Next Article in Journal
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
Next Article in Special Issue
IoT-Driven Intelligent Energy Management: Leveraging Smart Monitoring Applications and Artificial Neural Networks (ANN) for Sustainable Practices
Previous Article in Journal
Dark Web Traffic Classification Based on Spatial–Temporal Feature Fusion and Attention Mechanism
Previous Article in Special Issue
Improving Real-Time Economic Decisions Through Edge Computing: Implications for Financial Contagion Risk Management
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis

1
College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
2
Computer Science Department, Faculty of IT, Mu’tah University, Karak 61710, Jordan
*
Author to whom correspondence should be addressed.
Computers 2025, 14(7), 250; https://doi.org/10.3390/computers14070250
Submission received: 20 May 2025 / Revised: 14 June 2025 / Accepted: 23 June 2025 / Published: 25 June 2025

Abstract

The incorporation of Internet of Things (IoT) applications into 5G networks marks a significant step towards realizing the full potential of connected systems. 5G networks, with their ultra-low latency, high data speeds, and huge interconnection, provide a perfect foundation for IoT ecosystems to thrive. This connectivity offers a diverse set of applications, including smart cities, self-driving cars, industrial automation, healthcare monitoring, and agricultural solutions. IoT devices can improve their reliability, real-time communication, and scalability by exploiting 5G’s advanced capabilities such as network slicing, edge computing, and enhanced mobile broadband. Furthermore, the convergence of IoT with 5G fosters interoperability, allowing for smooth communication across diverse devices and networks. This study examines the fundamental technical applications, obstacles, and future perspectives for integrating IoT applications with 5G networks, emphasizing the potential benefits while also addressing essential concerns such as security, energy efficiency, and network management. The results of this review and analysis will act as a valuable resource for researchers, industry experts, and policymakers involved in the progression of 5G technologies and their incorporation with IT solutions.

1. Introduction

1.1. Generations of Mobile Networks

Throughout several generations, mobile networks have undergone substantial technological and service breakthroughs. Analogue voice communication was first introduced by First Generation (1G) networks. 1G mobile networks provided basic telephone services and were primarily analog. It marked the beginning of wireless communication for commercial use [1]. Digital voice and rudimentary data services like SMS and MMS were introduced with the Second Generation (2G). 2G introduced digital communications, improved transmission quality, and focused on voice communication. It also led to the emergence of personal communications services (PCSs) [1]. Third Generation (3G) networks greatly improved data transmission capacity by enabling video calling and mobile internet access. 3G brought about advancements in supporting voice and data services and the introduction of wireless local area networks (WLANs) [1].
High-definition video streaming and sophisticated mobile internet services were made possible by Fourth Generation (4G), or LTE, which significantly increased data speeds. 4G technology significantly improved the data transmission speed and calling capabilities, paving the way for modern applications and services [2]. With ultra-high speeds, low latency, and huge connections for IoT devices, Fifth Generation (5G) networks mark a significant advancement that makes applications like driverless cars and smart cities possible. 5G networks are characterized by high-speed connectivity, low latency, high resilience, and the ability to support critical and massive machine-type communication, in addition to mobile broadband access [3,4].
It is anticipated that subsequent generations, like Sixth Generation (6G), will expand upon these developments by emphasizing even faster speeds, lower latency, and integrating AI and advanced machine learning for more intelligent network management [5]. Table 1 summarizes the key developments and characteristics of each generation from 1G to 5G and briefly touches on the prospects of 6G.
The evolution of mobile networks has been driven by the increasing demand for data traffic, the proliferation of smartphones, and the need for high-speed connectivity [7]. Each generation has built upon the previous one, addressing the limitations and challenges of the preceding technology to meet the growing demands of users. The deployment of new-generation systems has led to increased energy consumption, costs, and carbon footprints, necessitating a focus on energy efficiency in the transition to newer generations [8]. Figure 1 demonstrates the evolution of the generations of mobile networks over the years.

1.2. Features and Characteristics of 5G Networks

5G networks bring significant advancements in data rates, latency, device density, and support for diverse applications, enabled by innovative technologies like massive MIMO, network slicing, and SDN/NFV. However, they also present challenges in thermal management, interference, and security that need to be addressed for successful deployment and operation. 5G networks represent a considerable development over previous generations of mobile communication technologies, with new features and capabilities to fulfill the expanding needs for connectivity, speed, and dependability. Some of the main features of 5G networks are as follows:
  • High Data Rates and Bandwidth. 5G networks function at considerably higher frequencies (30–300 GHz) than 4G, allowing for greatly increased data rates. They enable data rates of several tens of Gbps, crucial for applications needing rapid data transfer [9].
  • Low Latency. A key feature of 5G is its extremely low latency, around 1 millisecond, which is essential for real-time uses like autonomous driving and remote surgical procedures [10].
  • High Device Density. 5G networks can support a very high density of devices, with connection densities of millions of devices per square kilometer, facilitating massive Machine-Type Communications (mMTCs). This is particularly important for the Internet of Things (IoT) and smart city applications [10,11].
  • Enhanced Mobile Broadband (eMBB). 5G networks can accommodate an exceptionally high concentration of devices, achieving connection densities of millions of devices for every square kilometer, enabling massive Machine-Type Communications (mMTCs) [9,11]. This situation centers on delivering high-speed internet connectivity, facilitating services such as high-definition video streaming and virtual reality. This situation centers on delivering high-speed internet connectivity, facilitating services such as high-definition video streaming and virtual reality.
  • Ultra-Reliable Low Latency Communications (URLLCs)
  • URLLC is tailored for uses that demand highly reliable and low-latency communication, like industrial automation and essential services [9,11].
  • Massive Machine-Type Communications (mMTCs). mMTC accommodates a significant quantity of IoT devices, facilitating smart cities, smart homes, and various IoT applications [9,11].
5G networks are a substantial advancement in mobile communication technology, incorporating numerous essential breakthroughs that improve performance, efficiency, and connectivity. The main innovations of this technology are as follows:
High Bandwidth and Low Latency. 5G networks offer extremely high data rates and ultra-low latency, which are crucial for real-time applications such as telemedicine, autonomous vehicles, and smart cities [12,13,14,15].
Massive Multiple-Input Multiple-Output (MIMO) and Beamforming. These technologies improve spectral efficiency and network capacity by allowing multiple data signals to be transmitted and received simultaneously [13].
Millimeter Wave Spectrum. The utilization of higher-frequency bands (millimeter waves) enables faster data transmission and supports a higher density of devices [16].
Network Slicing. This enables the construction of many virtual networks within a single physical 5G network, each customized for unique applications or services, enhancing flexibility and resource management [13].
Edge Computing. Enhances the speed of applications that demand real-time data processing by processing data closer to its source [13].
Dynamic Spectrum Sharing. This invention makes better use of the existing spectrum by dynamically distributing frequencies based on demand [16].
5G technology offers significant advancements over its predecessors, including higher data transmission speeds, reduced latency, and increased bandwidth. These improvements enable a wide range of applications across various industries:
Internet of Things (IoT): 5G is a foundational technology for IoT, enabling the connection of billions of devices with high reliability and low power consumption. This supports applications in smart cities, smart agriculture, and industrial automation [14,15].
Smart Grids and Energy: In the energy sector, 5G facilitates the development of smart grids by providing high-bandwidth and low-latency communication, essential for the real-time monitoring and management of power systems [12].
Healthcare: Telemedicine and remote surgery benefit from 5G’s low latency and high reliability, allowing for real-time data transmission and the remote control of medical devices [17].
Autonomous Vehicles: 5G supports the development of connected and autonomous vehicles by enabling real-time communication between vehicles and infrastructure, enhancing safety and efficiency [13,14,15].
Numerous technological, legislative, and operational issues must be considered when deploying and implementing 5G networks. The following summarizes the main issues and concerns:
Infrastructure Investment: Significant investment is required to build the infrastructure necessary for widespread 5G deployment, including new base stations and fiber optic networks [15,18].
Security and Privacy: The increased connectivity and data transmission capabilities of 5G pose new security challenges, necessitating robust cybersecurity measures and compliance with privacy regulations [18,19].
Interoperability: Ensuring compatibility between various IoT devices and existing technologies is crucial for the seamless integration of 5G networks [18].
In summary, 5G is a sophisticated wireless communication technology; however, its high-power consumption, cost, and infrastructure requirements sometimes bring limitations for its application in long-range IoT solutions, especially in distant areas or when low resources are available. Therefore, wireless technology should be chosen based on the range, power consumption, data transmission rate, signal behavior, and unique solution’s requirements. Among several IoT connectivity alternatives, LoRa (Long Range), for example, stands out because of its extended range and low power consumption, making it the preferable choice for long-range IoT applications. On the other hand, other technologies such as Wi-Fi offer high data transfer speeds and capacity; however, it is less commonly used for IoT solutions because devices in Wi-Fi networks consume a lot of power, and the range of the network is limited [1,2,3,4,5,6,7,8,9,10].

1.3. IoT in 5G

With improved connectivity, reduced latency, and faster data rates, the combination of 5G technology and IoT is poised to revolutionize several industries. Nevertheless, it also presents serious security issues that require careful planning, funding, and cutting-edge security solutions. With continuous research and development opening the door for creative applications and solutions, the Internet of Things appears to have a bright future in the 5G age [20,21]. The usefulness, effectiveness, and scalability of Internet of Things (IoT) applications are improved by the incorporation of 5G technology, which provides several noteworthy advantages. The following are the main benefits of 5G for IoT:
  • Improved Connectivity and Capacity: 5G technology facilitates the efficient communication of vast networks of smart devices by supporting a huge number of IoT devices. For uses like healthcare, industrial automation, and smart cities, this is essential [19,20].
  • Reduced Latency: 5G’s extremely low latency is one of its biggest benefits; this is crucial for real-time applications like remote surgery and driverless cars [22].
  • Greater Data Rates: To manage the massive amounts of data produced by IoT devices, 5G provides noticeably faster data transmission rates than its predecessors [23].
5G networks offer several improvements over earlier generations, marking a substantial leap forward in mobile communication technology. The following are some significant technological developments:
Network Slicing: Network slicing, or the creation of several virtual networks inside a single physical 5G network, is made possible by 5G. This makes it possible to provide tailored connectivity options for various IoT applications, guaranteeing top security and performance [21].
Advanced Communication Technologies: 5G’s capacity to serve a variety of IoT applications is enhanced by technologies like visible light communication (VLC), millimeter wave (mmWave), and multiple-input-multiple-output (MIMO) [22].
The introduction of 5G networks has the potential to completely alter the operational and economic environments in several industries. Significant improvements in data rates, latency, dependability, and capacity are anticipated with this new generation of mobile networks, which should stimulate significant operational and economic growth. The following are the two main economic and operational implications:
Cost-Benefit Analysis: Although the 5G infrastructure requires a large initial investment, there are long-term advantages, such as increased energy efficiency, lower maintenance costs, and the capacity to accommodate more IoT devices, which lowers overall costs [24].
Strategic Investments: Considering the operational and financial implications, businesses are urged to make strategic investments in 5G to fully utilize its potential for IoT applications [20,24].
While promising unprecedented speed, low latency, and connectivity, 5G introduces a range of new security challenges due to its complex and heterogeneous nature. The following are the two main concerns:
Increased Security Risks: IoT device vulnerabilities and the requirement for strong security measures to fend off assaults like distributed denial of service (DDoS) are among the additional security issues brought about by the integration of IoT with 5G [25,26,27].
Security Solutions: To reduce these risks and guarantee safe IoT deployments in 5G networks, innovative security frameworks like block chain and attribute-based access control (ABAC) can be put into place [24,27].
The IoT and 5G networks have the potential to completely transform several industries. The following are some important avenues for this integration’s future:
Emerging Technologies. The capabilities and uses of IoT will be further enhanced by the convergence of 5G with emerging technologies such as cloud computing, machine learning, and artificial intelligence (AI) [21].
Research and Development: To solve the issues and enhance the functionality of 5G-enabled IoT systems, continuous research is necessary, with a particular emphasis on areas like resource allocation, energy optimization, and security [22,26].
Security Enhancements. There are serious security issues when IoT and 5G are combined. It is essential to provide thorough security frameworks to safeguard IoT devices and data. This entails fixing weaknesses and putting strong security measures in place. In 5G networks, blockchain can offer a decentralized and safe way to manage IoT devices, guaranteeing safe connectivity and thwarting attacks [25,27].
Edge Computing and AI Integration. While edge computing’s close proximity to IoT devices can improve real-time processing and lower latency, which is especially advantageous for applications that need to analyze and respond to data instantly, artificial intelligence (AI) can improve data processing, optimize network management, and improve decision-making processes in 5G-enabled IoT systems [28].
The main contributions of the research work are as follows:
  • In the Introduction, there was a thorough examination of the changing role of the IoT in 5G networks. By initially outlining the development and comparative attributes of mobile network generations, the paper creates a foundational understanding of technological progress. It then explores the essential features and advancements of 5G networks, paving the way for an in-depth discussion on the transformative possibilities of IoT integration. Lastly, the paper underscores the potential effects and emerging trends of IoT-enabled 5G systems, providing valuable insights into how this convergence could transform communication, automation, and smart infrastructure.
  • The literature review synthesizes recent research on the integration of 5G, IoT, and AI across key sectors—smart cities, industrial automation, healthcare, agriculture, and autonomous vehicles—highlighting their transformative potential, challenges, and real-world implementations. It provides a structured comparison of studies, identifying gaps (e.g., 5G reliability in smart cities, AI-ethics trade-offs) and future directions (e.g., 5G optimization, scalable IoT solutions). The review serves as a comprehensive reference for researchers and practitioners, bridging theoretical advancements with practical applications.
  • Regarding the use of IoT in 5G, a comprehensive classification of AI and IoT applications in 5G across various sectors, including education, security, healthcare, and entertainment, is conducted. Moreover, an analysis of sector-specific impacts, emerging trends, and market growth emphasizes how these technologies are driving innovation and enhancing efficiency in industries such as healthcare, agriculture, and smart cities.
  • Concerning the security measures needed, we present a comprehensive, multi-layered analysis of security challenges and corresponding countermeasures for integrating IoT applications within 5G networks. Moreover, we highlighted the emerging role of AI-driven security mechanisms in strengthening the resilience of 5G-enabled IoT systems.
  • Finally, the challenges facing IoT integration with 5G networks are addressed in this research work since considering that addressing these challenges necessitates collaborative efforts among researchers, industry leaders, and regulatory bodies to develop standardized frameworks, robust security measures, and energy-efficient communication protocols.
This review differs from existing works as follows:
  • The review offers a comprehensive, sector-specific analysis of IoT applications within 5G networks, supported by structured comparison tables and statistical insights.
  • It provides a unique focus on emerging technologies and security challenges, making it a practical and forward-looking reference for researchers and practitioners.
  • It delivers a comprehensive and multifaceted analysis of the integration of IoT applications into 5G networks, addressing both technical and economic aspects, real-world applications, network slicing, security concerns, and the integration of emerging technologies.
  • This holistic approach sets apart from existing literature and offers valuable insights for stakeholders looking to leverage the full potential of 5G–IoT integration.
This is how the remainder of the paper is structured. A discussion of a relevant piece of literature is provided in Section 2. Section 3 discusses the use of IoT in 5G networks across several industries. In Section 4, security measures and applications are examined to ensure successful integration. In Section 5, the difficulties encountered are reviewed, and in Section 6, conclusions and future directions are presented, followed by a list of relevant references. The framework structure of the research is given in Figure 2.

2. Literature Review

The convergence of 5G networks, IoT, and AI is driving transformative advancements across critical sectors, enabling smarter, more efficient systems while addressing global challenges like urbanization, sustainability, and resource management. This literature review synthesizes recent research on the application of these technologies in smart cities, industrial automation, healthcare, agriculture, and autonomous vehicles, highlighting their potential, limitations, and real-world implementations. From 5G’s role in enabling real-time IoT monitoring for urban infrastructure to AI-driven predictive maintenance in Industry 4.0, the reviewed studies demonstrate significant strides in scalability and efficiency.

2.1. Study Selection Criteria

The studies included in this review were selected based on the following criteria:
  • Relevance to 5G-IoT-AI Integration: Focus on peer-reviewed articles that explicitly address the intersection of 5G, IoT, and AI in the target sectors.
  • Technological Scope: Emphasis on studies evaluating real-world implementations, architectural frameworks, or empirical validations (e.g., pilot projects, simulations, or case studies). Theoretical proposals were included only if they offered novel in-sights.
  • Impact and Innovation: Prioritization of research demonstrating measurable improvements in scalability, efficiency, or sustainability, or identifying critical challenges (e.g., latency, privacy, interoperability).
  • Geographical Diversity: Inclusion of studies from both early-adopter regions (e.g., Singapore, the EU) and emerging economies to capture global trends and deployment disparities.
  • Methodological Rigor: Preference for studies with clear methodologies (e.g., systematic reviews, experimental validations, or bibliometric analyses) and reproducible results.
  • Rationale for Criteria:
    • Relevance and Scope ensure alignment with the paper’s focus on interdisciplinary integration, avoiding indirect work (e.g., standalone AI algorithms unrelated to 5G/IoT).
    • Impact-driven selection highlights actionable insights for practitioners, while geographical diversity reveals contextual challenges (e.g., 5G coverage gaps in rural agriculture [29]).
    • Methodological rigor safeguards against unreliable evidence, particularly important for emerging technologies where hype may overshadow empirical limitations (e.g., 5G’s uneven performance in smart cities [30]).
These criteria collectively address the need for a balanced, evidence-based synthesis of the field’s state-of-the-art, gaps, and future directions.

2.2. Smart Cities

The real-world performance of 5G networks in supporting smart city applications, focusing on an IoT-based pilot project for road asset monitoring using waste collection trucks over six months, is evaluated in [30]. While 5G demonstrates potential for mobile video streaming, the study reveals significant performance variations that may hinder its reliability for data-intensive or near-real-time applications. Unlike prior evaluations limited to 5G core testing or speed tests, this work provides a comprehensive assessment through both application-specific and independent analyses. The findings highlight current limitations in 5G deployments, suggesting they may not yet fully meet the demands of emerging smart city services, particularly where consistent high bandwidth and low latency are crucial. The study contributes practical insights into 5G’s readiness for scalable smart city solutions amid uneven network coverage.
The role of 5G in sustainable smart buildings is explored in [31], highlighting its potential to enhance construction, operation, and management through high-class services and efficient functionalities. Focusing on Singapore—a leading smart city and early adopter of 5G—the study examines global trends, R&D efforts, and test-bedding initiatives in 5G labs. It provides a comprehensive review of 5G developments, use cases, and government-supported projects in Singapore, particularly for smart buildings and built environment improvements. The research serves as a valuable benchmark for future smart city development, offering insights for researchers and industries in the context of big data and sustainable urban growth.
The study in [32] contributes a comprehensive bibliometric analysis of smart city security and surveillance, examining 745 Scopus-indexed articles (1977–2023) to map key trends and challenges. It highlights the tension between AI-driven technological advancements and privacy concerns, emphasizing the need for ethical AI deployment in urban management. Through co-citation, co-occurrence, and bibliographic coupling analyses, the study identifies critical thematic clusters and influential works in the field. The research offers actionable insights for policymakers and urban planners to balance urban safety with privacy protection, advocating for robust governance frameworks. Ultimately, it underscores the importance of fostering public trust through ethical standards in AI-powered security systems for smart cities. The work in [33] proposes an IoT-based smart parking system that leverages mobile applications and cloud technology to efficiently manage parking spaces and reduce congestion. The system not only provides real-time information on available parking spots but also helps users locate the optimal space. By utilizing 5G-enabled IoT sensors, it ensures seamless connectivity and low-cost data transmission between devices and the cloud. A cloud-based architecture simplifies data storage, management, and sharing across multiple workstations. Overall, the design enhances parking efficiency, improves vehicle management, and supports scalable, industry-friendly solutions through 5G integration.
Similarly [34] proposes an IoT-based environmental monitoring system that enables real-time and historical data visualization through a web app, accessible from anywhere via the internet. The key contribution lies in its seamless integration of hardware, network, and software configurations to provide customizable data insights while prioritizing security, responsiveness, and efficient data management. The system supports diverse sensor technologies, allowing users to monitor air quality, weather, and pollution levels with flexibility in data display. By bridging edge-to-cloud connectivity, it enhances accessibility and usability for both individuals and researchers, overcoming time and location constraints. Overall, the study advances environmental monitoring by offering a scalable, user-friendly solution for analyzing large volumes of sensor data.
Finally, [35] explores the integration of 5G and IoT technologies, discussing their architectures, common implementations, and key challenges, particularly focusing on interference issues. It provides a detailed analysis of interference in wireless applications, specifically in 5G and IoT systems, along with potential optimization techniques to mitigate these problems. The study emphasizes the critical need to address interference and enhance network performance to ensure reliable IoT connectivity, which is vital for efficient business operations. Additionally, it highlights how businesses can leverage these technologies to boost productivity, minimize downtime, and improve customer satisfaction. The paper also underscores the transformative potential of converging networks and services in expanding internet accessibility and enabling innovative applications. Table 2 below provides a comparison of the studies discussed.

2.3. Industrial Automation

In [36], a novel architectural design for 5G-enabled Industrial Internet of Things (IIoT) to enhance smart manufacturing processes in cyber-physical manufacturing systems (CPMSs) is proposed. The architecture leverages key 5G features such as enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), ultra-reliable low-latency communication (URLLC), and narrowband IoT (NB-IoT) to address the limitations of 3G/4G in handling high data volumes, low latency, and real-time monitoring. By integrating these 5G capabilities with IIoT, the proposed framework improves industrial automation, collaboration, and efficiency in smart manufacturing. The contribution lies in enabling advanced industrial services through a 5G-driven IIoT architecture, optimizing CPMS for future smart industries.
The contribution in [37] proposes a 5G-enabled Network Application (NetApp) for predictive maintenance in energy-related critical infrastructures, leveraging AI to enhance failure prediction and prevent equipment damage. NetApp employs containerized components to collect time-series operational data from power plants and detect anomalies in energy generator performance using an autoencoder-based approach. By enabling real-time monitoring and early fault detection, the system facilitates timely maintenance interventions. The evaluation results confirm the effectiveness of the proposed solution in improving predictive maintenance for critical infrastructure. Overall, the paper contributes an AI-driven, 5G-integrated framework to optimize operational reliability in the energy sector.
The work in [38] reviews recent research on Automated Guided Vehicles (AGVs) and Autonomous Mobile Robots (AMRs), focusing on communication and control challenges in industrial settings. It highlights the stringent latency and reliability requirements for wireless technologies used in AGV/AMR coordination and fleet management, which many existing solutions fail to meet. The study discusses integration challenges and the limitations of current state-of-the-art technologies in smart manufacturing environments. Additionally, it identifies research gaps in applying 5G networks for AGV/AMR fleet management and proposes novel integration approaches, such as leveraging the tactile Internet, 5G network slicing, and virtual reality to enable future smart factories. The paper contributes by motivating innovative solutions to enhance AGV/AMR deployment in industrial automation.
The research in [39] proposes a genetic algorithm (GA)-based resource management approach integrated with machine learning for predictive maintenance in fog computing within Industry 4.0. The study focuses on optimizing task distribution and predictive maintenance by comparing GA with traditional scheduling algorithms (MinMin, MaxMin, FCFS, Round Robin) in terms of the time, cost, and energy efficiency using FogWorkflowSim simulations. The results show that GA outperforms other methods, achieving a 0.48% faster execution time, 5.43% lower cost, and 28.10% lower energy usage compared to the second-best approach. Additionally, the predictive maintenance model, built using two-class logistic regression on real-time data, achieves high accuracy (95.1% training, 94.5% testing), demonstrating its effectiveness in failure prediction and resource optimization.
A systematic literature review (SLR) on IoT-based Supply Chain Management (SCM) from 2018 to 2022 is presented in [40], addressing the lack of comprehensive reviews in this growing research area. It highlights how IoT technologies—such as GPS, RFID, and NFC—enhance SCM by enabling real-time tracking, asset management, and operational efficiency. The review provides a detailed analysis of IoT applications, technologies, sensors, and devices used across various SCM stages. Additionally, it offers insights into the challenges, benefits, and economic impacts of the IoT in SCM. The findings serve as a valuable resource for researchers and practitioners seeking a holistic understanding of IoT-based SCM systems.
The study in [41] explores the synergy between Virtual Commissioning (VC) and Digital Twins (DTs), two key Industry 4.0 technologies, addressing a gap in the existing research. It identifies a strong relationship between VC and DTs, emphasizing their shared components like digital models, and demonstrates how their combined use enhances model reusability and overall value. The study proposes strategies for integrating VC and DTs, including mutual support and full integration, while also suggesting future research directions. By highlighting their complementary roles, the paper contributes to optimizing industrial processes through effective VC-DT collaboration. Table 3 below provides a comparison of the studies discussed.

2.4. Healthcare

The study in [42] highlights the transformative potential of 5G technology in healthcare, emphasizing its role in enabling smart healthcare systems and improving medical resource allocation. It discusses the key features and service pillars of 5G that support healthcare innovations, such as remote patient monitoring and AI-integrated smart devices. The study identifies major applications of 5G in healthcare, including enhanced patient autonomy and real-time decision-making through interconnected devices. While acknowledging challenges like limited coverage in obstructed areas, the paper anticipates greater collaboration between network providers and medical device manufacturers to advance smart medical care. Overall, the contribution lies in outlining how 5G can revolutionize healthcare accessibility, efficiency, and technological integration.
The research in [43] emphasizes the transformative potential of 5G wireless networks in healthcare, emphasizing the need for greater awareness to accelerate adoption and avoid the delays seen in past technologies like minimally invasive surgery. The authors review 13 relevant studies, analyzing 5G’s capabilities in clinical applications, education, research, and administrative infrastructure, while addressing both opportunities and challenges. They discuss how 5G enables an integrated ecosystem of innovative technologies that can revolutionize healthcare delivery. The study also examines nontechnical barriers to implementation and advocates for increased awareness to shorten the acceptance timeline. By synthesizing the current evidence, the paper aims to promote the faster adoption of 5G-driven solutions for improved patient care.
The transformative role of IoT in healthcare is explored in [44] by analyzing specific sensor technologies and communication methods. It highlights successful applications such as remote patient monitoring, personalized treatments, and improved healthcare efficiency. The study also addresses key challenges, including data security, interoperability, and optimal data utilization. By showcasing real-world implementations, the paper demonstrates how IoT enhances patient care and resource management. Ultimately, it aims to guide practitioners and researchers in leveraging IoT to advance healthcare delivery.
The research in [45] surveys the integration of 5G technology, IoT, and AI to enhance smart hospitals by improving medical services and patient care. The study focuses on optimizing 5G waveforms (NOMA, FBMC, OFDM) through a proposed PAPR reduction algorithm to boost power efficiency and spectral access. Advanced detection and spectrum sensing algorithms are applied to enhance signal detection and reduce spectrum leakage, improving throughput and spectral efficiency. Additionally, the paper highlights the role of the IoT and AI in enabling remote healthcare services, cost reduction, and better patient outcomes. The findings demonstrate that these technologies can significantly enhance hospital efficiency and healthcare quality.
A systematic review of 5G-enabled smart healthcare applications is presented in [46], highlighting its contributions to enhancing medical services through high-speed data transmission, ultra-low latency, and improved network capacity. The study emphasizes 5G’s role in supporting IoMT devices, remote care, and reducing in-person hospital visits via eMBB and URLLC features. Using the PRISMA methodology, the review analyzes research trends, revealing that most existing works are proposals (56.81%) or theoretical studies (22.73%), with limited implementations (15.91%) due to 5G’s ongoing global deployment. The paper also addresses key technical aspects, health benefits, and security protocols necessary for developing smart healthcare systems. Despite current limitations, the study underscores the promising potential of 5G in transforming healthcare delivery.
The study in [47] highlights the transformative potential of telesurgery—a telemedicine application using robotic systems and ICT—to enable remote surgical procedures, overcoming geographical barriers and reducing patient travel. It emphasizes telesurgery’s benefits, including cost containment and enhanced access to minimally invasive robotic surgery. However, despite growing interest, the study notes its limited clinical adoption due to unresolved challenges. The article reviews these advantages, identifies current limitations, and explores potential solutions through ongoing research to facilitate broader implementation. Overall, the work contributes by assessing telesurgery’s promise while addressing critical barriers to its practical use. Table 4 below provides a comparison of the studies discussed.

2.5. Agriculture

A comprehensive review of how emerging technologies like the IoT, AI, and ML are transforming agriculture across key areas such as smart farming, precision livestock, and regenerative agriculture is presented in [48]. By synthesizing current research, innovations, and case studies, it highlights the role of these technologies in boosting productivity, sustainability, and efficiency. The study explores practical applications in open-field farming, vertical farming, and zero-waste systems, offering insights for farmers and consumers. Additionally, it addresses future perspectives on leveraging these advancements to tackle global food security and environmental challenges while supporting sustainable development goals. Ultimately, the work serves as a valuable resource for understanding the impact of cutting-edge technologies in modern agriculture.
The work in [49] contributes to the field of Food Traceability Systems (FTS) by analyzing existing definitions of traceability and proposing a simpler, more comprehensive definition. It also introduces a new architecture for IoT-based FTS and a classification framework for the technologies used, categorizing them into Identification and Monitoring Technologies (IMTs), Communication Technologies (CTs), and Data Management Technologies (DMTs). Additionally, the paper discusses the applications of emerging technologies like 5G and Distributed Ledger Technology (DLT) to enhance FTS. By addressing gaps in standardization and technology classification, the study aims to improve food safety, regulatory compliance, and consumer confidence in food supply chains. The work also explores future trends in IoT-based traceability systems.
An IoT-based biological state monitoring system designed for automated livestock health and welfare inspection in intensive farming is proposed in [50]. The key contribution is a distributed master–slave hardware setup using microprocessors, laser sensors, and wireless modules to collect real-time livestock posture data, analyzed via a one-dimensional spatial posture description method. The system employs an RS485 bus and MQTT protocol to transmit JSON-formatted data to an Alibaba Cloud server, enabling centralized monitoring through the mobile app. Experimental results confirm the system’s effectiveness in remote data acquisition, real-time reporting, and status alarms, meeting the accuracy requirements for large-scale farming. This solution enhances livestock management by providing timely, reliable monitoring across multiple breeding sites. The work in [51] explores the role of the 5G-based Internet of Things (IoT) in advancing smart agriculture, addressing the need for increased production, sustainability, and efficiency. It reviews recent developments in 5G–IoT for agriculture, proposing a conceptual framework that includes its architecture, key technologies, and applications. The study highlights practical use cases across various smart agriculture scenarios, demonstrating the transformative potential of 5G–IoT. Additionally, it identifies key challenges and scientific problems, offering research directions to overcome them. Finally, the paper outlines future trends and the broader application value of 5G-enabled smart agriculture.
The transformative potential of 5G technology in smart farming is presented in [29], highlighting its role in enhancing connectivity, real-time monitoring, and data-driven agricultural practices. It addresses key challenges such as network infrastructure, edge computing, AI integration, and security while emphasizing alignment with Sustainable Development Goals (SDGs) like Zero Hunger and Industry Innovation. The study discusses critical applications, including UAV operations, AR/VR, predictive maintenance, and AI-driven analytics, to boost productivity and sustainability. Additionally, it identifies research gaps and calls for stakeholder collaboration to optimize 5G deployment in agriculture. Ultimately, the paper underscores 5G’s potential to advance sustainable farming, reduce the environmental impact, and support global food security and technological innovation. Table 5 below provides a comparison of the studies discussed.

2.6. Transportation and Autonomous Vehicles

The role of 5G technology in advancing Logistics 4.0 by enabling reliable, real-time communication for managing large-scale data exchange between interconnected systems was studied in [52]. Through a systematic literature review, it identifies key logistics areas where 5G can be implemented, highlighting its potential benefits and the complementary technologies (IoT, AI, big data) that enhance its adoption. The study also outlines the expected improvements in logistics processes, such as optimization and efficiency gains. Additionally, it discusses the current challenges hindering widespread 5G integration in logistics and suggests future research directions to address these barriers. Overall, the paper contributes by mapping 5G’s transformative potential in Smart Logistics while addressing adoption challenges.
The work in [53] studies the integration of cutting-edge technologies, such as the IoT, edge intelligence, 5G, and blockchain, into autonomous vehicle (AV) architectures to enhance safety, efficiency, and sustainability in intelligent transportation systems. It provides a comprehensive review of these technologies’ impact, implementation challenges, and potential solutions. The study also discusses the seamless integration of these advancements to meet AV requirements and highlights future research directions. By consolidating key enabling technologies in a single review, the paper serves as a valuable reference for researchers and stakeholders in AV development, addressing critical challenges and opportunities in the field.
The survey in [54] explores the integration of Fifth Generation (5G) and beyond (B5G) networks with autonomous vehicles (AVs), highlighting how 5G’s enhanced capabilities—such as ultra-reliable low latency communication and massive connectivity—can support AV requirements. It reviews current advancements in AVs, automation levels, and enabling technologies while discussing the role of 5G in facilitating AV deployment. The paper also examines emerging technologies for 5G–AV integration, security concerns, and standardization efforts. Additionally, it identifies key challenges, lessons learned, and future research directions to advance AV technologies in the 5G and B5G era.
The work in [55] investigates how 5G technology will revolutionize smart cities and intelligent transportation systems (ITSs) by enabling massive connectivity, high mobility support, and network ubiquity, overcoming the limitations of 4G. It highlights 5G’s role as a key enabler for the Internet of Things (IoT) and the Internet of Vehicles (IoV), facilitating seamless integration in densely populated or high-speed environments. The discussion comprehensively addresses the technical, economic, and legal challenges associated with 5G deployment in these domains. By analyzing its impact on autonomous vehicles and vehicular communications, the paper provides insights into the transformative potential of 5G in the coming years. Overall, it underscores 5G’s significance in advancing smart urban and transportation ecosystems.
The role of 5G networks in enhancing Vehicle-to-Everything (V2X) communication, emphasizing its potential to improve road safety, traffic efficiency, and energy savings through high-speed, low-latency connectivity, is investigated in [56]. It evaluates V2X performance on 5G compared to older networks, covering key paradigms like V2V, V2I, and V2P, while addressing challenges such as infrastructure integration, security, and privacy. The study also examines the impact of V2X on smart cities, autonomous vehicles, and Intelligent Transportation Systems (ITSs). Additionally, it highlights emerging technologies like edge computing, AI, and blockchain that could transform V2X systems. Serving as a comprehensive guide, the paper provides valuable insights for policymakers, researchers, and scholars in the field. Table 6 below provides a comparison of the studies discussed.

3. Application of IoT in 5G Networks

3.1. Implementation of AI and IoT-Driven 5G Solutions

There are several applications of IoT in 5G networks, such as education, health, smart cities, agriculture, and energy. Table 7 demonstrates a comprehensive classification of IoT applications in 5G networks across various sectors, including health, education, agriculture, industry, city development, retail, energy, finance, entertainment, and defense. Each sector is further divided into specific applications, reflecting the broad spectrum of technological advancements enabled by the convergence of IoT and 5G.
Emerging technologies such as AI, the IoT, and 5G have a strategic role in transforming healthcare, with a focus on smart hospitals, remote patient and elderly monitoring, and security. Several studies demonstrate the potential of these technologies in reducing latency and enhancing real-time applications in smart healthcare environments. Kumar et al. [57] proposed a hybrid detection technique for improving latency in 5G-based smart hospitals, while Jiménez et al. [62] discussed the integration of 5G in remote patient monitoring systems. Siriwardhana et al. and Chamola et al. [60] examine the role of 5G, AI, blockchain, and IoT in managing the COVID-19 pandemic, working on how Artificial Intelligence methodologies improve diagnostics, patient tracking, treatment, and healthcare logistics.
Another application of AI in 5G is the security issues in healthcare systems. Chen et al. [58] proposed a Zero-Trust model to enhance security awareness and protection in smart healthcare. Ahmad et al. [61] and Balasundaram et al. [64] discussed the potential of IoT and wearable sensors for remote health monitoring and emergency care. Recent studies with Anglano et al. [66] and Humayun et al. [67] emphasize cloud-based wearable health tracking systems and the importance of emerging technologies in improving healthcare access in remote areas. Proposed methods and models demonstrate high accuracy of the AI and IoT based 5G in the health sector.
AI and IoT-based 5G have several applications in the education sector, from smart classrooms to teaching methodologies [67]. Li et al. [69] proposed an AI-based 5G model for campuses that have sustainable energy efficiency, secure rooms, and automation in several locations. Peng et al.’s [69] model creates a virtual representation of the classroom, enabling the real-time monitoring of environmental conditions, student engagement, and resource utilization using IoT sensors. Virtual-reality-based applications are also very efficient in education, especially remote learning and adult education [71]. These systems are very helpful in managing classrooms and campuses, such as attendance, security checks, monitoring, and examinations [72]. Kitkowska et al. [73] proposed another monitoring system in elementary schools to monitor student activities, campus security, and enhancements for privacy protection.
Recently, the agricultural usage of technology has become more important. The integration of IoT, AI, and 5G technologies brings efficiency and quality to agricultural products. Irrigation, monitoring, decision-making, and prediction are the main applications of the AI-based systems. Lu et al. [74] proposed the real-time monitoring of soil moisture, temperature, and environmental conditions, optimizing water usage and improving crop yields. Sensors collect data such as the temperature, moisture, water level, and soil quality, and machine-learning-based predicted models help farmers to make decisions. It is easier to monitor large farm areas, detect plant diseases, and arrange water levels [75,76,77]. Bhatia et al. [78] discussed the impact of IoT and AI applications, including smart agriculture, smart cities, and industrial automation, highlighting key challenges and opportunities. Robotics is also a very critical field for smart farming. Agri robots are very useful in monitoring and replacing labor in agricultural fields [79,80].
In today’s industry, sensors, robots, and AI models are frequently used in all sectors. Industry 5.0 emphasizes human-centric and sustainable manufacturing by integrating AI, robots, and IoT [81,82]. Security and privacy in industrial fields challenge 5G-enabled Industrial IoT, requiring advanced encryption and authentication methods [83]. Also, IoT-based smart home frameworks ensure safety through biometric authentication and intrusion detection in industry [84]. In the energy sector, IoT and AI play a vital role in predictive maintenance and real-time monitoring to enhance efficiency in oil and gas operations [85,86].
There are various applications of the AI-based IoT and 5G in sustainable city development in transportation, monitoring, and waste management. Modina et al. and Honda et al. worked on traffic control systems in city centers [87,88]. There is also machine-learning-based smart sensor systems in waste management. AI-based methods have high accuracy in waste collection and classification [89,90]. City monitoring systems are based on video cameras and IoT sensors, which are mostly used for security and safety reasons [91,92]. All of these smart systems are integrated with AI-based algorithms that process data, classify, predict, and make decisions in a short time. Human-based monitoring systems are time-consuming and have lower accuracy than machine-based systems. Another application of AI-based 5G technologies is retail, such as marketing [93,94] and e-shopping [95,96]. Prasad et al. [93] analyzes the economic and security challenges of AI-based 5G in emphasizing market trends and risk-mitigation strategies. Gomes et al. [94] analyzed business models for managing IoT–mobile devices in digital hospitals, addressing privacy and security concerns. Other works discuss how 5G enhances IoT applications in daily life and shopping and highlight improvements in connectivity and automation [95,96]. AI and IoT technologies have recently been used in energy sectors, such as smart grid, energy management, infrastructure monitoring, and smart meters. The authors in [97,98,99,100,101,102,103,104,105] worked on the integration of 5G, artificial intelligence (AI), and the Internet of Things (IoT) in smart grid and energy management systems. Zhang et al. [97] discuss AI services enabled by 5G Multi-Access Edge Computing in smart grids, while Saleem et al. [98] discuss the role of IoT in enhancing cyber-physical systems within the 5G-powered smart grid. Daas et al. [99] introduce a graph-theory-based energy management framework in energy management systems. Experimental results show that the proposed AI and IoT-based techniques are very efficient and have high accuracy in energy management.
Risk monitoring [105,106] and smart applications [107] in finance, smart TV [108,109], and virtual reality [110,111] applications also benefit from AI and IoT technologies via 5G. Defense and security is another critical field using these technologies, such as in surveillance, wearable devices, and smart vehicles [112,113,114,115,116,117]. Machine-to-machine communication is very important in 5G. Muhammad et al. [112] propose an efficient fire detection system for uncertain surveillance environments such as dusty weather. Quintana-Ramirez et al. [113] introduced an edge cloud-based video surveillance system for public transportation security. Gravina and Fortino [114] provide a discussion of wearable body sensor networks that can be used in the security and defense sector.

3.2. Statistical Insights and Market Trends

Table 8 demonstrates some statistics for 5G applications in several sectors. In healthcare, 5G technology usage is increasing, especially in monitoring. Statistics show that 31% of US patients got remote monitoring in 2021. It is obvious that AI-based sensor technology will be efficient in the health sector in the future. The education sector is another important and popular use of technology, such as smart schools, distance learning, and virtual reality applications. This sector will reach more than $400 billion in the market. IoT-based home and city applications are very popular, and with AI applications, they are growing in the market. Energy and defense sectors are also growing and very highly expected in the market in the future, as given in Table 8.
The shift from 4G to 5G networks has had a major impact on how the Internet of Things (IoT) is used across different sectors. With 4G, we saw the rise of early IoT applications like smart thermostats, home assistants, wearable fitness trackers, and simple agricultural sensors. These systems were useful but relatively limited, as 4G could only support around 100,000 connected devices per square kilometer and had latency in the range of 30 to 50 milliseconds. This made it suitable for everyday consumer use but not ideal for more complex tasks that required real-time data or large-scale device integration. The network’s slower uplink speeds also made it harder to manage the huge volumes of data generated by large sensor networks, especially in industrial settings. 5G brings dramatically faster speeds, a much lower latency, and the capacity to support up to a million devices in the same area. This means that the IoT can now be used in much more advanced and demanding scenarios. We are seeing 5G-powered applications in self-driving cars, where real-time communication is essential, as well as in remote surgeries where precision and speed are critical. It is also enabling smarter city infrastructure like traffic systems and surveillance [72,91], along with more efficient industrial automation, predictive maintenance, and energy management through smart grids.
Table 9 demonstrates technological and regional statistics of 4G and 5G. The deployment of IoT devices has grown rapidly across mobile generations, with significant regional differences in adoption. In the 4G era, IoT growth was largely driven by consumer electronics in the USA, Europe, and East Asia, focusing on wearables, home automation, and telematics. However, the emergence of 5G has shifted focus toward industrial and mission-critical IoT in countries with strong infrastructure investments [85,103,104].

4. Security Measures of Integrating IoT Applications in 5G Networks

4.1. General Overview

It is a great opportunity to change the different sectors of the economy with the help of the integration of IoT applications into 5G networks, besides the improvement of data transmission speeds, the decrease in delivery time, and the increase in the number of connections. However, this convergence also creates several security risks that must be addressed to ensure that IoT devices and networks are secure. Recent identifications have highlighted the need for robust security frameworks to address the increasing risks of cyberattacks in 5G-based IoT environments [121]. Some of these security risks include data leakage, DoS attacks, and access control, which are a great risk to both individuals and organizations that use IoT applications in the 5G network [122]. The combination of IoT and 5G networks is introduced to transform the way people can interact with technology. IoT devices are gathering a large amount of data, which needs to be transported through secure and robust networks. These characteristics of 5G networks, high-speed data transfer, low latency, and massive machine-type communications, make it suitable for IoT applications [123]. However, this integration creates new security threats such as MitM attacks, DDoS attacks, and firmware exploits that need to be prevented to protect the data and the network’s integrity [123].

4.2. Security Challenges in Integrating IoT Applications in 5G Networks

In this paper, the deployment of IoT applications on top of the 5G network is presented to create new opportunities for almost all sectors of the economy by enhancing the speed of data transmission and reducing the time delay in the network. However, the integration of such IoT devices and networks presents certain crucial security risks that must be addressed to make the IoT devices and networks reliable and safe.
The combination of IoT applications with 5G networks enables multiple sectors to benefit from faster data transfer speeds and lower latency. The implementation of IoT applications in 5G networks creates essential security problems that must be solved to protect network reliability and device safety. The growing attack surface remains a major concern because the expected 75 billion connected IoT devices in 2025 will generate extensive new entry points for unauthorized access and data breaches that require strong security measures, including encryption and AI-based anomaly detection [124]. Data privacy stands as a major concern because IoT devices gather personal and health and industrial information, which needs protection through strict regulations like GDPR; research shows growing IoT data breaches, which demonstrate the requirement for decentralized security systems that use blockchain authentication and AI intrusion detection [121]. The extensive connectivity of 5G networks creates conditions that make the system vulnerable to congestion and Distributed Denial of Service (DDoS) attacks, which attackers can exploit using IoT-based botnets [121]. The use of default or weak passwords by many IoT devices creates authentication and authorization challenges because it increases their vulnerability to unauthorized access, but this risk can be reduced by implementing multi-factor authentication, digital certificates, and biometric systems [125]. IoT devices remain exposed to exploitation because of outdated firmware and unpatched software, which requires AI-powered vulnerability scanning and secure over-the-air (OTA) updates to maintain security in 5G-enabled environments [126]. The safe deployment of IoT in 5G networks requires solving these security challenges by implementing advanced encryption methods and secure authentication protocols, intelligent threat detection systems, and consistent firmware updates.

4.3. Security Measures for Integrating IoT Applications in 5G Networks

To address the security issues that are likely to be encountered when incorporating IoT applications into 5G networks, Figure 3 shows the comprehensive 5G-Based Protection for IoT Devices.

4.3.1. Encryption and Data Protection

Given that IoT devices generate a high amount of sensitive information, they have become a preferred target for cyber-attackers. Encryption is one of the key factors in the protection of data from unauthorized access. The use of end-to-end encryption mechanisms (E2EEs) through algorithms like AES, TLS, and DTLS guarantee the safety of data in transit [126]. Furthermore, homomorphic encryption and quantum secure cryptographic methods are being researched to improve the security of the next generation 5G IoT networks. It is crucial to establish robust encryption policies whenever dealing with the vast amounts of confidential information that IoT devices generate. Table 10 presents some encryption techniques.
These encryption techniques must be implemented and tailored to the specific requirements of IoT applications within 5G networks to protect sensitive data from increasingly common cyber threats.

4.3.2. Secure Authentication Mechanisms

Due to the issues with scalability and security, traditional authentication mechanisms, such as username and password, are not suitable for the IoT–5G environment. The security of the system is increased by secure authentication techniques such as multi-factor authentication (MFA), biometric authentication, and blockchain-based identity management. Decentralized and tamper-proof identity verification is achieved using blockchain technology, thus reducing the risk of identity fraud. Furthermore, PKI and ZTA are also important for preventing unauthorized access and establishing trust in the IoT networks. Table 11 presents a comparison of different authentication techniques.

4.3.3. Network Slicing Security

5G enables network slicing, meaning that many virtual networks can be run on a single physical network. Although this feature increases the efficiency and flexibility of the network, it also creates security issues. The implementation of micro segmentation, access control lists (ACLs), and the real-time monitoring of each slice enhances the protection against cyber threats. Furthermore, Secure Access Service Edge (SASE) frameworks aid in the enforcement of security policies across the network slices. Table 12 compares several security mechanisms that can be applied to network slicing and describes their characteristics.

4.3.4. AI-Driven Threat Detection and Response

AI and ML are important for proactive threat management in 5G IoT networks. They work by having Security Information and Event Management (SIEM) systems that are driven by AI to analyze network traffic patterns to detect anomalies and prevent cyberattacks in real time [132]. Intrusion detection and prevention systems (IDPSs) that use AI can detect malware, Distributed Denial of Service (DDoS) attacks, and unauthorized access attempts with greater effectiveness by AI. AI and ML are very vital in improving threat detection and mitigation of risks in the 5G IoT networks. Table 13 compares AI-based security solutions and their characteristics.

4.3.5. Secure Firmware and Software Updates

Many IoT devices are incapable of receiving security updates at regular intervals and are therefore prone to exploitation. The use of secure OTA updates is to guarantee that firmware and software patches are being delivered in a secure manner. Code signing, firmware integrity verification, and hardware security features like TPMs stop any unauthorized changes. It is imperative to have secure firmware and software update mechanisms for the security of IoT devices in 5G networks. Table 14 compares various security mechanisms that can be applied to firmware and software updates, and their key features are summarized.

4.3.6. Edge Computing Security

Thus, edge computing cuts the latency and increases the real-time processing of IoT-5G applications. However, it also has a security risk, such as unauthorized data access and tampering. Enhancing edge security involves implementing data encryption, secure hardware enclaves, and decentralized identity management. The concept of confidential computing that uses Trusted Execution Environments (TEEs) is a further step towards increased data security at the edge. Security measures for edge computing environments for IoT–5G applications must be strong to counter possible threats. Table 15 compares the edge computing security mechanisms with their key features.

4.3.7. Regulatory Compliance and Standardization

Cybersecurity regulations and industry standards compliance are a must to make IoT devices secure in 5G networks. Guidelines for securing IoT ecosystems are provided by regulations such as GDPR, ISO/IEC 27001 [150] and the NIST Cybersecurity Framework. Organizations also should adopt emerging 5G security standards from the 3rd Generation Partnership Project (3GPP) and the Internet Engineering Task Force (IETF) to enhance security [151].

4.3.8. Comparison of Security Measures

In conclusion of the security measures, Table 16 compares the suggested security measures for integrating IoT applications into 5G networks.

4.4. Summary

4.4.1. Overview

The release of such integration in various sectors with the help of IoT applications with 5G networks can change the whole scenario. But the use of such integration raises critical security issues that are very important to solve to guarantee the reliability and safety of IoT devices and networks. With the help of the suggested security measures, organizations can overcome these challenges and realize the full potential of the IoT in 5G networks. The use of integrating IoT in 5G networks is expanding to include smart healthcare, the industrial IoT, smart transportation, and even smart agriculture. In the process of developing these applications, it is crucial to consider security aspects to avoid compromising sensitive information and the network. In conclusion, the enhanced version of IoT applications is only possible in integration with 5G networks if security is addressed in an overall approach with the help of the latest technologies, strong policies, and ongoing surveillance. As a result, organizations can fully implement the IoT in their 5G networks with the knowledge that their data is secure.

4.4.2. Discussion and Recommendations

The security mechanisms selection and deployment analysis in Table 9, Table 10, Table 11, Table 12, Table 13, Table 14 and Table 15 provides essential information for optimizing encryption and authentication technologies and best practices for IoT and 5G technology applications in critical sectors. For example, for preferred encryption methods, the evaluation shows that AES stands as an efficient encryption standard, which receives broad support for both data transmission and storage applications. Real-time healthcare applications need TLS/DTLS because this protocol supports UDP protocols and provides low overhead while ensuring data integrity and minimal delay. The current computational complexity of homomorphic encryption and quantum-resistant cryptography makes them suitable for high-security environments with ample processing resources, but they offer future-proofing capabilities. Accordingly, for recommended authentication techniques, healthcare systems benefit most from multi-factor authentication (MFA) and biometric verification because they protect sensitive personal data while requiring strict access control measures. Blockchain-based identity management works well for large-scale and decentralized environments such as smart cities or logistics because it provides tamper-resistance and auditability, but scalability needs proper management.
  • General Recommendations:
    • For any sector deploying 5G–IoT applications, a layered security architecture combining encryption, secure authentication, and continuous threat monitoring is imperative.
    • Regulatory compliance with standards such as GDPR, ISO/IEC 27001, and 3GPP must be maintained across all layers.
    • AI-driven SIEM and IDPS systems are highly effective in environments with high data volume and dynamic threat landscapes, such as industrial automation and defense.

5. Challenges Facing the Integration of IoT Applications in 5G Networks

The integration of the Internet of Things (IoT) with 5G networks presents a transformative opportunity for various industries, ranging from healthcare and smart cities to autonomous vehicles and industrial automation. However, despite its promising potential, several challenges delay the seamless integration of IoT applications within 5G environments. This section explores key challenges, including network scalability, security vulnerabilities, interoperability issues, energy efficiency concerns, and latency requirements. Additionally, it discusses potential solutions, such as network slicing, artificial intelligence (AI)-driven management, and energy-efficient communication protocols, which can enhance IoT deployment within 5G ecosystems. Understanding these challenges is crucial for researchers, policymakers, and industry leaders to ensure the successful deployment of IoT applications within 5G networks.
The convergence of IoT and 5G technology is expected to revolutionize digital connectivity, enabling high-speed, low-latency communication between billions of connected devices. While 5G networks provide enhanced bandwidth, ultra-reliable low latency communication (URLLC) [157], and massive machine-type communication (mMTC) [158], the deployment of IoT applications in such an environment faces numerous hurdles. The rapid expansion of connected devices and the diverse requirements of IoT services pose significant challenges in terms of scalability, security, interoperability, and energy consumption [159].
Moreover, as IoT devices are integrated into smart cities, healthcare systems, industrial automation, and connected vehicles, ensuring seamless and secure communication becomes more complex. The coexistence of different communication standards, diverse hardware architectures, and heterogeneous data transmission protocols further complicates integration efforts [160]. Therefore, addressing these challenges is essential to fully unlock the potential of IoT in 5G networks. The below section highlights the primary obstacles that must be addressed for a smooth and efficient integration of IoT applications in 5G networks and proposes possible solutions for overcoming these challenges.

5.1. Network Scalability and Congestion

One of the fundamental challenges of integrating IoT with 5G is managing network scalability. The 5G ecosystem is designed to support an immense number of connected devices per square kilometer, but handling the explosive growth of IoT devices remains a complex issue. The sheer volume of data generated by IoT devices can lead to network congestion, impacting overall performance and quality of service (QoS) [161].
Additionally, efficient spectrum management is critical, as the increased demand for connectivity may lead to resource allocation challenges. With billions of devices transmitting data simultaneously, congestion can degrade network reliability and introduce delays in mission-critical applications. To mitigate these issues, researchers and network engineers must explore innovative solutions such as the following:
  • Network slicing, which allows multiple virtual networks to be created on a shared physical infrastructure, optimizing resources for specific IoT use cases [162].
  • Edge computing which reduces the load on central cloud servers by processing data closer to the source [163,164].
AI-driven traffic management dynamically allocates bandwidth and optimizes data transmission pathways [162].
Implementing these technologies will help 5G networks accommodate the exponential growth of IoT devices while maintaining optimal service quality [163].

5.2. Security and Privacy Concerns

IoT applications within 5G networks are highly susceptible to security threats, including cyberattacks, data breaches, and unauthorized access. Since IoT devices often have limited computational capabilities, implementing robust security protocols remains a challenge. The distributed nature of IoT networks increases the attack surface [165], making them vulnerable to threats such as the following:
  • Denial-of-service (DoS) attacks, which can overwhelm networks and render services unavailable [166].
  • Man-in-the-middle (MITM) attacks, where attackers intercept and manipulate communication between devices [167,168].
  • Unauthorized data interception, leading to potential breaches of sensitive information [169].
Privacy concerns also arise due to the vast amount of personal and sensitive data collected by IoT devices, particularly in healthcare and smart city applications. To enhance the security and privacy of IoT applications within 5G networks, several measures can be implemented, such as the following:
  • End-to-end encryption ensures that data remains protected throughout transmission.
  • Blockchain technology provides decentralized and tamper-resistant security for IoT transactions.
  • AI-based threat detection mechanisms that can identify and mitigate cyber threats in real-time.
Ensuring robust security measures will be crucial in fostering trust and promoting the widespread adoption of the IoT in 5G networks [170].

5.3. Interoperability Challenges

The heterogeneity of IoT devices and communication protocols creates interoperability challenges in 5G networks. IoT applications span multiple industries, each utilizing different hardware, software, and data formats. The lack of standardized protocols and communication frameworks makes it difficult for devices from different manufacturers to communicate seamlessly [171,172].
Achieving interoperability requires the following:
  • Developing universal communication standards to facilitate cross-platform compatibility.
  • Implementing middleware solutions that translate protocols and enable seamless data exchange.
  • Encouraging industry collaborations and regulatory efforts to establish standardized frameworks for IoT communication.
Addressing interoperability challenges will be key to ensuring that IoT devices can seamlessly operate within the 5G ecosystem, fostering innovation and scalability [172].

5.4. Energy Efficiency Constraints

IoT devices often operate in resource-constrained environments, with limited battery life and low power consumption requirements. The integration of IoT applications into 5G networks demands energy-efficient communication protocols and device management strategies [173].
Continuous data transmission and frequent network handovers consume significant power, making it challenging for battery-operated IoT devices to sustain long-term connectivity. To address this issue, advancements in energy-efficient wireless communication technologies are needed, such as the following:
  • Wake-up radios, which minimize power consumption by activating devices only when needed [174].
  • Low-power wide-area networks (LPWANs) optimize long-range communication with minimal energy usage [175].
  • Optimized sleep–wake cycles, reducing unnecessary data transmissions to conserve battery life [176].
These strategies will enhance the sustainability of IoT deployments within 5G networks, extending the lifespan of connected devices and reducing operational costs [173].

5.5. Meeting Latency Requirements

Many IoT applications, such as autonomous vehicles, industrial automation, and remote healthcare, require ultra-low latency communication to function effectively. While 5G networks promise latencies as low as one millisecond, achieving consistent low-latency performance in real-world scenarios is challenging [177].
Network congestion, signal interference, and inefficient routing can increase response times, affecting the reliability of latency-sensitive IoT applications. Potential solutions include the following:
  • Edge computing reduces latency by processing data closer to the source rather than relying on centralized cloud servers [178].
  • Network slicing ensures that latency-sensitive applications receive prioritized network resources [179].
  • Advanced routing algorithms dynamically optimize data transmission paths for minimal delays [180].
These measures will be essential for maintaining real-time performance and ensuring the success of latency-sensitive IoT applications within 5G networks [177].
The integration of IoT applications within 5G networks holds tremendous potential but comes with significant challenges. Scalability, security vulnerabilities, interoperability, energy efficiency, and latency constraints are key areas requiring further research and innovation. Addressing these challenges necessitates collaborative efforts among researchers, industry leaders, and regulatory bodies to develop standardized frameworks, robust security measures, and energy-efficient communication protocols. By overcoming these hurdles, the synergy between IoT and 5G can drive the next wave of technological advancements, transform industries, and enhance digital connectivity worldwide [181].

6. Conclusions and Future Directions

The incorporation of IoT applications into 5G networks offers a significant opportunity for the advancement of smart cities. By utilizing 5G’s ultra-low latency, substantial bandwidth, and extensive device connectivity, urban infrastructures can be improved to provide more efficient, sustainable, and citizen-focused services. Systems such as smart traffic management, real-time public safety surveillance, intelligent energy grids, and automated waste disposal are already showcasing the benefits of this integration. However, several hurdles must still be overcome to unlock the complete potential of 5G-enabled smart cities. These challenges include safeguarding large amounts of sensitive urban data, ensuring the energy-efficient functionality of numerous distributed IoT sensors, and managing varying, dynamic network environments. Furthermore, achieving full compatibility among diverse smart city subsystems necessitates standardized frameworks and protocols. This study explores the core technical applications, key challenges, and prospects of integrating IoT applications with 5G networks, highlighting the transformative benefits while addressing critical issues such as security, energy efficiency, and network management.
The results of this review concerning the use of IoT within 5G networks are expected to provide significant insights for the research community. By consolidating current advancements, obstacles, and emerging trends, this study aims to foster ongoing innovation and direct future research in the area. It will act as a valuable resource for researchers, industry experts, and policymakers involved in the progression of 5G technologies and their incorporation with IT solutions.
Future research and development should focus on the following areas to further promote smart city innovation:
  • Urban Data Security and Privacy: Developing scalable, real-time encryption and threat detection systems to protect citizen and infrastructure data.
  • Sustainable Infrastructure: Creating energy-aware communication and computing systems to support eco-friendly and resilient smart city operations.
  • Edge Intelligence: Increasing the utilization of edge and fog computing to minimize latency and enable localized decision-making for essential services such as emergency responses and traffic management.
  • Interoperability Standards: Formulating unified frameworks that guarantee seamless integration across devices, vendors, and city departments.
  • Citizen Engagement and Accessibility: Building inclusive platforms enables residents to interact with and derive benefits from smart city services through user-friendly interfaces and personalized data features. As cities progress and embrace digital technologies, the synergistic potential of 5G and the IoT will be vital in crafting urban settings that are not only smarter but also more habitable, secure, and attuned to the needs of their residents.

Author Contributions

A.I.Z., Z.A., A.A., E.E., and N.M. were involved in the whole process of producing this paper, including conceptualization, methodology, modeling, validation, visualization, and manuscript preparation. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author(s).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kumar, B.A.; Rao, P.T. Overview of advances in communication technologies. In Proceedings of the 2015 13th International Conference on Electromagnetic Interference and Compatibility (INCEMIC), Visakhapatnam, India, 22–23 July 2015; pp. 102–106. [Google Scholar] [CrossRef]
  2. Zreikat, A.I.; Al-abed, S. Performance Modelling and Analysis of LTE/Wi-Fi Coexistence. Electronics 2022, 11, 1035. [Google Scholar] [CrossRef]
  3. Sanneck, H. 5G Network Slicing Management for Challenged Network Scenarios. In Proceedings of the 12th Workshop on Challenged Networks (CHANTS ‘17), Snowbird, UT, USA, 20 October 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 19–20. [Google Scholar] [CrossRef]
  4. Zreikat, A.I.; Mathew, S. Performance Evaluation and analysis of Urban-Suburban 5G Cellular Networks. Computers 2024, 13, 108. [Google Scholar] [CrossRef]
  5. Li, X.; Gani, A.; Salleh, R.; Zakaria, O. The Future of Mobile Wireless Communication Networks. In Proceedings of the 2009 International Conference on Communication Software and Networks, Chengdu, China, 25–27 July 2009; pp. 554–557. [Google Scholar] [CrossRef]
  6. Zhao, L.; Zhao, Y.; Zhou, S.; Yu, P.; Dong, Q.; Wang, L.; Li, J. Discuss the Key Development Direction of 6G Key Technology Based on 5G Technology. In Proceedings of the 2023 2nd International Conference on Artificial Intelligence and Computer Information Technology (AICIT), Yichang, China, 15–17 September 2023; pp. 1–3. [Google Scholar] [CrossRef]
  7. Mshvidobadze, T. Evolution mobile wireless communication and LTE networks. In Proceedings of the 2012 6th International Conference on Application of Information and Communication Technologies (AICT), Tbilisi, Georgia, 17–19 October 2012; pp. 1–7. [Google Scholar] [CrossRef]
  8. Fall, M.; Balboul, Y.; Fattah, M.; Mazer, S.; Bekkali, M.E.; Kora, A.D. Towards Sustainable 5G Networks: A Proposed Coordination Solution for Macro and Pico Cells to Optimize Energy Efficiency. IEEE Access 2023, 11, 50794–50804. [Google Scholar] [CrossRef]
  9. Das, M.; Kumar, A. Introduction to 5G Telecommunication Network. In CMOS Analog IC Design for 5G and Beyond; Singh, S., Arya, R., Singh, M.P., Iyer, B., Eds.; Lecture Notes in Electrical Engineering; Springer: Singapore, 2021; Volume 719. [Google Scholar] [CrossRef]
  10. Routray, S.K.; Javali, A.; Sharma, L.; Ghosh, A.D.; Ninikrishna, T. Advanced Features and Specifications of 5G Access Network. In Intelligent Data Communication Technologies and Internet of Things. ICICI 2019; Hemanth, D., Shakya, S., Baig, Z., Eds.; Lecture Notes on Data Engineering and Communications Technologies; Springer: Cham, Switzerland, 2020; Volume 38. [Google Scholar] [CrossRef]
  11. Varsier, N.; Dufrène, L.; Dumay, A.; Lampin, M.Q.; Schwoerer, J. A 5G New Radio for Balanced and Mixed IoT Use Cases: Challenges and Key Enablers in FR1 Band. IEEE Commun. Mag. 2021, 59, 82–87. [Google Scholar] [CrossRef]
  12. Zhang, N.; Yang, J.; Wang, Y.; Chen, Q.; Kang, Z. 5G Communication for the Ubiquitous Internet of Things in Electricity:Technical Principles and Typical Applications. Proc. CSEE 2019, 39, 4015–4025. [Google Scholar] [CrossRef]
  13. Senthilkumar, C.; Vijay, J.; Sankar, R.; Akula, A.; Supriya, S.; Purushothaman, V. Innovative Communication Protocols And Network Architectures in 5G Technologies. In Proceedings of the 2024 3rd International Conference for Advancement in Technology (ICONAT), Goa, India, 6–8 September 2024; pp. 1–6. [Google Scholar] [CrossRef]
  14. Ekta, D.; Shalli, R. Integrated Trends, Opportunities, and Challenges of 5G and Internet of Things. In Current and Future Cellular Systems: Technologies, Applications, and Challenges; John Wiley & Sons: New York, NY, USA, 2025; pp. 139–152. [Google Scholar] [CrossRef]
  15. Yew, H.T.; Dasuki, A.; Asmat, A.E.; Syaqir Japarudin, M.; Hafiy Herifian, M.N.; Mamat, M. Internet-of-Things: Role of 5G Wireless Communications. In Proceedings of the 2023 12th International Conference on Awareness Science and Technology (iCAST), Taichung, Taiwan, 9–11 November 2023; pp. 335–339. [Google Scholar] [CrossRef]
  16. Borkar, S.; Pande, H. Application of 5G next generation network to Internet of Things. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 443–447. [Google Scholar] [CrossRef]
  17. Attaran, M. The impact of 5G on the evolution of intelligent automation and industry digitization. J. Ambient. Intell. Hum. Comput. 2023, 14, 5977–5993. [Google Scholar] [CrossRef]
  18. Pradeep, S.; Venkatesh, K.; Bhagavatula, S.; Roy, R.; Bhargavi, P.; Gupta, A. The Impact of 5G on Real-Time IoT Data Processing: Exploring Challenges and Innovative Solutions. In Proceedings of the 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), Greater Noida, India, 29–31 August 2024; pp. 1–6. [Google Scholar] [CrossRef]
  19. Mohseni, M.; Kanwer, B.; Singh, N.; Krishna, M.H.; Rajalakshmi, B.; Alkhafaji, M.A. A Comprehensive Analysis of the Internet of Things (IOT) in the Context of 5G Wireless Systems. In Proceedings of the 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM), Noida, India, 21–23 February 2024; pp. 1–6. [Google Scholar] [CrossRef]
  20. Amale, S.S.; Kotkar, A.N.; Jadhav, D. Exploring Impact of 5G on IoT. In Proceedings of the 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 23–25 August 2023; pp. 1478–1485. [Google Scholar] [CrossRef]
  21. Mahmood, A.; Beltramelli, L.; Abedin, S.F.; Zeb, S.; Mowla, N.I.; Hassan, S.A.; Sisinni, E.; Gidlund, M. Industrial IoT in 5G-and-Beyond Networks: Vision, Architecture, and Design Trends. IEEE Trans. Ind. Inform. 2022, 18, 4122–4137. [Google Scholar] [CrossRef]
  22. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  23. Kaven, S.; Skwarek, V. Poster: Attribute Based Access Control for IoT Devices in 5G Networks. In Proceedings of the 28th ACM Symposium on Access Control Models and Technologies (SACMAT ‘23), Trento, Italy, 7–9 June 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 51–53. [Google Scholar] [CrossRef]
  24. Jassim, M.M.; Mosa, M.M.; Okbi, Z.A.I.; Abdullah, S.B.; Taha, S.W.; Migo, P.; Kondakova, S. Cost-Effectiveness Analysis of IoT Deployment in 5G Networks. In Proceedings of the 2024 36th Conference of Open Innovations Association (FRUCT), Lappeenranta, Finland, 30 October–1 November 2024; pp. 493–502. [Google Scholar] [CrossRef]
  25. Girma, A.; Barrett, A.P. Security Challenges and Solutions in 5G-Enabled IoT Networks. In Proceedings of the Future Technologies Conference (FTC) 2024, Volume 4. FTC 2024; Arai, K., Ed.; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2024; Volume 1157. [Google Scholar] [CrossRef]
  26. Qiu, Q.; Du, X.; Yu, S.; Wang, C.; Liu, S.; Zhao, B.; Chang, L. Research on IoT Security Technology and Standardization in the 5G Era. In Security and Privacy in New Computing Environments. SPNCE 2020; Wang, D., Meng, W., Han, J., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Cham, Switzerland, 2021; Volume 344. [Google Scholar] [CrossRef]
  27. Montaño-Blacio, M.; Briceño-Sarmiento, J.; Pesántez-Bravo, F. 5G Network Security for IoT Implementation: A Systematic Literature Review. In International Conference on Innovation and Research; Springer International Publishing: Cham, Switzerland, 2020; pp. 28–40. [Google Scholar] [CrossRef]
  28. Babu, E.S.; Barthwal, A.; Kaluri, R. Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Comput. Commun. 2023, 199, 10–291. [Google Scholar] [CrossRef]
  29. Rehman, W.U.; Koondhar, M.A.; Afridi, S.K.; Albasha, L.; Smaili, I.H.; Touti, E.; Aoudia, M.; Zahrouni, W.; Mahariq, I.; Ahmed, M. The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review. Energy Nexus 2025, 17, 100368. [Google Scholar] [CrossRef]
  30. Banerjee, A.; Costa, B.; Forkan, A.R.M.; Kang, Y.-B.; Marti, F.; McCarthy, C.; Ghaderi, H.; Georgakopoulos, D.; Jayaraman, P.P. 5G enabled smart cities: A real-world evaluation and analysis of 5G using a pilot smart city application. Internet Things 2024, 28, 101326. [Google Scholar] [CrossRef]
  31. Huseien, G.F.; Shah, K.W. A review on 5G technology for smart energy management and smart buildings in Singapore. Energy AI 2022, 7, 100116. [Google Scholar] [CrossRef]
  32. Fan, W.Q.; Ismail, A.S.; Mohammed, F.; Mukred, M. AI-Driven Smart City Security and Surveillance System: A Bibliometric Analysis. In Current and Future Trends on AI Applications; Al-Sharafi, M.A., Al-Emran, M., Mahmoud, M.A., Arpaci, I., Eds.; Studies in Computational Intelligence; Springer Nature Switzerland: Cham, Switzerland, 2025; Volume 1178, pp. 305–328. [Google Scholar] [CrossRef]
  33. Sandhu, M.; Malhotra, R.; Singh, J. IoT Enabled -Cloud based Smart Parking System for 5G Service. In Proceedings of the 2022 1st IEEE International Conference on Industrial Electronics: Developments & Applications (ICIDeA), Bhubaneswar, India, 15–16 October 2022; pp. 202–207. [Google Scholar] [CrossRef]
  34. Sahu, T.; Narad, D.; Javvaji, N.K.C.; Radhapuram, S.C.T. Location based portable 5G enabled Internet of Things IoT EDGE device to measure, monitor and manage environment sensor data. In Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things, Tokyo, Japan, 24–26 May 2024; ACM: New York, NY, USA, 2024; pp. 436–442. [Google Scholar] [CrossRef]
  35. Pons, M.; Valenzuela, E.; Rodríguez, B.; Nolazco-Flores, J.A.; Del-Valle-Soto, C. Utilization of 5G Technologies in IoT Applications: Current Limitations by Interference and Network Optimization Difficulties—A Review. Sensors 2023, 23, 3876. [Google Scholar] [CrossRef] [PubMed]
  36. Chandra Shekhar Rao, V.; Kumarswamy, P.; Phridviraj, M.S.B.; Venkatramulu, S.; Subba Rao, V. 5G Enabled Industrial Internet of Things (IIoT) Architecture for Smart Manufacturing. In Data Engineering and Communication Technology; Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Eds.; Lecture Notes on Data Engineering and Communications Technologies; Springer: Singapore, 2021; Volume 63, pp. 193–201. [Google Scholar] [CrossRef]
  37. Giannakidou, S.; Radoglou-Grammatikis, P.; Koussouris, S.; Pertselakis, M.; Kanakaris, N.; Lekidis, A.; Kaltakis, K.; Koidou, M.P.; Metallidou, C.; Psannis, K.E.; et al. 5G-Enabled NetApp for Predictive Maintenance in Critical Infrastructures. In Proceedings of the 2022 5th World Symposium on Communication Engineering (WSCE), Nagoya, Japan, 16–18 September 2022; pp. 129–132. [Google Scholar] [CrossRef]
  38. Oyekanlu, E.A.; Smith, A.C.; Thomas, W.P.; Mulroy, G.; Hitesh, D.; Ramsey, M.; Kuhn, D.J.; Mcghinnis, J.D.; Buonavita, S.C.; Looper, N.A.; et al. A Review of Recent Advances in Automated Guided Vehicle Technologies: Integration Challenges and Research Areas for 5G-Based Smart Manufacturing Applications. IEEE Access 2020, 8, 202312–202353. [Google Scholar] [CrossRef]
  39. Teoh, Y.K.; Gill, S.S.; Parlikad, A.K. IoT and Fog-Computing-Based Predictive Maintenance Model for Effective Asset Management in Industry 4.0 Using Machine Learning. IEEE Internet Things J. 2023, 10, 2087–2094. [Google Scholar] [CrossRef]
  40. Taj, S.; Imran, A.S.; Kastrati, Z.; Daudpota, S.M.; Memon, R.A.; Ahmed, J. IoT-based supply chain management: A systematic literature review. Internet Things 2023, 24, 100982. [Google Scholar] [CrossRef]
  41. Tanegue, H.B.D.; De Paula Ferreira, W.; De Assis, R.F.; Brodeur, D. Synergies Between Virtual Commissioning and Digital Twins. Eng. Proc. 2025, 89, 12. [Google Scholar] [CrossRef]
  42. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R. 5G technology for healthcare: Features, serviceable pillars, and applications. Intell. Pharm. 2023, 1, 2–10. [Google Scholar] [CrossRef]
  43. Georgiou, K.E.; Georgiou, E.; Satava, R.M. 5G Use in Healthcare: The Future is Present. JSLS J. Soc. Laparosc. Robot. Surg. 2021, 25, e2021.00064. [Google Scholar] [CrossRef]
  44. Li, C.; Wang, J.; Wang, S.; Zhang, Y. A review of IoT applications in healthcare. Neurocomputing 2024, 565, 127017. [Google Scholar] [CrossRef]
  45. Kumar, A.; Nanthaamornphong, A.; Selvi, R.; Venkatesh, J.; Alsharif, M.H.; Uthansakul, P.; Uthansakul, M. Evaluation of 5G techniques affecting the deployment of smart hospital infrastructure: Understanding 5G, AI and IoT role in smart hospital. Alex. Eng. J. 2023, 83, 335–354. [Google Scholar] [CrossRef]
  46. Peralta-Ochoa, A.M.; Chaca-Asmal, P.A.; Guerrero-Vásquez, L.F.; Ordoñez-Ordoñez, J.O.; Coronel-González, E.J. Smart Healthcare Applications over 5G Networks: A Systematic Review. Appl. Sci. 2023, 13, 1469. [Google Scholar] [CrossRef]
  47. Picozzi, P.; Nocco, U.; Puleo, G.; Labate, C.; Cimolin, V. Telemedicine and Robotic Surgery: A Narrative Review to Analyze Advantages, Limitations and Future Developments. Electronics 2023, 13, 124. [Google Scholar] [CrossRef]
  48. Assimakopoulos, F.; Vassilakis, C.; Margaris, D.; Kotis, K.; Spiliotopoulos, D. AI and Related Technologies in the Fields of Smart Agriculture: A Review. Information 2025, 16, 100. [Google Scholar] [CrossRef]
  49. Mehannaoui, R.; Mouss, K.N.; Aksa, K. IoT-based food traceability system: Architecture, technologies, applications, and future trends. Food Control 2023, 145, 109409. [Google Scholar] [CrossRef]
  50. Shang, Z.; Li, Z.; Wei, Q.; Hao, S. Livestock and poultry posture monitoring based on cloud platform and distributed collection system. Internet Things 2024, 25, 101039. [Google Scholar] [CrossRef]
  51. Liu, J.; Shu, L.; Lu, X.; Liu, Y. Survey of Intelligent Agricultural IoT Based on 5G. Electronics 2023, 12, 2336. [Google Scholar] [CrossRef]
  52. Lagorio, A.; Cimini, C.; Pinto, R.; Cavalieri, S. 5G in Logistics 4.0: Potential applications and challenges. Procedia Comput. Sci. 2023, 217, 650–659. [Google Scholar] [CrossRef]
  53. Biswas, A.; Wang, H.-C. Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain. Sensors 2023, 23, 1963. [Google Scholar] [CrossRef]
  54. Hakak, S.; Gadekallu, T.R.; Maddikunta, P.K.R.; Ramu, S.P.; Parimala, M.; De Alwis, C.; Liyanage, M. Autonomous vehicles in 5G and beyond: A survey. Veh. Commun. 2023, 39, 100551. [Google Scholar] [CrossRef]
  55. Guevara, L.; Auat Cheein, F. The Role of 5G Technologies: Challenges in Smart Cities and Intelligent Transportation Systems. Sustainability 2020, 12, 6469. [Google Scholar] [CrossRef]
  56. Shakir, M.A.; Hussain, R.T.; Al-Hamadani, B.T.R.; Salih, M.M.; Salman, H.M.; Kozubtsov, I.; Aram, E. Vehicle-to-Everything (V2X) Communication in IoT via 5G. In Proceedings of the 2024 36th Conference of Open Innovations Association (FRUCT), Lappeenranta, Finland, 30 October–1 November 2024; pp. 76–87. [Google Scholar] [CrossRef]
  57. Kumar, A.; Albreem, M.A.; Gupta, M.; Alsharif, M.H.; Kim, S. Future 5G Network Based Smart Hospitals: Hybrid Detection Technique for Latency Improvement. IEEE Access 2020, 8, 153240–153249. [Google Scholar] [CrossRef]
  58. Chen, B.; Qiao, S.; Zhao, J.; Liu, D.; Shi, X.; Lyu, M.; Chen, H.; Lu, H.; Zhai, Y. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. IEEE Internet Things J. 2021, 8, 10248–10263. [Google Scholar] [CrossRef] [PubMed]
  59. Siriwardhana, Y.; De Alwis, C.; Gür, G.; Ylianttila, M.; Liyanage, M. The Fight Against the COVID-19 Pandemic with 5G Technologies. IEEE Eng. Manag. Rev. 2020, 48, 72–84. [Google Scholar] [CrossRef]
  60. Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact. IEEE Access 2020, 8, 90225–90265. [Google Scholar] [CrossRef]
  61. Ahmad, I.; Asghar, Z.; Kumar, T.; Li, G.; Manzoor, A.; Mikhaylov, K.; Shah, S.A.; Höyhtyä, M.; Reponen, J.; Huusko, J.; et al. Emerging Technologies for Next Generation Remote Health Care and Assisted Living. IEEE Access 2022, 10, 56094–56132. [Google Scholar] [CrossRef]
  62. Jiménez, A.C.; Martínez, J.P. 5G networks in eHealth services in Spain: Remote patient monitoring system. In Proceedings of the IEEE Engineering International Research Conference (EIRCON), Lima, Peru, 21–23 October 2020; pp. 1–4. [Google Scholar] [CrossRef]
  63. Cerqueira, J.; da Silva, F.V.; Vilaça, A.; Mendes, J. IoT monitoring system for post-operated patients with degenerative cervical disc herniation. In Proceedings of the International Symposium on Sensing and Instrumentation in 5G and IoT Era (ISSI), Lagoa, Portugal, 29–30 August 2024; pp. 1–6. [Google Scholar] [CrossRef]
  64. Balasundaram, A.; Routray, S.; Prabu, A.V.; Krishnan, P.; Malla, P.P.; Maiti, M. Internet of Things (IoT)-Based Smart Healthcare System for Efficient Diagnostics of Health Parameters of Patients in Emergency Care. IEEE Internet Things J. 2023, 10, 18563–18570. [Google Scholar] [CrossRef]
  65. Khatun, M.A.; Memon, S.F.; Eising, C.; Dhirani, L.L. Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation. IEEE Access 2023, 11, 145869–145896. [Google Scholar] [CrossRef]
  66. Anglano, C.; Canonico, M.; Desimoni, F.; Guazzone, M.; Savarro, D. The HealthTracker System: App and Cloud-Based Wearable Multi-Sensor Device for Patients Health Tracking. Appl. Sci. 2024, 14, 887. [Google Scholar] [CrossRef]
  67. Humayun, M.; Almufareh, M.F.; Al-Quayed, F.; Alateyah, S.A.; Alatiyyah, M. Improving Healthcare Facilities in Remote Areas Using Cutting-Edge Technologies. Appl. Sci. 2023, 13, 6479. [Google Scholar] [CrossRef]
  68. Mazloomi, A.; Sami, H.; Bentahar, J.; Otrok, H.; Mourad, A. Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing. IEEE Internet Things J. 2023, 10, 1376–1390. [Google Scholar] [CrossRef]
  69. Li, C.H.; Mak, S.L.; Lee, C.C.; Lee, T.T.; Yuen, N.H.Y.; Tang, W.F. A Review of 5G Building Management Technologies and Applications in Smart Campus. In Proceedings of the IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 18–20 July 2023; pp. 1–5. [Google Scholar] [CrossRef]
  70. Pang, Z.; Zhao, H.; Tang, Z.; Kong, F. A Digital Twins-Based Smart Classroom Monitoring System. In Proceedings of the IEEE International Conference on Advanced Learning Technologies (ICALT), Orem, UT, USA, 10–13 July 2023; pp. 347–349. [Google Scholar] [CrossRef]
  71. Memos, V.A.; Minopoulos, G.; Stergiou, C.; Psannis, K.E.; Ishibashi, Y. A Revolutionary Interactive Smart Classroom (RISC) with the Use of Emerging Technologies. In Proceedings of the 2nd International Conference on Computer Communication and the Internet (ICCCI), Nagoya, Japan, 26–29 June 2020; pp. 174–178. [Google Scholar] [CrossRef]
  72. Yadav, P.M.; Patra, I.; Mittal, V.; Nagorao, C.G.; Udhayanila, R.; Saranya, A. Implementation of IOT on English Language Classroom Management. In Proceedings of the 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 12–13 May 2023; pp. 1686–1690. [Google Scholar] [CrossRef]
  73. Kitkowska, A.; Brodén, K.; Abdullah, L. The Requirements, Benefits, and Barriers of IoT Solutions to Support Well-Being in Elementary Schools. IEEE Access 2024, 12, 144965–144981. [Google Scholar] [CrossRef]
  74. Lu, G.; Dai, J.; Qin, Z.; Guo, T.; Han, Y.; Wei, M. Research on Intelligent Monitoring and Irrigation System for Farmland Based on IoT and 5GTechnology. In Proceedings of the 8th International Conference on Automation, Control and Robotics Engineering (CACRE), Hong Kong, China, 13–15 July 2023; pp. 24–28. [Google Scholar] [CrossRef]
  75. Dumitrascu, M.; Hnatiuc, M.; Iov, C.J. Sensors System Based on Fuzzy Logic for Irrigation. In Proceedings of the International Symposium on Sensing and Instrumentation in 5G and IoT Era (ISSI), Lagoa, Portugal, 29–30 August 2024; pp. 1–5. [Google Scholar] [CrossRef]
  76. Bostani, A.; Baniamerian, A.; Zaher, A.; Shammari, M.A. Smart City Connectivity: Integrating LEO Satellites with 5G/6G for IoT and PV Monitoring. In Proceedings of the IEEE Smart Cities Futures Summit (SCFC), Marrakech, Morocco, 29–31 May 2024; pp. 1–6. [Google Scholar] [CrossRef]
  77. Makondo, N.; Kobo, H.I.; Mathonsi, T.E.; Plessis, D.P.D. Implementing an Efficient Architecture for Latency Optimisation in Smart Farming. IEEE Access 2024, 12, 140502–140526. [Google Scholar] [CrossRef]
  78. Bhatia, S.; Mallikarjuna, B.; Gautam, D.; Gupta, U.; Kumar, S.; Verma, S. The Future IoT: The Current Generation 5G and Next Generation 6G and 7G Technologies. In Proceedings of the International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT), Dehradun, India, 17–18 March 2023; pp. 212–217. [Google Scholar] [CrossRef]
  79. Louta, M.; Banti, K.; Karampelia, I. Emerging Technologies for Sustainable Agriculture: The Power of Humans and the Way Ahead. IEEE Access 2024, 12, 98492–98529. [Google Scholar] [CrossRef]
  80. Shaikh, F.K.; Karim, S.; Zeadally, S.; Nebhen, J. Recent Trends in Internet-of-Things-Enabled Sensor Technologies for Smart Agriculture. IEEE Internet Things J. 2022, 9, 23583–23598. [Google Scholar] [CrossRef]
  81. Xiang, W.; Yu, K.; Han, F.; Fang, L.; He, D.; Han, Q.-L. Advanced Manufacturing in Industry 5.0: A Survey of Key Enabling Technologies and Future Trends. IE Trans. Ind. Inform. 2024, 20, 1055–1068. [Google Scholar] [CrossRef]
  82. Humayun, M.; Jhanjhi, N.; Alruwaili, M.; Amalathas, S.S.; Balasubramanian, V.; Selvaraj, B. Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things. IEEE Access 2020, 8, 183665–183677. [Google Scholar] [CrossRef]
  83. Moloudian, G.; Hosseinifard, M.; Kumar, S.; Simorangkir, R.B.V.B.; Buckley, J.L.; Song, C.; Fantoni, G.; O’fLynn, B. RF Energy Harvesting Techniques for Battery-Less Wireless Sensing, Industry 4.0, and Internet of Things: A Review. IEEE Sens. J. 2024, 24, 5732–5745. [Google Scholar] [CrossRef]
  84. Hoang, T.M.; Dinh-Van, S.; Barn, B.; Trestian, R.; Nguyen, H.X. RIS-Aided Smart Manufacturing: Information Transmission and Machine Health Monitoring. IEEE Internet Things J. 2022, 9, 22930–22943. [Google Scholar] [CrossRef]
  85. Kabir, S.; Gope, P.; Mohanty, S.P. A Security-Enabled Safety Assurance Framework for IoT-Based Smart Homes. IEEE Trans. Ind. Appl. 2022, 59, 6–14. [Google Scholar] [CrossRef]
  86. Wanasinghe, T.R.; Gosine, R.G.; James, L.A.; Mann, G.K.I.; de Silva, O.; Warrian, P.J. The Internet of Things in the Oil and Gas Industry: A Systematic Review. IEEE Internet Things J. 2020, 7, 8654–8673. [Google Scholar] [CrossRef]
  87. Modina, N.; El-Azouzi, R.; De Pellegrini, F.; Menasche, D.S.; Figueiredo, R. Joint Traffic Offloading and Aging Control in 5G IoT Networks. IEEE Trans. Mob. Comput. 2022, 22, 4714–4728. [Google Scholar] [CrossRef]
  88. Honda, K.; Shibata, N.; Harada, R.; Ishida, Y.; Akashi, K.; Kaneko, S.; Miyachi, T.; Terada, J. Cooperated Traffic Shaping with Traffic Estimation and Path Reallocation to Mitigate Microbursts in IoT Backhaul Network. IEEE Access 2021, 9, 162190–162196. [Google Scholar] [CrossRef]
  89. Tomas, J.; Pavel, Š. Autonomous Smart Sensors for Efficient Urban Waste Management. In Proceedings of the 47th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 10–12 July 2024; pp. 294–297. [Google Scholar] [CrossRef]
  90. Cao, B.; Chen, X.; Lv, Z.; Li, R.; Fan, S. Optimization of Classified Municipal Waste Collection Based on the Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5364–5373. [Google Scholar] [CrossRef]
  91. Segura-Garcia, J.; Calero, J.M.A.; Pastor-Aparicio, A.; Marco-Alaez, R.; Felici-Castell, S.; Wang, Q. 5G IoT System for Real-Time Psycho-Acoustic Soundscape Monitoring in Smart Cities With Dynamic Computational Offloading to the Edge. IEEE Internet Things J. 2021, 8, 12467–12475. [Google Scholar] [CrossRef]
  92. Palattella, M.R.; Dohler, M.; Grieco, A.; Rizzo, G.; Torsner, J.; Engel, T.; Ladid, L. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models. IEEE J. Sel. Areas Commun. 2016, 34, 510–527. [Google Scholar] [CrossRef]
  93. Prasad, A.R.; Lakshminarayanan, S.; Arumugam, S. Market Dynamics and Security Considerations of 5G. J. ICT Stand. 2018, 5, 225–250. [Google Scholar] [CrossRef]
  94. Gomes, J.F.; Iivari, M.; Ahokangas, P.; Isotalo, L.; Niemelä, R. Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals. J. ICT Stand. 2017, 5, 107–128. [Google Scholar] [CrossRef]
  95. Ali Al-Samawi, M.A.; Singh, M. Effect of 5G on IOT and Daily Life Application. In Proceedings of the 3rd International Conference for Emerging Technology (INCET), Belgaum, India, 27–29 May 2022; pp. 1–5. [Google Scholar] [CrossRef]
  96. Dutkiewicz, E.; Jayawickrama, B.A.; He, Y. Radio spectrum maps for emerging IoT and 5G networks: Applications to smart buildings. In Proceedings of the International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang, Indonesia, 22–23 August 2017. [Google Scholar] [CrossRef]
  97. Zhang, L.; Hao, J.; Zhao, G.; Wen, M.; Hai, T.; Cao, K. Research and Application of AI Services Based on 5G MEC in Smart Grid. In Proceedings of the IEEE Computing, Communications and IoT Applications (ComComAp), Beijing, China, 20–22 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  98. Saleem, M.U.; Usman, M.R.; Yaqub, M.A.; Liotta, A.; Asim, A. Smarter Grid in the 5G Era: Integrating the Internet of Things With a Cyber-Physical System. IEEE Access 2024, 12, 34002–34018. [Google Scholar] [CrossRef]
  99. Daas, M.J.; Jubran, M.; Hussein, M. Energy Management Framework for 5G Ultra-Dense Networks Using Graph Theory. IEEE Access 2019, 7, 175313–175323. [Google Scholar] [CrossRef]
  100. Israr, A.; Yang, Q.; Israr, A. Renewable Energy Provision and Energy-Efficient Operational Management for Sustainable 5G Infrastructures. IEEE Trans. Netw. Serv. Manag. 2023, 20, 2698–2710. [Google Scholar] [CrossRef]
  101. Morato, A.; Frigo, G.; Tramarin, F. 5G-Enabled PMU-Based Distributed Measurement Systems: Network Infrastructure Optimization and Scalability Analysis. IEEE Trans. Instrum. Meas. 2024, 73, 1–12. [Google Scholar] [CrossRef]
  102. Sotres, P.; Santana, J.R.; Sanchez, L.; Lanza, J.; Munoz, L. Practical Lessons From the Deployment and Management of a Smart City Internet-of-Things Infrastructure: The SmartSantander Testbed Case. IEEE Access 2017, 5, 14309–14322. [Google Scholar] [CrossRef]
  103. Lee, Y.; Hwang, E.; Choi, J. A Unified Approach for Compression and Authentication of Smart Meter Reading in AMI. IEEE Access 2019, 7, 34383–34394. [Google Scholar] [CrossRef]
  104. Ahmadzadeh, S.; Parr, G.; Zhao, W. A Review on Communication Aspects of Demand Response Management for Future 5G IoT- Based Smart Grids. IEEE Access 2021, 9, 77555–77571. [Google Scholar] [CrossRef]
  105. Wang, R.; Yu, C.; Wang, J. Construction of Supply Chain Financial Risk Management Mode Based on Internet of Things. IEEE Access 2019, 7, 110323–110332. [Google Scholar] [CrossRef]
  106. Ahmad, A.Y.A.B.; Verma, N.; Sarhan, N.M.; Awwad, E.M.; Arora, A.; Nyangaresi, V.O. An IoT and Blockchain-Based Secure and Transparent Supply Chain Management Framework in Smart Cities Using Optimal Queue Model. IEEE Access 2024, 12, 51752–51771. [Google Scholar] [CrossRef]
  107. Vanmathi, C.; Farouk, A.; Alhammad, S.M.; Mangayarkarasi, R.; Bhattacharya, S.; Kasyapa, M.S.B. The Role of Blockchain in Transforming Industries Beyond Finance. IEEE Access 2024, 12, 148845–148867. [Google Scholar] [CrossRef]
  108. Suneesh, S.; Priya, A.S.; Abirami, K.; Dhruva, T.; Rajesh, A. Design of Flexible and Wearable Antenna for 5G IoT Application. In Proceedings of the3rd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 20–22 October 2022; pp. 402–407. [Google Scholar] [CrossRef]
  109. Patzold, M. The Benefits of Smart Wireless Technologies [Mobile Radio]. IEEE Veh. Technol. Mag. 2017, 12, 5–12. [Google Scholar] [CrossRef]
  110. Wu, D.; Yang, Z.; Zhang, P.; Wang, R.; Yang, B.; Ma, X. Virtual-Reality Interpromotion Technology for Metaverse: A Survey. IEEE Internet Things J. 2023, 10, 15788–15809. [Google Scholar] [CrossRef]
  111. Kusuma, H.M.; Shukla, V.K.; Gupta, S. Enabling VR/AR and Tactile through 5G Network. In Proceedings of the International Conference on Communication information and Computing Technology (ICCICT), Mumbai, India, 25–27 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
  112. Muhammad, K.; Khan, S.; Elhoseny, M.; Ahmed, S.H.; Baik, S.W. Efficient Fire Detection for Uncertain Surveillance Environment. IEEE Trans. Ind. Inform. 2019, 15, 3113–3122. [Google Scholar] [CrossRef]
  113. Quintana-Ramirez, I.; Sequeira, L.; Ruiz-Mas, J. An Edge-Cloud Approach for Video Surveillance in Public Transport Vehicles. IEEE Lat. Am. Trans. 2021, 19, 1763–1771. [Google Scholar] [CrossRef]
  114. Gravina, R.; Fortino, G. Wearable Body Sensor Networks: State-of-the-Art and Research Directions. IEEE Sens. J. 2020, 21, 12511–12522. [Google Scholar] [CrossRef]
  115. Putra, K.T.; Arrayyan, A.Z.; Hayati, N.; Firdaus; Damarjati, C.; Bakar, A.; Chen, H.-C. A Review on the Application of Internet of Medical Things in Wearable Personal Health Monitoring: A Cloud-Edge Artificial Intelligence Approach. IEEE Access 2024, 12, 21437–21452. [Google Scholar] [CrossRef]
  116. Gao, J.; Agyekum, K.O.-B.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 2019, 7, 4278–4291. [Google Scholar] [CrossRef]
  117. Zhang, J.; Wang, Y.; Li, S.; Shi, S. An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach. IEEE Internet Things J. 2020, 8, 6205–6213. [Google Scholar] [CrossRef]
  118. MarketsandMarkets. Telehealth Market by Component, Mode of Delivery—Global Forecast to 2025. [Online]. Available online: https://www.marketsandmarkets.com/Market-Reports/telehealth-market-201868927.html (accessed on 13 June 2025).
  119. Fortune Business Insights. Precision Farming Market Size, Share & COVID-19 Impact Analysis. [Online]. Available online: https://www.fortunebusinessinsights.com/precision-farming-market-102019 (accessed on 5 April 2025).
  120. Business Insider. The Internet of Things in Finance. [Online]. Available online: https://www.businessinsider.com/artificial-intelligence (accessed on 13 June 2025).
  121. Narciandi-Rodriguez, D.; Aveleira-Mata, J.; García-Ordás, M.T.; Alfonso-Cendón, J.; Benavides, C.; Alaiz-Moretón, H. A cybersecurity review in IoT 5G networks. Internet Things 2024, 30, 101478. [Google Scholar] [CrossRef]
  122. Hasan, M.K.; Ghazal, T.M.; Saeed, R.A.; Pandey, B.; Gohel, H.; Eshmawi, A.A.; Abdel-Khalek, S.; Alkhassawneh, H.M. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. IET Commun. 2021, 16, 421–432. [Google Scholar] [CrossRef]
  123. Moudoud, H.; Khoukhi, L.; Cherkaoui, S. Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT. IEEE Netw. 2020, 35, 194–201. [Google Scholar] [CrossRef]
  124. Basin, D.; Dreier, J.; Hirschi, L.; Radomirovic, S.; Sasse, R.; Stettler, V. A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Mumbai, India, 25–27 June 2021; pp. 1383–1396. [Google Scholar] [CrossRef]
  125. Valadares, D.C.; Will, N.C.; Sobrinho, Á.Á.C.; Lima, A.C.; Morais, I.S.; Santos, D.F. Security challenges and recommendations in 5G-IoT scenarios. In Advanced Information Networking and Applications, Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3; Springer International Publishing: Cham, Switzerland, 2023; pp. 558–573. [Google Scholar] [CrossRef]
  126. Rachakonda, L.P.; Siddula, M.; Sathya, V. A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond). High-Confid. Comput. 2024, 4, 100220. [Google Scholar] [CrossRef]
  127. Dritsas, E.; Trigka, M. A Survey on Cybersecurity in IoT. Futur. Internet 2025, 17, 30. [Google Scholar] [CrossRef]
  128. Zafir, E.I.; Akter, A.; Islam, M.; Hasib, S.A.; Islam, T.; Sarker, S.K.; Muyeen, S. Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques. Internet Things 2024, 28, 101357. [Google Scholar] [CrossRef]
  129. Nguyen, V.-L.; Lin, P.-C.; Cheng, B.-C.; Hwang, R.-H.; Lin, Y.-D. Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Commun. Surv. Tutorials 2021, 23, 2384–2428. [Google Scholar] [CrossRef]
  130. Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef]
  131. Almarri, S.; Frikha, M. Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR. Preprints 2024. [Google Scholar] [CrossRef]
  132. Al-Aqrabi, H.; Lane, P.; Hill, R. Performance evaluation of multiparty authentication in 5G IIoT environments. In Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health, Proceedings of the International 2020 Cyberspace Congress, CyberDI/CyberLife 2020, Beijing, China, 10–12 December 2020; Springer: Singapore, 2019; pp. 169–184. [Google Scholar] [CrossRef]
  133. Wazid, M.; Das, A.K.; Shetty, S.; Gope, P.; Rodrigues, J.J.P.C. Security in 5G-enabled internet of things communication: Issues, challenges, and future research roadmap. IEEE Access 2020, 9, 4466–4489. [Google Scholar] [CrossRef]
  134. Fang, H.; Wang, X.; Tomasin, S. Machine learning for intelligent authentication in 5G and beyond wireless networks. IEEE Wirel. Commun. 2019, 26, 55–61. [Google Scholar] [CrossRef]
  135. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  136. Zhang, J.; Li, G.; Marshall, A.; Hu, A.; Hanzo, L. A New frontier for IoT security emerging from three decades of key generation relying on wireless channels. IEEE Access 2020, 8, 138406–138446. [Google Scholar] [CrossRef]
  137. Olimid, R.F.; Nencioni, G. 5G network slicing: A security overview. IEEE Access 2020, 8, 99999–100009. [Google Scholar] [CrossRef]
  138. Ahmad, I.; Pinola, J.; Harjula, I.; Suomalainen, J.; Harjula, E.; Huusko, J.; Kumar, T. An overview of the security landscape of virtual mobile networks. IEEE Access 2021, 9, 169014–169030. [Google Scholar] [CrossRef]
  139. Manda, J.K. AI-powered Threat Intelligence Platforms in Telecom: Leveraging AI for Real-time Threat Detection and Intelligence Gathering in Telecom Network Security Operations. Int. J. Multidiscip. Curr. Educ. Res. (IJMCER) SSRN 2024, 6, 333–340. [Google Scholar] [CrossRef]
  140. Gilbert, C.; Gilbert, M. AI-driven threat detection in the internet of things (IoT), exploring opportunities and vulnerabilities. Int. J. Res. Publ. Rev. 2024, 5, 219–236. [Google Scholar] [CrossRef]
  141. Rahman, A.-U.; Mahmud, M.; Iqbal, T.; Saraireh, L.; Kholidy, H.; Gollapalli, M.; Musleh, D.; Alhaidari, F.; Almoqbil, D.; Ahmed, M.I.B. Network Anomaly Detection in 5G Networks. Math. Model. Eng. Probl. 2022, 9, 397–404. [Google Scholar] [CrossRef]
  142. Benzaid, C.; Taleb, T. AI for beyond 5G networks: A cyber-security defense or offense enabler? IEEE Netw. 2020, 34, 140–147. [Google Scholar] [CrossRef]
  143. El Jaouhari, S.; Bouvet, E. Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions. Internet Things 2022, 18, 100508. [Google Scholar] [CrossRef]
  144. Bettayeb, M.; Nasir, Q.; Talib, M.A. Firmware update attacks and security for IoT devices: Survey. In Proceedings of the ArabWIC 6th Annual International Conference Research Track, Rabat, Morocco, 7–9 March 2019; pp. 1–6. [Google Scholar] [CrossRef]
  145. Falas, S.; Konstantinou, C.; Michael, M.K. A modular end-to-end framework for secure firmware updates on embedded systems. ACM J. Emerg. Technol. Comput. Syst. 2021, 18, 1–19. [Google Scholar] [CrossRef]
  146. Fazeldehkordi, E.; Grønli, T.-M. A survey of security architectures for edge computing-based IoT. IoT 2022, 3, 332–365. [Google Scholar] [CrossRef]
  147. Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proc. IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
  148. Nguyen, T.; Nguyen, H.; Gia, T.N. Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications. J. Netw. Comput. Appl. 2024, 226, 103884. [Google Scholar] [CrossRef]
  149. Zhukabayeva, T.; Zholshiyeva, L.; Karabayev, N.; Khan, S.; Alnazzawi, N. Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions. Sensors 2025, 25, 213. [Google Scholar] [CrossRef] [PubMed]
  150. ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection, Information Security Management Systems Requirements. ISO/IEC: Geneva, Switzerland, Edition 3. 2022. Available online: https://www.iso.org/standard/27001 (accessed on 13 June 2025).
  151. Alshar’e, M. Cyber security framework selection: Comparision of NIST and ISO27001. Appl. Comput. J. 2023, 1, 245–255. [Google Scholar] [CrossRef]
  152. Cisco. What Is Network Segmentation? Cisco. n.d. Available online: https://www.cisco.com/c/en/us/products/security/what-is-network-segmentation.html (accessed on 17 March 2025).
  153. Savage, L.; McLaughlin, P. Getting the Most Out of Your Counsel When Implementing a Mobile Computing Strategy, Including Thorny Issues Like Privacy, Reimbursement, and Standard of Care. In Mobile Medicine; Productivity Press: New York, NY, USA, 2021; pp. 133–150. [Google Scholar]
  154. Sarkar, S.; Choudhary, G.; Shandilya, S.K.; Hussain, A.; Kim, H. Security of zero trust networks in cloud computing: A comparative review. Sustainability 2022, 14, 11213. [Google Scholar] [CrossRef]
  155. He, Y.; Huang, D.; Chen, L.; Ni, Y.; Ma, X.; Huo, Y. A Survey on zero trust architecture: Challenges and future trends. Wirel. Commun. Mob. Comput. 2022, 2022, 6476274. [Google Scholar] [CrossRef]
  156. Ahmed, M.; Raza, S.; Soofi, A.A.; Khan, F.; Khan, W.U.; Xu, F.; Chatzinotas, S.; Dobre, O.A.; Han, Z. A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges. Comput. Sci. Rev. 2024, 54, 100668. [Google Scholar] [CrossRef]
  157. Zhang, D. Research on 5G System Security in Ultra-Reliable Low-Latency Communication Scenario. In Proceedings of the 2023 3rd International Conference on Communication Technology and Information Technology (ICCTIT), Xi’an, China, 24–26 November 2023; pp. 34–38. [Google Scholar] [CrossRef]
  158. Moon, S.; Lee, J.-W. Integrated Grant-Free Scheme for URLLC and mMTC. 5G World Forum 2020, 3, 98–102. [Google Scholar] [CrossRef]
  159. Saravanan, N.; Jothi Lakshmi, G.R. Revolutionizing Connectivity: Unveiling Next-Gen Efficiency with 6G’s Ultra-Reliable Low Latency Communications Resource Allocation. In Proceedings of the 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT), Delhi, India, 2–4 August 2024; pp. 451–455. [Google Scholar] [CrossRef]
  160. Guo, X.; Dong, Z.; Yang, H. Research on the Standardization Direction of 5G and IoT Integration. In Proceedings of the 2023 International Conference on Intelligent Computing and Next Generation Networks (ICNGN), Hangzhou, China, 17–18 November 2023; pp. 1–5. [Google Scholar] [CrossRef]
  161. Dlamini, B.M.; Migabo, E.M.; Kurien, A.M. A Multi-Layer Strategy for Reducing Network Congestion and Enhancing Performance in 5G IoT Networks. In Proceedings of the 2024 4th International Multidisciplinary Information Technology and Engineering Conference (IMITEC), Vanderbijlpark, South Africa, 27–29 November 2024; pp. 39–46. [Google Scholar] [CrossRef]
  162. Tufeanu, L.-M.; Vochin, M.-C.; Paraschiv, C.-L.; Li, F.Y. Enabling Reinforcement Learning for Network Slice Management in Multi-Agent 5G Networks. In Proceedings of the 2023 IEEE 9th World Forum on Internet of Things (WF-IoT), Aveiro, Portugal, 12–27 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
  163. Lanka, S.; Win, T.A.; Eshan, S. A Review on Edge Computing and 5G in IoT: Architecture & Applications. In Proceedings of the 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2–4 December 2021; pp. 532–536. [Google Scholar] [CrossRef]
  164. Arun, V.; Azhagiri, M. Design of Long-Term Evolution Based Mobile Edge Computing Systems to Improve 5G Systems. In Proceedings of the 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 19–21 July 2023; pp. 160–165. [Google Scholar] [CrossRef]
  165. Zhang, Q.; Wu, B.; Zheng, M.; Ni, L.; Xue, B. IoT Device Attack Surface Feature Identification Using Differentiated Dynamic Monitoring. In Proceedings of the 2022 IEEE 5th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), Shenyang, China, 18–20 November 2022; pp. 435–440. [Google Scholar] [CrossRef]
  166. Jemal, I.; Cheikhrouhou, O.; Haddar, M.A. IoT DoS and DDoS Attacks Detection Using an Effective Convolutional Neural Network. Cyberworlds 2023, 1, 373–379. [Google Scholar] [CrossRef]
  167. Mann, P.; Tyagi, N.; Gautam, S.; Rana, A. Classification of Various Types of Attacks in IoT Environment. In Proceedings of the 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), Bhimtal, India, 25–26 September 2020; pp. 346–350. [Google Scholar] [CrossRef]
  168. Thankappan, M.; Rifà-Pous, H.; Garrigues, C. A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. IEEE Access 2024, 12, 23096–23121. [Google Scholar] [CrossRef]
  169. Balfaqih, M. Enhancing Security and Flexibility in Smart Locker Systems: A Multi-Authentication Approach with IoT Integration. In Proceedings of the 2024 21st Learning and Technology Conference (L&T), Jeddah, Saudi Arabia, 15–16 January 2024; pp. 325–329. [Google Scholar] [CrossRef]
  170. Alfaw, A.; Elmedany, W.; Sharif, M.S. Risk Management for 5G-Enabled Internet of Things by Using Machine Learning: A Survey. In Proceedings of the 2024 Arab ICT Conference (AICTC), Manama, Bahrain, 27–28 February 2024; pp. 87–94. [Google Scholar] [CrossRef]
  171. Bhatnagar, R.; Sinha, D.; Rawat, P. An Intelligent Fog Node Solution for Application Interoperability in 5G Enabled Fog-IoT Paradigm. In Proceedings of the 2022 IEEE Delhi Section Conference (DELCON), New Delhi, India, 11–13 February 2022; pp. 1–5. [Google Scholar] [CrossRef]
  172. Chahar, S.; Kaur, K. Internet of Things with 5G Technology: A Critical Review. In Proceedings of the 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 12–13 May 2023; pp. 1402–1406. [Google Scholar] [CrossRef]
  173. Choi, M.; Ha, S.; Lim, J. Methods to Improve Energy Efficiency and Availability of IoT Devices in Wireless Environments. In Proceedings of the 2024 15th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 16–18 October 2024; pp. 376–378. [Google Scholar] [CrossRef]
  174. Yildirim, D.U.; Jung, J.; Elsakka, A.; Moschetti, G.; Lopez, M.M.; Hansryd, J.; Palacios, T.; Chandrakasan, A.P. A 0.7 cm2, 3.5 GHz, −31 dBm Sensitivity Battery-Free 5G Energy-Harvester Backscatterer With 20s Cold-Start Wake-Up Time for IoT-Enabled Warehouses. IEEE JSSC 2024, 1–11. [Google Scholar] [CrossRef]
  175. Sanchez-Gomez, J.; Carrillo, D.G.; Sanchez-Iborra, R.; Hernandez-Ramos, J.L.; Granjal, J.; Marin-Perez, R.; Zamora-Izquierdo, M.A. Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions. IEEE Access 2020, 8, 216437–216460. [Google Scholar] [CrossRef]
  176. Oliveira, A.; Pinto, M.F.; Lopes, F.; Leal, A.; Teixeira, C.A. Classifier Combination Supported by the Sleep-Wake Cycle Improves EEG Seizure Prediction Performance. IEEE Trans. Biomed. Eng. 2024, 71, 2341–2351. [Google Scholar] [CrossRef] [PubMed]
  177. Kar, S.; Mishra, P.; Wang, K.-C. 5G-IoT Architecture for Next Generation Smart Systems. 5G World Forum 2021, 4, 241–246. [Google Scholar] [CrossRef]
  178. Alqahtani, A.M. Real-time Resource Management Mechanism for Mobile IoT Devices in 5G-enabled Edge Computing. In Proceedings of the 2024 13th International Conference on Computer Technologies and Development (TechDev), Huddersfield, UK, 9–11 October 2024; pp. 85–90. [Google Scholar] [CrossRef]
  179. Bandara, E.; Shetty, S.; Rahman, A.; Mukkamala, R.; Liang, X. Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 1194–1199. [Google Scholar] [CrossRef]
  180. Wang, W.; Zhu, H.; Jiang, C.; Zhang, N.; Wang, Y.; Yang, Y. Adaptive Dynamic Routing Algorithm for 5G Integrated Networks Based on Virtual Routing Plane. In Proceedings of the 2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 14–16 December 2018; pp. 2283–2288. [Google Scholar] [CrossRef]
  181. Ahmed, S.F.; Alam, M.S.B.; Afrin, S.; Rafa, S.J.; Taher, S.B.; Kabir, M.; Muyeen, S.M.; Gandomi, A.H. Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities. IEEE Access 2024, 12, 13125–13145. [Google Scholar] [CrossRef]
Figure 1. Evolution of mobile network generations.
Figure 1. Evolution of mobile network generations.
Computers 14 00250 g001
Figure 2. Framework structure of the research contents.
Figure 2. Framework structure of the research contents.
Computers 14 00250 g002
Figure 3. Comprehensive 5G-based protection for IoT devices.
Figure 3. Comprehensive 5G-based protection for IoT devices.
Computers 14 00250 g003
Table 1. Key developments and characteristics of mobile generations [6].
Table 1. Key developments and characteristics of mobile generations [6].
GenerationIntroduction YearKey FeaturesTechnologies/StandardsApplicationsData RateLatency
1G1980sAnalog voiceAMPS, TACSVoice calls2.4 kbpsHigh
2G1990sDigital voice, SMSGSM, CDMA, TDMAVoice calls, text messaging64 kbpsHigh
3G2000sMobile data, video callsUMTS, CDMA2000Video calls, mobile internet2 MbpsMedium
4G2010sHigh-speed internet, IP-basedLTE, WiMAXHD video streaming, video conferencing100 Mbps–1 GbpsLow
5G2020sUltra-fast internet, IoT, low latencyNR (New Radio), mmWaveIoT, smart cities, AR/VR1–10 GbpsUltra-low
6G2030s (expected)AI integration, extremely high data ratesUnder developmentSeamless integration of billions of IoT devices, AI, and smart cities1 TbpsNear-zero
Table 2. Structured comparison for the studies in the context of smart cities.
Table 2. Structured comparison for the studies in the context of smart cities.
Paper Focus AreaKey ContributionsMethodology/ApproachFindings/LimitationsTechnology Highlighted
[30]5G for Smart City IoTEvaluates 5G performance in real-world smart city applications (road asset monitoring)6-month pilot project with IoT-based monitoring using waste collection trucks5G shows potential but has performance variations; it may not meet real-time demands fully5G, IoT
[31]5G for Smart BuildingsExamines 5G’s role in sustainable smart buildings (Singapore case study)Review of global trends, R&D, and Singapore’s 5G test bed initiatives5G enhances construction/management; serves as a benchmark for future smart city projects5G, Smart Buildings
[32]Smart City SecurityBibliometric analysis of security/surveillance in smart cities (745 Scopus articles)Co-citation, co-occurrence, and bibliographic coupling analyses (1977–2023)Highlights AI-privacy tension; calls for ethical AI governance in urban surveillanceAI, Surveillance, Ethics
[33]IoT-based Smart ParkingProposes a cloud-based smart parking system with real-time spot optimizationMobile apps and 5G-enabled IoT sensors for cloud connectivityImproves parking efficiency, scalability, and low-cost data transmissionIoT, 5G, Cloud
[34]IoT Environmental MonitoringReal-time environmental data visualization via web app (air quality, weather, etc.)Hardware–software integration with edge-to-cloud connectivityScalable, user-friendly solution for remote monitoring and data analysisIoT, Edge/Cloud, Web App
[35]5G-IoT IntegrationAnalyzes interference challenges in 5G-IoT systems and optimization techniquesReview of architecture, implementations, and interference mitigation strategiesInterference issues critical; optimization needed for reliable IoT business applications5G, IoT, Interference Mitigation
Table 3. Structured comparison for the studies in the context of industrial automation.
Table 3. Structured comparison for the studies in the context of industrial automation.
PaperFocus AreaKey ContributionsMethodology/ApproachFindings/LimitationsTechnology Highlighted
[36]5G-IIoT for Smart ManufacturingProposes 5G-enabled IIoT architecture for CPMS (eMBB, mMTC, URLLC, NB-IoT)Integrates 5G features to overcome 3G/4G limitations in industrial automationEnhances real-time monitoring, collaboration, and efficiency in smart factories5G, IIoT, CPMS
[37]AI/5G for Predictive MaintenanceAI-driven 5G NetApp for fault detection in energy infrastructures (autoencoder-based)Containerized data collection and anomaly detection in power plantsImproves equipment reliability; enables real-time monitoring and maintenance5G, AI, Autoencoders
[38]AGV/AMR CommunicationReviews wireless challenges for AGV/AMR fleet management in smart factoriesAnalyzes latency/reliability gaps; proposes 5G slicing, tactile Internet, VR solutionsCurrent tech falls short; 5G integration needed for coordination in Industry 4.0AGV, AMR, 5G Slicing
[39]Fog Computing in Industry 4.0GA and ML for predictive maintenance and resource optimization in fog computingCompares GA with MinMin/MaxMin/FCFS/RoundRobin via FogWorkflowSimGA outperforms: 0.48% faster, 5.43% cheaper, 28.1% less energy; 95% prediction accuracyGA, ML, Fog Computing
[40]IoT in Supply Chain ManagementSLR on IoT-based SCM (2018–2022): tracking, asset management, efficiencyReviews GPS/RFID/NFC applications, challenges, and economic impactsIoT enhances real-time SCM but faces integration and scalability hurdlesIoT, RFID, GPS, NFC
[41]VC & Digital TwinsExplores VC-DT synergy for Industry 4.0; proposes integration strategiesIdentifies shared components (digital models) and collaboration frameworksCombined use boosts model reusability and process optimizationVirtual Commissioning, Digital Twins
Table 4. Structured comparison for the studies in the context of healthcare.
Table 4. Structured comparison for the studies in the context of healthcare.
PaperFocus AreaKey ContributionsMethodology/ApproachFindings/LimitationsTechnology Highlighted
[42]5G in Smart HealthcareOutlines 5G’s role in remote monitoring, AI integration, and resource allocationReviews 5G features (eMBB, URLLC) and healthcare applicationsImproves accessibility but faces coverage challenges in obstructed areas5G, AI, IoMT
[43]5G Adoption in HealthcareAdvocates for awareness to accelerate 5G adoption in clinical/research settingsAnalyzes 13 studies on 5G’s clinical/administrative potentialNontechnical barriers (e.g., awareness) delay implementation5G, Telemedicine
[44]IoT in HealthcareExamines IoT sensors for remote monitoring and personalized careReviews real-world IoT applications (e.g., wearables) and challengesHighlights data security and interoperability issuesIoT, Wearables
[45]5G–IoT-AI in Smart HospitalsProposes PAPR reduction algorithm for 5G waveforms (NOMA, FBMC, OFDM)Optimizes signal detection/spectrum sensing for throughput/efficiency gainsEnhances power efficiency, remote care, and cost reduction5G, AI, IoT, NOMA
[46]5G Smart Healthcare ReviewPRISMA-based review of 5G’s role in IoMT and remote careAnalyzes 56.81% proposals vs. 15.91% implementations due to ongoing 5G deploymenteMBB/URLLC enables low-latency care but face security challenges5G, IoMT, PRISMA
[47]TelesurgeryAssesses robotic telesurgery’s potential to overcome geographical barriersReviews benefits (cost reduction) and adoption challenges (latency, ethics)Limited clinical adoption despite technological readinessRobotics, 5G, ICT
Table 5. Structured comparison for the studies in the context of agriculture.
Table 5. Structured comparison for the studies in the context of agriculture.
PaperFocus AreaKey ContributionsMethodology/ApproachFindings/LimitationsTechnology Highlighted
[48]IoT/AI/ML in AgricultureComprehensive review of smart farming, precision livestock, and regenerative agricultureSynthesizes research, innovations, and case studiesBoosts productivity/sustainability; addresses food security and SDGsIoT, AI, ML
[49]IoT-based Food TraceabilityProposes simplified FTS definition and new IoT–FTS architecture and classificationClassifies technologies into IMT, CT, DMT; explores 5G/DLT applicationsImproves food safety/consumer confidence; gaps in standardizationIoT, 5G, DLT
[50]Livestock MonitoringIoT-based system for real-time livestock health inspection (posture analysis)Distributed master-slave hardware with RS485/MQTT protocols and cloud/mobile integrationEffective for remote monitoring in large-scale farming; meets accuracy requirementsIoT, MQTT, Cloud Computing
[51]5G-IoT in Smart AgricultureConceptual framework for 5G-IoT architecture/applications in agricultureReviews 5G–IoT developments and use cases; identifies challengesEnhances production/sustainability; needs research to address implementation hurdles5G, IoT
[29]5G in Smart FarmingExamines 5G’s role in UAVs, AI analytics, and SDG-aligned farmingDiscusses challenges (infrastructure, security) and AI/AR/VR applicationsPromotes sustainable farming; calls for stakeholder collaboration5G, AI, UAVs, AR/VR
Table 6. Structured comparison of the studies in the context of transportation and autonomous vehicles.
Table 6. Structured comparison of the studies in the context of transportation and autonomous vehicles.
PaperFocus AreaKey ContributionsMethodology/ApproachFindings/LimitationsTechnology Highlighted
[52]5G in Logistics 4.0Maps 5G’s role in Smart Logistics (IoT/AI/big data integration)Systematic literature review of 5G applications in logisticsOptimizes efficiency but faces adoption challenges (e.g., infrastructure, cost)5G, IoT, AI, Big Data
[53]AV Tech IntegrationReviews IoT/edge/5G/blockchain for AV safety and sustainabilityComprehensive review of enabling technologies and implementation challengesHighlights the need for seamless integration of heterogeneous technologiesAVs, 5G, Blockchain, Edge AI
[54]5G/B5G for AVsAnalyzes 5G’s URLLC/massive connectivity for AV deploymentSurveys AV automation levels, 5G integration, and security/standardization effortsIdentifies security concerns and the need for B5G advancements5G, B5G, Autonomous Vehicles
[55] 5G for Smart Cities/ITSExamines 5G’s role in IoT/IoV for dense/high-speed environmentsDiscusses technical/economic/legal challenges of 5G deploymentOvercomes 4G limitations but faces regulatory hurdles5G, IoV, ITS
[56]5G–V2X CommunicationEvaluates 5G’s impact on V2X (safety, traffic, energy efficiency)Compares 5G-V2X with older networks; explores edge/AI/blockchain synergiesEnhances low-latency V2V/V2I/V2P but requires infrastructure upgrades5G, V2X, Edge Computing, AI
Table 7. Classification of IoT and AI applications in 5G.
Table 7. Classification of IoT and AI applications in 5G.
SectorApplicationReferences
HealthSmart hospitalKumar [57], Chen [58], Siriwardhana [59]
TelemedicineChen [58], Chakola [60], Ahmad [61]
Patient monitoringJiménez [62], Cerqueira [63], Balasundaram [64]
TreatmentKhatun [65], Anglano [66], Humayun [67]
EducationDistance learningMazloomi [68], Li [69]
Smart classroomPang [70], Memos [71], Yadav [72]
SecurityKitkowska [73]
AgricultureIrrigationLu [74], Dumitrascu [75]
MonitoringBostani [76], Makondo [77]
PredictionBhatia [78]
Decision makingLouta [79], Shaikh [80]
IndustryManufacturingXiang [81], Humayun [82]
MaintenanceMoloudian [83], Hoang [84]
SafetyKabir [85], Wanasinghe [86]
City DevelopmentTransportationModina [87], Honda [88]
Waste managementTomas [89], Cao [90]
MonitoringSegura-Garcia [91], Palattella [92]
RetailMarketingPrasad [93], Gomez [94]
Smart shoppingAl-Samawi [95], Dutkiewicz [96]
EnergySmart gridsZhang [97], Saleem [98]
Energy managementDaas [99], Israr [100]
Infrastructure monitoringMorato [101], Sotres [102]
Smart metersLee [103], Ahmadzadeh [104]
FinanceRisk monitoringWang [105], Ahmed [106]
Smart applicationsVanmathi [107]
EntertainmentSmart TvSuneesh [108], Patzold [109]
Virtual realityWu [110], Kusuma [111]
DefenseSurveillance Muhammad [112], Quintana-Ramirez [113]
Wearable devicesGravina [114], Gravina [115]
Smart vehiclesGao [116], Zhang [117]
Table 8. Statistics for AI and IoT in 5G applications.
Table 8. Statistics for AI and IoT in 5G applications.
SectorApplicationStatistics
Health [57,58,116]-5G remote patient monitoring via IoT
-Telemedicine
31% of patients in the USA had remote monitoring in 2021. AI integration will increase this number.
Education [69,70,71,118,119]-Distance learning, especially virtual reality/augmented reality-based learning
-Smart classrooms
-The 5G-enabled education market will reach $404 billion by 2026.
-VR in the education market will grow 40.7% by 2027.
Smart cities [76,118,119,120]-Real-time traffic monitoring
-Surveillance and automated response systems for public safety
-By 2026, there will be over 60 million 5G smart city connections globally.
-60% of devices will have smart city applications by 2026.
-Market size is expected to be $820.7 by 2027.
Agriculture [74,77,120]-IoT sensors monitor soil conditions, crop health, and weather patterns.
-Monitoring with wearable devices
The smart farming market is growing, which is $21.8 billion in 2024 and is expected 113.16$ billion by 2034.
Industry [81,82,119]-Enhancing automation and real-time communication
-IoT-based maintenance and early detection
The IoT and AI-based 5G technology market will reach $263.4 billion by 2027.
Finance [106,107,118]-Smart ATM: Real-time monitoring and maintenance in ATM machines
-Fraud detection
-Finance sectors reach $2.03 billion in the 2023 market via 5G.
-Finance technology in the IoT and AI market will reach $309.98 billion by 2028.
Defense [105,118,119,120]-AI-based 5G has more reliable communication technologies in the military
-IoT-based drones and other technologies improve monitoring capabilities
-The global market is expected to reach $90 billion in 2025.
-AI based 5G defense technology market increased 28% from 2020 to 2025.
Energy [98,101,119]-Smart grids increase energy consumption, increase energy efficiency, and reliability-The global smart energy market will reach $60 billion by 2027.
-5G based grid market is expected to increase by 24% from 2022 to 2030.
Table 9. Technological and regional statistics of IoT deployment in 4G and 5G.
Table 9. Technological and regional statistics of IoT deployment in 4G and 5G.
RegionIoT in 4GIoT in 5G
China3B+ IoT devices (4G)900M+ 5G IoT (30% of global share by 2025)
USA1.5B+ 4G IoT connections100M+ 5G IoT devices (smart cities, agriculture)
EU~700M total IoT devices over 4G150M+ 5G IoT devices by 2023, esp. in Germany & NL
South Korea4G-based wearables and mobile IoT15M+ 5G IoT devices (autonomous driving, hospitals)
UAE/KSAMinimal 4G IoT in 2015100M+ 5G devices planned for 2025 (smart cities, security)
Table 10. Comparison of some encryption techniques.
Table 10. Comparison of some encryption techniques.
Encryption TechniqueDescriptionAdvantagesLimitationsReference
Advanced Encryption Standard (AES)A symmetric encryption algorithm is widely used for securing data.High efficiency and strong security for data at rest and in transit.Require secure key management; not inherently suitable for end-to-end encryption.[127]
Transport Layer Security (TLS)A cryptographic protocol designed to provide secure communication over a computer network.Ensures data integrity and privacy between applications and users.Vulnerable to certain attacks if not properly configured; relies on PKI for certificate management.[128]
Datagram Transport Layer Security (DTLS)An adaptation of TLS for datagram-based applications, such as those using UDP.Provides similar security guarantees to TLS for applications requiring low latency.Susceptible to packet loss and reordering; complexity in implementation.[128]
Homomorphic EncryptionAllows computations to be performed on ciphertexts, generating an encrypted result that, when decrypted, matches the result of operations performed on the plaintext.Enables data processing without exposing sensitive information; it is beneficial for cloud computing and data analytics.Computationally intensive; overhead performance currently limits practical applications.[129]
Quantum-Resistant CryptographyCryptographic algorithms are designed to be secure against attacks by quantum computers.Provides long-term security in the advent of quantum computing; essential for future-proofing cryptographic systems.Many algorithms are still under research and standardization, with potential performance trade-offs.[130]
Table 11. Comparison of various authentication techniques.
Table 11. Comparison of various authentication techniques.
Authentication MechanismDescriptionAdvantagesLimitationsReference
Multi-Factor Authentication (MFA)Combines two or more authentication factors (e.g., passwords, biometrics, tokens) to verify user identity.Enhances security by requiring multiple forms of verification; reduces reliance on passwords alone.May introduce usability challenges; requires additional infrastructure.[131]
Biometric VerificationUtilizes unique biological traits (e.g., fingerprints, facial recognition) for authentication.Provides high security due to the uniqueness of biometric data; convenient for users.Privacy concerns, potential for false positives/negatives; requires specialized hardware.[131]
Blockchain-Based Identity ManagementEmploys decentralized ledger technology to manage and verify identities securely.Tamper-resistant; eliminates single points of failure; enhances transparency.Scalability issues, high computational requirements, and regulatory uncertainties.[132]
Public Key Infrastructure (PKI)Uses asymmetric cryptography to issue and manage digital certificates for authentication.Establishes a trusted environment; widely adopted standard.Complex certificate management; potential vulnerabilities if private keys are compromised.[133]
Zero Trust Architecture (ZTA)Assumes no implicit trust within the network; continuously verifies every user and device attempting to access resources.Minimizes attack surfaces; adaptable to modern threats; enforces strict access controls.Implementation complexity may require significant changes to existing infrastructure.[134]
Table 12. Comparison of various security mechanisms applicable to network slicing.
Table 12. Comparison of various security mechanisms applicable to network slicing.
Security MechanismDescriptionAdvantagesLimitationsReference
Micro-SegmentationDivides the network into smaller, isolated segments to limit the lateral movement of threats.Enhances security by containing breaches within segments; provides granular security controls.Complexity in implementation requires comprehensive network visibility.[135]
Access Control Lists (ACLs)Rules that permit or deny traffic flow based on predefined security policies.Simple to implement; effective in controlling traffic and enforcing policies.It can become unmanageable in large-scale networks; it lacks the intelligence to adapt to new threats.[136]
Real-Time MonitoringContinuous observation of network traffic to detect and respond to anomalies.Enables prompt threat detection and response; improves situational awareness.High resource consumption; potential for false positives.[137]
Secure Access Service Edge (SASE)Converges networking and security functions into a unified, cloud-delivered service model.Simplifies security management; provides consistent security policies across all network slices.Dependence on cloud providers; integration challenges with existing infrastructure.[138]
Table 13. Comparison of AI-driven security systems.
Table 13. Comparison of AI-driven security systems.
AI-Driven Security SystemDescriptionAdvantagesLimitationsReference
AI-Powered Threat Intelligence PlatformsUtilize AI to gather and analyze threat data, providing real-time insights and proactive defense strategies.Enhances situational awareness; enables swift response to emerging threats.Dependence on data quality; potential for high false-positive rates.[139]
AI-Driven Intrusion Detection and Prevention Systems (IDPSs)Employ ML algorithms to identify and mitigate unauthorized access attempts and network anomalies.Adaptive learning capabilities improve detection accuracy over time.Requires continuous training; may struggle with novel attack vectors.[140]
AI-Based Anomaly Detection SystemsAnalyze patterns in network traffic to identify deviations indicative of potential threats.Effective in detecting unknown threats; reduces reliance on signature-based detection.High computational requirements; potential for false alarms.[141]
AI-Enhanced Security Information and Event Management (SIEM) SystemsIntegrate AI to process and correlate security events from various sources, facilitating comprehensive threat analysis.Streamlines incident response; improves threat visibility across the network.Complexity in integration; potential data overload without proper filtering.[142]
Table 14. Comparison of various security mechanisms applicable to firmware and software updates.
Table 14. Comparison of various security mechanisms applicable to firmware and software updates.
Security MechanismDescriptionAdvantagesLimitationsReference
Secure Over-the-Air (OTA) UpdatesEnables wireless delivery of firmware and software updates to IoT devices, ensuring timely patching of vulnerabilities.Facilitates efficient and widespread deployment of updates; reduces the need for physical access to devices.Requires robust security protocols to prevent unauthorized access during transmission.[143]
Code SigningUtilizes digital signatures to verify the authenticity and integrity of firmware and software before installation.Prevents installation of malicious or tampered code; ensures that only code from trusted sources is executed.Relies on secure key management; compromised signing keys can undermine security.[143]
Firmware Integrity VerificationEmploys checksums or cryptographic hashes to validate firmware integrity during boot or update processes.Detects unauthorized modifications; enhances trust in device operation.May not prevent initial compromise; requires secure storage of integrity metrics.[144]
Trusted Platform Modules (TPMs)Hardware-based security components that store cryptographic keys and perform secure operations.Provides hardware-rooted security; enhances protection against software-based attacks.Increases hardware complexity and cost; integration with existing systems.[145]
Table 15. Comparison of various security mechanisms applicable to edge computing.
Table 15. Comparison of various security mechanisms applicable to edge computing.
Security MechanismDescriptionAdvantagesLimitationsRecent Research Reference
Data EncryptionEncrypts data to prevent unauthorized access during transmission and storage.Ensures confidentiality and integrity of data; protects against eavesdropping and tampering.Requires effective key management; may introduce computational overhead.[146]
Secure Hardware EnclavesUtilizes hardware-based isolated execution environments to protect sensitive data and code.Provides strong security against physical and software attacks; enhances trust in edge devices.Increases hardware complexity and cost; limited scalability.[147]
Decentralized Identity ManagementEmploys distributed ledger technologies like blockchain for identity verification without central authorities.Enhances privacy and security; reduces single points of failure; improves scalability.Faces challenges in standardization and interoperability; potential performance issues.[148]
Confidential Computing with Trusted Execution Environments (TEEs)Uses TEEs to process data securely within protected areas of processors, ensuring code and data confidentiality.Protects data in use; mitigates risks of data exposure during processing; enhances overall security posture.Limited availability across devices; potential overhead performance.[149]
Table 16. Comparison between security measures.
Table 16. Comparison between security measures.
Security MeasureDescriptionAdvantagesChallengesReference
Network SegmentationDividing the network into smaller, isolated segmentsLimits the spread of attacks and contains breachesRequires careful planning and management[152]
Strong AuthenticationImplementing MFA and digital certificatesEnsures only authorized devices can access the networkIt can be complex to implement and manage[153]
EncryptionEncrypting data in transit and at restProtects sensitive information from unauthorized accessCan introduce latency, requires key management[153]
Regular UpdatesRegularly updating firmware and softwareAddresses known vulnerabilities, enhances securityRequires automated mechanisms, can be resource-intensive[153]
IDPSDeploying intrusion detection and prevention systemsDetects and prevents malicious activitiesCan generate false positives, requires continuous monitoring[154]
SIEMImplementing security information and event managementProvides real-time analysis of security alertsRequires integration with multiple systems, and can be complex to configure[154]
Zero Trust ArchitectureAssuming no device or user should be trusted by defaultPrevents unauthorized access, limits potential damageRequires a cultural shift, can be complex to implement[155]
Edge ComputingProcessing data closer to the source of generationReduces data exposure, enhances securityRequires investment in edge infrastructure, can be complex to manage[156]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zreikat, A.I.; AlArnaout, Z.; Abadleh, A.; Elbasi, E.; Mostafa, N. The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis. Computers 2025, 14, 250. https://doi.org/10.3390/computers14070250

AMA Style

Zreikat AI, AlArnaout Z, Abadleh A, Elbasi E, Mostafa N. The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis. Computers. 2025; 14(7):250. https://doi.org/10.3390/computers14070250

Chicago/Turabian Style

Zreikat, Aymen I., Zakwan AlArnaout, Ahmad Abadleh, Ersin Elbasi, and Nour Mostafa. 2025. "The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis" Computers 14, no. 7: 250. https://doi.org/10.3390/computers14070250

APA Style

Zreikat, A. I., AlArnaout, Z., Abadleh, A., Elbasi, E., & Mostafa, N. (2025). The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis. Computers, 14(7), 250. https://doi.org/10.3390/computers14070250

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop