0% found this document useful (0 votes)
19 views7 pages

Recent Developments in IoT Security and Privacy: A Review of Best Practices With Challenges and Emerging Solutions

The document reviews recent developments in IoT security and privacy, highlighting significant challenges such as malware attacks, unauthorized access, and data leaks. It discusses emerging solutions like blockchain, AI-driven detection, and regulatory frameworks aimed at enhancing security while balancing privacy and usability. The paper emphasizes the need for innovative approaches to address the evolving threats in IoT ecosystems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views7 pages

Recent Developments in IoT Security and Privacy: A Review of Best Practices With Challenges and Emerging Solutions

The document reviews recent developments in IoT security and privacy, highlighting significant challenges such as malware attacks, unauthorized access, and data leaks. It discusses emerging solutions like blockchain, AI-driven detection, and regulatory frameworks aimed at enhancing security while balancing privacy and usability. The paper emphasizes the need for innovative approaches to address the evolving threats in IoT ecosystems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

Recent Developments in IoT Security and


Privacy: A Review of Best Practices with
Challenges and Emerging Solutions
Dr. Sunita Dixit1; Dr. Dinesh Yadav2
1
Professor; 2Associate Professor
1,2
Department of Computer Science & Engineering,
St. Andrews Institute of Technology & Management, Gurugram, Haryana, India

Publication Date: 2025/04/02

Abstract: The Internet of Things has changed many fields by making it easy for smart devices to talk to each other. On the
other hand, this change has led to major security and privacy problems, such as malware attacks, unauthorized access, data
leaks, and weak authentication systems. IoT gadgets are easy targets for hackers because they often don't have a lot of
processing power. Additionally, the massive data generated raises privacy concerns regarding unauthorized surveillance
and data misuse. Traditional security measures are insufficient for IoT ecosystems, necessitating innovative solutions.
Emerging approaches include blockchain for decentralized security, AI-driven anomaly detection, lightweight encryption
techniques, and zero-trust architectures. Regulatory frameworks and technologies that protect privacy, such as federated
learning and differential privacy, are also becoming more common. Even with these changes, it's still hard to find a good
balance between privacy, security, and usability. It talks about the newest threats to privacy and security in the IoT as well
as fresh methods to protect and strengthen the environment.

Keywords: Component, Formatting, Style, Styling, Insert.

How to Cite: Dr. Sunita Dixit; Dr. Dinesh Yadav. (2025). Recent Developments in IoT Security and Privacy: A Review of Best
Practices with Challenges and Emerging Solutions. International Journal of Innovative Science and Research
Technology, 10(3), 1888-1894. https://doi.org/10.38124/ijisrt/25mar1837.

I. INTRODUCTION The safety of IoT devices has been one of the most
talked-about themes among researchers. The IoT has a lot of
The 21st century is sometimes called the "age of good points, but its three biggest problems are sending data,
wireless communication and interconnectedness," and collecting data, and the safety of that data. A lot of tracking
computer networking technology has come a long way. The apps are made to get data from IoT devices. To send and
word "IoT" was his brilliant idea. Using the IoT, digital and receive data, protocols have been made and changed. This
real-world objects can connect and talk to each other. With lets Internet of Things (IoT) devices share info and connect
wheels and sensors, intelligent IoT devices can sense their to networks that are already set up. That being said, they
surroundings and work on their own. These devices can be don't follow these rules right. Because of this, the IoT is
very small and wearable or very big and industrial[1]. directly connected to a number of new and old security
issues, such as authentication, data protection, and
As more organizations use IoT, more IoT devices and permissions. Attacks such as guessing passwords, repeat,
apps will become available. Companies that manufacture Denning-Sacco, loss of service, and more can happen if you
gadgets that track and exchange data about an individual's don't log in. There are, however, a lot of networks that make
behaviors and health are the makers of wearable technology. it hard to check IoT devices. Blockchain could make the IoT
For instance, IoT software and devices are becoming better, and protocols that run on IoT devices should take into
available to healthcare professionals. A "smart house" IoT account how little power, memory, and computer power they
tool today includes a video doorbell, lights that talks to you, have. Concerns about IoT safety and security were talked
a smart coffee maker, and a smart door lock. Now that there about. This is done by finding common threats and ways to
are a lot of "smart city" apps and IoT devices available, you attack IoT devices, as well as showing weak spots that could
can do things like smart parking, smart street lighting, and allow a security breach. Along with fixes for devices that had
smart trash management. been hacked, this document also had a number of security
changes and ways to lower risks. New technologies like
blockchain and software-defined networks (SDN) make IoT

IJISRT25MAR1837 www.ijisrt.com 1888


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

networks safer. The best things about these two security Data must be sent from Element 1 to Element 3 through
systems are that they can be expanded and changed easily. Network Element 2 by each block in Figure 2. Thus, Figure
Another part of the study looked at the problems and needs 2 displays a broad view of how the IoT is built. These blocks
for safety in various IoT apps. Classic and modern security are connected by lines that go up and down. Part 3 is also
choices are the two main types. known as "the cloud," and it cleans, stores, and processes the
data so that Part 4 the end user or service hiring party can get
Security for the IoT has been studied before. The main the results.
topic of this study's investigation into security and IoT
research is how data security is used and what worries there A. Devices
are when it comes to network security [2]. Through the One type of device is an IoT endpoint. This device
following objectives, this evaluation seeks to address the records information while keeping an eye on a particular
pressing challenges shown in Figure 1. and research goal. Sensors are used to gather data on the important
questions (RQs): components, such as position and other multimedia-relevant
information, in order to do this [3].
This is the division of the remaining tasks. explains
briefly about the context and goal of the study. has B. Network
committed to: "Nowadays, the internet has become available
everywhere and has spread notably faster than any other
technology," the author notes. "The network is the solution
to the need of transporting knowledge over huge areas with
little effort."

C. Security
One of the most important things about technology is
that it is safe. The data that is gathered is private and
important, so it is necessary for the progress of all
Fig 1: The Studys Objectives technologies. The safety of this system is the same as that
of any financial transaction.
II. OVERVIEW OF IoT
D. Cloud
This internet of things (IoT) can be used in various One more advantage of this technology is the cloud.
methods to fulfil various purposes. Services involved in The task involves storing, managing, and maintaining the
device modelling, device control, data publishing, data security of the data blocks that are received from the devices.
analysis, and device detection" are some of the different
things that the IoT can do. Other technologies in the same E. IoT Security and Privacy Challenges
field become less important as IoT grows because it could IoT has helped users a lot, but it has also caused some
make it easy to learn and get around. We need to look at problems. The researchers and security experts who were
some of the ways that the IoT keeps changing the brain if we named are mostly worried about privacy and hacking risks
want this technology to last [2]. What each writer about IoT [4][5]. Because of these two things, both public and private
says is different. It's defined as "an interconnection of groups are having a hard time. An increasing number of
machines and devices through the internet [3], allowing the well-known cyberattacks have shown where IoT systems are
creation of data that can shed light on analytic performance weak.The interconnected networks of the IoT make it
and support new technologies." As stated, "the IoT is a possible to reach the public and unreliable Internet, which
collection of interconnected static and/or mobile objects, makes this vulnerability possible. New security measures are
such as devices with communication, sensor, and actuator needed to protect against this.
modules connected through the internet." Basically, the
"IoT" is a group of real things that can talk to each other on F. Security
their own. IoT is not the same as regular computers and other
electronics, so it is more likely to have security problems in
several ways.

 A lot of IoT gadgets are being made to be used by a lot


of people. This is very clear when you look at sensors.
 IoT setups usually include a group of appliances that are
the same or very similar and have similar features.

The man-in-the-middle attack is one of the most


common ways to hack into and damage the IoT. This
happens when a third party takes over a communication
route to look like one of the real network nodes involved in
Fig 2: Simple Diagram of the Operation of IoT the exchange. The attacker doesn't even need to know the

IJISRT25MAR1837 www.ijisrt.com 1889


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

name of the supposed target in a man-in-the-middle attack to  Occasional update: Every three months, IoT makers
convince the bank server that the transaction is real[6]. usually put out security updates.
 Occasional update: Security updates are usually
G. Privacy released by IoT manufacturers every three months.
The usefulness of the IoT will be judged by how well it  Embedded passwords: IoT devices store passwords in-
fits people's personal tastes. People might not want to use the built, which lets support staff install updates or fix
IoT because they are worried about bad things happening problems with the operating system from afar.
and their safety. Being able to connect to the Internet from
anywhere is also important for understanding this problem III. EMERGING SOLUTIONS FOR IOT
[7][8]. Because there won't be a special way to do it, it will SECURITY AND PRIVACY
be easier to get personal information from anywhere in the
world. A. IoMT Privacy and Security Solutions
Recently, many privacy and security tools have been
H. Interoperability made to stop people from misusing IoMT [9]. Moreover,
It is well known that a fragmented world with cyber threats are increasingly aimed at IoT devices and apps
proprietary IoT technology implementation makes things [10], including IoMT, which emphasizes the need to put in
less useful for users. place a number of important steps to deal with these
problems [11].

Fig 3: Security Areas in IoMT

Figure 3 shows a rough sketch of the IoMT's security Hackers can get into IoMT devices because companies
areas. Figure 3 shows that IoMT has a number of security put out new products quickly and don't update software often
issues, such as when it comes to protecting malware or enough to stay competitive [12]. During an upgrade, the
tracking patients. user's IoMT gadget and the cloud might not be able to talk to
each other. Hackers can get into IoMT devices that aren't
IoMT is still very new, and there are security risks encrypted if they can talk to them without encryption. It is
because of low standards, systems that aren't well managed, important for businesses to quickly limit access and ports in
and users who don't know what they're doing. Hackers and case the cloud link goes down. To keep security up to date,
enemies can quickly take over IoMT devices that aren't IoMT devices must also be updated [13].
properly protected by using malware to hold the devices
hostage and demand a fee. Wearable tech, smart houses, B. Major Security Issues in iot
and apps are all hurt by the way IoMT devices are managed. Modern Internet started with the Internet for
More research needs to be done in this area before IoMT Computers (IoT), which let machines talk to each other
devices can be made safer against this type of attack. (M2M). Cheaper prices and more gadget support are needed
for the IoT to be widely used [14]. This goal of increasing
IoT use needs to be met first by fixing a few technology and
security issues.

IJISRT25MAR1837 www.ijisrt.com 1890


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

C. Identification
It is important to figure out which device is which the
original or a bad node. There needs to be a manufacturer's
reference.

D. Authentication
One of the main problems with the IoT is that there are
so many gadgets that want to connect. It's hard to
authenticate every single gadget. Because they are fast and
use little energy, private key encryption primitives have been
used in a lot of security solutions.

E. Data Management
One of the hardest things to do is to find and fix all the
billions of gadgets. Figure 4 shows that by 2020, there will
be more than 50 billion smart devices that can connect to the
internet.

Fig 5: SIoT Architecture

I. Military Applications
These days, military actions are carried out in a
situation that is complicated, multifaceted, very different,
and sometimes difficult, with allies and enemies that aren't
expected. More and more, military officers don't have time
to get a clear picture of the situation before they have to
decide on a strategy.

Fig 4: By 2020, 50 Billion Things will be Connected to the Useful Apps for Business If you use the IoT in
Internet business, you may hear the term "industrial internet of
things" (IIoT). Companies can make their equipment work
F. Heterogeneity better and speed up their processes by collecting, managing,
In terms of security and privacy, the device itself is by and analyzing sensor data through the IIoT. Many things can
far the most hazardous kind. For the IoT to improve and be used with it, like production control, smart meters,
become more dependable, issues must be appropriately machine-to-machine contact, and motion control.
resolved. monitoring hundreds of distinct device kinds, each
with unique security requirements and concerns. J. Environmental Applications
Environment monitoring can use IoT for things like
G. IoT Applications managing waste and water, tracking animals, keeping an eye
IoT can provide a lot of different services, but only a on and predicting the weather, protecting the environment
few of them are commonly used. A lot of programs make and endangered species, gardening for profit, and more.
people's lives better. IoT uses can be broken down into the Objects in these applications can find and measure all kinds
main groups shown in Figure 5 These include retail, of changes in the surroundings.
consumer, environmental, auto, medical, military, and
industrial. IoT is used in health care, services and IV. LITERATURE REVIEW
transportation, personal and social life, and the smart
environment [13] (smart office, smart home). Hassan and Awad (2018).looks at the pros and cons of
deploying IoT in homes, towns, and regions from the point
H. Medical Applications: of view of security and privacy. Because of the IoT, life will
The medical IoT market is growing quickly. It has continue to change, especially in cities. Putting the IoT
many uses, such as remote tracking systems, smart sensors, paradigm into action will be hard in cities, though, where
and integrating medical items. IoT in healthcare can also links are often not safe. As long as people are seen as
help patients get better appointments and be happier by "things" in the IoT paradigm, IoT gadgets could invade their
letting them talk to their doctors for longer amounts of time. privacy and take away some of their humanity. Because of
worries about IoT, privacy groups for IoT and national and

IJISRT25MAR1837 www.ijisrt.com 1891


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

foreign privacy laws need to protect people's right to privacy Sadkhan and Salam (2021) provide examples to look at
and meet the privacy needs of cities' institutions [15]. privacy and security threats from the point of view of the
IoT's layers. Additionally, a more complete example of one
Singh and Kumar (2020).The point of this paper is to type of IOT smart home IOT system will be used to talk
look closely at some privacy and security issues that come about the methods used to solve these problems and their
up with the IoT. The main security and privacy problems are flaws. When we get past these limitations, we'll talk about
explained, along with possible solutions that have been taken some of the unsolved security issues and some of the security
from past research projects. These problems are shown by problems that come up with the Codomain. Using a strategy,
pointing out the biggest problems in the research field and we have also suggested more work that should be done [18].
some of the current answers, along with what they could
mean for the future [16]. Alwarafy et al (2021) talks in great depth about the
privacy and safety problems that come up with IoT that uses
Zainuddin et al (2021) will look at what has already EC. To be more specific, we will first talk about EC-assisted
been written about privacy risks in the IoT, privacy issues in IoT in general terms, such as what it is, how it works, and
different IoT applications, and give a general outline of the the pros and cons of it. After that, we talk about what privacy
study. A huge amount of data comes from many places, like and security mean for IoT with EC. Then, we talk about the
governments, manufacturing companies, smart cities, and main risks of EC-assisted IoT in more depth, offer possible
healthcare centres, and is processed by different IoT solutions and defenses, and name important research
applications. Customers of these smart products are mostly projects. Here are some of the security and privacy issues
worried about two things security and privacy. This is we've talked about so far, broken down into even more
because IoT is used by so many people and opens up so many groups based on their jobs, goals, and the security services
possibilities[17]. they offer. On the last page, there is a list of open questions
and possible study paths for the secure EC-assisted IoT
paradigm [19].

Table 1: Summarizes Key Objectives, Methods, Findings, Advantages, and Future Research Directions Related to Security and
Privacy Issues in IoT Deployment Across Various Domains
Ref Objective Method Key Finding Advantages Limitations &
Future Work
[15] Look into the privacy Review of privacy IoT devices can Legal frameworks Challenges in
and safety problems laws and IoT invade privacy and help protect privacy enforcing privacy
that come up when privacy groups raise security rights laws across different
IoT is used in cities concerns, requiring regions
legal protection
[16] Find the biggest Analysis of past Concerns about IoT Solutions from Some issues remain
problem areas with research projects security and privacy previous research unresolved, requiring
IoT security and are valid, but there are provide insights into further research
privacy and suggest several ways to handle privacy protection
ways to fix them them.
[17] Analyze privacy risks Literature review Security and privacy IoT enables smart Privacy risks
in different IoT on privacy risks are primary concerns cities and healthcare increase as data is
applications and IoT due to widespread IoT advancements collected from
applications usage multiple sources
[18] Investigate security Scenario-based IoT layers have Layered analysis Some security
and privacy attacks analysis vulnerabilities; smart provides a structured challenges remain
across IoT layers with home IoT faces major approach to unresolved, requiring
a focus on smart security risks addressing security future frameworks
homes threats
[19] EC-assisted IoT An in-depth look at Edge computing (EC) EC offers benefits Security threats need
makes things safer and IoT with EC help, improves IoT like reduced latency further classification
more private. security risks, and efficiency but and better resource and additional
possible solutions introduces security utilization defensive measures
risks

V. FUTURE DIRECTIONS AND OPEN their surroundings to the people who use them. For local
RESEARCH AREAS IN IOT services like gathering data [20], the IoT idea depends on
things being able to talk to each other. Connecting devices to
The Internet of Things (IoT) has helped businesses and servers, such as cloud servers, edge servers, or data hubs, is
smart places, but things have changed recently. The Internet needed for high-level services like network tracking and data
of Things (IoT) lets separate devices, like computers, tablets, management. The lifecycle of data now includes AI and ML
and smartphones, talk to each other. They send data about methods at all stages, from when IoT devices create or collect

IJISRT25MAR1837 www.ijisrt.com 1892


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

data to when end users use it. These changes are needed to Future research should focus on making IoT systems
meet the new service standards and high-quality service more energy efficient, making communication methods that
needs of current IoT applications. A new type of IoT work reliably, and keeping IoT systems safe and private.
networking called Intelligent IoT (IIoT) combines smart Additionally, progress in bitcoin, AI, and 5G and 6G
solutions with machine learning and artificial intelligence. technology could lead to smart city solutions that are stronger
This paradigm has changed how IoT apps work in areas like and more adaptable. IoT can continue to change how people
smart industry, smart transportation, and smart healthcare. live in cities by addressing these problems. This will make
IIoT specifically offers many ways to improve devices (for cities safer, smarter, and more environmentally friendly for
example, using AI models on nearby IoT devices to make future generations. Also look into what the pros and cons of
them better) and provide services (for example, AI-assisted the IoT are. Although there are many benefits, risks can be
data management and smart data transmission). AI is used in used to put end users in danger by letting attackers into
IoT networks to improve the user experience and make systems, letting unwanted people see private information, and
network processes more cost-effective. Patients can now use putting people's safety at risk[9]. have to make sure that IoT-
smart features like automatic disease detection in IoT systems enabled goods ships have the right security features that affect
aimed at healthcare and traffic forecasting in smart IoT how they work, how easy they are to use, and how well they
networks for vehicles. AI can also be used in IoT systems to work with other systems. Also want to build a dynamic
help businesses in many ways. These include precise cost security system with the help of researchers that will cut
reductions by getting rid of human error, predictive down on, if not get rid of, security and privacy threats.
maintenance to cut costs and keep businesses running, better Additionally, believe that this system will be intelligent
customer service to make customers happier, more scalability enough to adjust to new forms of communication and various
to handle large IoT ecosystems, and higher operational app deployment methods.
efficiency through smart automation and pattern recognition.
Commercial AI uses in IoT are now popular in a number of There are a lot of people who use the IoT, so businesses
fields. In industry, for example, robots with sensors and should put system security first. A lot of people would be
artificial intelligence make the work more efficient. AI is affected by a hack or system failure caused by any
used by self-driving cars to plan their moves and make the weakness.Hackers can't get into IoT gadgets that are
roads better. AI-powered analytics and smart devices like physically connected if they have smart IoT security. The
security cams and smart shopping carts make the retail things that IoT security teams often think about are inventory,
industry better at serving customers and running its business. operations, variety, management, data flow, attacks, and
Artificial intelligence (AI) is used in healthcare wearable tech other things. This research is mostly about data security
to track and report health data, which encourages early situations, uses, and problems that have to do with network
treatment. Industry and services that are smart. In particular, security. It also looks at security and IoT research. Using the
IIoT opens up a lot of opportunities for service delivery, such terms that were given earlier, 564 matches were found. 34
as AI-assisted data management and clever data transmission, pieces were thrown out because they were too similar. As a
as well as device improvement, such as putting AI models on result, 530 stories were taken out of the total. Each of these
local IoT devices to make them smarter. AI is used in IoT parts is looked at and put in order based on the rules that say
networks to improve the user experience and make network what should be included and what shouldn't. The analysis
processes more cost-effective. Patients can now use smart looked at 25 studies that were released between 2012 and
features like automatic disease detection in IoT systems 2022 and met the criteria. Research shows that the IoT
aimed at healthcare and traffic forecasting in smart IoT business has been responding for years by putting out IoT
networks for vehicles. AI can also be used in IoT systems to security technologies that keep devices and systems safe from
help businesses in many ways. Among these are lower threats and unauthorized access. Scientists and experts from
precision costs because people won't make mistakes, cheaper many countries and fields are now interested in IoT network
and more reliable maintenance to keep businesses running, security.
better customer service to make customers happier, the ability
to handle large IoT ecosystems, and higher operational The IoT often gives app makers the tools they need to
efficiency through smart automation and pattern recognition. collect, manage, and protect devices and data. People's lives
are better and more comfortable when IoT devices talk to
VI. CONCLUSION AND FUTURE WORK each other and work together. IoT makes it possible to watch
things in real-time, automate inventory, and keep track of
Internet of Things (IoT) makes "smart cities" possible. information and conditions. Because so much data moves
Big issues like pollution, lack of resources, and crowds are between devices on the network, there needs to be a security
being worked on by these cities. Very detailed study of the system to protect data integrity, privacy, authorization, and
Internet of Things (IoT) technologies, uses, and building identification. A lot of research has been done on how to
blocks that allow smart towns to exist. When it comes to improve proof by using different methods on different
smart trash management, IoT lets us gather, look at, and make devices, even wireless ones.
decisions in real time. Other areas are smart energy
management. By making public services better, lowering
their negative effects on the environment, and making the
best use of resources, these examples show how IoT-driven
solutions can greatly raise the standard of living in cities.

IJISRT25MAR1837 www.ijisrt.com 1893


Volume 10, Issue 3, March – 2025 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/25mar1837

REFERENCES [15]. A. M. Hassan and A. I. Awad, “Urban Transition in


the Era of the Internet of Things: Social Implications
[1]. V. Pillai, “System And Method For Intelligent and Privacy Challenges,” IEEE Access, vol. 6, pp.
Detection And Notification Of Anomalies In Financial 36428–36440, 2018, doi:
And Insurance Data Using Machine Learning,” 10.1109/ACCESS.2018.2838339.
202421099024 A, 2025. [16]. S. Singh and D. Kumar, “Perceptions of Security and
[2]. H. Taherdoost, “Security and Internet of Things: Privacy in Internet of Things,” in 2020 International
Benefits, Challenges, and Future Perspectives,” Conference on Inventive Computation Technologies
Electronics, vol. 12, no. 8, 2023, doi: (ICICT), 2020, pp. 810–813. doi:
10.3390/electronics12081901. 10.1109/ICICT48043.2020.9112462.
[3]. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. [17]. N. Zainuddin, M. Daud, S. Ahmad, M. Maslizan, and
Aledhari, and M. Ayyash, “Internet of Things: A S. A. L. Abdullah, “A Study on Privacy Issues in
Survey on Enabling Technologies, Protocols, and Internet of Things (IoT),” in 2021 IEEE 5th
Applications,” IEEE Commun. Surv. Tutorials, 2015, International Conference on Cryptography, Security
doi: 10.1109/COMST.2015.2444095. and Privacy (CSP), 2021, pp. 96–100. doi:
[4]. Z. Ali et al., “A Generic Internet of Things (IoT) 10.1109/CSP51677.2021.9357592.
Middleware for Smart City Applications,” [18]. S. B. Sadkhan and Z. Salam, “Security and Privacy in
Sustainability, vol. 15, no. 1, 2023, doi: Internet of Things- Status, Challenges,” in 2021 4th
10.3390/su15010743. International Iraqi Conference on Engineering
[5]. M. Aldwairi and L. Tawalbeh, “Security techniques Technology and Their Applications (IICETA), 2021,
for intelligent spam sensing and anomaly detection in pp. 308–312. doi:
online social platforms,” Int. J. Electr. Comput. Eng., 10.1109/IICETA51758.2021.9717785.
vol. 10, no. 1, p. 275, 2020. [19]. A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J.
[6]. V. Pillai, “Anomaly Detection Device for Financial Schneider, and M. Hamdi, “A Survey on Security and
and Insurance Data,” 6414579, 2025. Privacy Issues in Edge-Computing-Assisted Internet
[7]. Srinivas Murri, “Data Security Environments of Things,” IEEE Internet Things J., vol. 8, no. 6, pp.
Challenges and Solutions in Big Data,” vol. 12, no. 6, 4004–4022, 2021, doi: 10.1109/JIOT.2020.3015432.
pp. 565–574, 2022. [20]. O. Aouedi et al., “A Survey on Intelligent Internet of
[8]. Y. Meng, W. Zhang, H. Zhu, and X. S. Shen, Things: Applications, Security, Privacy, and Future
“Securing consumer IoT in the smart home: Directions,” IEEE Commun. Surv. Tutorials, p. 1,
Architecture, challenges, and countermeasures,” IEEE 2024, doi: 10.1109/COMST.2024.3430368.
Wirel. Commun., vol. 25, no. 6, pp. 53–59, 2018.
[9]. F. Kamalov, B. Pourghebleh, M. Gheisari, Y. Liu, and
S. Moussa, “Internet of Medical Things Privacy and
Security: Challenges, Solutions, and Future Trends
from a New Perspective,” Sustainability, vol. 15, no.
4, 2023, doi: 10.3390/su15043317.
[10]. L. Aversano, M. L. Bernardi, M. Cimitile, and R.
Pecori, “A systematic review on Deep Learning
approaches for IoT security,” Comput. Sci. Rev., vol.
40, p. 100389, 2021.
[11]. M. Gheisari et al., “A survey on clustering algorithms
in wireless sensor networks: challenges, research, and
trends,” in 2020 International Computer Symposium
(ICS), 2020, pp. 294–299.
[12]. K. A. Raza, A. Asheralieva, M. M. Karim, K. Sharif,
M. Gheisari, and S. Khan, “A novel forwarding and
caching scheme for information-centric software-
defined networks,” in 2021 International Symposium
on Networks, Computers and Communications
(ISNCC), 2021, pp. 1–8.
[13]. R. Ahmad and I. Alsmadi, “Machine learning
approaches to IoT security: A systematic literature
review,” Internet of Things, vol. 14, p. 100365, 2021.
[14]. A. K. Manjulata, “Survey on lightweight primitives
and protocols for RFID in wireless sensor networks,”
Int. J. Commun. Networks Inf. Secur., vol. 6, no. 1, pp.
29–43, 2014, doi: 10.17762/ijcnis.v6i1.572.

IJISRT25MAR1837 www.ijisrt.com 1894

You might also like