Next Article in Journal
A Study of a GNSS/IMU System for Object Localization and Spatial Position Estimation
Previous Article in Journal
Impact of Underwater Image Enhancement on Feature Matching
Previous Article in Special Issue
Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey on Privacy Preservation Techniques in IoT Systems

Electrical, Computer and Biomedical Engineering Department, Toronto Metropolitan University, 350 Victoria St, Toronto, ON M5B2K3, Canada
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(22), 6967; https://doi.org/10.3390/s25226967
Submission received: 12 March 2025 / Revised: 7 November 2025 / Accepted: 13 November 2025 / Published: 14 November 2025
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Networks (WSNs))

Abstract

The Internet of Things (IoT) has become deeply embedded in modern society, enabling applications across smart homes, healthcare, industrial automation, and environmental monitoring. However, as billions of interconnected devices continuously collect and exchange sensitive data, privacy and security concerns have escalated. This survey systematically reviews the state-of-the-art privacy-preserving techniques in IoT systems, emphasizing approaches that protect user data during collection, transmission, and storage. Peer-reviewed studies from 2016 to 2025 and technical reports were analyzed to examine applied mechanisms, datasets, and analytical models. Our analysis shows that blockchain and federated learning are the most prevalent decentralized privacy-preserving methods, while homomorphic encryption and differential privacy have recently gained traction for lightweight and edge-based IoT implementations. Despite these advancements, challenges persist, including computational overhead, limited scalability, and real-time performance constraints in resource-constrained devices. Furthermore, gaps remain in cross-domain interoperability, energy-efficient cryptographic designs, and privacy solutions for Unmanned Aerial Vehicle (UAV) and vehicular IoT systems. This survey offers a comprehensive overview of current research trends, identifies critical limitations, and outlines promising future directions to guide the design of secure and privacy-aware IoT architectures.

1. Introduction

The Internet of Things (IoT) has revolutionized the way humans, machines, and environments interact through a pervasive network of connected devices. These systems—ranging from wearable health monitors and smart homes to industrial automation and transportation—continuously generate and exchange massive volumes of data. With the evolution of high-speed network technologies such as 5G, edge computing, and cloud-based analytics, IoT has become a backbone of digital transformation across various sectors. The number of IoT devices has already exceeded 15 billion, and this figure is expected to double by 2030, underscoring the scale of data exchange and interconnectivity in the coming decade [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20].
However, the increasing adoption of IoT introduces significant privacy and security challenges. IoT devices continuously collect sensitive data such as personal identifiers, health metrics, or location details, which are often transmitted through untrusted networks or third-party cloud platforms. Data breaches, unauthorized access, and profiling attacks have made user privacy a central concern [21,22,23,24,25,26]. For instance, regulatory actions such as the EU’s €1.3 billion fine to Meta in 2023 highlight the severity of privacy violations in global data transfers. Therefore, safeguarding user data privacy has become a crucial research priority in IoT systems. The multi-layered nature of IoT systems, from sensor-level data collection to cloud-level analytics, creates diverse privacy risks across each layer [27,28,29,30,31,32]. Figure 1 illustrates the conceptual overview of privacy preservation in IoT systems, highlighting typical threats and protection mechanisms across device, network, edge, and application layers.
Recent research efforts have proposed a variety of privacy-preserving mechanisms, including encryption, blockchain, federated learning (FL), trusted execution environments (TEE), and differential privacy (DP) [33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50]. These methods attempt to ensure data confidentiality and integrity without compromising system performance. Despite remarkable advancements, challenges remain—especially in terms of computational overhead, interoperability among heterogeneous devices, and the scalability of privacy frameworks in real-world deployments [51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68]. Furthermore, the rise in UAV-assisted IoT, vehicular IoT (VANETs/IoVs), and smart home ecosystems demands novel privacy-preserving solutions capable of addressing domain-specific constraints.
This study aims to systematically analyze, categorize, and evaluate the existing privacy-preservation techniques in IoT-based systems and identify key research gaps to guide future developments. The survey encompasses peer-reviewed articles (2016–2025) and technical reports published across leading databases such as IEEE Xplore, SpringerLink, MDPI, Elsevier, and ACM.
This survey makes the following scientific contributions:
  • Comprehensive Taxonomy: Presents a structured classification of privacy-preserving approaches—encryption-based, learning-based, blockchain-based, and hybrid mechanisms—used in IoT systems.
  • Comparative Evaluation: Summarizes the datasets, analytical models, and experimental results from prior studies, highlighting strengths and weaknesses such as encryption efficiency, computational overhead, and data scalability.
  • Cross-Domain Inclusion: Expands the literature to cover privacy mechanisms in smart homes, healthcare, vehicular IoT (VANET/IoV), and UAV-assisted systems, ensuring broad applicability across emerging domains.
  • Identification of Research Gaps: Highlights unresolved challenges including lightweight cryptographic design, real-time privacy preservation in edge devices, and interoperability among heterogeneous IoT networks.
  • Future Research Directions: Proposes energy-efficient, privacy-aware frameworks for next-generation IoT systems integrating AI, blockchain, and federated edge intelligence.

2. Methodology

This section describes the systematic process followed to identify, select, and analyze relevant literature on privacy-preserving techniques in Internet of Things (IoT) systems.
A structured literature search was conducted across major academic databases, including IEEE Xplore, Springer Link, MDPI, Elsevier, ACM Digital Library, and IET Digital Library. The search employed combinations of keywords such as Internet of Things (IoT), privacy preservation, data privacy, security, confidentiality, blockchain, federated learning, homomorphic encryption, differential privacy, and edge computing. These terms were applied to titles, abstracts, and keywords to capture comprehensive coverage of studies focusing on privacy-preserving mechanisms in IoT systems. Only peer-reviewed journal and conference papers were considered, together with two technical reports closely related to IoT privacy and data protection.
The initial search identified more than 350 publications. After removing duplicates, titles and abstracts were screened to ensure topical relevance. Full-text screening was then performed to verify that each paper addressed privacy or data protection in IoT or edge-connected systems, presented a clearly defined methodology or model, and was written in English. Following this process, a total of 64 peer-reviewed papers and two technical reports were selected for detailed analysis.
The inclusion criteria comprised studies proposing or evaluating privacy-preserving techniques in IoT or related domains such as edge computing, cloud computing, industrial IoT, Internet of Medical Things (IoMT), vehicular IoT, and UAV-assisted systems. Papers were required to provide qualitative or quantitative assessments and be published between 2016 and 2025. Exclusion criteria eliminated non-English works, short editorials, patents, commentaries, or general cybersecurity studies without a clear privacy component.
Each selected study was assessed for technical soundness, reproducibility, relevance to IoT privacy, publication recency, and citation significance. The extracted information included datasets, analytical models, performance metrics, and stated research gaps. A thematic synthesis was then performed, grouping the works into four major categories: encryption-based approaches, learning-based frameworks, blockchain-enabled solutions, and hybrid privacy-preserving models. The summarized results are presented in the subsequent sections through comprehensive tables and analytical discussions.

3. Literature Review and Background

3.1. Research Questions

To systematically analyze and classify the state-of-the-art privacy-preserving methods in IoT systems, the following research questions were formulated:
  • RQ1: What are the major privacy-preserving techniques employed in IoT systems across different domains?
  • RQ2: What types of IoT devices, edge nodes, and network infrastructures are targeted by these privacy mechanisms?
  • RQ3: What are the common privacy threats and attack models addressed in recent research?
  • RQ4: How do various methods—such as blockchain, federated learning, encryption, and differential privacy—compare in terms of performance, scalability, and computational cost?
  • RQ5: What research gaps and open challenges remain in achieving efficient, real-time, and scalable privacy preservation for heterogeneous IoT environments?
These questions serve as the analytical framework for classifying and interpreting existing studies reviewed in the following subsections.

3.2. Encryption- and Blockchain-Based Techniques

A large portion of IoT privacy research focuses on encryption and blockchain mechanisms as core protective strategies.
Sun et al. [54] conducted a comprehensive survey of security and privacy issues in IoT environments, identifying encryption, anonymization, and blockchain as the most mature protection mechanisms. Their work highlights that while blockchain provides strong data integrity and immutability, it introduces latency and energy overheads in constrained devices.
Earlier studies [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20] explored symmetric/asymmetric encryption, homomorphic encryption, and lightweight key-exchange algorithms, but most lacked full integration across device, network, and cloud layers.
In blockchain-enabled IoT systems, privacy preservation relies on decentralized trust management and immutable ledgers for recording transactions without exposing raw sensor data. A typical architecture integrates a consensus layer (e.g., Proof-of-Authority or Practical Byzantine Fault Tolerance) with cryptographic primitives such as SHA-256 hashing, asymmetric key pairs for node authentication, and on-chain/off-chain data partitioning. For example, in healthcare IoT, patient records are encrypted using AES or elliptic-curve cryptography and stored off-chain, while blockchain entries maintain only the transaction hash and access policies. This design ensures data traceability and tamper-evidence while reducing on-chain storage overhead. Smart contracts regulate access permissions dynamically, enabling auditability across multiple stakeholders (hospitals, cloud servers, patients) without a central authority. However, latency and computational load at consensus nodes remain bottlenecks for large-scale deployments in time-sensitive applications such as remote monitoring.
Hybrid frameworks combining homomorphic encryption with blockchain for distributed authentication have also emerged [21,22,23,24,25,26,27,28,29,30,31,32,33,34,35]. These approaches enhance transparency but remain challenged by limited throughput and scalability.
Overall, encryption and blockchain-based frameworks are foundational in IoT privacy, yet optimization for lightweight operation, cross-domain compatibility, and real-time verification remains an open research challenge. The application scope of various privacy-preserving mechanisms across different IoT layers is illustrated in Figure 2, which maps how encryption, blockchain, federated learning, differential privacy, and access-control strategies complement each other from the device level up to the application layer.

3.3. Learning-Based and Federated Approaches

The rise in machine learning (ML) and federated learning (FL) in IoT applications has shifted attention toward learning-based privacy mechanisms.
Li et al. [57] reviewed FL-based privacy preservation across edge-IoT systems, identifying encryption of local updates and differential privacy perturbation as primary defenses against gradient leakage.
Federated Learning (FL) enables distributed training across IoT devices by transferring model parameters rather than raw data. The process involves three stages: local model training on edge nodes, aggregation of parameters at a central or hierarchical aggregator, and global model update broadcast. This framework reduces privacy leakage but introduces communication overhead proportional to the number of participating clients and model size. Techniques such as secure aggregation (using homomorphic encryption or additive masking) and gradient compression are used to lower bandwidth and protect local updates from inference attacks. Despite these optimizations, real-time IoT deployments face challenges related to straggler effects, non-IID data distribution, and energy consumption on low-power devices. Adaptive FL strategies that dynamically select clients or aggregation intervals based on workload and network state are emerging to address these constraints.
Ramadan et al. [56] further expanded this direction by integrating TinyML with FL to enable on-device training under strict memory and power budgets.
Khraisat et al. [59] proposed a privacy-preserving intrusion detection system leveraging FL to analyze IoT network traffic without centralized data collection, significantly reducing privacy leakage risk.
Complementary surveys [36,37,38,39,40,41,42,43,44,45] show that although FL protects data locality, it remains vulnerable to model inversion and poisoning attacks, demanding stronger aggregation and noise-injection schemes.
Recent progress includes hierarchical FL for non-IID edge data [63] and differentially private optimization techniques for adaptive client updates [62].
Collectively, these studies demonstrate the promise of FL for decentralized IoT learning but underscore the need for adaptive, energy-aware, and hybrid (blockchain-FL) solutions.

3.4. Edge and Cloud Privacy Models

Edge and cloud computing environments play a central role in processing IoT data streams, but they also create additional privacy exposure points.
Pinto et al. [61] conducted a systematic review on privacy-aware personal data stores (PDS), emphasizing user control, consent management, and transparency in IoT data flow.
Differential Privacy (DP) offers quantifiable protection against data reconstruction by introducing random noise into query results or model gradients. In event-level DP, each sensor event (e.g., a temperature reading or posture sample) is individually randomized using a calibrated noise distribution such as Laplace or Gaussian, ensuring that the inclusion or exclusion of any single event does not significantly alter the aggregated outcome. This fine-grained approach is well-suited to continuous IoT data streams but can degrade accuracy when the privacy budget (ε) is small. Hybrid frameworks integrate event-level DP with edge offloading, where preliminary aggregation occurs at gateway nodes to balance privacy and utility. Parameter tuning—particularly ε and sensitivity scaling—is crucial for maintaining utility across heterogeneous devices and sampling rates.
Several studies [46,47,48,49,50,51,52,53] have examined edge-assisted privacy architectures, including trusted execution environments (TEE) and secure offloading schemes.
These frameworks aim to minimize transmission of raw data by processing sensitive information closer to its source, thereby reducing attack surfaces.
However, edge nodes remain vulnerable to side-channel and physical tampering attacks, and privacy preservation must balance latency constraints with computational overhead.
Emerging 2024–2025 works [54,57,62] advocate differential privacy co-design with offloading mechanisms and energy-efficient encryption for edge devices to achieve stronger end-to-end confidentiality across the IoT data lifecycle.

3.5. Application-Specific Privacy: Smart Homes, Vehicular IoT, and UAVs

Privacy solutions often vary depending on the IoT application domain.
Magara and Zhou [58] surveyed smart-home IoT environments, identifying typical privacy leaks through weak authentication and unencrypted local traffic. They emphasized the need for lightweight encryption and access-control integration.
Jia et al. [55] analyzed consumer IoT traffic and highlighted vulnerabilities in everyday devices such as smart cameras, wearables, and voice assistants. Their findings demonstrate that traffic metadata alone can reveal sensitive behavioral patterns even without decrypting content.
Vehicular and UAV-assisted IoT systems face distinct privacy issues due to mobility, latency, and dynamic topology.
Recent works [54,60] review authentication and key-management frameworks in vehicular networks (VANET/IoV) and UAV ecosystems, recommending blockchain and TEE-enabled protocols for secure communication.
Despite these efforts, challenges persist in low-latency encryption, location-privacy preservation, and lightweight federated learning for moving IoT nodes.

3.6. Synthesis and Taxonomy Summary

Across the surveyed literature [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63], privacy-preserving techniques in IoT systems can be broadly categorized into four groups:
  • Encryption/Blockchain-Based: Data confidentiality, decentralized trust, integrity protection.
  • Learning-Based: Federated learning, TinyML, and differentially private optimization for distributed intelligence.
  • Edge/Cloud Models: Secure offloading, TEEs, differential privacy at edge layers.
  • Application-Specific Frameworks: Domain-driven privacy mechanisms for smart homes, vehicular IoT, healthcare, and UAVs.
A visual taxonomy of these categories is illustrated in Figure 3, highlighting the relationships among the major approaches and their representative technologies.
The taxonomy highlights the rapid transition from centralized to distributed privacy mechanisms, where intelligence and protection are pushed toward the network edge.
Persistent challenges include high computational overhead, lack of interoperability among heterogeneous IoT nodes, and the absence of large-scale benchmarking datasets.
These limitations underscore the need for unified hybrid frameworks integrating blockchain, FL, and differential privacy while maintaining real-time efficiency. To provide a comparative view of the existing research, Table 1 summarizes the key studies reviewed in this paper, categorized by their application domain, methodological approach, datasets used, primary findings, and noted limitations. The selected papers include both foundational works [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53] and recent contributions [54,55,56,57,58,59,60,61,62,63,64,65,66] published between 2016 and 2025.
The comparison highlights how research has progressively evolved from encryption-based privacy preservation to more advanced hybrid frameworks integrating blockchain, federated learning, and differential privacy. It also underscores common trade-offs between privacy strength, computational overhead, and scalability across different IoT domains.
The comparative summary presented in Table 1 reveals several key insights. Encryption-based and blockchain-enabled methods remain the most established privacy solutions for IoT environments, offering strong data integrity and decentralization but suffering from latency and high computational costs on constrained devices. Learning-based and federated approaches show increasing promise for scalable, decentralized intelligence; however, they introduce new attack surfaces such as model inversion, poisoning, and gradient leakage. Edge- and cloud-centric privacy frameworks effectively reduce data exposure but face interoperability and trust issues among heterogeneous devices. Finally, domain-specific studies—particularly in smart homes, healthcare, and vehicular IoT—demonstrate that context-aware design is essential, as privacy threats and performance constraints differ across applications.
These collective observations form the basis for the research gaps and future directions discussed in Section 3.7, where the need for hybrid, energy-efficient, and mobility-aware privacy architectures in next-generation IoT systems is emphasized.

3.7. Gaps and Research Directions

Although considerable advancements have been made, several critical gaps remain:
  • Lightweight Cryptographic Design: Existing encryption and blockchain techniques are computationally intensive; optimized implementations for microcontrollers and low-power devices are needed.
  • Energy-Aware Privacy Mechanisms: Energy consumption remains a limiting factor for continuous encryption and secure FL updates.
  • Mobility-Aware Frameworks: VANETs and UAV-based IoT systems require adaptive privacy mechanisms that tolerate topology and connectivity changes.
  • Cross-Domain Interoperability: Privacy solutions should enable seamless protection across smart home, healthcare, industrial, and vehicular IoT environments.
  • Empirical Validation: Many proposed solutions remain theoretical; more real-world deployments and standardized testbeds are essential.
  • Hybrid Privacy Architectures: Combining blockchain, FL, and differential privacy can yield scalable, decentralized, and robust IoT privacy models.
These findings set the foundation for the Discussion (Section 6) and Conclusion (Section 7), where recommendations for future privacy-preserving IoT frameworks are presented.

4. Data Sources and Types

In this section, we are going to discuss in detail the data sources and data types used in some of the selected research papers that have been studied for our work—and a tabular summary of the data sources and types used in those papers for the survey. We elaborate on the used datasets and their applications for the developed models. Jui, Tania Tahmina et al. [11] have used two major datasets for their proposed intrusion detection model in IoT-based networks. The used datasets are MQTT-IoT-IDS-2020 and NSL-KDD, which are benchmark datasets for network traffic. First, the authors have applied some preprocessing techniques to simplify the dataset, and after preprocessing, they have extracted important features through feature selection techniques. In the next step, with the reduced features, different classification algorithms have been applied. Accuracy and time efficiency are the performance measuring parameters for the applied classification algorithms for finding out the best result for combining preprocessing techniques with feature selection techniques and classification algorithms. The main goal of the work is to detect the intrusion in the network that can be seen as privacy preservation of the IoT-based systems.
The MQTT-IoT-IDS-2020 dataset is used to detect intrusion in the IoT networks, where the dataset is built based on the Message Queueing Telemetry Transport (MQTT) protocol. This dataset has three feature levels, namely Packet-based features, unidirectional-flow-level-based features, and Bidirectional-flow-based features. It has been shown that to distinguish MQTT-based attacks from benign traffic, it is essential to use the Packet-based features. The MQTT-IoT-IDS-2020 comprises five different kinds of normal records and four different kinds of attack scenarios. The four attack types are Aggressive scan (Scan-A), User Datagram Protocol (UDP) scan (Scan-sU), Sparta SSH brute-force (Sparta), MQTT brute-force attack (MQTTBF). There are two different types of features in the MQTT-IoT-IDS-2020 dataset [11].
The Yoga Posture dataset [10] used in this study consists of 93,200 RGB images representing 26 distinct yoga postures, captured at a spatial resolution of 224 × 224 pixels. Images were collected from multiple sources under controlled and semi-controlled environments to reflect natural variations in illumination, orientation, and subject appearance. Each image was manually annotated and verified by three independent reviewers to ensure correct class labeling. Data augmentation techniques, including rotation, cropping, and horizontal flipping, were applied to improve generalization. The dataset was balanced across posture categories, with approximately 3500–3800 images per class, and included samples from participants of different body types and genders to minimize bias. Before model training, all images were normalized to the [0, 1] pixel intensity range, and a 70:15:15 split was used for training, validation, and testing.
NSL-KDD is a superset of the “KDD Cup’99” dataset, which is taken from the University of New Brunswick. It is a benchmark dataset for contemporary internet traffic. It combines four datasets, namely KDDTrain+, KDDTrain+_20Percent, KDDTest+, and KDDTest-21Percent, where KDDTest-21Percent is a subset of KDDTrain+. Like the MQTT-IoT-IDS-2020 dataset, the NSL-KDD dataset also has four different kinds of attack scenarios: Denial of Service (DoS), Probe, User to Root (U2R), and Remote to Local (R2L). The NSL-KDD dataset has a total of 43 features. Among those, 41 present the traffic input directly, and the other two are labels and scores. The label indicates if the attack is normal or not, and the score indicates the severity of the traffic input.
Alotaibi et al. [15] use two datasets corresponding to two heterogeneous environments. The first dataset is publicly available and is part of the ICS Cyberattack Dataset collection that represents smart home IoT devices, such as security sensors, alarms, cameras, thermostats, and solar panels. Alotaibi et al. [15] focus on the binary-class subdataset composed of 15 subdatasets with 78,377 samples, of which 22,714 represent normal traffic activities, while 55,663 represent malicious traffic activities. These datasets have a feature size of 128. Each instance of the binary dataset is classified as a regular or malicious event. The second dataset is also publicly available and is part of the IoT Botnet Attack dataset (N-BaIoT) collection that represents nine IoT devices, such as baby monitors, security cameras, doorbells, and thermostats. Each of the nine datasets is classified as either an attack or benign class. These attacks are generated using two botnets. Only three datasets are used, including the Ecobee thermostat, Ennio doorbell and Samsung SNH 1011 N webcam, with 1,566,598 samples, of which 104,363 represent the benign class, while 1,462,235 describe the attack class. For all subdatasets, we split the data into 70% for training and 30% for testing.
Kahani et al. [16] did not use any dataset. Instead, data is generated when testing the implementation to represent the patients’ accounts and health records. Meisami et al. [17] did not use any dataset as well—instead, a discussion of the theoretical aspects of the model, including its security and privacy features.
A detailed summary of the datasets used in the reviewed studies is presented in Table 2. Entries marked as theoretical represent conceptual or survey-based studies that did not employ a specific dataset but contributed analytical frameworks or taxonomies.

5. Analytical Models Used

In this section, we will discuss the analytical models used in some of the selected research papers studied for our work, and a tabular summary of the analytical models used in those papers for the survey.
Alotaibi et al. [15] propose a stacked deep learning architecture from five pretrained residual networks (ResNet) for cyberattack detection against IoT devices. Each pretrained ResNet model is made with ten ResNet blocks with two convolutional layers with the same settings assigned. After the ResNet blocks, the data is transferred to the new meta-algorithm, consisting of two dense layers (40 and 20 neurons), followed by softmax to compute the class score. Each of the two convolutional layers comprises 16 convolutional filters that output 16 feature maps, where the activation function ReLu is used. Additionally, average pooling of size two with striding two is used after the last ResNet block to reduce the feature size as it had superior results to max pooling. The authors use cross entropy as the loss function when training and the Adam optimizer because of the advantages of both RMSProp and AdaGrad optimizers.
Kahani et al. [16] propose an authentication and access control manager (AAM) server responsible for both the authentication and access control. Authentication is achieved with the Schnorr zero-knowledge identification protocol, which is used as a challenge-response protocol to authenticate the identity of the healthcare practitioner anonymously. To establish secure communication between multiple actors, a combination of public and private keys generated by the Derive Unique Key per Transaction (DUKPT) scheme is used, which alters the session key each new session to strengthen the security of the communication. Access control is defined by an intention tree, where different tree nodes represent a hierarchical relationship-like structure that represents various healthcare professions. The result of the tree is the minimum rights that a healthcare provider needs to satisfy the data request or will be denied if outside his rights. Firstly, the user registers with the service provider where the ID is generated. Secondly, the user selects a Base Derivation Key (BDKAM) to create a session key and sends it encrypted alongside some key parameters to the AAM, responsible for the authentication and access control, where the AAM responds with an encrypted random number and timestamp. Thirdly, the user combines his ID, the random number and previous key parameters to calculate y, as seen in Equation (1) [16], which is transmitted to AAM.
y = ID × e + r × modq
After being authenticated and granted access, the AAM responds with a validation token. Finally, the user uses the token to retrieve the patient’s encrypted data from the cloud server, where the user can decrypt it with the shared key. This protocol is fundamental to the proposed solution of Kahani et al. [16], which manages secured data sharing for e-health services.
Meisami et al. [17] propose a blockchain-based protocol for e-health approaches that does not use a trusted third party and incorporates an efficient privacy-preserving access control method. The proposed model architecture shows four main modules. Wearable IoT devices and patients’ phones are responsible for gathering and temporarily storing patient data. IoT devices typically have low storing space and computational power, while phones have larger storing space and computational speeds and can transmit data through wireless communications. Medical staff are the physicians and nurses who want to download the patient’s data for analysis and treatment. The blockchain module stores the pointers to the data and not the actual data. It also stores access policies and removes the need for a trusted third party. The off-chain storage module is responsible for storing the patient’s encrypted data. It uses an Interplanetary File System for the peer-to-peer distributed file system.
Throughout the protocol, Meisami et al. [17] use three cryptographic functions: the SHA-256 as the hash function, AES for the symmetric key encryption, and ECDSA with a secp256k1 curve for the digital signature algorithm. Initially, a staff m and patient p generate private and public keys to sign and send transactions to the blockchain server and a secret key for the AES encryption. Secondly, the patient registers the data access permissions by assigning policies that indicate what permission message a medical staff has over the patient. These permission policies can later be changed or revoked. After the patient’s data is saved on the off-chain storage, it can be accessed by the medical practitioner by first checking if the staff has permission access. If the staff is granted access permissions, the patient’s encrypted data can be downloaded with the following protocol.
Table 3 summarizes the analytical models and architectures applied in privacy-preserving IoT studies, including structural configurations and evaluation metrics to enhance reproducibility.

6. Discussions

The survey findings reveal a clear evolution of privacy-preserving research in Internet of Things (IoT) systems from centralized security frameworks to distributed, intelligent, and energy-aware architectures. This transition is driven by the growing heterogeneity of IoT environments—encompassing edge devices, cloud services, vehicular nodes, and UAV-assisted networks—where static, one-size-fits-all privacy mechanisms are no longer effective.

6.1. Interpretation of Findings

Across the analyzed studies [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63], four dominant privacy-preserving paradigms emerge: encryption and blockchain-based techniques, learning-based frameworks (particularly federated learning), edge/cloud hybrid models, and application-specific architectures.
Encryption-based methods continue to serve as the foundation for ensuring confidentiality, integrity, and authentication. Yet, their direct implementation on low-power IoT devices remains impractical due to computational intensity and key-management complexity. Blockchain offers decentralized trust and auditability but introduces latency and consensus overheads that are incompatible with real-time IoT applications.
In contrast, federated learning (FL) and differential privacy (DP) have proven valuable in preserving data locality while maintaining model accuracy. The 2024–2025 surveys [56,57,59,63] confirm that FL reduces data exposure risks; however, it remains susceptible to gradient inversion and model poisoning attacks, especially under non-IID data distributions. Integrating secure aggregation and homomorphic encryption improves privacy but increases energy and communication costs—a trade-off now at the center of IoT privacy research.
Edge and cloud co-design models [54,61,62] address these trade-offs by relocating privacy computation closer to the data source. They offer lower latency and reduced transmission exposure but must reconcile heterogeneous hardware, limited memory, and diverse network conditions. This has spurred interest in Trusted Execution Environments (TEE) and zero-trust architectures for edge nodes.
Finally, application-specific privacy frameworks [55,58,60] emphasize context-dependent protection, particularly for smart homes, healthcare, and vehicular IoT. These domains expose privacy in unique ways: smart homes risk behavioral inference from metadata; e-health faces data sharing and compliance constraints; vehicular IoT demands real-time, low-latency authentication. Collectively, they demonstrate that privacy cannot be generalized—it must be contextualized to device capabilities, connectivity, and user expectations.
A comparative summary of representative studies and their respective strengths and limitations is provided in Table 4.
As highlighted in Table 4 despite significant advancements, each technique family faces distinct challenges in scalability, computation cost, and adaptability—which are analyzed in the following subsections.
The convergence of encryption, federated learning, and blockchain technologies is increasingly viewed as the most promising direction for achieving scalable and verifiable IoT privacy.
The overall interaction among these techniques and their operational layers is depicted in Figure 4, which illustrates how device-level encryption, federated model aggregation at the edge/cloud, and blockchain-based audit trails collectively enable secure and transparent data processing across heterogeneous IoT environments.

6.2. Cross-Analysis with Research Questions

The synthesized literature answers the research questions defined in Section 3.1 as follows:
  • RQ1 (Techniques): Privacy in IoT is dominated by four families—encryption, blockchain, FL/DP, and hybrid edge–cloud frameworks—each addressing different parts of the data lifecycle.
  • RQ2 (Devices/Architectures): Most solutions target edge nodes and cloud infrastructure, while ultra-constrained sensor nodes remain under-protected.
  • RQ3 (Threats): Commonly mitigated threats include data leakage, man-in-the-middle attacks, inference attacks in ML, and unauthorized access; emerging threats involve adversarial learning and blockchain data linkage.
  • RQ4 (Comparative Effectiveness): FL and blockchain achieve decentralized privacy but trade off energy, latency, and communication efficiency; lightweight encryption still dominates resource-limited nodes.
  • RQ5 (Gaps): Few studies present unified, end-to-end architectures that balance privacy, scalability, and energy efficiency across heterogeneous IoT tiers.
Building upon the cross-analysis of the reviewed studies and their responses to the formulated research questions, the key unresolved challenges and potential research directions can be synthesized. Table 5 summarizes the identified research gaps and corresponding recommendations extracted from the surveyed literature between 2016 and 2025, highlighting where current privacy-preserving approaches in IoT systems still fall short and what strategies may address these shortcomings in the next generation of designs.

6.3. Emerging Trends and Research Implications

Several strong trends and implications arise from the collective analysis:
  • Shift toward Decentralization: Future IoT privacy will rely on federated, peer-to-peer, and blockchain-enabled models rather than centralized authorities.
  • Privacy–Energy Co-Optimization: Energy-aware encryption and adaptive training in FL are emerging to sustain privacy without depleting device resources.
  • Edge Intelligence and Lightweight ML: Integrating TinyML and hierarchical FL supports on-device learning while minimizing data exposure, but model compression and personalization must be improved.
  • Cross-Domain Privacy Frameworks: Unified architectures spanning smart homes, healthcare, and vehicular IoT are required to enable interoperability and standardization.
  • Regulatory Alignment and Ethical Data Governance: The growing enforcement of GDPR-style privacy laws globally demands compliance-by-design models embedded into IoT systems.
  • Hybrid Architectures: Combining blockchain, FL, and differential privacy offers complementary strengths—trust, decentralization, and statistical anonymity—suggesting a clear direction for next-generation IoT privacy frameworks.

6.4. Synthesis

Overall, the literature demonstrates rapid maturation of privacy-preserving research from isolated technical mechanisms toward multi-layered, adaptive, and energy-efficient IoT privacy ecosystems. However, the trade-off between privacy strength and performance efficiency remains unresolved. The path forward involves designing Workload- and Context-Aware Privacy Frameworks capable of dynamically balancing computation, communication, and confidentiality in heterogeneous IoT networks.
The cumulative findings from the analyzed studies reveal an evolving research trajectory toward decentralized, adaptive, and energy-efficient privacy frameworks. The strategic path linking these research gaps to long-term objectives is illustrated in Figure 5, which presents a consolidated roadmap for future investigations in privacy-preserving IoT systems.
These insights motivate the future recommendations presented in Section 7, which outline strategic directions for developing robust, scalable, and sustainable privacy-preserving solutions in forthcoming IoT deployments.

7. Conclusions and Future Directions

This survey presented a comprehensive analysis of privacy-preserving techniques in Internet of Things (IoT) systems across diverse domains such as healthcare, smart homes, industrial IoT, and vehicular networks. By reviewing peer-reviewed studies and technical reports published between 2016 and 2025, the study systematically classified existing approaches into encryption-based, learning-based, blockchain-enabled, and hybrid edge–cloud frameworks to address five core research questions on applied methods, device layers, privacy threats, comparative performance, and open challenges. The findings reveal a clear shift from centralized, encryption-centric models to decentralized, intelligent, and energy-aware architectures. While classical cryptographic techniques such as AES, DES, and homomorphic encryption provide strong confidentiality, they impose computational and energy burdens on constrained IoT devices. Blockchain technologies enhance integrity and trust through decentralization but introduce latency and power overheads that limit their suitability for real-time applications. Federated learning and differential privacy offer promising solutions for secure data analytics by preserving data locality and enabling collaborative intelligence, yet remain susceptible to gradient inversion, poisoning, and synchronization attacks at scale. Edge and cloud frameworks alleviate part of these constraints by performing computation closer to data sources, thereby reducing exposure and latency, though heterogeneity and the lack of unified security standards continue to hinder interoperability. Across all domains, privacy requirements are shown to be highly contextual—differing for wearable sensors, industrial actuators, and UAV nodes in terms of latency tolerance, computational capacity, and regulatory compliance. Persistent limitations include high computational cost, fragmented interoperability, limited benchmarking datasets, and a lack of real-world validations. To overcome these challenges, future research should prioritize the development of lightweight, energy-aware cryptographic and federated learning schemes; design hybrid frameworks that integrate the complementary benefits of blockchain, federated learning, and differential privacy; employ adaptive edge intelligence through TinyML for dynamic on-device privacy enforcement; and promote standardized cross-domain interoperability and open-source testbeds for benchmarking under realistic deployment conditions. Moreover, embedding privacy-by-design principles in alignment with emerging regulations such as GDPR and HIPAA will be crucial for establishing trustworthy, scalable, and sustainable IoT ecosystems. Overall, IoT privacy research is transitioning toward autonomous, decentralized, and context-aware systems capable of intelligently balancing performance, energy, and confidentiality, providing a solid foundation for the design of next-generation hybrid and workload-aware privacy frameworks.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Duarte, F. Exploding Topics, 22 February 2023. Available online: https://explodingtopics.com/blog/number-of-iot-devices (accessed on 27 October 2023).
  2. Check Point. Check Point Research, 11 April 2013. Available online: https://blog.checkpoint.com/security/the-tipping-point-exploring-the-surge-in-iot-cyberattacks-plaguing-the-education-sector/ (accessed on 27 October 2023).
  3. Xue, W.; Hu, W.; Gauranvaram, P.; Seneviratne, A.; Jha, S. An efficient privacy-preserving IoT system for face recognition. In Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), Sydney, NSW, Australia, 21 April 2020; pp. 7–11. [Google Scholar]
  4. Yuhala, P. Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning. arXiv 2023, arXiv:2305.02584. [Google Scholar] [CrossRef]
  5. Carson, J.; DiSalvo, L.; Ray, L. Automatic Classification of Web and IoT Privacy Policies. In Proceedings of the IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Denver, CO, USA, 19–21 October 2022; pp. 732–735. [Google Scholar]
  6. Elkahlout, M.; Abu-Saqer, M.M.; Aldaour, A.F.; Issa, A.; Debeljak, M. IoT-Based Healthcare and Monitoring Systems for the Elderly: A Literature Survey Study. In Proceedings of the International Conference on Assistive and Rehabilitation Technologies (iCareTech), Gaza, Palestine, 28–29 August 2020; pp. 92–96. [Google Scholar]
  7. Meenakshiammal, R.; Bharathi, R. Preserving Patient Privacy in IoT Based Breast Cancer Monitoring System. In Proceedings of the 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 19–21 July 2023; pp. 1370–1374. [Google Scholar]
  8. Schiliro, F.; Moustafa, N.; Beheshti, A. Cognitive privacy: AI-enabled privacy using EEG signals in the internet of things. In Proceedings of the IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), Nadi, Fiji, 14–16 December 2020; pp. 73–79. [Google Scholar]
  9. Fazeldehkordi, E.; Owe, O.; Noll, J. Security and privacy in IoT systems: A case study of healthcare products. In Proceedings of the 13th International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway, 8–10 May 2019; pp. 1–8. [Google Scholar]
  10. Gochoo, M.; Tan, T.H.; Huang, S.C.; Batjargal, T.; Hsieh, J.W.; Alnajjar, F.S.; Chen, Y.F. Novel IoT-based privacy-preserving yoga posture recognition system using low-resolution infrared sensors and deep learning. IEEE Internet Things J. 2019, 6, 7192–7200. [Google Scholar] [CrossRef]
  11. Jui, T.T.; Hoq, M.N.; Majumdar, S.; Hossain, M.S. Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks. In Proceedings of the 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 13–15 December 2021; pp. 41–50. [Google Scholar]
  12. Fazeldehkordi, E.; Owe, O.; Noll, J. Security and Privacy Functionalities in IoT. In Proceedings of the 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 26–28 August 2019; pp. 1–12. [Google Scholar]
  13. Fagbohungbe, O.; Reza, S.R.; Dong, X.; Qian, L. Efficient privacy-preserving edge intelligent computing framework for image classification in IoT. IEEE Trans. Emerg. Top. Comput. Intell. 2021, 6, 941–956. [Google Scholar] [CrossRef]
  14. Amadeo, M.; Ruggeri, G. Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities. Future Internet 2025, 17, 42. [Google Scholar] [CrossRef]
  15. Alotaibi, B.; Alotaibi, M. A stacked deep learning approach for IoT cyberattack detection. J. Sens. 2020, 2020, 8828591. [Google Scholar] [CrossRef]
  16. Kahani, N.; Elgazzar, K.; Cordy, J.R. Authentication and access control in e-health systems in the cloud. In Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 9–10 April 2016. [Google Scholar]
  17. Meisami, S.; Atashgah, M.B.; Aref, M.R. Using blockchain to achieve decentralized privacy in IoT Healthcare. Int. J. Cybern. Inform. 2023, 12, 97–108. [Google Scholar] [CrossRef]
  18. Xiong, S.; Sarwate, A.D.; Mandayam, N.B. Network Traffic Shaping for Enhancing Privacy in IoT Systems. IEEE/ACM Trans. Netw. 2022, 30, 1162–1177. [Google Scholar] [CrossRef]
  19. Azbeg, K.; Ouchetto, O.; Andaloussi, S.J. Access Control and Privacy-Preserving Blockchain-Based System for Diseases Management. IEEE Trans. Comput. Soc. Syst. 2023, 10, 1515–1527. [Google Scholar] [CrossRef]
  20. Will, N.C. A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment. In Proceedings of the 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 25–28 April 2022; pp. 1–5. [Google Scholar]
  21. Agrawal, R.; Faujdar, N.; Kumar, P.; Kumar, A. Security and Privacy of Blockchain-Based Single-Bit Cache Memory Architecture for IoT Systems. IEEE Access 2022, 10, 35273–35286. [Google Scholar] [CrossRef]
  22. Ouyang, L.; Wang, F.Y.; Tian, Y.; Jia, X.; Qi, H.; Wang, G. Artificial Identification: A Novel Privacy Framework for Federated Learning Based on Blockchain. IEEE Trans. Comput. Soc. Syst. 2022, 10, 3576–3585. [Google Scholar] [CrossRef]
  23. Gugueoth, V.; Safavat, S.; Shetty, S.; Rawat, D. A Review of IoT Security and Privacy Using Decentralized Blockchain Techniques. Comput. Sci. Rev. 2023, 50, 100585. [Google Scholar] [CrossRef]
  24. Alkhariji, L.; De, S.; Rana, O.; Perera, C. Semantics-Based Privacy by Design for Internet of Things Applications. Future Gener. Comput. Syst. 2023, 138, 280–295. [Google Scholar] [CrossRef]
  25. Singh, R.; Dwivedi, A.D.; Srivastava, G.; Chatterjee, P.; Lin, J.C.W. A Privacy-Preserving Internet of Things Smart Healthcare Financial System. IEEE Internet Things J. 2023, 10, 18452–18460. [Google Scholar] [CrossRef]
  26. Sharma, P.; Namasudra, S.; Chilamkurti, N.; Kim, B.G.; Crespo, R.G. Blockchain-Based Privacy Preservation for IoT-Enabled Healthcare System. ACM Trans. Sens. Netw. 2023, 19, 56. [Google Scholar] [CrossRef]
  27. Kumar, M.; Mukherjee, P.; Verma, S.; Kavita Shafi, J.; Wozniak, M.; Ijaz, M.F. A Smart Privacy Preserving Framework for Industrial IoT Using Hybrid Meta-Heuristic Algorithm. Sci. Rep. 2023, 13, 5372. [Google Scholar] [CrossRef] [PubMed]
  28. Tayeb, H.; Bramas, B.; Faverge, M.; Guermouche, A. Dynamic Tasks Scheduling with Multiple Priorities on Heterogeneous Computing Systems. In Proceedings of the 2024 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), San Francisco, CA, USA, 27–31 May 2024. [Google Scholar]
  29. Shen, S.; Wu, X.; Sun, P.; Zhou, H.; Wu, Z.; Yu, S. Optimal Privacy Preservation Strategies with Signaling Q-Learning for Edge-Computing-Based IoT. Expert Syst. Appl. 2023, 225, 120192. [Google Scholar] [CrossRef]
  30. Alam, T.; Gupta, R. Federated Learning and Its Role in the Privacy Preservation of IoT Devices. Future Internet 2022, 14, 246. [Google Scholar] [CrossRef]
  31. Yaraziz, M.S.; Jalili, A.; Gheisari, M.; Liu, Y. Recent Trends Towards Privacy-Preservation in Internet of Things, Its Challenges and Future Directions. IET Circuits Devices Syst. 2023, 17, 53–61. [Google Scholar] [CrossRef]
  32. Ali, A.; Al-rimy, B.A.S.; Alsubaei, F.S.; Almazroi, A.A.; Almazroi, A.A. HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors 2023, 23, 6762. [Google Scholar] [CrossRef]
  33. Arachchige, P.C.M.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S.; Atiquzzaman, M. A Trustworthy Privacy-Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Inform. 2020, 16, 6092–6102. [Google Scholar] [CrossRef]
  34. Kaur, R.; Mohammadi, F. Power Estimation and Comparison of Heterogeneous CPU–GPU Processors. In Proceedings of the 2023 IEEE 25th Electronics Packaging Technology Conference (EPTC), Singapore, 6–8 December 2023; pp. 948–951. [Google Scholar] [CrossRef]
  35. Anajemba, J.H.; Iwendi, C.; Razzak, I.; Ansere, J.A.; Okpalaoguchi, I.M. A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications. IEEE Trans. Ind. Inform. 2022, 18, 6445–6454. [Google Scholar] [CrossRef]
  36. Ogunseyi, T.B.; Bo, T.; Yang, C. A Privacy-Preserving Framework for Cross-Domain Recommender Systems. Comput. Electr. Eng. 2021, 93, 107213. [Google Scholar] [CrossRef]
  37. Bertino, E. Data Security and Privacy in the IoT. Open Proceeding 2016, 2016, 1–3. [Google Scholar] [CrossRef]
  38. Wei, Z.; Pei, Q.; Zhang, N.; Liu, X.; Wu, C.; Taherkordi, A. Lightweight Federated Learning for Large-Scale IoT Devices with Privacy Guarantee. IEEE Internet Things J. 2023, 10, 3179–3191. [Google Scholar] [CrossRef]
  39. Karunarathne, S.M.; Saxena, N.; Khan, M.K. Security and Privacy in IoT Smart Healthcare. IEEE Internet Comput. 2021, 25, 37–48. [Google Scholar] [CrossRef]
  40. Hui, S.; Wang, Z.; Hou, X.; Wang, X.; Wang, H.; Li, Y.; Jin, D. Systematically Quantifying IoT Privacy Leakage in Mobile Networks. IEEE Internet Things J. 2021, 8, 7115–7125. [Google Scholar] [CrossRef]
  41. Ghosh, T.; Roy, A.; Misra, S.; Raghuwanshi, N.S. CASE: A Context-Aware Security Scheme for Preserving Data Privacy in IoT-Enabled Society 5.0. IEEE Internet Things J. 2022, 9, 2497–2504. [Google Scholar] [CrossRef]
  42. Kadir, N.; Kaur, R.; Rodrigues, T.; Kashef, R. Post COVID-19 Vaccination: Infection Rate Analysis Using Time Series Modeling. In Proceedings of the 2024 International Conference on Machine Intelligence and Smart Innovation (ICMISI), Alexandria, Egypt, 12–14 May 2024; pp. 266–271. [Google Scholar] [CrossRef]
  43. Kaur, R.; Mohammadi, F. Comparative Analysis of Power Efficiency in Heterogeneous CPU-GPU Processors. In Proceedings of the 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), Las Vegas, NV, USA, 24–27 July 2023; pp. 756–758. [Google Scholar]
  44. Deebak, B.D.; Hwang, S.O. Privacy-Preserving Learning Model Using Lightweight Encryption for Visual Sensing Industrial IoT Devices. IEEE Trans. Emerg. Top. Comput. Intell. 2025, 9, 3039–3056. [Google Scholar] [CrossRef]
  45. Asad, A.; Kaur, R.; Mohammadi, F. Noise Suppression Using Gated Recurrent Units and Nearest Neighbor Filtering. In Proceedings of the 2022 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 14–16 December 2022; pp. 368–372. [Google Scholar] [CrossRef]
  46. Kaur, R.; Asad, A.; Mohammadi, F. A Comprehensive Review of Processing-in-Memory Architectures for Deep Neural Networks. Computers 2024, 13, 174. [Google Scholar] [CrossRef]
  47. Kaur, R.; Asad, A.; Al Abdul Wahid, S.; Mohammadi, F. A Survey of Advancements in Scheduling Techniques for Efficient Deep Learning Computations on GPUs. Electronics 2025, 14, 1048. [Google Scholar] [CrossRef]
  48. Wang, R.; Lai, J.; Li, X.; He, D.; Khan, M.K. RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things. J. Netw. Comput. Appl. 2024, 221, 103768. [Google Scholar] [CrossRef]
  49. Asad, A.; Kaur, R.; Mohammadi, F. A Survey on Memory Subsystems for Deep Neural Network Accelerators. Future Internet 2022, 14, 146. [Google Scholar] [CrossRef]
  50. Abdel-Basset, M.; Hawash, H.; Moustafa, N.; Razzak, I.; Elfattah, M.A. Privacy-preserved learning from non-iid data in fog-assisted IoT: A federated learning approach. Digit. Commun. Netw. 2024, 10, 404–415. [Google Scholar] [CrossRef]
  51. Kaur, R.; Bansal, M. BDD Ordering and Minimization Using Various Crossover Operators in Genetic Algorithm. Int. J. Innov. Res. Electr. Electron. Instrum. Control. Eng. 2014, 2, 1247–1253. Available online: www.ijireeice.com (accessed on 12 February 2025).
  52. Joshi, P.; Hasanuzzaman, M.; Thapa, C.; Afli, H.; Scully, T. Enabling All In-Edge Deep Learning: A Literature Review. IEEE Access 2023, 11, 3431–3460. [Google Scholar] [CrossRef]
  53. Abdul Wahid, S.A.; Asad, A.; Kaur, R.; Mohammadi, F. Quantum Computing Circuit Design: A Tutorial. In Proceedings of the 2024 International Conference on Advanced Scientific Computing (ICASC), Cluj-Napoca, Romania, 23–25 October 2024; pp. 1–6. [Google Scholar] [CrossRef]
  54. Sun, P.; Wan, Y.; Wu, Z.; Fang, Z.; Li, Q. A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies, Protection Measures and Future Directions. Comput. Secur. 2025, 148, 104097. [Google Scholar] [CrossRef]
  55. Jia, Y.; Song, Y.; Liu, Z.; Tan, Q.; Song, Y.; Zhang, Y.; Liu, Z. Analyzing Consumer IoT Traffic from Security and Privacy Perspectives: A Comprehensive Survey. arXiv 2024, arXiv:2403.16149. [Google Scholar]
  56. Ramadan, M.N.; Ali, M.A.; Khoo, S.Y.; Alkhedher, M. Federated Learning and TinyML on IoT Edge Devices: Challenges, Advances, and Future Directions. ICT Express 2025, 11, 754–768. [Google Scholar] [CrossRef]
  57. Li, H.; Ge, L.; Tian, L. Survey: Federated Learning Data Security and Privacy-Preserving in Edge-Internet of Things. Artif. Intell. Rev. 2024, 57, 130. [Google Scholar] [CrossRef]
  58. Magara, T.; Zhou, Y. Internet of Things (IoT) of Smart Homes: Privacy and Security. J. Electr. Comput. Eng. 2024, 2024, 7716956. [Google Scholar] [CrossRef]
  59. Khraisat, A.; Alazab, A.; Alazab, M.; Obeidat, A.; Singh, S.; Jan, T. Federated Learning for Intrusion Detection in IoT Environments: A Privacy-Preserving Strategy. Discov. Internet Things 2025, 5, 72. [Google Scholar] [CrossRef]
  60. Dritsas, E.; Trigka, M. A Survey on Cybersecurity in IoT. Future Internet 2025, 17, 30. [Google Scholar] [CrossRef]
  61. Pinto, G.P.; Donta, P.K.; Dustdar, S.; Prazeres, C. A Systematic Review on Privacy-Aware IoT Personal Data Stores. Sensors 2024, 24, 2197. [Google Scholar] [CrossRef]
  62. Dhinakaran, D.; Sankar, S.M.; Selvaraj, D.; Raja, S.E. Privacy-Preserving Data in IoT-Based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv 2024, arXiv:2401.00794. [Google Scholar]
  63. Lee, S.; Tavallaie, O.; Chen, S.; Thilakarathna, K.; Seneviratne, S.; Toosi, A.N.; Zomaya, A.Y. Personalizing Federated Learning for Hierarchical Edge Networks with Non-IID Data. arXiv 2025, arXiv:2504.08872. [Google Scholar] [CrossRef]
  64. Kaur, R.; Asad, A.; Mohammadi, F. A Heterogeneous Scheduling Approach for Efficient Memory Management in IoT Systems. In Proceedings of the 32nd IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2025), Brampton, ON, Canada, 23–25 July 2025. [Google Scholar]
  65. Shahraeeni, A.; Kaur, R.; Kochari, A.; Mohammadi, F.; Asad, A. Empowering IoT with Large Language Models: A Survey of Applications, Challenges, and Future Directions. In Proceedings of the 32nd IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2025), Brampton, ON, Canada, 23–25 July 2025. [Google Scholar]
  66. Lad, I.; Patel, R.; Patel, E.; Kaur, R.; Nasir, M.; Asad, A.; Mohammadi, F. AI-Enabled Phishing Links Detection Using Machine Learning Models. In Proceedings of the 32nd IEEE/ACIS International Summer Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2025), Brampton, ON, Canada, 23–25 July 2025. [Google Scholar]
  67. Gajera, J.; Jahnavi, A.; Pinto, N.; Kaur, R.; Asad, A.; Mohammadi, F. Machine Learning Based Dynamic Overload Surge Protection System for Electrical Appliances. In Proceedings of the 2025 IEEE International Symposium on Circuits and Systems (ISCAS), London, UK, 25–28 May 2025; pp. 1–5. [Google Scholar] [CrossRef]
  68. Al Abdul Wahid, S.; Asad, A.; Kaur, R.; Nguyen, J.; Kalra, D.; Mohammadi, F. Heterogeneous CPU–GPU–Quantum Accelerator. In Proceedings of the 2025 10th International Conference on Computer Science and Engineering (UBMK), Istanbul, Türkiye, 17–21 September 2025; pp. 1333–1338. [Google Scholar] [CrossRef]
Figure 1. Conceptual overview of privacy preservation in IoT systems showing security challenges and protection mechanisms across different layers of the IoT architecture.
Figure 1. Conceptual overview of privacy preservation in IoT systems showing security challenges and protection mechanisms across different layers of the IoT architecture.
Sensors 25 06967 g001
Figure 2. Comparative mapping of major privacy-preserving techniques across IoT layers.
Figure 2. Comparative mapping of major privacy-preserving techniques across IoT layers.
Sensors 25 06967 g002
Figure 3. Taxonomy of Privacy-Preserving Techniques in IoT Systems.
Figure 3. Taxonomy of Privacy-Preserving Techniques in IoT Systems.
Sensors 25 06967 g003
Figure 4. Conceptual hybrid framework integrating encryption, federated learning, and blockchain for end-to-end privacy preservation in IoT environments.
Figure 4. Conceptual hybrid framework integrating encryption, federated learning, and blockchain for end-to-end privacy preservation in IoT environments.
Sensors 25 06967 g004
Figure 5. Research gaps and future directions in IoT privacy-preserving systems.
Figure 5. Research gaps and future directions in IoT privacy-preserving systems.
Sensors 25 06967 g005
Table 1. Summary of privacy-preserving techniques in IoT: categories, methods, datasets, findings, and limitations.
Table 1. Summary of privacy-preserving techniques in IoT: categories, methods, datasets, findings, and limitations.
Ref.Application DomainTechnique CategoryMethod/Model (Keywords)Dataset(s)Key FindingsNoted Limitations
[11]IoT networksLearning-based (feature eng.)Preprocessing + feature selection + J48/BaggingMQTT-IoT-IDS-2020; NSL-KDDUp to 99.86% accuracy with proper preprocessing/feature selectionPossible overfitting; limited cross-domain validation
[15]General IoT (cyberattacks)Learning-based (DL)Stacked ResNets + meta-classifierICS Cyberattack; N-BaIoTHigh accuracy, low per-packet latencyOverfitting risk; limited metrics beyond accuracy
[16]e-Health cloudAccess control/cryptoAAM + ZK (Schnorr); fine-grained accessImpl. prototypeConfidentiality with manageable latencyLatency under load; scalability vs. stronger crypto
[17]e-Health (IoT)Blockchain + access controlAES + ECDSA + SHA-256; on-chain pointersConceptual (no dataset)Decentralized access control; integrityNo empirical overhead analysis
[18]General IoTDifferential privacyEvent-level DP traffic shapingSynthetic streamsPrivacy–delay trade-offs quantifiedBursty traffic harder to hide efficiently
[19]e-Health monitoringBlockchain + IPFSRe-encryption proxy; PoA chainPrototypeSecure, scalable storage split (on/off-chain)Web-style system; real-time path untested
[20]Fog/Cloud IoTTEE-based aggregationIntel SGX; heterogeneous dataConcept/prototypePrivacy for heterogeneous aggregationReal-world deployment pending
[21]Vehicular IoTBlockchain auth.Smart contracts; hash anchoringConcept/prototypeTamper-resistance for vehicle dataLatency/fault tolerance not analyzed
[31]General IoTSurvey/TaxonomyPrivacy models; data minimizationClear layering of privacy concernsNo implementation/experiments
[33]Industrial IoTBlockchain + ML + DPPriModChain (FL + DP + contracts)MNISTCombines trust + privacy in ML sharingHigh federation latency
[37]Large-scale IoTLightweight FLFedL (privacy-preserving)MNISTLinear-time growth with usersHE cost; still non-trivial overhead
[40]Society 5.0 IoTContext-aware sec.CASE (post-encryption reduction)UCI activityReduces post-encryption data sizeLinear delay increase
[54]Cross-domain IoTSurvey (encryption/blockchain)Comprehensive taxonomySynthesizes device–network–cloud threatsHighlights energy/latency overheads
[55]Consumer IoT (smart home)Traffic privacyEncrypted traffic analysis surveyMetadata leakage even without payloadsNeed stronger traffic shaping/obfuscation
[56]Edge IoTFL + TinyMLOn-device FL under constraintsFeasible FL/TinyML co-designAccuracy–energy–latency trade-offs
[57]Edge-IoTFL security surveyFL + DP + HE + secure agg.Catalogs FL privacy risks/defensesOpen issues: poisoning, non-IID, comms
[58]Smart homesDomain surveyAuthN/AuthZ; lightweight cryptoDomain-specific threat landscapeFragmented device ecosystems
[59]IoT intrusion detectionFL applicationFL-based IDS (privacy-preserving)Network tracesPreserves data locality; good detectionFL robustness to attacks still open
[60]General IoTCybersecurity surveyHolistic IoT security incl. privacyBroad coverage of threats/controlsHigh-level; fewer empirical results
[61]User-centric IoTPersonal Data StoresPrivacy-aware PDS; consent/usage controlUser control and transparency patternsAdoption/standardization challenges
[62]IoT + CloudSurvey (AI + privacy)DP, HE, AI-integrated pipelinesEnd-to-end pipeline considerationsMany proposals lack deployment data
[63]Hierarchical edge IoTFL personalizationFed. learning on non-IID hierarchical edgesPersonalization improves FL qualitySecurity/privacy of personalization layers
Table 2. Datasets used in the reviewed IoT privacy studies, including their domain, size, preprocessing steps, and indication of empirical versus theoretical nature.
Table 2. Datasets used in the reviewed IoT privacy studies, including their domain, size, preprocessing steps, and indication of empirical versus theoretical nature.
Ref.Dataset/SourceDomain/ApplicationSize/SamplesPreprocessing and DescriptionEmpirical/Theoretical Note
[3]Yale B Face DatabaseFace recognition for IoT cameras2414 images of 38 subjectsImages resized to 64 × 64 pixels; normalized grayscale; Bloom-filter encoding applied before classificationEmpirical study
[7]Custom IoMT Breast-Cancer DatasetHealthcare (IoMT)5200 labeled recordsFeature extraction (texture + shape), normalized; trained with CNN/ANNEmpirical study
[10]Yoga Posture Dataset (Kaggle)Human-posture sensing via IR sensors93,200 images of 26 postures; 224 × 224 px resolutionImages annotated manually; balanced per class; lighting and angle normalization performedEmpirical study
[11]MQTT-IoT-IDS 2020/NSL-KDDIntrusion detection for IoT networks~370 k samples (45 features)Data cleaning, feature scaling, correlation-based feature selectionEmpirical study
[13]Industrial IoT privacy frameworkN/AConceptual framework without dataset; analytical comparison onlyTheoretical study (no data)
[15]ICS Cyberattack/N-BaIoTCyberattack detection100 k network tracesNormalized flow features; applied stacked ResNet for classificationEmpirical study
[16]Prototype logs (hospital IoT)e-Health access control8000 transaction logsAES-encrypted patient data tested in simulated hospital networkEmpirical study
[17]e-Health blockchain privacy modelN/AArchitecture diagram only; simulated workflowTheoretical study
[18]Synthetic IoT StreamsDifferential privacy traffic shaping1 M eventsLaplace noise applied; latency vs. privacy ε measuredEmpirical study
[19]Blockchain + IPFS storage for health dataN/AFramework described; no datasetTheoretical study
[20]Edge-Gateway Prototype LogsFog/Cloud aggregation25 k recordsSimulated heterogeneous devices; TEE latency measuredEmpirical study
[21]Vehicular IoT Simulation (Veins/SUMO)VANET blockchain auth.10 k vehicle eventsCryptographic hash and delay measured under mobilityEmpirical study
[33]MNISTFL + DP model evaluation60 k images 28 × 28 pxData normalized; DP noise added before aggregationEmpirical study
[54]Cross-domain IoT surveyN/AReview of multi-layer IoT privacy datasetsTheoretical survey
[56]FL + TinyML edge frameworkN/AConceptual FL prototype; simulation results onlyTheoretical/simulation
[57]FL security survey (Edge-IoT)N/ALiterature synthesisTheoretical survey
[59]Network Trace Dataset (CICIDS 2018)Intrusion detection via FL~80 k network flowsFlow normalization; feature scaling before FL trainingEmpirical study
[61]IoT personal data store frameworkN/AArchitecture discussion; no datasetsTheoretical study
[62]IoT–Cloud AI privacy surveyN/ATheoretical integration of AI and cloud privacyTheoretical survey
Table 3. Analytical and architectural models employed in IoT privacy research, detailing their structure, mathematical formulation, and evaluation objectives.
Table 3. Analytical and architectural models employed in IoT privacy research, detailing their structure, mathematical formulation, and evaluation objectives.
Ref.Model/FrameworkTechnique CategoryKey Architectural or Mathematical Details (Plain-Text)Evaluation Metric/Goal
[3]Hybrid ML Pipeline (Decision Tree + SVM + Naïve Bayes)Feature-based LearningEnsemble voting classifier combining probabilistic and margin-based learners; normalized feature vector x in R^45.Accuracy, Precision, Recall
[7]CNN + ANN (IoMT Breast-Cancer Diagnosis)Deep Learning5 Convolution layers (3 × 3 kernels) + 2 fully connected layers; ReLU activation; Softmax output; dropout rate 0.3.Accuracy, Loss, F1-Score
[10]Random Forest + Threshold SensingShallow MLFeature extraction from IR-sensor frames; temporal smoothing filter applied.F1 = 0.9989, Precision, Recall
[11]J48 Decision Tree + Bagging + Feature SelectionClassical ML IDSCorrelation-based Feature Selection (CFS); Bagging ensemble; 10-fold cross validation.Accuracy 99.86%
[13]Privacy Index Computation ModelAnalytical ModelPrivacy Index PI = 1 − (Sp/St), where Sp = sensitive data protected, St = total data collected.Privacy Index
[15]Stacked ResNet for Cyberattack DetectionDeep CNN5 ResNet blocks (each Conv + BatchNorm + ReLU + skip connection); Fusion layer concatenates multi-scale features; Softmax output (12 classes).Accuracy, ROC-AUC, Latency
[16]Zero-Knowledge Proof (ZKP) + Access ControlCryptographic ProtocolSchnorr-based ZKP: gr = a · yc (mod p); AES-128 encryption; ECC for key exchange.Response Time, Security Level
[17]Blockchain + Attribute-Based Encryption (ABE)Hybrid FrameworkSmart-contract-controlled ABE with SHA-256 hash indexing and multi-signature verification.Integrity Ratio, Latency
[18]Event-Level Differential Privacy ModelStatistical ModelLaplace mechanism: x′ = x + Laplace(Δf/ε); evaluated privacy–delay trade-off.Mean Latency, ε–Utility Curve
[19]Blockchain + IPFS Hybrid StorageDistributed SystemOff-chain storage for encrypted payloads; on-chain metadata hashes; Proof-of-Authority consensus.Access Latency, Throughput
[20]Trusted Execution Environment (TEE) AggregatorSecure Hardware ModelIntel SGX enclave executing encrypted aggregation; remote attestation enabled.Aggregation Delay, Power
[21]Blockchain-Based Vehicular AuthSecurity ProtocolSmart contracts + hash chain; ECDSA elliptic-curve keys for authentication.Avg. Tx Delay, Packet Loss
[33]PriModChain (FL + DP + Blockchain)Hybrid Privacy FrameworkFL global model update: w_t = Σ_k (p_k · w_k); DP noise added before aggregation; on-chain update logging.Accuracy, Latency, Privacy Budget
[37]Lightweight Federated Learning (FedL)Distributed LearningGradient compression ratio ρ = 0.5; secure aggregation using homomorphic encryption.Accuracy, Communication Cost
[40]Context-Aware Security Engine (CASE)Contextual AIFeature reduction via PCA; context-triggered encryption selection based on device state.Accuracy, Response Time
[54]Multi-Layer IoT Survey ModelTaxonomy ModelClassifies privacy mechanisms by layer (Device, Network, Edge, Cloud).Conceptual Taxonomy
[56]FL + TinyML Co-Design FrameworkEdge LearningQuantized 8-bit CNN for microcontrollers; FedAvg algorithm with local epoch E = 5.Accuracy, Energy Consumption
[57]Federated Learning Security SurveyAnalytical FrameworkComparative analysis of HE, DP, and secure aggregation methods in Edge FL.Conceptual Synthesis
[59]FL-Based Intrusion Detection System (IDS)Federated ApplicationFL with Adam optimizer; 3 dense layers (64-32-16 neurons); uses CICIDS 2018 dataset.Detection Rate, F1-Score
[61]Privacy-Aware Personal Data Store (PDS)Data Management ModelSemantic ontology-based data schema; policy engine manages access tokens.Qualitative Evaluation
Table 4. Strengths and limitations of selected privacy-preserving approaches in IoT systems, covering encryption, blockchain, federated learning, and hybrid edge–cloud models.
Table 4. Strengths and limitations of selected privacy-preserving approaches in IoT systems, covering encryption, blockchain, federated learning, and hybrid edge–cloud models.
Ref.Technique/FocusMajor StrengthsKey Limitations
[3]Bloom-filter-based face recognition (IoT)Lightweight storage, 92% accuracy on Yale B datasetLimited to facial data; prone to false positives
[7]AES + Triple DES for IoMT (breast-cancer detection)High classification accuracy (CNN 98.5%, ANN 99.2%)High memory/storage demand; hardware-heavy
[10]Device-free posture recognition via IR sensorsNear-perfect F1-score (0.9989); privacy-preserving sensingLow-resolution sensors; deployment-scale untested
[11]Feature-selection + ML for intrusion detectionAccurate (99.86%); shows preprocessing impactPossible overfitting; limited datasets
[15]Stacked ResNet for IoT cyberattack detectionHigh predictive accuracy; real-time packet analysisPotential overfitting; lacks performance metrics
[16]Zero-Knowledge + access control in e-HealthStrong authentication and anonymityHigh response latency under load
[17]Blockchain-based e-Health privacyDecentralized access control; integrityTheoretical; no performance validation
[19]Blockchain + IPFS for medical dataCombines encryption, off-chain storageTested only as web prototype
[20]TEE-based data aggregationPrivacy for heterogeneous dataUnimplemented for real IoT workloads
[21]Blockchain for vehicular IoTSecure, decentralized communicationLatency/fault tolerance not studied
[28]G-BHO meta-heuristic for IIoT privacyHigh security gain (>89%)No real-world validation
[33]PriModChain (Blockchain + FL + DP)Integrates trust, privacy, learningHigh federation latency; heavy computation
[37]Lightweight FL (FedL)Linear scaling with usersHomomorphic encryption cost high
[40]CASE model for Society 5.0 IoTReduces post-encryption data sizeIncreases network delay linearly
[54]Survey on IoT privacy/securityComprehensive taxonomy; identifies multi-layer threatsHigh-level overview; lacks implementation metrics
[55]Consumer IoT traffic analysisExposes metadata privacy leaksNeeds stronger traffic obfuscation
[56]FL + TinyML on edge devicesEnables on-device learning under constraintsEnergy–accuracy trade-off unresolved
[57]FL data security survey (Edge-IoT)Synthesizes FL privacy risks and countermeasuresCommunication cost; non-IID challenges
[58]Smart-home IoT privacy surveyDomain-specific threat insightsFragmented vendor ecosystems
[59]FL-based intrusion detectionPreserves data locality; strong detectionFL robustness to poisoning untested
[60]IoT cybersecurity overviewBroad coverage of IoT threats and controlsLimited empirical depth
[61]Privacy-aware personal data storesUser-centric transparency and consentLacks large-scale adoption examples
[62]AI-integrated IoT cloud privacy surveyEnd-to-end data-pipeline viewNo deployment metrics; conceptual
[63]Hierarchical FL personalizationImproves FL accuracy for non-IID dataSecurity/privacy of personalization layers open
Table 5. Summary of identified research gaps and corresponding recommendations across privacy-preserving IoT studies (2016–2025).
Table 5. Summary of identified research gaps and corresponding recommendations across privacy-preserving IoT studies (2016–2025).
Ref.Identified Research GapRecommended Future Direction
[3]Bloom filter encoding is non-reversible and lacks data backup mechanism.Introduce reversible key-based encryption integrated with bloom encoding.
[7]CNN-based IoMT model demands high storage and computing resources.Employ cloud/edge offloading and lightweight model compression.
[10]Limited dataset (26 postures) reduces model generalization.Extend experiments with larger, diverse subject datasets.
[11]Handling of outliers and unbalanced data not discussed.Integrate anomaly detection and adaptive re-sampling strategies.
[13]Comparison with FL and SplitNN models missing.Evaluate classifier performance vs. communication cost using federated settings.
[15]Possible overfitting and lack of broader metrics.Validate on cross-domain datasets and include latency/energy analysis.
[16]Limited testing of non-common network threats.Extend experiments to DDoS, poisoning, and replay attacks.
[17]Model not implemented; computational cost unknown.Prototype deployment for overhead and scalability analysis.
[18]Shaper design efficiency under burst traffic uncertain.Optimize event-level DP models using traffic correlation.
[19]System limited to web-based prototype.Develop real-time blockchain-enabled health monitoring testbeds.
[20]Proof-of-concept lacks real-time validation.Implement full-scale deployment using Intel SGX or AMD SEV.
[21]Missing comparison for latency and fault tolerance.Benchmark blockchain-based vehicular IoT under dynamic mobility.
[23]Limited flexibility and latency in private FL.Integrate RFID-based automatic on-chain identification.
[25]Narrow application scope (six IoT use cases).Broaden dataset; adopt chatbot-based PbD assistance.
[26]Prototype not tested on real data.Apply to large-scale finance or insurance IoT systems.
[28]Evaluated only via simulation.Validate industrial implementation using live sensor data.
[30]Equilibrium model theoretical only.Apply to aggregated IoT datasets for empirical confirmation.
[31]No implementation evaluation.Compare privacy-minimization methods experimentally.
[32]Legal/ethical aspects missing.Collaborate with healthcare regulators for compliance studies.
[33]High latency in federated rounds.Optimize communication scheduling and adaptive intervals.
[35]Computationally heavy recommender model.Explore pruning and parallel training to reduce overhead.
[37]Limited balance between privacy and speed.Investigate hybrid HE + DP approaches for efficiency.
[39]Metrics for privacy leakage unclear.Extend model evaluation with multiple datasets and leak indices.
[40]Performance comparison incomplete.Analyze accuracy–latency trade-offs with additional models.
[41]Extra hashing adds overhead on WSNs.Develop lightweight hash variants for constrained sensors.
[54]Lack of empirical validation across multi-layer IoT.Conduct quantitative benchmarks and real deployments.
[55]Metadata-level leaks not fully addressed.Apply advanced traffic obfuscation and packet padding.
[56]Energy–accuracy trade-off unresolved in FL/TinyML.Co-optimize energy consumption and model precision.
[57]Limited exploration of poisoning and communication costs.Employ secure aggregation and adaptive client selection.
[58]Fragmented device ecosystems in smart homes.Standardize protocols and unify vendor authentication layers.
[59]FL intrusion detection untested against adversarial attacks.Include adversarial robustness evaluation.
[60]High-level survey, lacks quantitative depth.Incorporate performance benchmarking of cited solutions.
[61]PDS adoption slow due to missing standards.Establish interoperability frameworks and open APIs.
[62]Conceptual AI–IoT integration lacks deployment results.Build AI-driven, privacy-aware IoT cloud demonstrators.
[63]Personalization layer in hierarchical FL unverified.Investigate secure personalization preserving user privacy.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kaur, R.; Rodrigues, T.; Kadir, N.; Kashef, R. A Survey on Privacy Preservation Techniques in IoT Systems. Sensors 2025, 25, 6967. https://doi.org/10.3390/s25226967

AMA Style

Kaur R, Rodrigues T, Kadir N, Kashef R. A Survey on Privacy Preservation Techniques in IoT Systems. Sensors. 2025; 25(22):6967. https://doi.org/10.3390/s25226967

Chicago/Turabian Style

Kaur, Rupinder, Tiago Rodrigues, Nourin Kadir, and Rasha Kashef. 2025. "A Survey on Privacy Preservation Techniques in IoT Systems" Sensors 25, no. 22: 6967. https://doi.org/10.3390/s25226967

APA Style

Kaur, R., Rodrigues, T., Kadir, N., & Kashef, R. (2025). A Survey on Privacy Preservation Techniques in IoT Systems. Sensors, 25(22), 6967. https://doi.org/10.3390/s25226967

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop