Scholar] [CrossRef]
- Zhonghua, C.; Goyal, S.B.; Rajawat, A.S. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. J. Supercomput. 2024, 80, 1396–1425. [Google Scholar]
- Yan, Z.; Zhao, X.; Liu, Y.; Luo, X.R. Blockchain-driven decentralized identity management: An interdisciplinary review and research agenda. Inf. Manag. 2024, 61, 104026. [Google Scholar] [CrossRef]
- Yang, Z.; Liu, Y.; Jin, X.; Luo, X.; Xu, Y.; Li, M.; Chen, P.; Tang, B.; Lin, B. BDIDA-IoT: A Blockchain-based decentralized identity architecture enhances the efficiency of ıot data flow. Appl. Sci. 2024, 14, 1807. [Google Scholar] [CrossRef]
- Siddiqui, S.; Hameed, S.; Shah, S.A.; Arshad, J.; Ahmed, Y.; Draheim, D. A smart-contract-based adaptive security governance architecture for smart city service interoperations. Sustain. Cities Soc. 2024, 113, 105717. [Google Scholar] [CrossRef]
- Popoola, O.; Rodrigues, M.; Marchang, J.; Shenfield, A.; Ikpehai, A.; Popoola, J. A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions. Blockchain Res. Appl. 2024, 5, 100178. [Google Scholar]
- Sun, L.; Liu, D.; Li, Y.; Zhou, D. A Blockchain-based e-healthcare system with provenance awareness. IEEE Access 2024, 12, 110098–110112. [Google Scholar] [CrossRef]
- Faraj, O. Zero-Watermarking for Data Integrity, Secure Provenance and Intrusion Detection in IoT Networks. Ph.D. Thesis, Institut Polytechnique de Paris, Universitat oberta de Catalunya, Barcelona, Spain, 2024. [Google Scholar]
- Boughdiri, M.; Abdellatif, T.; Guegan, C.G. A systematic literature review on blockchain storage scalability. IEEE Access 2025, 13, 102194–102219. [Google Scholar] [CrossRef]
- Chiedu, C.C.; Gai, K.; Wei, Y.; Ding, K. A Survey on on-chain-off-chain scalability in blockchain. In Proceedings of the IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity), New York, NY, USA, 9–11 May 2025; pp. 71–82. [Google Scholar]
- Nasir, N.M.; Hassan, S.; Zaini, K.M. Securing permissioned blockchain-based systems: An analysis on the significance of consensus mechanisms. IEEE Access 2024, 12, 138211–138238. [Google Scholar] [CrossRef]
- Ucbas, Y.; Eleyan, A.; Hammoudeh, M.; Alohaly, M. Performance and scalability analysis of Ethereum and Hyperledger Fabric. IEEE Access 2023, 11, 67156–67167. [Google Scholar] [CrossRef]
- Song, X.S.; Li, S.Y. Performance analysis of DAG-based blockchain systems based on Markovian arrival process. IEEE Access 2025, 13, 17506–17523. [Google Scholar] [CrossRef]
- Guo, F.; Hecker, A.; Dustdar, S. A scalable and secure transaction attachment algorithm for DAG-based blockchain. IEEE Internet Things J. 2024, 12, 12298–12309. [Google Scholar] [CrossRef]
- Hua, S.; Zhang, S.; Pi, B.; Sun, J.; Yamashita, K.; Nomura, Y. Reasonableness discussion and analysis for Hyperledger Fabric configuration. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2–6 May 2020; pp. 1–3. [Google Scholar]
- Ravi, D.; Ramachandran, S.; Vignesh, R.; Falmari, V.R.; Brindha, M. Privacy preserving transparent supply chain management through Hyperledger Fabric. Blockchain Res. Appl. 2022, 3, 100072. [Google Scholar] [CrossRef]
- Rudin, S. Smart Parking with IOTA Tangle: A Decentralized Approach to Self-Sovereign Identity in IoT. Master’s Thesis, University of South-Eastern, Notodden, Norway, 2024. [Google Scholar]
- Saba, T.; Rehman, A.; Haseeb, K.; Alam, T.; Jeon, G. Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence. Clust. Comput. 2023, 26, 2921–2931. [Google Scholar] [CrossRef]
- Sun, M.; Quan, S.; Wang, X.; Huang, Z. Latency-aware scheduling for data-oriented service requests in collaborative IoT-edge-cloud networks. Future Gener. Comput. Syst. 2025, 163, 107538. [Google Scholar] [CrossRef]
- Rani, M.; Guleria, K.; Panda, S.N. Enhancing performance and latency optimization in fog computing with a smart job scheduling approach. Stat. Optim. Inf. Comput. 2025, 13, 309–330. [Google Scholar] [CrossRef]
- Saravanan, K.; Santhosh, R. TBBS-TO: Trustable blockchain and bandwidth sensible-based task offloading and resource allocation in cloud-IoT network. J. Cybersecur. Inf. Manag. 2025, 15, 133–150. [Google Scholar]
- Almutairi, M.; Sheldon, F.T. IoT-Cloud integration security: A survey of challenges, solutions, and directions. Electronics 2025, 14, 1394. [Google Scholar] [CrossRef]
- Alejandra, R.; Elena, P. Privacy-preserving ai models for cloud and edge computing security. Synerg. Cross-Discip. J. Digit. Investig. 2025, 3, 1–19. [Google Scholar]
- Ahmad, I.; Kim, J.; Shin, S. Privacy-preserving uncertainty calibration using perceptual encryption in cloud-edge collaborative artificial ıntelligence of things. IEEE Internet Things J. 2025, 12, 25424–25441. [Google Scholar] [CrossRef]
- Ficili, I.; Giacobbe, M.; Tricomi, G.; Puliafito, A. From sensors to data intelligence: Leveraging IoT, cloud, and edge computing with AI. Sensors 2025, 25, 1763. [Google Scholar] [CrossRef]
- Kumar, S.; Panigrahi, R.K.; Kanungo, D.P. Development of IoE-Edge-AI architecture for landslide early warning system. In Proceedings of the IEEE Applied Sensing Conference (APSCON), Goa, India, 22–24 January 2024; pp. 1–4. [Google Scholar]
- Rupanetti, D.; Kaabouch, N. Combining edge computing-assisted internet of things security with artificial intelligence: Applications, challenges, and opportunities. Appl. Sci. 2024, 14, 7104. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhang, H.; Yang, Y.; Sun, W.; Zhang, H.; Fu, Y. Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing. J. Netw. Comput. Appl. 2025, 235, 104087. [Google Scholar] [CrossRef]
- Abasi, A.K.; Aloqaily, M.; Guizani, M. 6G mmwave security advancements through federated learning and differential privacy. IEEE Trans. Netw. Serv. Manag. 2025, 22, 1911–1928. [Google Scholar] [CrossRef]
- Hao, T.; Hwang, K.; Zhan, J.; Li, Y.; Cao, Y. Scenario-based AI benchmark evaluation of distributed cloud/edge computing systems. IEEE Trans. Comput. 2022, 72, 719–731. [Google Scholar] [CrossRef]
- Samsuri, M.H.; Yuen, S.L.; Lau, P.Y.; Wong, C.W.; Kamarudin, N.A.; Hussin, Z.; Talib, M.S.M.; Hon, H.W. Comparative performance analysis of edge-AI devices in deep learning applications. In Proceedings of the IEEE 19th Conference on Industrial Electronics and Applications (ICIEA), Kristiansand, Norway, 5–8 August 2024; pp. 1–6. [Google Scholar]
- Swaminathan, T.P.; Silver, C.; Akilan, T.; Kumar, J. Benchmarking deep learning models on nvidia jetson nano for real-time systems: An empirical investigation. Procedia Comput. Sci. 2025, 260, 906–913. [Google Scholar] [CrossRef]
- Shin, D.J.; Kim, J.J. A deep learning framework performance evaluation to use YOLO in Nvidia Jetson platform. Appl. Sci. 2022, 12, 3734. [Google Scholar] [CrossRef]
- Malallah, H.S.; Qashi, R.; Abdulrahman, L.M.; Omer, M.A.; Yazdeen, A.A. Performance analysis of enterprise cloud computing: A review. J. Appl. Sci. Technol. Trends 2023, 4, 1–12. [Google Scholar] [CrossRef]
- Rajagopal, S.M.; Supriya, M.; Buyya, R. FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge–Fog–Cloud computing environments. Internet Things 2023, 22, 100784. [Google Scholar] [CrossRef]
- Kachris, C. A survey on hardware accelerators for large language models. Appl. Sci. 2025, 15, 586. [Google Scholar] [CrossRef]
- Papakyriakou, D.; Barbounakis, I.S. Benchmarking and review of raspberry pi (rpi) 2b vs rpi 3b vs rpi 3b+ vs rpi 4b (8gb). Int. J. Comput. Appl. 2023, 975, 8887. [Google Scholar] [CrossRef]
- Sendrier, N. Code-based cryptography. In Encyclopedia of Cryptography, Security and Privacy; Springer Nature: Cham, Switzerland, 2025; pp. 372–373. [Google Scholar]
- Wang, Y.; Ismail, E.S. A Review on the advances, applications, and future prospects of post-quantum cryptography in blockchain, IoT. IEEE Access 2025, 13, 112962–112977. [Google Scholar] [CrossRef]
- Jaiswal, C.K.; Sharma, A.; Chaturvedi, A. Challenge response protocol using multivariate polynomial cryptography. In Proceedings of the IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 24–25 February 2025; pp. 1–5. [Google Scholar]
- Snetkov, N.; Vakarjuk, J.; Laud, P. TOPCOAT: Towards practical two-party Crystals-Dilithium. Discov. Comput. 2024, 27, 18. [Google Scholar] [CrossRef]
- Pacurar, C.M.; Bocu, R.; Iavich, M. An analysis of existing hash-based post-quantum signature schemes. Symmetry 2025, 17, 919. [Google Scholar] [CrossRef]
- Deshpande, S.; Lee, Y.; Karakuzu, C.; Szefer, J.; Paek, Y. Sphincslet: An area-efficient accelerator for the full sphincs+ digital signature algorithm. In ACM Transactions on Embedded Computing System; Association for Computing Machinery: New York, NY, USA, 2025. [Google Scholar] [CrossRef]
- VanLuyen, L. MQIBS: An efficient post-quantum ıdentity-based signature from multivariate polynomials. Informatica 2025, 49, 57–66. [Google Scholar]
- Pellegrini, A.; Tognolini, G. Breaking HWQCS: A code-based signature scheme from high weight QC-LDPC codes. In Code-Based Cryptography Workshop; Springer: Cham, Switzerland, 2025; pp. 67–93. [Google Scholar]
- Das, S.; Mondal, S.; Golder, S.S.; Sutradhar, S.; Bose, R.; Mondal, H. Quantum-resistant security for healthcare data: Integrating lamport n-times signatures scheme with blockchain technology. In Proceedings of the IEEE International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), Nagpur, India, 20–21 December 2024; pp. 1–8. [Google Scholar]
- Farhat, S.; Kumar, M.; Srivastava, A.; Bisht, S.; Rishiwal, V.; Yadav, M. Enhancing e-healthcare data privacy through efficient dual signature on twisted edwards curves encryption decryption. Secur. Priv. 2025, 8, e464. [Google Scholar] [CrossRef]
- Kumar, H. AI and quantum network applications in business and medicine machine learning-based classification and prediction of DDoS attacks using naive bayes. In AI and Quantum Network Applications in Business and Medicine; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 371–382. [Google Scholar]
- Mujlid, H.M.; Alshahrani, R. Quantum-driven security evolution in IoT: AI-powered cryptography and anomaly detection. J. Supercomput. 2025, 81, 1087. [Google Scholar] [CrossRef]
- Saxena, D.; Gupta, I.; Gupta, R.; Singh, A.K.; Wen, X. An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 6815–6827. [Google Scholar] [CrossRef]
- Kumar, O.; Rahman, M.; Bhushan, B.; Al-Asadi, M.; Aurangzeb, K. Post-quantum cryptography exploration for quantum-resilient and secure multimedia data for IoT system. In Multimedia Technologies in the Internet of Things Environment; Springer: Singapore, 2025; pp. 161–192. [Google Scholar]
- Nemec Zlatolas, L.; Welzer, T.; Lhotska, L. Data breaches in healthcare: Security mechanisms for attack mitigation. Clust. Comput. 2024, 27, 8639–8654. [Google Scholar] [CrossRef]
- Ahmed, S.T.; Kaladevi, A.C.; Shankar, A.; Alqahtani, F. Privacy enhanced edge-AI healthcare devices authentication: A federated learning approach. IEEE Trans. Consum. Electron. 2025; Early Access. [Google Scholar] [CrossRef]
- Liu, J.; Liu, Y.; Gao, K.; Wang, L. Generative edge ıntelligence for IoT-assisted vehicle accident detection: Challenges and prospects. IEEE Internet Things Mag. 2024, 7, 50–54. [Google Scholar] [CrossRef]
- Yen, M.H.; Mishra, N.; Luo, W.J.; Lin, C.E. A novel proactive AI-based agents framework for an IoE-based smart things monitoring system with applications for smart vehicles. Comput. Mater. Contin. 2025, 82, 1839–1855. [Google Scholar]
- Akter, M.; Moustafa, N.; Turnbull, B. SPEI-FL: Serverless privacy edge intelligence-enabled federated learning in smart healthcare systems. Cogn. Comput. 2024, 16, 2626–2641. [Google Scholar] [CrossRef]
- Amar, F.; April, A.; Abran, A. Electronic health record and semantic issues using fast healthcare interoperability resources: Systematic mapping review. J. Med. Internet Res. 2024, 26, e45209. [Google Scholar] [CrossRef] [PubMed]
- Geremew, A.; Mohammad, A. Preparing critical infrastructure for post-quantum cryptography: Strategies for transitioning ahead of cryptanalytically relevant quantum computing. Int. J. Eng. Sci. Technol. 2024, 6, 338–365. [Google Scholar] [CrossRef]
- Wang, Q.; Liu, Y. Blockchain empowered dynamic access control for secure data sharing in collaborative emergency management. Inf. Process. Manag. 2025, 62, 103960. [Google Scholar] [CrossRef]
- Shevchuk, R.; Lishchynskyy, I.; Ciura, M.; Lyzun, M.; Kozak, R.; Kasianchuk, M. Application of blockchain technology in emergency management systems: A bibliometric analysis. Appl. Sci. 2025, 15, 5405. [Google Scholar] [CrossRef]
- Chen, Y.; Qiu, Y.; Tang, Z.; Long, S.; Zhao, L.; Tang, Z. Exploring the synergy of blockchain, IoT, and edge computing in smart traffic management across urban landscapes. J. Grid Comput. 2024, 22, 45. [Google Scholar] [CrossRef]
- Meese, C.; Chen, H.; Li, W.; Lee, D.; Guo, H.; Shen, C.C.; Nejad, M. Adaptive traffic prediction at the its edge with online models and blockchain-based federated learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 10725–10740. [Google Scholar] [CrossRef]
- Devarajan, G.G.; Thangam, S.; Alenazi, M.J.; Kumaran, U.; Chandran, G.; Bashir, A.K. Federated learning and blockchain-enabled framework for traffic rerouting and task offloading in the ınternet of vehicles (IoV). IEEE Trans. Consum. Electron. 2025; Early Access. [Google Scholar] [CrossRef]
- Patel, A.N.; Srivastava, G.; Maddikunta, P.K.R.; Murugan, R.; Yenduri, G.; Gadekallu, T.R. A trustable federated learning framework for rapid fire smoke detection at the edge in smart home environments. IEEE Internet Things J. 2024, 11, 37708–37717. [Google Scholar] [CrossRef]
- Bensaid, R.; Labraoui, N.; Saidi, H.; Bany Salameh, H. Securing fog-assisted IoT smart homes: A federated learning-based intrusion detection approach. Clust. Comput. 2025, 28, 50. [Google Scholar] [CrossRef]
- Zhang, K.; Lee, C.K.; Tsang, Y.P. QHB-DA: A Quantum hybrid blockchain-based data authenticity framework for supply chain in ındustry 4.0. IEEE Internet Things J. 2024, 12, 3202–3218. [Google Scholar] [CrossRef]
- Fathalla, E.; Azab, M. Beyond classical cryptography: A systematic review of post-quantum hash-based signature schemes, security, and optimizations. IEEE Access 2024, 12, 175969–175987. [Google Scholar] [CrossRef]
- Asif, M.; Agal, S. A comprehensive study on lattice, code, and hash-based cryptographic algorithms in post-quantum security with practical applications. In IET Conference Proceedings CP920; The Institution of Engineering and Technology: London, UK, 2025; pp. 1176–1183. [Google Scholar]
- Habib, A.; Alnaemi, A.; Habib, M. Developing a framework for integrating blockchain technology into earthquake risk mitigation and disaster management strategies of smart cities. Smart Sustain. Built Environ. 2024; Epub ahead of printing. [Google Scholar] [CrossRef]
- Javadpour, A.; AliPour, F.S.; Sangaiah, A.K.; Zhang, W.; Ja’far, F.; Singh, A. An IoE blockchain-based network knowledge management model for resilient disaster frameworks. J. Innov. Knowl. 2023, 8, 100400. [Google Scholar] [CrossRef]
- Rebello, G.A.F.; Camilo, G.F.; de Souza, L.A.C.; Potop-Butucaru, M.; de Amorim, M.D.; Campista, M.E.M.; Costa, L.H.M. A survey on blockchain scalability: From hardware to layer-two protocols. IEEE Commun. Surv. Tutor. 2024, 26, 2411–2458. [Google Scholar] [CrossRef]
- Han, H.; Wang, M.; Yang, F.; Jia, L.; Sun, Y.; Zhang, R. A Layer-2 expansion shared sequencer model for blockchain scalability. Blockchain: Res. Appl. 2025; 100292, in press. [Google Scholar] [CrossRef]
- Maithili, K.; Amutha, S. Optimizing blockchain scalability for secure patient health records with tri-layered sharding architecture (TLSA). Trans. Emerg. Telecommun. Technol. 2025, 36, e70168. [Google Scholar] [CrossRef]
- Elomda, B.M.; Abdelbary, T.A.A.; Hassan, H.A.; Hamza, K.S.; Kharma, Q. An enhanced multi-layer blockchain security model for ımproved latency and scalability. Information 2025, 16, 241. [Google Scholar] [CrossRef]
- Feng, L.; Yu, B.; He, Z.; Yao, S. A verifiable transaction selection method for dag blockchain with VRF. IEEE Internet Things J. 2025, 12, 24185–24198. [Google Scholar] [CrossRef]
- Haque, E.U.; Abbasi, W.; Almogren, A.; Choi, J.; Altameem, A.; Rehman, A.U.; Hamam, H. Performance enhancement in blockchain based IoT data sharing using lightweight consensus algorithm. Sci. Rep. 2024, 14, 26561. [Google Scholar] [CrossRef]
- Lakhan, A.; Mohammed, M.A.; Abdulkareem, K.H.; Deveci, M.; Marhoon, H.A.; Memon, S.; Nedoma, J.; Martinek, R. BEDS: Blockchain energy efficient IoE sensors data scheduling for smart home and vehicle applications. Appl. Energy 2024, 369, 123535. [Google Scholar] [CrossRef]
- Fathalla, E.; Azab, M. Decentralized trace-resistant self-sovereign service provisioning for next-generation federated wireless networks. Information 2025, 16, 159. [Google Scholar] [CrossRef]
- Papatheodorou, N.; Hatzivasilis, G.; Papadakis, N. The YouGovern secure blockchain-based self-sovereign identity (SSI) management and access control. Appl. Sci. 2025, 15, 6437. [Google Scholar] [CrossRef]
- Aleisa, M.A. Blockchain-enabled zero trust architecture for privacy-preserving cybersecurity in IoT environments. IEEE Access 2025, 13, 18660–18676. [Google Scholar] [CrossRef]
- Lavaur, T.; Lacan, J.; Chanel, C.P. Enabling blockchain services for IoE with zk-rollups. Sensors 2022, 22, 6493. [Google Scholar] [CrossRef]
- Ramezan, G.; Meamari, E. ZK-IoT: Securing the internet of things with zero-knowledge proofs on blockchain platforms. In Proceedings of the 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland, 27–31 May 2024; pp. 1–7. [Google Scholar]
- Rishiwal, V.; Agarwal, U.; Yadav, M.; Tanwar, S.; Garg, D.; Guizani, M. A new alliance of machine learning and quantum computing: Concepts, attacks, and challenges in IoT networks. IEEE Internet Things J. 2025, 12, 18865–18886. [Google Scholar] [CrossRef]
- Katib, I.; Albassam, E.; Sharaf, S.A.; Ragab, M. Safeguarding IoT consumer devices: Deep learning with TinyML driven real-time anomaly detection for predictive maintenance. Ain Shams Eng. J. 2025, 16, 103281. [Google Scholar] [CrossRef]
- Elhanashi, A.; Dini, P.; Saponara, S.; Zheng, Q. Advancements in TinyML: Applications, limitations, and impact on IoT devices. Electronics 2024, 13, 3562. [Google Scholar] [CrossRef]
- Ullah, I.; Deng, X.; Pei, X.; Mushtaq, H.; Uzair, M. IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-Peer Netw. Appl. 2025, 18, 34. [Google Scholar] [CrossRef]
- Jiang, R.; Zhang, H.; Song, Z.; Tian, S.; Lou, W. T-BFL model based on two-dimensional trust and blockchain-federated learning for medical data sharing. J. Supercomput. 2025, 81, 378. [Google Scholar] [CrossRef]
- Han, B.; Li, B.; Jurdak, R.; Zhang, P.; Zhang, H.; Feng, P.; Yuen, C. PBFL: A privacy-preserving blockchain-based federated learning framework with homomorphic encryption and single masking. IEEE Internet Things J. 2025, 12, 14229–14243. [Google Scholar] [CrossRef]
- Govindaram, A.; Jegatheesan, A. Flbc-ids: A federated learning and blockchain-based intrusion detection system for secure IoT environments. Multimed. Tools Appl. 2025, 84, 17229–17251. [Google Scholar] [CrossRef]
- Nguyen, P.; Nguyen, H.H.; Phung, P.; Truong, H.L.; Cheung, T. Advanced context-sensitive access management for edge-driven IoT data sharing as a service. ACM Trans. Internet Technol. 2025, 25, 9. [Google Scholar] [CrossRef]
- Rahim, R.; Chishti, M.A. IoT security ınnovations: Recent technologies, threats, and solutions. SN Comput. Sci. 2025, 6, 593. [Google Scholar] [CrossRef]
- García, L.; Cancimance, C.; Asorey-Cacheda, R.; Zúñiga-Cañón, C.L.; Garcia-Sanchez, A.J.; Garcia-Haro, J. Lightweight blockchain for data integrity and traceability in IoT networks. IEEE Access 2025, 13, 81105–81117. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Alroobaea, R.; Baqasah, A.M.; Alsafyani, M.; Alsufyani, H.; Ullah, S. A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing. Sci. Rep. 2025, 15, 19856. [Google Scholar] [CrossRef] [PubMed]
- Yang, Y.; Bai, F.; Yu, Z.; Shen, T.; Liu, Y.; Gong, B. An anonymous and supervisory cross-chain privacy protection protocol for zero-trust IoT application. ACM Trans. Sens. Netw. 2024, 20, 32. [Google Scholar] [CrossRef]
- Salako, A.O.; Adesokan-Imran, T.O.; Tiwo, O.J.; Metibemu, O.C.; Onyenaucheya, O.S.; Olaniyi, O.O. Securing confidentiality in distributed ledger systems with secure multi-party computation for financial data protection. J. Eng. Res. Rep. 2025, 27, 352–373. [Google Scholar] [CrossRef]
- Ma, L.; Duan, B.; Zhang, B.; Li, Y.; Fu, Y.; Ma, D. A trusted IoT data sharing method based on secure multi-party computation. J. Cloud Comput. 2024, 13, 138. [Google Scholar] [CrossRef]
- Haque, E.U.; Shah, A.; Iqbal, J.; Ullah, S.S.; Alroobaea, R.; Hussain, S. A scalable blockchain based framework for efficient IoT data management using lightweight consensus. Sci. Rep. 2024, 14, 7841. [Google Scholar] [PubMed]
- Vyas, V.; Raiyani, A. Resource allocation strategies for improved IOTA performance in IoT using DLT methods. Intell. Decis. Technol. 2025, 19, 520–533. [Google Scholar] [CrossRef]
- Mahdi, L.H.; Abdullah, A.A. Fortifying future IoT security: A comprehensive review on lightweight post-quantum cryptography. Eng. Technol. Appl. Sci. Res. 2025, 15, 21812–21821. [Google Scholar] [CrossRef]
- Xiong, J.; Shen, L.; Liu, Y.; Fang, X. Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. Sci. Rep. 2025, 15, 3. [Google Scholar] [CrossRef]
- Naseh, D.; Abdollahpour, M.; Tarchi, D. Real-world implementation and performance analysis of distributed learning frameworks for 6G IoT applications. Information 2024, 15, 190. [Google Scholar] [CrossRef]
- Naseh, D.; Shinde, S.S.; Tarchi, D. Multi-layer distributed learning for intelligent transportation systems in 6G aerial-ground integrated networks. In Proceedings of the IEEE Joint European Conference on Networks and Communications and 6G Summit (EuCNC/6G Summit), Antwerp, Belgium, 3–6 June 2024; pp. 711–716. [Google Scholar]
- Naseh, D.; Shinde, S.S.; Tarchi, D. Distributed learning framework for earth observation on multilayer non-terrestrial networks. In Proceedings of the IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, Sweden, 5–8 May 2024; pp. 1–2. [Google Scholar]
Security Model | Advantages | Disadvantages | Recommended Use Cases |
---|---|---|---|
Centralized Security | Easy management, Low computational cost, Simple integration | Risk of SPOF, the Central server becomes an attack target | Small-scale IoE systems, Low-threat environments |
Decentralized Security (Blockchain, Edge Security, SSI) | Distributed security, High attack resilience, Better scalability | High computational cost, Management complexity | Large-scale IoE networks, Critical infrastructures |
Security Layer | Key Technologies | Security Features | Challenges and Limitations |
---|---|---|---|
Data Security and Privacy | Federated Learning [23,25,47], Homomorphic Encryption [46], ZKP [48,49,50] | Privacy-Preserving AI, Secure Data Sharing | Computational Overhead, Model Poisoning Attacks |
Network and Communication Security | Blockchain [8,9,10,11], SMPC [46], Quantum Key Distribution (QKD) [18,51] | Data Integrity, Tamper-Proof Transactions | Latency, Scalability Issues |
AI-Driven Security | Edge AI [25,44], Anomaly Detection [26], Adversarial AI Defense [29,30] | Real-Time Threat Detection, Localized Privacy | Model Training Complexity, Limited Computational Power |
Quantum-Resilient Cryptography | Lattice-Based [52,53], Hash-Based [54,55], and Multivariate Polynomial Cryptography [56] | Future-Proof Security, Resistance to Quantum Attacks | Large Key Sizes, High Processing Overhead |
Attack Type | Targeted Systems | Threat Mechanism | Possible Consequences | Recommended Defense Methods |
---|---|---|---|---|
Adversarial AI [29,30] | Edge Devices, AI Models, Machine Learning Systems | Manipulation of Models Through Intentionally Misleading Inputs | Incorrect Decision-Making, System Failures | Robust Adversarial Training, Secure Model Training |
Model Poisoning [57] | AI Models, AI-Based IoE Devices | Manipulation of Training Data | Faulty Training, Malicious Model Behavior | Data Sanitization, Federated Learning |
Quantum Attacks (Shor, Grover) [52,53,54,55,56] | Cryptographic Systems, Blockchain, IoE Security | Breaking Classical Encryption Algorithms | RSA/ECC Encryption Becomes Obsolete | PQC, Lattice-Based Encryption |
Edge/Cloud Vulnerabilities [58,59,60] | Edge Devices, IoE Gateways, Cloud Infrastructures, Data Storage Systems | Physical Interventions, Network Vulnerabilities, Malware Infections, Firmware Exploitation, Unauthorized Access, Data Leakage, Multi-Tenancy Issues | Data Manipulation, Device Security Breaches, Theft of Sensitive Data | Hardware Security, Secure Boot Mechanisms, Zero-Trust Security, Homomorphic Encryption |
Storage Model | Advantages | Disadvantages |
---|---|---|
On-Chain Storage | Data is immutable and secure | High transaction costs and scalability issues |
Off-Chain Storage | Lower cost, support for large data volumes | Dependency on external systems |
Hybrid Storage | Balance between efficiency and security | Management complexity |
Protocol | Proof Size (Bytes) | Proving Time (ms) | Verification Time (ms) | Trusted Setup | Quantum Resilient | IoE Suitability |
---|---|---|---|---|---|---|
zk-SNARK | 192 | 1299 | 1138 | Required | No | High: efficient, small size |
zk-STARK | 6657 | 552 | 52 | Not required | Yes | Medium-High: quantum secure, large size |
Bulletproofs | 737 | 6756 | 899 | Not required | No | Medium: suitable for lightweight systems |
Ligero | ~1024+ | Medium | Medium | Not required | Yes | Medium: balanced performance |
Blockchain Feature | Use Case in IoE | Security Enhancement |
---|---|---|
Decentralized Identity [74,84,85] | User authentication and IoT device identity verification | Prevents unauthorized access and identity spoofing |
Smart Contracts [86,87] | Automated access control for IoE services | Reduces human errors and enhances trust |
Data Integrity and Provenance [88,89] | Secure healthcare records and industrial IoT logs | Prevents data tampering and enhances regulatory compliance |
Consensus Mechanisms (PoS, PBFT, DAG-based) [90,91] | Scalable blockchain for real-time IoE transactions | Lowers energy consumption and improves efficiency |
Criteria and Features | Ethereum (PoW → PoS) | Hyperledger Fabric | IOTA (Tangle-Based) |
---|---|---|---|
Governance | Community-driven, decentralized | Consortium-based (e.g., Linux Foundation) | Foundation-based (IOTA Foundation), protocol roadmap |
Participation Type | Permissionless | Permissioned | Permissionless (but Coordinator for security) |
Use Cases | DeFi, NFTs, dApps, public registry | Supply chain, healthcare, enterprise apps | IoT, industrial networks, M2M payments |
Consensus Mechanism | PoS (formerly PoW), Nakamoto-style | PBFT, Raft, Kafka (modular) | DAG-based Tangle + Tip Selection (no mining, no blocks) |
Smart Contract Language | Solidity/EVM | Chaincode (Go, Java, JS) | Not native (external logic), Smart Contract via ISCP |
TPS | ~15 (PoW), ~30–100 (PoS) | ~2000 | ~1000+ (asynchronous, parallel structure) |
Latency (ms) | ~6500 | ~250 | ~300–400 |
Energy (kWh/1000 txns) | ~70 (PoW), ~5–10 (PoS) | ~0.5 | ~0.1–0.3 (very low, no mining) |
Data Privacy | Low (transparent ledger, pseudonymity) | High (private channels, access control) | Medium (public DAG, off-chain encryption possible) |
Security Risk | High (e.g., 51% attacks in PoW) | Low (controlled node participation) | Medium (central Coordinator used for finality) |
Scalability | Limited | High (modular and parallelizable architecture) | High (parallel tip selection, no block bottleneck) |
Energy Efficiency | Low (PoW), improving with PoS | High (lightweight consensus) | Very high (no mining, lightweight protocol) |
Criterion | Traditional AI | Federated Learning |
---|---|---|
Data Privacy | Centralized | Local Processing |
Latency | High | Low |
Security Risk | High | Low |
Model | Accuracy (%) | Comm. Overhead (MB) | Convergence Rounds | Latency (ms) |
---|---|---|---|---|
FedAvg | 88.7 | 3.2 | 120 | 850 |
FedProx | 90.1 | 3.4 | 110 | 910 |
Quantum FL (QFL) | 91.8 | 2.1 | 100 | 760 |
Mechanism | Function | Security Benefits | References |
---|---|---|---|
AI-Driven Intrusion Detection (Edge IDS/IPS) | Detects and mitigates real-time cyber threats at IoE edge nodes | Faster threat response, reduces cloud dependency | [25,108] |
FL on Edge Devices | Local AI model training on edge devices without sending data to centralized servers | Prevents data exposure, supports privacy compliance | [23,65,109] |
Adversarial AI Defense at the Edge | AI models that detect and counter adversarial attacks on IoT networks | Enhances robustness against AI-based cyber threats | [29,30,57,64] |
Threat Intelligence and Anomaly Detection | AI continuously monitors edge devices for abnormal behavior | Prevents zero-day attacks, malware propagation | [26,31,59] |
Device Name | AI Accelerator (TIPU/TPU/GPU) | RAM | AI Performance (TOPS) | Energy Consumption | Use Case |
---|---|---|---|---|---|
Raspberry Pi 4 | None/External (USB NPU) | 4–8 GB | <0.1 TOPS | Low (~5 W) | Education, Lightweight IoT Projects |
Arduino Portenta H7 | None/Microcontroller-based | 0.5 MB | None | Very Low | Sensor Data Collection, Prototyping |
Google Coral Dev Board | Edge TPU | 1 GB | 4 TOPS | Low (~2.5 W) | Image Processing, Smart Sensors |
Intel Neural Compute Stick 2 | Intel Movidius Myriad X | External USB | 1 TOPS | Very Low | Prototyping, Video Analysis |
BeagleBone AI-64 | Embedded DSP + Vision Engine | 4 GB | ~1 TOPS | Medium | Robotics, Automation |
Jetson Xavier NX | NVIDIA Volta GPU + 384 CUDA Cores | 8–16 GB | 21 TOPS | Medium (~15 W) | Edge AI, Autonomous Systems |
Jetson AGX Orin | Ampere GPU + 2048 CUDA + 64 Tensor Cores | 32–64 GB | 275 TOPS | High (~50 W) | Autonomous Vehicles, Drones |
Huawei Atlas 200 DK | Ascend 310 NPU | 8 GB | 16 TOPS | Medium | Industrial Visual Analytics |
Cloud (AWS EC2 p4d) | NVIDIA A100 GPU | 1 TB+ | 1000+ TOPS | Very High | Large-Scale Model Training, Analytics |
Method | Strengths | Weaknesses | Application Areas | References |
---|---|---|---|---|
Lattice-Based Encryption | High security level, post-quantum resistance, versatile usage | Large key sizes, high computational load | Blockchain data encryption, IoT security, digital signatures | [33,34,35,53] |
Hash-Based Signatures | Low computational cost, long-term security, and quantum resistance | Limited use per key, large signature sizes | Blockchain protocols, digital signatures, and authentication | [43,49,54,55] |
Code-Based Cryptography | Long-term security, low computational cost, and quantum resistance | Large key sizes, impractical in some scenarios | Authentication, IoT data security, email encryption | [119,120] |
Multivariate Polynomial Cryptography | Small key sizes, fast processing time, and quantum resistance | Limited research and applications, potential weaknesses | Mobile device security, digital signatures, IoT devices | [56,121] |
Quantum Key Distribution | Theoretically, absolute security, full protection against quantum attacks | High cost, requires special hardware, scalability issues | High-security data transmission, finance and healthcare, military apps | [18,51] |
Algorithm | Key Size (Bytes) | Ciphertext (Bytes) | Encryption Time | Decryption Time | Security Level | References |
---|---|---|---|---|---|---|
Kyber1024 | 1568 | 1568 | 1.3 ms | 1.1 ms | Level 5 | [34,50,132] |
Dilithium III | 1952 | 3293 | 2.4 ms | 2.2 ms | Level 3 | [54,122,132] |
BIKE-3 | 3136 | 3100 | 3.0 ms | 2.9 ms | Level 5 | [33,34,35,132] |
Real-World Problem | Sector | Risk/Impact | Suitable Technology Stack | References |
---|---|---|---|---|
Unauthorized access to EHRs in hospital networks | Healthcare | Data breach, misdiagnosis | Blockchain + ABAC + AI | [49,69,88,127,128,129] |
Fake IoE devices injecting false data in smart homes | Smart Home | Security breach, manipulation | IoE + Blockchain + DID | [74,84,85] |
Counterfeit medicines in pharmaceutical supply chains | Supply Chain | Health risk, loss of trust | Blockchain + RFID + Traceability | [9,48,97] |
Sensitive data leakage due to cloud-only processing | Healthcare/IoT | Privacy loss, regulatory violation | Edge AI + FL + Differential Privacy | [23,87,133,134] |
Delayed anomaly detection in traffic systems | Smart Cities | Accidents, congestion | Edge AI + IoE + Real-time ML | [31,59,108,135,136] |
Incompatibility in data sharing across cross-domain systems | Healthcare | Fragmented data, incomplete medical records | Interoperable Blockchain + Semantic AI | [82,83,84,137,138] |
Vulnerability of digital signatures to quantum attacks in long-term records | Legal/Medical | Future forgery risk | Quantum-Resilient Signatures (Lattice, Hash-Based) | [33,35,54,122,127] |
Impersonation attacks in IoE infrastructure | Critical Infrastructure | Unauthorized command execution | Blockchain + AI + IoE Trust Layer | [7,20,130,139] |
Data tampering in emergency disaster response coordination | Disaster Management | Wrong routing, loss of aid | Blockchain + Edge + Secure Access Control | [86,97,102,140,141] |
Application Area/Sector | Security Layers Used | Example Technologies | Problems Addressed | Justification | References |
---|---|---|---|---|---|
Healthcare Systems | Privacy-Preserving Computation, Blockchain, AI, Quantum Resilient | FL, DP, Smart Contracts, FL, PQC | Data privacy, traceability, anomaly detection, future-proof security | Comprehensive security is required; patient data is both private and critical | [49,87,88,127,128,134] |
Smart City Traffic Management | Privacy-Preserving Computation, Blockchain, AI | Edge AI, FL, Smart Contracts, IDS, SSI | Real-time decision-making, attack detection, traffic optimization | Real-time intervention and data security are both necessary | [31,142,143,144] |
Smart Home and IoT-Based Security | Privacy-Preserving Computation, AI | DP, IDS/IPS, FL | Preventing unauthorized access, privacy protection, local threat detection | Resource-constrained devices require fast and local security | [145,146] |
Supply Chain and Logistics | Blockchain, AI, Quantum Resilient | Blockchain, DID, QKD, Quantum Signatures | Counterfeit prevention, traceability, long-term integrity | Secure verification across the entire chain is mandatory | [9,48,80,97,122,147] |
Data Archiving and Legal Records | Blockchain, Quantum Resilient | Blockchain, Hash-based PQC, SSI | Document integrity, quantum-resistant signatures | Long-term data storage requires quantum security | [148,149] |
Disaster Management, Emergency Response | Blockchain, AI | Blockchain Ledger, IDS, Semantic AI | Secure access during critical moments, prevention of data manipulation | Multi-stakeholder systems require auditability and security | [140,141,150,151] |
Approach | Features/Definition | Advantages | Disadvantages | Application Areas |
---|---|---|---|---|
Blockchain-Based Security [11,38,47,83,84,85,88,92,93] | Access control via smart contracts, Decentralized identity authentication, Immutable data storage | No single point of failure, Transparency and auditability, Increased trust | High computational cost, Scalability issues, Regulatory barriers | IoE identity management, Data integrity, Supply chain security |
Edge AI for Secure Computing [15,16,25,26,27,28,59,106,112,113] | Real-time anomaly detection, Privacy-preserving AI model training, Low-latency security decisions | Fast decision-making, Reduces network congestion, Less dependency on central servers | Limited hardware capacity, AI model security risks, Adversarial attacks | Smart cities, IoT security monitoring, Cyber-attack detection |
Quantum-Resilient Security [33,34,35,52,53,54,55,66,67,68,69,70,120,127,132] | PQC, hash-based signatures, ZKP, and Quantum AI for long-term data security | Future-proof security, Resistance to quantum attacks, Stronger cryptographic structure | Lack of widespread adoption, Complex implementation processes, High computational cost | Healthcare data security, Financial transactions, IoE data transmission |
Layer | Associated Technology | Function |
---|---|---|
Edge Node | FL (FedAvg/FedSGD) | Local model training |
Blockchain Layer | Smart Contract + Logging | Model updates are hashed and logged |
Quantum Resilient Crypto | Lattice/Hash-based Encryption | Secure transmission of FL model updates |
Challenge | Problem Description | Potential Solutions | References |
---|---|---|---|
Scalability of Blockchain and AI | High latency in blockchain transactions and FL model training in large-scale IoE networks | Optimized consensus mechanisms, lightweight privacy-preserving AI techniques, DAG and Layer-2 solutions for high-throughput IoE security | [33,49,66,84,92,108] |
Quantum Threats to Security | Shor’s and Grover’s algorithms threaten classical encryption and blockchain integrity | Quantum-safe cryptography (lattice-based, hash-based signatures); hybrid quantum-secure AI integration | [38,52,53,54,108] |
Privacy-Preserving AI Optimization | FL, Differential Privacy (DP), and Secure Multi-Party Computation (SMPC) require high computational overhead | Hybrid privacy models combining DP, Edge AI, and Homomorphic Encryption | [59,113] |
Decentralized Identity in IoE | Lack of standard security protocols across heterogeneous IoE domains | DID and SSI-based authentication models supported by blockchain trust layers | [93,127,130] |
Cross-Chain IoE Data Security | Data interoperability and security challenges across different IoE platforms | Cross-chain privacy protocols and SMPC-based inter-blockchain security mechanisms | [175,176,177] |
Security Technology | Advantages | Challenges | References |
---|---|---|---|
Blockchain-Based Security | Decentralized security, immutability, transparency | High transaction costs, scalability limitations | [73,152,155] |
Edge AI for Security | Real-time threat detection, local data processing | Vulnerable to adversarial AI and model poisoning | [16,29,30,64] |
Quantum-Resilient Cryptography | Long-term security, resistant to quantum attacks | High computational demand, limited IoE deployment | [52,70,127,132] |
FL for Privacy | Decentralized AI training, preserves user privacy | Security risks in model sharing, communication cost | [144,169,170] |
Technology | Security Contribution | Challenges | References |
---|---|---|---|
Blockchain | Decentralized security, data immutability | High transaction cost, latency issues | [73,90,178] |
AI for Security | Autonomous threat detection, fast anomaly recognition | Vulnerable to adversarial AI attacks | [29,30,60,64] |
Quantum Security | Long-term protection against quantum attacks | High computational requirements, hardware compatibility in IoE | [120,132,180,181] |
Time Frame | Emerging Technologies and Challenges | Strategic Focus Areas |
---|---|---|
2025–2028 | Early-stage FL and Edge AI deployments [25,144] Pilot PQC integration [35,180] Lightweight blockchain optimization [178,179] | FL infrastructure and data privacy [23,144,170] Lightweight consensus for IoT [73,91] PQ-safe digital signatures [52,180] |
2029–2032 | QKD and PQ Blockchain applications [18,54] Interoperable AI security systems [144,164] Context-aware access and decentralized identity models [84,160,171] | Cross-chain privacy and SMPC integration [47,175,176] DID and SSI-based access control [84,85] Adaptive AI for anomaly detection [59,145] |
2033–2036+ | Self-healing and autonomous security systems [144,164] Quantum Blockchain [54,181] Semantic AI + Zero Trust architecture [161,164] | Autonomous threat mitigation [145] Quantum-Resistant interoperable trust layers [54,132] Self-aware zero-trust agents [136,161] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions. Appl. Sci. 2025, 15, 8704. https://doi.org/10.3390/app15158704
Eren H, Karaduman Ö, Gençoğlu MT. Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions. Applied Sciences. 2025; 15(15):8704. https://doi.org/10.3390/app15158704
Chicago/Turabian StyleEren, Haluk, Özgür Karaduman, and Muharrem Tuncay Gençoğlu. 2025. "Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions" Applied Sciences 15, no. 15: 8704. https://doi.org/10.3390/app15158704
APA StyleEren, H., Karaduman, Ö., & Gençoğlu, M. T. (2025). Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions. Applied Sciences, 15(15), 8704. https://doi.org/10.3390/app15158704