Authors :
Dr. Sunita Dixit; Dr. Dinesh Yadav
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/wv8c5spt
Scribd :
https://tinyurl.com/5xh58rzn
DOI :
https://doi.org/10.38124/ijisrt/25mar1837
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
The Internet of Things has changed many fields by making it easy for smart devices to talk to each other. On the
other hand, this change has led to major security and privacy problems, such as malware attacks, unauthorized access, data
leaks, and weak authentication systems. IoT gadgets are easy targets for hackers because they often don't have a lot of
processing power. Additionally, the massive data generated raises privacy concerns regarding unauthorized surveillance
and data misuse. Traditional security measures are insufficient for IoT ecosystems, necessitating innovative solutions.
Emerging approaches include blockchain for decentralized security, AI-driven anomaly detection, lightweight encryption
techniques, and zero-trust architectures. Regulatory frameworks and technologies that protect privacy, such as federated
learning and differential privacy, are also becoming more common. Even with these changes, it's still hard to find a good
balance between privacy, security, and usability. It talks about the newest threats to privacy and security in the IoT as well
as fresh methods to protect and strengthen the environment.
Keywords :
Component, Formatting, Style, Styling, Insert.
References :
- V. Pillai, “System And Method For Intelligent Detection And Notification Of Anomalies In Financial And Insurance Data Using Machine Learning,” 202421099024 A, 2025.
- H. Taherdoost, “Security and Internet of Things: Benefits, Challenges, and Future Perspectives,” Electronics, vol. 12, no. 8, 2023, doi: 10.3390/electronics12081901.
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Commun. Surv. Tutorials, 2015, doi: 10.1109/COMST.2015.2444095.
- Z. Ali et al., “A Generic Internet of Things (IoT) Middleware for Smart City Applications,” Sustainability, vol. 15, no. 1, 2023, doi: 10.3390/su15010743.
- M. Aldwairi and L. Tawalbeh, “Security techniques for intelligent spam sensing and anomaly detection in online social platforms,” Int. J. Electr. Comput. Eng., vol. 10, no. 1, p. 275, 2020.
- V. Pillai, “Anomaly Detection Device for Financial and Insurance Data,” 6414579, 2025.
- Srinivas Murri, “Data Security Environments Challenges and Solutions in Big Data,” vol. 12, no. 6, pp. 565–574, 2022.
- Y. Meng, W. Zhang, H. Zhu, and X. S. Shen, “Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures,” IEEE Wirel. Commun., vol. 25, no. 6, pp. 53–59, 2018.
- F. Kamalov, B. Pourghebleh, M. Gheisari, Y. Liu, and S. Moussa, “Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective,” Sustainability, vol. 15, no. 4, 2023, doi: 10.3390/su15043317.
- L. Aversano, M. L. Bernardi, M. Cimitile, and R. Pecori, “A systematic review on Deep Learning approaches for IoT security,” Comput. Sci. Rev., vol. 40, p. 100389, 2021.
- M. Gheisari et al., “A survey on clustering algorithms in wireless sensor networks: challenges, research, and trends,” in 2020 International Computer Symposium (ICS), 2020, pp. 294–299.
- K. A. Raza, A. Asheralieva, M. M. Karim, K. Sharif, M. Gheisari, and S. Khan, “A novel forwarding and caching scheme for information-centric software-defined networks,” in 2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021, pp. 1–8.
- R. Ahmad and I. Alsmadi, “Machine learning approaches to IoT security: A systematic literature review,” Internet of Things, vol. 14, p. 100365, 2021.
- A. K. Manjulata, “Survey on lightweight primitives and protocols for RFID in wireless sensor networks,” Int. J. Commun. Networks Inf. Secur., vol. 6, no. 1, pp. 29–43, 2014, doi: 10.17762/ijcnis.v6i1.572.
- A. M. Hassan and A. I. Awad, “Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges,” IEEE Access, vol. 6, pp. 36428–36440, 2018, doi: 10.1109/ACCESS.2018.2838339.
- S. Singh and D. Kumar, “Perceptions of Security and Privacy in Internet of Things,” in 2020 International Conference on Inventive Computation Technologies (ICICT), 2020, pp. 810–813. doi: 10.1109/ICICT48043.2020.9112462.
- N. Zainuddin, M. Daud, S. Ahmad, M. Maslizan, and S. A. L. Abdullah, “A Study on Privacy Issues in Internet of Things (IoT),” in 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), 2021, pp. 96–100. doi: 10.1109/CSP51677.2021.9357592.
- S. B. Sadkhan and Z. Salam, “Security and Privacy in Internet of Things- Status, Challenges,” in 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), 2021, pp. 308–312. doi: 10.1109/IICETA51758.2021.9717785.
- A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, “A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things,” IEEE Internet Things J., vol. 8, no. 6, pp. 4004–4022, 2021, doi: 10.1109/JIOT.2020.3015432.
- O. Aouedi et al., “A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions,” IEEE Commun. Surv. Tutorials, p. 1, 2024, doi: 10.1109/COMST.2024.3430368.
The Internet of Things has changed many fields by making it easy for smart devices to talk to each other. On the
other hand, this change has led to major security and privacy problems, such as malware attacks, unauthorized access, data
leaks, and weak authentication systems. IoT gadgets are easy targets for hackers because they often don't have a lot of
processing power. Additionally, the massive data generated raises privacy concerns regarding unauthorized surveillance
and data misuse. Traditional security measures are insufficient for IoT ecosystems, necessitating innovative solutions.
Emerging approaches include blockchain for decentralized security, AI-driven anomaly detection, lightweight encryption
techniques, and zero-trust architectures. Regulatory frameworks and technologies that protect privacy, such as federated
learning and differential privacy, are also becoming more common. Even with these changes, it's still hard to find a good
balance between privacy, security, and usability. It talks about the newest threats to privacy and security in the IoT as well
as fresh methods to protect and strengthen the environment.
Keywords :
Component, Formatting, Style, Styling, Insert.