Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses
Abstract
1. Introduction
2. Research Methodology
2.1. Research Methods
2.2. Research Questions (RQ)
- RQ 1: What is the Internet of Things (IoT), and what are the fundamental IoT architectures proposed in the literature?
- RQ 2: What are the advantages and limitations of different IoT architectures across the technical layers?
- RQ 3: How are different IoT architectural models (e.g., three-layer and five-layer) related, and how can they be mapped to each other?
- RQ 4: What are the main security threats, challenges, and opportunities associated with IoT architectures, and how have researchers proposed to address them?
- IEEE Xplore, http://ieeexplore.ieee.org, offers a specialized and comprehensive collection of high-quality scientific and technical literature relevant to the IoT field.
- The ACM digital library, https://dl.acm.org, provides a rich repository of peer-reviewed articles and conference proceedings in computer science and related fields, offering a comprehensive source of recent, credible research on IoT topics.
- ScienceDirect, http://www.sciencedirect.com, has an extensive collection of peer-reviewed articles and journals in various scientific disciplines, particularly computer science and engineering. It provides a valuable resource for accessing recent and credible research relevant to IoT topics.
- SpringerLink, https://link.springer.com, has many articles and books on scientific and technical disciplines, notably computer science and engineering.
- Wiley, https://onlinelibrary.wiley.com/ is a digital platform that provides access to various scholarly journals, books, reference works, and databases across various disciplines, including science, engineering, technology, and more.
- Integration of perspectives—consolidating IoT research from both an architecture-centric and a threat-centric view.
- Explicit mapping of models—providing a one-to-one correspondence between the three-layer and five-layer IoT architectures, which is rarely addressed in earlier surveys.
- Updated coverage—including recent literature up to 2025, ensuring contemporary relevance in a fast-evolving field.
- Emerging directions—identifying future challenges such as lightweight cryptography, blockchain-based trust, and post-quantum security, offering a roadmap for future research.
2.3. Data Extraction
2.4. Inclusion and Exclusion Criteria
3. Terminologies
3.1. IoT Architecture
3.2. Three-Layer Architecture of IoT
- Physical layer: The physical layer, also called the perceptual layer, incorporates vital components such as RFID tags and sensors into its construction. It is responsible for sensing and collecting the required data from the linked devices.
- Network layer: The network layer provides a gateway. It handles routing protocols, information connected to servers, and data transfer. Logical network pathways transport data.
- Application layer: The application layer is the top layer. It is accountable for transmitting data to the specified location as necessary. The Internet of Things has three layers, as shown in Figure 2.
3.3. Cloud-Based Architecture
3.4. Fog-Based Architecture
3.5. Service-Oriented Architecture of IoT
4. IoT and Its Layers
- Perception layer (equivalent to Perception layer in three-layer model): Responsible for sensing and collecting data (e.g., RFID, sensors, QR codes). Security controls: secure boot, device authentication, physical tamper resistance, and lightweight encryption for sensor data.
- Network layer (equivalent to Network layer in three-layer model): Handles data transmission via protocols such as Wi-Fi, Zigbee, LTE, and 5G. Security controls: end-to-end encryption (TLS/DTLS), intrusion detection, secure routing, and traffic filtering.
- Middleware layer: Provides data aggregation, processing, and service management. Security controls: access control, API security, secure cloud interfaces, and anomaly detection for service requests.
- Application layer (equivalent to Application layer in three-layer model): Manages end-user applications (e.g., smart homes, healthcare, transport). Security controls: role-based access, strong authentication (e.g., MFA, biometrics), and secure APIs.
- Business layer: Aligns IoT systems with organizational objectives, compliance, and governance. Security controls: policy enforcement, regulatory compliance (e.g., PDPA, HIPAA, GDPR), auditing, and SLA monitoring.
4.1. Perception Layer
4.2. Network Layer
4.3. Middleware Layer
4.4. Application Layer
4.5. Business Layer
5. IoT Protocols and Standards
Artificial Intelligence and IoT
6. IoT Security Threats
6.1. IoT and Security
6.2. Design Principles for IoT
- Security must be an integral part of the IoT system from design to deployments, e.g., use secure authentication for smart homes, industrial IoT, healthcare IoT, etc.
- Scalable for systems to handle growing numbers of devices and increased data volume without additional sensors or devices, e.g., uses scalable protocol like MQTT protocol for smart cities, connected vehicles, agricultural IoT.
- IoT systems operate reliably with minimal downtime by adhering redundancy and failover mechanisms, able to handle robust errors handling in critical healthcare systems, industrial automation systems, and connected infrastructure.
- Able to optimize power consumption, especially battery-operated devices such as wearables that use Zigbee protocol with low-power communication; it has idle mode, such as remote monitoring system with sleep mode for idle devices.
- Privacy by design ensures user data is collected and processed with privacy protection in mind. Consumer IoT, healthcare IoT, and financial IoT are examples of how IoTs anonymize personal data and limit data collection to what is strictly necessary.
- Healthcare IoT—Remote patient monitoring of adherence to regulations like HIPAA and GDPR for patient data which is designed for audit trails and compliance verification [83]. Monitoring in a real-time manner prioritizes ultra-low-latency communications for life-critical systems. It uses fail-safe mechanisms to handle device malfunctions so the ability handling fault tolerance for the system can continue to operate correctly in the event of hardware or software failure.
- Industrial IoT—Smart manufacturing with operational technology integration ensure compatibility with legacy operational systems like SCADA. It uses protocols like TSN for time-sensitive manufacturing processes, providing design for harsh environments such as extreme-temperature environments, vibrations.
- Connected vehicle—Autonomous driving that uses 5G for rapid data exchange between vehicles and infrastructure; it uses ultra-reliable low-latency communication (URLLC) that ensure systems can operate safely during communication failures or hardware malfunctions. 5G-based Telematics autonomous driving with millimeter wave communications method and automatic obstacle avoidance to simulate the experiment for vehicle synchronization rate responses [87].
- Smart agriculture—Precision farming often requires wide-area coverage supported by long-range communication protocols such as LoRaWAN. LoRaWAN builds on LoRa, a chirp spread spectrum (CSS)-based modulation technique at the physical layer that enables low-power transmission over long distances. The LoRaWAN protocol stack adds medium access control, device authentication, and secure data exchange, making it well suited for energy-constrained devices deployed across large and remote agricultural fields. In practice, LoRaWAN is often combined with solar-powered monitoring stations to reduce battery dependence and sustain operations. By enabling robust, low-cost, and energy-efficient connectivity in rural environments, LoRaWAN plays a key role in precision agriculture, a transformative approach that integrates IoT with farming practices to optimize irrigation, crop monitoring, and yield prediction [82]. Moreover, while LoRaWAN has been widely adopted due to its balance of long-range coverage and low power consumption, recent research has proposed enhanced modulation techniques, such as dual-mode chirp spread spectrum (CSS) and dual-mode time-domain multiplexed CSS, which aim to further improve spectral efficiency, interference resilience, and overall performance in large-scale IoT deployments [88].
- Smart cities—Traffic management for massive scalability which handle millions of connected sensor and devices in dense urban areas. Inter-agency data sharing and supporting interoperability between municipal systems such as traffic lights. Resilience to attacks mitigates risks of cyber-attacks that could disrupt essential services like electricity.
6.3. Security Challenge of IoT
- Many IoT devices have default usernames and passwords, and people often neglect to change them. Or, default settings are being used. Attackers can exploit this by gaining unauthorized access to devices or networks [81].
- IoT devices are not regularly updated and patched, leaving them vulnerable to known exploits. Manufacturers and users must ensure that devices are promptly updated to address security vulnerabilities.
- IoT devices often transmit data over networks without encryption or weak encryption, leading to data interception and unauthorized access to sensitive data.
- Authentication and authorization are absent. A weak or absent authentication mechanism allows unauthorized individuals to access devices, compromising security and potentially affecting the entire network or IoT networks.
- Physical access to IoT devices can be a significant security risk. Attackers with physical access can tamper with the devices or extract sensitive information directly.
- IoT becomes targeted in DoS or DDoS attacks, in which the attacker overwhelms the device or network with excessive traffic, rendering it unresponsive or unavailable.
- Compromised IoT devices can be recruited into botnets and used for malicious purposes, such as launching DDoS attacks or mining cryptocurrencies. IoT malware can exploit vulnerabilities to gain control over devices.
- Poor device management, such as not decommissioning or updating devices, can create security risks, as outdated devices may have known vulnerabilities to exploit.
- Privacy concern: IoT devices often collect and transmit sensitive user data. Inadequate privacy protection can lead to unauthorized access, data breaches, or abuse of personal information.
6.4. Security Risk in the Perception Layer
6.5. Security Risk in the Transportation/Network Layer
- Sinkhole attack: In this type of attack, the attacker takes control of a node and manipulates it so that it begins to look attractive to other nearby nodes. The data transmitted from those nodes is diverted to the compromised node, resulting in data loss through packet dropping. Sometimes, the infected node tries to convince the other nodes that the destination node has transmitted and received the data.
- Sleep deprivation attack: The Internet of Things generally contains constraint-based devices. Sensor nodes’ capacity to transition into a low-power sleep mode is incredibly valuable for prolonging the network’s lifespan. This attack exploits network protocol weaknesses to prevent sensor nodes from entering low-power sleep modes. The node’s energy reserves are rapidly depleted, leading to a shortened network lifespan and potentially disrupting its operations [38,43].
- Denial of service (DoS) attack: In this type of attack, an attacker generally floods the network with useless traffic or raw data, which results in excessive utilization of system resources and makes the network unavailable to users. In this attack, an attacker compromises a node and uses it to inject malicious code into the system and other nodes. Depending upon the type and nature of the injection, this can lead to disastrous conditions. In bad conditions, the network might also become unavailable to its users [56].
- Man-in-the-middle attack: In this type of attack, the attacker generally takes advantage of a compromised communication channel among different entities to obtain unauthorized access to watch, monitor, and control all private communication. In this case, the attacker can even fake the victim’s identity and gain more information through communication.
- Selective forwarding attack: This occurs when a compromised or malicious node in the network deliberately forwards only a subset of the packets it receives, while silently discarding others. Unlike a blackhole attack, where all packets are dropped, selective forwarding is more difficult to detect because some traffic still flows through the node. For example, in an IoT sensor network, an attacker may allow routine status messages to pass but drop critical packets such as alarm signals, thereby degrading system reliability and potentially causing significant harm.
6.6. Security Risk in the Application Layer
- Malicious Code Injection: In this attack, the attacker injects malicious code into the system to perform illegal activities and obtain unauthorized access and control. Apart from the network layer, an attacker can also perform this type of attack through the application layer using a hacking technique to inject malicious code.
- Spear-Phishing Attack: It is a kind of spoofing attack. In this attack, the victim, who in most cases is a high-profile person, is tempted to open the emails, which causes the attacker to gain access to the victim’s credentials, which can be used to steal more personal and sensitive information about the victim.
- Sniffing Attack: In this attack, the attacker introduces a type of sniffer application, mostly in the form of cracks and patches, into the victim’s system to force an attack on his system. These sniffer applications are mostly used to collect, monitor, and transmit personal and network information related to the victim.
7. Technical Challenges
- Social, legal, and cultural definition of security and privacy; the management of trust and reputation.
- The use of end-to-end encryption for sensitive data to remain encrypted [84].
- The protection of the privacy of communications and user data.
- The implementation of security on services and apps. Even though present network security solutions provide a basis for privacy and security in IoT, it is also understood that more work has to be done. As a result, there is still a lot of work to be done.
7.1. Direction Towards IoT
7.2. Challenges of IoT
7.3. Possible Countermeasures
7.4. Thread Modeling Approaches for IoT Architecture
- Identify IoT sensors, actuators, controllers, etc.
- Map communication pathway, e.g., Wi-Fi, Bluetooth, Zigbee, Cellular.
- Highlight data flows, storage points, and access methods. Some common practices in countermeasures are shown in Table 7.
- Prioritize risks by focusing on the most critical vulnerabilities first and assess threats based on likelihood and impact using a model like DREAD (Damage, Reproductivity, Exploitability, Affected Users, Discoverability) by creating a risk matrix to classify threats as high, medium, or low risks [88,89,90].
- Specify requirements for data confidentiality, integrity, and availability (CIA triad) for the security of systems, applications, and services to control and offset possible threats to ensure CIA and Safety (CIAS) [91].
- Address authentication, authorization, and accountability for devices and users.
- Identify compliance requirements.
- Follow the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) framework by categorizing threats based on device types, communication channels, and external factors, e.g., hackers, insider threats [90].
- Pinpoint entry points that adversaries could exploit by analyzing devices, examining networks, evaluating application vulnerabilities, and reviewing supply chain risks that could tamper with hardware or insecure software updates.
- Adopt a combination of layered countermeasures. Secure device authentication can be enforced through certificate posture checks, where the validity, configuration, and cryptographic strength of device certificates are verified before allowing network access, thereby preventing unauthorized or compromised devices from joining the system. In parallel, end-to-end encryption (E2EE) should be applied to protect data during transmission, ensuring that information is encrypted at the source and decrypted only at the intended destination. This can be achieved using protocols such as TLS 1.3, DTLS, or lightweight cryptographic frameworks designed for constrained devices. Complementary measures include regularly patching and updating devices and systems to address vulnerabilities, applying network segmentation to isolate IoT devices from critical systems, and deploying intrusion detection systems (IDS) to monitor traffic patterns and generate alerts for abnormal behavior. Finally, cloud interfaces must be secured by enforcing strict access controls, applying strong authentication policies, and encrypting sensitive data at rest. Together, these practices create a robust, multi-layered defense strategy for IoT security.
- Verify the effectiveness or implementation of security measures by performing penetration testing to identify exploitable weaknesses, simulate attack scenarios, and evaluate system resilience and audit configurations and policies for compliance and effectiveness.
- Monitor and update threat models by adapting to evolving threats and changes in the IoT ecosystem. This can be achieved by continuously monitoring IoT devices and infrastructure anomalies, updating threat models to reflect new devices, features, or threats, and reviewing logs and incident reports to improve future threat modeling.
8. Security and Best Practices
- Only install reputable and tested software on your computer and smart mobile devices.
- Secure boots ensure devices only run firmware from trusted sources [92].
- Never leave personal laptops, handheld, or smartphones unattended; always turn off Bluetooth whenever not necessary; a disabled remote access function, especially for some IoT, comes with the remote access function by default [57].
- Always update security patches against bugs and vulnerabilities. Always keep your app software up to date.
- Use complex passwords for device accounts, wireless passwords, or network and internet-connected devices.
- Adhere to the apps’ security policies. When installing the apps, know what data they are to access and abort the permission if they are accessing personal data that you deem unnecessary. Choose only the features you require for the installed apps. Remove a legacy app if it is no longer needed.
- Verify what data is to be stored in your device, especially a smart handheld or smart mobile device, always collect personal data, and understand the risk of data sharing by understanding the security policy and protection [57].
- Always use a trusted wireless hotspot, a virtual private network, to secure data transmission between devices.
- Employ secure communication protocols, such as HTTPS, MQTT with TLS, or CoAP with DTLS, to protect data transmission and prevent eavesdropping, replay attacks, and man-in-the-middle attacks.
- Regularly update and patch the firmware and software of IoT devices to address security vulnerabilities. This can be achieved through over-the-air (OTA) updates or secure update mechanisms that verify the updates’ authenticity and integrity.
- Configure firewalls to allow only necessary communication.
- Use an IDS to monitor network traffic for suspicious activity.
8.1. Prevention
8.2. Detection
8.3. Encryption
8.4. Confidentiality
8.5. Authentication
8.6. Authorization
8.7. Certification
8.8. Access Control
8.9. Compliance and Standards
- IoTSF (IoT Security Foundation) best practices to help organizations identify and mitigate security risks in IoT deployments [95]. The practices emphasize a holistic approach to security, covering aspects such as design and development along with secure coding, threat modeling, and vulnerability assessment; endpoint security ensures an IoT device has built-in security features such as secure boot, encryption, and authentication mechanism; data privacy ensures that data collected by IoT devices is handled in compliance with privacy regulations and protected from breaches; lifecycle management establishes processes for secure firmware updates, patch management; and decommissioning of devices to maintain security throughout its lifecycle.
- NIST IoT cyber security guidelines for strengthening security posture. The key components include maintaining inventory and implementing measures to protect IoT assets from security threats; securing communications to prevent eavesdropping and data manipulation; data checks to prevent unauthorized access and tampering; ensuring device security to prevent unauthorized modification and access; and monitoring and responding to incidents in a prompt manner.
- ISO/IEC 27001 for information security management by managing and protecting sensitive information. Organizations implementing ISO/IEC 27001 can ensure that their IoT deployments align with best practices for information security. Key aspects of ISO/IEC 27001 include risk assessment, security policy, and procedures that govern the use, management, and protection of IoT devices, and data, access control, and incident management, not only detecting, reporting, and responding to the incident but also performing regular drills and reviews to ensure preparedness in the event of incidents.
8.10. Secure Communication
- Protocol selection and choosing the right protocols for secure communication are critical. Protocols like HTTPS and MQTT with TLS provide robust security features that safeguard data transmission.
- Network segmentation by isolating IoT devices on separate network segments is a crucial step in limiting their exposure to potential threats. Network segmentation involves dividing a network into smaller, isolated segments, each with its security control. This approach minimizes the attack’s surface and contains potential breaches, preventing them from spreading across the entire network.
- Firewall rules block all traffic by default and allow only selected traffic. Enable state-wide inspection to track the state of active connections and make decisions based on the context of the traffic. Apply least privilege permission for accessing rights of devices and users. Regularly review and update rules to ensure firewalls remain effective against evolving threats.
8.11. Emerging Technologies for IoT Security
8.12. Monitoring and Maintenance
- Preparation: Establish a dedicated incident response team, define roles and responsibilities, and provide training on incident response procedures.
- Detection and Analysis: Implement monitoring tools to identify potential incidents and establish procedures for analyzing and prioritizing threats.
- Containment, Eradication, and Recovery: Develop strategies for containing and eradicating threats, and outline steps for recovering affected systems and data.
- Post-Incident Activities: Conduct a thorough review of the incident, document lessons learned, and update the incident response plan accordingly.
- Implement an incident response plan by preparing and practicing a plan for handling security breaches.
- Regularly test devices and systems for vulnerabilities.
- Penetration Testing: Simulates real-world attacks on systems and networks to identify vulnerabilities and test the effectiveness of security measures.
- Network Scanning: Scans networks for open ports, insecure configurations, and other vulnerabilities that attackers could exploit.
- Application Security Testing: Analyzes web and mobile applications for security flaws, such as SQL injection, XSS, and insecure authentication mechanisms.
- Configuration Audits: Reviews system and network configurations to ensure they adhere to security best practices and organizational policies.
- Asset Inventory: Maintain an up-to-date inventory of all devices, systems, and applications within the organization.
- Vulnerability Assessment: Regularly conduct vulnerability assessments to identify potential security weaknesses.
- Prioritization: Prioritize vulnerabilities based on their severity, potential impact, and the likelihood of exploitation.
- Remediation: Implement remediation measures to address identified vulnerabilities, such as applying patches, updating configurations, or enhancing security controls.
- Verification: Verify that remediation measures have been successfully implemented and that vulnerabilities have been addressed.
- Reporting and Documentation: Document all vulnerability assessments, remediation activities, and verification results for future reference and compliance purposes.
9. Conclusions and Future Challenges
- Susceptibility to hacking and unauthorized access, data interception, and DoS attacks, with threats emerging from various areas in technology.
- Several preventive measures have been recommended, e.g., threat-modeling approaches to ensure that IoT security countermeasures are in place, threats to attack surface can be mitigated, data transmission can be secured and encrypted, and so on.
- Robust authentication mechanisms to verify identities.
- Constant updates for users on IDs, IPs, and vulnerability patches.
- Improvements in industries and daily life, such as process enhancement, predictive management, and faster tracking.
- Securing communication in IoT networks which includes selecting secure protocols, implementing network segmentation, and configuring robust firewall rules. By following these best practices, you can protect your IoT devices and the sensitive data they handle from potential threats.
- Continuous innovation and breakthroughs in edge computing, resulting in lower data processing latency, reliable communication, accurate data analytics, and decision-making processes, thereby improving security and transparency in IoT and data exchanges.
- Adhering to established IoT security standards for protecting the integrity, confidentiality, and availability of data in IoT deployments. Organizations can mitigate security risks, ensure compliance with regulations, and build trust with their stakeholders in the rapidly evolving IoT landscape.
- By combining universally applicable design principles with industry-specific considerations, IoT architects can create systems that are secure, efficient, and tailored to operational environments. The key is balancing broad best practices with the nuances of specific applications to maximize effectiveness.
- By systematically applying a threat-modeling approach, organizations can better secure their IoT architectures, protect sensitive data, and ensure the reliable operation of their IoT systems.
- Effective monitoring and maintenance, ensuring the security performance and longevity of technology assets, preparing and practicing an incident response plan, and regular testing to proactively address potential threats and maintain a robust security posture, ultimately supporting the organization’s system efficiency and reliability of systems and devices.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
ABE | Attribute-Based Encryption |
AI | Artificial Intelligence |
AMQP | Advanced Message Queuing Protocols |
ANN | Artificial Neural Network |
ASICs | Application-specific Integrated Circuits |
CAP | Constrained Application Protocols |
CIAS | CIA and Safety |
CoAP | Constrained Application Protocol |
DDS | Data Distribution Service |
DoS | Denial of service |
DP | Differential Privacy |
DREAD | Damage, Reproductivity, Exploitability, Affected Users, Discoverability |
DTLS | Datagram Transport Layer Security |
FPGA | Field-programmable Gate Arrays |
HSMs | Hardware Security Modules |
IC | Integrated Chips |
IDS | Intrusion-detection System |
IoT | Internet of Things |
IoTSF | IoT Security Foundation |
LTE | Long-Term Evolution |
LVQ | Linear Vector Quantization |
ML | Machine Learning |
MQTT | Message Queuing Telemetry Transport |
NFC | Near Field Communication |
OTA | Over-the-air |
OTP | One-time Password |
PKI | Public Key Infrastructure |
QoS | Quality of Service |
RFID | Radiofrequency Identification |
RQ | Research Questions |
RSA | Rivest–Shamir–Adleman |
SASE | Secure Access Service Edge |
SDL | Service Description Language |
SLR | Systematic Literature Review |
SOA | Service-oriented Architecture |
SOC | System-on-a-chip |
SSL | Secure Sockets Layer |
STRIDE | Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege |
TLS | Transport Layer Security |
TSN | Time-Sensitive |
URLLC | Ultra-reliable Low-latency Communication |
VPN | Virtual Private Network |
WSN | Wireless Sensor Networks |
WTLS | Wireless Transport Layer Security |
XSS | Cross-site Scripting |
References
- Mandal, S. Internet of Things (Part 1). Introduction. Available online: http://www.csharpcorner.com/uploadfile/f88748/internet-of-things-iot-an-introduction/ (accessed on 31 May 2025).
- Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Inf. Syst. Front. 2015, 17, 261–274. [Google Scholar] [CrossRef]
- Jia, X.; Feng, O.; Fan, T.; Lei, Q. RFID technology and its applications in Internet of Things (IoT). In Proceedings of the 2nd IEEE International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, China, 21–23 April 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1282–1285. [Google Scholar]
- Singh, K.J. A survey of IoT platforms: Create your own internet of things. IEEE Consum. Electron. Mag. 2017, 6, 57–68. [Google Scholar] [CrossRef]
- Bandyopadhyay, D.; Sen, J. Internet of things: Applications and challenges in technology and standardization. Wirel. Pers. Commun. 2011, 58, 49–69. [Google Scholar] [CrossRef]
- ITU NGN-GSI Rapporteur Group. Requirements for Support of USN Applications and Services in NGN Environment; ITU: Geneva, Switzerland, 2010. [Google Scholar]
- Miorandi, D.; Sicari, S.; De Pellegrini, F.; Chlamtac, I. Internet of things: Vision, applications and research challenges. Ad Hoc Networks 2012, 10, 1497–1516. [Google Scholar] [CrossRef]
- Bhatia, R. Top 5 Internet of Things (IoT) Initiatives by Government of India. IoT India Mag. Available online: https://analyticsindiamag.com/ai-trends/top-5-internet-things-initiatives-government-india/ (accessed on 31 December 2024).
- Ministry of Electronics and Information Technology (MeitY). Internet of Things (IoT) Policy Framework; Government of India: New Delhi, India. Available online: https://icrier.org/policy_bank/internet-of-things-iot/ (accessed on 18 June 2025).
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- da Silva, A.F.; Ohta, R.L.; dos Santos, M.N.; Binotto, A.P.D. A Cloud-Based Architecture for the Internet of Things Targeting Industrial Devices Remote Monitoring and Control. IFAC-PapersOnLine 2016, 49, 108–113. [Google Scholar] [CrossRef]
- Sethi, P.; Sarangi, S.R. Review article: Internet of Things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 2017, 1–25. [Google Scholar] [CrossRef]
- Bhattacharyya, N.; Bandhopadhyay, R. Electronic nose and electronic tongue. In Nondestructive Evaluation of Food Quality; Springer: Berlin/Heidelberg, Germany, 2010; pp. 73–100. [Google Scholar]
- Brewster, C.; Roussaki, I.; Kalatzis, N.; Doolin, K.; Ellis, K. IoT in agriculture: Designing a Europe-wide large-scale pilot. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Karakostas, B. A DNS architecture for the Internet of Things: A case study in transport logistics. Procedia Comput. Sci. 2013, 19, 594–601. [Google Scholar] [CrossRef]
- Wang, F.; Ge, B.; Zhang, L.; Chen, Y.; Xin, Y.; Li, X. A system framework of security management in enterprise systems. Syst. Res. Behav. Sci. 2013, 30, 287–299. [Google Scholar] [CrossRef]
- Roman, R.; Najera, P.; Lopez, J. Securing the Internet of Things. Computer 2011, 44, 51–58. [Google Scholar] [CrossRef]
- Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the 2015 IEEE World Congress on Services (SERVICES), New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar] [CrossRef]
- Kotha, H.D.; Gupta, V.M. IoT application, a survey. Int. J. Eng. Technol. 2018, 7, 636–640. [Google Scholar] [CrossRef]
- Kasmi, M.; Bahloul, F.; Tkitek, H. Smart home based on Internet of Things and cloud computing. In Proceedings of the SETIT 2016, Hammamet, Tunisia, 18–20 December 2016; IEEE: Hammamet, Tunisia, 2016; pp. 82–86. [Google Scholar]
- Kotey, S.D.; Tchao, E.T.; Gadze, J.D. On distributed denial of service current defense schemes. Technologies 2019, 7, 19. [Google Scholar] [CrossRef]
- Singh, M.; Rajan, M.; Shivraj, V.; Balamuralidhar, P. Secure MQTT for Internet of Things (IoT). In Proceedings of the ICCSNT 2015, Gwalior, India, 4–6 April 2015; IEEE: Gwalior, India, 2015; pp. 746–751. [Google Scholar]
- Granjal, J.; Monteiro, E.; Silva, J.S. Security for the Internet of Things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Rizvi, S.; Kurtz, A.; Pfeffer, J.; Rizvi, M. Securing the Internet of Things (IoT): A security taxonomy for IoT. In Proceedings of the TrustCom/BigDataSE 2018, New York, NY, USA, 1–3 August 2018; IEEE: New York, NY, USA, 2018; pp. 163–168. [Google Scholar]
- Greene, S.S. Security Program and Policies: Principles and Practices; Pearson Education: London, UK, 2014. [Google Scholar]
- Iova, O.; Picco, G.P.; Istomin, T.; Kiraly, C. RPL: The routing standard for the Internet of Things… or is it? IEEE Commun. Mag. 2016, 54, 16–22. [Google Scholar] [CrossRef]
- Tiwari, S.; Trivedi, M.C.; Mishra, K.K.; Misra, A.; Kumar, K.K. Smart innovations in communication and computational sciences. In Proceedings of the ICSICCS 2018, Punjab, India, 15–16 June 2017; Springer: Berlin/Heidelberg, Germany, 2018; Volume 851. [Google Scholar]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Rakić, K. Internet of Things (IoT) in education: Opportunities and challenges. In Digital Transformation in Education and Artificial Intelligence Application. MoStart 2023; Vasić, D., Kundid Vasić, M., Eds.; Communications in Computer and Information Science; Springer: Cham, Switzerland, 2023; Volume 1827, pp. 91–104. [Google Scholar] [CrossRef]
- Atmani, A.; Kandrouch, I.; Hmina, N.; Chaoui, H. Big data for Internet of Things: A survey on IoT frameworks and platforms. In Proceedings of the International Conference on Artificial Intelligence and Symbolic Computation, Marrakech, Morocco, 8–11 July 2019; Springer: Cham, Switzerland, 2019; pp. 59–67. [Google Scholar] [CrossRef]
- Azure. Azure: IoT Technologies and Protocols: A Guide to IoT Technologies and Protocols. Microsoft Azure Documentation. Available online: https://azure.microsoft.com/en-us/solutions/iot/iot-technology-protocols (accessed on 13 June 2021).
- AVSystem. IoT Standards and Protocols Guide—Protocols of the Internet of Things. White Paper, 24 May 2019, Updated 4 March 2020. Available online: https://avsystem.com/blog/iot/iot-protocols-and-standards (accessed on 28 May 2025).
- AWS. AWS IoT Core—Authorization. Amazon Web Services Documentation. 2020. Available online: https://docs.aws.amazon.com/iot/latest/developerguide/iot-authorization.html (accessed on 30 June 2025).
- Bhoyar, P.; Sahare, P.; Dhok, S.B.; Deshmukh, R.B. Communication technologies and security challenges for Internet of Things: A comprehensive review. AEU–Int. J. Electron. Commun. 2019, 99, 81–99. [Google Scholar] [CrossRef]
- Gregersen, C. A Complete Guide to IoT Protocols and Standards in 2021. Blog, 18 December 2020. Available online: https://www.nabto.com/guide-iot-protocols-standards/ (accessed on 30 June 2025).
- Chakrabarty, S.; Engels, D.W. A secure IoT architecture for smart cities. In Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016; IEEE: Las Vegas, NV, USA, 2016; pp. 812–813. [Google Scholar] [CrossRef]
- Chanal, P.M.; Kakkasageri, M.S. Security and privacy in IoT: A survey. Wirel. Pers. Commun. 2020, 115, 1667–1693. [Google Scholar] [CrossRef]
- Deogirikar, J.; Vidhate, A. Security attacks in IoT: A survey. In Proceedings of the I-SMAC 2017, Palladam, India, 10–11 February 2017; IEEE: Palladam, India, 2017; pp. 32–37. [Google Scholar] [CrossRef]
- Di Martino, B.; Rak, M.; Ficco, M.; Esposito, A.; Maisto, S.A.; Nacchia, S. Internet of things reference architectures, security and interoperability: A survey. Internet Things 2018, 1, 99–112. [Google Scholar] [CrossRef]
- Almubark, H.; Masmali, O. The awareness of Internet of Things (IoT) privacy risk: A survey study. In Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2, Vancouver, BC, Canada, 20–21 October 2022; Arai, K., Ed.; Lecture Notes in Networks and Systems. Springer: Cham, Switzerland, 2023; Volume 560, pp. 202–220. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Fobe, J.L.A.O.; Nogueira, M.; Batista, D.M. A new defensive technique against sleep deprivation attacks driven by battery usage. In Proceedings of the XXI Brazilian Symposium on Information and Computational System Security (SBSeg 2022), Santa Maria, Brazil, 12–15 September 2022; SBC: São Paulo, Brazil, 2022. [Google Scholar] [CrossRef]
- Jeyanthi, N.; Thandeeswaran, R. (Eds.) Security Breaches and Threat Prevention on the Internet of Things; IGI Global: Hershey, PA, USA, 2017. [Google Scholar] [CrossRef]
- Joshitta, R.S.M.; Arockiam, L. Security in IoT environment: A survey. Int. J. Inf. Technol. Mech. Eng. 2016, 2, 1–8. Available online: https://www.researchgate.net/publication/308648065_Security_in_IoT_Environment_A_Survey (accessed on 31 March 2025).
- Harisaiprasad, K. The Features and Challenges of IoT-Based Access Control. ISACA Now Blog, 8 May 2019. Available online: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2019/the-features-and-challenges-of-iot-based-access-control (accessed on 15 January 2025).
- Hassan, A.; Nizam-Uddin, N.; Quddus, A.; Hassan, S.R.; Rehman, A.U.; Bharany, S. Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity. CMC 2024, 81, 3499–3559. [Google Scholar] [CrossRef]
- Khattak, H.A.; Shah, M.A.; Khan, S.; Ali, I.; Imran, M. Perception layer security in Internet of Things. Future Gener. Comput. Syst. 2019, 100, 144–164. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, S.; Arjariya, P. A comprehensive survey of security challenges and threats in Internet of Things. In Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 22–23 October 2021; IEEE: Mathura, India, 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Chulerttiyawong, D.; Jamalipour, A. Sybil attack detection in Internet of Flying Things-IoFT: A machine learning approach. IEEE Internet Things J. 2023, 10, 12854–12866. [Google Scholar] [CrossRef]
- Kumar, V.; Jha, R.K.; Jain, S. NB-IoT security: A survey. Wireless Pers. Commun. 2020, 113, 2661–2708. [Google Scholar] [CrossRef]
- Buttyan, L. 9 important security requirements to consider for IoT systems. Blog, 25 February 2021. Available online: https://iotac.eu/9-important-security-requirements-to-consider-for-iot-systems/ (accessed on 1 December 2024).
- Mena, D.M.; Papapanagiotou, I.; Yang, B. Internet of things: Survey on security. Inf. Secure. J. A Glob. Perspect. 2018, 27, 162–182. [Google Scholar] [CrossRef]
- Achir, M.; Abdelli, A.; Mokdad, L. Service discovery and selection in IoT: A survey and a taxonomy. J. Netw. Comput. Appl. 2022, 200, 103331. [Google Scholar] [CrossRef]
- Mervin, M. Top Network Access Control Challenges and How to Tackle Them. Blog, 17 January 2024. Available online: https://www.portnox.com/blog/network-access-control/top-network-access-control-challenges-and-how-to-tackle-them/ (accessed on 30 November 2024).
- Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of security attacks. In Proceedings of the ICED 2016, Phuket, Thailand, 11–12 August 2016; IEEE: Kuala Lumpur, Malaysia, 2016; pp. 321–326. [Google Scholar] [CrossRef]
- Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J. 2016, 4, 1–20. [Google Scholar] [CrossRef]
- Norton. IoT: Internet of Things (IoT) Security: 9 Ways to Help Protect Yourself. Norton Blog. 2020. Available online: https://us.norton.com/blog/iot/securing-the-internet-of-things (accessed on 18 April 2021).
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Panchiwala, S.; Shah, M. A comprehensive study on critical security issues and challenges of the IoT world. J. Data Inf. Manag. 2020, 2, 257–278. [Google Scholar] [CrossRef]
- Ippolito, P.P. An introduction to the Internet of Things. Blog, 26 August 2019. Available online: https://www.freecodecamp.org/news/introduction-to-iot-internet-of-things/ (accessed on 31 August 2019).
- Sain, M.; Kang, Y.J.; Lee, H.J. Survey on security in Internet of Things: State of the art and challenges. In Proceedings of the ICACT 2017, PyeongChang, Republic of Korea, 19–22 February 2017; IEEE: PyeongChang, Republic of Korea, 2017; pp. 699–704. [Google Scholar] [CrossRef]
- Amyx, S. Managed PKI Certificates: One Step at a Time Toward Securing the IoT. Blog. 2016. Available online: https://medium.com/@ScottAmyx/managed-pki-certificates-one-step-at-a-time-toward-securing-the-iot-8b4c539c8ec (accessed on 28 December 2020).
- Tanaka, S.; Mimura, N.; Tanaka, M.; Fujishima, K.; Ohashi, T. IoT system security issues and solution approaches. IoT Secur.—Hitachi Rev. 2016, 65, 359. Available online: https://www.hitachihyoron.com/rev/archive/2016/r2016_08/111/index.html (accessed on 18 December 2024).
- Salman, T.; Jain, R. A survey of protocols and standards for Internet of Things. arXiv 2019, arXiv:1903.11549. Available online: https://arxiv.org/abs/1903.11549 (accessed on 20 December 2024). [CrossRef]
- Nwazor, T. IoT Security Challenges and 5 Effective Ways to Handle Them. IoT Zone Blog, 15 November 2018. Available online: https://dzone.com/articles/iot-security-challenges-and-5-effective-ways-to-ha-1 (accessed on 31 January 2020).
- Vashi, S.; Ram, J.; Modi, J.; Verma, S.; Prakash, C. Internet of Things (IoT): A vision, architectural elements, and security issues. In Proceedings of the I-SMAC 2017, Palladam, India, 10–11 February 2017; IEEE: Palladam, India, 2017; pp. 492–496. [Google Scholar] [CrossRef]
- WolfSSL Inc. WolfSSL Embedded SSL/TLS Library. Available online: https://www.wolfssl.com/ (accessed on 31 July 2025).
- Zhang, C.; Green, R. Communication security in Internet of Things: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th Symposium on Communications & Networking (CNS ‘15), Alexandria, VA, USA, 12–15 April 2015; Society for Computer Simulation International: Alexandria, VA, USA, 2015; pp. 8–15. [Google Scholar]
- Zhang, F.Z.; Yang, D.K.; Zhi, C. Introduction of IoT. Lecture Slides. 2010. Available online: https://jhzhang.cn/resources/A050801G/Ch1.pdf (accessed on 1 December 2023).
- Ali, R.F.; Muneer, A.; Dominic, P.D.D.; Taib, S.M.; Ghaleb, E.A.A. Internet of Things (IoT) security challenges and solutions: A systematic literature review. In Advances in Cyber Security. ACeS 2021; Abdullah, N., Manickam, S., Anbar, M., Eds.; Communications in Computer and Information Science; Springer: Singapore, 2021; Volume 1487, pp. 123–140. [Google Scholar] [CrossRef]
- Rejeb, A.; Rejeb, K.; Treiblmaier, H.; Applloni, A.; Alghamdi, S.; Alhasawi, Y.; Iranmanesh, M. The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet Things 2023, 22, 100721. [Google Scholar] [CrossRef]
- Tay, Y.H.; Ooi, S.Y.; Pang, Y.H.; Gan, Y.H.; Lew, S.L. Ensuring privacy and security on banking websites in Malaysia: A cookies scanner solution. J. Inform. Web Eng. 2023, 2, 153–167. [Google Scholar] [CrossRef]
- Lai, J.-F.; Heng, S.-H. Secure file storage on cloud using hybrid cryptography. J. Inform. Web Eng. 2022, 1, 1–18. [Google Scholar] [CrossRef]
- Chuah, W.-H.; Chong, S.-C.; Chong, L.-Y. The assistance of eye blink detection for two-factor authentication. J. Inform. Web Eng. 2023, 2, 111–121. [Google Scholar] [CrossRef]
- Ray, P.P. A survey on Internet of Things architectures. J. King Saud Univ.–Comput. Inf. Sci. 2018, 30, 291–319. [Google Scholar] [CrossRef]
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
- Pau, K.N.; Lee, V.W.Q.; Ooi, S.Y.; Pang, Y.H. The development of a data collection and browser fingerprinting system. Sensors 2023, 23, 3087. [Google Scholar] [CrossRef]
- Lee, V.W.Q.; Ooi, S.Y.; Pang, Y.H. Assessing the Importance of Browser Fingerprint Attributes towards User Profiling through Clustering Algorithms. In Proceedings of the ISCAIE 2023, Penang, Malaysia, 20–21 May 2023; IEEE: Penang, Malaysia, 2023; pp. 326–331. [Google Scholar] [CrossRef]
- ISO/IEC 30141:2024; Internet of Things (IoT)—Reference Architecture (Edition 2). International Organization for Standardization: Geneva, Switzerland, 2024.
- The Government of the Hong Kong Special Administrative Region. Practice Guide for Internet of Things Security, Version 1.2; The Government of the HKSAR: Hong Kong, China, 2024; pp. 12–17.
- Mislaw, H.; Dora, K.; Mrio, K.; Ivana, P.Z. Efficient data management in agricultural IoT: Compression, security and MQTT protocol analysis. Sensors 2024, 24, 3517. [Google Scholar] [CrossRef] [PubMed]
- Agali, K.; Masrom, M.; Abdul Rahim, F.; Yahya, Y. IoT-based remote monitoring system: A new era for patient engagement. Healthc. Technol. Lett. 2024, 11, 437–446. [Google Scholar] [CrossRef] [PubMed]
- Kong. The Critical Role of API Security in the Internet of Things (IoT). Blog, 2 August 2024. Available online: https://konghq.com/blog/enterprise/iot-api-security-guide (accessed on 31 December 2024).
- Khaled, A.E.; Helal, S. Interoperable communication framework for bridging RESTful and topic-based communication in IoT. Future Gener. Comput. Syst. 2019, 92, 628–643. [Google Scholar] [CrossRef]
- Benomar, Z.; Garofalo, M.; Georgantas, N.; Longo, F.; Merlino, G.; Puliafito, A. Bridging IoT protocols with the Web of Things: A path to enhanced interoperability. In Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings), Green Computing & Communications (GreenCom), Cyber, Physical & Social Computing (CPSCom), Smart Data (SmartData), and Congress on Cybermatics, Copenhagen, Denmark, 19–22 August 2024; IEEE: Copenhagen, Denmark, 2024; pp. 44–51. [Google Scholar] [CrossRef]
- Zhou, J.; Liu, J. Research on Key Technologies for Connected Vehicle Autonomous Driving Based on 5G Big Data. Appl. Math. Nonlinear Sci. 2024, 9, 1–14. [Google Scholar] [CrossRef]
- Azim, A.W.; Bazzi, A.; Fatima, M.; Shubair, R.; Chafii, M. Dual-Mode Time Domain Multiplexed Chirp Spread Spectrum. IEEE Trans. Veh. Technol. 2023, 72, 16086–16097. [Google Scholar] [CrossRef]
- Yuga. DREAD Threat Modelling Methodology. Practical DevSecOps, 9 March 2023. Available online: https://www.practical-devsecops.com/dread-threat-modeling/ (accessed on 20 December 2023).
- SECNORA. What is Threat Model STRIDE and DREAD? SECNORA Blog, 22 May 2022. Available online: https://secnora.com/blog/what-is-threat-model-stride-and-dread/ (accessed on 31 December 2022).
- Cornelius, T. The CIA Triad is Insufficient in the Age of AI/OT/IoT. Blog, 6 March 2023. Available online: https://www.linkedin.com/pulse/cia-triad-insufficient-age-aiotiot-tom-cornelius (accessed on 31 December 2023).
- Microsoft. Secure Boot and Trust Boot. Microsoft Documentation, 7 October 2024. Available online: https://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/trusted-boot (accessed on 30 November 2024).
- Thales. Hardware Security Modules (HSMs). Thales Technical Brief, 14 July 2020. Available online: https://cpl.thalesgroup.com/encryption/hardware-security-modules (accessed on 31 August 2020).
- What Is Hardware Security Module (HSM)? Available online: https://www.fortinet.com/resources/cyberglossary/hardware-security-module (accessed on 7 October 2025).
- Spektor, H. Understanding IoT Security: Threats, Standards & Best Practices. Sternum IoT Blog, 21 February 2024. Available online: https://sternumiot.com/iot-blog/understanding-iot-security-challenges-standards-and-best-practices/ (accessed on 30 October 2024).
- Soori, M.; Arezoo, B.; Dastres, R. Internet of Things for smart factories in Industry 4.0: A review. IoT Pract. 2023, 3, 192–204. [Google Scholar] [CrossRef]
- Chawla, D.; Mehra, P.S. A Roadmap from Classical Cryptography to Post-Quantum Resistant Cryptography for 5G-Enabled IoT: Challenges, Opportunities and Solutions. Internet Things 2023, 24, 100950. [Google Scholar] [CrossRef]
- Ahmadunnisa, S.; Mathe, S.E. A Comprehensive Review on Hardware Implementations of Lattice-Based Cryptographic Schemes. J. Syst. Archit. 2025, 167, 103486. [Google Scholar] [CrossRef]
- Sedghighadikolaei, K.; Yavuz, A.A.; Nouma, S.E. Signer-Optimal Multiple-Time Post-Quantum Hash-Based Signature for Heterogeneous IoT Systems. Internet Things 2025, 33, 101694. [Google Scholar] [CrossRef]
- Banaeian Far, S.; Imani Rad, A.; Hosseini Bamakan, S.M.; Rajabzadeh Asaar, M. Toward Metaverse of Everything: Opportunities, Challenges, and Future Directions of the next Generation of Visual/Virtual Communications. J. Netw. Comput. Appl. 2023, 217, 103675. [Google Scholar] [CrossRef]
- Wijaksana, S.N.; Putra, S.A. Internet of Everything for Monitoring Exhaust Gas Emissions on Green Campuses: A Survey. Procedia Comput. Sci. 2024, 245, 1057–1064. [Google Scholar] [CrossRef]
- Zhang, K.; Li, M.; Zhang, B.; Chu, P.; Che, G. High-Accurate Range Acquisition for LFMCW Radar with Optimized Maximum Likelihood Estimation towards Internet of Everything. Phys. Commun. 2025, 70, 102646. [Google Scholar] [CrossRef]
Research Question (RQ) | Focus | Addressed in Section(s) |
---|---|---|
RQ1: What is the Internet of Things (IoT), and what are the fundamental IoT architectures proposed in the literature? | Introduces IoT concepts and surveys major architectural frameworks. | Section 3 |
RQ2: What are the advantages and limitations of different IoT architectures across the technical layers? | Analyzes multiple IoT architectures, highlighting their strengths and weaknesses. | Section 4 |
RQ3: How are different IoT architectural models (e.g., three-layer and five-layer) related, and how can they be mapped to each other? | Compares and maps the three-layer and five-layer IoT views, clarifying their correspondence. | Section 5 |
RQ4: What are the main security threats, challenges, and opportunities associated with IoT architectures, and how have researchers proposed to address them? | Examines threats, vulnerabilities, challenges, and emerging opportunities for IoT security. | Section 6, Section 7 and Section 8 |
Layers | RFID Attacks | WSN Attacks |
---|---|---|
Physical/ Link | Jammer, replay attacks, Sybil, selective forwarding, synchronization attack. | Passive intrusion, aggressive jamming of the device’s temporary blocking, Sybil, destruction of RFID reader, and replay threat. |
Network/ Transport | Sinkhole, unfairness, false routing, hello and session flooding, eavesdropping. | Tag attacks: cloning, spoofing. Reader attacks: impersonation, eavesdropping, network protocol attacks. |
Application Layer | Injection, buffer overflows. | Injection, buffer overflows, tag interpretation unauthorized, and tag update. |
Interfaces | Safety Limitations | Mitigations |
---|---|---|
Perception | Identification of the suspicious nodes/sensors. | Algorithm for defect detection, a centrally controlled method for malware detection. |
Cryptographic algorithms for selection and efficient key mechanisms can be used. | Because of the wide size of network public key encryption. | |
Network | Supporting IPsec connectivity with nodes of IPv6. | IPv6 and IPsec adequacy analysis for safe communications. |
Aspect | Universally Applicable Principles | Industry-Specific Principles |
---|---|---|
Security | Multi-layered protection including data encryption, authentication, and access control | Healthcare: compliance with HIPAA and other medical data regulations, patient privacy safeguards, audit trails |
Scalability | Cloud-native architectures and scalable protocols (e.g., MQTT, CoAP) to handle device growth | Smart Cities: capacity to manage millions of sensors and devices in dense urban environments with minimal latency |
Reliability | Redundancy, error handling, and failover mechanisms to ensure system uptime | Industrial IoT: time-sensitive networking (TSN) and fault-tolerance in critical manufacturing processes |
Energy efficiency | Low-power communication protocols (e.g., Zigbee, LoRaWAN) and device sleep modes | Agriculture IoT: solar-powered and energy-harvesting devices for remote monitoring in harsh or rural environments |
Interoperability | Use of standardized APIs, middleware, and open protocols for cross-platform integration | Consumer IoT: integration with virtual assistants (e.g., Alexa, Google Assistant) and proprietary ecosystems |
Customization | Adaptability to various use cases and environments | Context-specific tailoring to unique regulatory, environmental, or operational requirements (e.g., military, finance) |
Architecture | Common Attack | Description | Security Countermeasures |
---|---|---|---|
Data and cloud service | Poisoning | Input of incorrect training data labels to decrease the accuracy of the classification/clustering process | Data sanitization |
Evasion | Generating an adversarial sample prevents the system from detecting spam and malware | Retraining learning models by classifier designers with adversarial samples | |
Impersonate | Unauthorized access based on the deep neural network DNN algorithm | Defensive distillation on DNN | |
Inversion | Gathering information about ML models to compromise data privacy | Differential privacy (DP) technique and data encryption | |
Application | Mirai malware | Gain access to IoT devices by using a default Telnet or SSH account | Disabling/changing the default account of Telnet and SSH account |
IRC Telnet | Forcing Telnet port to infect LINUX operating system of IoT device | Disabling Telnet port number | |
Injection | Untrusted data is sent to an interpreter as part of a command or query | Input validation control | |
Transport | TCP flooding | Sending many packets through TCP protocol to stop or to reduce its activities | A classifier based on SVM to detect and prevent DDoS TCP flooding attacks |
UDP flooding | Sending a large number of packets through UDP protocol to stop or to reduce its activities | A flow-based detection schema on a router using a state machine and a hashing table | |
TCP SYN flooding | Tentative to open an external connection without respecting the TCP handshake procedure | SYN cookies consist of coding client SYN messages to change the state on the server side | |
TCP desynchronization | Tentative to break the packet sequence by injecting a packet with a wrong sequence number | Authentication for all packets in the TCP session | |
Network | Man-in-the-middle | Violet, the confidentiality and integrity in data transfer | Intrusion-detection system (IDS) and virtual private network (VPN) |
DDoS | Making network resources unavailable for their intended use | Ingress/Egress filtering, D-WARD, Hoop count filtering, and SYN cookies | |
Reply | Manipulating the message stream and recording the data packets | Timeliness of message | |
Physical | Eavesdropping | Infer information sent by IoT devices via the network | Faraday cage |
Cyber-physical | Physically attacking a device | Use of fault-detection algorithm to identify the faulty nodes | |
RFID tracking | To turn off tags, modify their contents, or imitate them | Faraday cage |
Type | Algorithm | Key Size | Execution Time | Application |
---|---|---|---|---|
Symmetric | PRESENT | 64 bits block with 80/128-bit length key | 27.9 | RFID |
CELIA | 128 bits block with 80/128/192 bits length key | - | Used by Sony for Digital rights management | |
RSA | 1764 Bytes | 19.33 | Authentication | |
Asymmetric | Elliptic Curves | 1272 Bytes | 87.03 | Pervasive Computing |
Threat | Potential Vulnerability | Countermeasure | |
---|---|---|---|
Device spoofing | Lack of device authentication | Use mutual authentication, e.g., certificate | |
Data interception | MQTT | Weak encryption in the communication channel No built-in encryption implicates data interception | Implement TLS/SSL encryption for secure communication |
CoAP | Limited security features exposed to replay attacks | Implement DTLS | |
BLE | A weak pairing process leading to unauthorized access | Use secure pairing mode | |
Firmware tampering | Insecure update mechanism | Use signed and approved firmware update | |
Distributed Denial of Service (DDoS) | Poorly configured IoT device in a botnet | Implement rate limiting and IP filtering | |
Unauthorized access | Weak or default password | Enforce strong password policies and MFA | |
Physical tampering | Device left in unsecured environments | Use tamper-evident hardware and secure casing |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lim, K.S.; Ooi, S.Y.; Sayeed, M.S.; Chew, Y.J.; Ahmad, N.M. Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses. Electronics 2025, 14, 3972. https://doi.org/10.3390/electronics14203972
Lim KS, Ooi SY, Sayeed MS, Chew YJ, Ahmad NM. Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses. Electronics. 2025; 14(20):3972. https://doi.org/10.3390/electronics14203972
Chicago/Turabian StyleLim, Kim Son, Shih Yin Ooi, Md Shohel Sayeed, Yee Jian Chew, and Nazrul Muhaimin Ahmad. 2025. "Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses" Electronics 14, no. 20: 3972. https://doi.org/10.3390/electronics14203972
APA StyleLim, K. S., Ooi, S. Y., Sayeed, M. S., Chew, Y. J., & Ahmad, N. M. (2025). Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses. Electronics, 14(20), 3972. https://doi.org/10.3390/electronics14203972