Computers 14 00061
Computers 14 00061
1 Faculty of Automation and Computing, Politehnica University Timis, oara, 300223 Timişoara, Romania
2 Computers and Information Technology Department, University of Oradea, 410087 Oradea, Romania
* Correspondence: verkman.hanne@gmail.com (H.S.); depopescu@uoradea.ro (D.E.P.)
Abstract: With the proliferation of IoT-based applications, security requirements are be-
coming increasingly stringent. Given the diversity of such systems, selecting the most
appropriate solutions and technologies to address the challenges is a complex activity. This
paper provides an exhaustive evaluation of existing security challenges related to the IoT
domain, analysing studies published between 2021 and 2025. This review explores the
evolving landscape of IoT security, identifying key focus areas, challenges, and proposed
solutions as presented in recent research. Through this analysis, the review categorizes
IoT security efforts into six main areas: emerging technologies (35.2% of studies), securing
identity management (19.3%), attack detection (17.9%), data management and protection
(8.3%), communication and networking (13.8%), and risk management (5.5%). These per-
centages highlight the research community’s focus and indicate areas requiring further
investigation. From leveraging machine learning and blockchain for anomaly detection
and real-time threat response to optimising lightweight algorithms for resource-limited
devices, researchers propose innovative and adaptive solutions to address emerging threats.
The review underscores the integration of advanced technologies to enhance IoT system
security, while also highlighting ongoing challenges. The paper concludes with a synthesis
of security challenges and threats of each identified category, along with their solutions,
aiming to support decision-making during the design approach of IoT-based applications
and to guide future research toward comprehensive and efficient IoT frameworks.
Academic Editor: Paolo Bellavista Keywords: IoT security; attack detection; emergent technologies in IoT; IoT vulnerabilities;
Received: 28 December 2024
adaptive security solutions
Revised: 1 February 2025
Accepted: 8 February 2025
Published: 11 February 2025
Figure 1. Estimated IoT-connected devices (in billions) in the past 10 years [2].
Figure 1. Estimated IoT-connected devices (in billions) in the past 10 years [2].
At its core, the Internet of Things comprises a vast network of physical objects
At
equippedits core,
withthe Internet
sensors, of Things
software, and comprises a vast network
various technologies, enablingof physical
them toobjects
commu-
equipped
nicate withwithone sensors, software,
another and various
and centralised technologies,
systems enabling them
via the internet. to communi-
This communication
cate with onereal-time
facilitates another and datacentralised
collection systems via thedriving
and analysis, internet.intelligent
This communication
automationfacil- across
itates real-time
diverse sectors data collection
including and analysis,
healthcare, driving intelligent
transportation, automation
agriculture, across diverse
energy management, and
sectors including healthcare, transportation, agriculture, energy management,
urban planning. In smart cities, for instance, IoT technologies are used to optimise traffic and urban
planning. In smart
flow, reduce energycities, for instance,
consumption, IoT technologies
enhance public safety, are used
and evento manage
optimisewastetraffic flow,
efficiently.
reduce While
energythese consumption, enhance public safety, and even manage waste
capabilities offer substantial opportunities for enhancing efficiency and efficiently.
While thesethey
convenience, capabilities
also entailoffer a substantial opportunities
critical vulnerability: the for enhancing
security efficiency
of these devices.andThe
convenience,
very attributesthey that
also make
entail IoT
a critical
devicesvulnerability:
appealing—suchthe security
as theofability
these devices.
to collectTheandvery
trans-
attributes that make
mit sensitive IoT devices
data—also render appealing—such
them susceptible as the ability
to cyber to Each
threats. collectadditional
and transmit device
sensitive
connecteddata—also render them
to the internet expands susceptible to cyber
the digital attackthreats.
surface,Each additional
creating moredevice con-en-
potential
nected to thefor
try points internet expands
malicious actors.the A digital attack surface,
compromised devicecreating
can serve more potential
as an entry
entry gateway
points for malicious
for attackers, actors.
enabling A compromised
them device
to infiltrate entire can servesteal
networks, as ansensitive
entry gateway
data, orfor at-
disrupt
tackers,
criticalenabling them to infiltrate entire networks, steal sensitive data, or disrupt critical
infrastructure.
infrastructure.
The urgency of securing the Internet of Things has never been more pressing. As the
The urgency
number of securing
of connected devices the continues
Internet oftoThings
rise, sohas
donever been more
the threats pressing. As the
and vulnerabilities that
number of connected
they introduce. In thedevices
context continues to rise, so doisthe
of IoT, cybersecurity notthreats
merelyand vulnerabilities
about that
protecting devices
they introduce.
from unauthorisedIn theaccess;
contextitof IoT, cybersecurity
encompasses is not merely
safeguarding about protecting
entire ecosystems devices
of interconnected
from unauthorised
systems access;
from a diverse it encompasses
range of cyber threats.safeguarding entire ecosystems
The risks associated of intercon-
with inadequate security
are far-reaching—personal
nected systems from a diversedata range mayof be exposed,
cyber critical
threats. infrastructure
The risks associatedcan be compromised,
with inadequate
and public
security trust in these technologies
are far-reaching—personal datamaymaydiminish.
be exposed,Several high-profile
critical incidents,
infrastructure can besuch
as attacks onand
compromised, unsecured
public trust smart hometechnologies
in these devices, have mayalready underscored
diminish. the potential
Several high-profile
consequences
incidents, such as ofattacks
IoT vulnerabilities,
on unsecured raising
smartalarms
home in both the
devices, public
have and private
already sectors.
underscored
Emerging
the potential technologies
consequences of play a pivotal role inraising
IoT vulnerabilities, enhancing security
alarms in bothmeasures
the publicagainst
andthe
evolving
private landscape of cyber threats within IoT environments. By integrating solutions such
sectors.
as Artificial Intelligence, Blockchain, Machine Learning and other innovative technologies,
organisations can construct more robust defences against sophisticated attacks. For in-
stance, AI-powered anomaly detection systems can assist in identifying unusual patterns
of behaviour within IoT networks, facilitating expedited detection of potential breaches.
Computers 2025, 14, 61 3 of 45
Blockchain, with its decentralised and immutable ledger, provides a means of securing
data exchanges between devices and ensuring the integrity of communications. Public Key
Infrastructure systems can provide enhanced authentication mechanisms for IoT devices,
thereby reducing the likelihood of unauthorised access. As these technologies continue to
evolve, they will play an indispensable role in addressing the unique security challenges
posed by the interconnected nature of IoT.
In the realm of Internet of Things technology, cyber threats are exhibiting a remarkable
level of sophistication. Hackers are increasingly targeting devices equipped with inad-
equate or insufficient security measures, thereby gaining unauthorized access to larger
networks. Factors such as inadequate encryption, the absence of robust authentication
protocols, and outdated software contribute to the surge in cyber incidents within the IoT
ecosystem. Consequently, addressing these vulnerabilities necessitates a comprehensive
and proactive security strategy that transcends mere technical solutions. It encompasses not
only technical measures but also well-defined policy frameworks and industry standards.
To underscore the paramount importance of addressing IoT security vulnerabilities,
Table 1 presents a comprehensive overview of the most significant IoT-related attacks that
occurred between 2015 and 2024.
Figure 2. Estimated annual number of IoT malware attacks (in millions) 2018–2022 [14].
Figure 2. Estimated annual number of IoT malware attacks (in millions) 2018–2022 [14].
Given the escalating prevalence of IoT devices and the corresponding surge in cyberat-
tacks, it is imperative that effective solutions be developed to safeguard both the technology
itself and its users.
are codified in the 2016 General Data Protection Regulation [15] issued by the European
Parliament, which was enacted in response to technological advancements and global inte-
gration. The United States issued the IoT Cybersecurity Improvement Act of 2020, calling
for the National Institute of Standards and Technology and the Office of Management
and Budget to develop standards that establish minimum requirements and guidelines for
the management of IoT devices owned by federal agencies, i.e., the proper management
of information held by them [16]. These standards will necessitate periodic reviews and
updates by NIST every five years.
Over the years, there have been groups and organisations that, noticing the need for
increased cybersecurity, have developed frameworks and standards for different domains.
Thus, in 2017 the IoT Cybersecurity Alliance was formed, consisting of the firms AT&T,
IBM, Nokia, Palo Alto Networks, Symantec, and Trustonic, with the objective of solving
the main cybersecurity challenges in the IoT ecosystem using the expertise of the firms
involved [17]. Another such grouping is the Industry IoT Consortium, which is active in
the industry domain. They developed the first version of the Industry Internet of Things
Security Framework in 2016 with the aim of securing ICS/SCADA systems [18]. It provides
proposals for architectures that can be used and a set of best practices.
The Internet Engineering Task Force is developing standards for providing secure
communication protocols. One such protocol is CoAP—RFC 7252 Constrained Application
Protocol, developed for resource-constrained networks within the IoT ecosystem. It uses
DTLS to secure data exchange [19].
The Organization for Standardization published ISO/IEC 30141, republished in 2024,
which helps in the design of IoT ecosystems by providing best practices for authentication,
data security, and network integrity [20]. Other standards related to cybersecurity in the
IoT ecosystem are those representing the NIST 8259 series, developed by the NIST, and EN
303 645 [21], developed by the European Telecommunications Standards Institute.
Despite the existence of these standards, guidelines, and frameworks, IoT vulnerabili-
ties are continuously present, and the spread of IoT increases the need for solutions.
Table 2. Comparative analysis of recent IoT security review papers, categorized by key security
focus areas.
The comparative analysis presented in Table 2 highlights significant trends and gaps
in recent IoT security reviews. A key observation is that while numerous studies have
addressed specific aspects of IoT security, very few provide a comprehensive perspec-
tive encompassing all critical dimensions. In contrast, the present work systematically
examines six fundamental security categories offering a holistic synthesis of challenges,
advancements, and potential solutions.
One of the most striking findings is the lack of emphasis on risk management across
existing reviews. Risk management plays a pivotal role in IoT security, influencing threat
modeling, mitigation strategies, and resilience planning. However, as the table demon-
strates, only one other review [43] explicitly considers this dimension. This underscores a
significant research gap, which our work seeks to bridge by integrating a structured analysis
of risk assessment frameworks and security assurance strategies within IoT ecosystems.
While emerging technologies such as Artificial Intelligence, Blockchain, Machine
Learning, and Edge Computing are frequently referenced in the literature, their practical
integration into IoT security frameworks remains underexplored or only partially addressed
Computers 2025, 14, 61 7 of 45
in most prior reviews. Existing studies often examine these technologies individually, rather
than considering how they could be strategically integrated to enhance IoT security in a
comprehensive manner. While our review does not propose a unified framework combining
these technologies, it provides a systematic analysis of their applications, advantages, and
limitations. By doing so, this work identifies key research gaps and highlights the need
for future studies to explore how these technologies could be effectively combined into
cohesive security architectures that better address IoT-specific challenges.
While some studies concentrate on specific IoT branches or device categories, allowing
for a more in-depth analysis of their central topics, the present study adopts a broader
perspective. It aims to provide a comprehensive overview of IoT security, encompassing its
vulnerabilities, potential solutions, and existing challenges, to serve as both a starting point
and a holistic perspective for researchers and practitioners.
This review seeks to offer a clear synthesis of IoT security challenges and solutions,
serving as a foundational guide for developing resilient and secure IoT systems. Within
this context, the study systematically analyses the primary security concerns in IoT envi-
ronments, with its key contributions being the following:
• Identification of critical security weaknesses frequently addressed in IoT research.
• Examination of the specific difficulties involved in securing IoT devices.
• Review and evaluation of existing solutions designed to mitigate IoT-related secu-
rity risks.
• Analysis of key trends, best practices, and emerging technologies, including Artificial
Intelligence, Blockchain, Machine Learning, and Edge Computing, which are shaping
the future of IoT security.
• Emphasis on the need for robust and comprehensive security strategies to protect
sensitive data and strengthen public trust in IoT technologies.
In contrast to previous reviews that concentrate on specific aspects of IoT security,
this study offers a comprehensive evaluation of IoT security challenges, encompassing six
critical categories. Additionally, our work integrates research conducted between 2021 and
2024, ensuring that the assessment is current and up-to-date with the latest security trends
and advancements. By addressing these gaps, this review serves as a more comprehensive
and actionable resource, supporting researchers and practitioners in designing secure and
resilient IoT systems.
turn off or reduce the power to certain components, effectively conserving energy. This
approach is particularly advantageous in IoT systems where devices are often deployed
in remote or resource-limited environments and rely on batteries or intermittent energy
sources. By using switching controllers, energy consumption can be minimised, device lifes-
pan extended, and overall system efficiency improved [56]. Integrated on/off controllers
Computers 2025, 14, x FOR PEER REVIEW 8 of 47
can disconnect circuits entirely from power sources when not in use, further enhancing
energy conservation.
Figure3.3.Three-layered
Figure Three-layeredIoTIoT
system architecture
system [35]. [35].
architecture
key stages: identification, screening, and eligibility assessment, guided by the PRISMA
(Preferred Reporting Items for Systematic Reviews and Meta-Analyses) framework.
2.3.2. Eligibility
During the eligibility phase, 447 articles underwent a more detailed evaluation. In-
troductory sections, tables, diagrams, and conclusions were reviewed to ensure relevance.
Articles were excluded if any of the following conditions applied:
• The primary focus diverged from IoT security;
• They were editorials, opinion pieces, or predominantly literature reviews without new
solutions or insights;
• They lacked a clearly defined or described solution, framework, or implementation
related to IoT security.
Finally, 95 articles met the inclusion criteria and were included in the review. These
articles presented original solutions to IoT-specific security challenges, with clear method-
ologies and rigorously supported findings.
Identification
MDPI (n = 601)
Springer (n = 72) Duplicate articles
IEEEXplore (n = 65) (n = 23)
Elsevier (n = 218)
Arxiv (n = 5)
Other (n = 10)
Figure
Figure 4. PRISMA
4. PRISMA Flow—the
Flow—the selection
selection procedure.
procedure.
The This
PRISMAmethodological approach aimed
flow chart illustrates to provide
the detailed a robust
selection foundation for synthesizing
procedure:
security challenges and solutions, ensuring that the findings of this review reflect the
• Identification—Articles were retrieved from MDPI (601 articles), Springer (72 arti-
Computers 2025, 14, x FOR PEER REVIEW 12 of 47
diversity and complexity of IoT security literature.
cles), IEEE Xplore (65 articles), Elsevier (218 articles), Arxiv (5 articles), or Other (10
In Figure 5, the distribution of articles by their source can be observed.
articles);
• Screening—Articles irrelevant to IoT security were excluded after title, keywords,
abstract, and conclusion reviews;
• Eligibility—Articles lacking methodological rigor or well-defined solutions were ex-
cluded during detailed analysis.
The iterative categorization process ensured that articles addressing multiple IoT
vulnerabilities were allocated to all relevant categories for comprehensive coverage. This
process refined the initial categories into six critical areas of IoT security: attack detection,
data management, securing identity management, communication, emergent technolo-
gies, and risk management.
This methodological approach aimed to provide a robust foundation for synthesizing
security challenges and solutions, ensuring that the findings of this review reflect the di-
versity and complexity of IoT security literature.
In Figure 5, the distribution of articles by their source can be observed.
Numberofofarticles
Figure5.5.Number
Figure articlesby
bysources.
sources.
The literature review in this study was primarily based on publications from MDPI
due to its robust search engine, extensive journal collection, and rapidly updated data-
base. These features facilitated efficient access to high-quality, peer-reviewed articles
across a broad spectrum of topics relevant to IoT systems. While MDPI provided a reliable
Figure 5. Number of articles by sources.
Botmaster
Bot army
IoT Devices
nected devices and are prone to errors. Emerging solutions leverage blockchain technology,
but these approaches present limitations, including the potential exposure of sensitive meta-
data, which could compromise user privacy [85], and the challenge of achieving scalability
while maintaining data security [97]. Relying on centralized servers for authentication
introduces vulnerabilities such as a single point of failure [96].
Traditional user authentication methods, such as credentials, certificates, and 2FA,
can pose challenges in an IoT system due to the limited resources and capabilities of the
devices [106,107]. Furthermore, vulnerabilities arising from poor identity management
can be exploited in this context, given the specific characteristics of devices connected to
the system.
Studies [101–103] highlight the importance of secure communication and controlled
access to stored data. Currently, these processes are often managed through PKI [104,105].
While PKI has been an effective standard for securing communication in traditional sys-
tems, emerging challenges in the context of large-scale IoT suggest that it may struggle to
meet increasingly complex requirements. Moreover, there is no well-defined protocol for
efficiently transferring trust or updating PKI credentials when the responsibility for device
maintenance transitions from one service provider to another [104,105].
Key issues include the high costs associated with implementing and maintaining a
PKI system, as well as its substantial resource requirements, which can pose significant
obstacles for organizations aiming to deploy large-scale IoT solutions [104,105]. Another
notable concern is the risk of a single point of failure, where the entire responsibility for
access authorization relies on the PKI infrastructure [101–103]. This means that if the PKI
infrastructure is compromised or becomes inoperative, the entire security framework of
the IoT network could be severely impacted.
The adoption of digital identities introduces additional challenges. For instance,
study [87] draws attention to issues in the medical field related to identity management.
Digital identities have proven insufficient for accurately identifying patients, with a lack of
system integration and limited scalability further complicating the situation. Study [88]
examines the limitations of blockchain-based digital identities in terms of authenticity
and controllability while also addressing privacy requirements. Challenges also arise in
establishing a trusted network and coordinating digital identity management [91].
tunities but also introduces new challenges, particularly with the anticipated increase in
the number of connected devices and the volume of data transmitted [123]. This growth
necessitates optimising energy consumption and resource allocation to meet performance
requirements [122].
4.1.1. Intrusion and Anomaly Detection and Concept Drift Detection and Adaption
To protect IoT infrastructures, it is essential to employ two major categories of systems:
Intrusion Detection Systems and Intrusion Prevention Systems [60]. The study in [60] fo-
cuses specifically on developing an anomaly detection system, analysing various detection
techniques within IoT ecosystems while identifying several challenges and limitations of
current methods. To address these challenges, the authors propose integrating Incremental
Learning, Transfer Learning, and Deep Learning techniques to develop scalable detection
models capable of continuous updates, enhancing system performance, and reducing
costs and resource requirements. These models can also adapt to contextual changes, a
phenomenon known as concept drift.
Another approach to developing an efficient detection system is presented in [62],
where the authors examine detection methods used in IoT, including signature-based
recognition, anomaly-based detection, hybrid methods, and collaborative approaches
among IoT devices. They also draw comparisons between their strengths and weaknesses.
Collaborative methods are further explored in [66] to ensure information availability during
an attack. This approach relies on secondary devices supporting primary devices in case of
an attack, ensuring the continuity of critical information delivery to users. By employing
redundancy and cooperation among devices, this strategy enhances the system’s resilience
and availability in attack scenarios.
The effectiveness of modern methods based on emerging technologies is also high-
lighted in [62], which discusses the development of detection systems based on Deep
Learning. This technique has proven highly effective in detecting attacks within 5G net-
works. Using deep learning, intrusion detection pipelines have been created to leverage
powerful algorithms capable of identifying and mitigating security threats in real time [69].
An adaptive and high-performing IDS was implemented in the context of electric
vehicle charging stations using neural network architectures that combined LSTM and
GRU models [70].
One challenge in implementing IDS systems is the prevalence of false-positive alarms.
To address this issue and improve classification accuracy, TL and the CBAM [71] can be
used. These techniques, through the utilization of channel and spatial attention, refine
feature maps for greater precision.
In anomaly detection systems, careful consideration must be given to the selection of
the network architecture, as it is a key factor in achieving more effective anomaly detection.
This was demonstrated in [72,74] where two architectures, EPA and MUD, were compared.
The authors showed the superior performance of EPA over MUD. While MUD focuses
solely on stateless communication states, EPA provides a comprehensive evaluation of all
communication states, offering more detailed analysis for anomaly detection.
Further advancements are presented in a Deep Learning-based IDS for IoT devices, ca-
pable of detecting diverse attack types, including Blackhole, DDoS, Sinkhole, and Wormhole
attacks. The system employs a four-layer deep Fully Connected (FC) network architecture,
making it communication protocol-independent and reducing deployment complexity [83].
based on changes in the network environment. Concept drift detection is achieved using
ADWIN and DDM methods, while learning capabilities are enhanced through ARF, SRPs,
and KNN methods.
One significant challenge in developing an effective framework for detecting DDoS
and Botnet attacks is the imbalanced and limited availability nature of data for accurately
simulating such attacks. The scarcity of comprehensive real-world datasets constrains
the ability to train robust and generalizable detection models. Moreover, many tradi-
tional detection solutions rely on unlabeled or untrustworthy datasets, which can degrade
model performance, particularly when faced with zero-day threats [75]. To address this
limitation, studies [59,75] proposed leveraging Conditional Tabular Generative Adversar-
ial Networks (CTGAN) to generate synthetic data that closely mimics real-world traffic
patterns. This approach not only enriches the training datasets but also incorporates a
discriminator framework, which enhances the system’s capability to accurately distinguish
between legitimate and malicious traffic, thereby improving the overall effectiveness of the
detection mechanism.
To address the class imbalance issue, researchers [79] have explored the use of en-
semble learning techniques, such as the Bagging classifier, which employs a deep neural
network as a base estimator. By incorporating class weights into the training process, this
method ensures the creation of balanced training subsets for the DNN, improving both the
coherence and effectiveness of intrusion detection and classification systems.
In [35], a solution is proposed for detecting DDoS attacks in Information-Centric
Networking for IoT networks using machine learning algorithms such as SVM, RF, and
KNN. However, the best results were obtained by applying DT and RF classifiers [65]
trained on features selected using GA.
Feature extraction was further improved by converting non-image data into image data
through deep learning techniques, particularly VGG16 and Inception [71,72]. The Inception
technique, specifically the TCN model within the Inception structure, is proposed in [73] for
identifying devices connecting to the network. This method focuses on packet feature extraction,
feature selection, and, ultimately, extracting the temporal characteristics of the packets.
To address the challenges associated with IoT devices’ limited computational re-
sources and storage capacities, a lightweight and efficient intrusion detection method has
been proposed [82]. This solution incorporates a fast protocol parsing approach on raw
packet capture files to generate semantic-level features, followed by session merging and
feature grouping techniques to improve detection accuracy. These characteristics make
it an efficient, extensible, and suitable approach for IoT intrusion detection in resource-
constrained environments.
4.1.3. Botnet
As IoT systems proliferate, the risk of botnet-driven attacks also increases. The study
in [63] examines traditional attack detection methods, which, despite their high resource con-
sumption, are effective in identifying attacks generated by IoT-based botnets. Such approaches
can serve as a valid starting point for developing new detection and prevention techniques.
To address the limitations of traditional methods in the IoT context, a botnet at-
tack mitigation framework called IMTIBot was developed [61]. This framework seg-
regates network traffic into normal and abnormal categories and leverages ensemble
learning classifiers, combining multiple machine learning models to enhance detection
accuracy. Another innovative solution is the strategic amalgamation of Hybrid Feature
Selection methods—Categorical Analysis, Mutual Information, and Principal Component
Analysis—with an ensemble of machine learning techniques [81]. This approach refines
the input space for ensemble learners, with Extra Trees as the primary technique.
Computers 2025, 14, 61 19 of 45
tions based on data sensitivity and real-time demands, reinforcing privacy and secure data
transmission in decentralized IoT networks.
4.2.3. Generative AI
Protecting data privacy and integrity in the context of the proliferation of Gen-
erative AI is crucial. In this regard, the authors of [89,90] propose a multi-faceted
approach that includes techniques such as encryption, anonymization, access control,
continuous monitoring, protocol development, multi-layered security mechanisms, and
AI-powered safeguards.
Federated Learning combined with partial training can protect privacy in machine
learning applications within IoT systems [90]. In this approach, IoT devices train smaller
sub-models based on a large model hosted on a cloud server, and the server aggregates
these sub-models to update the global model. TEE are employed to secure sensitive user
data, protecting it from external threats before it is sent to generative models for inference.
Table 5 summarises the key challenges and solutions in data management and protec-
tion, highlighting the main issues and proposed strategies to address them.
To prevent attacks and ensure the authenticity and integrity of data, study [107]
proposes a framework based on Bloom filters and hash chains. This system could serve
as a viable solution in the context of an increasingly complex IoT ecosystem, providing
enhanced protection against cyberattacks and ensuring a secure and efficient data flow.
Digital identity, as a method of representing devices within the IoT ecosystem, is dis-
cussed in works [87,88,91,96]. Despite the advantages of blockchain-based digital identity
systems, they have several drawbacks, such as issues with identity authenticity, controllabil-
ity, and privacy protection [88,96]. The study in [87] provides an overview of the challenges
and solutions in the medical field. To address these weaknesses, works [88,96] propose
a system where the roles of identity verification and credential issuance are separated to
reduce the risk of identity-related information leakage. Privacy is enhanced by linkable
ring signatures, zero-knowledge proof encryption techniques, and AES. Using a similar
approach, the authors of [88,96] developed a Multi-Factor Authentication method utilising
blockchain and zero-knowledge proofs. They address weaknesses such as single points of
failure and privacy vulnerabilities in blockchain technology through a DAM. Part of the
proposed MFA process also includes using NFTs as authentication tokens.
The paper at [91] identifies several dimensions of digital identity characteristics for
users. It proposes a collaborative framework between governmental institutions and non-
governmental blockchain alliances, based on a delegated model. It proposes a zero-trust
model for digital identity management and big data security.
4.3.2. Authentication
A new framework proposed in [97], based on edge computing and blockchain, explores
the use of Ethereum 2 Layer roll-ups to enhance scalability and reduce bottlenecks in the
device authentication process. This approach could alleviate the pressure on authentication
systems and enable more efficient resource management, given the exponential growth in
the number of connected devices. At the same time, study [85] introduces an Ethereum-
based mechanism that ensures data security through a unique legitimacy score, applicable
both at the device level and at the cloud level.
Regarding authentication, study [106] suggests a mutual authentication and key
agreement protocol designed to address threats in the edge–fog–cloud architecture of 5G
networks. This protocol involves mutual identity verification between devices and fog
nodes, adding an extra layer of security in the resource access process.
A significant enhancement in handover authentication protocols is proposed in [111],
which addresses critical deficiencies in traditional methods. Traditional handover au-
thentication protocols, often reliant on bilinear pairing and elliptic curve cryptography,
are susceptible to quantum attacks and session key compromise. To overcome these vul-
nerabilities, refy introduces a lightweight two-party handover authentication protocol
based on the lattice cipher NTRU, designed to resist quantum attacks. This protocol elimi-
nates the dependency on a home agent, reducing communication delays and improving
session key security. Expanding on lattice-based cryptography, ACPRE enhances proxy re-
encryption by embedding dual access policies and securing data via the LWE problem [115].
It achieves HRA security with formal proofs while optimising efficiency through plain-
text space expansion, reducing performance overhead and complementing lattice-based
handover authentication.
In addition to advancements in handover authentication, securing digital data ex-
change in IoT environments against quantum threats is paramount. Traditional crypto-
graphic schemes struggle against the computational power of quantum computers, necessi-
tating novel encryption frameworks. A recently proposed approach integrates bit-plane
extraction, chaotic sine models, hyperchaotic maps, and quantum operations to enhance
Computers 2025, 14, 61 24 of 45
4.4.2. Firmware
Another critical aspect in IoT systems is the vulnerability of IoT devices at the firmware
level. Study [134] highlights significant security vulnerabilities in smart home IoT firmware,
revealing ten critical network-based flaws, with five scoring a maximum CVSS of 10.0. The
findings underscore the widespread use of unsafe functions and the absence of essential
security features. Study [124] provides a review of firmware vulnerabilities, identifying
the challenges encountered at this level and methods to mitigate them. To achieve the
desired level of security, the proposed solutions include the development of standards
and guidelines for stakeholders involved in IoT system development, the application of
emerging technologies to deliver intelligent and adaptive solutions, the use of reverse
engineering for firmware analysis, and the development of hybrid frameworks to unify
various approaches.
A key issue in firmware security is ensuring timely and cost-effective updates. To
address this, study [130] proposes a decentralized, blockchain-based firmware update
mechanism. This approach stimulates distributors via smart contracts and rewards IoT de-
vices for successful installations, using verifiable proof-of-delivery and proof-of-installation
to ensure security and fairness.
Another approach focuses on improving Firmware Update Over the Air efficiency,
particularly for IoT devices using LoRaWAN [131]. A proposed modular firmware devel-
opment framework allows partial and dynamic updates without requiring a system reboot,
significantly reducing update size and network traffic compared to traditional monolithic
firmware updates.
Beyond update mechanisms, outdated open-source components in firmware pose
additional security risks, as they often contain unpatched N-day vulnerabilities. Study [132]
introduces VERI, a system for large-scale vulnerability detection through lightweight
version identification. VERI leverages symbolic execution with static analysis to accurately
determine open-source components versions and employs deep learning to extract version-
vulnerability relationships from vulnerability descriptions.
Beyond updates, IoT repackaging presents a serious threat, where attackers modify
legitimate firmware by injecting malicious code before redistribution. To mitigate this,
study [133] introduces PARIOT, a self-protecting scheme that integrates anti-tampering
controls directly into firmware, enabling runtime detection of unauthorized modifications
without relying on internet access, secure storage, or external trust anchors.
2023 onward, there is a marked rise in research interest, signaling a significant shift in focus
toward these technologies.
This trend reflects the increasing integration of emergent technologies across diverse
disciplines, providing evidence that the heightened interest in their application to IoT
security is part of a broader, global research movement rather than a localized phenomenon.
Such widespread growth validates the assertion that these technologies are gaining traction
and aligns with the notion of a global technological shift.
Furthermore, the observed trend indicates a maturing phase for emergent technologies,
as their growing adoption across fields demonstrates progress in their development and
readiness for implementation. This overall increase in research activity suggests that these
technologies are advancing toward higher feasibility and reliability, making them more
suitable for integration into specialized domains, including IoT security.
With this broader context established, the focus shifts to IoT security to examine the
specific contributions of these technologies within the field. The following section explores
key emergent technologies individually, detailing their distinct roles and capabilities in
strengthening IoT system security.
in terms of computational efficiency and energy consumption during both training and
inference phases, making them suitable for resource-constrained IoT devices [142].
The reviewed articles also address the issue of selecting a training strategy for ML
models. Transfer learning emerges as a solution to reduce the time and computational effort
required for training new models [71], leveraging prior knowledge during the training
process. Collaborative training solutions are also proposed, such as federated learning [77],
which enables distributed model training across IoT devices. This strategy involves sharing
model updates while preserving data privacy [102], effectively reducing the risk of man-in-
the-middle attacks, malware, eavesdropping, and energy theft [141]. Complementing this
approach, split learning is proposed, which divides the model training task between devices
and a server, ensuring privacy by sharing only intermediate representations instead of raw
data or complete models [140]. This method also enhances the efficiency and scalability of
the training process.
4.5.2. Blockchain
Blockchain technology is recommended for integration into IoT systems due to its
numerous advantages. Blockchain replaces traditional data management systems with a
decentralised architecture, enabling direct data transactions without intermediaries [92,138].
This technology can handle large volumes of transactions while simplifying processes
within the system [110,138]. Through smart contracts, transactions can be automated based
on well-defined rules, reducing the need for manual interventions and lowering transaction
costs [88,92,102].
The management of large data volumes can be improved using off-chain data stor-
age, with only data hashes stored on the blockchain [84]. This approach ensures data
integrity without overloading the blockchain. Ethereum-based frameworks can function
as a trapdoor to ensure data confidentiality in IoT systems [85,130]. During the off-chain
data repositioning process, encryption and decentralised operations are employed to main-
tain data privacy. Another blockchain and Trusted Execution Environment (TEE)-based
framework for distributed data sharing and authentication is proposed in the paper at [144].
Blockchain is utilized for on-chain security and access control, while TEE is employed
for off-chain data protection. Furthermore, an SGX-based distributed storage system is
integrated to enhance data integrity, availability, and resilience against rollback attacks.
Thanks to ledgers that record every transaction, traceability is enhanced, fostering
greater trust in the system [86,92,93,102,138]. Frameworks like Hyperledger Fabric reduce
the risk of unauthorised data access by restricting it to authorised nodes only [84].
Blockchain ensures confidentiality, integrity, and availability [87]. Data confidential-
ity is achieved through digital identity encryption methods. Immutable records on the
blockchain prevent unauthorised data modifications, maintaining integrity [88,91,138]. The
decentralised nature of blockchain technology enhances availability, with data stored across
multiple nodes [87].
Blockchain technology has also been proposed to enhance authentication processes
by integrating Zero-Knowledge Proofs. This method ensures privacy without disclosing
sensitive data while verifying the authenticity of OTPs and confirming user identity [96].
4.5.4.
4.5.4. Edge
Edge Computing
Computing and and Fog
Fog Computing
Computing
Edge computing and fog computing
Edge computing and fog computing cancanenhance
enhancethe the
efficiency of cooperation
efficiency between
of cooperation be-
IoT systems and the Cloud while also improving their security and scalability
tween IoT systems and the Cloud while also improving their security and scalability [63]. [63]. These
technologies involveinvolve
These technologies performing computational
performing processes
computational closer tocloser
processes the data source
to the data[119], al-
source
though this approach
[119], although may resultmay
this approach in higher
resultenergy consumption
in higher for the selected
energy consumption devices
for the [71].
selected
Nevertheless, the proposed solution reduces latency, enabling faster attack
devices [71]. Nevertheless, the proposed solution reduces latency, enabling faster attack detection [64]
and preventing
detection their
[64] and propagation
preventing theirwithin the system
propagation [69,121].
within the system [69,121].
Additionally,
Additionally, these approaches decrease the amount
these approaches decrease the amount of of data
data transmitted
transmitted to to the
the
Cloud, reducing bandwidth requirements [70] and optimising data transmission
Cloud, reducing bandwidth requirements [70] and optimising data transmission across across the
network
the network[123].
[123].
The
The accompanying heatmap,
accompanying heatmap,Figure
Figure9,9,illustrates
illustratesthe
theutilization
utilizationof ofemerging
emergingtechnolo-
technol-
gies within the identified categories.
ogies within the identified categories.
Figure 9.
Figure 9. Heatmap
Heatmap depicting
depicting the
the prevalence
prevalence ofof Emergent
Emergent Technologies
Technologies across
across identified
identified categories
categories
(red—0% prevalence,
(red—0% prevalence, yellow—below
yellow—below20% 20%prevalence,
prevalence,green
greenand
andits
itsvarying
varyingshades
shadesrepresent
representpreva-
prev-
alenceabove
lence above20%,
20%,with
withdarker
darkershades
shadessignifying
signifyinghigher
higherprevalence).
prevalence).
In the context of Risk Management, the reviewed articles do not employ emergent
technologies. Instead, they focus on developing frameworks to achieve standardizations
and risk management models that guide organizations in formulating cybersecurity
Computers 2025, 14, 61 31 of 45
In the context of Risk Management, the reviewed articles do not employ emergent
technologies. Instead, they focus on developing frameworks to achieve standardizations
and risk management models that guide organizations in formulating cybersecurity im-
plementation policies for Internet of Things systems. However, even within this area, the
cognitive capabilities of Machine Learning and Artificial Intelligence could be utilized to
adapt rules based on the application domain, identify latent risks, and update regulations
in response to emerging threats and technological advancements.
The heatmap illustrates that the four emergent technologies exhibit varying levels of
adoption across the identified categories. Machine Learning is most frequently suggested
as a solution for attack detection due to its capabilities in traffic analysis, anomaly detection,
and resource optimisation. Blockchain technology demonstrates its prominence in the data
management and protection category, attributed to its decentralization features and ability
to ensure data integrity and confidentiality. This category also sees significant utilization of
Artificial Intelligence, particularly Generative AI, which can generate necessary conditions,
such as test data for training ML models, validate transactions within blockchain systems,
and support data integrity assurance. Edge and Fog Computing emerge as deployment
suggestions for attack detection systems and solutions for securing networks and facilitating
communication between edge devices and servers. These technologies contribute by
reducing latency, enhancing security, and ensuring efficient network operations.
5. Discussion
Based on the analysis of the selected articles and the identification of the categories of
topics addressed by them, a bar chart (Figure 10) was constructed to visualize the relative
weight of concern pertaining to the listed categories. It is noteworthy
Computers 2025, 14, x FOR PEER REVIEW 34 that
of 47 articles that
encompassed multiple categories were considered for each category separately.
Figure Articles
10.Articles
Figure 10. classified
classified by identified
by identified categories.
categories.
The bar chart analysis demonstrates that three of the six categories—Securing Identity
Management, Attack Detection, and Emergent Technologies—attract the most attention.
Among these, Emergent Technologies has the tallest bar in the chart, reflecting their ex-
tensive adoption in proposed solutions. This widespread utilization is attributed to their
capability to process large datasets, reduce anomaly detection time, and adapt to the
rapidly evolving landscape of threats and attack types specific to IoT systems. Suggested
approaches include employing machine learning techniques for predicting and preventing
attacks, utilizing blockchain technology to enhance security through decentralization, and
deploying Edge and Fog Computing to minimise latency and prevent the propagation of
attacks across systems.
However, integrating emergent technologies presents new challenges, such as vulner-
abilities and resource constraints inherent to IoT devices. Training artificial intelligence
and machine learning models requires substantial computational resources, posing a sig-
nificant obstacle. Furthermore, regulatory issues and ethical dilemmas arise, particularly
when systems must make decisions that may involve trade-offs or sacrifices. Addressing
these challenges will necessitate innovative solutions to maximize the benefits of these
technologies while mitigating their drawbacks.
These appliances, ranging from smart thermostats and light bulbs to security cameras
and home assistants, often operate on minimal resources to reduce costs and enhance
energy efficiency.
The extended training times required for many ML models poses a substantial barrier.
Additionally, the dynamic nature of cyber threats—concept drift—necessitates frequent
retraining of models to ensure their effectiveness against evolving attack patterns. This
process is both resource-intensive and time-consuming, often delaying the deployment of
updated models in real-world scenarios. These limitations underscore the need for inno-
vative approaches to optimise training efficiency, such as the learning methods analysed
in Table 9. However, all these methods involve significant computational resources to
achieve high level performance. Moreover, there are issues with continuous training and
transferring or sharing data among heterogenous devices. A framework using all methods
could mitigate the limitations of them, while also engaging new challenges such as:
• Architecture complexity which involves difficult diagnose process, maintenance, opti-
misation and scalability;
• Training pipeline sophistication to keep a stable model behavior;
• Incremental learning could deteriorate pretrained foundation, introducing errors
and vulnerabilities;
• Communication overhead introduced by the need of data exchange between devices
and central server, as well as between source domain and target domain;
• Computational effort persists.
transaction malleability, further highlight the risks associated with blockchain deployment.
Some of the primary challenges in deploying blockchain technology include the lack of
expertise in this domain, the complexity of architectures such as Hyperledger Fabric, and
the initial configuration, update, and maintenance efforts.
To ensure the secure integration of these technologies into IoT frameworks, it is es-
sential to develop robust defense mechanisms, such as adversarial training for AI and
improved consensus algorithms for blockchain. Additionally, comprehensive risk as-
sessment and continuous monitoring are necessary to anticipate and mitigate potential
vulnerabilities, ensuring the resilience of IoT systems against emerging threats.
Additionally, a comprehensive regulatory framework must be established to define
standards, establish a consensus mechanism, facilitate governmental and policy manage-
ment, and implement data management strategies.
Table 10 provides a comprehensive summary of the discussion section, consolidating
key findings, research trends, and challenges identified after the review process. The
distribution of research focus indicates that Emergent Technologies (thirty-seven articles),
Attack Detection (twenty-six articles), and Identity Management (twenty-one articles) are
the most explored topics, while Risk Management remains underdeveloped (four articles).
This table highlights the critical areas shaping IoT security research and the ongoing
challenges that must be addressed.
oriented guidelines that address security and privacy concerns. Future policies should
focus on harmonized global compliance, mandatory security baselines, legal account-
ability, and emergent technologies integration. Simultaneously, international standard-
ization bodies should develop adaptive, interoperable security frameworks, advance
post-quantum cryptography adoption, and explore self-healing IoT architectures.
These directions will pave the way for a secure, resilient, and trustworthy IoT ecosys-
tem, ensuring long-term sustainability and public confidence in IoT technologies.
6. Focus on Securing Neglected IoT Devices
Many IoT devices, particularly in smart homes, remain overlooked in terms of security.
Targeted research is needed to develop lightweight security protocols, automated
firmware updates, and user-friendly mechanisms to protect these devices, which often
operate in resource-constrained environments.
7. Interference Mitigation in Dynamic Spectrum Sharing
As dynamic spectrum sharing grows, mitigating interference and unauthorized spec-
trum access is critical. Future research should explore AI-driven spectrum sensing,
cognitive radio techniques, adaptive interference control, and blockchain-based spec-
trum management to enhance secure and efficient spectrum utilization.
Table 11 summarizes the research directions derived from the analysis.
Author Contributions: Conceptualization, H.S. and D.E.P.; methodology, H.S., D.E.P. and R.D.Z.;
resources, H.S. and D.E.P.; writing—original draft preparation, H.S. and D.E.P.; writing—review
and editing, D.E.P., R.D.Z. and H.S.; visualization D.E.P.; supervision, D.E.P. and R.D.Z.; project
administration D.E.P. All authors have read and agreed to the published version of the manuscript.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Greengard, S. Internet of Things. In Encyclopedia Britannica; 2024. Available online: https://www.britannica.com/science/
Internet-of-Things (accessed on 3 January 2025).
2. Satyajit, S. State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally; IoT Analytics: Hamburg,
Germany, 2024.
3. Greenberg, A. Hackers Remotely Kill a Jeep on the Highway—With Me in It. Available online: https://www.wired.com/2015/0
7/hackers-remotely-kill-jeep-highway/ (accessed on 17 January 2025).
4. Antonakakis, M.; April, T.; Bailey, M. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium,
Vancouver, BC, Canada, 16 August 2017.
5. Smart, W. Lessons Learned Review of the WannaCry Ransomware Cyber Attack; Department of Health and Social Care: London,
UK, 2018.
6. Brewster, T. Hackers Used a Fish Tank to Breach a Casino’s High-Roller Database. Forbes. 2018. Available online: https:
//www.forbes.com/sites/thomasbrewster/2018/07/19/fish-tank-hack-into-casino/ (accessed on 17 January 2025).
7. Kari, P. Dozens Sue Amazon’s Ring after Camera Hack Leads to Threats and Racial Slurs. The Guardian, 23 December 2020. Avail-
able online: https://www.theguardian.com/technology/2020/dec/23/amazon-ring-camera-hack-lawsuit-threats (accessed on
17 January 2025).
8. Cimpanu, C. Garmin Services and Production Go Down After Ransomware Attack. Available online: https://www.zdnet.com/
article/garmin-services-and-production-go-down-after-ransomware-attack/ (accessed on 17 January 2025).
9. Easterly, J. The Attack on Colonial Pipeline: What We’ve Learned & What We’ve Done Over the Past Two Years. 2023. Available
online: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-
two-years (accessed on 15 November 2024).
10. Montalbano, E. Breach Exposes Verkada Security Camera Footage at Tesla, Cloudflare. Threatpost 10 March 2021. Available online:
https://threatpost.com/breach-verkada-security-camera-tesla-cloudflare/164635/ (accessed on 17 January 2025).
11. Gartenberg, C. Security Startup Verkada Hack Exposes 150,000 Security Cameras in Tesla Factories, Jails, and More. 2021. Available
online: https://www.theverge.com/2021/3/9/22322122/verkada-hack-150000-security-cameras-tesla-factory-cloudflare-jails-
hospitals (accessed on 15 November 2024).
12. Greenberg, A. A Hacker Tried to Poison a Florida City’s Water Supply, Officials Say. Available online: https://www.wired.com/
story/oldsmar-florida-water-utility-hack/ (accessed on 17 January 2025).
13. Kapko, M. MOVEit Liabilities Mount for Progress Software. Cybersecurity Dive. 2024. Available online: https://www.
cybersecuritydive.com/news/moveit-liabilities-progress/706015/ (accessed on 17 January 2025).
14. Ptrosyan, A. Annual Number of Internet of Things (IoT) Malware Attacks Worldwide from 2018 to 2022. Statista, Cyber Crime &
Security. 2024. Available online: https://www.statista.com/statistics/1377569/worldwide-annual-internet-of-things-attacks/
(accessed on 17 January 2025).
15. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons
with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC
(General Data Protection Regulation). Off. J. Eur. Union 2016, L119, 1–88.
16. H.R.1668—IoT Cybersecurity Improvement Act of 2020. Available online: https://www.congress.gov/bill/116th-congress/
house-bill/1668 (accessed on 17 January 2025).
17. AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic Form IoT Cybersecurity Alliance. 2017. Available online:
https://about.att.com/story/iot_cybersecurity_alliance.html (accessed on 1 February 2025).
18. Caindec, K.; Buchheit, M.; Zarkout, B.; Schrecker, S.; Hirsch, F.; Dungana, I.; Martin, R.; Tseng, M. An Industry IoT Foundational
Publication; AT&T Inc.: Dallas, TX, USA, 2017.
19. CoAP RFC 7252 Constrained Application Protocol. Available online: https://datatracker.ietf.org/doc/html/rfc7252 (accessed on
15 November 2024).
20. ISO/IEC 30141:2024; Internet of Things (IoT)—Reference Architecture. International Organization for Standardization: Geneva,
Switzerland, 2024.
21. ETSI EN 303 645; Cyber Security for Consumer Internet of Things: Baseline Requirements. European Standard. June 2020.
Available online: https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf (accessed
on 9 January 2025).
22. Dritsas, E.; Trigka, M. A Survey on Cybersecurity in IoT. Future Internet 2025, 17, 30. [CrossRef]
23. Szymoniak, S.; Piatkowski,
˛ J.; Kurkowski, M. Defense and Security Mechanisms in the Internet of Things: A Review. Appl. Sci.
2025, 15, 499. [CrossRef]
24. Singh, N.; Buyya, R.; Kim, H. Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors 2024, 25, 79.
[CrossRef]
Computers 2025, 14, 61 41 of 45
25. Krzysztoń, E.; Rojek, I.; Mikołajewski, D. A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An
Experimental Study. Appl. Sci. 2024, 14, 11545. [CrossRef]
26. Alshamsi, O.; Shaalan, K.; Butt, U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection
Techniques and Recommended Prevention Approach. Information 2024, 15, 631. [CrossRef]
27. Fatima, M.; Rehman, O.; Rahman, I.M.H.; Ajmal, A.; Park, S.J. Towards Ensemble Feature Selection for Lightweight Intrusion
Detection in Resource-Constrained IoT Devices. Future Internet 2024, 16, 368. [CrossRef]
28. Kikissagbe, B.R.; Adda, M. Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review.
Electronics 2024, 13, 3601. [CrossRef]
29. Dritsas, E.; Trigka, M. Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey. Future Internet 2024, 16, 324.
[CrossRef]
30. Roy, S.; Sankaran, S.; Zeng, M. Green Intrusion Detection Systems: A Comprehensive Review and Directions. Sensors 2024, 24,
5516. [CrossRef]
31. Alkhayyal, M.; Mostafa, A. Recent Developments in AI and ML for IoT: A Systematic Literature Review on LoRaWAN Energy
Efficiency and Performance Optimization. Sensors 2024, 24, 4482. [CrossRef] [PubMed]
32. Isong, B.; Kgote, O.; Abu-Mahfouz, A. Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems.
Electronics 2024, 13, 2370. [CrossRef]
33. Gelgi, M.; Guan, Y.; Arunachala, S.; Samba Siva Rao, M.; Dragoni, N. Systematic Literature Review of IoT Botnet DDOS Attacks
and Evaluation of Detection Techniques. Sensors 2024, 24, 3571. [CrossRef]
34. Rafique, S.H.; Abdallah, A.; Musa, N.S.; Murugan, T. Machine Learning and Deep Learning Techniques for Internet of Things
Network Anomaly Detection—Current Research Trends. Sensors 2024, 24, 1968. [CrossRef]
35. Bukhowah, R.; Aljughaiman, A.; Rahman, M.M.H. Detection of DoS Attacks for IoT in Information-Centric Networks Using
Machine Learning: Opportunities, Challenges, and Future Research Directions. Electronics 2024, 13, 1031. [CrossRef]
36. Alhamarneh, R.A.; Mahinderjit Singh, M. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions
for Authentication, Communication Protocols, Challenges, and Applications. Appl. Sci. 2024, 14, 1700. [CrossRef]
37. Hossain, M.; Kayas, G.; Hasan, R.; Skjellum, A.; Noor, S.; Islam, S.M.R. A Holistic Analysis of Internet of Things (IoT) Security:
Principles, Practices, and New Perspectives. Future Internet 2024, 16, 40. [CrossRef]
38. AlSalem, T.; Almaiah, M.; Lutfi, A. Cybersecurity Risk Analysis in the IoT: A Systematic Review. Electronics 2023, 12, 3958.
[CrossRef]
39. Alotaibi, B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing
Opportunities. Sensors 2023, 23, 7470. [CrossRef] [PubMed]
40. Alahmadi, A.A.; Aljabri, M.; Alhaidari, F.; Alharthi, D.J.; Rayani, G.E.; Marghalani, L.A.; Alotaibi, O.B.; Bajandouh, S.A. DDoS
Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions. Electronics 2023,
12, 3103. [CrossRef]
41. Chui, K.T.; Gupta, B.B.; Liu, J.; Arya, V.; Nedjah, N.; Almomani, A.; Chaurasia, P. A Survey of Internet of Things and Cyber-
Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information 2023, 14, 388.
[CrossRef]
42. Pritika, P.; Shanmugam, B.; Azam, S. Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies 2023, 11, 31.
[CrossRef]
43. Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A Comprehensive Review of Cyber Security Vulnerabilities,
Threats, Attacks, and Solutions. Electronics 2023, 12, 1333. [CrossRef]
44. Taherdoost, H. Security and Internet of Things: Benefits, Challenges, and Future Perspectives. Electronics 2023, 12, 1901. [CrossRef]
45. Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet
of Things: A Comprehensive Review. Sensors 2023, 23, 4117. [CrossRef]
46. Sun, P.; Wan, Y.; Wu, Z.; Fang, Z.; Li, Q. A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies,
Protection Measures and Future Directions. Comput. Secur. 2025, 148, 104097. [CrossRef]
47. Kumar, S.; Kumar, D.; Dangi, R.; Choudhary, G.; Dragoni, N.; You, I. A Review of Lightweight Security and Privacy for
Resource-Constrained IoT Devices. Comput. Mater. Contin. 2024, 78, 31–63. [CrossRef]
48. Chaurasia, N.; Kumar, P. A Comprehensive Study on Issues and Challenges Related to Privacy and Security in IoT. e-Prime—Adv.
Electr. Eng. Electron. Energy 2023, 4, 100158. [CrossRef]
49. Narciandi-Rodriguez, D.; Aveleira-Mata, J.; García-Ordás, M.T.; Alfonso-Cendón, J.; Benavides, C.; Alaiz-Moretón, H. A
Cybersecurity Review in IoT 5G Networks. Internet Things 2025, 30, 101478. [CrossRef]
50. Bala, B.; Behal, S. AI Techniques for IoT-Based DDoS Attack Detection: Taxonomies, Comprehensive Review and Research
Challenges. Comput. Sci. Rev. 2024, 52, 100631. [CrossRef]
51. Kumari, P.; Jain, A.K. A Comprehensive Study of DDoS Attacks over IoT Network and Their Countermeasures. Comput. Secur.
2023, 127, 103096. [CrossRef]
Computers 2025, 14, 61 42 of 45
52. Makhdoom, I.; Abolhasan, M.; Franklin, D.; Lipman, J.; Zimmermann, C.; Piccardi, M.; Shariati, N. Detecting Compromised IoT
Devices: Existing Techniques, Challenges, and a Way Forward. Comput. Secur. 2023, 132, 103384. [CrossRef]
53. Unpacking IoT Architecture: Layers and Components Explained. Available online: https://deviceauthority.com/unpacking-iot-
architecture-layers-and-components-explained/ (accessed on 3 December 2024).
54. Domínguez-Bolaño, T.; Campos, O.; Barral, V.; Escudero, C.J.; García-Naya, J.A. An Overview of IoT Architectures, Technologies,
and Existing Open-Source Projects. Internet Things 2022, 20, 100626. [CrossRef]
55. Rai, S. How to Greatly Improve Battery Power Efficiency for IoT Devices, Analog Devices, Technical Articles, 6 March 2023.
Available online: https://www.analog.com/en/resources/technical-articles/greatly-improve-battery-power-efficiency-for-iot-
devices.html (accessed on 18 January 2025).
56. Borres, B.; Tenorio, N. How Integrated On/Off Controllers Contribute to Energy Efficient System Designs. Available online: https:
//www.analog.com/en/resources/analog-dialogue/articles/integrated-on-off-controllers-contribute-to-energy-eff.html (ac-
cessed on 1 February 2025).
57. Rottleuthner, M.; Schmidt, T.C.; Wählisch, M. Dynamic Clock Reconfiguration for the Constrained IoT and Its Application to
Energy-Efficient Networking. arXiv 2021, arXiv:2102.10353.
58. Tkhir, P. 4 Types of IoT Networks: Overview and Use Cases. 2023. Available online: https://euristiq.com/types-of-iot-networks/
(accessed on 18 January 2025).
59. Alabsi, B.; Anbar, M.; Rihan, S. Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos
and Dos Attacks on the Internet of Things Networks. Sensors 2023, 23, 5644. [CrossRef]
60. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A
Systematic Review. IEEE Access 2021, 9, 59353–59377. [CrossRef]
61. Garg, U.; Kumar, S.; Mahanti, A. IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet 2024, 16, 212.
[CrossRef]
62. Chen, Z.; Liu, J.; Shen, Y.; Simsek, M.; Kantarci, B.; Mouftah, H.T.; Djukic, P. Machine Learning-Enabled IoT Security: Open Issues
and Challenges Under Advanced Persistent Threats. ACM Comput. Surv. 2023, 55, 105. [CrossRef]
63. Woodiss-Field, A.; Johnstone, M.N.; Haskell-Dowland, P. Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors
2024, 24, 1027. [CrossRef] [PubMed]
64. Beshah, Y.K.; Abebe, S.L.; Melaku, H.M. Drift Adaptive Online DDoS Attack Detection Framework for IoT System. Electronics
2024, 13, 1004. [CrossRef]
65. Altulaihan, E.; Almaiah, M.A.; Aljughaiman, A. Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on
Machine Learning Algorithms. Sensors 2024, 24, 713. [CrossRef] [PubMed]
66. Farraj, A.; Hammad, E. A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping
Attacks in Internet of Things Environments. Sensors 2024, 24, 5171. [CrossRef]
67. Li, M.; Dou, Z. Active Eavesdropping Detection: A Novel Physical Layer Security in Wireless IoT. EURASIP J. Adv. Signal Process.
2023, 2023, 119. [CrossRef]
68. Kim, M.; Suh, T. Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices. Sensors 2021,
21, 8207. [CrossRef] [PubMed]
69. Moubayed, A. A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. Future Internet 2024, 16, 331.
[CrossRef]
70. Kilichev, D.; Turimov, D.; Kim, W. Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models.
Mathematics 2024, 12, 571. [CrossRef]
71. Abdelhamid, S.; Hegazy, I.; Aref, M.; Roushdy, M. Attention-Driven Transfer Learning Model for Improved IoT Intrusion
Detection. BDCC 2024, 8, 116. [CrossRef]
72. Chen, J.; Xiao, J.; Xu, J. VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-
Image Conversion and Deep Learning. Electronics 2024, 13, 3639. [CrossRef]
73. Hu, L.; Zhao, B.; Wang, G. A Network Device Identification Method Based on Packet Temporal Features and Machine Learning.
Appl. Sci. 2024, 14, 7954. [CrossRef]
74. Aroon, N.; Liu, V.; Kane, L.; Li, Y.; Tesfamicael, A.D.; McKague, M. An Architecture of Enhanced Profiling Assurance for IoT
Networks. Electronics 2024, 13, 2832. [CrossRef]
75. Habibi, O.; Chemmakha, M.; Lazaar, M. Imbalanced Tabular Data Modelization Using CTGAN and Machine Learning to Improve
IoT Botnet Attacks Detection. Eng. Appl. Artif. Intell. 2023, 118, 105669. [CrossRef]
76. Alani, M.M. BotStop: Packet-Based Efficient and Explainable IoT Botnet Detection Using Machine Learning. Comput. Commun.
2022, 193, 53–62. [CrossRef]
77. de Caldas Filho, F.L.; Soares, S.C.M.; Oroski, E.; de Oliveira Albuquerque, R.; da Mata, R.Z.A.; de Mendonça, F.L.L.; de Sousa
Júnior, R.T. Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning. Sensors 2023, 23, 6305. [CrossRef]
Computers 2025, 14, 61 43 of 45
78. Negera, W.G.; Schwenker, F.; Debelee, T.G.; Melaku, H.M.; Feyisa, D.W. Lightweight Model for Botnet Attack Detection in
Software Defined Network-Orchestrated IoT. Appl. Sci. 2023, 13, 4699. [CrossRef]
79. Thakkar, A.; Lohiya, R. Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based
Deep Neural Network. IEEE Internet Things J. 2023, 10, 11888–11895. [CrossRef]
80. Yang, C.; Guan, W.; Fang, Z. IoT Botnet Attack Detection Model Based on DBO-Catboost. Appl. Sci. 2023, 13, 7169. [CrossRef]
81. Hossain, M.A.; Islam, M.S. A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet
Detection. Sci. Rep. 2023, 13, 21207. [CrossRef] [PubMed]
82. He, M.; Huang, Y.; Wang, X.; Wei, P.; Wang, X. A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature
Grouping. IEEE Internet Things J. 2024, 11, 2935–2949. [CrossRef]
83. Awajan, A. A Novel Deep Learning-Based Intrusion Detection System for IoT Networks. Computers 2023, 12, 34. [CrossRef]
84. Eghmazi, A.; Ataei, M.; Landry, R.J.; Chevrette, G. Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and
Privacy. IoT 2024, 5, 20–34. [CrossRef]
85. Khan, B.U.I.; Goh, K.W.; Khan, A.R.; Zuhairi, M.F.; Chaimanee, M. Integrating AI and Blockchain for Enhanced Data Security in
IoT-Driven Smart Cities. Processes 2024, 12, 1825. [CrossRef]
86. Wei, P.; Wang, D.; Zhao, Y.; Tyagi, S.K.S.; Kumar, N. Blockchain Data-Based Cloud Data Integrity Protection Mechanism. Future
Gener. Comput. Syst. 2020, 102, 902–911. [CrossRef]
87. Jena, S.K.; Barik, R.C.; Priyadarshini, R. A Systematic State-of-Art Review on Digital Identity Challenges with Solutions Using
Conjugation of IOT and Blockchain in Healthcare. Internet Things 2024, 25, 101111. [CrossRef]
88. Song, Z.; Yan, E.; Song, J.; Jiang, R.; Yu, Y.; Chen, T. A Blockchain-Based Digital Identity System with Privacy, Controllability, and
Auditability. Arab. J. Sci. Eng. 2024. [CrossRef]
89. Xu, H.; Li, Y.; Balogun, O.; Wu, S.; Wang, Y.; Cai, Z. Security Risks Concerns of Generative AI in the IoT. IEEE Internet Things Mag.
2024, 7, 62–67. [CrossRef]
90. Wang, X.; Wan, Z.; Hekmati, A.; Zong, M.; Alam, S.; Zhang, M.; Krishnamachari, B. IoT in the Era of Generative AI: Vision and
Challenges. arXiv 2024, arXiv:2401.01923.
91. Wang, F.; Gai, Y.; Zhang, H. Blockchain User Digital Identity Big Data and Information Security Process Protection Based on
Network Trust. J. King Saud. Univ.—Comput. Inf. Sci. 2024, 36, 102031. [CrossRef]
92. Yang, Z.; Liu, Y.; Jin, X.; Luo, X.; Xu, Y.; Li, M.; Chen, P.; Tang, B.; Lin, B. BDIDA-IoT: A Blockchain-Based Decentralized Identity
Architecture Enhances the Efficiency of IoT Data Flow. Appl. Sci. 2024, 14, 1807. [CrossRef]
93. Maeng, J.; Heo, Y.; Joe, I. Hyperledger Fabric-Based Lightweight Group Management (H-LGM) for IoT Devices. IEEE Access 2022,
10, 56401–56409. [CrossRef]
94. Mohammed, M.A.; Wahab, H.B.A. Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homo-
morphic Encryption. Comput. Model. Eng. Sci. 2024, 138, 1731–1748. [CrossRef]
95. Fan, S.; Wang, J. Multi-Dimension-Precision Chaotic Encryption Mechanism for Internet of Things. Internet Things 2024, 26, 101202.
[CrossRef]
96. Jose Diaz Rivera, J.; Muhammad, A.; Song, W.-C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach
to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [CrossRef]
97. Bojič Burgos, J.; Pustišek, M. Decentralized IoT Data Authentication with Signature Aggregation. Sensors 2024, 24, 1037. [CrossRef]
[PubMed]
98. Saideh, M.; Jamont, J.-P.; Vercouter, L. Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things.
Sensors 2024, 24, 4621. [CrossRef] [PubMed]
99. Munshi, A.; Alshawi, B. Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. J. Sens. Actuator Netw.
2024, 13, 41. [CrossRef]
100. Tun, N.W.; Mambo, M. Secure PUF-Based Authentication Systems. Sensors 2024, 24, 5295. [CrossRef]
101. Zhang, B.; Zhang, T.; Xi, Z.; Chen, P.; Wei, J.; Liu, Y. Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless
Channel State Information for Identity-Based Encryption. Electronics 2024, 13, 984. [CrossRef]
102. Wang, J.; Li, J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated
Personalized Privacy-Preserving Federated Learning. Appl. Sci. 2024, 14, 1743. [CrossRef]
103. Fenner, J.; Galeas, P.; Escobar, F.; Neira, R. Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random
Numbers and Secure Multiparty Sums. Appl. Sci. 2024, 14, 5354. [CrossRef]
104. Höglund, J.; Bouget, S.; Furuhed, M.; Preuß Mattsson, J.; Selander, G.; Raza, S. AutoPKI: Public Key Infrastructure for IoT with
Automated Trust Transfer. Int. J. Inf. Secur. 2024, 23, 1859–1875. [CrossRef]
105. El-Hajj, M.; Beune, P. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems. Information 2024,
15, 304. [CrossRef]
106. Zhang, J.; Ouda, A.; Abu-Rukba, R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing
Enhanced by 5G Networks. Future Internet 2024, 16, 209. [CrossRef]
Computers 2025, 14, 61 44 of 45
107. Baird, I.; Ghaleb, B.; Wadhaj, I.; Russell, G.; Buchanan, W.J. Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and
Hash Chains. Electronics 2024, 13, 3467. [CrossRef]
108. Zerrouki, F.; Ouchani, S.; Bouarfa, H. PUF-Based Mutual Authentication and Session Key Establishment Protocol for IoT Devices.
J. Ambient. Intell. Humaniz. Comput. 2023, 14, 12575–12593. [CrossRef]
109. Nimmy, K.; Sankaran, S.; Achuthan, K. A Novel Lightweight PUF Based Authentication Protocol for IoT without Explicit CRPs in
Verifier Database. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 6227–6242. [CrossRef]
110. Ramachandraiah, K.R.D.; Bommagani, N.J.; Jayapal, P.K. Enhancing Healthcare Data Security in IoT Environments Using
Blockchain and DCGRU with Twofish Encryption. Inf. Dyn. Appl. 2023, 2, 173–185. [CrossRef]
111. Zhang, S.; Du, X.; Liu, X. A Novel and Quantum-Resistant Handover Authentication Protocol in IoT Environment. Wirel. Netw.
2023, 29, 2873–2890. [CrossRef]
112. Chen, Z.; Cheng, Z.; Luo, W.; Ao, J.; Liu, Y.; Sheng, K.; Chen, L. FSMFA: Efficient Firmware-Secure Multi-Factor Authentication
Protocol for IoT Devices. Internet Things 2023, 21, 100685. [CrossRef]
113. Román, R.; Arjona, R.; Baturone, I. A Quantum-Safe Authentication Scheme for IoT Devices Using Homomorphic Encryption
and Weak Physical Unclonable Functions with No Helper Data. Internet Things 2024, 28, 101389. [CrossRef]
114. Rehman, M.U.; Shafqiue, A. Robust Encryption Framework for IoT Devices Based on Bit-Plane Extraction, Chaotic Sine Models,
and Quantum Operations. Internet Things 2024, 27, 101241. [CrossRef]
115. Hou, J.; Peng, C.; Tan, W. A Lattice-Based Data Sharing Functional Encryption Scheme with HRA Security for IoT. Expert. Syst.
Appl. 2024, 254, 124355. [CrossRef]
116. Deng, W.; Li, J.; Yan, H.; Voundi Koe, A.S.; Huang, T.; Wang, J.; Peng, C. Self-Sovereign Identity Management in Ciphertext Policy
Attribute Based Encryption for IoT Protocols. J. Inf. Secur. Appl. 2024, 86, 103885. [CrossRef]
117. Gasmi, M.; Kerdoudi, M.L.; Bachir, A. Load-Balanced Attribute-Based Outsourced Encryption for Constrained IoT Devices.
Comput. Electr. Eng. 2024, 118, 109424. [CrossRef]
118. Velmurugan, P.; Senthil kumar, K.; Sridhar, S.S.; Gotham, E. An Advanced and Effective Encryption Methodology Used for
Modern IoT Security. Mater. Today Proc. 2023, 81, 389–394. [CrossRef]
119. Achkouty, F.; Gallon, L.; Chbeir, R. RDSC: Range-Based Device Spatial Clustering for IoT Networks. Sensors 2024, 24, 5851.
[CrossRef]
120. Ehmer, J.; Savaria, Y.; Granado, B.; David, J.-P.; Denoulet, J. Network Attack Classification with a Shallow Neural Network for
Internet and Internet of Things (IoT) Traffic. Electronics 2024, 13, 3318. [CrossRef]
121. Canavese, D.; Mannella, L.; Regano, L.; Basile, C. Security at the Edge for Resource-Limited IoT Devices. Sensors 2024, 24, 590.
[CrossRef]
122. Singh, C.; Kumar, M.; Upadhyay, M.; Chauhan, P.; Sharma, M. A 6G Network: Future of Nations? Challenges in 6G Communica-
tions. Tuijin Jishu/J. Propuls. Technol. 2023, 44, 73–76.
123. Maduranga, M.W.P.; Tilwari, V.; Rathnayake, R.M.M.R.; Sandamini, C. AI-Enabled 6G Internet of Things: Opportunities, Key
Technologies, Challenges, and Future Directions. Telecom 2024, 5, 804–822. [CrossRef]
124. Bakhshi, T.; Ghita, B.; Kuzminykh, I. A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors 2024, 24, 708.
[CrossRef]
125. Al Hanif, A.; Ilyas, M. Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments. Sensors 2024,
24, 1782. [CrossRef]
126. Long, Z.; Yan, H.; Shen, G.; Zhang, X.; He, H.; Cheng, L. A Transformer-Based Network Intrusion Detection Approach for Cloud
Security. J. Cloud Comput. 2024, 13, 5. [CrossRef]
127. Rajan, D.M.; Aravindhar, D.J. Detection and Mitigation of DDOS Attack in SDN Environment Using Hybrid CNN-LSTM. Migr.
Lett. 2023, 20, 407–419. [CrossRef]
128. Sarhan, M.; Layeghy, S.; Moustafa, N.; Gallagher, M.; Portmann, M. Feature Extraction for Machine Learning-Based Intrusion
Detection in IoT Networks. Digit. Commun. Netw. 2024, 10, 205–216. [CrossRef]
129. Hu, Z. Knowledge Graph Based Large Scale Network Security Threat Detection Techniques. Appl. Math. Nonlinear Sci. 2024, 9.
[CrossRef]
130. Oktian, Y.E.; Le, T.-T.-H.; Jo, U.; Laksmono, A.M.A.; Kim, H. Secure Decentralized Firmware Update Delivery Service for Internet
of Things. Internet Things 2024, 26, 101136. [CrossRef]
131. Nguyen, H.D.; Le Sommer, N.; Mahéo, Y. Over-the-Air Firmware Update in LoRaWAN Networks: A New Module-Based
Approach. Procedia Comput. Sci. 2024, 241, 154–161. [CrossRef]
132. Cheng, Y.; Yang, S.; Lang, Z.; Shi, Z.; Sun, L. VERI: A Large-Scale Open-Source Components Vulnerability Detection in IoT
Firmware. Comput. Secur. 2023, 126, 103068. [CrossRef]
133. Verderame, L.; Ruggia, A.; Merlo, A. PARIOT: Anti-Repackaging for IoT Firmware Integrity. J. Netw. Comput. Appl. 2023,
217, 103699. [CrossRef]
Computers 2025, 14, 61 45 of 45
134. Kaushik, K.; Bhardwaj, A.; Dahiya, S. Framework to Analyze and Exploit the Smart Home IoT Firmware. Meas. Sens. 2025,
37, 101406. [CrossRef]
135. Xu, J.; Zhaojun, X.; Wenli, Y.; Hu, W.; Cabani, A.; Xinrong, H. An Intelligent Mechanism for Dynamic Spectrum Sharing in 5G IoT
Networks. Expert Syst. Appl. 2024, 252, 124122. [CrossRef]
136. Alkhaldi, T.M.; Darem, A.A.; Alhashmi, A.A.; Al-Hadhrami, T.; Osman, A.E. Enhancing Smart City IoT Communication: A Two-
Layer NOMA-Based Network with Caching Mechanisms and Optimized Resource Allocation. Comput. Netw. 2024, 255, 110857.
[CrossRef]
137. Ortiz-Ruiz, E.; Bermejo, J.R.; Sicilia, J.A.; Bermejo, J. Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A
Comparative Perspective of Cybersecurity and Cyberdefense in Colombia. Electronics 2024, 13, 824. [CrossRef]
138. Valencia-Arias, A.; González-Ruiz, J.D.; Verde Flores, L.; Vega-Mori, L.; Rodríguez-Correa, P.; Sánchez Santos, G. Machine
Learning and Blockchain: A Bibliometric Study on Security and Privacy. Information 2024, 15, 65. [CrossRef]
139. El-Sofany, H.; El-Seoud, S.A.; Karam, O.H.; Bouallegue, B. Using Machine Learning Algorithms to Enhance IoT System Security.
Sci. Rep. 2024, 14, 12077. [CrossRef]
140. Priyadarshini, I. Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. Big Data
Cogn. Comput. 2024, 8, 21. [CrossRef]
141. Alrubayyi, H.; Alshareef, M.S.; Nadeem, Z.; Abdelmoniem, A.M.; Jaber, M. Security Threats and Promising Solutions Arising
from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. Future Internet 2024, 16, 85. [CrossRef]
142. Tekin, N.; Acar, A.; Aris, A.; Uluagac, A.S.; Gungor, V.C. Energy Consumption of On-Device Machine Learning Models for IoT
Intrusion Detection. Internet Things 2023, 21, 100670. [CrossRef]
143. Coppolino, L.; D’Antonio, S.; Mazzeo, G.; Uccello, F. The Good, the Bad, and the Algorithm: The Impact of Generative AI on
Cybersecurity. Neurocomputing 2025, 623, 129406. [CrossRef]
144. Xie, H.; Zheng, J.; He, T.; Wei, S.; Hu, C. TEBDS: A Trusted Execution Environment-and-Blockchain-Supported IoT Data Sharing
System. Future Gener. Comput. Syst. 2023, 140, 321–330. [CrossRef]
145. Kandasamy, K.; Srinivas, S.; Achuthan, K.; Rangan, V.P. IoT Cyber Risk: A Holistic Analysis of Cyber Risk Assessment
Frameworks, Risk Vectors, and Risk Ranking Process. EURASIP J. Inf. Secur. 2020, 2020, 8. [CrossRef]
146. Parsons, E.K.; Panaousis, E.; Loukas, G.; Sakellari, G. A Survey on Cyber Risk Management for the Internet of Things. Appl. Sci.
2023, 13, 9032. [CrossRef]
147. Affia, A.O.; Nolte, A.; Matulevičius, R. IoT Security Risk Management: A Framework and Teaching Approach. Inform. Educ. 2023,
22, 555–588. [CrossRef]
148. Popescu, T.; Popescu, A.; Prostean, G. IoT Security Risk Management Strategy Reference Model (IoTSRM2). Future Internet 2021,
13, 148. [CrossRef]
149. Shaffique, M.R. Cyber Resilience Act 2022: A Silver Bullet for Cybersecurity of IoT Devices or a Shot in the Dark? Comput. Law
Secur. Rev. 2024, 54, 106009. [CrossRef]
150. Czekster, R.M.; Webber, T.; Furstenau, L.B.; Marcon, C. Dynamic Risk Assessment Approach for Analysing Cyber Security Events
in Medical IoT Networks. Internet Things 2025, 29, 101437. [CrossRef]
151. Halgamuge, M.N.; Niyato, D. Adaptive Edge Security Framework for Dynamic IoT Security Policies in Diverse Environments.
Comput. Secur. 2025, 148, 104128. [CrossRef]
152. Beyrouti, M.; Lounis, A.; Lussier, B.; Bouabdallah, A.; Samhat, A.E. Vulnerability-Oriented Risk Identification Framework for IoT
Risk Assessment. Internet Things 2024, 27, 101333. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.