1. Introduction
Connecting billions of devices all over the world, the Internet of Things (IoT) enables the smooth integration of smart solutions across many different industries, including healthcare, transportation, industrial automation, and smart cities. Rapid IoT growth has seen the number of linked devices estimated to reach 15.9 billion in 2023 and more than double to exceed 32.1 billion by 2030 [
1]. This fast expansion emphasizes the transformative potential of IoT and highlights the pressing necessity to handle its security problems [
2]. However, this rapid adoption has also highlighted critical security gaps, underscoring the pressing necessity to analyze the associated risks. Maintaining safe and dependable operation of IoT systems is greatly challenged by their unique characteristics [
3], including resource-constrained devices, varied architectures and simplified communication protocols. The size and diversity of IoT deployments aggravate these issues, which makes them appealing targets for attackers.
As the threat of attacks is becoming more prevalent and sophisticated on IoT devices, this shows that there is a need for stricter security practices [
4]. IoT security failures have the potential for severe impacts on individuals, companies, and critical infrastructures; including data breaches, denial-of-service (DoS), device manipulation and unauthorized access to data. There is an increase in threats of harm to the public safety, reputational damage, and financial loss as a result of IoT integration into essential services [
5].
Several previous studies regarding IoT security and its placement have been previously studied. Examples include blockchain-based constructs that allow secure device-to-device communications, while eliminating the need for centralized locations to accomplish tasks that involve many devices and users [
6]. Concepts in automated smart agriculture that involve IoT devices accessing machine learning, are currently available to provide near real-time recommendations for precision farming techniques that automate crop observation and decision-making. Automated farming solutions will increase production, but they also create additional vulnerabilities because IoT devices require constant connectivity to collect sensor data [
7]. In addition, numerous studies have described the difficulties caused by autonomous IoT system operation and the differences between IoT systems and between technologies such as IoT, Wireless Sensor Networks (WSNs) broadband networks and mobile networks [
8].
As such, protecting IoT environments requires a more thorough approach to securing these networks within the IoT domain than simply focusing on addressing vulnerabilities found within the ecosystem. Emphasizing vulnerabilities, detection techniques, and mitigation strategies, this paper seeks to provide a complete picture of IoT security issues. A major focus of this survey is on the use of machine learning (ML) to improve the security of networks, due to its ability to adapt to new types of attacks and to detect complex, evolving threats [
9]. This survey will also provide a comprehensive review of current security methodologies used for securing IoT devices, describe the types of data used by researchers studying IoT security, and identify emerging trends in IoT security practices and associated research that will be necessary to stay ahead of emerging cyber threats.
Unlike existing IoT security surveys that often focus on specific aspects such as architectures, attack models, or detection techniques independently, this work provides a unified and multi-dimensional perspective that integrates these components into a single analytical framework. In particular, this paper introduces a four-dimensional attack classification based on attack vector, target, execution method, and impact, enabling a more comprehensive understanding of IoT threats. Furthermore, this survey goes beyond a descriptive review by incorporating critical analysis of IoT architectures, communication protocols, and machine learning-based detection approaches, highlighting their strengths, limitations, and trade-offs. This integrated perspective distinguishes the present work from prior studies and provides deeper insights into the design of robust IoT security solutions.
Key contributions of this review include:
A unified and structured analysis of IoT architectures and communication protocols, highlighting their roles, limitations, and security implications in heterogeneous environments.
The proposal of a comprehensive four-dimensional attack classification framework based on attack vector, target, execution method, and impact, enabling a more holistic understanding of IoT threats compared to existing taxonomies.
A critical review of state-of-the-art machine learning and deep learning techniques for IoT security, with emphasis on their strengths, limitations, and suitability for resource-constrained environments.
A comparative discussion of existing countermeasures, analyzing their effectiveness, trade-offs, and applicability across different IoT scenarios.
A curated synthesis of publicly available datasets and security tools, with insights into their characteristics, usage, and limitations in IoT security research.
An in-depth discussion of current challenges, research gaps, and future directions, providing guidance for the development of robust and scalable IoT security solutions.
The remainder of this study is organized as follows.
Section 2 presents an outline of the most recent, available survey articles relating to IoT security.
Section 3 analyzes the protocols and architectures utilized in IoT systems.
Section 4 provides an exhaustive classification of IoT attacks.
Section 5 outlines detection approaches, specifically those employing machine learning.
Section 6 analyzes strategies to mitigate IoT vulnerabilities.
Section 7 specifies the datasets and instruments utilized in IoT security research.
Section 8 addresses problems and prospective paths, while
Section 9 closes the article by a conclusion.
2. Related Works
Recent years have seen the publication of numerous surveys on IoT security, highlighting the increasing complexity of threats and breakthroughs in mitigation techniques. Prakash et al. [
10] conducted a thorough assessment of IoT security difficulties and attacks, showing the interconnectedness of IoT systems and their vulnerabilities at multiple tiers. Likewise, the authors of [
11] provided a comprehensive examination of cybersecurity measures in the IoT era, examining fundamental concepts and practices while emphasizing emergent viewpoints. More recently, Dritsas et al. [
12] presented a holistic survey of IoT cybersecurity, addressing key dimensions such as device authentication, data integrity, privacy, network security, and the emerging role of artificial intelligence in strengthening defensive mechanisms, while also outlining open challenges and future research directions. Similarly, Sharma and Bhushan [
13] provided an exhaustive discussion of IoT security through a systematic analysis of architectural vulnerabilities in addition to their established classification of IoT attacks, general IoT security requirements and their associated countermeasures. Their work further investigates emerging threats such as adversarial attacks and discusses the role of state-of-the-art technologies, including machine learning, deep learning, blockchain, and federated learning, in strengthening IoT defense mechanisms.
Many researchers have conducted studies on various attack types and detection methods in IoT environments. In particular, the authors of [
14] concentrated on Distributed Denial of Service (DDoS) attacks within Software-Defined Networking (SDN)-IoT networks, proposing detection and mitigation mechanisms specifically designed for these contexts. In contrast, the authors of [
15] performed a detailed analysis of stealthy and adversarial attacks on IoT networks, focusing on the exploitation of machine learning-based systems and the corresponding mitigation strategies. Dheyaaldin Alsalman [
16] reviewed techniques used to detect anomalies in IoT security using adaptive learning methods to combat these threats. At the same time, Sun et al. [
17] extensively studied how emerging technologies within the IoT impact privacy protections and the architecture for privacy and security of these devices. Mengistu et al. [
18] provided an overview of how Federated Learning relates to Wireless Sensor Networks and IoT devices and looked at protecting privacy throughout all layers. Ghaffari et al. [
19] stressed the importance of implementing a strong device detection capability using both machine learning and deep learning algorithms to provide the greatest level of protection for IoT devices.
Several areas of IoT security have been addressed in the recent literature. For example, applications of artificial intelligence (AI) in Internet of Medical Things (IoMT) and Internet of Everything (IoET), and possible threats to them were investigated in [
20]. Vulnerabilities of 5G-enabled IoT networks and their data protection strategies were addressed in [
21]. Localization challenges were a central theme in [
22], where threats to IoT localization and mitigation strategies were reviewed. In addition, the authors of [
23] discussed various approaches to developing energy-efficient security solutions for IoT devices in order to enhance their battery life.
Aside from general surveys, there has been a recent and notable focus on particular application domains like healthcare. Fog-enabled IoT architectures have been proposed for real-time health data monitoring, demonstrating improved task distribution and reduced latency [
24]. On the other hand, the authors of [
25] presented a certificateless secure signature scheme for healthcare IoT environments that can provide lightweight cryptographic security for constrained medical devices. For instance, PUF-based and key agreement protocols were proposed to secure device interactions efficiently [
26,
27], while an identity-based signature model was introduced to handle dynamic access revocation in cloud-supported IoT environments [
28]. In [
29], the authors developed quantum antenna modelling for sensor-based biomedical applications and showed that the incorporation of quantum-informed designs could improve the performance of high-frequency IoT communication systems.
Yang et al. [
30] introduced a multikey image retrieval mechanism with user traceability and CNN (Convolutional Neural Networks)-based feature extraction. Similarly, the authors of [
31] applied a clustering-based index structure and privacy-preserving KNN algorithm for efficient and accurate image search. Furthermore, an efficient homomorphic encryption-based search scheme [
32] was proposed for multi-owner IoT settings, offering strong security against plaintext attacks while enhancing performance. Collectively, the above papers demonstrate the increased specialization in research around IoT security, and emphasize the importance of wider cross-domain reviews like the one presented here, which combines findings across architectures, attack classifications, AI-based detection, and countermeasures, datasets and tools.
However, certain gaps remain. For example, although there have been many studies such as [
33] that cover the routing vulnerabilities and [
34] that cover the use of deep learning for DDoS attacks, there has been little work investigating the need for quantum resistant cryptographic methods or more generally the impact of supply chain vulnerabilities. Similarly, there are many hybrid IoT architectures integrating cloud and edge computing that need more detailed study only partially covered in [
35].
Table 1 provides a summary of existing survey papers on IoT security, highlighting their focus on attacks, detection techniques, countermeasures, and datasets/tools. Each of these provides a comparative overview of what threats were examined, what security mechanisms were applied and what mitigation methodologies were provided and alongside the datasets/tools that were used in assessing IoT Security Models. By using these comparisons, we can identify the areas where current research has limitations and also draws conclusions about the strengths and weaknesses of previous work.
3. Protocols and Architectures
3.1. IoT Protocols
IoT devices rely on a variety of communication protocols to operate efficiently within resource-constrained and heterogeneous environments. These protocols are typically designed to ensure reliable data exchange, low power consumption, and scalability across diverse IoT applications.
To better understand their roles, IoT communication protocols are commonly classified according to the layered architecture of IoT systems.
Figure 1 illustrates a widely adopted three-layer architecture composed of the perception layer, network layer, and application layer, along with the corresponding protocols associated with each layer. This layered organization facilitates the identification of protocol functionalities, from data acquisition to data transmission and service delivery.
Although the three-layer model is widely used due to its simplicity, more advanced IoT architectures have been proposed in the literature, incorporating additional layers such as middleware, processing, business, and security layers. These extended architectures may include up to five, seven, or even nine layers. In particular, the integration of a dedicated security layer reflects the increasing importance of incorporating mechanisms such as encryption, authentication, intrusion detection, and access control across IoT systems.
The following subsections provide a detailed overview of the most commonly used protocols at each layer of the IoT architecture.
A brief description of protocols under each layer is given below.
3.1.1. Perception Layer Protocols
The Perception Layer provides the foundation for IoT architecture, consisting of a number of physical devices and sensors that interact with the environment and collect data to communicate within an IoT environment. There are different protocols used in the Perception Layer to facilitate the exchange of data. Notable examples of such protocols are:
ZigBee—This is primarily used for home automation and industrial IoT applications. It can provide low-power, short-range communications, but it is also subject to several types of attacks, including eavesdropping and replay attacks (e.g., capturing and retransmitting valid messages) [
43]. Bluetooth Low Energy (BLE)—This protocol is commonly found in wearable devices. It provides low-energy communications but is also vulnerable to spoofing (where someone impersonates another Bluetooth device) and data interception (where the Bluetooth communication between devices is intercepted) [
44]. LoRaWAN is a type of communication that has a long range and low power requirement. It has the best coverage for very remote locations, but it may have issues from attacks, jamming and replay attacks. Attacks also occur where someone can take an old message, and resend it to gain access without permission [
45]. On the other hand, RFID (Radio Frequency Identification) is widely used to keep track of assets in retail and also for inventory management. However, RFID systems face challenges from cloning of RFID tags to eavesdropping on the transmission signals between the RFID Reader and RFID Tag [
46]. Finally, NFC (Near Field Communication) allows for making contactless payments and exchanging data; the biggest issue for NFC is Relay Attack. In a relay attack, an intruder captures the communication between the two devices and may be able to copy it, while Interception means capturing the information being transmitted and received [
47].
3.1.2. Network Layer Protocols
The protocols in the Network Layer include those that establish rules to manage the sending of data and the communication between devices as well as how data is transmitted across different types of networks. 6LoWPAN (IPv6 over Low power Wireless Networks) allows for communication over low-powered wireless networks via the use of IPv6 protocol. However, this means that the data packet can be fragmented or reassembled and manipulated to interfere with communication channels [
48]. Additionally, while the Routing Protocol for Low Power and Lossy Networks (RPL) helps to route information through constrained environments, it has risks from Routing Attacks executed through malicious nodes, Replay Attacks and Resource Exhaustion attacks that can use up resources on the network [
49]. The IEEE 802.15.4 standard [
50] defines the architecture of LR-WPANs or low-rate wireless personal area networks. It is prone to Jamming Attacks, as well as to Key Compromise, where Security Keys (encryption keys) are used to disrupt communication [
51]. Low-Power Wide Area Networks (LPWAN) provide an alternative to cellular technology for long range communications. The LPWANs have a number of threats to overcome, including Data Interception and Replay Attack as well as limited authentication capabilities [
52]. Z-Wave is a protocol primarily used for home automation (communicating with smart devices), though Z-Wave communications may be affected by Eavesdropping and Replay Attacks. These risks are exacerbated by Z-Wave’s limited transmission range [
53]. BACnet/IP is essential for building automation and control networks but can suffer from interception, weak access control, and DoS attacks that disrupt availability [
54]. Lastly, IEEE 802.11ah, [
55] known for low-power, long-range communication, is exposed to resource constraints that affect performance and is vulnerable to DDoS attacks that overwhelm resources and replay attacks.
3.1.3. Application Layer Protocols
The Application Layer consists of the protocols that allow for communication and interaction at the application level among IoT systems. There is a wide variety of application layer protocols in use today, although nearly all web-based applications utilize one or both of the following protocols: HTTP/HTTPS. In contrast, HTTPS is a secure communications protocol that encrypts data before transmission over the Internet; while encryption protects the security of communication, it increases the computational overhead for the IoT device, which may create challenges for resource-constrained devices. Web applications that use the WebSocket protocol provide bidirectional communication; however, this protocol is vulnerable to XSS attacks and injection attacks, in which malicious scripts execute within the context of another user. The Extensible Messaging and Presence Protocol (XMPP) enables instant messaging and presence information but also faces XML-based attacks that take advantage of its XML structure, as well as DoS and DDoS attacks that disrupt service [
56]. The Simple Network Management Protocol (SNMP) is the most widely used protocol for managing and monitoring networks; thus, it is also a primary target for threats such as unauthorized access, resource-draining DoS attacks, and spoofing, where an attacker impersonates a legitimate device [
57]. Lightweight M2M (LwM2M) was developed to facilitate the management of devices in constrained environments, but communications using LwM2M also present many security challenges [
58]. The Constrained Application Protocol (CoAP) enables REST-based communication between IoT devices, but it is also susceptible to attacks that can drain resources and overwhelm the service [
59]. Message Queuing Telemetry Transport (MQTT) is widely considered a de facto standard for IoT communications due to its lightweight design and efficient publish/subscribe messaging model. It facilitates communication between connected devices, particularly in resource-constrained environments. However, MQTT is prone to security threats such as DoS attacks if proper authentication and protection mechanisms are not implemented [
60]. DDS (Data Distribution Service) allows real-time exchange of information; however, there are potential risks for data that would challenge the legitimacy of the data being transmitted, including instance integrity issues, fraudulent agents, and data spoofing attacks [
61].
While these protocols are designed to address specific IoT requirements such as low power consumption, long-range communication, or real-time data exchange, they present different trade-offs. For instance, lightweight protocols such as ZigBee and BLE are energy-efficient but may offer limited security features, whereas protocols like HTTPS provide stronger security through encryption at the cost of higher computational overhead. Similarly, long-range protocols such as LoRaWAN and LPWAN improve coverage but may introduce latency and limited authentication capabilities. These differences highlight the challenge of selecting appropriate protocols depending on the specific constraints and security requirements of IoT applications.
Despite their efficiency, many IoT protocols lack built-in security mechanisms, making them vulnerable to attacks such as spoofing, replay attacks, and DoS. This highlights the need for lightweight and scalable security solutions that are adapted to resource-constrained IoT environments.
While IoT protocols define how data is exchanged between devices, IoT architectures determine how these devices and communication processes are organized within the system. Therefore, understanding IoT architectures is essential to analyze how protocol-level interactions are integrated into larger system designs and how security challenges propagate across different layers.
3.2. IoT Architectures
The architecture of an IoT system dictates its functionality, scalability, and security. Below are commonly adopted IoT architectural models: centralized architecture, decentralized architecture, hybrid architecture, and blockchain-based architecture.
3.2.1. Centralized Architecture
Centralized architectures depend on cloud servers to do all data processing, data storage, and data management for the IoT network. The centralized architecture allows for centralized control and resource optimization in an IoT ecosystem and makes analytics scalable and policies uniform. The authors of [
62] discussed centralized architectures as representing a level of efficiency in job offloading and resource allocation within IoT–fog–cloud ecosystems and can provide insight into decision making to coordinate systems, e.g., using edge computing for improved efficiency. However, the most concerning aspect of the centralized architecture is the introduction of critical risks, which include systemic architectures relied on single points of failure, risks related to latency, and increased vulnerability to DoS/DDoS attacks and brute-force attacks and data breaches.
Figure 2 illustrates the centralized IoT architecture, where cloud-based services orchestrate communication and data processing, but at the cost of increased vulnerability to centralized attacks and bottlenecks.
3.2.2. Decentralized Architecture
Decentralized architectures concentrate computational capacity within the fog and edge layers, moving processing closer to the data source. With this action, the latency, response time, and autonomous decision-making abilities are enhanced with great importance in real-time applications. While this design improves elements of latency and autonomous capabilities, it adds additional security concerns at the edge nodes since they are typically less secure and more likely to be accessed by those with malicious intent or have locally altered data to change, wipe, and otherwise access sensitive data. Mitigating these security concerns is where blockchain has been discussed as a secure, decentralized architecture. The combination of blockchain, decentralized, and autonomy outlined by ref. [
63] creates tamper-proof and transparent ledgers and allows for enhanced peer-to-peer communication and peer-to-peer access control, minimizing the need for a centralized authority. The decentralized architecture of computing is presented in the
Figure 3 diagram which highlights the distributed computing elements between fog and edge nodes alongside blockchain for trust and security management.
3.2.3. Hybrid Architecture
Hybrid architectures take advantage of both centralized and decentralized architectures distributing the tasks between the edge, on edge devices, or cloud resources. Hybrid architectures are best leveraged for applications requiring both time continuity responsiveness (real-time) and high-performance computing (training of models in the cloud) as demonstrated by Dulana et al. [
64]. With regard to hybrid architectural models, edge computing has been demonstrated to be helpful for processing sensitive data through locally based storage and computing and conducting advanced modelling through the use of cloud-based services. As demonstrated in
Figure 4 below, edge computing is used by hybrid architectures to eliminate or significantly reduce delays in the execution of data processing while cloud services provide the ability to perform advanced analyses and coordinate multiple processes throughout the ecosystem.
3.2.4. Blockchain-Based Architecture
The implementation of a blockchain-based architecture in an IoT system introduces a trustless, fully distributed model of operation by eliminating the requirement for centralized control authorities. According to [
65], blockchain provides an environment in which the data stored within the blockchain’s distributed ledger is verifiable, secure and tamper-proof. This capability will provide a more secure data environment to support IoT applications, for example, the Internet of Robotic Things (IoRT). Moreover, with the incorporation of decentralization into blockchain technology, the overall number of distinct potential breakdowns decreases, improving overall data integrity; enabling increased transparency/accountability of numerous individuals through various types of devices. Blockchain’s peer-to-peer network negates the necessity for a third-party intermediary, whereby devices can send messages directly to one another, as well as perform autonomous financial transactions.
Figure 5 presents a general overview of an IoT architecture based on blockchain technology. This example illustrates how distributed ledgers improve the following areas: enhancing security; improving trust management; enabling secure sharing of data; providing accountability; and increasing the resilience of IoT systems.
Each architecture presents trade-offs between scalability, latency, and security, and no single model fully satisfies all IoT requirements.
The comparison of various IoT system design types highlights that each architecture presents distinct trade-offs in terms of performance, scalability, and security. Although centralized, decentralized, hybrid, and blockchain-based architectures share similar objectives, they differ significantly in their operational characteristics [
66].
Centralized architectures are easier to manage and enable efficient resource coordination, but they introduce single points of failure and higher latency due to reliance on cloud infrastructure. In contrast, decentralized and blockchain-based architectures improve resilience, data integrity, and trust through distributed operation; however, they often incur higher computational overhead, increased latency, and deployment costs, which may limit their applicability in resource-constrained IoT environments [
67]. Hybrid architectures attempt to balance these trade-offs by combining edge and cloud computing, enabling low-latency processing while supporting complex analytics, although they introduce additional design complexity.
Therefore, the selection of an appropriate IoT architecture depends on the specific application requirements, including latency constraints, scalability needs, security requirements, and cost considerations. These various IoT architecture types are summarized in
Table 2 to assist decision-makers in identifying the most suitable solutions for their IoT applications.
Although IoT architectures and communication protocols provide the foundation for system functionality, they also introduce potential vulnerabilities that can be exploited by attackers. These weaknesses make it essential to systematically analyze and classify the different types of cyber-attacks targeting IoT systems. The following section presents a comprehensive classification of IoT attacks to better understand their characteristics, execution methods, and impact.
4. Classification of IoT Attacks
Building on the previously discussed IoT protocols and architectures, IoT systems are exposed to a wide range of cyber-attacks that exploit structural and communication vulnerabilities. IoT devices are subject to several types of attacks. Understanding how these attacks can be classified can assist in determining the weaknesses of the devices, honing in on better detection methods, and creating effective countermeasures to improve the IoT security posture in general. With the continued growth of IoT devices, a number of classification frameworks have been created by researchers to categorize threats and vulnerabilities in a systematic fashion. Many researchers have attempted to classify these attacks based on a number of different criteria, including the methods used to attack the devices and the assets affected by the attacks. Furthermore, some researchers have classified IoT attacks by their impact on the devices and systems and how severe the effect is.
Based on attack vectors, the authors of [
68] classify IoT attacks, hence highlighting important threats as eavesdropping, injection, DoS, malware, side-channel exploits, replay attacks, and cryptanalysis techniques. A method of categorizing IoT attack types exists, and it indicates that the attackers used details regarding how IoT networks were compromised; however, the taxonomy is limited to only showing what type of attacks were conducted on IoT networks, while omitting the actual target or method of execution for each category, thereby making it an incomplete representation of the methods used to compromise IoT networks, and providing insufficient information on how these types of attacks would spread through and impact IoT ecosystems.
The classification developed by the authors in [
69] also allows for an organized means to provide a general overview of IoT attacks; however, it fails to account for any of the complexities that are associated with the growing threat levels that exist within the IoT space. Sasi et al. [
70] suggested a more detailed taxonomy that covers attack domains, execution methods, targeted software surfaces, and adversary locations. Also, their classification puts risks into groups based on how they affect the CIA trinity (Confidentiality, Integrity, and Availability) and then divides them into passive and active attacks.
According to Shah and Sengupta [
71], there are three main categories of attacks on IoT devices: device category, attack execution methods and their effects on data security. The authors looked at these classifications with respect to the possible effects on integrity, authenticity and privacy of data depending on device type (e.g., wearable devices, smart homes or Industrial Internet of Things (IIoT)). However, this classification does not include a complete overview of the various types of attack vectors and the different adversarial strategies used to execute attacks in the IoT environment, which is important in understanding how threats move and spread within an IoT environment.
A classification scheme for IoT attacks equally considers the attack vector, target, impact to individual users and devices, as well as how an attack may be executed. The four dimensions of IoT attack classification presented in this paper (
Figure 6) can help researchers understand the behavior of attackers, and develop appropriate countermeasure and detection capabilities to improve the overall security of IoT systems.
Compared to existing IoT attack taxonomies, the proposed four-dimensional classification provides a more comprehensive and structured perspective by simultaneously capturing multiple aspects of an attack, including its origin (vector), target, execution strategy, and resulting impact. This multi-dimensional approach enables a deeper understanding of how attacks propagate across IoT systems and how different attack characteristics are interrelated. Unlike traditional classifications that focus on a single dimension, this framework facilitates more effective threat analysis and supports the design of targeted detection and mitigation strategies. However, the increased granularity of this classification may introduce additional complexity in practical implementation, particularly in large-scale IoT environments.
4.1. Based on Attack Vector
In IoT, attack vectors present the means for a security breach through multiple channels. Network-based attacks target the weakness inherent in communication protocols to exploit vulnerabilities that could compromise the integrity or confidentiality of data (e.g., spoofing, eavesdropping, or man-in-the-middle attacks) [
72]. Software-based attacks exploit a variety of vulnerabilities in devices to compromise firmware and application (e.g., malware injections, buffer overflows, and weak authentication systems) [
73]. Attack methods can provide unauthorized access to a device or even total control over it. Physical attacks occur when direct access to an IoT device is obtained, enabling tampering, destruction, or removal of hardware from the network [
10]. Such direct access can bypass many of the protections provided by software security protocols; therefore, it is critical that organizations take measures to protect physical access to devices.
4.2. Based on Target
This Classification highlights the particular elements that are the subjects of attacks within IoT systems [
69]. There are two forms of attacks directed toward IoT devices themselves. The first, device attacks target IoT devices by taking advantage of hardware and/or software vulnerabilities. The attacker can gain unauthorized access, disrupt operations, or retrieve confidential information stored on the device using malware, firmware exploitation, or physical manipulation. The second, data attacks, extend beyond just the devices to include the data that the devices communicate. Data attacks can eavesdrop on conversations, alter or corrupt data, create privacy issues, and be used to disseminate false or misleading information. This classification illustrates that there are two primary classes of IoT-related threats: device attacks and data attacks. As stated in this classification, it is of the utmost importance that both corporations and individuals take steps to protect their devices and the data associated with those devices.
4.3. Based on Execution Method
The classification of an attack depends much on its approach. With an active attack, an attacker actively interferes with the operations of a compromised system [
74]. They harm the compromised system by altering sent messages, injecting malicious software, or preventing services from being provided. Most active attacks are aggressive and obvious due to their destructive nature when executed in real-time. On the other hand, passive attacks attempt to gain knowledge by taking action without altering the functionality or effectiveness of either the attacking (target) system and/or the data within it [
74]. Examples of passive attacks include, but are not limited to, monitoring network traffic for confidential information, and eavesdropping on sensitive communications. While, in general, passive attacks are less observable than active attacks, they could lead to many security compromises, ultimately allowing attackers to capture valuable intelligence, which could lead to more damaging future active attacks.
4.4. Based on Impact
Evaluating the effects of a cyber-attack involves understanding both its effect on users and the way in which it will be taken care of. Confidentiality attacks operate by violating a user’s need for privacy. Confidentiality attacks include personal data and corporate proprietary information; they can cause data breaches, identity theft, and corporate espionage [
75]. Integrity attacks change or otherwise interfere with the accuracy of the data processed and/or transmitted through IoT devices. Changing the contents of data or disabling services associated with IoT devices can create a false perception on the part of either an individual or a system and lead to serious consequences, particularly when the data is referenced in critical areas such as healthcare or industrial control [
76]. This type of impact is especially critical in Industrial Internet of Things (IIoT) environments, where compromised data integrity may directly affect physical processes and operational decisions. Industrial systems rely on infrastructures such as programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, and fieldbus communication networks to ensure continuous monitoring and control [
77]. These environments commonly use industrial communication protocols such as Modbus TCP, PROFINET, and EtherCAT, which are often vulnerable to cyberattacks due to limited built-in security features.
As a result, attacks that manipulate or falsify data in such systems can lead to incorrect system behavior, production disruptions, or even safety hazards [
78]. To mitigate these risks, security mechanisms such as Transport Layer Security (TLS) and industrial firewalls with Deep Packet Inspection (DPI) capabilities are increasingly adopted to protect communication channels and detect malicious activities in real time. Recent studies have further highlighted the importance of robust cybersecurity solutions in IIoT environments, particularly for ensuring data integrity and system reliability.
Availability attacks are designed to deny IoT services and frequently rely on DoS type attacks. Availability attacks can cause entire systems to become disabled and therefore render IoT devices inoperative, leading to disruptions in service for both consumers and businesses [
79].
IoT cyber-attacks can be classified based on vectors, target selection, method of execution and level of impact. The attack types identified within this project can be organized into four different types of IoT application domains.
Table 3 presents a list of IoT cyber-attacks and provides context for each. In this example, the first column lists the type of the attack. The second column lists the industry of the attack. In addition to providing context on the differences between IoT cyber-attacks, it is also important to consider which IoT application can best be secured using either type of security solutions available.
5. Detection Techniques
The methods used to detect security threats in IoT are designed to identify existing vulnerabilities and protect against potential threats to IoT networks caused by malicious activity, abnormal behavior or unauthorized access. Threat detection systems can use both traditional (non-AI) approaches as well as modern AI-based technologies to greatly increase the accuracy and effectiveness of identifying threats.
Figure 7 provides a timeline of how security threat detection has evolved, providing a better understanding of how to develop an intelligent method to identify security threats.
Detection methods can generally be classified into two groups: AI-based approaches and Non-AI approaches. AI-based methods use machine learning and deep learning methods to provide real time anomaly detection, trend analysis and adaptive security. On the other hand, Non-AI methods use predefined patterns or rules to identify malicious activity in the IoT environment, such as through signature or rule-based methods. In
Figure 8, the different forms of identification are separated into two major categories and show the strengths and weaknesses of the detection methods, with respect to the detection of IoT threats.
5.1. Non-AI-Based Detection Techniques
5.1.1. Signature-Based Detection
When it comes to detecting security threats through the use of a signature-based detection system, these systems rely on previously established “patterns” or “signatures” of known attacks to identify any potential threats. While they are excellent at detecting known threats and help to mitigate risks from vulnerability that have been well-documented, signature-based IDS also have important limitations. For example, signature-based systems will not be able to detect new or unknown types of attacks and require ongoing updates in order to maintain the current signature database as new signatures are discovered. According to [
80], Signature-based IDSs identify threats by comparing traffic signatures to known threats (known as signatures), produce the lowest false alert rates for known threats, and require simple implementation for fastest detection of such threats. While signature-based systems excel at identifying known threats in real-time, they struggle with “zero-day” attacks and “polymorphic” malware, require significant amounts of resources to maintain their databases, and may present challenges to manage on a large IoT network. In [
81], the authors proposed an ex-ample of signature-based IDS specifically for the IoT space, with an emphasis on identifying multi-channel man-in-the-middle (MC-MitM) attacks over Wi-Fi networks. The authors demonstrate the capability of a signature-based approach to detect specific vulnerabilities such as KRACK and FragAttacks and note the limitations of signature-based systems. Thus, complementary approaches, including anomaly detection, hybrid detection, and other models, are needed to be effective in responding to difficult-to-detect threats.
5.1.2. Heuristic and Rule-Based Detection
In the context of detecting various types of attacks, heuristic and rule-based detection can only identify attacks according to pre-determined rules and heuristics. The lightweight and easy-to-implement nature of heuristic and rule-based detection methods makes them an ideal option for low-resource, IoT devices. However, a significant disadvantage of these methods is that they cannot adapt to changing tactics and can detect only known threats. as discussed in [
82], heuristic detection takes both dynamic and static analysis into account by utilizing information obtained from the network, such as network traffic, API calls, and permissions, and performs a level of behavioral analysis to detect malicious behavior. In addition to being effective against zero-day exploits and various obfuscation techniques, a drawback of heuristic detection methods is the requirement for considerable amounts of processing power, and the potential for false positives resulting from poorly designed heuristics. Similarly, Ref. [
83] develops a rule-based method to detect intrusion attempts. Unlike many previous methods, this rule-based method dynamically adjusts prior security policies according to real-time IoT threat information, thus increasing both the effectiveness of IoT intrusion detection systems and the efficiency of resources. However, the primary drawback of this approach is that it relies on defined security standards and is therefore limited in its ability to respond to and combat new and unknown attack actions. This limitation does not negate the improvements this method offers to the effectiveness of intrusion detection for IoT systems.
5.1.3. Network Traffic Analysis
Monitoring traffic on an IoT network allows for the easy identification of any potential threats to an organization’s network. IoT traffic monitoring also identifies when an organization has been subjected to various types of network attacks, including distributed denial of service (DDoS) attacks. However, existing methods for monitoring IoT networks have their limitations, including the need for constant monitoring, leading to increased workloads and increased demand for network capacity, in addition to not being able to identify every type of attack, particularly stealthy attacks, which are designed to evade detection. The authors of [
84] reviews various types of network traffic analysis methods which can be used to identify network traffic anomalies and to provide users with privacy. Of particular interest is a proposed system for identifying anomalous patterns based on the foundation placed on 5G networks and employing a combination of differential privacy and sparse tensor factorization for scalable user privacy. Flow-based systems [
85] will be explored as an option for improving the security of IoT systems by detecting both abnormal and malicious traffic patterns in IoT devices and their interactions with their environment.
5.2. AI-Based Detection Techniques
5.2.1. Anomaly-Based Detection
Anomaly-based detection of security threats in IoT systems is based on identifying abnormal behavior [
86]. A major advantage of this security method is that it is capable of adapting to new environments through adequate training and can be effective in identifying zero-day vulnerabilities or unknown threats. Both the sheer volume of false positives associated with poorly defined definitions of normal baseline and the high level of computing required by IoT devices with limited resources can greatly complicate the process of identifying these types of threats and vulnerabilities. As demonstrated in [
87], implementing combination anomaly detection strategies using both hybrid and artificial intelligence approaches in conjunction with threshold-based techniques can improve accuracy and, therefore, the detection of emerging threats for CPS. In expanding this idea, in [
88], the authors provided a differentiation of statistical models, machine learning techniques, and deep learning techniques used for anomaly detection. While machine learning methods (such as clustering algorithms and neural networks) can help provide a proactive means of discovering vulnerabilities, statistical techniques rely upon pre-defined thresholds to identify deviations from normal operation. Focusing on Recurrent Neural Networks (RNN), including Long Short-Term Memory (LSTM), Bidirectional Long Short-Term Memory (Bi-LSTM), and Gated Recurrent Unit (GRU) models, Imtiaz et al. [
89] developed an anomaly detection approach based on deep learning for securing IoT networks. With datasets including NSL-KDD, BoT-IoT, IoT-23, and MQTTset that achieve high levels of accuracy, this research demonstrates how these models are able to detect network traffic anomalies more effectively than traditional intrusion detection systems. The work also raises awareness to some of the greatest challenges in creating efficient IoT anomaly detection methods, such as computation demands and/or lagging issues as they relate to processing IoT devices in “real-time”. Therefore, their research points to the requirement for optimal DL methods (Deep Learning) to help improve IoT Network Security. The DL models that are currently used include CNNs and RNNs (Recurrent Neural Networks) which can capture complex relationships or patterns within massive datasets which offers a higher level of detection. Although it is typically accepted that these types of models require much greater amounts of processing power to develop, they continue to be an important means for countering the rapidly changing and evolving threats associated with an IoT system.
5.2.2. Behavioral-Based Detection
The behavior-based approach to detection evaluates the activity of devices, end-users or applications to determine whether there is anything out of the ordinary suggesting that there could be a potential security risk. There are many advantages to this type of detection including preventing insider threat or misuse by legitimate users and providing long-term monitoring of devices and systems [
90]. On the downside, the behavior-based detection methodology needs large volumes of past data in order to determine the average expected behaviors of the devices or systems being monitored, which often can be difficult to obtain, and also typically, behavior-based detection is resource intensive when used on large-scale IoT network systems. Specifically, as stated in [
91], this type of detection uses machine learning technologies to evaluate numerous inputs from kernel events throughout multiple components such as CPU, disk drive and network interface cards, to develop a unique “fingerprint” for each device or user profile. The results have been very promising in detecting malware including botnets, root-kits, ransomware and cryptojackers with true positive rates between 0.82 and 0.90 and F1 scores ranging between 0.94 and 0.96. One example of how the behavior monitoring can identify anomalies includes monitoring devices’ communication patterns, such as frequency of communications, to identify possible security issues.
5.2.3. Machine Learning and Deep Learning-Based Techniques
IoT security is greatly improved through the use of Machine Learning [
92] and Deep Learning [
93] technologies, which help in identifying likely threats using the capabilities of both technologies. Both technologies use advanced algorithms for rapid processing of large amounts of information and deter-mining whether or not that information constitutes a threat. Machine Learning has a number of methodologies available, e.g., supervised and unsupervised learning, which make it possible to continually adapt to the changing threat environment. Many of the common Machine Learning algorithms include Support Vector Machines (SVM) and Clustering Techniques, both of which can identify anomalous or attack type behavior [
94]. The use of Machine Learning allows for the automated identification of malicious behaviors or attacks directed at IoT devices. DL uses advanced neural networks to analyze large amounts of data with a high degree of complexity. The application of Neural Networks like LSTM or CNN to identifying malicious behaviors or attacks against IoT devices is an effective approach [
95]. Machine Learning and Deep Learning are two forms of Machine Learning and Deep Learning will help analyze, detect and identify potentially malicious activity on IoT devices. Though heavily computational, as well as requiring large amounts of diverse training data, the advantages of utilizing Deep Learning to analyze large volume IoT datasets, discover novel anomaly detections, and increase detection accuracy are presented in [
96]. Likewise, the authors of [
97] underline their capacity to extract complex patterns and adapt to changing threats, hence stressing the use of machine learning and deep learning in jobs such anomaly detection, malware identification, and behavioral analysis. The authors of [
98] discussed examples of AI powered detection of attacks using deep learning techniques including examples of the use of generative models by malicious actors to create fake multimedia content and conduct their attacks (deepfake detection). In another study, the authors of [
99] reviewed and summarized existing literature to develop a list of at-tack methods that target GPS devices that are associated with the IoT. These methods improve the detection and enhance the security in real time, therefore offering a strong protection against many kinds of hostile activity in IoT systems.
Table 4 gives a summary of research works related to ML-based security systems in IoT.
The results summarized in
Table 4 highlight several important trends in the application of machine learning and deep learning techniques for IoT security. Deep learning models, particularly LSTM and CNN-based architectures, generally achieve higher detection accuracy in complex and high-dimensional datasets due to their ability to capture temporal and spatial patterns. However, this improved performance often comes at the cost of increased computational complexity and higher resource consumption, which may limit their deployment in resource-constrained IoT environments.
In contrast, traditional machine learning approaches such as Support Vector Machines and clustering techniques provide more lightweight and efficient solutions, although they may exhibit lower performance when handling highly dynamic or large-scale IoT data. Furthermore, the effectiveness of these models is highly dependent on the characteristics of the datasets used, including class imbalance, feature representation, and data quality. Many existing datasets do not fully reflect real-world IoT environments, which can affect the generalization capability of the models.
These observations suggest that there is no universally optimal model, and the selection of an appropriate approach should be guided by the specific requirements of the IoT application, including accuracy, computational efficiency, and scalability.
In addition, the effectiveness of ML/DL-based detection systems can degrade over time due to concept drift, where normal and malicious traffic patterns evolve in dynamic IoT environments. Furthermore, these models are vulnerable to adversarial attacks, where carefully crafted inputs can evade detection mechanisms. These challenges highlight the need for adaptive, robust, and continuously updated security models to ensure reliable performance in real-world IoT systems.
6. Countermeasures
IoT security countermeasures seek to minimize vulnerabilities and counteract multiple forms of attack. Given the large volume of IoT systems and their diversity, resource-efficient solutions are needed for these challenges. Essential network security mechanisms are required to secure data transmission and access controls for unauthorized data access; these include traffic filtering [
132], encryption (TLS/SSL) [
133], and rate limits. Software security control (SSC) measures exist to reduce the risk of hackers accessing devices through vulnerabilities by using SSC measures such as secure coding practices, input (parameter) validation, and Web Application Firewalls (WAFs) [
134]. Secure deployment environments, intrusion detection systems (IDSs), and tamper-resistant hardware have been developed to help protect IoT devices against physical attacks [
135].
To establish a comprehensive security strategy for devices, one will need to perform vulnerability scans, secure device launch technologies, and separate devices into (network and physical) segments. These strategies assist in preventing unauthorized changes. Data protection is of equal importance and includes protection against unauthorized changes/intrusions. Hence, various forms of data protection, including encryption, Role-Based Access Controls (RBAC) [
136], secure Key Management, and Data Integrity Checks, will be very beneficial in helping to protect data. Availability and resiliency of IoT net-works/systems from DoS attacks can be achieved through these redundancy mechanisms and fail-over systems using Load Balancing methods and Malicious Activity Detection Systems, including real-time Intrusion Detection Systems and Anomaly Detection Systems that identify malicious activity. Lightweight Security Frameworks [
137], AI-powered Threat Detection, and Blockchain-based Authentication provide robust services to enhance security without overextending the resources of residual IoT devices. The combination of various multiple layers of security solutions (techniques) for IoT systems will allow for strengthening the resiliency and sustainability of these systems from current and future cyber-threats.
Table 5 summarizes the various countermeasures employed against these attacks.
While various countermeasures have been proposed to enhance IoT security, several challenges remain in their practical implementation. Many security solutions introduce additional computational overhead, which may not be suitable for resource-constrained devices. Moreover, existing countermeasures often lack adaptability to dynamic and evolving attack patterns. Ensuring robustness against adversarial attacks and maintaining effectiveness in the presence of concept drift remain open challenges. Therefore, future countermeasures should focus on lightweight, adaptive, and resilient security mechanisms that can operate efficiently in real-world IoT environments.
7. Datasets and Tools
Advancement of IoT security research and development depends critically on tools and datasets. They give a controlled environment for modeling IoT attacks and responses and support testing, validation, and benchmarking of security policies.
7.1. Datasets
As IoT devices continue to advance rapidly, they also provide new obstacles to researchers looking to defend systems against emerging intrusion threats. In addition, researchers are utilizing publicly available datasets on which to perform research to improve the capabilities of IDS as well as other products designed for security solutions. These datasets represent a wide range of intrusion types, including DDoS attacks, malicious software (i.e., malware), and data exfiltration, while also reflecting real-world scenarios involving both legitimate and malicious behaviors in IoT environments. The public datasets have been carefully compiled by researchers for their utility in examining cybersecurity-related research, as well as to provide a general understanding of the various features of IoT-related datasets for these purposes.
Table 6 specifically shows datasets that were created specifically for the purposes of researching and evaluating security and IDS in IoT environments and also provides an extensive variety of datasets. CICIDS2017 [
144] offers a realistic model of network scenarios involving multiple attack types, such as DDoS and port scanning, while including telemetry data from IoT services and their corresponding network communications, together with TON_IoT [
145]. RT-IoT2022 [
146] focuses on real-time IoT infrastructure, capturing multiple types of device behaviors, while MQTT-IoT-IDS2020 [
147] provides an overview of IoT devices operating in an MQTT-based network, including aggressive scanning and brute-force attacks. Both IoT-23 [
148] and N-BaIoT [
149] collect labeled traffic flows and network data of IoT devices to illustrate both benign and malicious activities, such as Mirai malware attacks. Datasets such as CICIoT2023, IoTID20 [
150], and IoT-Sentinel focus on developing hybrid intrusion detection systems and device identification. Similarly, datasets such as UNSW-NB15 [
151] and BoT-IoT [
152] provide insights into anomaly detection and IoT-specific threat detection. Using all of these datasets together gives researchers a comprehensive toolkit for enhancing IoT system security and facilitating effective cumulative detection and response strategies to protect against a wide range of threats.
7.2. Tools
Numerous tools have been developed for threat analysis, security mechanism evaluation, and intrusion detection evaluations to help both researchers and practitioners in the field of IoT Security. Tools in this area are used for network surveillance, attack emulation, and security protocol validation. The complexity of IoT environments necessitates that Security Technologies are flexible and are capable of supporting any number of architectures, communication protocols, or threat models. Simulation Technologies, for example, Cooja [
155] and NS-3 [
156] allow for simulation of IoT networks. By using those technologies, Network Vulnerability assessments, evaluation of Intrusion Detection Methods, and Attack Impact analyses can be performed in controlled environments. Network traffic analysis tools such as Wireshark [
157], facilitate capturing and examining network packets; therefore, improving opportunities to detect malicious activities, illegal communications, or network security breaches in IoT environments. In addition, large scale IoT Testbeds like IoT-LAB [
158], provide real-world experimental testbeds, to facilitate evaluation of security protocols, authentication systems and access control policies in realistic scenarios. Metasploit framework [
159] enables a security engineer to conduct penetration testing and vulnerability evaluation to simulate a cyber-attack on IoT devices, identify vulnerabilities, and assess countermeasures for IoT devices. Collectively, these solutions enhance overall IoT security through increased opportunities to proactively perform threat detection, perform security assessment, and optimize overall operational performance. It is important to note that many of the tools listed in
Table 7 are open-source, which plays a significant role in the advancement of IoT security research and development. Open-source tools provide transparency, flexibility, and community-driven improvements, allowing researchers and practitioners to adapt and extend security solutions to diverse IoT environments. Furthermore, they enable cost-effective experimentation and facilitate reproducibility, which are essential for validating intrusion detection systems and security mechanisms in complex IoT ecosystems. A summary of the most important tools used to secure IoT, their purpose and role in protecting the IoT Environment is contained in
Table 7.
8. Challenges and Future Directions
One of the main challenges in IoT security is the deployment of lightweight AI and edge-based solutions. The need for scalable and heterogeneous networks creates a number of security vulnerabilities, resulting from the increasing number of connected devices with varying hardware and software architectures. The resource constraints of many IoT devices prevent these devices from using security solutions that require a significant amount of computation. Consequently, new lightweight detection techniques are needed that reduce energy consumption and still provide a high level of detection accuracy. Federated learning models enable the distribution of AI model training to the edge devices themselves and lessens centralized cloud computing dependency. Furthermore, this allows for increased security and privacy because of the reduction in centralized dependence.
Another critical challenge lies in securing communication through lightweight cryptographic mechanisms. Research moving forward should concentrate on developing energy-efficient lightweight cryptographic protocols to support End-To-End encryption and authentication without negatively impacting device performance.
In addition, the lack of standardized and interoperable security frameworks remains a major concern. The absence of widely accepted security standards results in uneven security implementations across IoT systems. By advocating for the use of IoT-specific datasets and standardized security frameworks we can generate better, more consistent and more efficient security solutions in the IoT space. Several key organizations have proposed IoT Security Standards (IEEE 802.15.4,CoAP [
160], NIST SP 800-213 [
161]) while regulations such as GDPR and California SB-327 have established legal thresholds for compliance. While these standards exist, there remain many challenges including global alignment across different countries; enforcing these standards; and moving from the standard definition to the actual implementation of the standards.
From a privacy and long-term security perspective, emerging technologies introduce new challenges and opportunities. In addition, efforts should be made to develop quantum-resistant cryptographic methods to protect against the upcoming threat of quantum computers.
Finally, the integration of distributed and adaptive security architectures is essential for future IoT systems. Implementing safe protocols, federated learning, lightweight artificial intelligence-driven detection, and common security frameworks would significantly enhance IoT security. These research directions directly address the limitations identified in previous sections, including scalability challenges, resource constraints, lack of standardization, and evolving security threats in IoT environments.
9. Conclusions
In this paper, we provided a comprehensive overview of IoT security challenges, focusing on the classification of attacks, detection techniques, and countermeasure strategies. While technology is consistently improving, the inherent distribution of IoT networks causes these systems to be susceptible to multiple threats due to resource constraints and other factors associated with distributed computing models. The increasing frequency and complexity of these attacks underscore the need for effective mechanisms to identify, detect, mitigate, and establish secure and standardized solutions. In the near future, we must work on developing adaptive security systems, progressing real-time detection technologies, and building partnerships between industry, academia, and regulators to create a highly resilient and secure IoT environment. Future studies will also need to explore how to develop lightweight detection technologies that are capable of protecting user privacy, and that can provide quantum-resilient solutions for IoT devices with limited resources.