Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities
1. Introduction
2. An Overview of Published Articles
3. Conclusions
Conflicts of Interest
References
- Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A Survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Weber, R.H. Internet of Things—New Security and Privacy Challenges. Comput. Law Secur. Rev. 2010, 26, 23–30. [Google Scholar] [CrossRef]
- Khanam, S.; Shapla, S.; Ali, M.S.; Hossain, M.S.; Ahamad, M.S.; Rahman, M.M. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access 2020, 8, 219709–219743. [Google Scholar] [CrossRef]
- Baker, S.A.; Nori, A.S. Internet of Things Security: A Survey. In Advances in Cyber Security, Proceedings of the Second International Conference, ACeS 2020, Penang, Malaysia, 8–9 December 2020; Revised Selected Papers 2; Springer: Singapore, 2021; pp. 95–117. [Google Scholar]
- Campos, E.M.; Saura, P.F.; González-Vidal, A.; Hernández-Ramos, J.L.; Bernabé, J.B.; Baldini, G.; Skarmeta, A. Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges. Comput. Netw. 2022, 203, 108661. [Google Scholar] [CrossRef]
- Katagi, M.; Moriai, S. Lightweight Cryptography for the Internet of Things; Sony Corporation: Tokyo, Japan, 2008; pp. 7–10. [Google Scholar]
- Summerville, D.H.; Zach, K.M.; Chen, Y. Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices. In Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China, 14–16 December 2015; pp. 1–8. [Google Scholar]
- Qian, Y.; Jiang, Y.; Chen, J.; Zhang, Y.; Song, J.; Zhou, M.; Pustišek, M. Towards Decentralized IoT Security Enhancement: A Blockchain Approach. Comput. Electr. Eng. 2018, 72, 266–273. [Google Scholar] [CrossRef]
- Hellaoui, H.; Koudil, M.; Bouabdallah, A. Energy-Efficient Mechanisms in Security of the Internet of Things: A Survey. Comput. Netw. 2017, 127, 173–189. [Google Scholar] [CrossRef]
- Ishaq, I.; Carels, D.; Teklemariam, G.K.; Hoebeke, J.; Van den Abeele, F.; De Poorter, E.; Demeester, P. IETF Standardization in the Field of the Internet of Things (IoT): A Survey. J. Sens. Actuator Netw. 2013, 2, 235–287. [Google Scholar] [CrossRef]
- Bothra, P.; Karmakar, R.; Bhattacharya, S.; De, S. How Can Applications of Blockchain and Artificial Intelligence Improve Performance of Internet of Things?––A Survey. Comput. Netw. 2023, 224, 109634. [Google Scholar] [CrossRef]
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
- Elmassik, Z. Edge Computing in the Internet of Things: A Survey. Authorea Prepr. 2023. [Google Scholar] [CrossRef]
- Obaidat, M.A.; Obeidat, S.; Holst, J.; Al Hayajneh, A.; Brown, J. A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers 2020, 9, 44. [Google Scholar] [CrossRef]
- Taurshia, A.; Kathrine, J.W.; Andrew, J.; Eunice R, J. Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function Tree. Appl. Sci. 2024, 14, 2405. [Google Scholar] [CrossRef]
- Xie, Q.; Huang, J. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV. Appl. Sci. 2024, 14, 2451. [Google Scholar] [CrossRef]
- Xie, Q.; Yao, Y. PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks. Appl. Sci. 2024, 14, 5400. [Google Scholar] [CrossRef]
- Wardana, A.A.; Kołaczek, G.; Sukarno, P. Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things. Appl. Sci. 2024, 14, 4109. [Google Scholar] [CrossRef]
- Felkner, A.; Adamski, J.; Koman, J.; Rytel, M.; Janiszewski, M.; Lewandowski, P.; Pachnia, R.; Nowakowski, W. Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases. Appl. Sci. 2024, 14, 10513. [Google Scholar] [CrossRef]
- Albarrak, K.M. Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security. Appl. Sci. 2024, 14, 10867. [Google Scholar] [CrossRef]
- Budimir, S.; Fontaine, J.R.J.; Huijts, N.M.A.; Haans, A.; IJsselsteijn, W.A.; Oostveen, A.-M.; Stahl, F.; Heartfield, R.; Loukas, G.; Bezemskij, A.; et al. We Are Not Equipped to Identify the First Signs of Cyber–Physical Attacks: Emotional Reactions to Cybersecurity Breaches on Domestic Internet of Things Devices. Appl. Sci. 2024, 14, 11855. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kołaczek, G. Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities. Appl. Sci. 2025, 15, 2935. https://doi.org/10.3390/app15062935
Kołaczek G. Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities. Applied Sciences. 2025; 15(6):2935. https://doi.org/10.3390/app15062935
Chicago/Turabian StyleKołaczek, Grzegorz. 2025. "Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities" Applied Sciences 15, no. 6: 2935. https://doi.org/10.3390/app15062935
APA StyleKołaczek, G. (2025). Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities. Applied Sciences, 15(6), 2935. https://doi.org/10.3390/app15062935