Electronics 12 03958
Electronics 12 03958
Review
Cybersecurity Risk Analysis in the IoT: A Systematic Review
Thanaa Saad AlSalem 1 , Mohammed Amin Almaiah 2,3 and Abdalwali Lutfi 4,5, *
1 Department of Information Systems, King Faisal University, Al-Ahsa 31982, Saudi Arabia
2 Department of Computer Science, Aqaba University of Technology, Aqaba 11947, Jordan;
[email protected]
3 King Abdullah the II IT School, The University of Jordan, Amman 11942, Jordan
4 School of Business, King Faisal University, Al-Ahsa 31982, Saudi Arabia
5 Applied Science Research Center, Applied Science Private University, Amman 11931, Jordan
* Correspondence: [email protected]
Abstract: The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This study
conducts a comprehensive systematic literature review to examine the various challenges and attacks
threatening IoT cybersecurity, as well as the proposed frameworks and solutions. Furthermore, it
explores emerging trends and identifies existing gaps in this domain. The study’s novelty lies in its
extensive exploration of machine learning techniques for detecting and countering IoT threats. It also
contributes by highlighting research gaps in economic impact assessment and industrial IoT security.
The systematic review analyzes 40 articles, providing valuable insights and guiding future research
directions. Results show that privacy issues and cybercrimes are the primary concerns in IoT security,
and artificial intelligence holds promise for future cybersecurity. However, some attacks remain
inadequately addressed by existing solutions, such as confidentiality, security authentication, and data
server connection attacks, necessitating further research and real-life testing of proposed remedies.
1. Introduction
Citation: AlSalem, T.S.; Almaiah,
The Internet of Things (IoT) has permeated numerous sensitive disciplines, including
M.A.; Lutfi, A. Cybersecurity Risk
the health sector and the economic sector. However, the IoT is emerging at home, in large
Analysis in the IoT: A Systematic
cities, and in other, different domains of life, which are not of less importance. In addition,
Review. Electronics 2023, 12, 3958.
https://doi.org/10.3390/
the IoT provides connections to intelligent objects, applications, and cloud computing;
electronics12183958
50 billion IoT devices were connected to the internet in 2020 [1]. This huge source of data,
as well as the future trend of artificial intelligence, which the world has come to rely on,
Academic Editor: Seokjoo Shin has put pressure on vendors and designers of IoT devices to secure this technology in order
Received: 16 July 2023 to enable it to meet upcoming demands. However, trusting a device starts with ensuring
Revised: 8 September 2023 its security, which has become a necessity, especially when these devices are connected
Accepted: 16 September 2023 to the internet, exposing them to many threats and cyberattacks [2]. The security threats
Published: 20 September 2023 include cybercrimes, software piracy, and malware attacks [1], as well as various damaging
attacks. However, this continuous field of improvement cannot adopt existing approaches
to provide security. New risks keep on arising, which requires updates to new frameworks
and solutions in parallel with updating IoT disciplines [3]. Furthermore, an updated review
Copyright: © 2023 by the authors. of the applied techniques and approaches is recommended regularly. For this reason,
Licensee MDPI, Basel, Switzerland. the proposed study reviews recent progress in the literature regarding cybersecurity risk
This article is an open access article analysis for the IoT. It also identifies various cybersecurity frameworks and approaches
distributed under the terms and
proposed for IoT cybersecurity risk analysis by identifying the various types of attacks and
conditions of the Creative Commons
challenges facing IoT devices. In addition, it highlights the most important techniques that
Attribution (CC BY) license (https://
have been used in detecting IoT risks, identifying the new trends in IoT cybersecurity, and
creativecommons.org/licenses/by/
identifying the gap found in the literature to recommend possible solutions.
4.0/).
The key novelty of this study lies in its focused exploration of machine learning tech-
niques in the context of IoT security. We delve into specific algorithms and methodologies,
shedding light on their practical implementation and efficacy. Additionally, we identify crit-
ical research gaps in the assessment of economic impacts resulting from IoT cybersecurity
incidents, and the need for tailored security solutions in the industrial IoT domain.
A. Motivation
As the world is witnessing a turning point towards a new era of virtual reality, there
will be no limits to the IoT in the future. The IoT is a rapidly growing sector and is
considered a revolution in technology and artificial intelligence, wherein the usage of IoT
devices is increasing exponentially [4]. Concerns about the privacy and cybersecurity
challenges of the IoT are the most prioritized issues for risk management professionals.
The IoT will change the world soon, but security concerns will still be arising. However, if
security issues and challenges, for example, privacy and authentication, in addition to other
challenges like confidentiality, are treated properly, then everything will change with the
IoT [5]. Huge amounts of daily data produced from dealing with the IoT are transmitted
with high susceptibility to risks and threat attacks, which require a profound strategy of
risk management for the IoT with a focus on cybersecurity issues.
The motivation behind this research stems from the urgency of addressing the es-
calating cybersecurity concerns surrounding IoT systems. With cyberattacks becoming
more pervasive and evolving in complexity, it is imperative to thoroughly examine the
various types of threats affecting IoT devices and systems. By delving into the existing
literature and gaining insights from previous studies, we aim to provide a comprehensive
understanding of the landscape of IoT cybersecurity, including the types of attacks and
challenges that have emerged.
This investigation seeks to serve as a reference point for researchers, policymakers,
and industry practitioners in their efforts to bolster IoT security. By analyzing the proposed
frameworks, approaches, and detection techniques put forth in the literature, we aspire to
identify potential avenues for enhancing the protection of IoT ecosystems. Moreover, the
review will shed light on any existing gaps in the research, offering directions for future
investigations and innovations in the field of IoT cybersecurity.
Our primary objective is to consolidate and present a well-structured literature review
that not only highlights the prevalent attacks and challenges but also provides valuable
insights into the proposed solutions and their effectiveness. With a specific focus on
identifying the most vulnerable aspects of IoT security, we aim to offer a comprehensive
analysis that contributes to the growing body of knowledge concerning IoT cybersecurity.
By emphasizing the significance of IoT security and the criticality of mitigating poten-
tial threats, this study endeavors to raise awareness of the importance of robust cybersecu-
rity measures for IoT devices and systems. Ultimately, we aspire to foster a more secure
and resilient IoT environment that can continue to evolve and thrive in the face of emerging
cyber risks.
B. Problem Statement
The IoT is extremely exposed to risks and threats due to its highly connective nature,
the ongoing development in this discipline, and the rising global demand for it in the future.
New risks and vulnerability issues are presented [2], which require updated reviews
of the existing risk assessment and analysis frameworks and approaches. In addition,
the nature of the IoT, such as the way in which it is connected to many systems and
dealing with huge amounts of data, has increased the likelihood of exposure to attackers.
What is more, concerns regarding the cybersecurity of the IoT are not limited to vendors.
However, consumers require trustworthy technology [6]. There is an insistent demand
for the ultimate solutions for securing this growing technology [7]. On the other hand,
the variety of recommended and proposed approaches and solutions offered by the recent
studies regarding the cybersecurity of the IoT has raised the following questions. What are
Electronics 2023, 12, 3958 3 of 19
the most important techniques that have been used in detecting IoT risks? What are the
new trends in IoT cybersecurity? What are the attacks that the IoT is vulnerable to?
C. Scope
The scope of the current study focuses on the frameworks and approaches that have
been proposed recently by professionals and scholars for the risk assessment and analysis
processes for the cybersecurity of the IoT. To collect the data for the literature review, the
study focused on the usage of the following keywords: IoT, cybersecurity, cybersecurity
frameworks, and cybersecurity approaches.
D. Expected Outcomes
Cybersecurity in the IoT has caught the attention of many scholars; numerous articles
have been published, especially in the last five years. Several solutions and frameworks
were proposed by previous studies, tackling the most threatening cyberattacks. In addition,
an updated review of the cybersecurity of the IoT is essential, as this field is rapidly evolving
and spreading. The proposed paper makes a significant contribution to summarizing the
state-of-the-art studies and identifying the progress of research in this field. The aim of this
research is achieved by meeting the following objectives:
• Identify various cybersecurity frameworks and approaches proposed for IoT cyberse-
curity risk analysis.
• Identify the various types of attacks and challenges facing IoT devices.
• Highlight the most important techniques that have been used in IoT risk detection.
• Identify the new trends in IoT cybersecurity.
• Identify the gap found in the literature review and recommend expected solutions.
2. Methodology
This section presents the research methodology that is followed in this study; it
represents a sequence of steps, starting with the eligibility criteria of the research article
selection, and then addressing the information sources, search strategy, and selection
process. Moreover, data analysis and synthesis are discussed in this section.
The review process followed the steps of systematic literature review as outlined
in the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses)
guidelines [8].
Electronics 2023, 12, 3958 filtered according to the year of publication, which was mainly between 2015 and 42023, of 19
focusing on the studies between 2018 and 2023. Another filtering process was undertaken
according to the area of research, so that research that offered no contribution towards
tackling the current
tackling the current research
research questions
questionswaswasdiscarded.
discarded.The
Theselected
selectedstudies were
studies alsoalso
were fil-
tered according to their discussion and depth of analysis, as well as according
filtered according to their discussion and depth of analysis, as well as according to theirto their
developmentin
development inthe
theresearch
researcharea.
area.Finally,
Finally,the
the authors
authors chose
chose 4040 articles
articles that
that hadhad a system-
a systematic
atic review process as shown in
review process as shown in Figure 1. Figure 1.
Figure 1.
Figure 1. Search
Search strategy
strategy framework.
framework.
2.4.
2.4. Data
Data Analysis and Synthesis
Each
Each study
studyofofthe
the4040
selected was
selected classified
was according
classified to itstotype:
according empirical
its type: study,study,
empirical prac-
tical study, survey study, review paper, and so on. Moreover, the objectives
practical study, survey study, review paper, and so on. Moreover, the objectives and prob- and problems
discussed were highlighted,
lems discussed and major
were highlighted, resultsresults
and major and recommendations
and recommendations were extracted. Then,
were extracted.
the
Then,author used a used
the author table atotable
represent the threats
to represent the and challenges,
threats the impact
and challenges, the of these of
impact attacks,
these
proposed frameworks and approaches, and the salient detection techniques.
attacks, proposed frameworks and approaches, and the salient detection techniques.
2.5. Findings
2.5. Findings
The findings included a summary of the knowledge gained from all the reviewed
The findings included a summary of the knowledge gained from all the reviewed
studies. Different types of attacks and challenges were also discussed. In addition, the au-
studies. Different types of attacks and challenges were also discussed. In addition, the au-
thors figured out a research gap that had not been included in the previous studies. Finally,
thors figured out a research gap that had not been included in the previous studies. Fi-
the new trends in IoT cybersecurity were extracted from the literature and summarized in
nally, the new trends in IoT cybersecurity were extracted from the literature and summa-
the findings.
rized in the findings.
3. Literature Review
This section presents previous studies that addressed the topic of IoT cybersecurity,
providing a critical analysis of the most noteworthy studies done by scholars and focusing
on those published in the last decade.
Electronics 2023, 12, 3958 5 of 19
Study [19] discussed the importance of using machine learning in the process of
securing the IoT. The study’s main aim was to identify the advantages of machine learning
technology in solving cybersecurity issues. The study was a review paper, and the authors’
methodology was to review the related literature in order to fulfill the research objective.
The findings of the research paper showed that Random Forest and K-Nearest Neighbor
(KNN) algorithms provided the most precise attack detection in the proposed solutions.
Moreover, Software Defined Networks (SDN) and the fog layer of networks resulted in
many efficient solutions.
the new risk metrics, together with a novel regulatory framework and standardization of
IoT databases.
and experiments. Approaches being used were (1) the Cyber Value at Risk (CyVaR) and
(2) the MicroMort (MM). The study’s main aim was to give insights regarding economic
impact evaluation using mathematical calculations. Furthermore, the study’s major results
showed that economic impact can be evaluated by the following:
• Novel risk standards.
• Specific novel assessment method for the novel risk standards.
• Novel regulatory framework and standardization of IoT databases.
• Novel risk vectors as defined in the form of International IoT Asset Classification and
Key IoT Cyber Risk Factors.
Study [32] discussed the integration of sensors and actuators as a form of controlling
cyber-physical systems. The article was a case study, aiming to concentrate on an ontology-
based advancement of IoT cybersecurity and to introduce a framework based on knowledge
reasoning for the cybersecurity of the IoT. The methodology used was the application of the
Model-Driven Service Engineering Architecture. The main contribution of the paper was
the IoTSec ontology, and key results showed that the evaluation revealed great structural
uniformity, in addition to the dynamic order of the classes.
Study [33] discussed the issues related to the security of smart homes based on
IoT devices. The main aim was to discuss the different security issues that affect the
cybersecurity of smart homes, as well as to introduce a solution for these risky potential
attacks. This study is a practical one, in which the authors used the methodology of the
OCTAVE Allegro, which is based on information assets. The study results showed that
there exist 15 different attacks that threaten smart homes and need a solution.
Study [34] discussed the relationships between humans and their devices as necessary
elements of cybersecurity profiles. The main aim of the study was to attain cybersecurity
profiles via human factors. The main results of this practical study were:
• Defining the concept of human factors for cybersecurity;
• Proposing a methodology that can be used for different purposes.
Study [35] focuses on cybersecurity issues in the digital economy and introduces two
frameworks, one updated from existing risk evaluation and one novel. It adopts a practical
approach and employs a theoretical analysis through a literature review. One significant
result is the paper’s contribution to the domain of the ‘digital economy’, which was not
extensively covered in the literature. However, the study’s limitations include its reliance
on previous studies with case studies and specific approaches.
Study [36] addresses awareness regarding IoT device cybersecurity among organiza-
tions and aims to guide them in improving their cybersecurity practices. It is an introductory
study and part of a series of related studies. Notably, the study is accessible to individuals
without IoT expertise, requiring only basic knowledge of privacy and cybersecurity. Major
findings indicate the need for significant transformations in cybersecurity practices within
organizations, emphasizing the importance of risk management for device utilization
purposes, irrespective of device type.
Study [37] discussed the rising importance of cybersecurity among IoT systems man-
ufacturers. The paper aimed to mitigate the risks of cybersecurity among entities and
end-users based on the protection of IoT assets and privacy considerations. This review
paper tried to find a solution for cybersecurity by reviewing the technologies and frame-
works of IoT cybersecurity. Then, the authors proposed a framework based on four layers.
This study covered a gap regarding the risk management of IoT cybersecurity by providing
resource allocation methods to managers.
Study [38] discussed the issue of cybercriminals affecting the IoT infrastructure in ad-
dition to the importance of highlighting this issue internationally. For this reason, the study
aimed to critically analyze the cybersecurity challenges related to IoT infrastructure by review-
ing the related, reliable previous studies. The main contribution of this study was improving
cybersecurity solutions. The key results of the research article showed that cybersecurity is an
essential concern for the evolution of ecosystems and their appropriate operation.
Electronics 2023, 12, 3958 10 of 19
Study [39] discussed the idea of enhancing the security of IoT devices before offering
them for handling and usage, which can limit and mitigate cyberattacks. The study aimed
to propose a model using the technique of hardening processes. It is a practical study
that surfs the literature and then proposes a solution. It followed a qualitative analysis
methodology. The study’s main contribution was filling the gap in studies related to
hardening and security authentication.
Study [40] aimed to identify advancement areas of the IoT and the related threats to
their origin. The paper was a review article, wherein data were collected from the previous
related studies. Its key results are listed as follows:
• Public administration is the top sector attacked.
• The education sector had most data violation.
• The industrial sector is the sector which will mostly develop based on IoT systems.
Study [41] aimed to introduce a novel assessment tool for ther risks of attacking IoT
systems. The article was a comparative empirical study that relied on grounded theory as
the methodology. The framework proposed was drawn from the shortages of the previous
related studies. However, as per the authors, the study contributed to evaluating the
influence of the IoT cyber risk. Its major results showed that the framework provides a
comprehensive advanced knowledge of impact assessment.
Study [42] discussed how the emerging new IoT world is exposing data to violation
and loss of confidentiality. The paper aimed to interpret the challenges of securing IoT
devices and presented a debate about the technologies used for the purpose of IoT cyber-
security. This paper is a review article, in which the authors depended on collecting data
from previous studies. The results of the current article showed that a creditable security
technique is required for the purpose of developing IoT services.
study focused on optimizing multiple access techniques for IoT devices in a satellite-UAV
communication system to enhance overall performance and accommodate explosive access
demands [45–51]. Whereas 6G networks offer customized end-to-end network services
and support emerging cloud-edge applications, 5G networks do not. As the resource
allocation problem in 6G is of utmost importance and requires more research attention, a
study introduced an efficient resource allocation algorithm called TailoredSlice-6G. This
algorithm is designed to enable tailored slices in 6G networks. When a slice request is
received, the TailoredSlice-6G algorithm first identifies the slice resource type. Based on
this information, it selects the most suitable sub-algorithm for resource allocation and
slicing deployment. Each type of slice is associated with a specific resource allocation
sub-algorithm incorporated into TailoredSlice-6G. A crucial aspect of the proposed algo-
rithm is that each sub-algorithm is designed to operate within polynomial time, ensuring
efficient and timely resource allocation for different slice types. In summary, the study
focuses on addressing resource allocation challenges in 6G networks by introducing the
TailoredSlice-6G algorithm, which allows for tailored end-to-end network services and
supports diverse cloud-edge applications [52–57].
This literature review section provides a comprehensive summary of the most impor-
tant previous studies related to the cybersecurity of the IoT. This summary encompasses the
study’s aims, identified problems, study types, major results, and limitations. Additionally,
this section thoroughly examines the proposed frameworks and approaches, as well as the
various cyberattacks discussed, which were used to populate the table below.
Furthermore, cybercrimes were a main concern and a significant field of study that
caught the attention of many scholars [3,12,17,34,38,42]. Attacks included impact on the
global economy, organizations’ assets, profiling of human data, and confidential data.
Electronics 2023, 12, 3958 13 of 19
Proposed methods included blockchain technology, runtime near real-time risk assessment
support, and human factor concept method to obtain cybersecurity profiles.
On the other hand, an important issue addressed by previous studies was privacy con-
cerns and attacks [6,11,13,15,16,18,19,21,23,24,26,32,36,37]. The privacy concerns included
eavesdropping, identity faking, exploitation, fabrication, theft, data integrity and falsifica-
tion, and access to sensitive information. Proposed solutions included a mitigation strategy
using an alloy analyzer, Improved Cuckoo Search, exploitation of the virtual environment,
hardware, software solutions, knowledge reasoning for the IoT, software-defined networks,
risk estimation techniques, privacy-preserving data techniques, a 5G IoT environment, and
computational intelligence cyber defenses.
5.2. Most Important Techniques That Have Been Used in IoT Risk Detection
Regarding detection techniques, the current study summarized a few techniques that
have been found in the literature as shown in Figure 4, such as artificial intelligence [1,4],
cognitive security technique [20], novel meta-heuristic technique [26], cloud computing [24],
and machine learning [19].
Electronics 2023, 12, x FOR PEER REVIEW IoT, addressing scalability issues and ensuring interoperability with existing 14 of
IoT20
architectures.
• Dynamic adaptive cybersecurity frameworks: as the IoT ecosystem evolves, static
cybersecurity
5. Results measures may become inadequate to defend against constantly evolving
and Discussion
threats. Dynamic adaptive cybersecurity frameworks, as proposed by some studies [9],
This section aims to present and discuss the findings from the literature review, the
offer the ability to continuously assess and adjust security measures based on real-time
attacks and challenges, the frameworks and approaches proposed, and the detection tech-
threat intelligence. Future research should focus on developing intelligent and context-
niques according to each study (Table 1). This section also presents the gap found in the
aware cybersecurity frameworks that can adapt to the changing IoT environment
systematic review and the future trends in IoT cybersecurity.
while minimizing the impact on system performance.
• Privacy-preserving techniques: with increasing concerns over data privacy in IoT, sev-
5.1. Most Frequent Attacks That IoT Is Vulnerable to
eral studies [6,11,37] emphasized the need for privacy-preserving techniques. These
Different attacks
techniques aim toon and challenges
protect to IoTdata
sensitive user cybersecurity
while still that were meaningful
enabling identified bydata
the
previous studies
analysis were
for IoT discussed in
applications. Tableresearch
Future 1. The table
should represents the various
explore novel approaches
cryptographic pro-
and frameworks proposed, in addition
tocols, privacy-enhancing to theand
technologies, attacks or vulnerability
privacy-aware data detection techniques.
sharing mechanisms
Moreover, their percentages are shown in Figure
to strike a balance between data privacy and utility. 2. Results showed that the most-tackled
•issues and concerns
Secure firmwarewith IoT cybersecurity
and hardware were
design: the the privacy
security of IoTissues
devices [11,15,27,36,37]
heavily dependsin ad-
on
dition
thetointegrity
the concerns related
of their to cybercrimes
firmware and hardware [12,17,38].
components Details
[39].related
Studiestoemphasized
the top twotheis-
suesimportance
concerning of theimplementing
cybersecuritysecure
of IoTdevelopment
are explainedpractices
in Figure and3. Another
utilizing notable
hardwareissue
se-
discussed
curity in the literature
modules was denial-of-access
to safeguard against physicalattacks
attacks [5,15,21,24,39]. Data exploitation
and firmware tampering. Future
was research
also one should
of the critical
address challenges detected
the challenges concerning
of secure firmwareIoT security
updates,[6,11,13,19,26,40],
hardware-based
followed by a Man-in-the-Middle
attestation, attack as detected by [24].
and supply chain security.
Figure 2.
Figure 2. Percentages
Percentages of
of reviewed
reviewed attacks.
attacks.
Electronics 2023, 12, 3958 15 of 19
Despite the identified trends, it is essential to acknowledge that the field of IoT cyber-
security is continually evolving, and new trends may emerge over time. Additionally, the
limited number of studies addressing specific trends indicates the need for further research
to explore and validate the effectiveness of proposed solutions in real-world IoT scenarios.
Therefore, the identified trends in IoT cybersecurity hold significant potential in
addressing the challenges posed by the expanding IoT landscape. Research efforts should
continue to focus on these trends, exploring innovative approaches, and collaborating
across disciplines to create a robust and resilient IoT security ecosystem.
Figure 3.
Figure 3. Top
Top two
two cybersecurity
cybersecurity concerns.
concerns.
5.2. Most Important Techniques That Have Been Used in IoT Risk Detection
Regarding detection techniques, the current study summarized a few techniques that
have been found in the literature as shown in Figure 4, such as artificial intelligence [1,4],
cognitive security technique [20], novel meta-heuristic technique [26], cloud computing
[24], and machine learning [19].
Electronics 2023,12,
Electronics 2023, 12,3958
x FOR PEER REVIEW 16 of
16 of 19
20
Figure 4.
Figure 4. Cybersecurity
Cybersecurity detection
detection techniques.
techniques.
6. Conclusions
5.3. New Trends in IoT Cybersecurity
In
Theconclusion, this systematic
literature review review emerging
revealed several has shed light
trendsonandthefuture
diverse and evolving
directions in IoT
landscape of IoT cybersecurity. The analysis of the reviewed literature
cybersecurity. While the available literature provided valuable insights, it is important revealed that
to
IoT devices and systems face a wide range of cyber threats, with
note that the number of studies explicitly focusing on specific trends was limited. None- privacy issues and
cybercrimes standing out
theless, the identified as the
trends are most significant
indicative of theconcerns.
potential While this finding
advancements aligns with
in securing IoT
common knowledge, it underscores
systems. We discuss the prominent trends below: the critical need for continuous efforts in addressing
these challenges.
• Integration of artificial intelligence (AI): artificial intelligence has emerged as a prom-
Furthermore, the literature review highlighted the potential of artificial intelligence
ising technique in addressing the challenges of IoT cybersecurity. Several studies
as a promising technique for enhancing IoT cybersecurity. As the IoT ecosystem grows
[19,38,40] and
in complexity highlighted the role ofsecurity
scale, traditional AI, particularly
measures machine learning
alone may not algorithms, in de-
suffice to protect
tecting and mitigating cybersecurity threats in IoT environments. AI-based
against sophisticated attacks. The integration of artificial intelligence and machine learning solutions
offersoffer the ability
the potential fortomore
analyze vast amounts
adaptive, proactive, ofand
dataeffective
from IoT devices,
security identifytopatterns,
solutions counter
and proactively
evolving threats. respond to potential attacks. Future research in this area should focus
on refining
However, AI algorithms,
while the review exploring ensembleinsights
provided valuable learning approaches,
into the existingand implement-
research, there
ingimportant
are still real-timeareas
adaptivewhere cybersecurity systems.
further exploration is needed. For instance, some attacks and
• Blockchainwere
vulnerabilities technology for enhanced security:
not comprehensively covered blockchain technology
by the proposed has gained
solutions, sig-
indicating
nificant attention for its potential
the need for more tailored and targeted approaches. to enhance the security and privacy of IoT devices
and data [12].
Therefore, futureByresearch
providing shoulddecentralized and tamper-resistant
focus on interdisciplinary data storage
collaborations, and
real-world
communication, blockchain can reduce the risk of data manipulation
validation of proposed solutions, and exploration of emerging technologies beyond artifi- and unauthor-
ized access. Research efforts should concentrate on optimizing blockchain solutions
cial intelligence.
for IoT,
The fieldaddressing scalability is
of IoT cybersecurity issues and ensuring
dynamic and ever interoperability
evolving, requiringwithconstant
existing vig-
IoT
ilancearchitectures.
and innovation to protect against cyber threats effectively. This review provides
Electronics 2023, 12, 3958 17 of 19
a foundation for future researchers to build upon and underscores the importance of
collective efforts to secure the IoT for the benefit of society at large.
Author Contributions: Conceptualization, T.S.A.; methodology, T.S.A., A.L. and M.A.A.; vali-
dation, T.S.A., A.L. and M.A.A.; formal analysis, T.S.A.; investigation, T.S.A.; resources, T.S.A.;
writing—original draft preparation, T.S.A.; writing—review and editing, T.S.A., A.L. and M.A.A.;
visualization, T.S.A.; supervision, M.A.A. and A.L.; project administration, M.A.A. and A.L. All
authors have read and agreed to the published version of the manuscript.
Funding: This work was supported through the Annual Funding track by the Deanship of Scientific
Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Saudi
Arabia (Project No. Grant No. 4241).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: This work was supported through the Annual Funding track by the Deanship
of Scientific Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal
University, Saudi Arabia (Project No. Grant No. 4241).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Ullah, F.; Naeem, H.; Jabbar, S.; Khalid, S.; Latif, M.A.; Al-Turjman, F.; Mostarda, L. Cyber Security Threats Detection in Internet
of Things Using Deep Learning Approach. IEEE Access 2019, 7, 124379–124389. [CrossRef]
2. Zahra, B.F.; Abdelhamid, B. Risk Analysis in Internet of Things Using EBIOS. In Proceedings of the 2017 IEEE 7th Annual
Computing and Communication Workshop and Conference (CCWC), Vegas, NV, USA, 9–11 January 2017; pp. 1–7.
3. Nurse, J.R.C.; Creese, S.; De Roure, D. Security Risk Assessment in Internet of Things Systems. IT Prof. 2017, 19, 20–26. [CrossRef]
4. Kuzlu, M.; Fair, C.; Guler, O. Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things
2021, 1, 7. [CrossRef]
5. Mahmoud, R.; Yousuf, T.; Aloul, F.; Zualkernan, I. Internet of Things (IoT) Security: Current Status, Challenges and Prospective
Measures. In Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST),
London, UK, 14–16 December 2015; pp. 336–341.
6. Tweneboah-Koduah, S.; Skouby, K.E.; Tadayoni, R. Cyber Security Threats to IoT Applications and Service Domains. Wirel. Pers.
Commun. 2017, 95, 169–185. [CrossRef]
7. Gonzalez, L.; Ruggia, R. Policy-Based Compliance Control Within Inter-Organizational Service Integration Platforms. In
Proceedings of the 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA), Paris, France, 20–22
November 2018; pp. 202–209.
8. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA
statement. Int. J. Surg. 2010, 8, 336–341. [CrossRef]
9. Boudko, S.; Abie, H. Adaptive Cybersecurity Framework for Healthcare Internet of Things. In Proceedings of the 2019 13th
International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway, 8–10 May 2019;
pp. 1–6.
10. Radanliev, P.; De Roure, D.; Maple, C.; Nurse, J.R.; Nicolescu, R.; Ani, U. Cyber Risk in IoT Systems. Univ. Oxford Comb. Work.
Pap. Proj. Rep. Prep. PETRAS Natl. Cent. Excell. Cisco Res. Cent. 2019, 169701, 1–27. [CrossRef]
11. Zhao, S.; Li, S.; Qi, L.; Da Xu, L. Computational Intelligence Enabled Cybersecurity for the Internet of Things. IEEE Trans. Emerg.
Top. Comput. Intell. 2020, 4, 666–674. [CrossRef]
12. Abdullah, A.; Hamad, R.; Abdulrahman, M.; Moala, H.; Elkhediri, S. CyberSecurity: A Review of Internet of Things (IoT) Security
Issues, Challenges and Techniques. In Proceedings of the 2019 2nd International Conference on Computer Applications &
Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–6.
13. Rizvi, S.; Kurtz, A.; Pfeffer, J.; Rizvi, M. Securing the Internet of Things (IoT): A Security Taxonomy for IoT. In Proceedings of the
2018 17th IEEE International Conference on Trust, Security and Privacy, New York, NY, USA, 31 July–3 August 2018; pp. 163–168.
14. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020,
10, 4102. [CrossRef]
15. Abomhara, M.; Køien, G.M. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. J. Cyber
Secur. Mobil. 2015, 4, 65–88. [CrossRef]
16. Islam, M.R.; Aktheruzzaman, K.M. An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions. J.
Comput. Commun. 2020, 8, 11–25. [CrossRef]
Electronics 2023, 12, 3958 18 of 19
17. Gurunath, R.; Agarwal, M.; Nandi, A.; Samanta, D. An Overview: Security Issue in IoT Network. In Proceedings of the 2018 2nd
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 30–31 August 2018;
pp. 104–107.
18. Atlam, H.F.; Wills, G.B. An efficient security risk estimation technique for Risk-based access control model for IoT. Internet Things
2019, 6, 100052. [CrossRef]
19. Strecker, S.; Van Haaften, W.; Dave, R. An Analysis of IoT Cyber Security Driven by Machine Learning. In Proceedings of the
International Conference on Communication and Computational Technologies: ICCCT 2021; Springer: Singapore, 2021; pp. 725–753.
20. Andrade, R.O.; Yoo, S.G.; Tello-Oquendo, L.; Ortiz-Garces, I. A Comprehensive Study of the IoT Cybersecurity in Smart Cities.
IEEE Access 2020, 8, 228922–228941. [CrossRef]
21. Furfaro, A.; Argento, L.; Parise, A.; Piccolo, A. Using virtual environments for the assessment of cybersecurity issues in IoT
scenarios. Simul. Model. Pract. Theory 2017, 73, 43–54. [CrossRef]
22. Strielkina, A.; Illiashenko, O.; Zhydenko, M.; Uzun, D. Cybersecurity of Healthcare IoT-Based Systems: Regulation and Case-
Oriented Assessment. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and
Technologies (DESSERT), Ukraine, Kyiv, 24–27 May 2018; pp. 67–73.
23. Kulik, T.; Tran-Jorgensen, P.W.V.; Boudjadar, J.; Schultz, C. A Framework for Threat-Driven Cyber Security Verification of IoT
Systems. In Proceedings of the 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops
(ICSTW), Västerås, Sweden, 9–13 April 2018; pp. 89–97.
24. Liao, B.; Ali, Y.; Nazir, S.; He, L.; Khan, H.U. Security Analysis of IoT Devices by Using Mobile Computing: A Systematic
Literature Review. IEEE Access 2020, 8, 120331–120350. [CrossRef]
25. Radanliev, P.; De Roure, C.; Cannady, S.; Montalvo, R.M.; Nicolescu, R.; Huth, M. Economic impact of IoT cyber risk-analysing
past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Living in the Internet of Things:
Cybersecurity of the IoT; Institution of Engineering and Technology: London, UK, 2018. [CrossRef]
26. Li, S.; Bi, F.; Chen, W.; Miao, X.; Liu, J.; Tang, C. An Improved Information Security Risk Assessments Method for Cyber-Physical-
Social Computing and Networking. IEEE Access 2018, 6, 10311–10319. [CrossRef]
27. Ryoo, J.; Tjoa, S.; Ryoo, H. An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). In Proceedings of the 2018
International Conference on Software Security and Assurance (ICSSA), Seoul, Republic of Korea, 26–27 July 2018; pp. 49–52.
28. Augusto-Gonzalez, J.; Collen, A.; Evangelatos, S.; Anagnostopoulos, M.; Spathoulas, G.; Giannoutakis, K.M.; Votis, K.; Tzovaras,
D.; Genge, B.; Gelenbe, E.; et al. From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes.
In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links
and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6.
29. Radanliev, P.; De Roure, D.; Nurse, J.R.C.; Nicolescu, R.; Huth, M.; Cannady, S.; Montalvo, R.M. Integration of Cyber Security
Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In Living in the
Internet of Things: Cybersecurity of the IoT; Institution of Engineering and Technology: London, UK, 2018.
30. Wurm, J.; Hoang, K.; Arias, O.; Sadeghi, A.-R.; Jin, Y. Security Analysis on Consumer and Industrial IoT Devices. In Proceedings of
the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016; pp. 519–524.
31. Radanliev, P.; De Roure, D.C.; Nicolescu, R.; Huth, M.; Montalvo, R.M.; Cannady, S.; Burnap, P. Future developments in cyber risk
assessment for the internet of things. Comput. Ind. 2018, 102, 14–22. [CrossRef]
32. Mozzaquatro, B.A.; Agostinho, C.; Goncalves, D.; Martins, J.; Jardim-Goncalves, R. An Ontology-Based Cybersecurity Framework
for the Internet of Things. Sensors 2018, 18, 3053. [CrossRef]
33. Ali, B.; Awad, A.I. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors 2018, 18, 817.
[CrossRef] [PubMed]
34. Nieto, A.; Rios, R. Cybersecurity profiles based on human-centric IoT devices. Hum.-Centric Comput. Inf. Sci. 2019, 9, 39.
[CrossRef]
35. Radanliev, P.; De Roure, D.C.; Nurse, J.R.C.; Mantilla Montalvo, R.; Cannady, S.; Santos, O.; Maddox, L.T.; Burnap, P.; Maple, C.
Cyber Risk Impact Assessment-Assessing the Risk from the IoT to the Digital Economy. SN Appl. Sci. 2020, 2, 1–12. [CrossRef]
36. Boeckl, K.; Fagan, M.; Fisher, W.; Lefkovitz, N.; Megas, K.N.; Nadeau, E.; O’Rourke, D.G.; Piccarreta, B.; Scarfone, K. Considerations
for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks; US Department of Commerce, National Institute of Standards
and Technology: Gaithersburg, MD, USA, 2019.
37. Lee, I. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet 2020, 12, 157.
[CrossRef]
38. Djenna, A.; Harous, S.; Saidouni, D.E. Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical
Cyber Infrastructure. Appl. Sci. 2021, 11, 4580. [CrossRef]
39. Echeverría, A.; Cevallos, C.; Ortiz-Garces, I.; Andrade, R.O. Cybersecurity Model Based on Hardening for Secure Internet of
Things Implementation. Appl. Sci. 2021, 11, 3260. [CrossRef]
40. Scarfò, A. The Cyber Security Challenges in the IoT Era. In Security and Resilience in Intelligent Data-Centric Systems and
Communication Networks; Elsevier: Amsterdam, The Netherlands, 2018; pp. 53–76.
41. Almomani, O.; Almaiah, M.A.; Alsaaidah, A.; Smadi, S.; Mohammad, A.H.; Althunibat, A. Machine learning classifiers for
network intrusion detection system: Comparative study. In Proceedings of the 2021 International Conference on Information
Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 440–445.
Electronics 2023, 12, 3958 19 of 19
42. Wahab, A.; Ahmad, O.; Muhammad, M.; Ali, M. A Comprehensive Analysis on the Security Threats and their Countermeasures
of IoT. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 489–501. [CrossRef]
43. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial
Integrated Networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [CrossRef]
44. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based Secure Energy Efficient Beamforming in
Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2022, 59, 2085–2088. [CrossRef]
45. Lin, Z.; Lin, M.; de Cola, T.; Wang, J.-B.; Zhu, W.-P.; Cheng, J. Supporting IoT With Rate-Splitting Multiple Access in Satellite and
Aerial-Integrated Networks. IEEE Internet Things J. 2021, 8, 11123–11134. [CrossRef]
46. Almaiah, M.A.; Ali, A.; Hajjej, F.; Pasha, M.F.; Alohali, M.A. A Lightweight Hybrid Deep Learning Privacy Preserving Model for
FC-Based Industrial Internet of Medical Things. Sensors 2022, 22, 2112. [CrossRef]
47. Al Nafea, R.; Almaiah, M.A. Cyber security threats in cloud: Literature review. In Proceedings of the 2021 International Conference
on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 779–786.
48. Bubukayr, M.A.; Almaiah, M.A. Cybersecurity concerns in smart-phones and applications: A survey. In Proceedings of the 2021
international conference on information technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 725–731.
49. Alamer, M.; Almaiah, M.A. Cybersecurity in Smart City: A systematic mapping study. In Proceedings of the 2021 International
Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 719–724.
50. Lutfi, A.; Alrawad, M.; Alsyouf, A.; Almaiah, M.A.; Al-Khasawneh, A.; Al-Khasawneh, A.L.; Alshira’H, A.F.; Alshirah, M.H.;
Saad, M.; Ibrahim, N. Drivers and impact of big data analytic adoption in the retail industry: A quantitative investigation
applying structural equation modeling. J. Retail. Consum. Serv. 2023, 70, 103129. [CrossRef]
51. Ali, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An industrial IoT-based blockchain-
enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 2022, 22, 572. [CrossRef]
52. Cao, H.; Du, J.; Zhao, H.; Luo, D.X.; Kumar, N.; Yang, L.; Yu, F.R. Toward Tailored Resource Allocation of Slices in 6G Networks
With Softwarization and Virtualization. IEEE Internet Things J. 2022, 9, 6623–6637. [CrossRef]
53. Alrawad, M.; Lutfi, A.; Alyatama, S.; Al Khattab, A.; Alsoboa, S.S.; Almaiah, M.A.; Ramadan, M.H.; Arafa, H.M.; Ahmed, N.A.;
Alsyouf, A.; et al. Assessing customers perception of online shopping risks: A structural equation modeling–based multigroup
analysis. J. Retail. Consum. Serv. 2023, 71, 103188. [CrossRef]
54. Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. A Novel Hybrid Trustworthy Decentralized Authentication and
Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 2022, 22, 1448. [CrossRef] [PubMed]
55. Siam, A.I.; Almaiah, M.A.; Al-Zahrani, A.; Elazm, A.A.; El Banby, G.M.; El-Shafai, W.; El-Samie, F.E.A.; El-Bahnasawy, N.A.
Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications.
Comput. Intell. Neurosci. 2021, 2021, 8016525. [CrossRef] [PubMed]
56. Almaiah, M.A.; Al-Zahrani, A.; Almomani, O.; Alhwaitat, A.K. Classification of cyber security threats on mobile devices and
applications. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer International Publishing: Cham,
Switzerland, 2021; pp. 107–123.
57. Almaiah, M.A. A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology. In
Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer International Publishing: Cham, Switzerland,
2021; pp. 217–234.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.