An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain
Abstract
1. Introduction
- Lack of integrated security orchestration: While individual solutions exist for specific security aspects, there is no comprehensive framework that coordinates multiple security mechanisms in real time.
- Resource constraints management: Current solutions often impose unsustainable computational and energy demands on resource-limited IoT devices.
- Adaptability limitations: Existing frameworks struggle to dynamically adjust security measures in response to emerging threats and changing device contexts.
- Quantum vulnerability: Many current IoT security solutions rely on cryptographic approaches that will become vulnerable to quantum computing attacks.
- Privacy-security balance: There is insufficient integration between privacy-preservation mechanisms and security measures in existing solutions.
- The development of an AI-driven security orchestration mechanism that coordinates multiple adaptive components through reinforcement learning, enabling the continuous optimization of security responses in dynamic IoT environments.
- The integration of lightweight, quantum-resistant cryptographic techniques using a hybrid encryption model that balances classical and post-quantum algorithms, suitable for constrained IoT systems.
- The design and simulation of a permissioned blockchain-based identity and access management model that facilitates decentralized, tamper-resistant authentication with minimal communication and verification overhead.
- The development of an autonomous security strategy that leverages Digital Twins and Markov Decision Processes (MDP) for predictive threat analysis and context-aware mitigation actions.
- The proposal of a privacy-preserving data processing method based on differential privacy with dynamic budget adjustment, enabling adaptive control over data utility and confidentiality.
- The conceptual integration of federated learning with Digital Twin updates to improve distributed threat generalization while maintaining data locality and privacy.
- A simulation-based evaluation of the complete framework using heterogeneous IoT device profiles (ranging from 40–120 MHz CPU and 32–128 MB memory), demonstrating low processing (0.02%), memory (0.015%), and energy overhead (<1.5 mAh/day), with high detection accuracy (85–99%) and rapid response times (2 s).
2. Related Work
3. Integrated Adaptive Security Framework for IoT (IASF-IoT)
3.1. AI-Driven Security Orchestration
3.2. Blockchain-Based Identity and Access Management
3.3. Quantum-Resistant Cryptography Integration
3.4. Autonomous Security with Digital Twins
3.5. Privacy-Preserving Data Processing
3.6. Adaptive Content Authentication
4. Performance Modeling of the IASF-IoT Framework
4.1. Performance Parameters and Equations
- : Processing power of the IoT device (MHz);
- M: Available memory (MB);
- : Battery capacity (mAh);
- B: Network bandwidth (Mbps);
- : Size of security overhead (KB);
- F: Frequency of security operations (per hour);
- V: Voltage (V);
- T: Total runtime (hours);
- : Baseline network latency (seconds).
4.2. Performance Evaluation and Implications
- MHz;
- MB;
- mAh;
- Mbps;
- KB;
- (security check every 10 min);
- V;
- h;
- s.
Calculations
4.3. Sensitivity Analysis
- Processing power: 40 MHz to 120 MHz.
- Memory: 32 MB to 128 MB.
- Security overhead: 5 KB to 20 KB.
- Frequency of security operations: 3 to 12 per hour.
- Processing impact remains below 0.05% across all scenarios.
- Memory usage stays under 0.1% in all cases.
- Energy consumption varies between 0.3 mAh to 1.5 mAh per day.
- Added latency ranges from 0.025 to 0.1 s per operation.
5. Experimental Validation (Simulated)
5.1. Simulation Scope and Practical Modeling Boundaries
- Quantum-resistant cryptography was conceptually integrated but not practically implemented. This is because there is not a mature quantum-computing simulation tool available yet.
- The blockchain component is known to introduce delays. So to simplify and speed up the work, the process was simplified to a conceptual representation with a fixed delay overhead. These represent the transaction and identity verification overheads. Thus, complexities associated with full blockchain network simulations are avoided, especially since it is already established that Blockchain will introduce known delays.
- Federated learning and Digital Twins were assumed to have constant communication overhead and synchronization delays. These were almost negligible on the operation of the framework, so they were represented as fixed overheads in the model.
- Threats were modeled based on established statistical profiles rather than actual cyberattacks. So assumptions were made based on employing an exponential distribution for response times and a uniform distribution for detection accuracy.
5.2. Scenario and Attack Model
5.3. Results
- Processing Impact: The average computational overhead introduced by security checks was under 0.05%, confirming minimal interference with regular device operations (see Figure 4).
- Memory Usage: Security components utilized less than 0.1% of the devices’ available memory, affirming their suitability for deployment on memory-constrained devices (see Figure 4).
- Energy Consumption: The daily energy overhead ranged between 0.3 and 1.5 mAh per device, indicating high efficiency suitable for long-term IoT deployments without significantly compromising battery life (see Table 4).
- Security Effectiveness: The adaptive security framework demonstrated excellent threat detection accuracy, consistently achieving detection rates between 85% and 99%. Response times to detected threats averaged approximately 2 s, showcasing the framework’s rapid response capabilities (see Table 5 and Figure 5).
5.4. Discussion
6. Implications and Future Directions
6.1. Scalability Considerations
- Hierarchical blockchain architectures for efficient identity verification at scale;
- Edge computing infrastructure deployment to distribute computational loads;
- Context-aware security policies with dynamic resource allocation based on network size;
- Federated learning paradigms to maintain distributed intelligence without centralized bottlenecks.
6.2. Limitations and Research Directions
7. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
IoT | Internet of Things |
IASF-IoT | Integrated Adaptive Security Framework for IoT |
FL | Federated Learning |
MDP | Markov Decision Process |
IAM | Identity and Access Management |
PQC | Post-Quantum Cryptography |
DDoS | Distributed Denial-of-Service |
SHA | Secure Hash Algorithm |
OQS | Open Quantum Safe |
PoC | Proof of Concept |
RL | Reinforcement Learning |
Q-Learning | Quality Learning Algorithm |
SCADA | Supervisory Control and Data Acquisition |
PK | Public Key |
HRAAP | Heterogeneous Remote Anonymous Authentication Protocol |
DT | Digital Twin |
DP | Differential Privacy |
ML | Machine Learning |
KYBER | CRYSTALS-Kyber (Post-Quantum Cryptography Algorithm) |
NTRU | Nth Degree Truncated Polynomial Ring Units |
References
- Elkhodr, M.; Shahrestani, S.; Cheung, H. Wireless enabling technologies for the Internet of Things. In Innovative Research and Applications in Next-Generation High Performance Computing; IGI Global: Hershey, PA, USA, 2016; pp. 368–396. [Google Scholar]
- Zhao, L.; Yang, Q.; Huang, H.; Guo, L.; Jiang, S. Intelligent wireless sensing driven metaverse: A survey. Comput. Commun. 2024, 214, 46–56. [Google Scholar] [CrossRef]
- Chengna, W.; Jiahao, Z.; Sen, Z.; Xingze, W. Trust evaluation mechanism for data collection in smart cities. Discov. Comput. 2025, 28, 67. [Google Scholar] [CrossRef]
- Izuazu, U.U.; Nwakanma, C.I.; Kim, D.S.; Lee, J.M. Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks. Discov. Internet Things 2025, 5, 9. [Google Scholar] [CrossRef]
- Khasawneh, H.J.; Al Asbahi, R.; Alzariqi, A.W.; Al Qada, D.R.; Bujuk, A.; Nawfal, M.A.; Tareen, M. Industrial IoT-based submetering solution for real-time energy monitoring. Discov. Internet Things 2025, 5, 15. [Google Scholar] [CrossRef]
- Liu, P.; Wu, X.; Peng, Y.; Shan, H.; Mahmoudi, S.; Choi, B.J.; Lao, H. Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing. J. Cloud Comput. 2025, 14, 2. [Google Scholar] [CrossRef]
- Kumari, M.; Gaikwad, M.; Chavan, S.A. A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare. Discov. Internet Things 2025, 5, 54. [Google Scholar] [CrossRef]
- Kaufman, E.; Hoffner, Y. Smart home and spaces with multiple stakeholders: Automation, conflicts, security and recommender systems. Discov. Internet Things 2025, 5, 55. [Google Scholar] [CrossRef]
- Paul, T. Internet of Things and 5G are the revolution to the banking industry using neuro-fuzzy technique. Discov. Comput. 2025, 28, 56. [Google Scholar] [CrossRef]
- Ciaramella, G.; Martinelli, F.; Santone, A.; Mercaldo, F. A method for smart grid intrusion detection through explainable deep learning. J. Comput. Virol. Hacking Tech. 2025, 21, 9. [Google Scholar] [CrossRef]
- Alqudhaibi, A.; Albarrak, M.; Jagtap, S.; Williams, N.; Salonitis, K. Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management. Cyber Secur. Appl. 2025, 3, 100067. [Google Scholar] [CrossRef]
- Asiri, M.; Saxena, N.; Gjomemo, R.; Burnap, P. Understanding indicators of compromise against cyber-attacks in industrial control systems: A security perspective. ACM Trans. Cyber-Phys. Syst. 2023, 7, 15. [Google Scholar] [CrossRef]
- Salama, R.; Altrjman, C.; Al-Turjman, F. Healthcare cybersecurity challenges: A look at current and future trends. In Computational Intelligence and Blockchain in Complex Systems; Elsevier: Amsterdam, The Netherlands, 2024; pp. 97–111. [Google Scholar]
- Hudda, S.; Haribabu, K. A review on WSN based resource constrained smart IoT systems. Discov. Internet Things 2025, 5, 56. [Google Scholar] [CrossRef]
- Elkhodr, M.; Mufti, Z.B. On the challenges of data provenance in the Internet of Things. arXiv 2019, arXiv:1907.07316. [Google Scholar]
- Adil, M.; Khan, M.K.; Kumar, N.; Attique, M.; Farouk, A.; Guizani, M.; Jin, Z. Healthcare Internet of Things: Security threats, challenges, and future research directions. IEEE Internet Things J. 2024, 11, 19046–19069. [Google Scholar] [CrossRef]
- Elkhodr, M.; Shahrestani, S.; Cheung, H. An approach to enhance the security of remote health monitoring systems. In Proceedings of the 4th International Conference on Security of Information and Networks, Sydney, NSW, Australia, 14–19 November 2011; pp. 205–208. [Google Scholar]
- Li, C.; Wang, J.; Wang, S.; Zhang, Y. A review of IoT applications in healthcare. Neurocomputing 2024, 565, 127017. [Google Scholar] [CrossRef]
- Yadav, A.; Gangarde, R. Quantum Computing and Cryptography: Addressing Emerging Threats. In Proceedings of the 2024 International Conference on Intelligent Systems and Advanced Applications (ICISAA), Pune, India, 25–26 October 2024; pp. 1–5. [Google Scholar]
- Guembe, B.; Azeta, A.; Misra, S.; Osamor, V.C.; Fernandez-Sanz, L.; Pospelova, V. The emerging threat of ai-driven cyber attacks: A review. Appl. Artif. Intell. 2022, 36, 2037254. [Google Scholar] [CrossRef]
- Almotiri, S.H. AI driven IOMT security framework for advanced malware and ransomware detection in SDN. J. Cloud Comput. 2025, 14, 19. [Google Scholar] [CrossRef]
- Arnob, A.K.B.; Mridha, M.; Safran, M.; Amiruzzaman, M.; Islam, M.R. An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data. Int. J. Comput. Intell. Syst. 2025, 18, 19. [Google Scholar] [CrossRef]
- Chakraverti, A.K.; Saini, K.; Raj, G.; Sharad, S.; Singh, M.K. Enhancing healthcare system for patient data with HEO-PRAFT consensus mechanism using SPS authentication based EPRSS encryption. Biomed. Signal Process. Control 2025, 109, 108050. [Google Scholar] [CrossRef]
- Bhardwaj, A.; Bharany, S.; Rehman, A.U.; Tejani, G.G.; Hussen, S. Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation. Eurasip J. Inf. Secur. 2025, 2025, 1. [Google Scholar] [CrossRef]
- Sharma, N.; Dhiman, P. A survey on IoT security: Challenges and their solutions using machine learning and blockchain technology. Clust. Comput. 2025, 28, 313. [Google Scholar] [CrossRef]
- Gokkaya, B.; Karafili, E.; Aniello, L.; Halak, B. Global supply chains security: A comparative analysis of emerging threats and traceability solutions. Benchmarking Int. J. 2024, 32, 917–942. [Google Scholar] [CrossRef]
- Razaulla, S.; Fachkha, C.; Markarian, C.; Gawanmeh, A.; Mansoor, W.; Fung, B.C.; Assi, C. The age of ransomware: A survey on the evolution, taxonomy, and research directions. IEEE Access 2023, 11, 40698–40723. [Google Scholar] [CrossRef]
- Cha, S.C.; Meng, W.; Li, W.W.; Yeh, K.H. A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2. Comput. Ind. Eng. 2023, 178, 109091. [Google Scholar] [CrossRef]
- Saraiva, D.A.; Leithardt, V.R.Q.; de Paula, D.; Sales Mendes, A.; González, G.V.; Crocker, P. Prisec: Comparison of symmetric key algorithms for iot devices. Sensors 2019, 19, 4312. [Google Scholar] [CrossRef]
- Liu, Z.; Azarderakhsh, R.; Kim, H.; Seo, H. Efficient software implementation of ring-LWE encryption on IoT processors. IEEE Trans. Comput. 2017, 69, 1424–1433. [Google Scholar] [CrossRef]
- Braeken, A. PUF based authentication protocol for IoT. Symmetry 2018, 10, 352. [Google Scholar] [CrossRef]
- Al-amri, R.; Murugesan, R.K.; Man, M.; Abdulateef, A.F.; Al-Sharafi, M.A.; Alkahtani, A.A. A review of machine learning and deep learning techniques for anomaly detection in IoT data. Appl. Sci. 2021, 11, 5320. [Google Scholar] [CrossRef]
- DeMedeiros, K.; Hendawi, A.; Alvarez, M. A survey of AI-based anomaly detection in IoT and sensor networks. Sensors 2023, 23, 1352. [Google Scholar] [CrossRef]
- Vallois, V.; Mehaoua, A.; Amziani, M. Blockchain-based identity and access management in industrial IoT systems. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, 17–21 May 2021; pp. 623–627. [Google Scholar]
- Ren, Y.; Zhu, F.; Qi, J.; Wang, J.; Sangaiah, A.K. Identity management and access control based on blockchain under edge computing for the industrial Internet of Things. Appl. Sci. 2019, 9, 2058. [Google Scholar] [CrossRef]
- Asif, R. Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms. IoT 2021, 2, 71–91. [Google Scholar] [CrossRef]
- Liu, Z.; Choo, K.K.R.; Grossschadl, J. Securing edge devices in the post-quantum Internet of Things using lattice-based cryptography. IEEE Commun. Mag. 2018, 56, 158–162. [Google Scholar] [CrossRef]
- Seyhan, K.; Nguyen, T.N.; Akleylek, S.; Cengiz, K. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey. Clust. Comput. 2022, 25, 1729–1748. [Google Scholar] [CrossRef]
- Han, Y.; Li, D.; Qi, H.; Ren, J.; Wang, X. Federated learning-based computation offloading optimization in edge computing-supported Internet of Things. In Proceedings of the ACM Turing Celebration Conference—China, Chengdu, China, 17–19 May 2019; pp. 1–5. [Google Scholar]
- Nguyen, D.C.; Ding, M.; Pham, Q.V.; Pathirana, P.N.; Le, L.B.; Seneviratne, A.; Li, J.; Niyato, D.; Poor, H.V. Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet Things J. 2021, 8, 12806–12825. [Google Scholar] [CrossRef]
- Wu, J.; Zuo, R. Intelligent Computation Offloading Based on Digital Twin-Enabled 6G Industrial IoT. Appl. Sci. 2024, 14, 1035. [Google Scholar] [CrossRef]
- Zhang, T.; Xu, C.; Lian, Y.; Tian, H.; Kang, J.; Kuang, X.; Niyato, D. When moving target defense meets attack prediction in Digital Twins: A convolutional and hierarchical reinforcement learning approach. IEEE J. Sel. Areas Commun. 2023, 41, 3293–3305. [Google Scholar] [CrossRef]
- Elkhodr, M.; Alsinglawi, B. Data provenance and trust establishment in the Internet of Things. Secur. Priv. 2020, 3, e99. [Google Scholar] [CrossRef]
- Elkhodr, M.; Khan, S.; Gide, E. A novel semantic IoT middleware for secure data management: Blockchain and AI-driven context awareness. Future Internet 2024, 16, 22. [Google Scholar] [CrossRef]
- Loukil, F.; Ghedira-Guegan, C.; Boukadi, K.; Benharkat, A.N. Privacy-preserving IoT data aggregation based on blockchain and homomorphic encryption. Sensors 2021, 21, 2452. [Google Scholar] [CrossRef]
- Arfaoui, A.; Cherkaoui, S.; Kribeche, A.; Senouci, S.M.; Hamdi, M. Context-aware adaptive authentication and authorization in internet of things. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Patil, K.S.; Mandal, I.; Rangaswamy, C. Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption. Pervasive Mob. Comput. 2022, 82, 101552. [Google Scholar] [CrossRef]
- Heidari, A.; Jabraeil Jamali, M.A. Internet of Things intrusion detection systems: A comprehensive review and future directions. Clust. Comput. 2023, 26, 3753–3780. [Google Scholar] [CrossRef]
- Abou El Houda, Z.; Brik, B.; Senouci, S.M. A novel IoT-based explainable deep learning framework for intrusion detection systems. IEEE Internet Things Mag. 2022, 5, 20–23. [Google Scholar] [CrossRef]
- Cabrera-Gutiérrez, A.J.; Castillo, E.; Escobar-Molero, A.; Álvarez-Bermejo, J.A.; Morales, D.P.; Parrilla, L. Integration of hardware security modules and permissioned blockchain in industrial iot networks. IEEE Access 2022, 10, 114331–114345. [Google Scholar] [CrossRef]
- Cirne, A.; Sousa, P.R.; Resende, J.S.; Antunes, L. Hardware security for Internet of Things identity assurance. IEEE Commun. Surv. Tutor. 2024, 26, 1041–1079. [Google Scholar] [CrossRef]
- Kore, A.; Patil, S. Robust cross-layer security framework for Internet of Things enabled wireless sensor networks. In Proceedings of the 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 12–14 March 2020; pp. 142–147. [Google Scholar]
- Mustafa, R.; Sarkar, N.I.; Mohaaghegh, M.; Pervez, S. A Secure and Energy-Efficient Cross-Layer Framework for Internet of Things. In Proceedings of the 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam, 17–19 January 2024; pp. 661–666. [Google Scholar]
- Bicaku, A.; Tauber, M.; Delsing, J. Security standard compliance and continuous verification for Industrial Internet of Things. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720922731. [Google Scholar] [CrossRef]
- Sylla, T.; Chalouf, M.A.; Krief, F.; Samake, K. Context-aware security in the Internet of Things: A survey. Int. J. Auton. Adapt. Commun. Syst. 2021, 14, 231–263. [Google Scholar] [CrossRef]
- Elkhodr, M.; Shahrestani, S.; Cheung, H. A contextual-adaptive location disclosure agent for general devices in the Internet of Things. In Proceedings of the 38th Annual IEEE Conference on Local Computer Networks-Workshops, Sydney, NSW, Australia, 21–24 October 2013; pp. 848–855. [Google Scholar]
- Djedjig, N.; Tandjaoui, D.; Medjek, F.; Romdhani, I. Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 2020, 52, 102467. [Google Scholar] [CrossRef]
- Kiran, A.; Mathivanan, P.; Mahdal, M.; Sairam, K.; Chauhan, D.; Talasila, V. Enhancing data security in IoT networks with blockchain-based management and adaptive clustering techniques. Mathematics 2023, 11, 2073. [Google Scholar] [CrossRef]
- Groen, E.C.; Feth, D.; Polst, S.; Tolsdorf, J.; Wiefling, S.; Iacono, L.L.; Schmitt, H. Achieving usable security and privacy through Human-Centered Design. In Human Factors in Privacy Research; Springer International Publishing: Cham, Switzerland, 2023; pp. 83–113. [Google Scholar]
- Rohan, R.; Funilkul, S.; Pal, D.; Thapliyal, H. Humans in the loop: Cybersecurity aspects in the consumer IoT context. IEEE Consum. Electron. Mag. 2021, 11, 78–84. [Google Scholar] [CrossRef]
- Widmann, T.; Merkle, F.; Nocker, M.; Schöttle, P. Pruning for Power: Optimizing Energy Efficiency in IoT with Neural Network Pruning. In Engineering Applications of Neural Networks. EANN 2023; Springer: Cham, Switzerland, 2023; pp. 251–263. [Google Scholar]
- Pâris, J.F.; Schwarz, T. Merkle hash grids instead of Merkle trees. In Proceedings of the 2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Nice, France, 17–19 November 2020; pp. 1–8. [Google Scholar]
- Duan, Y.; Huang, J.; Lei, J.; Kong, L.; Lv, Y.; Lin, Z.; Chen, G.; Khan, M.K. AISChain: Blockchain-Based AIS Data Platform with Dynamic Bloom Filter Tree. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2332–2343. [Google Scholar] [CrossRef]
- Avanzi, R.; Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2019, 2, 1–43. [Google Scholar]
- Silicon Labs. Wi-Fi Solutions from the Global Leader in IoT. 2024. Available online: https://wwwqa.silabs.com/wireless/wi-fi (accessed on 29 June 2024).
- Broell, L.M.; Hanshans, C.; Kimmerle, D. IoT on an ESP32: Optimization Methods Regarding Battery Life and Write Speed to an SD-Card. In Edge Computing; Goundar, S., Ed.; IntechOpen: Rijeka, Croatia, 2023; Chapter 7. [Google Scholar] [CrossRef]
- Braun, A. Meeting the Need for Low-Powered IoT Sensors. 2019. Available online: https://www.iottechtrends.com/low-powered-iot-sensors/ (accessed on 29 July 2024).
Approach | Focus Area | Key Technologies | Strengths | Weaknesses | References |
---|---|---|---|---|---|
Lightweight Cryptography | Efficient cryptographic protocols for IoT | SIMD, PUFs | Resource-efficient | Limited to specific device types | [29,30,31] |
AI-Driven Threat Detection and Response | AI in IoT security | Machine Learning, Anomaly Detection | Real-time threat detection | High computational requirements | [32,33] |
Blockchain-Based Identity and Access Management | Identity and access management | Blockchain, Merkle Trees | Decentralized, immutable | High energy consumption | [34,35] |
Quantum-Resistant Cryptography | Future-proof cryptographic algorithms | Lattice-based Cryptography, Hash-based Schemes | Resistant to quantum attacks | Computationally intensive | [36,37,38] |
Federated Learning for Edge Security | Edge Security | Federated Learning, Edge Computing | Data privacy, local data processing | Communication overhead | [39,40] |
Digital Twins for Predictive Security | Predictive threat analysis | Digital Twins, MDP | Predictive and proactive security | High synchronization requirements | [41,42] |
Privacy-Preserving Techniques | Data privacy in IoT | Differential Privacy, Homomorphic Encryption | Strong data privacy | Reduces data utility | [43,44,45] |
Adaptive Authentication | Scalable and adaptable security | Hash-based Signatures | Scalability, adaptable security | Complexity in implementation | [46,47] |
Network Security | Network-level security measures | Secure Routing Protocols, Intrusion Detection Systems | Comprehensive network protection | Potential high overhead | [48,49] |
Hardware-based Security | Secure hardware elements | Trusted Platform Modules (TPMs), Secure Elements | Strong hardware security | Cost, complexity of integration | [50,51] |
Cross-layer Security | Integrated security across IoT layers | Multi-layer Security Protocols | Holistic security approach | Complexity of implementation | [52,53] |
Security Standardization | IoT security standards and protocols | Standard Protocols, Compliance Frameworks | Consistency, interoperability | Slow adoption, regulatory challenges | [54] |
Context-aware Security | Adaptive security based on context | Contextual Analysis, Adaptive Algorithms | Flexible, responsive security measures | Complexity in accurately determining context | [55,56] |
Collaborative Security | Collaborative approaches between devices | Cooperative Security Algorithms, Distributed Ledger Technology | Enhanced collective security | Coordination challenges, overhead | [57,58] |
Human Factors | Usable security, user education | Human-Centered Design, Security Training Programs | Improved user compliance | Variability in user behavior, training costs | [59,60] |
Component | Role | Key Technologies/Interactions |
---|---|---|
AI-Driven Security Orchestrator | Coordinates security modules and adapts to threats | Reinforcement Learning; communicates with all modules |
Blockchain-Based IAM | Manages device identities and access control | Merkle Trees, HRAAP; linked to orchestrator and content authentication |
Quantum-Resistant Cryptography | Ensures future-proof encryption | Hybrid lattice-based encryption; interacts with authentication and edge |
Digital Twins | Simulate and predict threats | MDP models; updated by orchestrator and used in autonomous security |
Autonomous Security | Self-configuring threat response | Digital Twin triggers; looped back to orchestrator |
Adaptive Content Authentication | Verifies data authenticity dynamically | Hash-based signatures; adjusts based on resource availability and threat level |
Federated Learning | Enables decentralized training at edge | Feeds into edge-centric enforcement; preserves privacy |
Edge-Centric Security | Implements localized enforcement policies | Relies on federated models and orchestrator guidance |
Privacy-Preserving Data Processing | Enables compliant and secure data analytics | Differential Privacy; interacts with Digital Twins and edge layers |
Attack Type | Modeling Approach | Security Metrics Captured |
---|---|---|
Distributed Denial-of-Service (DDoS) | Randomized trigger events; exponential delay modeling | Detection accuracy, response time |
Ransomware Intrusions | Simulated impact via uniform threat type assignment | Detection accuracy, false negative rate |
Insider Threats | Simulated access attempts from known identity pools | Response time, system behavior change |
Unauthorized Access Attempts | Randomized unauthorized identity injection | Detection accuracy, access denial effectiveness |
Metric | Simulated Range |
---|---|
Processing Impact | <0.05% |
Memory Usage | <0.1% |
Energy Consumption | 0.3–1.5 mAh/day |
Metric | Simulated Range |
---|---|
Detection Accuracy | 85–99% |
Average Response Time | ∼2 s |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elkhodr, M. An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain. Future Internet 2025, 17, 246. https://doi.org/10.3390/fi17060246
Elkhodr M. An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain. Future Internet. 2025; 17(6):246. https://doi.org/10.3390/fi17060246
Chicago/Turabian StyleElkhodr, Mahmoud. 2025. "An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain" Future Internet 17, no. 6: 246. https://doi.org/10.3390/fi17060246
APA StyleElkhodr, M. (2025). An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain. Future Internet, 17(6), 246. https://doi.org/10.3390/fi17060246