Next Article in Journal
A Study of a GNSS/IMU System for Object Localization and Spatial Position Estimation
Previous Article in Journal
Impact of Underwater Image Enhancement on Feature Matching
Previous Article in Special Issue
Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

A Survey on Privacy Preservation Techniques in IoT Systems

Electrical, Computer and Biomedical Engineering Department, Toronto Metropolitan University, 350 Victoria St, Toronto, ON M5B2K3, Canada
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(22), 6967; https://doi.org/10.3390/s25226967
Submission received: 12 March 2025 / Revised: 7 November 2025 / Accepted: 13 November 2025 / Published: 14 November 2025
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Networks (WSNs))

Abstract

The Internet of Things (IoT) has become deeply embedded in modern society, enabling applications across smart homes, healthcare, industrial automation, and environmental monitoring. However, as billions of interconnected devices continuously collect and exchange sensitive data, privacy and security concerns have escalated. This survey systematically reviews the state-of-the-art privacy-preserving techniques in IoT systems, emphasizing approaches that protect user data during collection, transmission, and storage. Peer-reviewed studies from 2016 to 2025 and technical reports were analyzed to examine applied mechanisms, datasets, and analytical models. Our analysis shows that blockchain and federated learning are the most prevalent decentralized privacy-preserving methods, while homomorphic encryption and differential privacy have recently gained traction for lightweight and edge-based IoT implementations. Despite these advancements, challenges persist, including computational overhead, limited scalability, and real-time performance constraints in resource-constrained devices. Furthermore, gaps remain in cross-domain interoperability, energy-efficient cryptographic designs, and privacy solutions for Unmanned Aerial Vehicle (UAV) and vehicular IoT systems. This survey offers a comprehensive overview of current research trends, identifies critical limitations, and outlines promising future directions to guide the design of secure and privacy-aware IoT architectures.
Keywords: Internet of Things (IoT); privacy preservation; blockchain; federated learning; differential privacy; homomorphic encryption; edge computing; security threats Internet of Things (IoT); privacy preservation; blockchain; federated learning; differential privacy; homomorphic encryption; edge computing; security threats

Share and Cite

MDPI and ACS Style

Kaur, R.; Rodrigues, T.; Kadir, N.; Kashef, R. A Survey on Privacy Preservation Techniques in IoT Systems. Sensors 2025, 25, 6967. https://doi.org/10.3390/s25226967

AMA Style

Kaur R, Rodrigues T, Kadir N, Kashef R. A Survey on Privacy Preservation Techniques in IoT Systems. Sensors. 2025; 25(22):6967. https://doi.org/10.3390/s25226967

Chicago/Turabian Style

Kaur, Rupinder, Tiago Rodrigues, Nourin Kadir, and Rasha Kashef. 2025. "A Survey on Privacy Preservation Techniques in IoT Systems" Sensors 25, no. 22: 6967. https://doi.org/10.3390/s25226967

APA Style

Kaur, R., Rodrigues, T., Kadir, N., & Kashef, R. (2025). A Survey on Privacy Preservation Techniques in IoT Systems. Sensors, 25(22), 6967. https://doi.org/10.3390/s25226967

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop