{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T11:36:59Z","timestamp":1769341019611,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02124-3","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T09:11:58Z","timestamp":1759914718000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies"],"prefix":"10.1007","volume":"18","author":[{"given":"Suguna","family":"Krishnamoorthy","sequence":"first","affiliation":[]},{"given":"Lekhavani","family":"Ramesh","sequence":"additional","affiliation":[]},{"given":"Ramalakshmi","family":"Subbarayalu","sequence":"additional","affiliation":[]},{"given":"Viyat Varun","family":"Upadhyay","sequence":"additional","affiliation":[]},{"given":"Nagabhooshanam","family":"Nagarajan","sequence":"additional","affiliation":[]},{"given":"Sathish","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kaliappan","sequence":"additional","affiliation":[]},{"given":"Yogendra","family":"Thakur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,8]]},"reference":[{"issue":"4","key":"2124_CR1","doi-asserted-by":"publisher","first-page":"3661","DOI":"10.1007\/s11277-021-09308-z","volume":"123","author":"B Nagajayanthi","year":"2022","unstructured":"Nagajayanthi B (2022) Decades of internet of things towards twenty-first century: a research-based introspective. Wireless Pers Commun 123(4):3661\u20133697","journal-title":"Wireless Pers Commun"},{"issue":"16","key":"2124_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/s23167194","volume":"23","author":"R Chataut","year":"2023","unstructured":"Chataut R, Phoummalayvane A, Akl R (2023) Unleashing the power of IoT: a comprehensive review of IoT applications and prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors (Basel) 23(16):7194","journal-title":"Sensors (Basel)"},{"issue":"19","key":"2124_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/s23198015","volume":"23","author":"H Allioui","year":"2023","unstructured":"Allioui H, Mourdi Y (2023) Exploring the full potentials of IoT for better financial growth and stability: a comprehensive survey. Sensors 23(19):8015","journal-title":"Sensors"},{"issue":"4","key":"2124_CR4","doi-asserted-by":"publisher","first-page":"3611","DOI":"10.1109\/JIOT.2022.3228795","volume":"10","author":"MM Islam","year":"2022","unstructured":"Islam MM, Nooruddin S, Karray F, Muhammad G (2022) Internet of things: device capabilities, architectures, protocols, and smart applications in healthcare domain. IEEE Internet Things J 10(4):3611\u20133641","journal-title":"IEEE Internet Things J"},{"key":"2124_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100549","volume":"48","author":"A Hazra","year":"2023","unstructured":"Hazra A, Rana P, Adhikari M, Amgoth T (2023) Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Comput Sci Rev 48:100549","journal-title":"Comput Sci Rev"},{"key":"2124_CR6","doi-asserted-by":"publisher","first-page":"84579","DOI":"10.1109\/ACCESS.2022.3197585","volume":"10","author":"B Saovapakhiran","year":"2022","unstructured":"Saovapakhiran B, Naruephiphat W, Charnsripinyo C, Baydere S, \u00d6zdemir S (2022) Qoe-driven IoT architecture: a comprehensive review on system and resource management. IEEE Access 10:84579\u201384621","journal-title":"IEEE Access"},{"key":"2124_CR7","doi-asserted-by":"publisher","first-page":"27591","DOI":"10.1109\/ACCESS.2022.3152787","volume":"10","author":"LA Haibeh","year":"2022","unstructured":"Haibeh LA, Yagoub MC, Jarray A (2022) A survey on mobile edge computing infrastructure: design, resource management, and optimization approaches. IEEE Access 10:27591\u201327610","journal-title":"IEEE Access"},{"issue":"17","key":"2124_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12173548","volume":"12","author":"J Yang","year":"2023","unstructured":"Yang J, Shah AA, Pezaros D (2023) A survey of energy optimization approaches for computational task offloading and resource allocation in MEC networks. Electronics 12(17):3548","journal-title":"Electronics"},{"key":"2124_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100259","volume":"16","author":"K Mohiuddin","year":"2022","unstructured":"Mohiuddin K, Fatima H, Khan MA, Khaleel MA, Nasr OA, Shahwar S (2022) Mobile learning evolution and emerging computing paradigms: an edge-based cloud architecture for reduced latencies and quick response time. Array 16:100259","journal-title":"Array"},{"key":"2124_CR10","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/OJCOMS.2022.3195125","volume":"3","author":"G G\u00fcr","year":"2022","unstructured":"G\u00fcr G et al (2022) Integration of ICN and MEC in 5G and beyond networks: mutual benefits, use cases, challenges, standardization, and future research. IEEE Open J Commun Soc 3:1382\u20131412","journal-title":"IEEE Open J Commun Soc"},{"issue":"1","key":"2124_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/s25010213","volume":"25","author":"T Zhukabayeva","year":"2025","unstructured":"Zhukabayeva T, Zholshiyeva L, Karabayev N, Khan S, Alnazzawi N (2025) Cybersecurity solutions for industrial internet of things\u2013edge computing integration: challenges, threats, and future directions. Sensors 25(1):213","journal-title":"Sensors"},{"issue":"3","key":"2124_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030494","volume":"11","author":"MH Ali","year":"2022","unstructured":"Ali MH et al (2022) Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3):494","journal-title":"Electronics"},{"issue":"3","key":"2124_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/s22031094","volume":"22","author":"Z Shah","year":"2022","unstructured":"Shah Z, Ullah I, Li H, Levula A, Khurshid K (2022) Blockchain-based solutions to mitigate distributed denial of service (DDoS) attacks in the internet of things (IoT): a survey. Sensors 22(3):1094","journal-title":"Sensors"},{"key":"2124_CR14","doi-asserted-by":"crossref","unstructured":"Singh S, Sharma PK, Moon SY, Park JH (2024) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput, pp. 1\u201318","DOI":"10.1007\/s12652-017-0494-4"},{"issue":"5","key":"2124_CR15","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/MNET.211.2000526","volume":"35","author":"S Garg","year":"2021","unstructured":"Garg S, Kaur K, Kaddoum G, Garigipati P, Aujla GS (2021) Security in IoT-driven mobile edge computing: new paradigms, challenges, and opportunities. IEEE Netw 35(5):298\u2013305. https:\/\/doi.org\/10.1109\/MNET.211.2000526","journal-title":"IEEE Netw"},{"key":"2124_CR16","doi-asserted-by":"publisher","first-page":"205340","DOI":"10.1109\/ACCESS.2020.3037108","volume":"8","author":"SA Bhat","year":"2020","unstructured":"Bhat SA, Sofi IB, Chi C-Y (2020) Edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities. IEEE Access 8:205340\u2013205373. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037108","journal-title":"IEEE Access"},{"issue":"2","key":"2124_CR17","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/MNET.011.2000449","volume":"35","author":"H Moudoud","year":"2021","unstructured":"Moudoud H, Khoukhi L, Cherkaoui S (2021) Prediction and detection of FDIA and DDoS attacks in 5G enabled IoT. IEEE Netw 35(2):194\u2013201. https:\/\/doi.org\/10.1109\/MNET.011.2000449","journal-title":"IEEE Netw"},{"issue":"4","key":"2124_CR18","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/JIOT.2020.3025916","volume":"8","author":"Y Wu","year":"2021","unstructured":"Wu Y, Dai H-N, Wang H (2021) Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J 8(4):2300\u20132317. https:\/\/doi.org\/10.1109\/JIOT.2020.3025916","journal-title":"IEEE Internet Things J"},{"key":"2124_CR19","doi-asserted-by":"publisher","unstructured":"Zhang L, Peng M, Wang W, Jin Z, Su Y, Chen H (2021) Secure and efficient data storage and sharing scheme for blockchain-based mobile\u2010edge computing. Trans Emerging Tel Tech 32(10):e4315. https:\/\/doi.org\/10.1002\/ett.4315","DOI":"10.1002\/ett.4315"},{"issue":"1","key":"2124_CR20","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TMC.2021.3068717","volume":"22","author":"J Li","year":"2023","unstructured":"Li J, Wu J, Chen L, Li J, Lam S-K (2023) Blockchain-based secure key management for mobile edge computing. IEEE Trans Mobile Comput 22(1):100\u2013114. https:\/\/doi.org\/10.1109\/TMC.2021.3068717","journal-title":"IEEE Trans Mobile Comput"},{"key":"2124_CR21","doi-asserted-by":"crossref","unstructured":"Hanif S, Ilyas T, Zeeshan M Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset, in (2019) IEEE 16th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT and AI (HONET-ICT), IEEE, 2019, pp. 152\u2013156","DOI":"10.1109\/HONET.2019.8908122"},{"key":"2124_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","volume":"176","author":"AK Sahu","year":"2021","unstructured":"Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146\u2013154","journal-title":"Comput Commun"},{"key":"2124_CR23","doi-asserted-by":"crossref","unstructured":"Osamor F, Wellman B (2022) Deep Learning-based hybrid model for efficient anomaly detection. Int J Adv Comput Sci Appl, 13, 4","DOI":"10.14569\/IJACSA.2022.01304111"},{"key":"2124_CR24","doi-asserted-by":"publisher","first-page":"25579","DOI":"10.1109\/ACCESS.2020.2971354","volume":"8","author":"AA Taha","year":"2020","unstructured":"Taha AA, Malebary SJ (2020) An intelligent approach to credit card fraud detection using an optimised light gradient boosting machine. IEEE Access 8:25579\u201325587","journal-title":"IEEE Access"},{"issue":"5","key":"2124_CR25","first-page":"3414","volume":"29","author":"NK Trivedi","year":"2020","unstructured":"Trivedi NK, Simaiya S, Lilhore UK, Sharma SK (2020) An efficient credit card fraud detection model based on machine learning methods. Int J Adv Sci Technol 29(5):3414\u20133424","journal-title":"Int J Adv Sci Technol"},{"key":"2124_CR26","doi-asserted-by":"crossref","unstructured":"Azizjon M, Jumabek A, Kim W (2020) 1D CNN-based network intrusion detection with normalization on imbalanced data, in 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), IEEE, pp. 218\u2013224","DOI":"10.1109\/ICAIIC48513.2020.9064976"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02124-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02124-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02124-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:36:59Z","timestamp":1765622219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02124-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2124"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02124-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"5 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"296"}}