Research Article | Open Access | Download Full Text
Volume 3 | Issue 3 | Year 2025 | Article Id: CYS-V3I3P102 DOI: https://doi.org/10.59232/CYS-V3I3P102
Cybersecurity in the Internet of Things (IoT) - Review
Taban Habibu, Ayo P. Julius
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 08 Jun 2025 | 07 Jul 2025 | 03 Aug 2025 | 15 Aug 2025 |
Citation
Taban Habibu, Ayo P. Julius. “Cybersecurity in the Internet of Things (IoT) - Review.” DS Journal of Cyber Security, vol. 3, no. 3, pp. 15-38, 2025.
Abstract
Keywords
Internet of Things (IoT), Cybersecurity, IoT Security Framework, Device Vulnerability, Data Privacy, Network Security, Intrusion Detection, Encryption Protocol, Theoretical Research, Security Challenge.
References
[1] What is the Internet of Things (IoT)? , IBM, 2025. [Online]. Available: https://www.ibm.com/think/topics/internet-of-things.
[2] Dimitris Gkoulis, “Creating Interpretable Synthetic Time Series for Enhancing the Design and Implementation of Internet of Things (IoT) Solutions,” Internet of Things, vol. 30, pp. 1-32, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[3] What is IoT? - Internet of Things Explained - AWS, 2025. [Online]. Available: https://aws.amazon.com/what-is/iot/
[4] The Applications of IoT in Business, Tulane University, 2025. [Online]. Available: https://online.sse.tulane.edu/articles/internet-of-things/
[5] Mrutyunjay Padhiary, Pankaj Roy, and Dipak Roy, “The Future of Urban Connectivity: AI and IoT in Smart Cities,” pp. 33-66, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] “Internet of Things (IoT) - Key Business Insights Gartner, 2025. [Online]. Available: https://www.gartner.com/en/information-technology/insights/internet-of-things.
[7] Hossein Omrany et al., “IoT-Enabled Smart Cities: A Hybrid Systematic Analysis of Key Research Areas, Challenges, and Recommendations for Future Direction,” Discover Cities, vol. 1, no. 1, pp. 1-34, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Ebenezer Esenogho, Karim Djouani, and Anish M. Kurien, “Integrating Artificial Intelligence Internet of Things and 5G for Next-Generation Smartgrid: A Survey of Trends Challenges and Prospect,” IEEE Access, vol. 10, pp. 4794-4831, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Qurra tul Aain, Irshad Ahmed Sumra, and Mariam Khan, “Security Challenges and Attacks in IoT: A Survey,” Journal of Computing and Biomedical Informatics, vol. 8 no. 1, pp. 1-10, 2024.
[Google Scholar] [Publisher Link]
[10] Youakim Badr, Xiaoyang Zhu, and Mansour Naser Alraja, “Security and privacy in the Internet of Things: Threats and Challenges,” Service Oriented Computing and Applications, vol. 15, no. 4, pp. 257-271, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Sri Ramya Siraparapu, and S.M.A.K. Azad, “Securing the IoT Landscape: A Comprehensive Review of Secure Systems in the Digital Era,” e-Prime - Advances in Electrical Engineering, Electronics and Energy, vol. 10, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Petar Radanliev et al., “AI Security and Cyber Risk in IoT Systems,” Frontiers in Big Data, vol. 7, pp. 1-26, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Yimin Guo et al., “Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 4615-4627, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Koohang et al., “Internet of Things (IoT): Users’ Concerns about Privacy and Security,” Issues in Information Systems, vol. 24, no. 2, pp. 191-202, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Wen Fei, Hiroyuki Ohno, and Srinivas Sampalli, “A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions,” ACM Computing Surveys, vol. 56, no. 5, pp. 1-40, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Amir Djenna, Saad Harous, and Djamel Eddine Saidouni, “Internet of Things Meet the Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure,” Applied Sciences, vol. 11, no. 10, pp. 1-30, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Katerina Megas et al., “NIST Cybersecurity for IoT Program,” Computer, vol. 57, no. 12, pp. 144-148, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Calvin Lee, and Gouher Ahmed, “Improving IoT Privacy, Data Protection and Security Concerns,” International Journal of Technology Innovation and Management (IJTIM), vol. 1, no. 1, pp. 18-33, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ashwin Karale, “The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws,” Internet of Things, vol. 15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Katerina Svandova, and Zdenek Smutny, “Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review,” Journal of Multidisciplinary Healthcare, vol. 17, pp. 2281-2301, 2024.
[Google Scholar] [Publisher Link]
[21] P. Muralidhara Rao, and B.D. Deebak, “Security and Privacy Issues in Smart Cities/Industries: Technologies, Applications, and Challenges,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 8, pp. 10517-10553, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Arif Ali Mughal, “Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges”, Applied Research in Artificial Intelligence and Cloud Computing, vol. 2, no. 1, pp. 1-31, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Tianqi Bu et al., “Task Scheduling in the Internet of Things: Challenges, Solutions, and Future Trends,” Cluster Computing, vol. 27, no. 1, pp. 1017-1046, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Konstantinos Tsiknas et al., “Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures,” IoT, vol. 2, no. 1, pp. 163-186, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] S. Harihara Gopalan et al., “Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks,” International Journal of Networked and Distributed Computing, vol. 12, no. 2, pp. 237-249, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] M. Sidharth Sharma, AI-Driven Anomaly Detection for Advanced Threat Detection, 2023. [Online]. Available: https://philpapers.org/rec/SIDAAD
[27] Isil Cetintav, and Mehmet Tahir Sandikkaya, “A Review of Lightweight IoT Authentication Protocols from the Perspective of Security Requirements, Computation, Communication, and Hardware Costs,” IEEE Access, vol. 13, pp. 37703-37723, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Mamoona Humayun et al., “Corrections to “Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey”,” IEEE Access, vol. 12, pp. 162421, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Brandon Langenberg, Hai Pham, and Rainer Steinwandt “Reducing the Cost of Implementing the Advanced Encryption Standard as a Quantum Circuit,” IEEE Transactions on Quantum Engineering, vol. 1, pp. 1-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Michal Kaššaj, and Tomáš Peráček, “Synergies and Potential of Industry 4.0 and Automated Vehicles in Smart City Infrastructure,” Applied Sciences, vol. 14, no. 9, pp. 1-30, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Keshav Kaushik, Susheela Dahiya, and Rewa Sharma, “Internet of Things Advancements in Healthcare,” Internet of Things: Energy, Industry, and Healthcare, 1st ed., CRC Press, pp. 19-32, 2021.
[Google Scholar] [Publisher Link]
[32] Hao Kong et al., “A Survey of mmWave Radar-Based Sensing in Autonomous Vehicles, Smart Homes and Industry,” IEEE Communications Surveys and Tutorials, vol. 27, no. 1, pp. 463-508, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Mohsen Soori, Behrooz Arezoo, and Roza Dastres, “Internet of Things for Smart Factories in Industry 4.0, A Review,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 192-204, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Shams Forruque Ahmed et al., “Erratum: Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities,” IEEE Access, vol. 12, pp. 13125-13145, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Astha Srivastava et al., “Future IoT-Enabled Threats and Vulnerabilities: State of the Art, Challenges, and Future Prospects,” International Journal of Communication Systems, vol. 33, no. 12, pp. 1-41, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Qasem Abu Al-Haija, and Ayat Droos, “A Comprehensive Survey on Deep Learning-Based Intrusion Detection Systems in Internet of Things (IoT),” Expert Systems, vol. 42, no. 2, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Abdinasir Hirsi et al., “Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks,” IEEE Access, vol. 13, pp. 23013 - 23071, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Jing Qiu et al., “A Survey on Access Control in the Age of the Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4682-4696, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Chen Wang, Travis Atkison, and Hana Park, “Dynamic Adaptive Vehicle Re-Routing Strategy for Traffic Congestion Mitigation of Grid Network,” International Journal of Transportation Science and Technology, vol. 14, pp. 120-136, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Ons Aouedi et al., “A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions,” IEEE Communications Surveys and Tutorials, vol. 27, no. 2, pp. 1238 - 1292, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Ala Hamarsheh, “An Adaptive Security Framework for Internet of Things Networks Leveraging SDN and Machine Learning,” Applied Sciences, vol. 14, no. 11, pp. 1-28, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Elias Dritsas, and Maria Trigka, “Academic Editors: Muhammad A Survey on the Applications of Cloud Computing in the Industrial Internet of Things,” Big Data and Cognitive Computing, Basel, vol. 9, no. 2, pp. 1-32, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Tianyu Zhang et al., “A Survey on Industrial Internet of Things (IIoT) Testbeds for Connectivity Research,” arXiv Preprint, 2024.
[Google Scholar] [Publisher Link]
[44] Anca Jurcut et al., “Security Considerations for Internet of Things: A Survey,” SN Computer Science, vol. 1, no. 4, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Arwa Alrawais et al., “Fog Computing for the Internet of Things: Security and Privacy Issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Sanjeet Singh et al., “Empowering Connectivity: Exploring the Internet of Things,” pp. 89-116, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Muhammad Sohaib J. Solaija, Hanadi Salman, and Hüseyin Arslan, “Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks,” IEEE Journals and Magazine, vol. 3, pp. 321-343, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Meenu Vijarania, Swati Gupta, and Akshat Agarwal, “A Review on Security Frameworks and Protocols in the Internet of Things,” Internet of Things and Cyber Physical Systems, 1st ed., CRC Press, pp. 71-82, 2022.
[Google Scholar] [Publisher Link]
[49] Anna Kalyashina et al., “Enhancing IoT Systems through Cloud-Fog-Edge Architectures Challenges and Opportunities,” E3S Web of Conferences, vol. 583, pp. 1-11, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Brittany D. Davis, Janelle C. Mason, and Mohd Anwar, “Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10102-10110, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Badis Hammi et al., “Survey on Smart Homes: Vulnerabilities, Risks, and Countermeasures,” Computers and Security, vol. 117, pp.1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[52] S.C. Vetrivel, R. Maheswari, and T.P. Saravanan, “Industrial IOT: Security Threats and Counter Measures,” Communication Technologies and Security Challenges in IoT, Springer, Singapore, pp. 403-425, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[53] Jason R.C. Nurse, Sadie Creese, and David De Roure, “Security Risk Assessment in the Internet of Things Systems,” IT Professional, vol. 19, no. 5, pp. 20-26, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Rahul Johari et al., “Penetration Testing in IoT Network,” 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India, pp. 1-17, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Pooja Anand et al., “Iot Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges,” IEEE Access, vol. 8, pp. 168825-168853, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Seyyed Keyvan Mousavi et al., “Security of Internet of Things Based on Cryptographic Algorithms: A Survey,” Wireless Networks, vol. 27, no. 2, pp. 1515-1555, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Inayat Ali, Sonia Sabir, and Zahid Ullah, “Internet of Things Security, Device Authentication and Access Control: A Review,” 2019. [Google Scholar] [Publisher Link]
[58] Tuhin Borgohain et al., “Authentication Systems in the Internet of Things,” 2015.
[Google Scholar] [Publisher Link]
[59] Nickson M. Karie et al., “A Review of Security Standards and Frameworks for IoT-Based Smart Environments,” IEEE Access, vol. 9, pp. 121975-121995, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Tarak Nandy et al., “Review on Security of Internet of Things Authentication Mechanism,” IEEE Access, vol. 7, pp. 151054-151089, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[61] K.V.V.N.L. Sai Kiran et al., “Building an Intrusion Detection System for IoT Environment using Machine Learning Techniques,” Procedia Computer Science, vol. 171, pp. 2372-2379, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[62] Ansam Khraisat, and Ammar Alazab, “A Critical Review of Intrusion Detection Systems in the Internet of Things: Techniques, Deployment Strategy, Validation Strategy, Attacks, Public Datasets and Challenges,” Cybersecurity, vol. 4, no. 1, pp. 1-27, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[63] Yusuf Perwej et al., “A Systematic Literature Review on the Cyber Security,” International Journal of Scientific Research and Management, vol. 9, no. 12, pp. 669-710, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[64] David Barrera et al., “Security Best Practices: A Critical Analysis Using IoT as a Case Study,” ACM Transactions on Privacy and Security, vol. 26, no. 2, pp. 1-30, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[65] Sumit Singh Dhanda, Brahmjit Singh, and Poonam Jindal, “Lightweight Cryptography: A Solution to Secure IoT,” Wireless Personal Communications, vol. 112, no. 3, pp. 1947-1980, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[66] Hanan Elazhary, “Internet of Things (IoT), Mobile Cloud, Cloudlet, Mobile IoT, IoT Cloud, Fog, Mobile Edge, and Edge Emerging Computing Paradigms: Disambiguation and Research Directions,” Journal of Network and Computer Applications, vol. 128, pp. 105-140, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[67] M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, “A Comparative Analysis of Network Dependability, Fault-Tolerance, Reliability, Security, and Survivability,” IEEE Communications Surveys and Tutorials, vol. 11, no. 2, pp. 106-124, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Gregory B. White, and Natalie Sjelin, “The NIST Cybersecurity Framework vol. 61, no. 1-2, pp. 39-5, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Constant Kohler, “The Eu Cybersecurity Act and European Standards: an Introduction to the Role of European Standardization,” International Cybersecurity Law Review, vol. 1, no. 1-2, pp. 7-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Kevin Macnish, and Jeroen van der Ham “Ethics in Cybersecurity Research and Practice,” Technology in Society, vol. 63, pp. 1-10, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[71] Abhishek Khanna, and Sanmeet Kaur, “Internet of Things (IoT), Applications and Challenges: A Comprehensive Review,” Wireless Personal Communications, vol. 114, no. 2, pp. 1687-1762, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[72] Dener Ottolini, Ivan Zyrianoff, and Carlos Kamienski, “Interoperability and Scalability Trade-offs in Open IoT Platforms,” 2022 IEEE 19th Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[73] S. Hemavathy, Kokila Jagadeesh, and V.S. Kanchana Bhaaskaran, “Unified Security Framework using Device-Specific Fingerprint: Mitigating Hardware Trojans and Authenticating Firmware Updates,” IEEE Access, vol. 13, pp. 26897-26914, 2025.