{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:29:52Z","timestamp":1763346592050,"version":"3.45.0"},"reference-count":150,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":305,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.070189","type":"journal-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T08:42:35Z","timestamp":1760344955000},"page":"4307-4344","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework"],"prefix":"10.32604","volume":"85","author":[{"given":"Inam Ullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Fida Muhammad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Zeeshan Ali","family":"Haider","sequence":"additional","affiliation":[]},{"given":"Fahad","family":"Alturise","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"178","DOI":"10.3390\/fi15050178","article-title":"Survey of distributed and decentralized IoT securities: approaches using deep learning and blockchain technology","volume":"15","author":"Falayi","year":"2023","journal-title":"Fut Internet"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5335","DOI":"10.1109\/JIOT.2022.3222450","article-title":"Transparent and tamper-proof event ordering in the Internet of Things platforms","volume":"10","author":"Rahman","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.011.1900374","article-title":"Blockchain-based sharing and tamper-proof framework of big data networking","volume":"34","author":"Yang","year":"2020","journal-title":"IEEE Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MCOM.2018.1700882","article-title":"Mobile edge computing and networking for green and low-latency Internet of Things","volume":"56","author":"Zhang","year":"2018","journal-title":"IEEE Commun Mag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"9429676","DOI":"10.1155\/2017\/9429676","article-title":"Big data analytics embedded smart city architecture for performance enhancement through real-time data processing and decision-making","volume":"2017","author":"Nathali Silva","year":"2017","journal-title":"Wirel Commun Mob Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"6476274","DOI":"10.1155\/2022\/6476274","article-title":"A survey on zero trust architecture: challenges and future trends","volume":"2022","author":"He","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"865","DOI":"10.3390\/electronics13050865","article-title":"Enhancing zero trust models in the financial industry through blockchain integration: a proposed framework","volume":"13","author":"Daah","year":"2024","journal-title":"Electronics"},{"key":"ref8","article-title":"Real-time anomaly detection in IoT networks using hybrid AI models","volume":"1","author":"Tesfaye","year":"2024","journal-title":"Asian Am Res Lett J"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1080\/23742917.2024.2374594","article-title":"Investigating the synergy of Blockchain and AI: enhancing security, efficiency, and transparency","volume":"9","author":"Alzoubi","year":"2025","journal-title":"J Cyber Secur Technol"},{"key":"ref10","unstructured":"Ruzbahani AM. AI-protected blockchain-based IoT environments: harnessing the future of network security and privacy. arXiv:2405.13847. 2024."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/TNSM.2019.2894955","article-title":"Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks","volume":"16","author":"Kherraf","year":"2019","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"64907","DOI":"10.1109\/ACCESS.2019.2917557","article-title":"Optimizing resources allocation for fog computing-based Internet of Things networks","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"9372","DOI":"10.3390\/app11209372","article-title":"Systematic literature review of challenges in blockchain scalability","volume":"11","author":"Khan","year":"2021","journal-title":"Appl Sci"},{"key":"ref14","first-page":"49","article-title":"Emerging technologies for data security in zero trust environments","volume":"9","author":"Davis","year":"2024","journal-title":"Cyber Def Rev"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3625094","article-title":"A systematic review of IoT security: research potential, challenges, and future directions","volume":"56","author":"Fei","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref16","unstructured":"Raza H. Proactive cyber defense with AI: enhancing risk assessment and threat detection in cybersecurity ecosystems; 2021 [cited 2025 Jan 1]. Available from: https:\/\/www.researchgate.net\/publication\/384323201."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"55","DOI":"10.22161\/ijaers.105.8","article-title":"Enhancing cybersecurity: the power of artificial intelligence in threat detection and prevention","volume":"10","author":"Rizvi","year":"2023","journal-title":"Int J Adv Eng Res Sci"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1201\/9781003540212-20","author":"Das","year":"2025","journal-title":"The intersection of 6G, AI\/machine learning, and embedded systems"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3654663","article-title":"Machine learning in metaverse security: current solutions and future challenges","volume":"56","author":"Otoum","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"4041","DOI":"10.1038\/s41598-025-88163-5","article-title":"Intelligent deep federated learning model for enhancing security in Internet of Things enabled edge computing environment","volume":"15","author":"Albogami","year":"2025","journal-title":"Sci Rep"},{"key":"ref21","first-page":"100520","article-title":"Securing the digital world: protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection","volume":"36","author":"Schmitt","year":"2023","journal-title":"J Ind Inf Integr"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"106897","DOI":"10.1016\/j.compeleceng.2020.106897","article-title":"Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions","volume":"90","author":"Bhushan","year":"2021","journal-title":"Comput Electr Eng"},{"key":"ref23","first-page":"49","article-title":"IoT device identity management and blockchain for security and data integrity","volume":"184","author":"Gangwani","year":"2023","journal-title":"Int J Comput Appl"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"297","DOI":"10.23919\/JCC.2021.12.019","article-title":"Integration of communication and computing in blockchain-enabled multi-access edge computing systems","volume":"18","author":"Zhang","year":"2021","journal-title":"China Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.future.2022.10.029","article-title":"Integration of blockchain and edge computing in Internet of Things: a survey","volume":"144","author":"Xue","year":"2023","journal-title":"Future Gener Comput Syst"},{"key":"ref26","first-page":"65","article-title":"Integration of IoT with cloud, fog, and edge computing: a review","volume":"8","author":"Kuchuk","year":"2024","journal-title":"Adv Inf Syst"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.30574\/ijsra.2024.11.1.0287","article-title":"Current state and prospects of edge computing within the Internet of Things (IoT) ecosystem","volume":"11","author":"Sodiya","year":"2024","journal-title":"Int J Sci Res Arch"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"111127","DOI":"10.1016\/j.comnet.2025.111127","article-title":"Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks","volume":"260","author":"Souza","year":"2025","journal-title":"Comput Netw"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"e76836","DOI":"10.34117\/bjdv11n1-060","article-title":"The role of zero trust architecture in modern cybersecurity: integration with IAM and emerging technologies","volume":"11","author":"Filho","year":"2025","journal-title":"Braz J Develop"},{"key":"ref30","doi-asserted-by":"crossref","unstructured":"Gambo ML, Almulhem A. Zero trust architecture: a systematic literature review. arXiv:2503.11659. 2025.","DOI":"10.36227\/techrxiv.173933211.18231232\/v1"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"704","DOI":"10.54660\/.IJMRGE.2023.4.1.704-709","article-title":"Blockchain and zero-trust identity management system for smart cities and IoT networks","volume":"4","author":"Hassan","year":"2023","journal-title":"Int J Multidiscip Res Growth Eval"},{"key":"ref32","first-page":"1","article-title":"Toward intelligent data access control: a dual-layered zero trust and blockchain-based data access model","volume":"9","author":"Chawda","year":"2023","journal-title":"Sci Pract Cyber Secur J"},{"key":"ref33","first-page":"28","author":"Raghu","year":"2025","journal-title":"Applications of blockchain and artificial intelligence in finance and governance"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"56","DOI":"10.30574\/wjarr.2024.23.1.1985","article-title":"Integrating machine learning and blockchain: conceptual frameworks for real-time fraud detection and prevention","volume":"23","author":"Bello","year":"2024","journal-title":"World J Adv Res Rev"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.3390\/pr12091825","article-title":"Integrating AI and blockchain for enhanced data security in IoT-driven smart cities","volume":"12","author":"Khan","year":"2024","journal-title":"Processes"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"12556","DOI":"10.1109\/TEM.2023.3262678","article-title":"Blockchain-based data integrity verification scheme in AIoT cloud-edge computing environment","volume":"71","author":"Li","year":"2024","journal-title":"IEEE Trans Eng Manag"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"86","DOI":"10.14445\/22312803\/IJCTT-V72I8P112","article-title":"Enhancing endpoint security through collaborative zero-trust integration: a multi-agent approach","volume":"72","author":"Reddy","year":"2024","journal-title":"Int J Comput Trends Technol"},{"key":"ref38","first-page":"712","article-title":"Integrating artificial intelligence with zero trust architecture: enhancing adaptive security in modern cyber threat landscape","volume":"9","author":"Tiwari","year":"2022","journal-title":"Int J Res Anal Rev"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"475","DOI":"10.3390\/info15080475","article-title":"Systematic literature review of blockchain technology\u2019s technical challenges: a tertiary study","volume":"15","author":"Chandan","year":"2024","journal-title":"Information"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1416","DOI":"10.3390\/electronics11091416","article-title":"Blockchain applicability for the Internet of Things: performance and scalability challenges and solutions","volume":"11","author":"Rahman","year":"2022","journal-title":"Electronics"},{"key":"ref41","first-page":"1","article-title":"Edge AI: a review of machine learning models for resource-constrained devices","volume":"5","author":"Kumar","year":"2024","journal-title":"Artif Intell Mach Learn Rev"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.3390\/electronics12041025","article-title":"Review and development of a scalable lightweight blockchain integrated model (LightBlock) for IoT applications","volume":"12","author":"Mahmoud","year":"2023","journal-title":"Electronics"},{"key":"ref43","first-page":"1","article-title":"AI applications in real-time edge processing: leveraging artificial intelligence for enhanced efficiency, low-latency decision making, and scalability in distributed systems","volume":"14","author":"\u00d6zkan","year":"2024","journal-title":"Int J Mach Intell Smart Appl"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1109\/COMST.2021.3067354","article-title":"A survey on standards for interoperability and security in the Internet of Things","volume":"23","author":"Lee","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"36416","DOI":"10.1109\/ACCESS.2022.3162219","article-title":"A survey of interoperability challenges and solutions for dealing with them in IoT environment","volume":"10","author":"Albouq","year":"2022","journal-title":"IEEE Access"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero trust architecture (ZTA): a comprehensive survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"ref47","unstructured":"Otoum Y. AI-based intrusion detection systems to secure Internet of Things (IoT) [dissertation]. Ottawa, ON, Canada: Universit\u00e9 d\u2019Ottawa\/University of Ottawa; 2022."},{"key":"ref48","series-title":"2017 IEEE International Conference on Web Services (ICWS); 2017 Jun 25\u201330","first-page":"468","article-title":"Blockchain based data integrity service framework for IoT data","author":"Liu"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","article-title":"Blockchain-assisted secure device authentication for cross-domain industrial IoT","volume":"38","author":"Shen","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref50","series-title":"2nd International Conference on Advancements in Computational Sciences (ICACS); 2019 Feb 18\u201320","first-page":"1","article-title":"Smart contracts integration between blockchain and Internet of Things: opportunities and challenges","author":"Rashid"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","article-title":"Real-time lateral movement detection based on evidence reasoning network for edge computing environment","volume":"15","author":"Tian","year":"2019","journal-title":"IEEE Trans Ind Inform"},{"key":"ref52","series-title":"2021 IEEE\/ACM Symposium on Edge Computing (SEC); 2021 Dec 14\u201317","first-page":"403","article-title":"Scheduling real-time applications on edge computing platforms with remote attestation for security","author":"Reusch"},{"key":"ref53","series-title":"2023 9th International Conference on Information Technology Trends (ITT); 2023 May 24\u201325","first-page":"7","article-title":"Machine learning techniques for permission-based malware detection in Android applications","author":"Khan"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"28684","DOI":"10.1109\/ACCESS.2024.3367118","article-title":"A survey on integrating edge computing with AI and blockchain in maritime domain, aerial systems, IoT, and industry 4.0","volume":"12","author":"Alnahdi","year":"2024","journal-title":"IEEE Access"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"6420","DOI":"10.3390\/s20226420","article-title":"Challenges in resource-constrained IoT devices: energy and communication as critical success factors for future IoT deployment","volume":"20","author":"Pereira","year":"2020","journal-title":"Sensors"},{"key":"ref56","series-title":"2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA); 2021 Jun 14\u201318","first-page":"1","article-title":"Zero trust: never trust, always verify","author":"Wylde"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","article-title":"Security in Internet of Things: issues, challenges, taxonomy, and architecture","volume":"67","author":"Adat","year":"2018","journal-title":"Telecommun Syst"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","article-title":"BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network","volume":"143","author":"Rathore","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"136","DOI":"10.62762\/TSCC.2024.626147","article-title":"Vehicular network security through optimized deep learning model with feature selection techniques","volume":"1","author":"Khan","year":"2024","journal-title":"IECE Trans Sens Commun Control"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3671147","article-title":"ZTA-IoT: a novel architecture for zero-trust in IoT systems and an ensuing usage control model","volume":"27","author":"Ameer","year":"2024","journal-title":"ACM Trans Priv Secur"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"737","DOI":"10.30574\/ijsra.2023.8.2.0163","article-title":"Zero trust architecture in IAM with AI integration","volume":"8","author":"Arora","year":"2023","journal-title":"Int J Sci Res Arch"},{"key":"ref62","first-page":"67","article-title":"A survey on different continuous authentication systems","volume":"11","author":"Ayeswarya","year":"2019","journal-title":"Int J Biom"},{"key":"ref63","first-page":"1","article-title":"Use of blockchain technology to strengthen identity and access management (IAM)","volume":"1","author":"Ghadge","year":"2024","journal-title":"Int J Inf Technol"},{"key":"ref64","unstructured":"Rahman S, Perumath N. Implementing zero trust management in IoT environment\u2014challenges and solutions: scoping review [master\u2019s thesis]. Stockholm, Sweden: Stockholm University; 2025."},{"key":"ref65","doi-asserted-by":"crossref","first-page":"550","DOI":"10.3390\/s25020550","article-title":"Zero-trust access control mechanism based on blockchain and inner-product encryption in the Internet of Things in a 6G environment","volume":"25","author":"Nie","year":"2025","journal-title":"Sensors"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"13554","DOI":"10.1007\/s11227-022-04408-4","article-title":"Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing","volume":"78","author":"Kim","year":"2022","journal-title":"J Supercomput"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"48","DOI":"10.62762\/TACS.2024.835144","article-title":"Enhancing authentication security in Internet of vehicles: a blockchain-driven approach for trustworthy communication","volume":"1","author":"Ali Haider","year":"2024","journal-title":"ICCK Trans Adv Comput Syst"},{"key":"ref68","series-title":"2021 14th International Conference on Security of Information and Networks (SIN); 2021 Dec 15\u201317","first-page":"1","article-title":"Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)","author":"Arifeen"},{"key":"ref69","unstructured":"Thapa M. Mitigating threats in IoT network using device isolation [master\u2019s thesis]. Espoo, Finland: Aalto University; 2018."},{"key":"ref70","article-title":"Malware containment via firewall placement in large scale wireless IoT networks","author":"Mesbah","year":"2024","journal-title":"TechRxiv"},{"key":"ref71","series-title":"IEEE INFOCOM 2020\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2020 Jul 6\u20139","first-page":"109","article-title":"Enterprise mobile device management requirements and features","author":"Batool"},{"key":"ref72","series-title":"Proceedings of the First Workshop on Radical and Experiential Security; 2018 Jun 4; Incheon, Republic of Korea","first-page":"57","article-title":"Cracking IoT device user account via brute-force attack to SMS authentication code","author":"Wang"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"1966","DOI":"10.1007\/s13198-015-0411-1","article-title":"A cloud-user behavior assessment based dynamic access control model","volume":"8","author":"Jing","year":"2017","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1186\/s12920-020-0721-2","article-title":"Leveraging blockchain for immutable logging and querying across multiple sites","volume":"13","author":"Ozdayi","year":"2020","journal-title":"BMC Med Genomics"},{"key":"ref75","first-page":"1928","article-title":"VRBC: a verifiable redactable blockchain with efficient query and integrity auditing","volume":"72","author":"Tian","year":"2023","journal-title":"IEEE Trans Comput"},{"key":"ref76","series-title":"Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS); 2024 Mar 14\u201316","first-page":"1","article-title":"Blockchain-based digital identity for secure authentication of IoT devices in 5G networks","author":"Aanandaram","year":"2024"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"2377","DOI":"10.30574\/wjarr.2025.25.2.0620","article-title":"Enhancing federal cloud security with AI: zero trust, threat intelligence and CISA compliance","volume":"25","author":"Ofili","year":"2025","journal-title":"World J Adv Res Rev"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2018.1701132","article-title":"Security in the Internet of Things supported by mobile edge computing","volume":"56","author":"He","year":"2018","journal-title":"IEEE Commun Mag"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"7104","DOI":"10.3390\/app14167104","article-title":"Combining edge computing-assisted Internet of Things security with artificial intelligence: applications, challenges, and opportunities","volume":"14","author":"Rupanetti","year":"2024","journal-title":"Appl Sci"},{"key":"ref80","unstructured":"Oshiro DM. Zero trust architecture implementation for the marine corps tactical cloud [master\u2019s thesis]. Monterey, CA, USA: Naval Postgraduate School; 2023."},{"key":"ref81","doi-asserted-by":"crossref","first-page":"32","DOI":"10.62762\/TACS.2024.521915","article-title":"ViTDroid and hybrid models for effective Android and IoT malware detection","volume":"1","author":"Khan","year":"2024","journal-title":"ICCK Trans Adv Comput Syst"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"105","DOI":"10.30574\/wjarr.2023.19.3.1785","article-title":"Zero trust architecture: redefining network security paradigms in the digital age","volume":"19","author":"Khan","year":"2023","journal-title":"World J Adv Res Rev"},{"key":"ref83","first-page":"24","article-title":"Zero trust security architecture raises the future paradigm in information systems","volume":"1","author":"Patel","year":"2024","journal-title":"Inform Digit Insight J"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"100564","DOI":"10.1016\/j.iot.2022.100564","article-title":"A survey on security in Internet of Things with a focus on the impact of emerging technologies","volume":"19","author":"Williams","year":"2022","journal-title":"Internet Things"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"50296","DOI":"10.1109\/ACCESS.2025.3551750","article-title":"AI-powered IoT: a survey on integrating artificial intelligence with IoT for enhanced security, efficiency, and smart applications","volume":"13","author":"Vivek Menon","year":"2025","journal-title":"IEEE Access"},{"key":"ref86","first-page":"4458","article-title":"Role of artificial intelligence in cloud computing, IoT and SDN: reliability and scalability issues","volume":"11","author":"Belgaum","year":"2021","journal-title":"Int J Electr Comput Eng"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/TPDS.2020.3013892","article-title":"Blockchain at the edge: performance of resource-constrained IoT networks","volume":"32","author":"Misra","year":"2021","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"78","DOI":"10.62762\/TACS.2024.928069","article-title":"Comparing fine-tuned RoBERTa with traditional machine learning models for stance detection in political tweets","volume":"1","author":"Khan","year":"2024","journal-title":"ICCK Trans Adv Comput Syst"},{"key":"ref89","series-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems; 2019 May 4\u20139","first-page":"1","article-title":"Cross-device taxonomy: survey, opportunities and challenges of interactions spanning across multiple devices","author":"Brudy"},{"key":"ref90","first-page":"9109300","article-title":"Rules of smart IoT networks within smart cities towards blockchain standardization","volume":"2022","author":"Alasbali","year":"2022","journal-title":"Mob Inf Syst"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"101099","DOI":"10.1016\/j.iot.2024.101099","article-title":"An IoT system for a smart campus: challenges and solutions illustrated over several real-world use cases","volume":"25","author":"Dom\u00ednguez-Bola\u00f1o","year":"2024","journal-title":"Internet Things"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.adhoc.2016.06.010","article-title":"Network layer inter-operation of device-to-device communication technologies in Internet of Things (IoT)","volume":"57","author":"Bello","year":"2017","journal-title":"Ad Hoc Netw"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"2366","DOI":"10.1109\/COMST.2022.3200740","article-title":"Pervasive AI for IoT applications: a survey on resource-efficient distributed artificial intelligence","volume":"24","author":"Baccour","year":"2022","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"48047","DOI":"10.1109\/ACCESS.2025.3551261","article-title":"Lightweight blockchain for authentication and authorization in resource-constrained IoT networks","volume":"13","author":"Villegas-Ch","year":"2025","journal-title":"IEEE Access"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"4330","DOI":"10.1109\/JIOT.2018.2875218","article-title":"Power-constrained edge computing with maximum processing capacity for IoT networks","volume":"6","author":"Qin","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"40368","DOI":"10.1109\/ACCESS.2024.3376707","article-title":"Toward intelligent monitoring in IoT: aI applications for real-time analysis and prediction","volume":"12","author":"Villegas-Ch","year":"2024","journal-title":"IEEE Access"},{"key":"ref97","series-title":"Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles; 2021 Oct 26\u201329; Virtual","first-page":"18","article-title":"Bidl: a high-throughput, low-latency permissioned blockchain framework for datacenter networks","author":"Qi"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"e3493","DOI":"10.1002\/ett.3493","article-title":"EdgeCloudSim: an environment for performance evaluation of edge computing systems","volume":"29","author":"Sonmez","year":"2018","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"50437","DOI":"10.1109\/ACCESS.2025.3552529","article-title":"Addressing adversarial attacks in IoT using deep learning AI models","volume":"13","author":"Bommana","year":"2025","journal-title":"IEEE Access"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417987","article-title":"Security and privacy in IoT using machine learning and blockchain: threats and countermeasures","volume":"53","author":"Waheed","year":"2020","journal-title":"ACM Comput Surv"},{"key":"ref101","unstructured":"Ali S. Securing edge computing with AI: intelligent threat detection for decentralized systems; 2024 [cited 2025 Jan 1]. Available from: https:\/\/www.researchgate.net\/publication\/388525892."},{"key":"ref102","doi-asserted-by":"crossref","first-page":"5013","DOI":"10.1109\/JIOT.2022.3219202","article-title":"Energy-aware AI-driven framework for edge-computing-based IoT applications","volume":"10","author":"Zawish","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"100419","DOI":"10.1016\/j.egyai.2024.100419","article-title":"Artificial intelligence-driven real-world battery diagnostics","volume":"18","author":"Zhao","year":"2024","journal-title":"Energy AI"},{"key":"ref104","series-title":"2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS); 2021 Jul 14\u201316","first-page":"503","article-title":"Towards a green blockchain: a review of consensus mechanisms and their energy consumption","author":"Bada"},{"key":"ref105","series-title":"2019 IEEE International Conference on Big Data (Big Data); 2019 Dec 9\u201312","first-page":"469","article-title":"Investigating edge vs. cloud computing trade-offs for stream processing","author":"Silva"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/OJCS.2024.3505056","article-title":"Emerging technologies driving zero trust maturity across industries","volume":"6","author":"Joshi","year":"2025","journal-title":"IEEE Open J Comput Soc"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.3390\/s23031352","article-title":"A survey of AI-based anomaly detection in IoT and sensor networks","volume":"23","author":"DeMedeiros","year":"2023","journal-title":"Sensors"},{"key":"ref108","first-page":"32","article-title":"Enhancing security and risk management with predictive analytics: a proactive approach","volume":"6","author":"Adeniran","year":"2024","journal-title":"Int J Manag Entrep Res"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"527","DOI":"10.32604\/iasc.2021.016240","article-title":"AI\/ML in security orchestration, automation and response: future research directions","volume":"28","author":"Kinyua","year":"2021","journal-title":"Intell Autom Soft Comput"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3390\/fi17010049","article-title":"Decentralized identity management for Internet of Things (IoT) devices using IOTA blockchain technology","volume":"17","author":"Ram\u00edrez-Gordillo","year":"2025","journal-title":"Fut Internet"},{"key":"ref111","unstructured":"Marchioro NG, Velegrakis Y, Anantharaj V, Foster I, Fiore SL. Trustworthy provenance for big data science: a modular architecture leveraging blockchain in federated settings. arXiv:2505.24675. 2025."},{"key":"ref112","doi-asserted-by":"crossref","first-page":"7752","DOI":"10.1109\/TII.2021.3057595","article-title":"A model for verification and validation of law compliance of smart contracts in IoT environment","volume":"17","author":"Amato","year":"2021","journal-title":"IEEE Trans Ind Inform"},{"key":"ref113","series-title":"2018 IEEE International Conference on Industrial Internet (ICII); 2018 Oct 21\u201323","first-page":"99","article-title":"An edge computing framework for real-time monitoring in smart grid","author":"Huang"},{"key":"ref114","first-page":"8","article-title":"Edge computing: architecture, applications, and future challenges in a decentralized era","volume":"7","author":"Veeramachaneni","year":"2025","journal-title":"Recent Trends Comput Graph Multimed Technol"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"100069","DOI":"10.1016\/j.iot.2019.100069","article-title":"Fog-based local and remote policy enforcement for preserving data privacy in the Internet of Things","volume":"7","author":"Al-Hasnawi","year":"2019","journal-title":"Internet Things"},{"key":"ref116","first-page":"4644253","article-title":"Blockchain and artificial intelligence (AI) integration for revolutionizing security and transparency in finance","author":"Rane","year":"2023","journal-title":"SSRN J"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"18583","DOI":"10.1109\/ACCESS.2022.3151370","article-title":"A secure blockchain platform for supporting AI-enabled IoT applications at the edge layer","volume":"10","author":"Alrubei","year":"2022","journal-title":"IEEE Access"},{"key":"ref118","series-title":"Proceedings of the 26th International Conference on Distributed Computing and Networking; 2025 Jan 4\u20137","first-page":"331","article-title":"Towards zero trust security in SDN: a multi-layered defense strategy","author":"Barach"},{"key":"ref119","doi-asserted-by":"crossref","first-page":"5168","DOI":"10.3390\/s22145168","article-title":"A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent advances, and future research directions","volume":"22","author":"Khalil","year":"2022","journal-title":"Sensors"},{"key":"ref120","series-title":"2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); 2024 Oct 3\u20135","first-page":"156","article-title":"Scalable AI solutions for IoT-based healthcare systems using cloud platforms","author":"Gowda"},{"key":"ref121","series-title":"2020 International Wireless Communications and Mobile Computing (IWCMC); 2020 Jun 15\u201319","first-page":"2210","article-title":"Blockchain based decentralized trust management framework","author":"Oualhaj"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","article-title":"A scalable distributed machine learning approach for attack detection in edge computing environments","volume":"119","author":"Kozik","year":"2018","journal-title":"J Parallel Distrib Comput"},{"key":"ref123","first-page":"196","article-title":"Advanced AI-driven cybersecurity solutions for proactive threat detection and response in complex ecosystems","volume":"3","author":"Tanikonda","year":"2022","journal-title":"J Sci Technol"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3390\/blockchains3010005","article-title":"The application of blockchain technology in the field of digital forensics: a literature review","volume":"3","author":"Igonor","year":"2025","journal-title":"Blockchains"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"11088","DOI":"10.1109\/JIOT.2021.3052082","article-title":"Resource provisioning in edge computing for latency-sensitive applications","volume":"8","author":"Abouaomar","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref126","first-page":"1","article-title":"Lightweight deep learning for resource-constrained environments: a survey","volume":"56","author":"Liu","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"133682","DOI":"10.1109\/ACCESS.2022.3230985","article-title":"An optimized and secure energy-efficient blockchain-based framework in IoT","volume":"10","author":"Al Ghamdi","year":"2022","journal-title":"IEEE Access"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"2410","DOI":"10.1109\/TNSM.2020.3020249","article-title":"Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks","volume":"17","author":"Elgendy","year":"2020","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3406093","article-title":"A comparative study of AI-based intrusion detection techniques in critical infrastructures","volume":"21","author":"Otoum","year":"2021","journal-title":"ACM Trans Internet Technol"},{"key":"ref130","series-title":"2017 15th Annual Conference on Privacy, Security and Trust (PST); 2017 Aug 28\u201330","first-page":"3","article-title":"Transaction immutability and reputation traceability: blockchain as a platform for access controlled IoT and human interactivity","author":"Kravitz"},{"key":"ref131","doi-asserted-by":"crossref","first-page":"2713","DOI":"10.1109\/TSC.2021.3074956","article-title":"Edge-based runtime verification for the Internet of Things","volume":"15","author":"Tsigkanos","year":"2022","journal-title":"IEEE Trans Serv Comput"},{"key":"ref132","first-page":"52","author":"Babu","year":"2024","journal-title":"Principles and applications of adaptive artificial intelligence"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"3928","DOI":"10.3390\/s20143928","article-title":"Blockchain for the Internet of Vehicles: a decentralized IoT solution for vehicles communication using ethereum","volume":"20","author":"Jabbar","year":"2020","journal-title":"Sensors"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"37665","DOI":"10.1109\/ACCESS.2018.2849200","article-title":"Exploitation of mobile edge computing in 5G distributed mission-critical push-to-talk service deployment","volume":"6","author":"Solozabal","year":"2018","journal-title":"IEEE Access"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"e191","DOI":"10.1002\/spy2.191","article-title":"Augmenting zero trust architecture to endpoints using blockchain: a state-of-the-art review","volume":"5","author":"Alevizos","year":"2022","journal-title":"Secur Priv"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1057\/s41284-022-00341-6","article-title":"Implementing converged security risk management: drivers, barriers, and facilitators","volume":"36","author":"Schneller","year":"2023","journal-title":"Secur J"},{"key":"ref137","first-page":"5003638","article-title":"AI-powered threat intelligence platforms in telecom: leveraging AI for real-time threat detection and intelligence gathering in telecom network security operations","author":"Manda","year":"2024","journal-title":"SSRN J"},{"key":"ref138","first-page":"1","article-title":"Low-cost tamper-proof IoT devices to improve data origin verification and privacy in blockchain-based energy consumption records","volume":"3791","author":"Orr\u00f9","year":"2024","journal-title":"CEUR Workshop Proc"},{"key":"ref139","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TNSE.2019.2941754","article-title":"Mobi-IoST: mobility-aware cloud-fog-edge-IoT collaborative framework for time-critical applications","volume":"7","author":"Ghosh","year":"2020","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref140","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/COMST.2023.3274934","article-title":"A survey on scalable LoRaWAN for massive IoT: recent advances, potentials, and challenges","volume":"25","author":"Jouhari","year":"2023","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"590","DOI":"10.3390\/s24020590","article-title":"Security at the edge for resource-limited IoT devices","volume":"24","author":"Canavese","year":"2024","journal-title":"Sensors"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in Internet of Things: taxonomies and open challenges","volume":"24","author":"Noura","year":"2019","journal-title":"Mob Netw Appl"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","article-title":"AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems","volume":"181","author":"Latif","year":"2022","journal-title":"Comput Commun"},{"key":"ref144","doi-asserted-by":"crossref","first-page":"100174","DOI":"10.1016\/j.bcra.2023.100174","article-title":"Towards a lightweight security framework using blockchain and machine learning","volume":"5","author":"Ismail","year":"2024","journal-title":"Blockchain Res Appl"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MS.2017.2","article-title":"Enabling IoT ecosystems through platform interoperability","volume":"34","author":"Br\u00f6ring","year":"2017","journal-title":"IEEE Softw"},{"key":"ref146","doi-asserted-by":"crossref","first-page":"103858","DOI":"10.1016\/j.jnca.2024.103858","article-title":"AI-enhanced blockchain technology: a review of advancements and opportunities","volume":"225","author":"Ressi","year":"2024","journal-title":"J Netw Comput Appl"},{"key":"ref147","first-page":"104","article-title":"Maximizing decision efficiency with edge-based AI systems: advanced strategies for real-time processing, scalability, and autonomous intelligence in distributed environments","volume":"9","author":"Santoso","year":"2024","journal-title":"Q J Emerg Technol Innov"},{"key":"ref148","article-title":"Advancing AI-driven threat detection in IoT ecosystems: addressing scalability, resource constraints, and real-time adaptability","author":"Chaganti","year":"2024","journal-title":"TechRxiv"},{"key":"ref149","first-page":"4641557","article-title":"Leading-edge artificial intelligence (AI), machine learning (ML), blockchain, and Internet of Things (IoT) technologies for enhanced wastewater treatment systems","author":"Rane","year":"2023","journal-title":"SSRN J"},{"journal-title":"Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems","year":"2024","author":"Knapp","key":"ref150"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_70189\/TSP_CMC_70189.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:25:03Z","timestamp":1763346303000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":150,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.070189","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-07-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}